AnchorKey Privacy

Last updated: 2026-04-27

Summary

AnchorKey is a phone-as-trust-anchor credential broker. The phone is the only place secrets live; nothing leaves it without biometric consent. We don't operate a server, don't collect telemetry by default, and don't have access to your credentials.

What stays on your phone

What we do not collect

Where the relay fits in

AnchorKey ships a small Go binary, anchorkey-relay, that you deploy on infrastructure you own (Fly.io free tier, a $5 VPS, a Mac mini, a Raspberry Pi). The relay handles outbound API proxying, webhook ingress, schedulers, and integration runtime.

The relay holds only short-lived (under one hour) capability tokens minted by your phone. It does not hold long-lived secrets, master keys, or vault contents. Compromising the relay yields the current connection state; the vault is unaffected.

We do not host or operate relays for you. The relay is software you run, not a service we provide. We have no access to relay logs, relay SQLite databases, or anything the relay processes.

What goes through Apple

Data subject rights

If you operate AnchorKey purely with your own phone and your own relay, Indiagram LLC cannot honor a deletion request because we don't have your data. You delete the app, the vault is gone with the device keychain. You decommission the relay, the operational audit log is gone with the disk.

For inquiries that involve App Store metadata or future hosted services (deferred to v2+), email jp@indiagram.com.

Changes to this policy

We will post substantive changes here with a new "last updated" date. Material changes that broaden data collection will be announced in the App Store release notes for the version that introduces them.