Hacker binary attack code. Made with Canon 5d Mark III and analog vintage lens, Leica APO Macro Elmarit-R 2.8 100mm (Year: 1993)
Photo by Markus Spiske / Unsplash

Protecting privacy is integral to human dignity and promotes well-being!

Services

  • All client data is stored and analyzed in our SOC-2 compliant data center, and our file sharing and survey software adheres to industry-standard security, including file scanning for malicious content.
  • All data sharing between Evaluative Beings, LLC and our clients is fully encrypted, password protected, and secured using Two-Factor Authentication (2FA).
  • We do not share client data with any third-parties, ever.

Website

  • The one third-party tracker associated with our site facilitates membership functions. Of course, you can use a prviacy-orinted browser.
  • We have not added any additional tracking software to our platform (Ghost), which is known for its respect for privacy among content managment systems and hosts.
  • We do not share or sell our subscription database with anyone, and we never will. Subscribers have full control over their subscriptions and can (completely) delete their account at anytime.