Zum Inhalt springen
Prototyp pruefen

Privacy Model

This specification defines the Superheld privacy model: data inventory, trust boundary data flows, retention policies, feature vector transforms, and what data leaves the device under what conditions.

Audience: Privacy/security engineers, compliance officers, auditors.


In-ScopeOut-of-Scope
Data inventory with classificationImplementation of encryption algorithms
Trust boundary data flow diagramCloud infrastructure security controls
Retention policy per data typeLegal compliance analysis (GDPR, DSGVO)
Feature vector transformation guaranteesMarketing privacy claims
Voice/audio handlingContent moderation decisions

  1. Minimum collection: Only data required for threat detection is accessed
  2. Minimum retention: Data retained only as long as operationally necessary
  3. Minimum transmission: Only cryptographic hashes and anonymized feature vectors leave the device
  4. No tracking, no ads: No analytics trackers, ad SDKs, or third-party pixels
  5. Opt-in for extended: Additional data sharing requires explicit user consent

Data TypeAccess PatternStorageRetention
Message/email contentRead in RAM, analyzed, discardedVolatile RAM onlyImmediate (discarded after analysis)
Audio/call contentProcessed in RAM onlyVolatile RAM onlyImmediate (discarded after analysis)
Files/attachmentsScanned in RAMVolatile RAM onlyImmediate (discarded after analysis)
Contact informationRead for caller ID contextNot stored by agentN/A
Browsing historyNot accessedN/AN/A
Keystroke dataNot accessedN/AN/A
Screen recordingsNot accessedN/AN/A
Biometric dataNot accessedN/AN/A
Location dataNot accessed (regular operation)N/AN/A
Data TypeDerivationStorageRetention
Detection eventsPolicy Engine outputAES-256 encrypted, append-only90 days
Threat classificationsDetection Pipeline outputAES-256 encrypted90 days
User decisions (dismiss/proceed)User interactionLocal feedback loop90 days
Threat signatures (cache)Downloaded from CloudLocal storageUntil next update
Data TypeForm When LeavingPurposeDestinationLinkable?
Phone number hashesSHA-256 hashThreat intelligence lookupCloud Enrichment APINo (stateless)
App signature hashesSHA-256 hashMalicious app detectionCloud Enrichment APINo (stateless)
Domain/URL hashesSHA-256 hashPhishing/malware lookupCloud Enrichment APINo (stateless)
Feature vectorsAnonymized, dimensionality-reducedComplex case escalation (deepfake, advanced NLP)AI Analysis ModuleNo (stateless)
Detection events (filtered)Redacted event objectsReporting, SIEM, webhooksCloud relay → externalPer-org (tenant-isolated)
Device identifiersEncryptedLicense managementCloudPer-device (licensing only)
Aggregated telemetryAnonymized statisticsCollective threat intelligenceCloudNo (opt-in, aggregated)

Core invariant: Audio and message plaintext NEVER leave the device under any circumstances.



Feature vectors are sent to the Cloud AI Analysis Module when local detection yields ambiguous results. Before transmission, vectors undergo irreversible transformation:

PropertyValueStatus
Dimensionality128-dimensional vectorTarget only
Transformation methodPCA (dimensionality reduction) → random projection → scalar quantization (INT8)Target only
Reconstruction feasibilityNot practically feasible: irreversible dimensionality reduction from high-dimensional feature space to 128 dimensions, combined with quantization lossTarget only
Differential PrivacyNo formal DP applied. Privacy relies on irreversible transformation pipeline (PCA + random projection + quantization).Target only
Features includedBehavioral embeddings (communication patterns, timing, frequency), NLP embeddings (text structure, not content), network metadata featuresTarget only

QuestionAnswerStatus
Does the agent access audio/microphone?Microphone access patterns analyzed (when microphone is accessed by other apps)Target only
Does the agent record audio?No. Audio content processed in RAM only, immediately discarded.Target only
Does the agent transcribe calls?No. No audio transcription occurs, even locally.Target only
What call metadata is analyzed?Phone number, timestamp, duration, STIR/SHAKEN attestationTarget only
Does any audio data leave the device?NoTarget only

Documented privacy target: “Voice patterns” refers to call metadata heuristics and behavioral signals rather than microphone audio content. This is not fully confirmed by the current workspace implementation.


QuestionAnswerStatus
Does the agent access location?Not in regular operationTarget only
Family profiles: location notifications?Optional. Geofence zone-enter/exit events only.Target only
If location is used: local-only or cloud-transmitted?Local geofence evaluation. Cloud receives only zone-enter/exit events (no coordinates).Target only
Location storage/retentionGeofence zones stored locally. Zone events follow standard event retention (90 days local).Target only

Data TypeLocationRetentionConfigurable?Status
Account dataEU (Frankfurt)Target: Until deletion + 30 daysNoNot confirmed by current workspace
Device metadataEUTarget: 90 daysNoNot confirmed by current workspace
Detection events (local)DeviceTarget: 90 daysNoNot confirmed by current workspace
Detection events (cloud)EUTarget: 180 daysNoNot confirmed by current workspace
Audit logsEUTarget: 12 monthsNoNot confirmed by current workspace
Aggregated metricsEUTarget: 24 months (then anonymized)NoNot confirmed by current workspace
Threat signaturesDeviceTarget: Until next updateNoNot confirmed by current workspace
AI analysis dataNever persistedImmediateN/ANot confirmed by current workspace

Account deletion: Complete removal within 30 days. Backup overwrite within 90 days.


LayerMethodDetails
At rest (device)AES-256Keys in secure enclave (iOS) or keystore (Android)
In transitTLS 1.3Perfect Forward Secrecy, replay protection, downgrade prohibited; workspace agent supports optional SPKI pinning via SUPERHELD_CLOUD_PIN_SHA256, broader certificate pinning remains target
Event StoreAES-256 + cryptographic chainingAppend-only, tamper-evident

The Cloud Enrichment API operates statelessly:

PropertyGuaranteeStatus
No device ID in requestsRequests not linkable to specific deviceTarget only
No user ID in requestsRequests not linkable to specific userTarget only
No session tokenNo cross-request correlationTarget only
No IP loggingClient IP logged by load balancer for 7 days (security/abuse prevention only), then deleted. No long-term IP storage.Target only

Documented product target: stateless cloud enrichment without stable identifiers. The current workspace does not yet confirm the full request path or these infrastructure guarantees.


Data TypeRedaction Method
PII (email, name, phone)Replaced with placeholder tokens
Message contentNot included in any external telemetry
URLsTransmitted as SHA-256 hashes; full URL stays local
IP addressesTruncated to /24 (IPv4) or /48 (IPv6)

Applies to: Cloud transmission and external delivery (webhooks, API). Local Event Store retains full unredacted data.


FailureImpactMitigation
Encryption key unavailableCannot read/write Event StoreAgent enters safe mode. Events buffered in memory.
Secure enclave / keystore breachKey material exposedDefense-in-depth: per-event encryption, chain integrity verification. Key rotation on suspicion.
Accidental PII in telemetryPrivacy violationRedaction Engine processes all events before external delivery. Automated PII scanning in CI.
Feature vector de-anonymizationRe-identification riskIrreversible transformation + DP (if implemented). Formal analysis required.