Transparency Report — 2024 Q3
Disclosure scope
We deliberately do not publish a classic "warrant canary." The compelled-speech legal theory that canaries rely on has never been tested in court and is materially weaker in Australia, where Saropa Pty Ltd is registered. The scope statement above is a legally clean version: it makes no claim about gagged requests we cannot acknowledge, only that this report is complete within the limits the law sets.
Government data requests
Data breaches
Account takedown requests
Analytics collection
Saropa does not publish aggregate user counts in transparency reports. Install counts, crash-report counts, analytics-event counts, and opt-in percentages all stay out of the report by deliberate policy. This is a permanent product decision, not a pending extraction.
The report documents what happened with user data — government requests, breaches, takedowns, and the SDKs that had access during the period. Aggregate install and engagement numbers are a different conversation (marketing / growth) and are not published here.
The companion JSON carries the analytics block as a policy marker
(status: "not_published_by_policy") with every numeric subfield
permanently null, so automated consumers recognize the exclusion
rather than treat it as missing data.
Third-party SDK audit
Every SDK integrated in Saropa Contacts during this period that handles user data,
attestation, or permissions. Reconstructed from the state of the app's
pubspec.yaml at the last commit on or before the quarter end.
| SDK | Purpose | Data seen | Trigger | Opt-out |
|---|---|---|---|---|
firebase_core
(v3.6.0) |
Firebase app bootstrap |
|
App start, if analytics infrastructure is enabled and the user is not COPPA-age |
|
firebase_analytics
(v11.3.3) |
Screen + feature usage tracking |
|
User explicitly opts in via AnalyticsIntegrationEnabled (opt-in default from Q2 2026) |
|
firebase_crashlytics
(v4.1.3) |
Crash reports |
|
Captured on every install; uploaded when analytics opt-in AND online (from Q2 2026, previously uploaded whenever present) |
|
firebase_app_check
(v0.3.1+3) |
Anti-abuse attestation for Firebase requests |
|
Automatic when the app makes Firebase API calls |
|
supabase_flutter
(v2.6.0) |
Account, Saropa Connections, stats upload, Connection Discovery, E2EE contact sharing |
|
User signs in; individual cloud-feature toggles |
|
google_sign_in
(v6.2.1) |
Google account sign-in |
|
User chooses 'Sign in with Google' |
|
sign_in_with_apple
(v6.1.2) |
Apple account sign-in (iOS) |
|
User chooses 'Sign in with Apple' |
|
local_auth
(v2.2.0) |
Biometric unlock for per-contact lock |
|
User enables biometric lock on a contact |
|
permission_handler
(v11.3.1) |
OS permission prompts |
|
App requests a permission |
|
flutter_contacts
(v1.1.8+1) |
Device contacts access |
|
User grants contacts permission and chooses to import |
|
geolocator
(v13.0.1) |
Device location (for real-time map features only) |
|
User interacts with a feature that needs location (and has granted the permission) |
|
google_maps_flutter
(v2.9.0) |
Embedded map rendering |
|
User opens a map view |
|
image_picker
(v1.1.2) |
Photo / image selection |
|
User taps a 'choose photo' control |
|
app_links
(v6.2.0) |
Deep-link / URL-scheme handling |
|
User taps a saropa:// or https://saropa.com/... link |
|
Changes since last report
- Facebook Sign-In was removed (flutter_facebook_auth package pulled). Existing Saropa accounts linked to Facebook continued to work, but new sign-ins via Facebook were no longer offered. Users can sign in with Google or Apple, or create a Saropa account directly.
- No other data-handling SDK additions or removals this quarter.
How to contact us
If you believe this report is incomplete or incorrect — or if you have a researcher question about any SDK in the audit table — email transparency@saropa.com. The mailbox is monitored; we aim to acknowledge within 72 hours and give a substantive reply within 14 days. Corrections are published in a follow-up report rather than edited into this one, so the audit trail stays intact.