Skip to main content

Protocol Logging Practices

Pocket Network is a data agnostic permissionless network, which means that anyone can use the protocol without a middleman. Because of the core architecture of a permissionless network, the majority of ways in which your data is collected and reused simply do not exist. There is no place to put in an email address or to drop tracking cookies. While use of this website logs the typical analytics data that one would expect, the protocol has no such layer. As such, Pocket is a privacy friendly protocol.

The protocol does not collect:

  • User IP address
  • User request origin
  • User request data
  • ANY Personally identifiable information (PII)

The protocol incidentally collects (as a function of delivering the service):

  • Originating region of request
  • Requesting application public key
  • Servicing node public key
  • Data source requested
  • HTTP response status code
  • API method called by the request

It is important to note that if you are using a commercial gateway to access the protocol, that gateway will have it’s own data logging and privacy practices, and you should familiarize yourself with their disclosures. It is also important to note that unencrypted data may be viewed in transit by nodes serving relays along the route. Sensitive data should always be encrypted E2E at the device level.

Questions about our architecture and logging practices may be addressed to directors@pokt.foundation