Skip to main content

User data protection

U
Written by UKey Wallet

UKey has always adhered to the principle of minimizing data collection. Through dual guarantees of the physical architecture and system logic, it strictly protects users' personal privacy and asset security.

1. Decentralized management of hardware devices

Non-tracking mechanism: The UKey does not actively track the hardware devices being sold. The devices and their components are not bound with personal identification information during the production and circulation processes, ensuring complete interchangeability among all devices.

Packaging Identification: The barcode on the back of the equipment package is solely used for production batch management and logistics identification, and does not store any user private data.

2. Data Interaction Logic of UKey Wallet

The UKey software client follows the principles of "localization" and "real-time processing" in data handling:

Data storage limitations: The UKey will not permanently record or back up any sensitive data of the user. The vast majority of running data is only encrypted and stored on the user's local device.

Real-time transmission mechanism: Necessary information such as wallet address and extended public key (XPUB) is only called upon during the operation of the device, for interacting with the backend on the blockchain, and no persistent storage is made after the interaction is completed.

Anonymized development data: If users voluntarily choose to participate in data collection, the relevant information will undergo complete anonymization and will only be used for product performance optimization and development purposes.

3. Order Information Cleanup Mechanism

To further mitigate potential risks of privacy leakage, UKey implements a regular data destruction policy:

Regular deletion: The official store will regularly remove sensitive personal information from completed orders, including but not limited to the recipient's name, delivery address, and contact number.

Privacy compliance: All data processing procedures strictly adhere to relevant privacy protection laws and regulations, ensuring that user information is properly handled after the service process concludes.

4. Security Overview

By integrating hardware for association, local storage of software, and regular data cleaning at the backend, UKey has established a comprehensive privacy protection system, aiming to provide users with a secure environment where they don't have to worry about the leakage of personal information.

Did this answer your question?