Ethical Guidelines

We consider the effects of our choices with regarding to our technology and operating our service. We follow a privacy-first principles that go beyond basics.

Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:

No personal information

We aim for zero user information collected as defined in our concise privacy policy. We ask for the minimum, your email address or any other personal information like your name and company email address.

No trackers

Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on Aronetics – we are a tracking free web address.

No third-party tools

Tools like Google Analytics collect personally identifiable information that you share willingly or not, we don’t acknowledge them deeper than type of machine or country.

No secrets

Aronetics’ ownership, company structure and team is semi-public, so you know who is responsible for protecting your privacy and available on either LinkedIn or GitHub.

No false promises

We don’t advertise benefits that are not attainable by using a our technology.

Openness and accountability

Our technologies are close source and available for review on our GitHub page, we attempt to be as open as possible after legal agreements are met.

We don’t do marketing

We are committed to spreading the word about our technology and mission  to help more people protect their privacy. Considering the state of modern marketing, this is a challenging task.

We consider most marketing methods harmful, and refuse to engage in them. The following list represents all tactics we have considered and either rejected or eliminated over the years.

We will not begin an affiliate program to protest against the practice of paid reviews and misleading recommendations by “best InfoSec/Cybersecurity” websites.

Surveillance ads

Surveillance ads use personal information and behavioral data for personal targeting and retargeting purposes. We attempt to limit Facebook, Google and all forms of programmatic advertising on our website.

Dark patterns

We shun fake reviews, made up social proofs, countdown timers, expiring deals, exit consoles and tricks that make it hard to cancel our service. If you have issues and do not contact us, our software removes only itself.

Fear, uncertainty and doubt

Pushing subscriptions with scare tactics is common in the infosec/cybersecurity industry. We acknowledge the grave threat and suggest a myriad of tools need to be used.

Buying endorsements

We believe influencers and YouTube creators with no information security expertise should not endorse any services or technology in exchange for payment or social status.

Spam

We shun spam on social media and buying email lists of prospective customers, two marketing tactics frequently used by providers.

How we attract new customers

Our mission supersedes making profit and we reinvest most of our revenue into improving our service and educational projects. Yet cybersecurity is the elephant in the room, and as a business and we are working on attracting new customers, while keeping our values and commitments in mind.