Privacy Policy

Zero-knowledge privacy built into every layer

Last updated: October 2025

Introduction

At Scienti.st, we believe your data belongs to you. This Privacy Policy explains how we've built our service with a radical approach to privacy: your personal data is protected with zero-knowledge end-to-end encryption. We cannot access your content, meetings, notes, or any sensitive information—only you hold the encryption keys. Our commitment to privacy isn't just a policy; it is the foundation of our architecture.

Our Core Privacy Principles

  • Minimal Data Collection: Only essential authentication data—no tracking, no profiling
  • Zero-Knowledge Architecture: We cannot access your encrypted content, by design
  • End-to-End Encryption: Your data is encrypted on your device before it leaves
  • You Control Your Keys: Only you have the encryption keys to your data
  • No Data Mining: We never analyze, sell, or share your encrypted content

What We Collect vs. What We Can't Access

Zero-Knowledge Privacy: Your personal data is encrypted on your device before it ever reaches our servers. We store only encrypted data that we cannot decrypt or read. Your meetings, notes, tasks, and insights remain completely private—only you hold the encryption keys.

Minimal Account Data (Encrypted)

We collect only what's necessary for authentication and sync:

  • Email address (for login and account recovery only)
  • Securely hashed password (never stored in plaintext)
  • Account identifier (for syncing across your devices)

What We CAN'T Access (Zero-Knowledge)

  • Your meeting transcriptions and notes
  • Your tasks, goals, and projects
  • Your personal insights and analytics
  • Your documents and attachments
  • Your encryption keys—they never leave your devices

Your Data Storage

End-to-End Encrypted Storage

All your data is end-to-end encrypted and includes:

  • Meeting transcriptions and notes
  • Tasks and goals
  • Personal insights and analytics
  • Calendar events and reminders
  • Documents and attachments

Important: Your data is end-to-end encrypted on your device before syncing. We have zero access to this information.

How We Protect Your Privacy

Zero-Knowledge Architecture: We can't read, analyze, or access your encrypted content—meetings, notes, tasks, and projects. Only you hold the encryption keys. What we can't decrypt, we can't misuse.

What We Can't Do (By Design)

  • ❌ Read your meeting transcriptions or notes
  • ❌ Access your tasks, projects, or personal insights
  • ❌ Analyze your encrypted content for any purpose
  • ❌ Sell or share your personal data
  • ❌ Use your content for AI training or profiling

What We Do Collect

  • ✅ Email address for account authentication and critical security updates only
  • ✅ Anonymous crash reports to fix bugs (no personal data included)

However, You Can...

  • ✅ Export and download a full copy of your data
  • ✅ Access all your meeting transcriptions and notes
  • ✅ Sync seamlessly across all your devices

Data Storage and Security

Your Data Security

All your data is protected with:

  • End-to-end encryption using your device's keys
  • Industry-leading security infrastructure
  • Automatic encrypted backups and synchronization across your devices
  • Complete data portability - you can export everything at any time

Minimal Attack Surface: Our servers only store encrypted data we cannot decrypt. Your content data is protected by zero-knowledge encryption—even if our servers were compromised, your data remains secure.

Data Sharing and Third Parties

We never share or sell your data. Your encrypted content stays encrypted on our servers, and we don't share any user data with third parties, service providers, or anyone else.

No Third-Party Access

We do not share, sell, or provide access to your data—encrypted or otherwise—with any third parties. No analytics companies, no advertisers, no data brokers. Your data stays with you.

Legal Requirements

If legally required to provide user information, we can only provide basic account data (email, account creation date). Your encrypted content—meetings, notes, tasks, and projects—is protected by zero-knowledge architecture. We have no keys to decrypt it, so we cannot provide it to anyone, including law enforcement.

Your Rights and Choices

You have complete control over your data:

Access Your Data

You always have direct access to export all your data at any time

Delete Your Data

Delete your account and all synced data - we only store encrypted data we can't read

Control Your Communications

We only email you for essential account and security updates—no marketing, no spam

GDPR and CCPA Compliance

We comply with global privacy regulations including:

For European Users (GDPR)

  • Legal basis: Contract performance and legitimate interests
  • Right to access, rectification, and erasure
  • Right to data portability
  • Right to object to processing
  • Right to lodge a complaint with supervisory authorities

For California Users (CCPA)

  • Right to know what information we collect
  • Right to delete your information
  • Right to opt-out of sales (we never sell your data)
  • Right to non-discrimination

Children's Privacy

Scienti.st is not intended for children under 13 years of age. We do not knowingly collect personal information from children under 13. If you believe we have inadvertently collected information from a child under 13, please contact us immediately.

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. When we make significant changes, we will notify you via email and/or through the app. Your continued use of Scienti.st after changes indicates your acceptance of the updated policy.

Contact Us

If you have questions about this Privacy Policy or our privacy practices, please contact us at email: privacy@scienti.st.

Our Zero-Knowledge Privacy Promise

We've built privacy into our architecture: we can't read your content, and we never will. Your meetings, notes, tasks, and insights are encrypted on your device before they ever reach our servers. Only you hold the keys. Your privacy is guaranteed by encryption, not just policy.

Privacy-First Productivity