Privacy Policy for Mail Server Builder

Last Updated: February 14, 2026

Mail Server Builder ("the Software") is designed with a "Privacy-First" approach. Because the software is a local desktop application and not a SaaS platform, we do not have access to your private server data.

1. Data Collection and Storage

  • Local Processing: All data entered into the Software (including VPS IP addresses, root passwords, and domain names) is processed locally on your machine.
  • No Credentials Transmission: We do not collect, store, or transmit your server credentials (passwords or SSH keys) to our servers or any third party. This information is used solely by the Software to establish a direct SSH connection between your computer and your VPS.
  • Installation Logs: Any logs generated during the mail server installation are stored locally on your computer for debugging purposes.

2. Third-Party Links and Affiliation

The Software includes a "VPS Wizard" that provides links to third-party hosting providers (e.g., Vultr, DigitalOcean, Contabo).

  • Affiliate Links: Some of these links are affiliate links. If you click on them and purchase a service, we may receive a commission at no extra cost to you.
  • Third-Party Policies: Once you leave the Software or click an external link, you are subject to the privacy policies of those third-party providers. We do not control how they handle your data.

3. Server-Side Changes

The Software is designed to install and configure mail services (Postfix, Dovecot, etc.) on your Ubuntu VPS. By using the Software, you acknowledge that:

  • You are granting the Software permission to modify your VPS configuration.
  • You are responsible for the security of your VPS (e.g., changing passwords, firewall management).

4. Telemetry and Analytics

To improve the Software, we may collect anonymous usage statistics (such as the number of successful installations or software crashes).

  • This data does not include IP addresses, passwords, or any personally identifiable information.
  • It is used strictly to identify bugs and improve the success rate of deployments.

5. Security

While the Software uses secure SSH protocols to connect to your server, the security of your local machine is your responsibility. We recommend running the Software in a secure environment and using fresh VPS instances for new installations.