Respect and protect your privacy
Generation and preservation of ID
Chat data is stored on your device
Secure Data Transmission
Required access and use of mobile phones
Respect and protect your privacyWe fully respect all your privacy. We promise not to collect or disseminate any personal information about you. At the same time, Tok will use effective technical means to ensure that your privacy is not infringed by third parties.
Generation and preservation of IDThe ID can be generated by filling in the local name of the ID file and encrypting the password of the local data. No information including mobile phone number, address book, e-mail, device serial number and IP is needed.
Chat data is stored on your deviceAll your chat content is encrypted with strong encryption, and only stored on your mobile device. No central server keeps your chat data, no software backdoor, and your chat is entirely your own - Even Tok cannot access.
Secure Data TransmissionTok uses end-to-end encryption and point-to-point communication technology. In the process of sending information between the two sides of the session, all data is encrypted locally and sent directly from the sender to the receiver. Finally, the data is decrypted on the receiver's device. This process does not go through any central server, which ensures the security of data in the transmission process. When Tok is unable to establish point-to-point direct connections (e.g. restricted NAT networks, HTTP or SOCKS5 proxy, unilateral online, etc.), Tok needs to rely on relay network or message bot to forward information. It is important to emphasize that neither relay network nor message bot can decrypt messages and video/voice calls.
Required access and use of mobile phonesPlease understand that Tok needs to acquire the necessary permissions to achieve the corresponding functions, Tok will not acquire any unnecessary permissions.