Disclaimer
Decoy Phrase is an open-source, experimental security tool provided on an “as is” and “as available” basis, without any warranties of any kind, express or implied.
By using this software, you acknowledge that Decoy Phrase is a technical tool designed to operate without custody, without access to user data, and without the ability to recover lost information.
No Warranty
Decoy Phrase is designed to minimize trust, eliminate custodianship, and reduce attack surfaces through a zero-knowledge, offline-first architecture. Security ultimately depends on the user’s operational practices, device integrity, and key management.
While permanent storage networks are designed for long-term data durability, the Service does not warrant accessibility, usability, or recoverability in cases of encryption errors, loss of keys, software incompatibility, network disruption, device failure, hardware failure, or user error.
The Service does not guarantee uninterrupted operation, continuous availability, correctness of output, or compatibility with future systems, platforms, browsers, operating systems, or cryptographic standards.
User Responsibility
You are solely and fully responsible for:
Safeguarding your decoy text, mapping files, encryption keys, and passwords
Maintaining secure backups and proper storage separation
Protecting your devices from malware, loss, theft, compromise, or unauthorized access
Verifying the correctness of any output generated by the software
If mapping files, passwords, or encryption keys are lost, corrupted, destroyed, misconfigured, or rendered unusable, your original data cannot be recovered.
Decoy Phrase has no technical ability to restore, access, decrypt, reconstruct, or recover your data under any circumstances.
All risks associated with data protection, access, misuse, or loss are borne entirely by the user.
No Custody / No Access
Decoy Phrase is a strictly non-custodial and zero-knowledge system.
The Service Provider, maintainers, developers, and contributors:
Do not store user encryption keys
Do not store original sensitive data
Do not have access to any encrypted content
Cannot decrypt, view, recover, reconstruct, or access user data
By design, no party involved in the development or distribution of Decoy Phrase has any technical capability to assist in data recovery, access restoration, or content decryption.
Open-Source Disclaimer
Decoy Phrase includes open-source software components and may be modified, forked, audited, or redistributed by third parties.
The Service Provider does not guarantee:
The correctness, security, or integrity of modified or forked versions
The behavior of third-party builds, distributions, or integrations
The absence of bugs, vulnerabilities, or implementation errors
You are solely responsible for reviewing, auditing, and validating any version of the software you choose to use.
Contributors and maintainers provide the software in good faith but assume no responsibility for how the software is used or modified.
No Financial, Legal, Custody, or Security Advice
Decoy Phrase does not provide financial, legal, investment, custody, inheritance, or professional security advice.
The Service is a technical tool only. You are solely responsible for determining whether the Service is appropriate for your specific use case, including the protection of digital assets, credentials, cryptographic material, seed phrases, private keys, or sensitive information.
Nothing provided by Decoy Phrase shall be construed as professional advice, fiduciary duty, custodial service, or a guarantee of asset protection.
Limitation of Liability
To the maximum extent permitted by applicable law, Decoy Phrase, its maintainers, contributors, developers, licensors, and distributors shall not be liable for:
Any loss of data, digital assets, credentials, encryption keys, or access
Any loss of cryptocurrency, tokens, NFTs, or digital property
Any financial loss, business interruption, reputational damage, or opportunity loss
Any indirect, incidental, special, exemplary, punitive, or consequential damages
In all cases, the total aggregate liability of all providers shall not exceed the amount paid by the user for the Service, if any.
Acknowledgement of Risk
By using Decoy Phrase, you expressly acknowledge and agree that:
The system is non-custodial and irreversible by design
Data recovery is impossible without the correct mapping files and encryption keys
Permanent storage and Permaweb infrastructure are designed to provide long-term data durability and availability, but access and recoverability depend entirely on the availability of encryption keys
Software, cryptography, hardware, and networks may fail or evolve
Full control over data necessarily entails full responsibility for data protection
You use Decoy Phrase entirely at your own risk.
Last updated
