Privacy Policy

Respect and protect your privacy

Generation and preservation of ID

Chat data is stored on your device

Secure Data Transmission

Required access and use of mobile phones

Respect and protect your privacy

We fully respect all your privacy. We promise not to collect or disseminate any personal information about you. At the same time, Tok will use effective technical means to ensure that your privacy is not infringed by third parties.

Generation and preservation of ID

The ID can be generated by filling in the local name of the ID file and encrypting the password of the local data. No information including mobile phone number, address book, e-mail, device serial number and IP is needed.
The ID profile contains information such as ID, secret key, nickname, introduction, contact, etc. Your ID profile is only stored locally on your device. We will not use centralized server to store your ID profile. If the file is lost, we can't help you find it, so please backup your ID file in time to avoid the trouble caused by the loss. You can also destroy ID files that are no longer in use at any time.

Chat data is stored on your device

All your chat content is encrypted with strong encryption, and only stored on your mobile device. No central server keeps your chat data, no software backdoor, and your chat is entirely your own - Even Tok cannot access.

Secure Data Transmission

Tok uses end-to-end encryption and point-to-point communication technology. In the process of sending information between the two sides of the session, all data is encrypted locally and sent directly from the sender to the receiver. Finally, the data is decrypted on the receiver's device. This process does not go through any central server, which ensures the security of data in the transmission process. When Tok is unable to establish point-to-point direct connections (e.g. restricted NAT networks, HTTP or SOCKS5 proxy, unilateral online, etc.), Tok needs to rely on relay network or message bot to forward information. It is important to emphasize that neither relay network nor message bot can decrypt messages and video/voice calls.

Required access and use of mobile phones

Please understand that Tok needs to acquire the necessary permissions to achieve the corresponding functions, Tok will not acquire any unnecessary permissions.