AI TRAINING
Anonymized gameplay data trains NPC behavior.
User privacy is not an afterthought; it is a core feature of the Inkognido architecture. This protocol defines the strict logic governing data ingestion, algorithmic processing, and external transmission within our decentralized ecosystem. By accessing our nodes, you agree to the parameters set forth below.
We collect essential digital fingerprints including User IDs, email addresses encrypted via SHA-256, and OAuth tokens for authentication sessions.
Performance metrics, session duration, in-game asset transactions, and AI interaction logs are ingested to optimize the procedural generation engine.
Hardware configuration, OS version, IP address (masked after 24h), and browser user-agent strings for compatibility rendering.
For developer accounts, we log API calls, payload sizes, and error rates to maintain ecosystem stability and throttle abuse.
Anonymized gameplay data trains NPC behavior.
Realtime heuristics detect anomalous patterns.
Shared solely with verified partners via encrypted tunnels.
AES-256 at rest, TLS 1.3 in transit, private VPCs, MFA enforcement, and regular penetration tests.
All data at rest encrypted with AES-256, zero public internet access.
GDPR & CCPA compliant infrastructure with quarterly transparency reports.
Request a JSON copy of your personal data archive.
Permanently delete your account and all associated data from Inkognido servers.
WARNING: THIS ACTION IS IRREVERSIBLE.
Required for authentication, security, and core game functionality.
Allows anonymous crash reports and load-time metrics.
Enables tailored game recommendations and ecosystem offers.