Your browser (Internet Explorer 6) is out of date. It has known security flaws and may not display all features of this and other websites. Learn how to update your browser.
X

Privacy Policy


The Phoenix Team takes your privacy very seriously, aiming to protect it. We value your adoption of our viewer and take necessary steps to ensure that we meet and hopefully exceed your expectations. Please find below a full disclosure of exactly what we connect to and the information that is gathered. Of course, we will never sell or give out your email or any of the data we collect. It is for internal use only. (An email is only gathered and stored for registration on our Jira which is used for support and bug reports, if you sign up. That email is kept private and confidential.)

General website: We collect logs as any apache server would do for accessing a website. No enhanced logging is installed

Error log format and info:

[Wed Oct 11 14:32:52 2000]
[client 127.0.0.1] client denied by server configuration: /export/home/live/ap/htdocs/test

Access Log Format and info:

127.0.0.1 – [10/Oct/2000:13:55:36 -0700] “GET /apache_pb.gif HTTP/1.0″ 200 2326 “http://www.example.com/start.html” “Mozilla/4.08 [en] (Win98; I ;Nav)”

These are standard logging formats that all web servers gather across the web. Please see http://httpd.apache.org/docs/current/logs.html For what apache gathers by default and can gather. We use the standard format.

SOURCE REPO anonymous read only access is enabled and is subject to the Apache logs.

Viewer Upon connecting it connects to phoenixviewer.com/app/login This displays the login page you see. The client also connects to the web server to gain the xml file for viewer client tags. This client tag only shows a UUID for the designated viewer texture and its known name. The viewer checks itself via a simple check by sending its channel and version number to see if we have disabled that version. If it is disabled it will ask you to redownload the client. The rest of the connections are directly from your computer to the SL Servers and do not hit our servers. We do not store or receive any user logins, names or passwords. We do have Anonymous Google analytics on the login page so we can see how many logins we currently have and have had.

Install During the install we connect to the website to grab a zip file of the dlls and slvoice that we need to run Phoenix. This connects to apache with logs according to the previous disclosed apache logs section. This zipfile is in the downloads section and is freely available. We Only build from source that is available on our HG repo and its our only repository. We aim to be 100% open and straight forward.

Website and internal tools Redmine Usernames and passwords along with emails are stored in a Mysql database. The passwords are encrypted and the database does not allow for external access. We suggest that you use a public email address and that you do not use the same password for your accounts on Redmine that you use on second life.

We collect crash logs from the Firestorm Viewer. These log files contain information about the viewer version, server version, viewer channel, information about the user’s operating system, the location in the code where the user crashed, the user settings and Second Life name IF the user enables it in Preferences > Crash Reports > “Include Second Life name.” All of this information can be disabled by the user by turning off crash reporting in that same Preferences panel.

If any of the above are to change we will update this policy first before any changes are made.

The General Generic Disclaimer THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.