Disclaimer

Decoy Phrase is an open-source, experimental security tool provided on an “as is” and “as available” basis, without any warranties of any kind, express or implied.

By using this software, you acknowledge that Decoy Phrase is a technical tool designed to operate without custody, without access to user data, and without the ability to recover lost information.

No Warranty

Decoy Phrase is designed to minimize trust, eliminate custodianship, and reduce attack surfaces through a zero-knowledge, offline-first architecture. Security ultimately depends on the user’s operational practices, device integrity, and key management.

While permanent storage networks are designed for long-term data durability, the Service does not warrant accessibility, usability, or recoverability in cases of encryption errors, loss of keys, software incompatibility, network disruption, device failure, hardware failure, or user error.

The Service does not guarantee uninterrupted operation, continuous availability, correctness of output, or compatibility with future systems, platforms, browsers, operating systems, or cryptographic standards.

User Responsibility

You are solely and fully responsible for:

  • Safeguarding your decoy text, mapping files, encryption keys, and passwords

  • Maintaining secure backups and proper storage separation

  • Protecting your devices from malware, loss, theft, compromise, or unauthorized access

  • Verifying the correctness of any output generated by the software

If mapping files, passwords, or encryption keys are lost, corrupted, destroyed, misconfigured, or rendered unusable, your original data cannot be recovered.

Decoy Phrase has no technical ability to restore, access, decrypt, reconstruct, or recover your data under any circumstances.

All risks associated with data protection, access, misuse, or loss are borne entirely by the user.

No Custody / No Access

Decoy Phrase is a strictly non-custodial and zero-knowledge system.

The Service Provider, maintainers, developers, and contributors:

  • Do not store user encryption keys

  • Do not store original sensitive data

  • Do not have access to any encrypted content

  • Cannot decrypt, view, recover, reconstruct, or access user data

By design, no party involved in the development or distribution of Decoy Phrase has any technical capability to assist in data recovery, access restoration, or content decryption.

Open-Source Disclaimer

Decoy Phrase includes open-source software components and may be modified, forked, audited, or redistributed by third parties.

The Service Provider does not guarantee:

  • The correctness, security, or integrity of modified or forked versions

  • The behavior of third-party builds, distributions, or integrations

  • The absence of bugs, vulnerabilities, or implementation errors

You are solely responsible for reviewing, auditing, and validating any version of the software you choose to use.

Contributors and maintainers provide the software in good faith but assume no responsibility for how the software is used or modified.

Decoy Phrase does not provide financial, legal, investment, custody, inheritance, or professional security advice.

The Service is a technical tool only. You are solely responsible for determining whether the Service is appropriate for your specific use case, including the protection of digital assets, credentials, cryptographic material, seed phrases, private keys, or sensitive information.

Nothing provided by Decoy Phrase shall be construed as professional advice, fiduciary duty, custodial service, or a guarantee of asset protection.

Limitation of Liability

To the maximum extent permitted by applicable law, Decoy Phrase, its maintainers, contributors, developers, licensors, and distributors shall not be liable for:

  • Any loss of data, digital assets, credentials, encryption keys, or access

  • Any loss of cryptocurrency, tokens, NFTs, or digital property

  • Any financial loss, business interruption, reputational damage, or opportunity loss

  • Any indirect, incidental, special, exemplary, punitive, or consequential damages

In all cases, the total aggregate liability of all providers shall not exceed the amount paid by the user for the Service, if any.

Acknowledgement of Risk

By using Decoy Phrase, you expressly acknowledge and agree that:

  • The system is non-custodial and irreversible by design

  • Data recovery is impossible without the correct mapping files and encryption keys

  • Permanent storage and Permaweb infrastructure are designed to provide long-term data durability and availability, but access and recoverability depend entirely on the availability of encryption keys

  • Software, cryptography, hardware, and networks may fail or evolve

  • Full control over data necessarily entails full responsibility for data protection

You use Decoy Phrase entirely at your own risk.

Last updated