Privacy Protection Policy
We apply a data-minimization approach to our operations. Our internal process is designed to reduce unnecessary collection, limit temporary retention, and use technical and organizational safeguards to protect communications and operational records.
We do more than make promises
We protect your privacy through advanced technology and carefully designed systems.
Information We Do Not Intend to Collect
We avoid collecting “test-taker identity” information during the service process. This approach is part of our broader privacy and data-minimization framework.
This may include, without limitation:
- Identification documents
- Exam registration information with ETS or other agencies
- Registration account credentials
- University application details
- Other comparable categories of highly sensitive personal information
Secure Data Storage and Transmission
Regarding network transmission, ELPIS's backbone servers are hosted in Sweden. Regardless of the method clients use to connect, any data exchanged between the client's terminal and ELPIS's backbone servers is protected by the EU's General Data Protection Regulation (GDPR) [1], which legally prohibits any individual, enterprise, organization, or government from accessing the data of communicating parties.
Sweden, one of the world's foremost advocates for personal privacy, provides an additional layer of protection beyond the GDPR. The country has implemented the Data Protection Act (2018:218) [2] and the Data Protection Ordinance (2018:219) [3] as complementary legislation to the GDPR. As a result, any interception of data packets sent to Sweden is strictly prohibited by law. The anonymity of both our clients and ourselves remains fully protected.
Transmission & Infrastructure Safeguards
ELPIS's robust infrastructure leverages a multi-hop, Tor-like network architecture [4], ensuring that all data packets remain fully anonymous and heavily encrypted—even when traversing public internet routers. Consequently, even in extreme scenarios—such as comprehensive monitoring of local inbound and outbound traffic, a third-party compromise of your router, or a key leakage on a non-TPM-equipped device—any intercepted communication between you and ELPIS remains secured by AES-256 ciphertext [5]. This level of protection ensures that transmitted data cannot be deciphered by any organization, commercial entity, or government agency.
Data Deletion After Service Completion
Upon service completion, ELPIS permanently erases all temporary client contact information (including Telegram, WhatsApp, and WeChat), communication logs, and residual data. On the client side, the shred command [6] is executed to overwrite data with a pass of zeros followed by five passes of random data, ensuring it remains unrecoverable.
On the ELPIS infrastructure, Tails [7] serves as the operating system for temporary data storage; all information is automatically destroyed upon system shutdown. For every operational session, ELPIS assigns a temporary Tails instance to each operator, which is fully decommissioned and its resources reclaimed immediately after use.
UUID-Based Warranty Support
ELPIS issues a UUID (Universally Unique Identifier) to the client. In our database, this UUID is stored exclusively with its corresponding service date; a query will only confirm that "a session with UUID XXXX occurred on [Date]."
Regardless of the communication channel used—whether Xiaohongshu, Telegram, Signal, or WeChat—we provide after-sales support solely upon the presentation of a valid UUID.
Please note the following security constraints:
- Loss of UUID: If a client loses their UUID, ELPIS cannot retrieve any records or provide further assistance.
- Unauthorized Disclosure: If a UUID is disclosed to others, any holder may impersonate the client to claim services.
Since the UUID is our only means of authentication, it is the client's sole responsibility to ensure it is kept secure and confidential.
References
- [1] European Union. Regulation (EU) 2016/679 (General Data Protection Regulation – GDPR).
- [2] Government of Sweden. Act containing supplementary provisions to the EU General Data Protection Regulation (SFS 2018:218).
- [3] Government of Sweden. Data Protection Ordinance (SFS 2018:219).
- [4] Tor Project. Overview.
- [5] National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard (AES).
- [6] GNU Coreutils Manual. shred: Remove files more securely.
- [7] The Tails Project. Tails OS.