Information We Collect
As a non-profit security project run by volunteers who have better things to do than spy on you, we collect the minimum information necessary to operate:
- User-Submitted Threat Data: When you report a malicious URL via our Telegram bot or other channels, we collect the URL itself and any related information you provide. We don't require you to submit personal information to make a report. Because unlike scammers, we don't need your social security number to help you.
- Automatically Collected Data: Like most websites (but definitely not like scam sites), our server logs standard technical information, such as your IP address and browser type. This data is used for analytics and to maintain the security of our service.
How We Use Information
The information we collect is used exclusively for security purposes (shocking, we know):
- To analyze and verify potential online threats before we absolutely destroy them.
- To report verified malicious domains and infrastructure to third-party service providers (hosting companies, domain registrars) and security partners (e.g., anti-virus vendors, blocklist operators).
- To publish anonymized threat intelligence to our public feeds (e.g., our Telegram channel) to inform the community about the latest scammer failures.
We do not sell, rent, or trade any collected information. We do not use it for marketing or advertising purposes. We're not in the business of being annoying—that's what scammers are for.
Information Sharing and Disclosure
We only share information under the following circumstances (unlike scammers who share everything with everyone):
- With Service Providers & Security Partners: We share threat data with relevant authorities and partners to facilitate the takedown of malicious sites. Think of it as a group chat, but for destroying scammer infrastructure.
- For Legal Reasons: We may disclose information if required to do so by law or in the good faith belief that such action is necessary to comply with a legal obligation. Because we actually follow laws, unlike the scammers we hunt.
Data Security
We take reasonable technical measures to protect the integrity of the data we handle. However, no method of transmission over the Internet or electronic storage is 100% secure. Unlike scam sites that store your credit card info in plain text files named "definitely_not_stolen_data.txt".
Data Retention
We retain threat data for as long as necessary to fulfill our security mission. Personal information (if any) is deleted when no longer needed. We don't hoard your data like scammers hoard victims' money.
Your Rights
You have the right to:
- Know what information we collect (spoiler: barely anything)
- Request deletion of your personal data (if we even have any)
- Contact us with questions or concerns
- Sleep soundly knowing we're not trying to steal your identity
Contact Us
If you have any questions about this Privacy Policy, please contact us at contact@phishdestroy.io.
We promise to respond faster than scammers respond to takedown notices (which is never).