Terms of Service

Introduction

Decoy Phrase is a service/platform designed to secure users’ sensitive data through a transform & separate technique. The system operates on an offline-first principle, where all sensitive processes (generation of decoy text, creation of mapping files, and recovery of original data) are performed entirely on the user’s device without requiring an internet connection.

Decoy Phrase never stores any original sensitive data and applies a zero-knowledge principle: the service provider has no technical access to the contents of user data.

By using this Service, users are deemed to have read, understood, and agreed to all terms and conditions stated herein. These Terms are international in nature and are intended to be applicable globally.

Definitions

chevron-rightDecoy Phrasehashtag

The name of the data-security system or service referred to herein. Decoy Phrase works by transforming secret data into ordinary text (“decoy text”) that appears meaningless.

chevron-rightServicehashtag

The entire Decoy Phrase service provided by the provider, including software and supporting infrastructure.

chevron-rightUserhashtag

Any individual or entity (company/organization) that uses the Decoy Phrase Service.

chevron-rightService Providerhashtag

The developer and/or operator of Decoy Phrase who provides this Service to users.

chevron-rightSensitive Datahashtag

Confidential user information such as seed phrases, private keys, passwords, recovery codes, or other important personal data that must be protected from unauthorized access.

chevron-rightDecoy Texthashtag

The transformed output of sensitive data generated by the system. Decoy text is designed to appear ordinary and has no security meaning by itself. Without the corresponding mapping file, the decoy text is useless for recovering the original data.

chevron-rightMapping Filehashtag

A special file generated by the system containing the information required to restore the decoy text back into the original data. This file is the only component capable of recovering the original data; without it, recovery is impossible.

Conditions of Use

Users agree to use the Service only in accordance with these Terms and applicable laws. Conditions include:

  • Users must use the Service solely for lawful purposes and comply with all applicable regulations. Any illegal, abusive, or harmful use is strictly prohibited.

  • Users are fully responsible for all data and content processed using the Service, including safeguarding decoy text, mapping files, and related credentials. Any loss or leakage of such information is entirely the user’s responsibility. The Service Provider cannot recover lost data.

  • Users must not upload original sensitive data (such as seed phrases or untransformed files) to Decoy Phrase permanent storage. The system is designed only to store decoy text and encrypted mapping files.

  • Users must follow technical guidelines, including storing decoy text and mapping files in separate locations. Users must use strong passwords, protect devices from malware, and maintain confidentiality of credentials.

User Rights and Obligations

  • To access and use the Service in accordance with these Terms.

  • Users retain full ownership and control over their data, decoy text, and mapping files. All access is controlled by cryptographic keys owned by the user. There are no centralized accounts that can be blocked or reset by any party.

Rights and Obligations of the Service Provider

  • To develop, update, and distribute the Decoy Phrase application in accordance with its design architecture.

  • To modify, suspend, or redistribute the software or parts of the Service at any time for technical or security reasons, including archiving repositories or official websites.

  • To publish notices regarding vulnerabilities, feature changes, or technical risks through official channels.

Limitation of Liability

The Service is provided “as is” without warranties of any kind, express or implied. To the maximum extent permitted by law, the provider shall not be liable for:

  • Loss or damage of sensitive data due to technical failure, user error, or circumstances beyond the provider’s control. Loss of mapping files or passwords resulting in irrecoverable data is entirely the user’s risk.

  • Any direct, indirect, special, incidental, or consequential damages, including loss of profits, business opportunities, or reputation, arising from the use or inability to use the Service, even if advised of the possibility.

  • Service failures caused by external conditions, including unstable internet connections, third-party storage disruptions, or policy changes by third-party providers.

The provider is not responsible for legal, tax, or financial obligations incurred by users in connection with the Service. Any rights not expressly granted herein are excluded.

Security and Responsible Use

Users must maintain a secure operating environment, including:

  • Data Storage: Store decoy text and mapping files separately so that one file alone cannot recover the data.

  • Secure Devices: Use trusted devices with updated operating systems and security software. Avoid public or insecure devices.

  • Passwords & Credentials: Use strong, unique passwords. Never share passwords or key files. The provider will never request or store user passwords.

  • Uploaded Content: Never upload original sensitive data to permanent storage. Permanent storage is immutable and cannot be modified or deleted.

  • Offline-First Design: All cryptographic operations are performed locally. Final data security depends entirely on user responsibility.

Failure to follow these measures may result in irreversible data loss without compensation.

Service Changes

The provider may modify, add, or discontinue features at any time with or without notice. Major changes will be announced through official channels. Users are responsible for reviewing updated Terms. If users disagree with changes, they may discontinue use. Access to locally or permanently stored data remains fully under user control.

Governing Law and Dispute Resolution

These Terms are governed by generally recognized principles of international law. Any dispute shall first be resolved amicably. If unresolved, disputes shall be settled through international arbitration (e.g., UNCITRAL or ICC rules) in a mutually agreed neutral location. Arbitration decisions shall be final and binding.

Final Provisions

By using Decoy Phrase, users acknowledge full understanding and acceptance of these Terms. These Terms constitute the entire agreement between User and Provider, superseding all prior agreements or communications.

If any provision is deemed invalid or unenforceable, the remaining provisions remain in full force. The provider may update this document from time to time, with changes announced to users.

Last updated