1:"$Sreact.fragment" 3:I[7143,["177","static/chunks/app/layout-ddfb8bb30a086762.js"],"GoogleAnalytics"] 4:I[5298,["177","static/chunks/app/layout-ddfb8bb30a086762.js"],"ThemeProvider"] 5:I[9766,[],""] 6:I[8924,[],""] b:I[7150,[],""] :HL["/_next/static/media/e4af272ccee01ff0-s.p.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/css/fdd6a95ad4c6c701.css","style"] 2:T9a0,{"@context":"https://schema.org","@graph":[{"@type":"Organization","@id":"https://thorium-security.com/#organization","name":"Thorium","url":"https://thorium-security.com","logo":{"@type":"ImageObject","url":"https://thorium-security.com/images/logo.png"},"description":"Secure cloud storage with end-to-end encryption and zero-knowledge architecture","sameAs":[]},{"@type":"SoftwareApplication","name":"Thorium","applicationCategory":"ProductivityApplication","operatingSystem":"iOS, Android, macOS, Windows","offers":{"@type":"Offer","price":"0","priceCurrency":"USD"},"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","ratingCount":"1250"},"description":"End-to-end encrypted cloud storage that protects your data even if your phone is lost, your password is stolen, or a cloud account is compromised.","featureList":["End-to-end encryption","Zero-knowledge architecture","Multi-cloud support","Cross-platform sync","Biometric security","Automatic backup"]},{"@type":"WebSite","@id":"https://thorium-security.com/#website","url":"https://thorium-security.com","name":"Thorium - Secure Cloud Storage","description":"Secure cloud storage without trusting the cloud","publisher":{"@id":"https://thorium-security.com/#organization"}},{"@type":"WebPage","@id":"https://thorium-security.com/#webpage","url":"https://thorium-security.com","name":"Thorium - Secure Cloud Storage Without Trusting the Cloud","isPartOf":{"@id":"https://thorium-security.com/#website"},"about":{"@id":"https://thorium-security.com/#organization"},"description":"End-to-end encrypted, zero-knowledge cloud storage. Use Google Drive, Dropbox, and OneDrive without compromising your privacy."},{"@type":"FAQPage","mainEntity":[{"@type":"Question","name":"Is Thorium really secure?","acceptedAnswer":{"@type":"Answer","text":"Yes. Thorium uses end-to-end encryption, meaning your files are encrypted on your device before they leave. Even we cannot access your data due to our zero-knowledge architecture."}},{"@type":"Question","name":"What happens if I lose my password?","acceptedAnswer":{"@type":"Answer","text":"Your files remain protected due to Thorium's multi-layered security. Access to one account does not expose your data."}},{"@type":"Question","name":"Which cloud providers does Thorium support?","acceptedAnswer":{"@type":"Answer","text":"Thorium works with Google Drive, Dropbox, and OneDrive. You use your existing cloud accounts - no new storage needed."}}]}]}0:{"P":null,"b":"vYXyIhfPQg5xOr41FBj9k","p":"","c":["","privacy-policy"],"i":false,"f":[[["",{"children":["privacy-policy",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/fdd6a95ad4c6c701.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","suppressHydrationWarning":true,"className":"__variable_f367f3","children":[["$","head",null,{"children":["$","script",null,{"type":"application/ld+json","dangerouslySetInnerHTML":{"__html":"$2"}}]}],["$","body",null,{"children":[["$","$L3",null,{}],["$","$L4",null,{"children":["$","$L5",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":"$L7"}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}]]}]]}]]}],{"children":["privacy-policy","$L8",{"children":["__PAGE__","$L9",{},null,false]},null,false]},null,false],"$La",false]],"m":"$undefined","G":["$b",[]],"s":false,"S":true} c:I[5545,["856","static/chunks/856-dc0869df53d93fe4.js","902","static/chunks/app/privacy-policy/page-03d61167ebbcb7b4.js"],"Header"] 1d:I[4431,[],"ViewportBoundary"] 1f:I[4431,[],"MetadataBoundary"] 20:"$Sreact.suspense" 7:["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}] 8:["$","$1","c",{"children":[null,["$","$L5",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L6",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}] 9:["$","$1","c",{"children":[[["$","$Lc",null,{}],["$","main",null,{"className":"pt-32 pb-24","children":["$","div",null,{"className":"mx-auto max-w-7xl px-4 sm:px-6 lg:px-8","children":["$","div",null,{"className":"mx-auto max-w-3xl","children":[["$","p",null,{"className":"section-label mb-4","children":"Legal"}],["$","h1",null,{"className":"text-4xl font-bold text-white mb-2","children":"Privacy Policy"}],["$","p",null,{"className":"text-sm text-gray-500 mb-12","children":"Last updated: February 24, 2026"}],["$","div",null,{"className":"prose prose-invert prose-sm max-w-none space-y-10 text-gray-300 leading-relaxed","children":[["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"1. Overview"}],["$","p",null,{"children":["Thorium (\"we\", \"us\", or \"our\") is a zero-knowledge, end-to-end encrypted cloud storage service. Our fundamental design principle is that ",["$","strong",null,{"className":"text-white","children":"we cannot read your files"}],". Your data is encrypted on your device before it ever leaves it, and only you hold the keys to decrypt it. This Privacy Policy describes what limited information we do collect and how we handle it."]}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"2. Information We Collect"}],["$","h3",null,{"className":"text-base font-semibold text-white mt-5 mb-2","children":"2.1 Account Information"}],["$","p",null,{"children":"When you create an account we collect your email address and a salted, hashed version of your authentication credentials. We never store your plaintext password or your encryption keys."}],["$","h3",null,{"className":"text-base font-semibold text-white mt-5 mb-2","children":"2.2 Usage & Diagnostic Data"}],["$","p",null,{"children":"We may collect anonymised, aggregated usage metrics (e.g., number of sync operations, app version, crash reports) to improve the product. This data cannot be linked back to your identity or to any specific file."}],["$","h3",null,{"className":"text-base font-semibold text-white mt-5 mb-2","children":"2.3 Payment Information"}],["$","p",null,{"children":"If you subscribe to a paid plan, payment is processed by our third-party payment processor. We receive only a transaction confirmation and a subscription status — we never store full credit card numbers or banking details."}],["$","h3",null,{"className":"text-base font-semibold text-white mt-5 mb-2","children":"2.4 Support Communications"}],["$","p",null,{"children":"If you contact us for support we retain the content of that correspondence to resolve your issue and improve our service."}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"3. What We Cannot Access"}],["$","p",null,{"children":"Due to our zero-knowledge architecture, the following are technically inaccessible to us:"}],["$","ul",null,{"className":"list-disc list-inside space-y-1 mt-3 text-gray-400","children":[["$","li",null,{"children":"The contents of any file you store or sync through Thorium"}],["$","li",null,{"children":"Your encryption keys or master password"}],["$","li",null,{"children":"File names or folder structure (these are encrypted client-side)"}],["$","li",null,{"children":"Metadata associated with individual files"}]]}],["$","p",null,{"className":"mt-4","children":"This means that even if compelled by a court order or subpoena, we have no ability to hand over your file contents — because we do not have them."}]]}],["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"4. How We Use Your Information"}],["$","p",null,{"children":"The limited information we collect is used solely to:"}],["$","ul",null,{"className":"list-disc list-inside space-y-1 mt-3 text-gray-400","children":["$Ld","$Le","$Lf","$L10","$L11","$L12"]}],"$L13"]}],"$L14","$L15","$L16","$L17","$L18","$L19","$L1a"]}]]}]}]}],"$L1b"],null,"$L1c"]}] a:["$","$1","h",{"children":[null,[["$","$L1d",null,{"children":"$L1e"}],["$","meta",null,{"name":"next-size-adjust","content":""}]],["$","$L1f",null,{"children":["$","div",null,{"hidden":true,"children":["$","$20",null,{"fallback":null,"children":"$L21"}]}]}]]}] 22:I[1356,["856","static/chunks/856-dc0869df53d93fe4.js","902","static/chunks/app/privacy-policy/page-03d61167ebbcb7b4.js"],"Image"] 23:I[4431,[],"OutletBoundary"] 25:I[5278,[],"AsyncMetadataOutlet"] d:["$","li",null,{"children":"Authenticate your identity and manage your account"}] e:["$","li",null,{"children":"Process your subscription and send billing receipts"}] f:["$","li",null,{"children":"Respond to support requests"}] 10:["$","li",null,{"children":"Detect and prevent fraud or abuse"}] 11:["$","li",null,{"children":"Comply with applicable legal obligations"}] 12:["$","li",null,{"children":"Improve the reliability and performance of our service"}] 13:["$","p",null,{"className":"mt-4","children":"We do not sell, rent, or share your personal information with third parties for marketing purposes."}] 14:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"5. Third-Party Services"}],["$","p",null,{"children":"Thorium integrates with third-party cloud providers (such as Google Drive, Dropbox, and OneDrive) on your behalf to store your encrypted data. We only transmit ciphertext to these providers — they cannot read your files any more than we can. Your use of those services is also subject to their respective privacy policies."}]]}] 15:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"6. Data Retention"}],["$","p",null,{"children":"We retain your account information for as long as your account is active. If you delete your account, we will delete your personal data within 30 days, except where we are required to retain it by law (e.g., billing records for tax purposes, which are retained for seven years)."}]]}] 16:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"7. Security"}],["$","p",null,{"children":"We employ industry-standard security measures to protect the account information we do hold, including encryption in transit (TLS 1.3), hashed credentials, and strict access controls on our infrastructure. However, no internet transmission is 100% secure, and we encourage you to use a strong, unique password for your Thorium account."}]]}] 17:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"8. Your Rights"}],["$","p",null,{"children":"Depending on your jurisdiction, you may have the right to:"}],["$","ul",null,{"className":"list-disc list-inside space-y-1 mt-3 text-gray-400","children":[["$","li",null,{"children":"Access the personal data we hold about you"}],["$","li",null,{"children":"Request correction of inaccurate data"}],["$","li",null,{"children":"Request deletion of your account and associated data"}],["$","li",null,{"children":"Object to or restrict certain processing"}],["$","li",null,{"children":"Data portability (receive a copy of your data in a machine-readable format)"}]]}],["$","p",null,{"className":"mt-4","children":["To exercise any of these rights, contact us at"," ",["$","a",null,{"href":"mailto:support@thorium-security.com","className":"text-brand-500 hover:text-brand-400 transition-colors","children":"support@thorium-security.com"}],"."]}]]}] 18:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"9. Children's Privacy"}],["$","p",null,{"children":"Thorium is not directed to children under 13 (or under 16 in the EU/UK). We do not knowingly collect personal information from children. If you believe a child has provided us with their data, please contact us and we will delete it promptly."}]]}] 19:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"10. Changes to This Policy"}],["$","p",null,{"children":"We may update this Privacy Policy from time to time. We will notify you of material changes via email or a notice in the app at least 30 days before the change takes effect. Continued use of Thorium after the effective date constitutes acceptance of the updated policy."}]]}] 1a:["$","section",null,{"children":[["$","h2",null,{"className":"text-xl font-semibold text-white mb-3","children":"11. Contact"}],["$","p",null,{"children":["If you have any questions about this Privacy Policy, please reach out to us at"," ",["$","a",null,{"href":"mailto:support@thorium-security.com","className":"text-brand-500 hover:text-brand-400 transition-colors","children":"support@thorium-security.com"}],"."]}]]}] 1b:["$","footer",null,{"className":"border-t border-surface-400/50 bg-surface","children":["$","div",null,{"className":"mx-auto max-w-7xl px-4 sm:px-6 lg:px-8","children":["$","div",null,{"className":"py-12","children":[["$","div",null,{"className":"grid grid-cols-1 gap-8 md:grid-cols-3","children":[["$","div",null,{"children":[["$","div",null,{"className":"flex items-center gap-2 mb-4","children":[["$","$L22",null,{"src":"/logo.png","alt":"Thorium","width":32,"height":32,"className":"h-8 w-8"}],["$","span",null,{"className":"text-lg font-bold text-white","children":"Thorium"}]]}],["$","p",null,{"className":"text-sm text-gray-500","children":"Secure cloud storage without trusting the cloud. Your data belongs to you."}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xs font-medium text-gray-500 mb-4 uppercase tracking-wider","children":"Legal"}],["$","ul",null,{"className":"space-y-2 text-sm","children":[["$","li",null,{"children":["$","a",null,{"href":"/privacy-policy","className":"text-gray-400 hover:text-brand-500 transition-colors","children":"Privacy Policy"}]}],["$","li",null,{"children":["$","a",null,{"href":"/terms-of-service","className":"text-gray-400 hover:text-brand-500 transition-colors","children":"Terms of Service"}]}]]}]]}],["$","div",null,{"children":[["$","h3",null,{"className":"text-xs font-medium text-gray-500 mb-4 uppercase tracking-wider","children":"Contact"}],["$","a",null,{"href":"mailto:support@thorium-security.com","className":"text-sm text-brand-500 hover:text-brand-400 transition-colors","children":"support@thorium-security.com"}]]}]]}],["$","div",null,{"className":"mt-12 pt-8 border-t border-surface-400/30","children":[["$","p",null,{"className":"text-xs text-gray-600 text-center","children":["© ",2026," Thorium. All rights reserved."]}],["$","p",null,{"className":"text-xs text-gray-600 text-center mt-1","children":"Your data belongs to you - and only you."}]]}]]}]}]}] 1c:["$","$L23",null,{"children":["$L24",["$","$L25",null,{"promise":"$@26"}]]}] 1e:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 24:null 27:I[622,[],"IconMark"] 26:{"metadata":[["$","title","0",{"children":"Privacy Policy | Thorium"}],["$","meta","1",{"name":"description","content":"Thorium Privacy Policy — how we collect, use, and protect your information."}],["$","link","2",{"rel":"author","href":"https://thorium-security.com"}],["$","meta","3",{"name":"author","content":"Thorium"}],["$","link","4",{"rel":"manifest","href":"/manifest.webmanifest","crossOrigin":"$undefined"}],["$","meta","5",{"name":"keywords","content":"cloud storage,encryption,privacy,security,zero-knowledge,end-to-end encryption,secure file storage,encrypted backup,Google Drive encryption,Dropbox encryption,OneDrive encryption,file privacy,secure cloud"}],["$","meta","6",{"name":"creator","content":"Thorium"}],["$","meta","7",{"name":"publisher","content":"Thorium"}],["$","meta","8",{"name":"robots","content":"index, follow"}],["$","meta","9",{"name":"googlebot","content":"index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"}],["$","meta","10",{"name":"category","content":"technology"}],["$","link","11",{"rel":"canonical","href":"https://thorium-security.com/privacy-policy"}],["$","meta","12",{"name":"format-detection","content":"telephone=no, address=no, email=no"}],["$","meta","13",{"property":"og:title","content":"Thorium - Secure Cloud Storage Without Trusting the Cloud"}],["$","meta","14",{"property":"og:description","content":"End-to-end encrypted, zero-knowledge cloud storage. Your data stays private, even from us."}],["$","meta","15",{"property":"og:url","content":"https://thorium-security.com"}],["$","meta","16",{"property":"og:site_name","content":"Thorium"}],["$","meta","17",{"property":"og:locale","content":"en_US"}],["$","meta","18",{"property":"og:image","content":"https://thorium-security.com/og-image.png"}],["$","meta","19",{"property":"og:image:width","content":"1200"}],["$","meta","20",{"property":"og:image:height","content":"630"}],["$","meta","21",{"property":"og:image:alt","content":"Thorium - Secure Cloud Storage"}],["$","meta","22",{"property":"og:type","content":"website"}],["$","meta","23",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","24",{"name":"twitter:creator","content":"@thorium"}],["$","meta","25",{"name":"twitter:title","content":"Thorium - Secure Cloud Storage Without Trusting the Cloud"}],["$","meta","26",{"name":"twitter:description","content":"End-to-end encrypted, zero-knowledge cloud storage. Your data stays protected."}],["$","meta","27",{"name":"twitter:image","content":"https://thorium-security.com/og-image.png"}],["$","link","28",{"rel":"icon","href":"/icon.png?252ffcc380224ab7","type":"image/png","sizes":"1024x1024"}],["$","$L27","29",{}]],"error":null,"digest":"$undefined"} 21:"$26:metadata"