a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aa a a a a a a a a a a a a a a a a a a a
Back to HomeHome
Will You Subscribe?
 
 
Why ask?
Why Subscribe?
You will be made aware when interesting stuff is added to the site, like new features, new privacy protections, new wares in the shop, or blog posts, all with the goal of sparking your curiosity and nudging the limits of possibility.
Are There Other Ways To Subscribe?
Sure, use the RSS feed or follow Aytwit on Twitter or Instagram or Facebook or our video channels or GitHub or - umm, I guess that's it!
Why are you asking me a math problem?
Automated registration bots started using this subscription form to send emails to people who likely had their account hacked on some other website. For example let's say Bob's Amazon account is hacked and the hacker orders themself an expensive goodie. In order to hide the email confirmation of the purchase from Bob, the hacker will use sites such as Aytwit to spam Bob with dozens of emails. So the simple math problem is to make it a little more annoying for the bots, and thus more annoying for you. Sorry. Another solution would be to use something like Google ReCAPTCHA, but this would violate Aytwit's privacy policy.
Will You Spam Me?
I'm shooting for updates about once a month at the most, if that answers your question.
How Do You Store My Email Address?
Wow nobody usually cares about that, but since you asked, your email address is stored in a database just like on any site, but is actually stored by us in our own database and not anybody else's. You're probably like "so what?", but keep in mind that most people have their subscriber lists managed by random 3rd party services that can have data breaches or even do slimey ad-tech tracking stuff. I mean so can I, but trusting one person is safer than two. Aytwit also encrypts your email address before saving it, which is beyond what most subscriber list systems do. This means that if a database leak happens the hacker will just get a big list of random data and your email address will be impossible to extract unless the hacker penetrates a separate line of defense as well, the "vault" for the encryption key. As a physical analogy, it's kind of like keeping your email on a piece of paper inside a locked safe inside my locked house with an alarm, whereas most people are keeping your email in a shady self-storage place that might be looking through your stuff. Anyway the point is I'm doing the most that can be done in an "information-theoretic complexity" kinda way. So you're welcome.