Architecture, under DPO scrutiny.
A Hongi deployment is auditable by your DPO in a single afternoon. Below is everything held on a server when an organization deploys Hongi for its staff and customers.
- Per-device push tokens. Opaque identifiers issued by APNs and FCM. No mapping to a human name. Used only for the silent-ping notification path. Routine codeword verification is fully offline.
- Optional pairing-hash audit log. For B2B deployments that need traceability under DORA Art. 17 or NBB guidance, Hongi can append a Merkle-tree log of pairing hashes. No identities, no codewords, verifiable by Merkle proof. No public chain.
- Tip-jar payment metadata. Consumer product only, not B2B. Routed through Stripe. Hongi sees that a tip was paid and the amount. Nothing ties it back to a user.
What we do not store: names, phone numbers, emails, contact lists, codeword history, call logs, location, transcripts, biometrics, advertising identifiers. The verification key between two paired devices lives only on those two devices, derived locally.