Cale Byers

Privacy Policy

This page details two privacy policies: my photography and this website. I also have some online privacy tips, which I update occasionally.

My Photography

Shooting with analog film is generally more private and easier to protect than using digital equipment, since you can't hack a vintage camera from the 70s. At no point is a computer required for developing a film photo. If you prefer a secure and private way of developing photos, I can do it myself in a darkroom. Otherwise, all film processing and scanning is handled by Blue Moon. They upload scanned files to Dropbox, and they regularly delete their files, to minimize their storage costs. More than likely, this means your photos will be scanned by the NSA, FBI, CIA, etc. Keep this in mind when you touch any computer.

I can encrypt your digital files, save them on physical storage (USB, DVD, etc), or send them over the internet, providing a little more security and privacy. However, it's a lot easier to just shoot film and trust me with your photos, rather than trust Silicon Valley's free photo sharing services and shiny tech gadgets.

This Website

I pay for web-hosting with NearlyFreeSpeech.Net, a US company that values free expression. My web-server knows your IP address and User-Agent when displaying webpages, since it needs to know where to send the webpage. Like many websites, I collect server logs, occasionally review them, and then delete them. They provide almost no personally identifiable information. When you connect to the internet, your device is assigned an IP address that represents this "location." It's common for many devices to share one IP address, so it's not regarded as a uniquely identifying piece of information. However, if you're bothered by the design of the internet, you can use Tor or a VPN to hide your real IP address. The server log only tells me which files or pages are popular, and which IP requested them. I don't use Google Analytics or other web-browser surveillance tools. I want my site to be fast, small, and respectful of your privacy, so nothing happens in your web browser or on your computer to violate your privacy.

Here is an example entry from my access log, showing a request for a photo: - - [02/Jan/2020:17:12:13 +0000] "GET /images/astoria-bridge.webp HTTP/1.1" 200 69860 "Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0"

This tells me that a computer at downloaded a photo on January 2, 2020, and they used the Firefox browser to view my website. I delete these logs monthly.

You can inspect my pages in your browser, and you'll see that there are no trackers or other surveillance tools. I don't use cookies, and I don't have advertisements. I use a small Javascript library called Barba.js, to make my site faster. It loads other pages in the background, rather than doing a complete page load.

My contact page offers an email address served by ProtonMail. They are regarded as a very private email service, and I trust them more than Gmail. I do not have a cell phone, because they are inherently insecure.