Your Privacy Matters

Privacy & Security at Tealight

We understand that your messages are personal. That's why we've built Tealight with privacy and security at its core, using industry-leading encryption and security practices to keep your data safe.

What Information We Process

Tealight only processes and stores messages for contacts that you explicitly choose to sync. Here's what that means:

  • User-Controlled Analysis: You choose which contacts to mark as in Tealight. We only process messages from these specific selected contacts—not all contacts within your messaging apps.
  • Linked Messaging Apps: Tealight can link to WhatsApp, Instagram, and Messenger. However, linking an app doesn't give us permission to process all your messages. We are only allowed to process messages from the specific contacts you mark as within that linked app.
  • Your Consent Matters: Every message we analyze is one you've given explicit permission for through your app settings. You can revoke access at any time by disconnecting your messaging app from Tealight, which immediately stops all data access.

How We Protect Your Data

End-to-End Encryption
All messages are encrypted before being stored in our database

Your messages are encrypted using industry-standard encryption algorithms. The database stores only encrypted messages data, anyone viewing it would see random letters and numbers, not your actual messages (more on this later).

Individual Encryption Keys
Each user has their own unique encryption key

Every Tealight account uses a separate encryption key. This means your data is isolated and protected independently, maximizing security even in the unlikely event of a breach.

Secure Storage
Encrypted at rest and in transit

Your data is encrypted both when stored on our servers and when transmitted over the internet. We use secure, monitored infrastructure to prevent unauthorized access.

Limited Access
Strict internal access controls

Only essential systems have access to encrypted data. Our developers and staff cannot read your messages—they only see anonymized, encrypted information.

What Encryption Looks Like

OriginalEncrypted
Your Messages
Your actual messages are transformed into random-looking encrypted data that's meaningless without your unique encryption key. This ensures your privacy is protected at all times.
Unique encryption key:
Generating...

AI-Powered Insights

How AI Analysis Works
To provide you with meaningful insights about your relationships and communication patterns, Tealight uses artificial intelligence to analyze your messages. Here's what you need to know:
Decryption for Analysis: When your messages are sent to our AI partners for analysis, they must be temporarily decrypted. This is necessary for the AI to understand and analyze the content.
Your Identity is Protected: We limit AI partner access to only the specific data required to process your messages and deliver your requested insights.
Only Active Contacts: We only send for processing messages from active contacts you've chosen to sync. Other conversations remain private and are never obtained nor processed.

Your Rights & Control

You have full control over your data. Here are your rights as a Tealight user:

  • Choose What to Analyze: You decide which contacts and conversations are processed in Tealight.
  • Data Deletion: You can request deletion of your data at any time through your account settings or by contacting us.
  • Disconnect Apps: You can disconnect any messaging app at any time, and we'll stop accessing messages from that platform and remove all data associated with it.

Last updated: November 10, 2025

This privacy policy is subject to change. We will notify users of any material changes via email or through the app.