Data Protocol

Privacy Policy.

How SilentSurprise protects your identity, your data, and the integrity of the transfer protocol.

The Core Principle

Unlike traditional logistics providers, our primary product is not just delivery—it is privacy.

We collect strictly the minimum amount of data required to execute the physical transfer of goods ("The Protocol"). Your data is a liability we minimize, not an asset we exploit.

Data We Process

To facilitate a transfer, we handle three specific data clusters:

Sender Identity

Encrypted. Never revealed to Recipient without explicit consent.

Recipient Coordinates

Phone & Name for contact. Address is strictly for logistics execution.

Data Retention & The Purge

Upon the successful completion of a Protocol (Delivery Confirmed), a "Purge" is scheduled. All temporary logistical data (precise geolocation, delivery notes, access codes) is deleted from our active hot-storage.

Cold Storage ExceptionWe retain basic transaction records (Amount, Date, Protocol ID) purely for financial compliance and legal requirements, stored on an air-gapped encrypted server.

Encryption Standards (E2E)

All sensitive fields (Names, Addresses, Notes) and digital signals are End-to-End Encrypted (E2EE). We use AES-256 GCM standards to ensure that even during a database breach, your raw data remains unreadable.

Digital signaling links are generated with one-time use tokens and are cryptographically purged after verification or expiration.

International Transfers & Partners

Your data may transit through secure servers in different jurisdictions to facilitate the Protocol. We ensure all partners (including Razorpay and Borzo) adhere to our strict non-disclosure requirements regarding identification details.

Your Rights

You have the right to request a complete "Data Wipe" of your account. Contact our concierge to initiate this process.

Protocol Version

1.0.4