Data Retention Policy
Last Configured: Zero-Knowledge Grid
1. Graphical Anonymization
Civilian threat reports containing graphical payloads (screenshots of SMS or Web portals) are held in secure, non-indexed blob storage. Upon deterministic AI classification (e.g., extracting the malicious URL), the graphical payload is cryptographically disassociated from the reporting identity.
2. The 45-Day Overwrite Protocol
To maintain GDPR and strict zero-knowledge sovereignty, all uploaded screenshots, irrespective of their threat severity, are subjected to a rigorous cron-triggered overwrite sequence exactly 45 days post-ingestion. Only the rigid string indicators (URLs, phone numbers, crypto hashes) are retained in the master Threat Intelligence matrix.
