1. Introduction
LLVM Obfuscator ("we," "our," or "us") is committed to protecting your privacy. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our code obfuscation service.
2. Information We Collect
2.1 Information You Provide
- Source Code: C/C++ source files you upload for obfuscation
- Configuration Settings: Obfuscation presets and custom settings you select
- Contact Information: If you contact us, we may collect your name, email address, and message content
2.2 Automatically Collected Information
- Usage Data: Information about how you interact with the Service
- Technical Data: IP address, browser type, device information, and operating system
- Log Data: Server logs including timestamps, requests, and error messages
3. How We Use Your Information
We use the collected information for the following purposes:
- To provide, maintain, and improve the obfuscation service
- To process your code obfuscation requests
- To generate obfuscated output and reports
- To respond to your inquiries and provide customer support
- To monitor and analyze usage patterns and trends
- To detect, prevent, and address technical issues or security threats
- To comply with legal obligations
4. Data Storage and Retention
Code Storage: Your uploaded source code and obfuscated output are stored temporarily to process your request. Files are typically retained for a limited period (up to 24 hours) and then automatically deleted.
Metadata: Non-sensitive metadata (such as job IDs, timestamps, and configuration settings) may be retained longer for service improvement and analytics purposes.
Deletion: You can request deletion of your data at any time by contacting us.
5. Data Sharing and Disclosure
We do not sell, trade, or rent your personal information or source code to third parties. We may share information only in the following circumstances:
- Service Providers: With trusted third-party service providers who assist in operating our Service (e.g., cloud hosting providers), subject to confidentiality agreements
- Legal Requirements: When required by law, court order, or governmental authority
- Protection of Rights: To protect our rights, privacy, safety, or property, or that of our users
- Business Transfers: In connection with a merger, acquisition, or sale of assets, with notice to users
- With Your Consent: When you explicitly consent to sharing
6. Security Measures
We implement appropriate technical and organizational security measures to protect your information:
- Encryption of data in transit using TLS/SSL
- Secure storage systems with access controls
- Regular security assessments and updates
- Limited access to data on a need-to-know basis
- Automatic deletion of temporary files
However, no method of transmission over the Internet or electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your information, we cannot guarantee absolute security.
7. Your Rights and Choices
Depending on your location, you may have the following rights regarding your personal information:
- Access: Request access to your personal information
- Correction: Request correction of inaccurate information
- Deletion: Request deletion of your personal information
- Portability: Request transfer of your data
- Objection: Object to processing of your information
- Restriction: Request restriction of processing
To exercise these rights, please contact us using the information provided in the Contact section.
8. Cookies and Tracking Technologies
We may use cookies and similar tracking technologies to track activity on our Service and store certain information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent.
9. Children's Privacy
Our Service is not intended for individuals under the age of 13. We do not knowingly collect personal information from children under 13. If you become aware that a child has provided us with personal information, please contact us, and we will take steps to delete such information.
10. International Data Transfers
Your information may be transferred to and maintained on computers located outside of your state, province, country, or other governmental jurisdiction where data protection laws may differ. By using the Service, you consent to the transfer of your information to these facilities.
11. Changes to This Privacy Policy
We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the "Last updated" date. You are advised to review this Privacy Policy periodically for any changes.
12. Contact Us
If you have any questions about this Privacy Policy, please contact us at our contact page.