logo robustly
PRIVACY ARCHITECTURE

Data Governance

Detailed report on the acquisition, encryption, and lifecycle of user vitality telemetry within the Robustly infrastructure.

SCROLL_TO_DECRYPT
01

Data Ingestion Logic

Robustly operates on a principle of minimal data acquisition. We only ingest biological telemetry that is strictly necessary for the performance of the Vitality Dashboard and the Architect AI feedback loop.

CHILD PRIVACY PROTOCOL: In strict compliance with global digital safety standards, we do not knowingly process data from individuals under 13 without verifiable guardian oversight. Parents reserve the absolute right to audit, freeze, or purge any minor's data node by contacting the support terminal.

Your identity is bound to a unique Robustly ID, which acts as the primary key for all telemetry logs. This data is never sold, traded, or leased to external marketing brokers.

02

The SQLite3 Core

User telemetry is localized within our managed SQLite3 infrastructure. To maintain system speed and data integrity, the following persistent storage settings are applied to every database transaction:

PRAGMA WAL_MODE

We utilize Write-Ahead Logging to prevent data corruption during simultaneous write operations, ensuring your mission progress is captured instantly.

ENCRYPTION AT REST

Sensitive identifiers, such as password hashes, are processed using modern cryptographic salting and hashing (Werkzeug/BCrypt) before entering the disk layer.

03

Architect AI Processing

The Architect AI utilizes adaptive Groq inference to analyze your statistics. When generating insights, the system transmits a stateless payload consisting of raw vitality integers (steps, water, sleep) without transmitting your specific user identity or email to the inference engine.

04

User Sovereignty & Purging

You maintain absolute ownership of your digital footprint. Robustly provides a "Nuclear Purge" command within the user settings, allowing for the complete deletion of your data node.

DESTRUCTION NOTICE: Executing a Purge Command triggers an immediate `DELETE` operation across all relational tables. This includes your badges, level history, and streak data. Once confirmed, this data is scrubbed from the active database and is unrecoverable.
05

Security Headers & Isolation

Your session is protected by a multi-layered security stack. We deploy strict Content Security Policies (CSP) and X-Frame-Options to prevent unauthorized script injection and cross-site data leakage.

All traffic is routed through encrypted tunnels (SSL/TLS) to prevent interception of your vitality telemetry during transit from your device to the Robustly core.

06

Third-Party Auth (Google)

When utilizing Google OAuth, Robustly only requests access to your basic profile information (Email/Name). We do not request or store access to your Google Drive, Contacts, or other sensitive ecosystem data.

07

Policy Evolution

The Privacy Architecture is subject to updates as the system evolves. Users will be notified of significant changes via the global Architect Broadcast banner. Continued usage of the terminal following an update constitutes acceptance of the new data protocols.