1. Product Purpose and Limitations
Rayduin hardware wallets are designed exclusively for the secure offline storage of private keys for cryptocurrencies, NFTs, and other digital assets. Our devices serve as cold storage solutions that maintain your private keys in an air-gapped environment.
1.1 What Our Products Do
- Store private keys securely offline using isolated secure element chips
- Generate and manage cryptographic keys for digital asset access
- Provide tamper-evident hardware security for key protection
- Enable secure transaction signing without exposing private keys
- Support backup and recovery through seed phrase mechanisms
1.2 What Our Products Do NOT Do
- No Trading Services: We do not provide cryptocurrency buying, selling, or trading functionality
- No Exchange Services: We do not operate or facilitate cryptocurrency exchanges
- No Financial Services: We do not provide investment advice, portfolio management, or financial planning
- No Custodial Services: We do not hold, manage, or have access to your private keys or digital assets
- No Market Services: We do not provide price data, market analysis, or trading recommendations
1.3 Service Limitations
Rayduin operates exclusively as a hardware manufacturer. We design, manufacture, and support hardware wallet devices. Any cryptocurrency transactions, trading, or asset management activities must be conducted through appropriate third-party services that comply with applicable financial regulations.
2. Security Architecture and Features
Our hardware wallets implement multiple layers of security designed to protect your private keys from both physical and digital threats.
2.1 Isolated Secure Element
- EAL5+ Certified Chip: Military-grade secure element with hardware-based security features
- Air-Gapped Design: No permanent internet connection or wireless communication capabilities
- Tamper Resistance: Physical security measures that detect and respond to tampering attempts
- Secure Boot Process: Cryptographically verified firmware loading and execution
- Hardware Random Number Generation: True randomness for cryptographic key generation
2.2 Authentication Mechanisms
- PIN Protection: User-defined PIN code required for device access
- Passphrase Support: Optional additional passphrase for enhanced security
- Physical Confirmation: Manual button presses required for transaction approval
- Display Verification: On-device display for transaction details verification
2.3 Backup and Recovery
- Seed Phrase Generation: BIP39-compliant mnemonic seed phrase creation
- Offline Backup: Seed phrase generated and stored offline
- Recovery Process: Device restoration using seed phrase
- Multiple Backup Options: Support for various backup methods and formats
2.4 Open Source Commitment
- Transparent Firmware: Open-source firmware available for independent review
- Independent Audits: Regular security audits by third-party security firms
- Reproducible Builds: Verifiable firmware compilation process
- Community Review: Public code repositories for community security analysis
3. Legal and Regulatory Compliance
While hardware wallets themselves are not subject to KYC/AML requirements, users must understand and comply with all applicable laws and regulations in their jurisdiction.
3.1 Device Regulatory Status
- Hardware Classification: Our devices are classified as computer hardware, not financial instruments
- No KYC/AML Requirements: The hardware itself does not require customer identification procedures
- Export/Import Compliance: Devices may be subject to cryptographic export/import regulations
- CE Marking: European Conformity marking for EU market compliance
3.2 User Legal Responsibilities
- Local Law Compliance: Users must comply with all applicable laws in their jurisdiction
- Tax Obligations: Users are responsible for reporting and paying taxes on digital asset transactions
- Import/Export Rules: Users must comply with cryptographic device import/export regulations
- Financial Regulations: Users must follow applicable financial and securities regulations
- Anti-Money Laundering: Users must not use devices for illegal activities
3.3 Jurisdictional Considerations
- Prohibited Jurisdictions: Some countries may prohibit or restrict cryptocurrency hardware
- Regulatory Changes: Laws and regulations may change, affecting device usage
- Professional Advice: Users should consult legal professionals for jurisdiction-specific guidance
- Compliance Monitoring: Users must stay informed about regulatory developments
4. Risks, Liability, and User Responsibilities
Users must understand the inherent risks associated with cryptocurrency storage and the critical importance of proper device usage and backup procedures.
4.1 Critical Risk Factors
- Seed Phrase Loss: Loss of seed phrase results in permanent loss of access to digital assets
- No Recovery Possible: Rayduin cannot recover lost seed phrases or restore access to assets
- Device Damage: Physical damage to device may require seed phrase recovery
- User Error: Incorrect usage may result in asset loss or security compromise
- Market Volatility: Digital asset values may fluctuate significantly
4.2 Manufacturer Liability Limitations
- No Asset Responsibility: Rayduin is not responsible for the value or loss of digital assets
- No Market Liability: We are not liable for market fluctuations or trading losses
- Hardware Only: Our liability is limited to hardware defects under warranty terms
- User Responsibility: Users are solely responsible for proper device usage and security
- No Financial Advice: We do not provide investment or financial advice
4.3 Security Best Practices
- Secure Backup: Store seed phrase securely in multiple offline locations
- Physical Security: Protect device from theft, damage, and unauthorized access
- Firmware Updates: Keep device firmware updated for security patches
- Verification: Always verify transaction details on device display
- Privacy Protection: Maintain privacy of device ownership and usage
5. Device Setup and Support Guidelines
Proper device setup and ongoing maintenance are critical for security and functionality. Users must follow established procedures and utilize available support resources.
5.1 Initial Setup Requirements
- Authenticity Verification: Verify device authenticity using provided verification tools
- Tamper Evidence Check: Inspect packaging for signs of tampering before use
- Firmware Verification: Verify firmware integrity using cryptographic signatures
- Secure Environment: Perform initial setup in a secure, private environment
- Documentation Review: Read all provided documentation before device initialization
5.2 Seed Generation and Backup
- Offline Generation: Generate seed phrase offline using device's secure random number generator
- Manual Recording: Write seed phrase on provided recovery materials
- Verification Process: Verify seed phrase accuracy during initial setup
- Secure Storage: Store backup materials in secure, offline locations
- Multiple Copies: Create multiple backup copies stored in different locations
5.3 Ongoing Maintenance
- Firmware Updates: Regularly check for and install firmware updates
- Security Monitoring: Stay informed about security advisories and best practices
- Compatibility Checks: Verify supported networks and cryptocurrencies before use
- Backup Verification: Periodically verify backup integrity and accessibility
- Physical Inspection: Regularly inspect device for signs of damage or tampering
5.4 Support Resources
- Technical Documentation: Comprehensive user manuals and setup guides
- Support Channels: Email and phone support for technical assistance
- Community Resources: User forums and community-driven support
- Security Advisories: Regular security updates and vulnerability notifications
- Educational Materials: Best practices guides and security education resources
6. Advertising and Marketing Compliance
Our marketing and advertising practices comply with regulatory requirements and focus exclusively on hardware functionality rather than financial services.
6.1 Permitted Marketing Content
- Hardware Features: Technical specifications and security capabilities
- Key Storage Functionality: Private key storage and management features
- Security Benefits: Air-gapped design and tamper-evident features
- Compatibility Information: Supported cryptocurrencies and networks
- Setup and Usage: Installation and operational procedures
6.2 Prohibited Marketing Content
- Trading Services: Any mention of buying, selling, or trading functionality
- Financial Advice: Investment recommendations or financial guidance
- Profit Promises: Guarantees of returns or profit potential
- Market Predictions: Price forecasts or market analysis
- Exchange Services: Currency exchange or conversion services
6.3 Required Disclosures
- Hardware Only: Clear statement that we manufacture hardware devices only
- No Financial Services: Explicit disclaimer about lack of trading or financial services
- Legal Compliance: User responsibility for legal and regulatory compliance
- Risk Warnings: Disclosure of risks associated with cryptocurrency storage
- Liability Limitations: Clear explanation of manufacturer liability limits
6.4 Regulatory Compliance
- Advertising Standards: Compliance with local advertising regulations
- Truth in Advertising: Accurate and verifiable claims about product capabilities
- Consumer Protection: Clear and understandable terms and conditions
- Data Protection: GDPR and privacy law compliance in marketing activities
- Platform Policies: Adherence to advertising platform terms and conditions
7. Warranty and Support Limitations
Our warranty covers hardware defects and manufacturing issues but does not extend to software, data, or digital asset-related problems.
7.1 Hardware Warranty Coverage
- Manufacturing Defects: Coverage for defects in materials and workmanship
- Component Failures: Replacement for failed electronic components
- Physical Defects: Coverage for physical hardware issues
- Warranty Period: Two-year limited warranty from date of purchase
7.2 Warranty Exclusions
- User Damage: Damage caused by misuse, abuse, or accidents
- Software Issues: Problems with third-party software or applications
- Data Loss: Loss of private keys, seed phrases, or digital assets
- Market Losses: Financial losses due to market conditions
- Unauthorized Modifications: Damage from unauthorized hardware or firmware modifications
8. Contact Information and Support
For questions about this Usage Policy or our products, please contact us through the following channels:
Our support team can assist with technical questions, warranty claims, and general product information. For legal or regulatory questions, please consult with qualified professionals in your jurisdiction.
9. Policy Updates and Changes
This Usage Policy may be updated periodically to reflect changes in our products, services, or regulatory requirements. We will notify users of significant changes through our website and direct communications where appropriate.
Continued use of our products after policy updates constitutes acceptance of the revised terms. Users are encouraged to review this policy regularly to stay informed about their rights and responsibilities.