The goal of our wiki project is to share information in a more accessible way so that everyone can learn new skills and feel empowered to protect themselves.With that, we bring you our first article: Dating site privacy.It can also include the various functions and features that you use, such as the connections you make, other friends or contacts you invite to the Services and profile searches you perform, or your use of our applications.c. When you upload photos, videos or other content to the Services, we may collect information about the content, such as the time, date and place the photo, video or content was taken or uploaded, and how you use them, who views them or with whom you share. When you access our Services using a mobile device, we may also receive or collect identification numbers associated with your device (such as a UDID, IDFA, Google Ad ID and Windows Advertising ID), mobile carrier, device type, model and manufacturer, mobile device operating system brand and model, phone number, and, if you have enabled features and functions of the Services that use your device’s location, your geographical location data (including GPS).We also collect information about your usage of, and activity on, our Services.The Sites, the applications, the downloadable products and all products, services and features provided by the Company in connection therewith shall be referred to collectively as, the "Services".
The Company may offer additional services or products or modify or revise any of the Services at our discretion, and this Agreement will apply to all additional services or products and all modified or revised Services unless otherwise indicated.
The Company also reserves the right to cease offering any of the Services.
You agree that the Company shall not be liable to you or any third party for any modification, revision, suspension or discontinuance of any of the Services.
We think this is very timely as the Ashley Madison hack continues to wreak havoc and with the amount of attention this scenario has received world-wide, we can assume that similar issues will arise.
Let us know if you have questions or article ideas. I2PCon is near (I’ve heard we might even be at max already ; D) and to get ourselves prepared for a great weekend, Toronto Crypto has gone ahead and implemented two solutions utilizing I2P technology.
Online privacy is a huge topic which can be overwhelming for newcomers, especially if they feel overwhelmed with the amount of privacy information out there.