Last Updated: January 6, 2026
Effective Date: January 6, 2026
1.1. This Privacy Policy explains how Tron-safe ("we", "us", or "our") handles information when Users interact with our AML checking tool for USDT and TRX transactions on the TRON network.
1.2. Our Core Principle: We are designed to operate with minimal data interaction. We do NOT collect, store, or retain any personal data or transaction information.
2.1. Real-Time Processing Only: When you submit a transaction hash (TxID) or wallet address for checking, this data is processed in real-time to generate an AML report.
2.2. No Database Storage: We do not write any submitted data to our databases. Once the check is complete and the report is generated, the submitted data is not retained by our systems.
2.3. Temporary Cache: Data may pass through temporary memory (RAM) solely for the purpose of executing the check, but it is automatically purged immediately after the process ends.
3.1. To perform the analysis, your request is forwarded in real-time to our trusted AML data providers (such as analytical platforms and blockchain security firms).
3.2. These providers process the data according to their own privacy policies to generate risk scores. We encourage you to review their policies.
3.3. Tron-safe does not act as an intermediary storage point between you and these providers.
4.1. We do not require you to create an account, log in, or provide any personal information (such as name, email, or phone number) to use the basic checking service.
4.2. IP Addresses: We may temporarily process IP addresses for basic security and abuse prevention (rate limiting), but this information is not permanently logged or associated with your check history.
4.3. We do not use cookies or tracking technologies for marketing purposes.
5.1. Because we do not store data, our processing activities are designed to be compliant with the principles of data minimization under regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).
5.2. We act solely as a real-time conduit and do not maintain a repository of personal information. Therefore, requests for data access, deletion, or portability under these laws are inherently fulfilled by our zero-storage architecture.
6.1. Since we store no data, there is no personal information for you to request access to, modify, or delete. Once your check is complete, the data exists only in your own records or in the records of the third-party provider you interacted with.
7.1. If you have any questions about this Privacy Policy, you may contact us at:
Back to main page