Data Sovereignty and User Controls

Users can:

  • Revoke data access at any time

  • Delete or migrate their encrypted data vault

  • Export full audit logs of their data usage

  • Opt out of analytics, updates, or smart contract events

Every interaction is logged on-chain—creating a tamper-proof audit trail while protecting individual privacy through advanced cryptography.

Last updated