loading x elements...

Privacy

Data privacy is important to us. The data you upload in the course of running a Scenario is not made available to anyone unless you allow it.

The developers receive statistical data about the way their Rules and Programs are used, but this data is anonymized and does not contain the actual data you upload.

Making real world examples of Program usage available to developers can help them to improve their programs. for this reason, you may choose to make your Scenarios available to developers for inspection. If you are not logged in, this is always done by default, so make sure to log in if you do not want to make your data available to others. (You will see a warning message if you accidentally start a Scenario without being logged in.)

Note

As this website is currently in its early development phases, the ability for developers to inspect Scenarios and see usage statistics of the Rules and Programs is not actually implemented yet. This feature will be added soon.

Security

Note

As this website is currently in its early development phases, we can not make any guarantees about security right now. Anything stated here is how we plan for things to be by the end of the Beta.

If you notice any problems, please report them to us, and do not abuse or publicize them.

Note

We offer a reward of 100$ for anyone who can point out a security vulnerability that we are not already working on.

It should go without saying, but you must demonstrate the security flaw using a benign example that doesn't break the law. Additionally, if you think you have found a security flaw, please contact us directly at contact@elody.com and don't tell others about it.

All Programs uploaded by developers are run in isolated environments. This prevents them from accessing somebody else's data either accidentally or maliciously.

Messages shown to the user by Elody can be created by developers and can be interactive. These messages are able to contact other websites on the user's behalf. However, they can only contact domains for which the user has explicitly given permission.