Content and Use Policy
Effective Date: 1 October 2023
Last Updated: 17 November 2025
This Content and Acceptable Use Policy (“Policy”) governs how users may access and use the redNote platform and software (“redNote”, “the Service”).
This Policy should be read together with the Terms of Use and Privacy Policy.
1. Fundamental Principle
redNote is a non-custodial, zero-knowledge encryption platform.
redNote does not store, access, review, monitor, or moderate encrypted content.
redNote cannot see, read, or remove the contents of sealed files created by users.
Responsibility for content rests entirely with the user who encrypts or distributes it.
As a result, traditional content moderation categories do not apply.
2. User Responsibility for Content
By using redNote, you acknowledge and agree that:
You are solely responsible for all content you encrypt, seal, store, transmit, or distribute using redNote
redNote does not verify legality, accuracy, or appropriateness of encrypted content
Once encrypted, content cannot be altered, filtered, or moderated by redNote
You must ensure that your use of redNote complies with all applicable laws and regulations.
3. Prohibited Uses (User-Level Obligations)
You may not use redNote to:
Encrypt, conceal, or distribute content that is illegal under applicable laws
Circumvent legal obligations, court orders, or regulatory requirements
Facilitate fraud, deception, impersonation, or misrepresentation
Distribute malware or malicious software
Harass, threaten, or harm others
Violate intellectual property or privacy rights
Facilitate violence, terrorism, or criminal activity
Abuse or exploit minors in any form
Attempt to conceal criminal evidence or evade law enforcement
These prohibitions apply regardless of whether content is visible to redNote.
4. Account and System Misuse
You may not:
Access or attempt to access another user’s account without authorization
Interfere with or disrupt redNote systems or security mechanisms
Circumvent encryption, verification, or rule-enforcement features
Automate or scrape the service in an abusive manner
Reverse engineer or tamper with the software
5. No Content Removal or Moderation
Because redNote does not store encrypted content:
redNote cannot remove, edit, or disable specific encrypted files
Abuse reports cannot result in content takedown
Loss, misuse, or disclosure of encrypted content is the user’s responsibility
Account-level actions may still be taken where system abuse or legal violations are established.
6. Reporting Abuse or Legal Issues
If you believe redNote is being used unlawfully:
You may report account-level misuse or system abuse to us
You may report legal concerns directly to relevant authorities
redNote will cooperate with lawful requests within the limits of its technical design.
7. Third-Party Distribution Channels
Encrypted files may be delivered or stored via third-party platforms (e.g. email, messaging apps, storage services).
redNote is not responsible for the policies, moderation, or availability of third-party platforms
Users are responsible for complying with third-party terms and laws
8. Acknowledgement of Design Limits
By using redNote, you acknowledge that:
Encryption is irreversible
Content cannot be moderated post-encryption
Mistakes in content, recipients, or conditions cannot be corrected by redNote
System rules are enforced as configured, not as intended
9. Enforcement
We reserve the right to:
Suspend or terminate accounts for system abuse or legal violations
Restrict access to features where necessary to protect the platform
Cooperate with lawful investigations as required
10. Changes to This Policy
This Policy may be updated from time to time.
Updates will be reflected by a revised “Last Updated” date.
Continued use of redNote constitutes acceptance of the updated Policy.
