A Private Membership for Private People.

Privacy & Security

Your privacy is important to you. We get that.

Consent Amour understands that what you do behind closed doors is private. That’s why we’ve built our app using top-level encrypted security and destroy all communication records and multimedia files after 30 days. Our records remain available to you—and only you—just long enough that, should you need them, you can access them. After 30 days, your records, photos, videos, messaging will be deleted and wiped clean from our servers.*

We never:  

•    Upload your contact book
•    Sell your personal information
•    Store your IP address or UDID

We allow you to: 

•    Find others without uploading your contacts
•    Send and receive messages, pictures, and videos
•    Chat privately with encrypted messaging
•    Be anonymous; your communications and records cannot be tracked or monitored

Want to try it? Get Consent Amour for the iPhone or for the Android. Free Trial

Virtually Uncrack-able

The last thing you want to worry about is your information being accessed or exposed. The Consent Amour App uses 2048-bit encryption for our SSL’s, which means we are able to stop even the most sophisticated hackers. We ensure that your information is protected by using only the strongest encryption on the market today. It’s virtually uncrack-able.

Bullet-Proof Security 

We know how critical your privacy is with our application, which is why we go to great lengths to protect it.  Our pp uses AWS cloud infrastructure, which is designed to safeguard your information and maintain the highest levels of privacy and data segregation. 

Constantly Monitored 

Security never sleeps and neither do we. The Consent Amour App is protected by an extensive network and security monitoring system, which continuously scans and tests the app for any potential security breaches, allowing you peace of mind when it comes to your private information.

Security Highlights

  • First Level Data Security Industry Standard SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral and is used by most financial institutions.
  • Password Encryption
  • Self-Destruct (Automatic Self Destruction) of Data, Photos, Multimedia & Communications
  • Third-Level Identification Verifiers: Email, Phone, & Payment

*The only data retained is subscriber information.