Our service’s primary objective is to help users unblock geo-restricted content, giving you the freedom to access the information you seek. For a complete understanding of our service and your obligations when using it, please refer to our Terms of Service. We offer our services worldwide, but please note that certain countries with rigorous censorship may not have access to our service.
2. Data Collection:
In our mission to provide a secure and improved service, we engage in selective data collection:
- IP Addresses: To bolster our defenses against potential cyberattacks and to maintain the security and integrity of our service, we collect IP addresses of users.
- Email Addresses: While the majority of our service can be availed without personal identifiers, specific features or segments may necessitate the provision of your email address.
- Browsing Logs: To constantly refine our service and ensure its seamless functioning, we might record the websites users access through our platform. This data assists us in understanding usage patterns and making necessary adjustments.
3. Data Usage:
Our collected data serves multiple functions, all aligned towards enhancing user experience, service quality, and security:
- Protection: One primary use of the data, especially IP addresses, is to guard our services and users against potential threats, such as cyberattacks.
- Service Enhancement: By analyzing usage patterns and feedback through tools like Google Analytics, we aim to continually refine our service, ensuring it meets your needs and expectations.
- Personalization: By understanding your preferences, we can tailor the service to offer a more personalized and convenient user experience.
- Sharing with Third-parties: Our commitment to ensuring a seamless experience might necessitate sharing data with trusted third-party providers like Google, Microsoft, Meta, Bravo, and Cloudflare. This collaboration primarily revolves around bolstering security protocols and sometimes for promotional endeavors. However, it’s essential to understand that these entities have their own privacy policies and data handling practices.
4. User Consent:
Your consent is paramount in our data collection and usage process:
- Implicit Consent: By installing our application from the Microsoft Store or integrating our extension within the Microsoft Edge browser, you are granting us permission to collect and process the specified data. This consent forms the bedrock of our data collection policy, ensuring transparency and trust.
- Explicit Information: While our primary channels of data collection are through app installation and extension usage, any additional data collection, if required, will always be proceeded by explicit information and an opportunity for you to provide or withhold consent.
5. Data Storage and Security:
Storage: Your data’s security is a cornerstone of our service. We employ robust storage mechanisms to ensure that your information remains protected:
- Storage Solutions: We trust services like Cloudways, which has its servers located in the US, and Cloudflare to host and safeguard the data we collect. These platforms are equipped with industry-standard protection mechanisms to prevent unauthorized access.
- Proactive Measures: To ensure that your data remains confidential and uncompromised, we have invested in cutting-edge security protocols and infrastructure. Our commitment to this has led to a track record free of any known data breaches.
- Third-party Vendors: Our collaboration with third-party vendors, particularly for data storage, is contingent upon their adherence to stringent security practices, ensuring your data’s continued safety.
6. Cookies and Trackers:
Usage: Cookies play a pivotal role in enhancing your user experience and our service’s efficiency:
- Google Analytics Cookies: We utilize cookies from Google Analytics to glean insights into user behavior, site traffic, and other essential metrics. This data assists us in refining our offerings and ensuring that they remain aligned with your preferences and requirements.
Control: Understanding that not everyone is comfortable with cookie usage, we’ve put mechanisms in place for you to have control:
7. Third-party Integrations:
Collaborations: Our service’s expansive capabilities and smooth user experience are in part due to our collaborations with reliable third-party providers:
- Analytical Tools: We incorporate Google Analytics to gather and analyze user behavior and traffic patterns, enabling us to constantly evolve and enhance our offerings.
- Communication Tools: Bravo is our chosen platform for disseminating newsletters and email promotions. They are trusted with handling some of the data necessary for these communications.
- Proxy Functionality: To ensure uninterrupted and high-quality proxy services, we might resort to third-party scripts like PHP proxy, Glype, CGI Proxy, and others. These scripts enhance the functionality of our service, providing optimal proxy capabilities.
- Affiliate Partnerships: Within our platform, users may come across affiliate links or offers from our trusted partners such as PureVPN, NordVPN, and Surfshark. If you engage with these links and make a purchase, we might receive compensation. It’s imperative to note that these partners have their own privacy policies, which users are encouraged to review for comprehensive data practices understanding.
9. Logging Practices:
Transparency in Data Retention: Our service’s primary goal is to unblock geo-restricted content, and we want our users to be aware of how we handle logs:
- Purpose: Our service’s fundamental purpose is not to enhance user privacy but to unblock content. Thus, our logging practices are tailored towards this objective.
- Retention: We maintain logs to ensure optimal functionality and service quality. These logs are essential for refining our service, identifying potential issues, and ensuring user satisfaction.
- Caution: Users should be aware that our service is not intended as a privacy tool. While we take every measure to ensure security, users seeking heightened privacy should consider additional privacy-focused tools or services.
10. Understanding Web Proxies and Phishing Concerns:
How Our Web Proxy Works: Our web proxy service acts as an intermediary between your device and the websites you visit. When you connect to a website through our proxy, your request is first routed through our server before reaching the destination. This allows us to bypass geo-restrictions and provide you with access to content that might be unavailable in your location.
Possible Misconceptions as Phishing: It’s important to understand that while web proxies offer anonymity and content access, they do not offer complete privacy. Your internet service provider (ISP) can still see that you’re using a proxy, and the website you visit might be able to gather some information about your device. Additionally, due to their ability to mask your location and potentially bypass security measures, some may mistakenly associate them with phishing activities.
Here’s how we approach privacy and security::
- Limited Data Collection: We only collect the data necessary to operate the service and improve your experience. We do not collect or store sensitive information like login credentials or financial details.
- Trusted third-party providers: We work with trusted companies who prioritize user data security
It’s crucial to recognize that no online tool can guarantee complete anonymity or protection from malicious attacks. We encourage you to stay informed about online safety practices and use our service responsibly. We strongly encourage you to use our proxy service only for accessing websites that do not require any sensitive information (such as login credentials or personal details). If you have any questions or concerns, please don’t hesitate to contact us.