Software Disclaimer, Limitation of Liability, and User Responsibility Agreement
This Agreement governs your access to and use of XColdPro, the AES-256 encrypted multi-chain digital asset cold storage platform with proprietary Void Lock Security, developed and published by XDRIP Digital Management, LLC, and is intended to function as a formal enterprise-grade allocation of risk, responsibility, and operational duty between the publisher and each User.
This Software Disclaimer, Limitation of Liability, and User Responsibility Agreement (this "Agreement") is entered into by and between XDRIP Digital Management, LLC, a multi-member limited liability company organized under the laws of the United States ("XDRIP," "Company," "we," "us," or "our"), and each individual or entity that downloads, installs, accesses, or otherwise uses the XColdPro software application and any associated modules, features, protocols, or tools (collectively, the "Software"). By downloading, installing, accessing, or using the Software in any manner, you ("User," "you," or "your") acknowledge that you have read, understood, and agree to be bound by the terms and conditions of this Agreement in their entirety.
If you do not agree to all of the terms and conditions of this Agreement, you must immediately cease all use of the Software and delete all copies in your possession or control.
XColdPro is a proprietary air-gapped software cold wallet designed and engineered to provide AES-256 encryption and an air-gapped operational model for the generation, storage, management, and transaction signing of digital assets across multiple blockchain networks, including but not limited to Bitcoin, Ethereum, Solana, Cardano, XRP, and numerous additional UTXO, EVM-compatible, and non-EVM blockchain protocols.
You further acknowledge that the Software is intended for sophisticated self-custody use cases involving highly sensitive cryptographic material, that misuse may result in catastrophic and irreversible asset loss, and that the Company cannot observe, supervise, reverse, or remediate user-side mistakes after the relevant actions have occurred on-device or on-chain. Accordingly, your continued use of the Software constitutes an express assumption of the operational, technical, and market risks that are inherent in self-custody of Digital Assets.
For the purposes of this Agreement, the following terms shall have the meanings set forth below. Capitalized terms used but not defined in a particular section shall have the meanings assigned to them in this Section 1 or elsewhere in this Agreement.
| "Agreement" | This Software Disclaimer, Limitation of Liability, and User Responsibility Agreement, including all amendments and supplements hereto. |
| "Approved Environment" | The hardware, operating system, firmware, physical environment, and operational security posture recommended or approved by XDRIP for use of the Software, including any air-gap, update, and device hardening requirements. |
| "Approved Usage Guidelines" | The documented security protocols, operational guidelines, best practices, system requirements, warnings, implementation notes, and update instructions published by XDRIP for the proper and secure operation of the Software, as amended from time to time. |
| "Blackhole Protocol" | An optional maximum-security tier within the Software that enables device-binding (permanently associating the wallet with a single machine), full air-gap enforcement, and seed destruction and regeneration capabilities in the event of suspected compromise. |
| "Citadel" | An air-gapped multi-party transaction approval protocol implementing M-of-N signature schemes, enabling Users to create, sign, and finalize transactions across multiple offline parties without requiring online coordination. |
| "Decoy Wallet System" | A plausible deniability mechanism within the Software that enables Users to present a secondary wallet environment that is visually and functionally indistinguishable from a primary wallet but holds no real asset value, designed for use under duress or coercion scenarios. |
| "Digital Assets" | Cryptocurrencies, tokens, coins, non-fungible tokens (NFTs), and any other digital representations of value recorded on a blockchain or distributed ledger. |
| "Loss Event" | Any event resulting in actual or alleged loss, theft, inaccessibility, misdirection, unauthorized transfer, corruption, freezing, impairment, or diminished value of Digital Assets, credentials, or recovery materials. |
| "EMBO" | Emergency Memory Blackout. A triple-pass memory sanitization protocol that overwrites used memory blocks across three passes, layered on top of Python's native memory clearing on close, designed to prevent forensic recovery of sensitive data from volatile memory under typical forensic scenarios. |
| "Lazarus Protocol" | An estate planning and continuity feature that implements a dead man's switch mechanism, enabling Users to establish automated protocols for the transfer of access credentials and asset recovery instructions to designated beneficiaries or heirs. |
| "Module" | Any individual proprietary feature, protocol, tool, or subsystem within the Software, including but not limited to those defined in this Section 1. |
| "Omega Protocol" | A scorched-earth contingency protocol that first sweeps all Digital Assets to User-designated safe addresses, then purges all sensitive data and cryptographic material from the device. Users may alternatively physically destroy the device and restore access later through distributed Shamir shares. |
| "Seed Vault" | The Shamir's Secret Sharing implementation within the Software that enables Users to mathematically split their seed phrase into multiple distributed shares, where a User-defined minimum threshold of shares is required for reconstruction, providing the ultimate backup and recovery security layer. |
| "SentinelGuard" | A real-time, process-level threat detection and neutralization system built into the Software that monitors running processes, identifies potential threats, and terminates malicious activity before it can access or compromise wallet data. |
| "Shamir" / "SSS" / "Seed Vault" | A threshold-based cryptographic scheme (based on the work of Adi Shamir, 1979) implemented within the Software as the "Seed Vault" feature. Mathematically fragments seed phrases into multiple distributed shares, where a User-defined minimum threshold of shares is required for reconstruction. No individual share contains any usable information about the original seed. "Seed Vault" and "Shamir" refer to the same feature throughout the Software and this Agreement. |
| "Software" | The XColdPro application, including all Modules, updates, patches, documentation, and associated materials, in any format or medium. |
| "Third-Party Infrastructure" | Any blockchain network, validator set, RPC endpoint, explorer, hardware device, firmware, operating system, hosting provider, data relay, notification provider, communication service, exchange, bridge, or other external dependency not owned and directly controlled by XDRIP. |
| "User" | Any individual or entity that downloads, installs, accesses, or uses the Software in any manner. |
| "VLS" / "Void Lock Security" | A proprietary cryptographic transformation engine that performs a fundamental transformation of the User's seed phrase. A VLS-transformed seed remains a valid BIP-39 mnemonic phrase and will be accepted by any standards-compliant wallet application. However, when imported into any wallet other than XColdPro, the transformed seed will derive wallets containing zero value. Only XColdPro possesses the proprietary capability to decode a VLS-transformed seed and reconstruct the User's actual wallets and Digital Asset balances. |
| "XDRIP Parties" | XDRIP Digital Management, LLC, and its members, managers, officers, employees, agents, affiliates, subsidiaries, licensors, contractors, and service providers, collectively. |
XDRIP Digital Management, LLC is deeply committed to the security of your Digital Assets. We have invested substantial resources into engineering XColdPro with a security-first architecture that employs AES-256-GCM symmetric encryption, Shamir's Secret Sharing for seed fragmentation, VLS (Void Lock Security) for proprietary seed transformation, full air-gap isolation, real-time threat detection through SentinelGuard, multi-pass memory sanitization through EMBO, and numerous additional physical and digital safeguards. We stand behind our product and our engineering.
User Assurance: When the Software is used in strict accordance with the Approved Usage Guidelines, the security architecture of XColdPro is engineered to ensure that your Digital Assets remain protected against unauthorized access, theft, and compromise. XDRIP will work diligently with any User who experiences a security incident or asset loss arising from the proper use of the Software to investigate the root cause, determine whether a Software defect was involved, and take all commercially reasonable steps to resolve the matter.
Transparency: XDRIP is committed to operating with transparency regarding the security posture of the Software. We will maintain publicly accessible release notes, changelogs, and security advisories to keep Users informed of known issues, applied fixes, and recommended actions. We encourage responsible disclosure and will not take adverse action against any User or security researcher who reports vulnerabilities in good faith through our designated channels.
Continuous Improvement: The security landscape evolves continuously, and XDRIP commits to ongoing investment in research, development, and testing to ensure that XColdPro remains at the forefront of cold wallet security. This includes monitoring emerging threats (including advances in quantum computing, novel cryptanalytic techniques, and supply chain attack vectors), evaluating new cryptographic primitives, and incorporating improvements into the Software on an ongoing basis.
No Custodial Undertaking. The commitments in this Section 2 are commitments regarding engineering effort, support posture, and commercially reasonable remediation behavior. They are not a promise that XDRIP will hold, control, insure, reimburse, or recover any Digital Assets on your behalf, and they do not create any fiduciary duty, agency relationship, trust relationship, or special duty of care beyond what is expressly stated in this Agreement and required by applicable non-waivable law.
XColdPro incorporates several proprietary technologies that fundamentally differentiate it from all other cold wallet solutions, whether hardware or software. Users should understand the nature, scope, and implications of these technologies as they relate to this Agreement and to the User's own security responsibilities.
3.1 Void Lock Security (VLS). The VLS engine performs a fundamental cryptographic transformation of the User's seed phrase at the point of wallet creation or at any subsequent time the User elects to enable VLS protection. The resulting transformed seed is a fully valid BIP-39 mnemonic phrase. It conforms to all BIP-39 standards, passes all checksum validations, and will be accepted without error by any standards-compliant wallet application on any platform. However, the wallets and addresses derived from a VLS-transformed seed outside of XColdPro will contain zero value and zero transaction history. The transformed seed produces real, functional blockchain addresses that appear entirely legitimate, but none of those addresses correspond to the User's actual Digital Asset holdings. Only XColdPro possesses the proprietary decoding capability to reverse the VLS transformation and reconstruct the User's real wallets with their actual balances. This means that even in the event of seed phrase theft through physical theft, coercion, social engineering, or surveillance, the stolen seed is designed to be unusable for accessing the User's actual holdings outside of XColdPro. The attacker receives no indication that the seed has been transformed; from their perspective, the seed simply corresponds to empty wallets.
3.2 Decoy Wallet System. Separate and distinct from VLS, XColdPro provides a plausible deniability mechanism through its Decoy Wallet System. This system enables Users to maintain one or more secondary wallet environments within the Software that are visually and functionally indistinguishable from the primary wallet environment. Decoy wallets may be configured with nominal balances or specific asset distributions to present a credible appearance under inspection. The Decoy Wallet System is designed for scenarios involving physical duress, coercion, forced disclosure, or any situation in which the User needs to present wallet access without revealing their actual holdings. The Decoy Wallet System and VLS are independent, complementary security layers that serve distinct purposes and may be used separately or in combination.
3.3 Blackhole Protocol. Blackhole is an optional maximum-security tier available to Users who require the most extreme security posture. When activated, Blackhole enables the following capabilities: (a) device-binding, which permanently associates the wallet with a single specific machine, meaning the wallet is inoperable on any other device and the wallet's existence is tied to the continued operation of that specific hardware; (b) full air-gap enforcement with integrity verification; and (c) emergency seed destruction and regeneration, allowing the User to nuke the existing seed and generate a new one from scratch if compromise is suspected. When Blackhole is combined with VLS transformation and active air-gap enforcement, the resulting architecture is designed to be highly resistant to known attack vectors, including seed theft, device compromise, and remote exfiltration. Users who activate Blackhole device-binding must understand that if the bound device is lost, destroyed, or rendered permanently inoperable without prior activation of Omega Protocol or without maintaining sufficient Shamir shares for recovery, access to the associated Digital Assets may be permanently and irreversibly lost.
3.4 Omega Protocol. Omega is the scorched-earth contingency option. When activated, Omega executes a two-phase process: first, it sweeps all Digital Assets from all wallets within the Software to User-designated safe addresses on their respective blockchain networks; second, it purges all sensitive data, cryptographic material, seed phrases, private keys, configuration files, and cached data from the device using multi-pass secure deletion. Alternatively, the User may elect to physically destroy the device entirely after the asset sweep, with the confidence that their Digital Assets are safe at the designated addresses and their wallet environment can be fully reconstructed later from distributed Shamir shares. Omega ensures that the User's wealth survives even if the hardware does not.
3.5 Seed Vault (Shamir's Secret Sharing). The Seed Vault is XColdPro's implementation of Shamir's Secret Sharing, enabling Users to mathematically split their seed phrase into a configurable number of shares (N) with a User-defined reconstruction threshold (K). Any K shares can fully reconstruct the original seed, while possessing fewer than K shares does not allow reconstruction of the seed. As a mathematical property of Shamir's scheme, this is independent of the attacker's computational resources, including classical and quantum computation. Users may distribute shares across trusted individuals, physical locations, legal custodians, or safety deposit boxes according to their own security and estate planning requirements. The Seed Vault operates independently of, and is complementary to, the AES-256-GCM encryption that protects all wallet data at rest within the Software.
3.6 Citadel Protocol. The Citadel Protocol is an air-gapped multi-party transaction approval system implementing M-of-N signature schemes. Citadel enables organizations, families, or security-conscious individuals to require multiple independent approvals before any transaction can be broadcast. Each signing party operates on a separate offline device, creating, reviewing, and signing transactions without any online coordination or network communication. This ensures that no single compromised device, individual, or key can authorize unauthorized transactions. Citadel is designed for professional-grade custody, joint account management, and high-security scenarios where distributed trust is essential.
3.7 Shamir's Secret Sharing (Technical Foundation). The Seed Vault (Section 3.5) is powered by Shamir's Secret Sharing (SSS), based on polynomial interpolation over a finite field as published by Adi Shamir in 1979. The scheme uses Galois Field GF(256) arithmetic for byte-level share generation. The critical security property of SSS is that it is information-theoretically secure: possessing fewer than K shares does not allow reconstruction of the secret, regardless of the computational resources available to the attacker. As a mathematical scheme, this property is independent of classical or quantum computation. Seed Vault and Shamir are the same feature referred to by different names throughout the Software and this Agreement.
3.8 EMBO (Emergency Memory Blackout). EMBO implements a triple-pass secure wipe on all memory blocks that held sensitive data during a Software session. This three-pass overwrite is layered on top of Python's native memory scrambling on application close, ensuring that the actual memory addresses where seed phrases, private keys, derived keys, and other sensitive material resided are overwritten with random data three times before being released. This approach is designed to help prevent forensic memory recovery, cold boot attacks, and volatile memory analysis under known forensic methodologies. Effectiveness depends on operating system behavior and hardware-level access controls beyond the Software's direct control.
3.9 SentinelGuard. SentinelGuard is an active, real-time, process-level threat detection and neutralization system built directly into the Software. It continuously monitors all running processes on the host system, identifies known and heuristically suspicious process signatures, and terminates confirmed threats before they can access, intercept, or exfiltrate wallet data. SentinelGuard operates as an integrated security layer within XColdPro and is also being developed as a standalone security product by XDRIP.
3.10 Lazarus Protocol. The Lazarus Protocol is an estate planning and continuity feature that implements a dead man's switch mechanism. Users may configure automated notification and credential distribution protocols that activate if the User fails to check in within a User-defined time interval. Lazarus Protocol enables Users to ensure that designated beneficiaries, heirs, attorneys, or trustees receive the information necessary to access and recover the User's Digital Assets in the event of death, incapacitation, or extended unavailability, on terms established solely by the User.
3.11 User Control and Operational Dependency. The Software's security architecture is intentionally designed so that the User, rather than XDRIP, remains the final control point for access, key management, device custody, beneficiary setup, transaction approval, backup integrity, and recovery design. As a result, the effectiveness of the Software's security layers depends materially on the User's choices, environment, compliance with instructions, and preservation of recovery materials. Even the most advanced protective features cannot overcome negligent setup, poor backup discipline, failure to verify transaction details, or compromise of the User's physical or digital environment.
Notwithstanding the commitments set forth in Section 2, the Software, including all Modules, is provided on an "AS IS" and "AS AVAILABLE" basis. To the fullest extent permitted by applicable law, XDRIP expressly disclaims all warranties, whether express, implied, statutory, or otherwise, including but not limited to implied warranties of merchantability, fitness for a particular purpose, title, non-infringement, and any warranties arising out of course of dealing, usage, or trade practice.
XDRIP does not warrant or represent that: (a) the Software will be uninterrupted, error-free, completely secure, or free from vulnerabilities at all times; (b) any defects or errors in the Software will be corrected within any specific timeframe; (c) the Software will be compatible with any particular hardware configuration, operating system, or third-party software not explicitly listed in the Approved Usage Guidelines; (d) the results obtained from the use of the Software will be accurate, reliable, or complete; or (e) the Software will meet any particular User's requirements or expectations beyond what is expressly stated in the official product documentation.
While XDRIP employs industry-leading security practices and continuously works to improve the Software, no software system, regardless of its design, architecture, or implementation, can guarantee absolute security against all possible threats at all times. Threats to software security include but are not limited to: novel attack vectors, zero-day vulnerabilities, undiscovered implementation errors, hardware failures or defects, operating system vulnerabilities, side-channel attacks, social engineering targeting the User, physical compromise of the User's device or environment, regulatory or legal actions affecting blockchain networks, and force majeure events. The User acknowledges and accepts this inherent limitation of all software systems.
Without limiting the foregoing, XDRIP does not warrant that the Software will prevent all Loss Events, will preserve all data under all circumstances, will remain continuously compatible with every blockchain upgrade or ecosystem change, or will continue to support any specific token, network, wallet format, signature scheme, or third-party dependency for any minimum period of time. Support decisions, maintenance windows, version retirement, and compatibility determinations may change as technology, security conditions, legal obligations, and commercial realities evolve.
The Software is not investment software, legal software, accounting software, estate-planning software, or tax software, even if it contains features that may be useful in those contexts. Any statements in the Software or related materials regarding security, survivability, inheritance, or operational continuity are provided for functional description only and do not constitute legal advice, tax advice, accounting advice, investment advice, or a guarantee of any legal or financial outcome. You remain solely responsible for consulting qualified advisers appropriate to your jurisdiction and circumstances.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE XDRIP PARTIES BE LIABLE FOR ANY OF THE FOLLOWING ARISING OUT OF OR IN CONNECTION WITH THIS AGREEMENT, YOUR USE OF OR INABILITY TO USE THE SOFTWARE OR ANY MODULE, OR ANY ACTIONS TAKEN OR NOT TAKEN BY THE XDRIP PARTIES IN CONNECTION WITH THE SOFTWARE:
Aggregate Liability Cap: To the extent that any liability of the XDRIP Parties is found to exist notwithstanding the foregoing limitations, the total aggregate liability of all XDRIP Parties combined for all claims of any kind arising out of or relating to this Agreement, the Software, or any Module shall not exceed the greater of: (i) the total amount of license fees actually paid by you to XDRIP for the Software during the twelve (12) months immediately preceding the first event giving rise to the claim; or (ii) one hundred United States dollars (USD $100.00).
Essential Basis of the Bargain: The User acknowledges and agrees that the limitations of liability set forth in this Section 5 are a fundamental element of the basis of the bargain between the User and XDRIP, that XDRIP would not have made the Software available without such limitations, and that such limitations shall apply even if any limited remedy specified in this Agreement is found to have failed of its essential purpose.
Exclusive Remedy Structure: To the maximum extent permitted by law, your exclusive remedy for dissatisfaction with the Software, any Module, or any support experience is to discontinue use of the Software. No oral or written information or advice provided by XDRIP or any representative of XDRIP shall create any warranty, representation, or liability standard not expressly set forth in this Agreement.
The security architecture of XColdPro is designed to protect your Digital Assets to the maximum extent technically possible. However, no security system can compensate for user actions that compromise its fundamental operating assumptions. The security of your Digital Assets depends in critical part on your strict adherence to the Approved Usage Guidelines. You acknowledge and agree to the following obligations:
Where your obligations under this Section 6 are not satisfied, any resulting Loss Event shall be conclusively presumed to have arisen, at least in material part, from User-side operational risk rather than from a defect in the Software, except to the extent applicable law requires otherwise. The Company is entitled to rely on the integrity of these operating assumptions when assessing responsibility for any alleged incident.
This version of XColdPro is designated as a Release Candidate ("RC"). While the RC has undergone extensive internal testing, security review, and quality assurance, it is being made available to Users prior to the final General Availability ("GA") release for the purpose of broader evaluation, real-world usage feedback, and community-driven quality assurance.
Known Limitations: An RC may contain bugs, incomplete features, performance issues, or edge-case behaviors that will be identified and resolved prior to GA. XDRIP will maintain publicly accessible release notes documenting all known limitations, open issues, and workarounds applicable to the RC.
Feedback and Reporting: Users are strongly encouraged to report any bugs, vulnerabilities, unexpected behaviors, performance issues, or usability concerns to XDRIP through the designated reporting channels. Responsible disclosure of potential security vulnerabilities is especially appreciated and will be acknowledged and addressed with the highest priority. XDRIP may, at its discretion, recognize significant security disclosures through its responsible disclosure program.
Upgrade Path: XDRIP will provide a clear, documented, and tested upgrade path from the RC to the GA release. Users will not need to regenerate wallets, recreate seed phrases, redistribute Shamir shares, or reconfigure VLS or Blackhole settings when transitioning from RC to GA, provided the RC was used in accordance with the Approved Usage Guidelines throughout the RC period. All wallet data, configurations, and security settings will migrate seamlessly.
RC Support: XDRIP will provide active support for the RC throughout the RC period and will continue to issue patches and updates to the RC as needed until the GA release is made available and a reasonable migration window has elapsed.
RC Risk Allocation: By using an RC build, you acknowledge that you are voluntarily using a pre-GA release in exchange for early access to functionality and that you therefore assume an elevated level of operational and compatibility risk. You should not rely on an RC build as your sole line of defense or as your sole repository of recovery-critical information unless you have implemented redundant, independently validated safeguards.
8.1 No Data Collection. XColdPro is designed to operate without collecting, transmitting, or storing any User data on XDRIP servers or any third-party servers. The Software operates entirely on the User's local device. XDRIP does not have access to your seed phrases, private keys, wallet addresses, transaction history, balances, Shamir shares, VLS-transformed seeds, authentication credentials, or any other sensitive information at any time.
8.2 No Telemetry. The Software does not include telemetry, analytics, usage tracking, crash reporting, or any other mechanism that transmits data from the User's device to XDRIP or any third party. When operating in air-gapped mode, no data of any kind leaves the device.
8.3 Local Processing. All cryptographic operations, including seed generation, key derivation, VLS transformation, Shamir share generation and reconstruction, transaction signing, and encryption/decryption, are performed entirely on the User's local device. No cryptographic material is ever transmitted over any network by the Software.
8.4 Memory Handling. The Software implements aggressive memory management practices, including EMBO triple-pass memory sanitization, to ensure that sensitive data does not persist in volatile memory beyond the duration of active use. These measures are designed to prevent forensic recovery of sensitive data from RAM, swap files, or hibernation images.
8.5 User-Environment Residual Risk. Local-first design materially reduces external collection risk, but it does not eliminate the risk of exposure through the User's own operating environment, including compromised peripherals, cameras, microphones, screen recorders, clipboard utilities, malicious browser extensions, backup software, cloud synchronization tools, print spools, temporary files, hibernation artifacts, shoulder surfing, or physical intrusion. Responsibility for those residual exposure vectors remains with the User.
8.6 Support and Disclosure Discipline. If you contact support, you agree not to transmit seed phrases, private keys, complete Shamir shares, or other highly sensitive material unless specifically instructed through a secure process expressly authorized by XDRIP. XDRIP shall have no responsibility for harm caused by User disclosure of highly sensitive data through insecure or unapproved support channels.
9.1 Blockchain Networks. The Software interacts with various blockchain networks and distributed ledger systems for the purpose of broadcasting signed transactions and querying balance and transaction data. These blockchain networks are decentralized, open-source protocols that are not owned, operated, controlled, or maintained by XDRIP. XDRIP makes no representations or warranties regarding the availability, reliability, security, speed, finality, or continued operation of any blockchain network. Changes to blockchain protocols, consensus mechanisms, fork events, network congestion, mining/validator behavior, or governance decisions are entirely outside the control of XDRIP.
9.2 RPC Endpoints and Data Providers. The Software may utilize publicly available Remote Procedure Call (RPC) endpoints, block explorers, and data providers to retrieve blockchain data. XDRIP does not control and is not responsible for the accuracy, availability, or security of these third-party services. When operating in air-gapped mode, transaction broadcasting requires manual transfer to an online device, which is the sole responsibility of the User.
9.3 No Affiliation. XDRIP is not affiliated with, endorsed by, or associated with any blockchain network, digital asset project, token issuer, exchange, or financial institution unless explicitly stated in writing. References to specific blockchain networks, digital assets, or tokens within the Software are provided for functionality purposes only and do not constitute endorsement, investment advice, or any representation regarding the value, legitimacy, or regulatory status of such assets.
9.4 Lazarus Protocol Third-Party Services. The Lazarus Protocol feature may integrate with third-party communication services for the purpose of delivering notifications to designated beneficiaries. XDRIP is not responsible for the availability, reliability, or delivery guarantees of any third-party communication service. Users are advised to configure redundant notification channels and to inform their designated beneficiaries of the existence and operation of the Lazarus Protocol through independent means.
9.5 Third-Party Hardware, Firmware, and Companion Tools. If you use the Software in combination with any third-party device, storage medium, operating system component, signing display, QR transfer utility, removable media, explorer, antivirus suite, password manager, or other companion tool, you do so at your own risk. XDRIP does not warrant interoperability with any third-party product except as expressly documented, and changes made by third parties may impair functionality or security without notice.
9.6 No Duty to Intervene. XDRIP has no duty to monitor blockchain activity, halt transactions, freeze funds, reverse transfers, prevent beneficiary access, correct third-party data errors, or intervene with any exchange, bridge, custodian, validator, miner, sequencer, rollup operator, or government authority on your behalf.
10.1 Current Threat Assessment. As of the effective date of this Agreement, quantum computers capable of breaking the cryptographic algorithms used by major blockchain networks (specifically, the elliptic curve cryptography on the secp256k1 curve used for transaction signing) do not exist. Current estimates suggest that such capability would require quantum systems with hundreds of thousands to millions of physical qubits with error correction capabilities far beyond any quantum computer in existence or publicly announced development as of the effective date.
10.2 XColdPro's Quantum Posture. XColdPro's security architecture provides multiple layers of protection that are resistant to quantum computing threats. Specifically: (a) AES-256 symmetric encryption (used to protect wallet data at rest) is not vulnerable to Shor's algorithm and retains at minimum 128-bit equivalent security against Grover's algorithm, which remains computationally infeasible; (b) Shamir's Secret Sharing (Seed Vault), as a mathematical scheme, is information-theoretic and is not affected by classical or quantum computational power. Practical security in deployed software depends on the integrity of the implementation; (c) VLS (Void Lock Security) seed transformation adds a proprietary cryptographic layer that is independent of and complementary to the underlying blockchain cryptography; and (d) the air-gapped architecture prevents any remote interaction with stored cryptographic material. However, XDRIP acknowledges that the underlying blockchain networks upon which Digital Assets are recorded use elliptic curve cryptography that may become vulnerable to sufficiently powerful quantum computers in the future.
10.3 No Quantum Guarantee. While XColdPro's own encryption and security modules employ algorithms that are resistant to known quantum attacks, XDRIP does not and cannot guarantee the quantum resistance of the underlying blockchain protocols, signature schemes, or address formats used by the blockchain networks with which the Software interacts. The security of Digital Assets on any blockchain network is ultimately dependent on the cryptographic integrity of that network's protocol, which is outside the control of XDRIP. XDRIP will monitor developments in quantum computing and post-quantum cryptography and will incorporate post-quantum upgrades into the Software as they become standardized and practical.
10.4 User Acknowledgment. The User acknowledges that the long-term security of Digital Assets depends on factors beyond the control of XDRIP, including the continued cryptographic integrity of underlying blockchain networks and the pace of quantum computing development. The User agrees that XDRIP shall not be held liable for any losses arising from advances in quantum computing that compromise the cryptographic foundations of blockchain networks, provided that XDRIP has fulfilled its obligations under Section 2 of this Agreement with respect to ongoing security improvements and transparent communication.
10.5 Migration Responsibility. If, in the future, XDRIP publishes migration guidance, key rotation guidance, asset movement guidance, or post-quantum transition guidance, you remain solely responsible for executing those recommendations in a timely and competent manner. Failure to take reasonable migration steps after a known quantum-related risk becomes actionable shall be deemed a User-side operational failure, not a Software defect.
The Software, including all Modules, source code, object code, compiled binaries, documentation, user interfaces, visual designs, trade secrets, algorithms, data structures, proprietary protocols (including but not limited to VLS (Void Lock Security), Blackhole Protocol, Omega Protocol, the Decoy Wallet System, EMBO, SentinelGuard, Lazarus Protocol, Seed Vault, and Citadel), training materials, marketing materials, and all associated intellectual property rights (including patents, copyrights, trademarks, trade secrets, and moral rights), are and shall remain the sole and exclusive property of XDRIP Digital Management, LLC.
Nothing in this Agreement grants you any right, title, interest, or license in or to the Software other than a limited, personal, non-exclusive, non-transferable, non-sublicensable, revocable license to use the Software in accordance with this Agreement and the applicable license terms. You shall not copy, modify, distribute, sell, lease, sublicense, reverse engineer, decompile, disassemble, or otherwise attempt to derive the source code of the Software or any Module, except to the extent that such restriction is expressly prohibited by applicable law.
The names "XColdPro," "XDRIP," "Void Lock Security," "VLS," "Blackhole Protocol," "Omega Protocol," "EMBO," "SentinelGuard," "Lazarus Protocol," "Seed Vault," "Citadel," and all associated logos, marks, and branding elements are trademarks or trade names of XDRIP Digital Management, LLC. You may not use these marks without prior written authorization.
To the extent you submit suggestions, enhancement requests, bug reports, hardening recommendations, workflow improvements, vulnerability reports, or other feedback relating to the Software, you grant XDRIP a perpetual, irrevocable, worldwide, royalty-free right to use, reproduce, modify, adapt, disclose, publish, and commercialize such feedback without restriction, attribution, or compensation, subject only to any separate written bug bounty or disclosure agreement expressly entered into by XDRIP.
You agree not to use the Software for any purpose that is unlawful, prohibited by this Agreement, or that would give rise to liability for the XDRIP Parties. Without limiting the foregoing, you agree not to: (a) use the Software to store, manage, or transact Digital Assets that are the proceeds of illegal activity; (b) use the Software in violation of any applicable sanctions, export control laws, or anti-money laundering regulations; (c) attempt to reverse engineer, decompile, disassemble, or otherwise derive the source code or proprietary algorithms of the Software or any Module; (d) attempt to circumvent, disable, or interfere with any security feature or access control mechanism within the Software; (e) use the Software to develop a competing product or service; (f) remove, alter, or obscure any copyright, trademark, or proprietary rights notice within the Software; or (g) distribute, sublicense, or make the Software available to any third party in violation of the applicable license terms.
Unless expressly authorized in writing by XDRIP, you may not use the Software as part of a hosted custody offering, managed wallet service, white-label product, regulated financial service, fiduciary administration service, or high-volume institutional operational workflow on behalf of third parties. Any such use without written authorization is outside the intended scope of the license and may create safety, regulatory, and liability conditions not contemplated by this Agreement.
13.1 Termination by User. You may terminate this Agreement at any time by ceasing all use of the Software and deleting all copies in your possession or control. Prior to termination, you are solely responsible for transferring any Digital Assets to alternative wallets or storage solutions and for securely preserving any seed phrases, Shamir shares, or recovery materials you wish to retain.
13.2 Termination by XDRIP. XDRIP may terminate or suspend your license to use the Software at any time if you breach any material provision of this Agreement. Termination of the license does not affect your ability to access Digital Assets using your seed phrase, private keys, or Shamir shares through other BIP-39 compliant wallet solutions, except to the extent that VLS transformation or Blackhole device-binding limits portability as described in Section 3.
13.3 Survival. The provisions of Sections 1, 4, 5, 6, 8, 10, 11, 14, 15, 16, 17, 20, 21, 22, and 23 shall survive any termination or expiration of this Agreement.
13.4 Effect of Suspension or Retirement. XDRIP may, in its discretion, retire versions, discontinue features, change compatibility support, or require migration to newer builds where necessary for safety, regulatory, or commercial reasons. Except where prohibited by law or expressly committed in writing, XDRIP has no obligation to maintain legacy releases, legacy infrastructure compatibility, or indefinite support for deprecated features.
You agree to indemnify, defend, and hold harmless the XDRIP Parties from and against any and all claims, demands, actions, suits, proceedings, damages, losses, liabilities, costs, and expenses (including reasonable attorneys' fees, expert witness fees, and court costs) arising out of or relating to: (a) your use of the Software in violation of this Agreement or the Approved Usage Guidelines; (b) your violation of any applicable law, regulation, or third-party right; (c) your negligence, recklessness, or willful misconduct; (d) any third-party claim arising from your use of the Software or your Digital Asset transactions; (e) any misrepresentation made by you; or (f) your failure to comply with the security practices and obligations set forth in Section 6.
XDRIP reserves the right, at its own expense, to assume the exclusive defense and control of any matter otherwise subject to indemnification by you, and in such event you agree to cooperate fully with XDRIP in the defense of that matter. You may not settle any matter affecting an XDRIP Party without XDRIP's prior written consent.
XDRIP shall not be liable for any failure or delay in the performance of its obligations under this Agreement to the extent that such failure or delay results from circumstances beyond its reasonable control, including but not limited to: acts of God, natural disasters, epidemics, pandemics, war, terrorism, riots, civil unrest, government actions or sanctions, embargoes, blockades, labor disputes, infrastructure failures, power outages, internet or telecommunications failures, cyberattacks or cyberwarfare targeting internet infrastructure, blockchain network failures or forks, changes in applicable law or regulation, or any other event beyond the reasonable control of XDRIP. During any period of force majeure, XDRIP's obligations under this Agreement shall be suspended to the extent affected, and XDRIP shall use commercially reasonable efforts to resume performance as soon as practicable.
Force majeure events shall include failures or delays involving vendors, code-signing services, package registries, certificate authorities, hosting or CDN providers, security researchers, audit firms, open-source dependency maintainers, or other external contributors upon whom XDRIP may reasonably depend in connection with developing, distributing, securing, or supporting the Software.
16.1 Governing Law. This Agreement shall be governed by and construed in accordance with the laws of the State of Colorado, United States of America, without regard to its conflict of law principles or the United Nations Convention on Contracts for the International Sale of Goods.
16.2 Informal Resolution. Before initiating any formal dispute resolution proceeding, the parties agree to first attempt to resolve any dispute, controversy, or claim arising out of or relating to this Agreement through good-faith informal negotiation for a period of not less than thirty (30) days following written notice of the dispute.
16.3 Mediation. If informal negotiation is unsuccessful, the parties agree to submit the dispute to non-binding mediation administered by a mutually agreed mediator in El Paso County, Colorado, before pursuing arbitration.
16.4 Binding Arbitration. If mediation is unsuccessful, any dispute, controversy, or claim arising out of or relating to this Agreement shall be finally resolved by binding arbitration administered in El Paso County, Colorado, in accordance with the Commercial Arbitration Rules of the American Arbitration Association then in effect. The arbitration shall be conducted by a single arbitrator with expertise in technology and software licensing matters. The arbitrator's award shall be final and binding and may be entered as a judgment in any court of competent jurisdiction. Each party shall bear its own costs of arbitration, including attorneys' fees, unless the arbitrator determines that the circumstances warrant a different allocation.
16.5 Equitable Relief. Notwithstanding the foregoing, either party may seek injunctive or other equitable relief in any court of competent jurisdiction to prevent the actual or threatened infringement, misappropriation, or violation of intellectual property rights or confidential information.
16.6 Time Limit on Claims. To the fullest extent permitted by law, any claim or cause of action arising out of or relating to this Agreement or the Software must be commenced within one (1) year after the claim arose, or it will be permanently barred, notwithstanding any statute or law to the contrary.
TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, YOU AND XDRIP AGREE THAT ANY DISPUTE RESOLUTION PROCEEDINGS WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS, CONSOLIDATED, OR REPRESENTATIVE ACTION. YOU WAIVE ANY RIGHT TO PARTICIPATE IN A CLASS ACTION LAWSUIT OR CLASS-WIDE ARBITRATION AGAINST THE XDRIP PARTIES. IF FOR ANY REASON A CLAIM PROCEEDS IN COURT RATHER THAN IN ARBITRATION, BOTH YOU AND XDRIP WAIVE ANY RIGHT TO A JURY TRIAL.
If any portion of this Section 17 is found unenforceable as to a particular claim or remedy, then the parties agree that such claim or remedy shall be severed and proceed, if at all, on an individual basis only and not as part of any class, consolidated, coordinated, private attorney general, or representative proceeding.
By using the Software, you consent to receive communications from XDRIP electronically, including through the Software interface, email, or postings on the XDRIP or XColdPro website. You agree that all agreements, notices, disclosures, and other communications provided to you electronically satisfy any legal requirement that such communications be in writing. Notices to XDRIP must be sent to the contact information provided in Section 24 and shall be deemed received upon actual receipt by XDRIP.
You are solely responsible for maintaining current and accurate contact information, monitoring the channels through which notices may be delivered, and ensuring that messages from XDRIP are not blocked by spam filters, security tools, domain changes, abandoned email accounts, or organizational routing issues. Failure by you to receive or review an electronic notice due to such issues does not invalidate that notice.
The Software may contain or utilize encryption technology that is subject to export control laws and regulations, including the U.S. Export Administration Regulations (EAR) and the regulations administered by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC). You agree to comply with all applicable export control and sanctions laws and regulations in your use of the Software. You represent and warrant that you are not located in, under the control of, or a national or resident of any country or territory that is the subject of comprehensive U.S. sanctions, and that you are not listed on any U.S. government list of prohibited or restricted parties.
You further represent and warrant that you will not export, re-export, transfer, provide access to, or permit use of the Software, directly or indirectly, in violation of any applicable law, and that you will obtain any authorizations, licenses, internal approvals, or legal advice necessary to lawfully use the Software in your jurisdiction and operational context.
If any provision of this Agreement is held to be invalid, illegal, or unenforceable by a court or arbitrator of competent jurisdiction, such provision shall be modified to the minimum extent necessary to make it valid and enforceable while preserving the original intent of the parties, or if modification is not possible, severed from this Agreement. The invalidity or unenforceability of any provision shall not affect the validity or enforceability of the remaining provisions, which shall continue in full force and effect.
The parties further intend that any invalid or unenforceable provision be interpreted, reformed, or narrowed so as to preserve, as closely as possible, the original commercial allocation of risk reflected in this Agreement.
No failure or delay by XDRIP in exercising any right, remedy, power, or privilege under this Agreement shall operate as a waiver thereof, nor shall any single or partial exercise of any right, remedy, power, or privilege preclude any other or further exercise thereof or the exercise of any other right, remedy, power, or privilege. A waiver of any provision of this Agreement shall be effective only if made in writing and signed by an authorized representative of XDRIP.
No course of dealing, course of performance, industry custom, or informal support accommodation shall modify this Agreement or create any binding waiver, precedent, or continuing obligation unless expressly documented in a signed writing by XDRIP.
You may not assign, transfer, or delegate this Agreement or any rights or obligations hereunder, in whole or in part, without the prior written consent of XDRIP. Any attempted assignment in violation of this provision shall be null and void. XDRIP may freely assign this Agreement and its rights and obligations hereunder in connection with a merger, acquisition, corporate reorganization, or sale of all or substantially all of its assets, without your consent and without notice.
This Agreement shall bind and inure to the benefit of the parties and their respective permitted successors and assigns.
This Agreement, together with the Approved Usage Guidelines, the applicable software license agreement, the privacy policy (if any), and any other documents expressly incorporated by reference herein, constitutes the entire agreement between you and XDRIP with respect to the subject matter hereof and supersedes all prior or contemporaneous communications, proposals, representations, understandings, or agreements, whether oral or written, between the parties regarding such subject matter.
XDRIP reserves the right to modify, amend, or update this Agreement at any time by posting the revised Agreement on the XColdPro website or by providing notice through the Software. The "Effective Date" at the top of this Agreement will be updated to reflect the date of the most recent revision. Your continued use of the Software following the posting of a revised Agreement constitutes your acceptance of and agreement to the revised terms. If you do not agree to the revised terms, you must discontinue use of the Software.
No amendment, modification, or supplement to this Agreement shall be binding unless made in writing and posted or distributed by XDRIP through the channels described above.
In the event of any inconsistency between this Agreement and any marketing statement, FAQ, social post, support chat, or informal communication, this Agreement and the officially published Approved Usage Guidelines shall control unless XDRIP expressly states otherwise in a signed writing. Headings are for convenience only and do not affect interpretation.
For questions, concerns, support requests, legal notices, or security reports related to this Agreement or the Software, please contact XDRIP Digital Management, LLC through the following channels:
For avoidance of doubt, submission of a support request or security report does not by itself create any contractual deadline, recovery obligation, emergency duty, or special relationship. Formal legal notices must clearly identify the sender, the relevant agreement, the nature of the claim or issue, and sufficient contact information for response.