Nothing to hide (NTH) is a privacy infrastructure provider based in The Netherlands. We operate privacy-enhancing services world wide and on this page you can read all about how we process your personal identifiable information (PII) for these services. If you have any questions about the processing of PII, please contact us.
Our public services are built in accordance with current privacy design strategies and best practices in mind. In short this means:
When you visit our website nothingtohide.nl, your IP address and browser user agent are being processed by our webserver in order to serve the website's content to your browser. In addition we log these personal data for 30 days for the purpose of preventing and finding abuse and keeping nothingtohide.nl available.
PII | Controller | Purpose | Legal basis |
---|---|---|---|
IP address | NTH | Find and prevent abuse, keep nothingtohide.nl available | Legitimate interest |
Browser user agent | NTH | Find and prevent abuse, keep nothingtohide.nl available | Legitimate interest |
You can send us an email for whatever reason. In order to receive, read and reply to these email we process the emailserver's IP address, contents of the emails and email address(es)/account name(s) of email recipients and senders.
Nothing to hide uses the Germany based secure email service Tutanota by Tutao GmbH (Tutao) to handle its email. Do note that upon request we can provide a secure email link for sharing sensitive information or data.
PII | Controller | Processor | Purpose | Legal basis |
---|---|---|---|---|
Emailserver IP address | NTH | Tutao | Make sending/receiving email possible | Legitimate interest |
Email address | NTH | Tutao | Make sending/receiving email possible | Legitimate interest |
Name(s) | NTH | Tutao | Make sending/receiving email possible | Legitimate interest |
Email content | NTH | Tutao | Make sending/receiving email possible | Legitimate interest |
When you use one of our Tor relays, your traffic will be routed through our infrastructure. This includes both the (heavily encrypted) contents and the traffic metadata such as the IP address. Do note that Nothing to hide can't view the contents of the traffic since it's heavily encrypted by the Tor network. In addition we don't log anything regarding the Tor relays or Tor traffic so although we process such information on a realtime basis, we can't view it.
PII | Controller | Purpose | Legal basis |
---|---|---|---|
Tor metadata | NTH | Required for Tor relays | Legitimate interest |
Tor encrypted content | NTH | Required for Tor relays | Legitimate interest |