At Kinlyr, we view personal data not as an asset, but as a liability. Our platform is engineered from the ground up to minimize data collection and maximize user sovereignty through decentralized patterns and ephemeral storage protocols.
Data Sovereignty Commitment
We operate on a Zero-Knowledge principle. We do not monetize your location history, we do not sell your personal identifiers, and we do not retain information longer than is operationally necessary for the Guardian Engine⢠to function.
1. Data Collection Categories
To provide mission-critical protection, Kinlyr collects specific telemetry only during active safety sessions:
- Precise Location: Real-time GPS coordinates used for geofencing and route monitoring.
- Biometric Telemetry: Inactivity and fall detection processed locally via your device's IMU.
- Infrastructure Metadata: Technical logs used to ensure server-side heartbeat connectivity.
2. Automatic Data Purging
Our infrastructure utilizes automated "Scrub Protocols" to ensure your privacy:
- Session Logs: All location breadcrumbs are permanently purged from hot-storage within 24 hours of a session's safe resolution.
- Vault Access: Content within the Evidence Vault is locked with a WORM (Write-Once-Read-Many) status for 30-90 days as per your chosen tier, after which it is non-recoverable.
3. Technical Security Protocols
Security is not a feature; it is our foundation:
- FIPS-Compliant Encryption: All data at rest is secured using AES-256-GCM.
- Secure Transit: End-to-end encryption via TLS 1.3 ensures no man-in-the-middle interception.
Security & Vulnerabilities
Are you a security researcher or an enterprise partner? If you have questions about our FIPS-readiness or wish to report a concern, contact our dedicated desk.
security@kinlyr.com