GOSSY Logo
Privacy Policy

Gossy Privacy & Data Policy

A binding agreement regarding data sovereignty, blockchain immutability, and public ledger transparency. By using Gossy, you acknowledge that your on-chain actions are permanent and public.

01

1. Introduction & Critical Warning

Last Updated: December 31, 2025. This Privacy Policy governs your use of the Gossy Interface. PLEASE READ CAREFULLY: GOSSY IS NOT A TRADITIONAL APP. We are a decentralized interface. We do not store your content on private servers; you publish it directly to public decentralized networks (Blockchain & IPFS).

  • Public by Default: Any data you sign with your wallet is broadcast globally. We cannot make this private.
  • Immutable: Once confirmed, data on the blockchain cannot be deleted or edited by anyone, including us.
  • No Account: You do not have an account with Gossy. You have a wallet that interacts with the Gossy Protocol.

02

2. Classification of Data (Interface vs. Protocol)

To clarify our liability and your rights, we categorize data into two distinct types:

  • Type A: Interface Data (Ephemeral): Data we collect temporarily to run the website/app (e.g., IP logs for DDoS protection, local device cache). We CONTROL this data and can delete it.
  • Type B: Protocol Data (Permanent): Data you cryptographically sign and submit to the network (e.g., Posts, Comments, Reactions, Tips). We DO NOT control this data. It is hosted by thousands of nodes worldwide. We CANNOT delete it.

03

3. Information We Collect

Information You Publicly Publish (Protocol Data)

  • Wallet Address: Your public identifier on the blockchain.
  • Content Hash (CID): The cryptographic reference to your text/images stored on IPFS.
  • Transaction History: Timestamps, gas fees, and interactions with the Smart Contract.
  • Social Graph: Who you follow, who follows you, and how you vote/react.

Information We Automatically Log (Interface Data)

  • Network Logs: IP addresses, User-Agent strings, and request timestamps. (Strictly for security/firewall purposes).
  • Device Metadata: Device model, OS version, and App version (to serve the correct build and push updates).
  • Local Storage: Your 'Blocked Users' list and 'Theme' preferences are stored locally on your device, not on our servers.

04

4. How We Use Your Information

  • Indexing: We read the public blockchain to display your feed in a human-readable format.
  • Security Enforcement: We use IP hashes and Wallet Addresses to enforce bans against users posting illegal content (CSAM, Terrorism).
  • Legal Compliance: We act on valid subpoenas to assist law enforcement. While we cannot delete blockchain data, we will provide any Interface Data (logs) linked to a specific Wallet Address if compelled by law.
  • Service Optimization: Analyzing aggregated, anonymized traffic data to improve gateway performance.

05

5. Your Rights (GDPR / CCPA / Global)

Due to the immutable nature of blockchain, your rights are technically limited compared to Web2.

  • Right to Access: You have full access to your data 24/7 via any public Block Explorer (e.g., Etherscan).
  • Right to Rectification: IMPOSSIBLE for Protocol Data. You cannot 'edit' a block. You can only append new information.
  • Right to Erasure ('Right to Be Forgotten'): PARTIAL APPLICABILITY. You may request we delete your IP logs (Interface Data). You explicitly acknowledge that the Right to Erasure DOES NOT APPLY to the blockchain ledger. We cannot scrub the global network.
  • Right to Restrict Processing: You can stop using the Interface at any time. However, third parties may still process your public on-chain history.

06

6. Third-Party Infrastructure Risks

Gossy connects your wallet to third-party services. We are not responsible for their data practices.

  • RPC Nodes (Infura/Alchemy): When your wallet reads/writes to the chain, it connects to RPC nodes. These nodes may log your IP address and wallet address pairing.
  • IPFS Gateways: When loading images, your device requests data from public gateways. These requests leave digital footprints.
  • Wallet Providers: MetaMask, Phantom, or Ledger have their own privacy policies. We do not control your keys or wallet data.

07

7. STRICT Age Restriction (18+)

We enforce a strict 18+ policy for user protection and legal compliance.

  • No Minors: The Service is strictly prohibited for anyone under 18.
  • Data Purge: If we discover a user is underage, we will immediately ban the wallet from our Interface and permanently delete all associated server logs.
  • Parental Advisory: Blockchain content is uncensored. Minors should never be given access to private keys.

08

8. International Data Transfer Consent

  • By using Gossy, you consent to your data being transferred to, stored on, and processed by blockchain nodes located in every country in the world.
  • You acknowledge that decentralized networks do not respect national borders and that your data may reside in jurisdictions with different privacy laws than your own.

09

9. Notice to California Residents (CCPA)

  • We do not 'sell' your personal data for money.
  • However, because your data is public on-chain, it may be scraped by third parties. We are not responsible for third-party scrapers.
  • You have the right to request a list of the categories of data we have collected (logs vs. on-chain indexing) in the past 12 months.

10

10. Security & Liability

We secure the Interface. You secure the Keys.

  • Your Responsibility: You are solely responsible for the security of your private keys. If you lose them, your account is lost forever.
  • No Liability: Gossy is not liable for any unauthorized access to your account resulting from phishing, malware on your device, or weak wallet security.
  • Breach Notification: In the event of a breach of our *server* logs, we will notify users via the Interface. We cannot detect breaches of your personal wallet.

11

11. Changes to Policy

We reserve the right to update this policy. Material changes will be highlighted in the App. Continued use of the Interface constitutes acceptance of the new policy.

12

12. Contact & Data Protection Officer

  • Privacy Inquiries: @
  • Legal Department: @
  • Note: For your security, never send private keys or passwords via email.