Security Policy
1. Security Model
This service applies practical technical safeguards, including rate limiting, bot/abuse controls, token-based mailbox access, cleanup routines, and infrastructure-level security controls.
2. Best-Effort Security (No Guarantee)
Security is implemented on a best-effort basis. No internet service can guarantee complete confidentiality, integrity, or availability at all times. You acknowledge and accept these limits by using this temporary/public email service.
3. User Responsibility
You must treat this service as low-trust and temporary. Do not use it for sensitive, regulated, or high-impact information. You are responsible for protecting your own device, browser session, and any credentials or tokens associated with your inbox.
4. Data Lifecycle Controls
The platform uses retention controls that may include soft-delete and scheduled hard-delete. Data may be removed automatically due to retention, abuse handling, or operational needs.
5. Incident Handling
Security events are triaged by severity and exploitability. Emergency mitigations may be applied before permanent fixes to protect users and infrastructure.
6. Vulnerability Reporting
If you discover a security issue, report it privately to the operator with clear reproduction steps, affected endpoints, and impact details.
7. Enforcement
We may block traffic, disable inboxes, delete abusive content, and apply additional controls to protect the service and users.