Home Dashboard About Contact Us Terms of Service Privacy Policy Initiate

Privacy Policy

EFFECTIVE DATE: May 1, 2026
SupaMane Technologies LLC operates the Walk Tha Duck network. Our mission is to dissect authority and expose systemic vulnerabilities. Part of our protocol means being completely transparent about what data we encounter in the process.

1. Information We Encounter

By the nature of telephony and digital interaction, when you interface with our systems, we collect operational data. This may include telephonic metadata (such as caller ID/phone numbers, time of call, and call duration), web server logs (IP addresses, browser types), and any voice inputs provided during automated IVR / text-to-speech interactions.

2. What We Actually Do With It

We are not a data broker, and we are not a scam operation. We do not extract personally identifiable information (PII) to open credit cards in your name. We use this data exclusively for the mechanical operation of the performance art and simulation. Phone numbers and call inputs trigger our SQLite databases and behavioral momentum scripts to create the "disruptive design" experience.

3. The SQLite Vault

Interaction logs and metadata are stored in our secure, decentralized infrastructure strictly for system monitoring and debugging the campaign’s auto-splicing and routing mechanics. Once the data ceases to be useful for the immediate performance or educational demonstration, it is considered obsolete.

4. No Third-Party Snitches

We do not sell, rent, or trade your telephonic metadata or web footprint to third parties, marketers, or data farms. The only exception to data disclosure is if we are legally compelled by a legitimate, verified law enforcement agency presenting a valid warrant or subpoena (ironically enough).

5. Going Dark (Opting Out)

If you have interacted with the Walk Tha Duck network and wish to terminate further telephonic engagement, you retain the absolute right to block our inbound numbers. As we do not operate a traditional marketing newsletter, there is no "unsubscribe" link—just the standard blocking protocols provided by your cellular carrier.

6. Security Measures

We built this infrastructure using guerilla tech and industry-standard encryption protocols. We protect the operational data we hold with the same intensity we use to build our systems. However, no digital transmission is 100% secure, and you participate in this network with that understanding.

7. Modifications to the Matrix

We reserve the right to update this protocol at any time. When we do, we will update the Effective Date at the top of this file. Continue to monitor the system for changes.