Hider V

Privacy Policy

Last updated: December 02, 2025

This Privacy Policy describes how Hider V collects, processes, stores, and protects data when you access or use services at hiderv.com. By continuing to use the Service, you confirm that you have read and agreed to the terms below.

1. Data We Collect

We collect the following types of information to operate the service:

  • Registration information: Including username, email address, and password (securely hashed/encrypted).
  • Payment history: Records of service-related transactions (if applicable).
  • Uploaded data: Files to be hidden (images, videos, audio, documents, etc.) and carrier files used for embedding identifiers.
  • Security credentials: Passwords you provide to perform encryption or decryption processes.
  • Contact information: Information you voluntarily provide when submitting support requests.

2. How We Process Data

Our data processing follows strict security principles:

  • We do not read, analyze, or view the contents of your uploaded files.
  • Files and passwords are fragmented and encrypted into binary sequences immediately upon receipt.
  • The system generates a random ID and embeds it into the carrier file. This ID does not contain real data and cannot be used to infer the original content.
  • Uploaded data exists only briefly to support the technical processing workflow.

3. Automatic Deletion Mechanism

  • Data stored on the server remains encrypted for a limited period.
  • When the self-destruction time is reached, the data is permanently deleted (default: 7 days from the first encryption).
  • After this period, the data cannot be recovered by any method.

4. Data Sharing with Third Parties

  • We commit to not selling, trading, or sharing user data with third parties for commercial purposes.
  • We do not use data for advertising, behavior tracking, or user profiling.
  • Data is shared only in the following cases:
    1. Compliance with valid legal requests from authorized government authorities.
    2. Protection of the system against cyberattacks, fraud, or sabotage.

5. Data Security

  • Strong encryption is used for both data storage and transmission.
  • User passwords are never stored in plain (raw) text.
  • Automatic periodic deletion mechanisms are applied to minimize leakage risks.
  • Access is strictly limited at the system level to prevent unauthorized internal or external access.
  • However, you should understand that despite extensive security measures, the Internet always carries certain inherent risks.

6. User Rights

  • The right to request deletion of your data before the scheduled self-destruction time.
  • The right to request information about how your data is processed.
  • The right to stop using the service at any time.

7. Contact

If you have any questions, requests, or feedback, please contact us via:

Technical Support Email: info@hiderv.com

Zalo/Phone: 0796 781 024

Facebook: facebook.com/hiderv