Your data, your rules. We believe in full transparency — including about what we have not shipped yet.
Last updated: May 10, 2026 · v1.6
RAVEN is built on a simple principle: your data belongs to you. We collect the minimum information necessary to operate the service, and we will never sell, share, or monetize your personal data. No hidden terms. No data harvesting. No third-party access beyond what's listed below.
A privacy policy that overstates is worse than none, so:
mlock'd (so the OS can't write them to swap) and triple-zeroised on deinit (0x00 / 0xFF / 0x00) to defeat compiler-eliding writes.If we miss a date, we will say so on this page. Trust earned by inspection is the only kind worth having.
SealedSenderEnvelope.runDebugSelfTest().info strings) — never split from a single block.SecretKey primitive: page-locked with mlock so the OS can't write
them to swap, and triple-zeroised on deinit (0x00 / 0xFF / 0x00 — the
alternation pattern defeats compilers that elide the second pure-zero pass as redundant). The
gateway service additionally zero-fills its priority queue's backing buffers when Helper Mode
deactivates, so a later RAM dump can't recover envelopes that were merely held.verify-binary.sh and check the hashes match. Stage 2 — bit-for-bit
reproducible IPAs — targets v1.7 (we need to pin Xcode + strip codesign timestamp +
canonicalise embedded build paths). Until stage 2 you can verify "the source is what we say
it is", not yet "the App Store binary was compiled from that exact source".Questions about your privacy? Email us at privacy@raven-messager.com