Privacy & Data Sovereignty

Welcome to The Fallen Pears Archives. This website operates under a strict philosophy of complete digital independence and data minimization. We believe that your attention, your location, and your digital footprint are your own property, not commodities to be harvested by corporate tech monopolies.

The Technical Baseline: Zero Tracking

When you visit this archive, you are entering a secure, static environment. We have explicitly engineered this site to block standard corporate surveillance mechanisms.

  • No Third-Party Cookies: We do not allow Google, Meta, or any other advertising network to inject tracking cookies into your browser through our site.
  • No Analytic Harvesting: We do not use invisible analytics scripts to log your IP address, track your cursor, or monitor how long you read a page.
  • No Bloatware: This site is built on lightweight, open-source infrastructure. We have stripped out all unnecessary “companion plugins” and corporate widgets to ensure your connection remains fast, secure, and private.
  • Encrypted Connections: Every page, download, and image on this site is served over a strict, server-level encrypted connection (https://). Your activity here is secure.

If you are simply reading our manuscripts or looking at the local outpost map, your digital footprint remains completely invisible.


Why This Matters: The Reality of Institutional Data Abuse

We maintain absolute control over our digital infrastructure because modern institutions—even those claiming to operate as charitable or medical non-profits—have proven completely incapable of respecting basic data boundaries.

The Necessity of Digital Sovereignty In recent real-world interactions, massive, publicly funded organizations have actively ignored formal “Cease of Informal Contact” directives, overridden explicitly written ADA accommodation requirements to force users onto proprietary corporate platforms, and utilized automated marketing systems to blast communications after consent was legally revoked.

When the “non-profit” and medical-industrial complex prioritizes corporate workflow and automated data processing over documented human needs, the only safe response is total digital independence. We do not trust monolithic systems to protect our community’s data, so we built a space where they physically cannot access it.


What Information We Actually Collect (And Why)

Because we believe in total data transparency, we want you to know exactly what happens if you choose to interact with us. The only data processed by this website occurs when you explicitly submit it yourself:

  • Contact Form Submissions: When you use the form on our FAQ / Contact Me page, the information you type (Name, Email Address, and Message) is encrypted and routed directly to our secure inbox (hello@gregpeary.com). This data is strictly used to reply to your inquiry.
  • Data Storage & Retention: We do not maintain a marketing database. Your contact information is never automatically added to a subscription newsletter, sold to third-party brokers, or placed in a public registry.

Your Rights & Permanent Restrictions

We fully respect and honor your right to digital privacy, restriction of processing, and permanent data erasure. If you have previously submitted a message through this site and wish to have your correspondence permanently deleted from our records, you may send a formal instruction to hello@gregpeary.com.

Upon receipt, your personal data will be manually and permanently purged from our systems immediately, without delay or institutional friction.