← Back to par Noir
🎯 Agreement to Terms
By accessing or using the Identity Protocol ("Service"), you agree to be bound by these Terms of Service ("Terms"). If you disagree with any part of these terms, you may not access the Service.
📋 Service Description
What We Provide
Identity Protocol is a decentralized identity management system that enables users to:
- Create and manage their own digital identities
- Control access to their personal information
- Recover access through custodian-based recovery
- Synchronize identities across multiple devices
- Integrate with third-party applications
Decentralized Nature
- No Central Control: We do not control or manage your identity data
- User Ownership: You own and control all your identity information
- Local Storage: Data is stored locally on your devices
- Peer-to-Peer: Direct communication between users
👤 User Accounts and Responsibilities
Account Creation
- Self-Service: You create your own identity without our involvement
- No Registration: No traditional account registration required
- Local Setup: Identity creation happens on your device
- No Verification: We do not verify your identity information
Your Responsibilities
- Secure Devices: Keep your devices secure and updated
- Strong Passcodes: Use strong, unique passcodes
- Backup Management: Maintain secure backups of your data
- Custodian Management: Keep recovery custodians active
- Legal Compliance: Use the service in compliance with applicable laws
Prohibited Uses
You agree not to:
- Illegal Activities: Use the service for illegal purposes
- Fraud: Create false or misleading identities
- Harassment: Use identities to harass or harm others
- Impersonation: Impersonate others without authorization
- Security Attacks: Attempt to compromise the system
- Spam: Use the service for spam or unwanted communications
🔐 Security and Privacy
Your Security Responsibilities
- Device Security: Secure your devices against unauthorized access
- Passcode Management: Use strong, unique passcodes
- Recovery Setup: Maintain active recovery custodians
- Backup Security: Secure your encrypted backups
- Third-Party Security: Secure third-party integrations
Our Security Commitments
- Encryption: Military-grade encryption for all data
- No Backdoors: We cannot access your encrypted data
- Security Updates: Regular security improvements
- Vulnerability Disclosure: Prompt disclosure of security issues
🔄 Service Availability
Decentralized Architecture
- No Central Servers: Service does not depend on central servers
- Local Operation: Core functionality works offline
- Peer-to-Peer: Direct communication between users
- IPFS Integration: Decentralized storage for metadata
Service Limitations
- No Guaranteed Uptime: We do not guarantee service availability
- Third-Party Dependencies: Some features depend on third-party services
- Device Requirements: Service requires compatible devices
- Internet Connectivity: Some features require internet access
🛡️ Intellectual Property
Open Source License
- MIT License: The Identity Protocol software is licensed under MIT License
- Source Code: Source code is available for review and modification
- Contributions: Community contributions are welcome
- Attribution: Proper attribution is required for modifications
Your Content
- Your Ownership: You retain ownership of your identity data
- No License Grant: You do not grant us rights to your data
- Export Rights: You can export your data at any time
- Deletion Rights: You can delete your data at any time
🚨 Disclaimers and Limitations
Service Disclaimers
- As-Is Service: Service is provided "as is" without warranties
- No Guarantees: We do not guarantee service availability or performance
- User Responsibility: Users are responsible for their own security
- Third-Party Risks: Third-party services carry their own risks
Limitation of Liability
- No Consequential Damages: We are not liable for consequential damages
- Limited Liability: Liability is limited to the extent permitted by law
- Force Majeure: We are not liable for events beyond our control
- User Indemnification: Users indemnify us against certain claims
🔄 Termination
Your Right to Terminate
- At Any Time: You can stop using the service at any time
- Data Export: You can export your data before termination
- Data Deletion: You can delete your data from the service
- No Refunds: No refunds for discontinued use
🎯 Key Terms Summary
- Decentralized Service: No central control over your data
- User Ownership: You own and control your identity data
- Security Responsibility: You are responsible for your security
- Open Source: Software is open source under MIT license
- Privacy First: No collection of personal information
- Legal Compliance: Use must comply with applicable laws
- Limited Liability: We have limited liability for damages
- Termination Rights: You can terminate use at any time
These Terms of Service govern your use of the Identity Protocol decentralized identity management system.