Seeld works without harvesting your data

No data mining, no leaks

We’ve decided to completely keep our hands, and everyone else’s, off your data. As a consequence Seeld greatly minimizes the risks of leaking any sensitive information about you or the people you exchange messages with!

Photo by Designecologist from Pexels


We at Seeld have decided to turn down data mining. This of course brings many benefits to our adopters. But it also comes with some nice consequences: no data mining, no leaks!

No data mining means increased security

As you know, data mining consists of examining a subscriber’s data to extract useful information from it. With that information, a provider can then build user profiles to ultimately better target its advertising. In many cases, that data is also sold to third-parties for ads targeting. 

But there are multiple risks in gathering any amount of information about people. For instance, if the system provider can access your data, you can bet it will also be accessed by someone with bad intentions at some point. Unsurprisingly, reports of data breaches, even from renowned companies, abound in the media and on the web. 

However a simple solution to that problem exists. As a matter of fact, it’s Seeld’s raison d’être

No data mining, no leaks

By choosing not to mine anyone’s data we can encrypt everything before it comes to our servers. We don’t mind, since we refuse to build Seeld on top of a business model that requires us to examine your data. 

So what happens now if someone breaches our servers and the content of our database leaks? The answer: not much. Indeed, the looters would need to have the passphrase that unlocks your private key. But they won’t have it because Seeld never sends your passphrase over the web, courtesy of the SRP protocol. 

Correlation by e-mail or mobile number

In addition Seeld does not ask for anything at registration that would indirectly identify you. In fact you only need a pseudonym and optionally a display name.

Indeed, even if a system is end-to-end encrypted, storing your mobile number or e-mail allows providers to profile you by correlation. For instance, you may have used your e-mail to register on other websites. And maybe those sites also store your name and address. Therefore linking those sets of data indirectly reveals who you are. 

Given all these points it appears protecting your privacy efficiently becomes possible, if one relinquishes data mining!






Photo by Golnar sabzpoush rashidi from Pexels