App Safety & Security

Safety Image

JayWalk is committed to ensuring the privacy and safety of our users.
Learn more about how we accomplish this below.

How are you ensuring data privacy?

🔺 No personal data collected – JayWalk does not require registration or collect any identifying user information. The only data stored is an encrypted device ID, which cannot be linked back to an individual.

🔺 Event data is temporary – All event-related data is automatically deleted after events, ensuring no long-term records exist.

🔺 Global data protection – We plan to migrate data storage outside the U.S., meaning any legal request would have to go through Mutual Legal Assistance Treaties (MLATs)—a complex, multi-step process that limits external access.

🔺 Encryption control – Even if data were subpoenaed, we retain control over encryption keys, ensuring an additional layer of protection.

JayWalk is built to amplify movements, not track users. Our focus is on privacy, security, and nonviolent resistance, ensuring that activism remains protected in an era of increasing digital suppression.

🔺 Open-source transparency – JayWalk's code will be open-source, allowing the community to verify its security measures and ensure we remain accountable to our mission.

What steps are you taking to prevent law enforcement from accessing the app?

We do not track or verify users, meaning we have no way to determine whether someone is law enforcement. Our focus is on protecting protestors' privacy and minimizing risks, not policing access.

🔺 Public events remain public – Most rallies are already shared on social media or require permits, making them visible regardless of JayWalk. Our platform helps amplify movements while bypassing suppression—not creating new risks.

🔺 No personal data is collected – We don't require registration, and only encrypted device IDs are used, meaning there's no identifiable user information to hand over. Event data is also automatically deleted after the event.

🔺 Organizer control features – Moving forward, organizers will have tools to manage visibility and access, including:

  • Access codes and screening for sensitive events
  • Additional safety tools to guide assemblies and mitigate risks

JayWalk is designed to empower movements while minimizing vulnerabilities. While no tool can fully exclude law enforcement from public spaces, we prioritize user safety, anonymity, and control in every decision we make.

How are assemblies screened on JayWalk?

Currently, we're sourcing assemblies directly through verified organizers and Find a Protest, which has a dedicated vetting process to ensure events are organized by credible, nonviolent groups. Their process includes:

✅ Tracking reputable organizers—prioritizing events hosted by groups with a history of peaceful action.

✅ Manually reviewing submissions—to prevent misinformation, spam, or events that don't align with nonviolent resistance.

✅ Filtering out bad actors—any event promoting violence, illegal activity, or misinformation is rejected.

As we grow, we plan to introduce a Verified Organizer system, giving trusted organizers the ability to post directly while maintaining strong vetting criteria.

🛠 Ongoing Safety Measures:

  • Community Reporting System – Users can flag events for review.
  • Tiered Vetting – New organizers will undergo additional screening.
  • Safety Guidelines – We provide resources to help attendees assess event credibility.

While no system is perfect, we are constantly refining our approach to balance accessibility with security.

JayWalk Logo

A secure platform designed to help activists and allies organize, mobilize, and resist suppression worldwide.

Contact & Legal
Contact Us

JayWalk is a platform for connection. We do not organize or assume responsibility for listed events.


Copyright © 2025 JayWalk App. All rights reserved.

Brought to you by Tech for Palestine