Last Updated: February 23, 2026
Our Privacy Architecture: The Zero-Knowledge Standard
The revolution against Surveillance Capitalism begins with a simple premise: We don’t want your data. If you are here, we already know the most important thing—you are serious about digital sovereignty and possess the discernment to look beyond the convenience of mainstream “15-second” solutions.
We treat our online presence as a store with post-sale convenience services, not a data-harvesting tool. We have built our website and our products to ensure that we are technically incapable of compromising your privacy.
1. The Website: Zero-Footprint Browsing
- No Behavioral Tracking: We do not use third-party tracking cookies, “pixels,” or intrusive analytics. We do not profile your behavior or “retarget” you with advertisements.
- No Central Accounts: Your identity belongs to you. We do not require or maintain user accounts, passwords, or personal profiles on our servers.
- Zero-Footprint Storefront: To maintain our “No-Tracking” guarantee, we do not load third-party payment scripts (like PayPal) while you browse our products.
- Isolated Checkout: Tracking only begins if you voluntarily initiate a purchase. At that point, we provide a secure bridge to our payment processors, which use their own functional cookies to prevent fraud and process your transaction.
2. The Gateway: Voluntary Post-Sale Utility
Our DNS-like redirection and relay services are provided as a gift of convenience, not as a requirement for operation.
- Direct IP Access: You are never forced to use our infrastructure. Your SPC always displays its current public IP address in the Server > Details panel, allowing you to connect directly and bypass Go2Get entirely.
- Stateless Redirection: If you use our redirection service, our server acts only as a public signpost. We do not log the history of IP updates or connection attempts.
- The “Mailbox” Relay: To allow secure communication between “invisible” servers (those behind strict firewalls), our gateway acts as a 24/7 transfer point for End-to-End Encrypted packages. Because encryption happens on your hardware, we have no keys and no ability to inspect the contents.
3. The SPC: Physical Possession & Total Control
Your SPC is a hardware “Black Box” in your physical possession. Once it leaves our hands, you are the sole administrator.
- Hardened OS: Remote SSH is disabled by default. The system does not accept connections from the public internet or your Local Area Network (LAN), neutralizing the risk of brute-force attacks.
- Invisibility by Design: The IPv6 stack is deactivated to prevent “shadow” discovery by ISPs. Even with Remote Access enabled (Port 443), your SPC remains invisible until you explicitly configure your router.
- User-Generated Encryption Keys: Your unique Public/Private key pairs are generated locally on your hardware only after it is in your possession. We never see them.
- Credential Sovereignty (The “Bridge Burning” Protocol): You have the power to rotate your server’s internal identity at any time via Configure > Server > Regenerate System Credentials:
- Identity Refresh: Generate new keys to refresh your digital identity. Your SPC automatically updates your existing Contacts, maintaining your secure links.
- Internal Credential Reset: You may rotate the internal system and database passwords. These are randomized credentials—never known to the user or Go2Get—that govern the “Black Box” internals. Regenerating these ensures that even the factory-set initializations are permanently invalidated, guaranteeing a Zero-Backdoor state.
4. Isolated Sovereignty (The Peer-to-Peer Model)
- No “External Guest” Accounts: The SPC is designed as a multi-user system for your family, household, or small business team. However, for those outside your trusted circle, we have replaced the vulnerable “Guest Account” model with a secure Peer-to-Peer architecture.
- Secure Contact Links: Instead of exposing your local server environment to external parties by creating guest accounts, you establish secure “Contact” links between separate SPCs. This ensures you never open your local system to outsiders; you only share what you explicitly send.
- Initiator Ownership: You retain ultimate control over your digital footprint. As the initiator of a message or file transfer, you have the right to edit or delete your content at any time. These changes are technically enforced across the peer link on the recipient’s SPC, ensuring your Right to be Forgotten is a technical reality.