1. Purpose and Functional Limitations
Eclorix hardware wallets are designed exclusively for the secure offline storage of cryptocurrency and NFT private keys. Our devices serve a single, focused purpose: providing air-gapped custody solutions for digital assets through advanced cryptographic security measures.
1.1 Core Functionality
Our hardware wallets provide the following core functions:
- Secure generation and storage of private keys using hardware-based entropy
- Cryptographic signing of transactions in an offline environment
- Backup and recovery mechanisms through seed phrase generation
- Multi-signature support for enhanced security protocols
- Hardware-level protection against physical and logical attacks
- Tamper-evident enclosures for integrity verification
1.2 Excluded Services
Eclorix hardware wallets explicitly do NOT provide the following services:
- Cryptocurrency or NFT buying services
- Cryptocurrency or NFT selling services
- Exchange or trading platform functionality
- Market making or liquidity provision services
- Price discovery or market data services
- Custodial services where Eclorix holds user assets
- Financial advisory or investment recommendation services
- Automated trading or algorithmic trading capabilities
This limitation is by design and ensures compliance with regulatory requirements while maintaining the highest security standards through a minimal attack surface approach.
2. Security Architecture and Requirements
Eclorix devices implement multiple layers of security designed to protect your digital assets under all circumstances. Understanding these security features is essential for proper device usage.
2.1 Isolated Secure Element Chip
Each Eclorix device incorporates a dedicated secure element chip that provides:
- Hardware-isolated cryptographic processing capabilities
- Tamper-resistant key storage with physical attack protection
- True random number generation for cryptographic operations
- Secure boot processes to prevent firmware tampering
- Side-channel attack resistance through specialized design
- Common Criteria EAL5+ certification compliance where applicable
2.2 Air-Gapped Operation
Our devices maintain complete isolation from internet connectivity:
- No permanent internet connection capability
- No wireless communication modules (WiFi, Bluetooth, cellular)
- Communication only through secure, authenticated channels
- Transaction signing occurs entirely offline
- Private keys never leave the secure element
- All network communication requires explicit user authorization
2.3 Authentication Mechanisms
Multiple authentication layers protect device access:
- PIN Protection: Numeric PIN with anti-brute force mechanisms
- Passphrase Support: Optional additional passphrase for enhanced security
- Seed Phrase Backup: BIP39-compliant mnemonic phrases for recovery
- Physical Confirmation: Manual transaction approval requirements
- Time-based Lockouts: Progressive delays after failed attempts
- Factory Reset Protection: Secure wipe capabilities
2.4 Open Source Commitment
Eclorix maintains transparency through open source practices:
- Open source firmware with public code repositories
- Independent security audits by recognized firms
- Public vulnerability disclosure processes
- Community-driven security research support
- Reproducible build processes for verification
- Regular security updates and patch management
3. Legal and Regulatory Compliance
While Eclorix hardware wallets themselves are not subject to Know Your Customer (KYC) or Anti-Money Laundering (AML) regulations as they are hardware devices, users must understand and comply with all applicable legal requirements.
3.1 Device Classification
Eclorix hardware wallets are classified as:
- Hardware security devices for cryptographic key storage
- Non-custodial tools that do not hold user assets
- Technology products subject to export control regulations
- Consumer electronics with specialized security functions
- Devices that enable user self-custody of digital assets
3.2 User Compliance Responsibilities
Users are solely responsible for:
- Compliance with local cryptocurrency and digital asset regulations
- Understanding tax implications of digital asset ownership and transactions
- Adhering to import and export restrictions for cryptographic devices
- Meeting any licensing requirements for digital asset activities
- Reporting requirements for digital asset holdings where applicable
- Compliance with sanctions and restricted party lists
- Understanding the legal status of specific cryptocurrencies in their jurisdiction
3.3 Import and Export Considerations
Eclorix devices may be subject to:
- Export Administration Regulations (EAR) in the United States
- Wassenaar Arrangement restrictions on dual-use technologies
- Local import restrictions on cryptographic devices
- Customs declarations and documentation requirements
- End-user certificates or import licenses in certain jurisdictions
3.4 Prohibited Uses
Eclorix devices must not be used for:
- Any illegal activities under applicable laws
- Money laundering or terrorist financing
- Sanctions evasion or prohibited transactions
- Market manipulation or fraudulent activities
- Unauthorized access to third-party systems
- Activities that violate intellectual property rights
4. Risk Disclosure and Liability Limitations
Using cryptocurrency hardware wallets involves inherent risks that users must understand and accept. Eclorix provides these devices as tools for self-custody, but cannot eliminate all risks associated with digital asset ownership.
4.1 Seed Phrase and Key Management Risks
Critical risks related to seed phrase and private key management:
- Permanent Loss: Loss of seed phrase results in permanent, irreversible loss of all stored digital assets
- No Recovery Possible: Eclorix cannot recover, restore, or provide access to lost private keys or seed phrases
- User Responsibility: Users are solely responsible for secure backup and storage of recovery information
- Physical Security: Seed phrases must be protected from theft, damage, and unauthorized access
- Multiple Backups: Users should maintain multiple secure backups in different locations
- Inheritance Planning: Users must plan for secure transfer of access to heirs or beneficiaries
4.2 Market and Financial Risks
Digital assets involve significant financial risks:
- Market Volatility: Digital asset values can fluctuate dramatically and unpredictably
- Total Loss Potential: Digital assets may become worthless or lose all value
- No Insurance: Digital assets are not insured by government deposit insurance programs
- Regulatory Risk: Changes in regulations may affect asset value or legality
- Technology Risk: Blockchain networks may experience failures or attacks
- Liquidity Risk: Assets may become difficult or impossible to sell
4.3 Technology and Operational Risks
Hardware and software risks that users should understand:
- Hardware Failure: Devices may malfunction or fail, requiring recovery from seed phrase
- Software Bugs: Firmware or companion software may contain defects
- User Error: Incorrect operation may result in loss of assets
- Compatibility Issues: Future blockchain changes may affect device compatibility
- Physical Damage: Devices may be damaged by environmental factors
- Obsolescence: Technology may become outdated over time
4.4 Manufacturer Liability Limitations
Eclorix's liability is limited as follows:
- No responsibility for market value fluctuations of digital assets
- No liability for user errors or misuse of devices
- No guarantee of compatibility with future blockchain developments
- Limited warranty coverage as specified in product documentation
- No liability for regulatory changes affecting digital asset legality
- No responsibility for third-party software or service failures
5. Setup, Operation, and Support Guidelines
Proper setup and operation of Eclorix devices is essential for maintaining security and ensuring reliable access to your digital assets. Follow these comprehensive guidelines for optimal device performance.
5.1 Device Authenticity Verification
Before using any Eclorix device, verify its authenticity:
- Packaging Inspection: Check for tamper-evident seals and authentic packaging materials
- Serial Number Verification: Verify device serial numbers against our authentication database
- Holographic Security Features: Inspect holographic elements for authenticity markers
- Firmware Verification: Confirm firmware signatures match official releases
- Purchase Source Verification: Only purchase from authorized dealers and distributors
- Physical Inspection: Examine device for signs of tampering or modification
5.2 Initial Setup and Seed Generation
Critical steps for secure device initialization:
- Offline Environment: Perform initial setup in a secure, offline environment
- Hardware Entropy: Use device's hardware random number generator for seed creation
- Seed Recording: Write seed phrase on provided recovery materials using permanent ink
- Verification Process: Verify seed phrase accuracy through device confirmation
- Secure Storage: Store seed phrase backups in multiple secure, fireproof locations
- PIN Configuration: Set strong, unique PIN that is not easily guessable
- Passphrase Setup: Consider additional passphrase for enhanced security
5.3 Firmware Management
Maintaining current firmware is essential for security:
- Regular Updates: Install firmware updates promptly when available
- Signature Verification: Verify cryptographic signatures of all firmware updates
- Backup Before Updates: Ensure seed phrase backup is secure before updating
- Official Sources: Only download firmware from official Eclorix channels
- Version Tracking: Maintain records of firmware versions and update dates
- Rollback Capability: Understand rollback procedures if needed
5.4 Network and Asset Support
Understanding supported networks and assets:
- Supported Networks: Verify blockchain network compatibility before use
- Asset Types: Confirm support for specific cryptocurrencies and tokens
- Derivation Paths: Understand HD wallet derivation paths for different assets
- Address Formats: Verify correct address formats for each supported network
- Transaction Types: Understand supported transaction types and features
- Future Support: Monitor announcements for new network and asset support
5.5 Support Channels and Resources
Available support resources for Eclorix users:
- Technical Documentation: Comprehensive user manuals and setup guides
- Video Tutorials: Step-by-step video instructions for common operations
- Email Support: Direct technical support via email channels
- Phone Support: Voice support for urgent technical issues
- Community Forums: User community discussions and peer support
- Knowledge Base: Searchable database of common questions and solutions
- Security Advisories: Timely notifications of security issues and updates
6. Advertising and Marketing Compliance
Eclorix maintains strict compliance with advertising regulations, particularly those governing financial services and cryptocurrency-related products. Our marketing practices adhere to the highest standards of accuracy and regulatory compliance.
6.1 Google Ads and Platform Compliance
Our advertising practices comply with Google Ads policies and other platform requirements:
- Key Storage Focus: Advertisements promote only private key storage and custody functionality
- No Trading Claims: Marketing materials explicitly exclude any mention of trading, buying, or selling services
- Clear Limitations: All advertisements clearly disclose functional limitations and intended use
- Regulatory Disclaimers: Marketing includes appropriate legal and regulatory disclaimers
- Accurate Representations: All claims about device capabilities are factually accurate and verifiable
- Risk Disclosures: Advertisements include appropriate risk warnings where required
6.2 Prohibited Marketing Practices
Eclorix does not engage in the following marketing practices:
- Promoting trading, exchange, or financial services capabilities
- Making guarantees about investment returns or asset performance
- Suggesting devices can generate profits or income
- Targeting minors or vulnerable populations inappropriately
- Making false or misleading security claims
- Omitting material limitations or risks
- Using testimonials that imply financial success
6.3 Educational Content Standards
Our educational materials maintain high standards:
- Factual Accuracy: All educational content is factually accurate and regularly updated
- Balanced Perspective: Content presents both benefits and risks of hardware wallet usage
- Regulatory Awareness: Educational materials include relevant regulatory information
- Security Focus: Content emphasizes security best practices and risk management
- Clear Language: Information is presented in clear, understandable language
- Regular Updates: Content is regularly reviewed and updated for accuracy
6.4 Compliance Monitoring
Eclorix maintains ongoing compliance through:
- Regular review of all marketing materials by legal counsel
- Monitoring of advertising platform policy changes
- Training of marketing personnel on compliance requirements
- Documentation of compliance procedures and decisions
- Regular audits of marketing practices and materials
- Prompt correction of any identified compliance issues
7. Contact Information and Support
For questions about this Usage Policy or any aspect of Eclorix device operation, please contact us through the following channels:
We are committed to providing comprehensive support and ensuring that all users understand the proper and compliant use of our hardware wallet devices. Our support team is available to assist with technical questions, compliance guidance, and general product information.