Empower User Get Stuff Done




Security Policy


Empoweruser has strict security standards for all team members and regularly undergo continued testing, training and auditing of our platform and practices.

Our team uses the platform ourselves. Therefore, it is of paramount importance that our personal private data is safe guarded and protected every bit to in the same manner as that of our customers.

We our adamant about Personal Privacies, Intellectual Property Rights, Data Security and Data Sovergnity within our team and to our customer base.


Software Development


Empoweruser was built from the ground-up to be secure from and resistant to quantum computer attacks, as that technology continues to evolve.

Researchers and government bodies, such as the U.S. National Institute of Standards and Technology (NIST), are actively trying to develop their own encryption algorithms, and we choose to reside outside of their attempts at setting new standardizations, as we see it simply as a loose end and potential security breach.

While we do in fact deploy some of the well known encryption standards, we have improved on them with our own secret sauce.


Data Encryption


For security purposes, we will not go into detail exactly what type of new cryptography technology we have developed or how it works, except to say it is a form of lattice-based Quantum Key Distribution (QKD) technology, thwarting hacker and eavesdropper attempts by dissolving encryption keys once manifested; in the same way a quantum field state of superposition collapses from a wave of possibility into a fixed 3D particle once observed.


Data Retention


Each customer is responsible for the information they create, use, store, process and destroy. On expiration of services, customers may instruct Empoweruser to delete all customer data from Empoweruser's systems and we do so immediately.

If a customer is not paying, we do not allow their data to take up space on our servers, and so it is deleted for ever. That simple.

Of course, customers always maintain the right to delete their own data, and once deleted, it is wiped off our servers. We do not maintain copies or backups. Once it is gone, it is gone.

It should be noted to anyone skeptical about whether it is truly deleted or not, as we all know how computers work when deleting files, that it can in certain cases be recoverable, when we delete data, it is truly deleted.

We do not pay to have old ghost data taking up space on our servers. Secondly, if it was to be undeleted and recovered, it is still stae-of-the-art encrypted, and it is extremely unlikely that even a quantum computer would be able to decrypt it.


Business Continuity


Empoweruser services are configured in such a manner so as to only utilize one server for our entire global customer base. Our hardware infrastructure and data is NOT replicated in multiple geographic regions to ensure a certain level of availability.

There remains one and only one server for our hardware and data, and if it goes down, it goes down. That is out of our control.

We can ensure a 99% or greater uptime availability during normal times, and if the system does go down, it is usually just a matter of less than an hour before it comes back up online, as it is typically due to hardware or software upgrades and caches clearing.

In the event of a catostrophic failure, our server fails and all data is lost, we do maintain backups on our own personal external hard drives stored in fireproof safes at two undisclosed location. So, it may be a matter or days before we get it back up online, but the important thing is that your data remains encypted the whole time, and back up redundancies do exist.


Updated: January 1, 2026




To install this app on your iPhone or iPad:

  1. Tap the Share button in Safari.
  2. Scroll down and select Add to Home Screen.
  3. Follow the on-screen instructions.