VARYNX

OFFLINE PROTECTION FOR EVERY DEVICE

A privacy‑first security platform that runs entirely on your devices.
No cloud. No accounts. NO DATA COLLECTION. EVER.


What VARYNX Is

VARYNX isn’t an antivirus.

It isn’t a scanner.
It isn’t a cloud service.

What makes it different

  • Runs 100% locally — no cloud, no accounts

  • Analyzes behavior, not signatures or databases

  • Blocks threats before execution

  • Requires zero updates or internet access

The result

Traditional tools protect a device.

VARYNX protects your entire environment.


Why VARYNX Exists

Security shouldn’t require surveillance.
But today, every major tool demands your data, your behavior, your identity —
all in the name of “protection.”

The problem
• Cloud‑based tools track everything you do
• Your activity becomes someone else’s dataset
• “Security” is locked behind accounts and telemetry
• Offline devices are treated like they don’t matter
• Privacy is sacrificed just to stay “safe”

The truth
Choosing between privacy and protection was never your responsibility.
That trade‑off only exists because the industry built it that way.
The mission
VARYNX exists to break that system.
To give you real security without the cloud, without tracking,
and without handing over your digital life to be analyzed, stored, or sold.


How VARYNX Works

VARYNX doesn’t wait for signatures, cloud checks, or updates.
It protects you by understanding behavior, not databases.
1. It watches what programs do
Instead of scanning files, VARYNX analyzes actions —
what a program tries to access, modify, or execute.
2. It identifies malicious behavior instantly
If something acts like a threat, it’s treated like one.
No cloud lookups. No delay. No guessing.
3. It blocks the threat before it runs
Execution is stopped at the moment of danger —
not after damage is done.
4. It works entirely offline
No accounts.
No telemetry.
No data leaving your device.
Just local, real‑time protection.
The result
A security system that reacts to behavior, not signatures
and protects you the moment something becomes dangerous.

The VARYNX Ecosystem
Behind VARYNX is a larger architecture — a network of tools built for total privacy.

VARYNX: CORE PRIVACY STANDARDS

  • A unified security architecture built for true privacy.

  • 100% Local Execution

  • VARYNX runs entirely on your hardware. No cloud processing. No remote servers. Your data never leaves your device — it stays under your complete control.

  • Zero‑Knowledge by Design

  • No accounts. No logs. No telemetry. No tracking. VARYNX never collects, stores, or analyzes your activity. Your digital footprint belongs to you alone.

  • Proactive Privacy Engine

  • VARYNX identifies and halts hidden tracking, background data collection, and unauthorized communication attempts in real time — before they reach the outside world.

  • Offline First, Privacy Always

  • VARYNX delivers full protection without an internet connection. No cloud checks. No online dependencies. Just privacy without compromise.

The VARYNX Ecosystem

A unified architecture built for total privacy.

What the Ecosystem Is

The VARYNX Ecosystem is a distributed, offline-first security environment built on a deterministic, zero‑trust architecture. Every component operates locally, maintains its own posture state, and participates in a sealed, device‑to‑device mesh. No cloud services, no external servers, and no online accounts are required — the organism lives entirely on your hardware.Local‑First Architecture
All components run on‑device. No cloud, no accounts, no external routing.
Zero‑Knowledge Design
VARYNX never sees or stores your data. All analysis happens locally with no telemetry or tracking.
Isolation by Default
Each node operates in a sealed environment with no hidden communication or online dependencies.
Deterministic Protection
Every action follows strict, predictable rules. No remote logic, no cloud inference, no external overrides.


SYSTEM PRINCIPLES

Local Execution
All posture, identity, and enforcement logic runs on your devices.
Cryptographic Identity
Nodes authenticate using multi‑hash identity, not accounts or credentials.
Sealed Communication
Nodes communicate only through local, offline channels.
Predictable Behavior
The system reacts using deterministic rules, not adaptive cloud models.


THE VARYNX ECOSYSTEM


HOW THE ECOSYSTEM OPERATES

Local‑Only Communication Flow
Nodes communicate directly using offline channels. No servers or relays.
Posture Propagation
Posture flows from OS → Home Hub → Mobile → Desktop.
Deterministic Reflex Chain
Events trigger predictable, rule‑based reactions across the organism.
Mesh Awareness
Nodes extend each other’s visibility, forming a sealed awareness network.
Identity Anchoring
Identity is rooted in VARYNX OS and verified locally.
Offline Synchronization
Nodes exchange posture only when locally reachable. Nothing leaves the organism.

THE ARCHITECTURE FLOW

VARYNX OS (Root Node)

HomeHub (Environment Controller)

VARYNX 2.0 (Mobile Guardian Node)

Desktop.exe (Node Container)
• Desktop Guardian Node
• Home Node
• Pocket Nodes
• Satellite Node

THE OFFLINE MESH

Local Mesh Extension
Each node extends the awareness of the others.
Fallback Awareness
Satellite nodes ensure continuous posture.
Environment‑Level Posture
Home Hub distributes environmental posture.
Mesh Reflex Propagation
Reflex triggers travel instantly through the mesh.
Distributed Identity
Identity is extended locally across nodes.
Sealed Awareness Network
No broadcasting, no external sync, no cloud exposure.

WHY OFFLINE MATTERS

No External Attack Surface
No cloud means no remote exploitation.
No Data Leaves the Device
All posture and identity remain local.
No Remote Dependencies
The system functions even without internet.
No Telemetry or Tracking
There is no analytics pipeline.
No Cloud Decision‑Making
All decisions are local and deterministic.
No Identity Exposure
Identity never leaves the organism.


SECURITY MODEL OVERVIEW

Closed‑System Architecture
A sealed environment with no external APIs.
Deterministic Enforcement
Rule‑based behavior with no remote overrides.
Local Identity Trust
Identity is verified locally across nodes.
Zero External Exposure
No telemetry, no remote logging.
Hardware‑Bound Protection
Security is tied to your physical devices.

THREAT MODEL

Network‑Level Threats Eliminated
No cloud = no MITM, no packet interception.
Data Harvesting Impossible
Nothing syncs or uploads.
Account‑Based Attacks Removed
No accounts, passwords, or tokens.
Cloud Breach Immunity
There is no cloud database to leak.
Local‑Only Attack Surface
Only the device you control matters.

WHAT MAKES VARYNX DIFFERENT

Offline by Design
The organism lives entirely on your hardware.
Deterministic, Not Adaptive
No guesswork, no remote inference.
Ecosystem, Not an App Suite
Nodes reinforce each other as one organism.
Identity Without Accounts
Identity exists only on your devices.
Posture as a System
Protection is continuous and multi‑node.

THE ORGANISM PHILOSOPHY

A System That Lives With You
Coordinated, self‑contained, environment‑aware.
Protection Without Surveillance
Posture without tracking or profiling.
Local Intelligence, Local Decisions
Every action is made on‑device.
A Closed World With Open Control
You own the identity and define the environment.

CLOSING STATEMENT

The VARYNX Ecosystem is not a cloud service.
It is not a networked platform.
It is not a remote‑controlled product.
It is a self‑contained organism
a distributed, deterministic, offline security system
that protects you by staying entirely local, entirely sealed, and entirely yours.

Why I Built VARYNX

I didn’t build VARYNX because I wanted to make another app. I built it because I lived through the exact problems this project now solves.For years, I saw people get targeted (I've myself too) by scams, fake apps, social engineering, and the kind of digital manipulation that preys on normal families who just want to use their phones safely. I saw how easy it was for a device to become a doorway for stress, fear, and financial damage. And I saw how most “security apps” weren’t built for real people — they were built for data collection, cloud dependency, or marketing.Nothing existed that was simple, offline, private, and built for adults who just want their phone to be safe without being tracked.So, I built it myself.VARYNX started as a personal tool — a way to protect my own family. But the more I built, the more I realized the gap in the market: there was no offline guardian that stayed on the device, respected privacy, and helped people understand what was happening on their phone.I’m not a corporation. I’m a founder, a parent, and the sole provider for my family. I built VARYNX at night, after work, through setbacks, rebuilds, and months of discipline. Every line of code, every module, every detector, every decision was shaped by one mission:Give people real protection without taking anything from them.VARYNX Version 1 is the foundation — a stable, offline guardian that proves the architecture works. It’s the version that creates trust, earns traction, and opens the door for partnerships. Version 2 will be the evolution — a unified engine built to be unstoppable, massively capable, and far beyond anything V1 can do. But V2 only exists because V1 is real, stable, and built with intention.This project is not a trend, not a clone, or a shortcut. It’s the result of lived experience, real problems, and a commitment to building something that protects people.VARYNX exists because it is needed to. And it will keep growing because the mission is real.— Corey, Founder of VARYNX.

VARYNX Lite

(Android)

DIGITAL SOVEREIGNTY, SIMPLIFIED.

Free, 100% offline mobile protection for people who demand total privacy.

WHAT IS VARYNX?

VARYNX is a privacy-first, security-focused Android application designed to protect users from digital threats, scams, and privacy invasions. It is built as a modular, lightweight solution that empowers users to take control of their device security without sacrificing usability or performance.

The Lite Model: Simplicity & Speed
The "Lite" model of VARYNX is a streamlined version of the app, optimized for:

  • Minimal resource usage (battery, memory, storage)

  • Fast performance on all Android devices

  • Essential security features for everyday users

  • No unnecessary permissions or bloat

key FEATURES

  • Threat Detection: Real-time monitoring for common scams and suspicious apps.

  • Privacy Alerts: Notifications for camera, location, or clipboard access.

  • Permission Insights: Clear explanations of what your apps can access.

  • No Tracking: VARYNX Lite never collects or shares your personal data.

  • Simple Interface: Actionable recommendations with zero technical jargon.

THE VARYNX ECOSYSTEM: ADVANCED PROTECTION

The full VARYNX ecosystem is a suite of advanced modules and services for power users, organizations, and those needing deeper protection. It includes:

  • Modular Engines: Each engine (Bluetooth, NFC, Wi-Fi, Threat, Permissions, etc.) can be enabled or disabled as needed.

  • Custom Rules & Automation: Advanced users can define custom security rules and automate responses.

  • Enterprise Integrations: Support for managed devices, compliance, and reporting.

  • Cloud Sync & Backup: Optional features for secure backup and cross-device sync (never enabled by default).

  • Developer APIs: For integrating VARYNX protections into other apps or workflows.

WHY CHOOSE VARYNX LITE?

  • Privacy by Design: Zero ads, zero tracking, and zero hidden data collection. Your security is our only priority.

  • Total Transparency: Clear privacy policies and open documentation. We believe in being honest about how we protect you (Note: VARYNX is not open source).

  • Fast & Lightweight: Optimized for maximum performance on all Android hardware, including older or budget-friendly devices.

  • Easy to Use: Professional-grade security designed for everyone—no technical expertise or complicated setup required.

VARYNX is committed to empowering users with real security and privacy. The Lite model is our promise to keep protection accessible for all.

VARYNX LITE VS. PAID SECURITY APPS

The table below compares VARYNX Lite to typical paid mobile security apps from major companies. This is for informational purposes only—actual features and policies may vary by provider and version. Always review the terms and privacy policy of any app you use.

Feature/PolicyVARYNX Lite (Free)Paid Security Apps (General)
CostFree, no adsSubscription required
Privacy PolicyNo tracking, no data saleMay collect / share user data
Threat DetectionYes (Core threats)Yes (Proprietary)
PermissionsFull, transparentVaries, often limited
Resource UsageMinimalModerate to high
Cloud RequiredNoOften required
Ads/PromotionsNoneOften present
Open SourceNoNo
Data CollectionNoneOften extensive
User ControlFullLimited

Legal Disclaimer: This comparison is based on publicly available information as of April 2026. VARYNX is not affiliated with, endorsed by, or in competition with any named company. All trademarks are property of their respective owners. For the most accurate and up-to-date details, consult each provider’s official website and privacy policy. VARYNX is not open source.

VARYNX 2.0

THE MOBILE GUARDIAN NODE

The full guardian-class experience on Android. Built offline-first. Designed for local-first posture.


WHAT VARYNX 2.0 IS

VARYNX 2.0 is the advanced tier of the VARYNX security line. It is built for people who want strong, device-native protection and a path into the full VARYNX ecosystem: a coordinated, offline-first model where phones, desktops, and environment nodes reinforce each other without turning your life into a cloud dataset.

The Mobile Guardian Layer: VARYNX 2.0 is the primary user-facing guardian on Android that helps you see risk, enforce posture, and stay aligned with local execution, clear signals, and minimal dependency on remote control planes.

WHAT VARYNX 2.0 IS NOT

  • Not a "Cloud Dashboard": It does not require an account for a vendor to store your activity for analysis.

  • Not a Total Enterprise Replacement: It is not a replacement for MDM or corporate policies unless explicitly deployed in that context with proper review.

  • Not a "Perfect" Promise: No honest vendor can promise perfect protection. VARYNX 2.0 is a privacy-first, local-intelligence design intended to improve visibility and response on your own hardware.

Ecosystem vocabulary (for visitors new to the brand)

Node- a participant device or runtime in the VARYNX organism.Posture- the current risk and configuration state of a device or environment.Mesh- local, sealed awareness and coordination between nodes, described as operating without requiring cloud control planes for the core design story.Reflex- automated, rule-based reactions to events, described in product docs as deterministic in spirit (verify exact meaning in the version you ship).Guardian- the user-facing protection layer; on mobile, VARYNX 2.0 performs this role in the architecture described on the website.

2.0 VS. BIG-PLATFORM OFFERINGS

This is a high-level, non-exhaustive comparison of common patterns in the industry. It is not a rating of any specific product. VARYNX is independent and does not represent any other brand.

Framework Comparison Notice:
-Products differ by version, region, plan, and configuration.
-VARYNX features depend on the build you install and your device capabilities.
-Do not rely on this table for legal, compliance, or procurement decisions.
-If you need guarantees, run your own evaluation and review official policies.
-VARYNX is an independent project; it is not affiliated with any other brand.

If you are evaluating a large commercial suite, the best next step is to download that vendor’s current privacy policy and product documentation, then decide which tradeoffs fit your life. VARYNX exists for people who want the ecosystem story: local posture, local nodes, and a Mobile Guardian on Android that is meant to be part of that stack.

Common Large Platforms

  • Primary business model

  • Often subscription-based, sometimes bundled with device purchase or OS services; may include upsells, cross-sells, or ecosystem services revenue.

  • Data processing location

  • Frequently relies on cloud-assisted scanning, reputation feeds, or data-driven models for at least part of the protection story.

  • Account / Identity

  • Commonly uses accounts for licensing, multi-device features, and customer support workflows—even when local scanning exists.

  • Data usage and insights

  • May collect usage or diagnostic data depending on settings, region, and policy. Users should read each provider’s official disclosures.

  • Threat intelligence feeds

  • Often a strength: large teams, global samples, and rapid global updates. This can be effective for widespread malware classes.

  • User control and clarity

  • Varies widely. Some products are transparent; others bundle many controls under simplified UX.

  • Ecosystem Lock-in

  • Tight integration can be convenient, but can also increase dependence on a single vendor stack for advanced features.

  • Enterprise readiness

  • Mature programs may offer enterprise dashboards, management tooling, and compliance features at high tiers.

VARYNX 2.0

Primary business model
Presented as a privacy-first, local-first guardian line rather than a data-centric analytics business.
Data processing location
Stated design goal: run security intelligence and posture analysis locally, without using your private activity as a cloud asset.
Account / Identity
VARYNX is described as not requiring an account for core local operation.
Data usage and insights
The public narrative emphasizes minimal remote “surveillance for safety.” Always match claims to actual app behavior.
Threat intelligence feeds
Less emphasis on “global cloud brain owns truth,” more emphasis on local behavioral and posture understanding.
User control and clarity
Aims for a transparent guardian posture: explain what changed, what is risky, and what you can do.
Ecosystem Lock-in
Aims for “sealed local organism” thinking—nodes you run—rather than binding identity to a remote control plane.
Enterprise readiness
If you market enterprise features, do so only with accurate scope. Large vendors may offer more mature programs today.

Why this comparison is written carefully:

  • Focus on Patterns: It describes frequent market patterns rather than accusing any company of wrongdoing.

  • No Hype: It avoids unprovable superlatives (like "most secure in the world").

  • Transparency First: It steers users toward reading official policies—the legally safe habit and the most honest one.

THE IDEA IN ONE PARAGRAPH

VARYNX 2.0 extends the VARYNX mission: help normal people and professionals operate in a high-signal, high-manipulation world—scams, sketchy permissions, noisy radios, and confusing system states—without forcing you to trade your privacy for a sense of safety. The design bias is “on-device first,” so the posture and reflex logic can stay close to the user, close to the hardware, and under your control.

Why this matters: The modern world rewards speed (QR workflows, Bluetooth, always-on location), but speed is where mistakes happen. VARYNX 2.0 is for those who want a guardian that can keep up locally.

HOW VARYNX 2.0 IS USED IN TODAY’S WORLD

  • 1. Everyday personal use

  • You carry a phone everywhere. VARYNX 2.0 is for users who want continuous posture awareness—what changed, what looks off, and what the device is doing—without feeding a remote analytics pipeline for routine “security comfort.”

  • 2. Families and shared environments

  • Households share networks, chargers, and sometimes devices. A local-first posture model can help you reason about the environment: what is present, what changed, and what deserves attention—especially when not everyone is equally technical.

  • 3. Travel and untrusted networks

  • People move between home Wi-Fi, hotel networks, public hotspots, and event venues. VARYNX 2.0 is described as an Android-side guardian that supports an offline-by-design philosophy: the goal is to reduce dependency on “phone home” checks for core understanding of device state.

  • 4. Professionals who carry sensitive relationships (not only “classified”)

  • Lawyers, clinicians, journalists, financial professionals, and contractors often need strong device hygiene. They also face phishing, impersonation, and device tampering risk. A local guardian model can support “verify on device” habits—without assuming a single cloud vendor is the source of truth for your entire life.

  • 5. Power users, builders, and integrators

  • VARYNX 2.0 is the tier where deeper modules, stronger reflex concepts, and ecosystem alignment become part of the story. It is meant for people who will actually use the controls, read the signals, and tune the posture.

  • 6. A bridge to the full ecosystem

  • The product is not only an app icon on a home screen. In the VARYNX architecture, mobile is a node: it pairs with desktop, home hub, and other nodes in the organism. That is not marketing fluff; it is how the ecosystem is designed to scale protection across devices you own.

If you are deciding between VARYNX Lite and VARYNX 2.0, think in terms of depth: Lite is built to be fast and accessible; 2.0 is built to be the full guardian experience on mobile within the VARYNX family.

VARYNX 2.0 INSIDE THE VARYNX ECOSYSTEM

The VARYNX Ecosystem is described as a distributed, offline-first security environment: multiple nodes cooperate locally to extend awareness, propagate posture, and keep identity and enforcement rooted in hardware you control.Within that model, VARYNX 2.0 has a specific role: it is the “Mobile Guardian Node.” That means:

  • Primary Interface: It is the user’s primary on-the-go interface to ecosystem-grade ideas: posture, events, reflex-style responses, and device linking patterns that mirror the larger architecture.

  • The "First Node": It is the most common “first node” new users install. If mobile is credible, the ecosystem story is credible. If mobile is bloated, confusing, or cloud-dependent, the ecosystem story collapses in the market.

  • Pocket to Desk Connectivity: It connects the “pocket reality” to the “desk reality.” Many serious tasks still end on a PC. A mobile guardian that can reason locally and align with desktop nodes is how the ecosystem becomes a system—not a list of separate apps.

  • Daily Brand Promise: It carries the brand promise at the point of daily friction: permissions, scans, alerts, and quick actions. For many customers, 2.0 is the product experience that justifies the rest of the roadmap.

In short: VARYNX 2.0 is not a side app in the ecosystem. It is the mobile center of gravity for trust, adoption, and the daily loop of local security posture.The ecosystem’s importance to 2.0 is equally true the other way around: 2.0 gains meaning from the kernel/mesh/guardian architecture, and the ecosystem gains life from 2.0’s ability to meet users where they are—on the phone in their hand.

A NOTE ON INDUSTRY COMPARISONS

It is important to understand why an independent security stack like VARYNX can be the right tool for specific privacy goals. To remain objective and accurate, we follow these core principles:

  • Design Focus: We prioritize discussions on design principles—such as local control and ecosystem interoperability—rather than attacking specific competitors.

  • Verified Data: When comparing features, we use terms like “often” or “varies by provider” because products change rapidly. We always encourage users to check a provider’s own official policy pages for the most current details.

  • No Implied Endorsement: We do not use competitor logos or trademarks in any way that suggests they endorse or sponsor VARYNX.

  • Information Only: All comparative data is provided for general information purposes only.

Last Updated: April 2026
The comparison data provided reflects frequent industry patterns observed as of this date.

THE BOTTOM LINE: SUSTAINABLE TRUST

VARYNX 2.0 is the full guardian-class mobile experience. It is built for those who are tired of security that feels like surveillance and want a path into an ecosystem designed around offline-first nodes and local control rather than a single "cloud brain."In today’s world, your phone is your wallet, your keys, and your workplace. A security model that keeps the guardian close to the hardware—and connects that guardian to a broader local organism—is no longer a luxury. It is the architecture for sustainable trust.The VARYNX ecosystem requires a credible mobile node. VARYNX 2.0 is that node: your daily driver for awareness, your bridge to desktop and home environments, and the proof that local-first security is a real product you can use today.

VARYNX 2.0: YOUR MOBILE GUARDIAN NODE

“VARYNX 2.0 sits in the organism between your pocket and your other nodes. It is how security becomes a daily habit—and how the larger offline mesh earns its place on your home screen.”

Notice & Disclosures
This content is for informational purposes only and does not constitute legal or professional advice. VARYNX features and availability may vary by version and platform; please refer to the current build on Google Play for active features. No security tool can guarantee 100% protection from all threats or fraud. All third-party trademarks are the property of their respective owners. VARYNX is an independent project and is not affiliated with or sponsored by any third-party platform unless explicitly stated.
Last Updated: April 22, 2026
Contact: [email protected]


VARYNX
Cape Coral, Florida
© 2026 | All Rights Reserved

FAQ

  • What is VARYNX?

  • VARYNX is a privacy-first Security Suite that runs entirely on-device with no cloud and zero data collection.

  • Does VARYNX require an account?

  • No. VARYNX never asks for an account, login, email, or identity of any kind.

  • Does VARYNX send any data to servers?

  • No. VARYNX operates 100% offline. Nothing leaves your device.

  • Is VARYNX open source?

  • Yes. Both Lite and V2 are fully open source for public review on GitHub.

  • What’s the difference between Lite and 2.0?

  • Lite provides core offline protection. VARYNX 2.0 adds advanced modules, System Shield, and Maximum Protection Mode.

  • Does VARYNX affect battery life?

  • No. Both versions are optimized to run efficiently with minimal system impact.

  • Is there a free trial?

  • Yes. VARYNX Lite is always free. VARYNX 2.0 offers a dedicated trial period for all advanced features.

  • Who is VARYNX for?

  • Anyone who wants real privacy — from everyday users to security engineers and power users.

VARYNX Privacy Policy
Effective date: February 2026 Last updated: April 2026 Applies to: VARYNX software and related applications (including, where applicable, desktop, mobile, and companion experiences) offered by us.
IMPORTANT: This document is a draft template. It is not legal advice. Have a qualified attorney review it before you publish, distribute, or submit it to app stores.Contact for privacy questions: [email protected]SUMMARY
VARYNX is designed to operate with a strong privacy posture. In general:
• Security and threat-related processing is intended to run on your device. • We do not sell your personal information. • We do not use your data for advertising profiling in the way ad networks do.Details below describe categories of information, how they may be used, and your choices. Exact behavior can depend on which VARYNX product you use (for example, mobile vs desktop) and how you configure it.INFORMATION WE MAY PROCESS
2.1 Information on your device (local)
VARYNX may process information locally to provide security and device intelligence features, which can include, depending on the product and your settings:
• Device and network signals (for example, Wi-Fi, Bluetooth, or related metadata as implemented in your version of the app). • App or system state indicators relevant to security posture (for example, permission-related signals, device configuration flags, or similar — as implemented in your version). • Content you explicitly submit for analysis (for example, QR codes or similar inputs you choose to scan). • Diagnostic or audit information stored locally when the product provides logging or history features.2.2 Information you give us directly
If you contact support or sign up for communications, we may process:
• Your contact details and message content you send us.2.3 We do not intentionally collect
Unless a specific VARYNX product clearly states otherwise in its in-app disclosure and you opt in:
• We do not intentionally operate VARYNX as a cloud service that uploads your full security scan payloads for routine processing. • We do not intentionally build cross-device advertising profiles from your VARYNX usage.If a future feature involves transmission of data off the device, it should be described separately at the time of release, with consent where required.HOW WE USE INFORMATION
We use information:
• To provide, maintain, and improve VARYNX features you use. • To respond to support requests. • To comply with law, enforce our terms, or protect rights and safety.Processing that stays on your device is used to operate those local features (for example, alerts, logs, or scoring shown to you in the product).STORAGE AND RETENTION
• Data stored only on your device remains under your control and is subject to your device settings, backups, and uninstall behavior. • If you use export or backup features, you choose where copies go. • If you email us for support, we retain messages only as long as needed to handle your request and for ordinary business records unless law requires longer retention.
SHARING OF INFORMATION
We do not sell your personal information.
We may share information only in limited cases, such as:• With service providers who assist us (for example, email hosting) under confidentiality and processing terms. • If required by law, legal process, or to protect the rights, property, or safety of us, our users, or others. • In connection with a merger, acquisition, or asset sale, subject to applicable law and notice where required.App stores (for example, Google Play) and operating system vendors may collect their own telemetry or crash data according to their policies, outside our direct control.