Back to Docs
◐ For Reviewers
Guide for people submitting anonymous feedback
○ How to Submit Feedback
1
Find a Profile
Browse the public feed or visit a direct link shared with you
2
Write Your Feedback
Type your message (5-5000 characters)
3
Click Submit
Your feedback is encrypted and delivered instantly
◦ No account required — your feedback is completely anonymous
○ Your Anonymity is Guaranteed
- ✓No account required — you don't need to sign in or provide any personal info
- ✓No IP stored — we only keep a non-reversible hash for abuse prevention
- ✓Content encrypted — your message is encrypted before storage
- ✓No tracking cookies — only abuse prevention cookies, no marketing trackers
- ✓Recipient doesn't know who you are — they only see the feedback content
○ Feedback Guidelines
◦ Do
- • Be honest and constructive
- • Provide specific examples
- • Focus on behaviors, not personality
- • Offer actionable suggestions
- • Be respectful in tone
◦ Don't
- • Make personal attacks
- • Include threats or harassment
- • Share confidential information
- • Spam or submit duplicate content
- • Include identifying information about yourself
○ Writing Effective Feedback
Be Specific
✗ "Your presentations are bad"
✓ "Your slides often have too much text, making them hard to read"
Suggest Solutions
✗ "Meetings are disorganized"
✓ "Consider sharing an agenda before meetings to keep discussions on track"
Balance Your Message
Include both positives and areas for improvement. Recognition paired with constructive criticism is more impactful.
○ What Happens After Submission
1
Instant Encryption
Your feedback is encrypted immediately upon submission
2
Secure Storage
The encrypted feedback is stored in our secure database
3
Recipient Access
The applicant can view your feedback in their dashboard
4
No Follow-Up
There's no way for anyone to contact you about your feedback
◦ Important
- • Feedback cannot be edited or deleted after submission
- • You won't receive any confirmation or response
- • Submission limits exist to prevent abuse
- • Abusive content may result in device-level restrictions