Feb 10, 2026 | Documentation | Privacy, Data, FAQ
For the users who check the traffic logs and inspect the manifest, here is exactly how Mako List operates under the hood.
1. Data Persistence & Encryption
2. Zero External SDKs (The "Clean Binary" Promise)
3. Network Independence
4. Data Portability
Sovereignty means the right to leave. We provide simple JSON/CSV export functionality. You own your data in a human-readable format, ensuring you are never "vendor-locked" into our ecosystem.
The "Mako" Security FAQ
Q: If I lose my phone, can you recover my lists?
A: No. And that’s a feature. We do not have a "backdoor" to your data because we don’t have a front door. We recommend using your OS-level device backups (like Google encrypted backups) if you need redundancy. When you first start up the app, you're given the choice to keep your data strictly local, or whether you want to enable Google Encrypted Backups.
Q: How do you make money if you don't sell data?
A: Through simple, honest utility. We believe users will pay for tools that respect them. No hidden agendas, no "data-washing," and no ads. At launch, Mako List v1 is free to beta testers and early adopters. With v2, we will restrict the Smart Paste function and add other features in to a reasonably priced one-time fee (no subscription). Beta testers and early adopters will be grandfathered in and will get continue to get all of the Pro features. That's why you should download it today!