p I WILL cooperate with law enforcements and provide them with logs, and, if it still there, a file caused problems. Other than such situations logs won't get to the hands of third parties.
p Upload logs include: access time, IP-address, name of a file it was uploaded with, a SHA-256 hash of the file, download name*, size of the file in bytes.
p Each download also being logged and include: access time, IP-address, name of a file it was requested with, download name*.
p *Download name is a salted SHA-256 hash of the file encoded using base64 raw URL encoding.