This Privacy Policy (hereinafter referred to as the "Policy") explains how the administration of the JewishTricks service ("we," "us," "our") collects, uses, stores, and protects user information ("User," "you") when using the websites jewishtricks.me and menu.jewishtricks.me, as well as our software (modifications).
By using our services, you grant unconditional consent to the collection and processing of your data in accordance with this document. If you do not agree with this Policy, you must immediately cease using the service.

1. WHO WE ARE

The JewishTricks service is provided by an independent group of developers. Within the scope of this Policy, we do not operate as a registered corporate legal entity. All data is collected exclusively to ensure the technical functionality of our software, provide you with access to our services, and protect our intellectual property.

2. WHAT INFORMATION WE COLLECT

We apply the principle of data minimization and collect only what is critically necessary for the operation of the service and the protection of our product from unauthorized copying and modification.
2.1. Information you provide voluntarily:

  • Email Address: Used for account identification, access recovery, and receiving system notifications and newsletters from our service.
  • Credentials: Username and a cryptographic hash of your password. We never store or process passwords in plaintext.
    2.2. Automated Telemetry and Environment Authentication (Technical Data):
    To ensure the integrity of our software, prevent fraud, and facilitate the proper operation of our Digital Rights Management (DRM) modules, we automatically collect aggregated metrics of your computing environment. This includes, but is not limited to:
  • Hardware Vectors and Topology Markers: Collection of non-personalized, low-level descriptors of workstation components, dynamic state metrics of physical and virtual nodes, and the calculation of unique cryptographic checksums of the hardware configuration (without the direct extraction of personal files).
  • Software Environment Snapshots: Analysis of operating system data structures, execution vectors, memory states, and active processes at the kernel and user levels—solely for the purpose of verifying the execution environment and blocking attempts to inject debuggers or dumpers.
  • Network Routing: IP address, packet timestamps, user agent type, and traffic routing data to our authentication servers.
    2.3. Financial Data:
    WE DO NOT COLLECT OR STORE YOUR PAYMENT DETAILS. All payment processing (including credit cards and cryptocurrency transactions) is handled entirely by secure third-party payment gateways. We only receive a cryptographically signed response (token) regarding the success or failure of the transaction.

3. HOW WE USE YOUR DATA

The collected information is used strictly for the following purposes:

  • User authentication and granting access to paid services and modifications.
  • Generating unique access tokens based on environment telemetry to bind a license to a specific workstation, thereby preventing multi-accounting or unauthorized sharing of access.
  • Proactive detection, analysis, and blocking of reverse-engineering attempts, binary code modifications, or circumvention of our software's security mechanisms.
  • Sending internal transactional emails and informational newsletters regarding updates (you may unsubscribe from marketing emails at any time).
  • Technical auditing, crash detection, and network code optimization.

4. DATA TRANSFER TO THIRD PARTIES

We do not sell, rent, or share your personal data with third parties for marketing or commercial purposes. Data transfer is strictly limited to the following scenarios:

  • Analytics Services (Google Analytics): We use Google Analytics to collect anonymized statistical information about website traffic (entry pages, time on site, IP-based geography). This data is aggregated and does not allow for personal identification.
  • Payment Providers: Transmitting internal order identifiers to complete transactions.
  • Protection of Rights and Infrastructure: In the event of detected financial fraud, unauthorized tampering with our software, or DDoS attacks, we reserve the right to transmit the collected technical snapshots and network logs to specialized anti-fraud databases.
  • Legal Requirements: Upon receiving an official, legally binding request from law enforcement agencies.

5. DATA RETENTION AND SECURITY

5.1. Security Infrastructure: We utilize modern encryption standards for data transmission (TLS) and the storage of sensitive information in our databases. However, the User acknowledges that no internet-based security system is absolutely invulnerable, and data is provided at your own risk.
5.2. Retention Periods: Account data is retained for the entire duration of the account's activity. In the event of an account ban for violating the Terms of Service (including attempts to tamper with the software), hardware markers and environment vectors are blacklisted and retained indefinitely to prevent the re-registration of offenders.

6. COOKIES

We use cookies exclusively for functional purposes: to maintain authorization sessions and provide baseline protection against automated attacks on our web resources. We do not use cross-site advertising trackers.

7. USER RIGHTS

You have the right to:

  • Change your email address and password via your account control panel.
  • Request account deletion through the support service. Account deletion results in the immediate and irreversible cancellation of all active subscriptions. Please note: data from accounts banned for Terms of Service violations or DRM circumvention attempts is not subject to deletion and is retained for service security purposes.

8. CHILDREN'S PRIVACY

Our services are not intended for minors. We do not knowingly collect data from individuals under the age of 18. If it is discovered that data has been provided by a minor, that account will be subject to immediate deletion.

9. CONTACTS

To resolve any issues regarding the processing of your data or this Policy, you may contact the administration via the ticket system in your personal dashboard.