Security & Privacy First

Your Data,
Your Control

Complete transparency about how Querygen protects your WhatsApp data, the real risks involved, and how we minimize them through our secure architecture.

How WhatsApp Connection Works

Your WhatsApp connects through our client app Blip, built on the open-source whatsmeow library. Here's exactly how it works:

Client-Side Architecture

1

Blip runs on your device

Unlike other services that run on datacenter servers, Blip operates directly on your computer or device, just like WhatsApp Web.

2

Uses whatsmeow library

Built on the trusted, open-source whatsmeow library - the same technology used by many legitimate WhatsApp integrations.

3

Selective monitoring

You choose exactly which groups and DMs to monitor. No access to other conversations, contacts, or personal data.

4

Read-only access

Blip cannot send messages, create groups, or modify your WhatsApp in any way. It only reads messages from authorized conversations.

What this means for you:

  • Your primary WhatsApp remains completely separate and secure
  • End-to-end encryption is maintained throughout
  • No server-side WhatsApp sessions that could be compromised
  • You control data access and can revoke it instantly

Security Architecture

Multiple layers of security protect your data throughout the entire process

Client-Side WhatsApp Connection

Your WhatsApp connects through our client app Blip running on your device, not our servers. This ensures your primary WhatsApp session remains secure.

Selective Message Access

Only groups and DMs you explicitly select in Blip are visible to our backend. No other conversations or messages are accessed or processed.

End-to-End Encryption Maintained

WhatsApp's end-to-end encryption remains intact. We only process messages after they're decrypted on your device and you've authorized sharing.

Secure Message Storage

Messages from your authorized groups are securely stored with encryption so you can access, search, and review them through your dashboard.

Complete Lead Management

We store both the original messages and extracted lead data (property details, contacts, pricing) for comprehensive lead management and historical reference.

Enterprise Security Standards

Our infrastructure follows enterprise security best practices with encrypted data transmission and secure access controls.

Privacy Practices

Detailed breakdown of how we collect, process, and protect your data

Data Collection

  • Messages from groups/DMs you explicitly authorize
  • Extracted lead data (property details, contacts, prices)
  • Usage analytics for service improvement
  • Account information for authentication

Data Processing

  • AI processing to extract structured lead information
  • Message storage for search and historical access
  • Automated categorization and tagging
  • Query processing for natural language searches

Data Sharing

  • No data sharing with third parties for marketing
  • Lead data accessible only to your authorized team
  • Anonymized analytics may be used for service improvement
  • Legal compliance sharing only when required

Data Retention

  • Messages and lead data retained for duration of your subscription
  • Historical messages available for search and reference
  • Data deleted within 90 days of account closure
  • You can request data deletion at any time

Security & Privacy FAQ

Common questions about data protection and security

Our Security Commitment

We are committed to protecting your data with industry-standard security practices

Data Protection

Comprehensive security measures to protect your business data and lead information

Privacy Rights

Respect for user privacy with transparent practices and user control over their data

Secure Infrastructure

Modern security architecture with encrypted communications and access controls

Questions About Security?

Our security team is available to answer any questions about our data protection practices, compliance, or technical architecture.