Content and Use Policy

Effective Date: 1 October 2023
Last Updated: 17 November 2025

 

This Content and Acceptable Use Policy (“Policy”) governs how users may access and use the redNote platform and software (“redNote”, “the Service”).

This Policy should be read together with the Terms of Use and Privacy Policy.



1. Fundamental Principle

redNote is a non-custodial, zero-knowledge encryption platform.

  • redNote does not store, access, review, monitor, or moderate encrypted content.

  • redNote cannot see, read, or remove the contents of sealed files created by users.

  • Responsibility for content rests entirely with the user who encrypts or distributes it.

As a result, traditional content moderation categories do not apply.



2. User Responsibility for Content

By using redNote, you acknowledge and agree that:

  • You are solely responsible for all content you encrypt, seal, store, transmit, or distribute using redNote

  • redNote does not verify legality, accuracy, or appropriateness of encrypted content

  • Once encrypted, content cannot be altered, filtered, or moderated by redNote

You must ensure that your use of redNote complies with all applicable laws and regulations.



3. Prohibited Uses (User-Level Obligations)

You may not use redNote to:

  • Encrypt, conceal, or distribute content that is illegal under applicable laws

  • Circumvent legal obligations, court orders, or regulatory requirements

  • Facilitate fraud, deception, impersonation, or misrepresentation

  • Distribute malware or malicious software

  • Harass, threaten, or harm others

  • Violate intellectual property or privacy rights

  • Facilitate violence, terrorism, or criminal activity

  • Abuse or exploit minors in any form

  • Attempt to conceal criminal evidence or evade law enforcement

These prohibitions apply regardless of whether content is visible to redNote.



4. Account and System Misuse

You may not:

  • Access or attempt to access another user’s account without authorization

  • Interfere with or disrupt redNote systems or security mechanisms

  • Circumvent encryption, verification, or rule-enforcement features

  • Automate or scrape the service in an abusive manner

  • Reverse engineer or tamper with the software



5. No Content Removal or Moderation

Because redNote does not store encrypted content:

  • redNote cannot remove, edit, or disable specific encrypted files

  • Abuse reports cannot result in content takedown

  • Loss, misuse, or disclosure of encrypted content is the user’s responsibility

Account-level actions may still be taken where system abuse or legal violations are established.



6. Reporting Abuse or Legal Issues

If you believe redNote is being used unlawfully:

  • You may report account-level misuse or system abuse to us

  • You may report legal concerns directly to relevant authorities

redNote will cooperate with lawful requests within the limits of its technical design.



7. Third-Party Distribution Channels

Encrypted files may be delivered or stored via third-party platforms (e.g. email, messaging apps, storage services).

  • redNote is not responsible for the policies, moderation, or availability of third-party platforms

  • Users are responsible for complying with third-party terms and laws



8. Acknowledgement of Design Limits

By using redNote, you acknowledge that:

  • Encryption is irreversible

  • Content cannot be moderated post-encryption

  • Mistakes in content, recipients, or conditions cannot be corrected by redNote

  • System rules are enforced as configured, not as intended



9. Enforcement

We reserve the right to:

  • Suspend or terminate accounts for system abuse or legal violations

  • Restrict access to features where necessary to protect the platform

  • Cooperate with lawful investigations as required



10. Changes to This Policy

This Policy may be updated from time to time.
Updates will be reflected by a revised “Last Updated” date.

Continued use of redNote constitutes acceptance of the updated Policy.