SusScam Logo

Data Retention Policy

Last Configured: Zero-Knowledge Grid

1. Graphical Anonymization

Civilian threat reports containing graphical payloads (screenshots of SMS or Web portals) are held in secure, non-indexed blob storage. Upon deterministic AI classification (e.g., extracting the malicious URL), the graphical payload is cryptographically disassociated from the reporting identity.

2. The 45-Day Overwrite Protocol

To maintain GDPR and strict zero-knowledge sovereignty, all uploaded screenshots, irrespective of their threat severity, are subjected to a rigorous cron-triggered overwrite sequence exactly 45 days post-ingestion. Only the rigid string indicators (URLs, phone numbers, crypto hashes) are retained in the master Threat Intelligence matrix.