stealthpitch.com /site-privacy-policy #site-privacy-policy [v:sp.site-privacy-policy.1]
Site Privacy Policy (SiPP)
Read this important document.
Graphic 4. "Unsaved blue objects are accessible through the shadowy doorway." [?]
Introduction
[1] This website (the "Site") follows this document, the Site Privacy Policy (SiPP), to inform you of our policies regarding the collection, use and disclosure of the Personal Information or Data (PID).
[2] We will not collect, use or disclose the PID except as described in the SiPP. We use the PID to provide the features or functionality of the Site.
The Untracked Internet Manifesto (TUIMa)
[3] The Untracked Internet Manifesto (TUIMa) [v:uim.1]
[4] Part I: Fully-Tracked Internet (Futrin)
[5] The internet, as you know it, is fully tracked. When you use an app or visit a https website with JavaScript and cookies, as usual, you are using the Futrin. You are constantly being tracked by your ISP, businesses and hostile actors. Fundamentally, at the technical level, the network you are using is designed to be fully trackable.
[6] Part II: Partially-Tracked Internet (Patrin)
[7] Patrin extends to services like Tor and Lokinet where you are still tracked, but to a significantly lesser degree, especially if you pay attention to what you do and how you use the Patrin.
[8] Part III: Untracked Internet (Untrin)
[9] Currently, Untrin does not exist. It is just a dream. But sometimes, dreams do come true. We only need one man with a plan.
[10] Part IV: The Weapon
[11] You should know that the internet (Futrin and later Patrin) was discovered by the CIA and DARPA etc. and forged into a weapon.
[12] Look up any of the millions of pages of documents available to you for free online about the creation of the internet and the parties involved in it. Even the CIA controlled information sources will tell you it is true if you examine the content beyond the headlines.
[13] Part V: Case I - The Cancernet
[14] The purpose of the internet was always to fully enslave us. Everything is fake online: fake information (perception forming), interactions (with bots), validations (by bots), sports (wasted effort on fake wars), games (wasted effort that could have been used to create something) and porn (normalizing non-reproductive sins) etc.
[15] A weapon is not good or bad, it is the man who holds the weapon who decides if he will use it to murder (to please satan) or save the innocent (to please God).
[16] Part V: Case II - Satoshi Nakamoto
[17] The Japanese write their names last name first (Nakamoto Satoshi). Imagine, if you were an agent with a simple paperback dictionary in the streets of Tokyo in the 1960s etc., you could, without any knowledge of Japanese, easily translate: central to naka, source to moto, intelligence to sato and agency to shi, making up a real last name and a popular first name.
[18] This full name could then be used for decades as a joke and also as a simple cold-drop instruction: a reserved hotel room by that name in a homogeneous society (as it once was before the cancer took hold).
[19] Part V: Case III - Inventions
[20] Depending on how you make the calculation: all or almost all inventions ever created were created by White men, by the grace of God.
[21] Part V: Case IV - Antiwhiteism
[22] If you talk about the role of White men in creating the modern world for better or worse, people freak out. Now, why is that? Why would mentioning basic facts enrage and annoy millions of people around the world? The answer is very simple: it is because of their severe antiwhite programming.
[23] Antiwhiteism is the biggest and most vicious evil of our time. White populations have gone from an absolute majority in the world to a 30% minority a century ago and now we are a 2% minority of world population. But Whites are not considered a minority by the ruthlessly evil antiwhites that are in charge of every country and major corporation.
[24] It is extremely important to state these basic things as the White erasure continues worldwide. We need everyone, no matter who they are, to do the right thing and support the right of White people to exist. If reading these basic things upsets you then you too have fallen victim to antiwhiteism that enables this terrible treatment of Whites who have done nothing but help mankind as predicted by God.
[25] If you are antiwhite, then know that we do not consent to your evil ways and your abuse of our kindness and charity towards you! Take off your clothes and remove all modern food, running water, devices and technology from your home and life, as those things were created by us and our ancestors, and we did not create them for you to use, much less to destroy us by abusing them. Stop using our inventions, right now!
[26] You should know that antiwhite was removed from the dictionaries before any of us were alive. Many decades ago, a young boy named Jason Köhne thought he had invented the term antiwhite, but he had merely discovered it as it was erased in modernity. Jason put the term to good use and later worked relentlessly to make the world see that it was under the spell of antiwhiteism (that he invented and coined).
[27] You may contact Jason by searching for his full name, Jason Köhne, or moniker, No White Guilt, on X and YouTube, where he is highly censored and shadowbanned. Please note that we are not associated or affiliated with Jason Köhne (author of Go Free: A Guide to Aligning with the Archetype of Westernkind and inventor of the Go Free method) or The Foundation for White Wellbeing. The preceding and succeeding information or details have not been approved by them and may be inaccurate now or in the future. Always check the original sources!
[28] If you are a US tax resident, please consider making a tax-deductible donation to the 501(c)(3) organization called The Foundation for White Wellbeing ("thefoundationforwhitewellbeing dot org") that supports Jason's cause. You can also send Jason ("nowhiteguilt dot org") a personal tax-free gift [Annual Gift Tax Exclusion for 2025 is under $19,000 | Lifetime Estate and Gift Tax Exemption for 2025 is $13,990,000]. Thank you, very much!
[29] Part VI: Self-Defense
[30] Someone who understands the core issues surrounding the above-listed cases, which make the internet a weapon of choice for the enemies of mankind, needs to use self-defense by creating the real internet (Rein). This someone needs not to be an evil man with a soft machine gun hand (incremental change), but rather a good and righteous man with a great vision.
[31] This time, the internet needs to be anonymous (private and secure), on a technical level, as well as to provide real information, real consensus forming, private bartering, virtual private membership associations (VPMAs), independent creation of physical objects and real anonymous money (not the CIA-created tracked cryptos that are linked to real identities and fully-controlled exchanges) etc.
[32] Part VII: Open Letter
[33] This is an open letter to that someone, a very special White man. Maybe you can help us, God willing! We, the mankind, are drowning right now. Ultimately, only Jesus can save us, but maybe you can give us more time to wake up people. If you fail, the internet will be run inside the bodies of slaves who have accepted the mark of the beast [please see the countless official documents and videos available online from the UN, WHO, CIA, DARPA, largest technology corporations and influential think tanks].
[34] P.S. Why did we write this letter to expose ourselves as the good guys? Is it not obvious? No CIA agent would be capable of writing this letter. Furthermore, to publicize this letter would go against the purposes of serving satan. Therefore, it is easy to conclude that we are trusthworthy.
[35] In honor of that White man.
Acceptance of the Site Privacy Policy (SiPP)
[36] By using the Site, you agree to the collection, use and disclosure of the PID in accordance with the SiPP. Unless otherwise defined in the SiPP, the terms used in the SiPP have the same meanings or definitions as those in the Site Terms of Use (SiToU), accessible through the website here.
[37] You agree to fully accept the SiPP electronically by continuing to use the Site. Please read the SiPP carefully. If you disagree with the SiPP you must stop using the Site immediately.
[38] By contacting us, you consent and fully agree to the SiPP. You may choose not to consent and fully agree to the SiPP by never contacting us.
Data Controller
[39] The Site is operated by the Site Operator (SO), DV PR INT'L SERVICES A GA (DPISAG) d/b/a STEALTH, that is responsible for the collection, use and disclosure of the PID in relation to the Site.
[40] Please see the SiToU, accessible through the website here, for more information regarding the SO.
[41] Please contact us here. When you contact us, your contact request is viewed by the Service Coordinator (SC), UV RL INT'L SERVICES AL (URISA), that will redirect your message and/or questions to the SO for issues relating to the Site or SiPP. Never send us unsolicited personal details or attachments.
The Personal Information or Data (PID)
[42] The PID is any information or data relating to an identified or identifiable individual.
Collection
[43] The PID collected includes: the Private Authentication Codes (PriACs), one-time codes (OTCs), contact references (CRs), emergency references (ERs), IP addresses, pieces of extra information entered within the URLs, generated sales codes, other automatically or manually generated codes and/or classifications, pieces of information regarding service or sales events, correspondence or message records, suggestions or comments, website related logs, browser-generated data instances and personal code lists.
Processing
[44] The purposes of processing the PID are to provide services, customer support, analytics and security as well as to fulfill contractual obligations and legal compliance requirements.
[45] These are the legal bases for processing the PID: contract (to provide services and to fulfill contractual obligations), legal obligation (to fulfill legal compliance requirements) and legitimate interests (to provide customer support, analytics and security).
[46] Contract means that the processing is necessary to perform contracts. Legal obligation means that the processing is necessary to be compliant with legal obligations. Legitimate interests mean that the processing is necessary for the purposes of legitimate interests pursued by the relevant parties as long as they do not override individual interests, rights or freedoms.
Retention Period
[47] We will only retain the PID as long as is needed for the previously mentioned purposes. This varies significantly from seconds to years.
[48] Specifically, the retention period for the PriACs, OTCs, CRs and ERs can be anywhere from hours, days, weeks, months or even years. The exact retention period in a particular case depends on the duration of the interaction.
[49] Alternatively, you may choose to have all the PID, that we are able to link or relate to you, deleted immediately after your interaction with us (if no legal obstacle exists). If you choose to do so, then you will have to start your next interaction with us as a tabula rasa (blank slate).
Disclosure
[50] We may disclose the PID only to the following categories of recipients: contractual third parties and regulatory authorities. The PID may be disclosed for the purposes of fulfilling contractual obligations or complying with legal obligations.
[51] The PID may be transferred to or exchanged with third parties that the SO has contracted or is contractually obligated to allow to process the PID, including but not limited to: performing translation services.
[52] In such cases the SO will contractually bind these third parties not to disclose, use or act upon any of the PID received or processed as part of the contract. The SO is not required to use the same contract or terms to bind all third parties to secrecy but may elect to use custom contracts with any of these third parties.
[53] The SO may disclose the PID to competent authorities of governments, law enforcement officials and/or other official entities, if they provide sufficient evidence which form a legal grounds for them to acquire that information, as determined by the SO in its sole discretion.
[54] If this situation arises, the SO may inform the Persons or Companies (PerComs) that they are the targets of requests to submit the PID. It is very important to understand that this will not occur if the SO is bound to secrecy by receiving a gag order or other legally enforceable measure from these authorities.
International Transfers
[55] We may transfer the PID internationally. The PID may be transferred outside the European Union (EU) or European Economic Area (EEA) to other jurisdictions in ways allowed by applicable data protection laws. To safeguard the PID we implement appropriate measures to ensure the secure transfer of the PID.
[56] We intend to transfer the PID as few times as possible. You may choose not to have the PID related to you sent outside of your home country or jurisdiction, but this may make it impossible for you to use the Site or interact with us.
[57] If you are physically present within the EU or EEA, you may choose to have the PID related to you remain within the EU or EEA by notifying us, but this may make it impossible for you to use the Site or interact with us.
[58] If you reside outside the EU or EEA you may choose not to have the PID related to you sent to the EU or EEA by notifying us, but this may make it impossible for you to use the Site or interact with us.
[59] Please refer to the section of this document focusing on your rights for more information related to this matter.
[60] You may contact us regarding this matter as specified in this document.
Your Rights
[61] You have the following rights: right of access, right to rectification, right to erasure (a.k.a. right to be forgotten), right to restrict processing, right to data portability, right to object, rights related to automated decision-making and profiling and right to withdraw consent.
[62] The right of access grants you the right to know if the PID related to you is being processed. If so, you have the right to access it and obtain information about its processing.
[63] The right to rectification gives you the right to correct the PID related to you if it has inaccuracies or missing parts.
[64] The right to erasure (a.k.a. the right to be forgotten) allows you to delete the PID related to you if it is no longer needed for the purposes of processing it or if you withdraw your consent.
[65] The right to restrict processing affords you the right to restrict the processing of the PID related to you when you contest the accuracy of the PID related to you or you object to the processing.
[66] The right to data portability is not applicable in relation to the Site as the processing does not occur automatically and the processing takes custom forms and even non-digital or physical forms.
[67] You have the right to object processing of the PID related to you at any time, depending on your particular situation, or any profiling based on the PID related to you.
[68] The rights related to automated decision-making and profiling are not applicable in relation to the Site as the processing is not automated and does not have significant effects on individuals.
[69] The right to withdraw consent means that you have the right to withdraw your previously given consent at any time concerning the PID related to you. This withdrawal of consent does not affect the lawfulness of processing the PID related to you that was based on previous consent.
Exercise Your Rights
[70] You may exercise your rights (as outlined earlier) by contacting us. Do not include any personal details in your first message to us, so no names etc.
[71] We will need to verify that you are the person you claim to be. The verification of identity is a step required to provide security. We will respond to you in one month minus the time it takes to verify your identity. For complicated or multiple requests we will extend the response time by an additional two months.
[72] Please contact us here. When you contact us, your contact request is viewed by the SC that will redirect your message and/or questions to the SO for issues relating to the Site or SiPP. Never send us unsolicited personal details or attachments.
Early Deletion
[73] Please note that in most cases it will be much easier for you to just ask us to delete all the PID related to you when concluding your interaction with us, especially if you are not anticipating that you will contact us again.
[74] This way, you will not have to go through the process of verifying your identity when contacting us later to have the PID related to you deleted. This is important if you hold an active PriAC or OTC etc..
[75] In most cases, if we can reasonably assume that our interaction has concluded or that no interaction has occurred within a reasonable time period, as determined by the SO in its sole discretion, then we will delete all the PID related to you.
Links to Other Websites
[79] The Site may contain links to other websites that are not operated by the SO.
[80] It is highly recommended that you do not visit any other websites while using the Site. Do not have any other browser windows or tabs opened when visiting the Site.
No Children
[81] The Site is not intended for anyone under 18 years of age (the "Children"). We do not knowingly collect or use the PID from the Children.
[82] If you are a parent or guardian and you are aware or suspect that the Children in your care have provided us with the PID relating to them, please contact us immediately so that we may confirm that the PID exists and delete the PID.
More Information
[83] Please contact us if you have any questions or issues relating to the Rules of the Site or the SiPP document. Do not send us any unsolicited personal details or attachments.
Last Updated
[84] We may update the SiPP from time to time. We will notify you of any changes by posting a new version of the SiPP on this page. You are advised to review the SiPP periodically for any changes or any time you use the Site.
[85] Any changes made to the SiPP are effective immediately after they are posted on this page. The SiPP was last updated on July 1, 2025.
stealthpitch.com /site-privacy-policy #social-media
Social Media
[77] We do not use social media. However, we use SocialC™ that is a static social media. It is private and it does not allow interactions within the same platform or website. Our SocialC™ website does not collect your data.
[78] Third parties may duplicate our SocialC™ posts on their social media. Social media websites or apps have their own privacy policies.