Independently encrypted data
After the password is set to be super-independent password, it can only be modified by verifying the original password. The password will not be retrieved once it is forgotten.
The right 'What exists is what you can see'.
We respect the right of users to manage all their information. We pursue that users have the right to "exist and see" their data. Therefore, we strive to organize the user's data here as much as possible, so that users can manage their own knowledge system and other information systems, help improve their knowledge and information management capabilities, and control their own information.The information stored in the server by the user, such as private record information, background picture information, etc. if the user deletes the information on the interface, the corresponding physical deletion rather than logical deletion will also be performed on the server side. Once the user deletes his own private information, the server side will completely delete it to ensure that the user's private information is fully controlled in his own hands.
Minimum privilege acquisition principle
We strictly abide by the principle of minimum access. We are opposed to obtaining users' privacy, and we are also opposed to using any privacy of users. We eradicate the risk that users' personal records may be trampled by means of independent encryption. We insist that users' privacy is sacred and not allowed to be touched.