Terms and Conditions of Use
Last updated: March 2026
Technical Sovereignty Preface
This document establishes the legal and technical terms and conditions governing the acquisition, deployment, and use of Aegis infrastructure (hereinafter, "the Infrastructure"). By initiating the Admission Protocol, the user (hereinafter, "the Holder") acknowledges that Aegis is not a custody entity, bank, or financial services provider, but an engineering provider designed for sovereign digital asset management and Private Liquidity Settlement (PLS).
The Holder accepts that the relationship is strictly technological and that, after the final technical transfer, operational sovereignty and asset responsibility reside exclusively with them, exonerating Aegis from any power of intervention over the managed capital.
01 Nature of the Infrastructure
Aegis delivers to the Holder a dedicated infrastructure instance, logically and physically isolated from any shared or centralized environment. This Infrastructure allows the execution of a private asset management ecosystem under the total technical control of the Holder, definitively eliminating any counterparty risk, censorship, or delegated custody by third parties.
02 Shielding and Sovereignty Definitions
Sovereign PLS: Settlement system that allows the operation of digital assets in a shielded environment invisible to external actors to the private node.
Technical Sovereignty: State of inalienability where signature and execution authority resides exclusively on the physical device and the biometric identity of the Holder.
Zero-Backdoor: Security protocol that guarantees the elimination of any access, master key, or engineering credential after the final deployment of the instance.
03 Admission and Validation Protocol
Access to the Infrastructure is strictly conditioned on successfully completing a rigorous Admission Protocol. Aegis reserves the right of admission based on technical integrity criteria and compliance with operational profiles compatible with the security architecture. Providing truthful information during this protocol is the sole responsibility of the Holder for the correct dimensioning and configuration of the limits of their private instance.
04 Implementation and Sovereignty Transfer (Phase 4)
Aegis' technical and operational responsibility definitively ends with the execution of Phase 4: Sovereignty Transfer. After delivery of the master credentials, Aegis activates the Zero-Backdoor protocol, permanently removing its engineering accesses. The Holder accepts that, after this milestone, Aegis is unable to recover, view, block, or reverse any operation or access to the infrastructure.
05 Governance and Local Biometric Security
Access to the instance is managed locally through secure hardware enclaves (FaceID/TouchID) that Aegis does not store or view at any time. It is the sole responsibility of the Holder to configure multi-signature governance protocols (M-of-N) to guarantee the recovery and continuity of assets against the physical loss of devices or personal incapacity.
06 Aegis Bridge (Visa) and Risk Segregation
The use of Aegis Bridge is an optional spending module that operates compartmentalized and segregated from the main PLS vault. Transactions on international payment networks are subject to verification processes (KYC) managed by third parties, who have no technical visibility over the central infrastructure nor over the sovereign vault balances.
07 Intellectual Property and Licensing
NovaCore Software retains all intellectual property rights to Aegis' code, design, algorithms, and architecture. The Holder receives a perpetual, exclusive, and non-transferable license to use their dedicated instance. Any attempt at reverse engineering, duplication, or commercialization of the proprietary software by the Holder is strictly prohibited.
08 Prohibited Uses and Individual Compliance
The Holder commits to not using the Infrastructure for internationally classified illicit activities. Aegis does not supervise nor can audit the use of the infrastructure after the sovereignty transfer, so any civil or criminal liability derived from its use falls exclusively on the Holder.
09 Technical Liability Exclusion
Aegis is exempt from all liability for capital loss derived from negligence in the custody of private keys, seed phrases, or biometric factors. Likewise, no responsibility is assumed for critical failures in external blockchain networks (Ethereum, BSC, etc.) or extreme market value fluctuations of the managed assets.
10 Jurisdiction, Confidentiality, and Dispute Resolution
Confidentiality: All phases of technical deployment, as well as communications between the parties, are governed by a protocol of maximum discretion and professional secrecy.
Conflict Resolution: Any controversy arising strictly during the implementation process will be resolved through international commercial arbitration.
Contractual Termination: After the sovereignty transfer (Phase 4), the contractual relationship is considered fulfilled and terminated for operational support purposes, consolidating the absolute autonomy of the Holder.
11 Antifragility and Perpetual Autonomy
The infrastructure instance delivered to the Holder is technically autonomous and independent of Aegis' operational existence as a corporate entity. There is no centralized interruption mechanism or 'kill-switch', guaranteeing that access and management of assets persist perpetually as long as the Holder retains their physical and digital credentials.
12 Evolution and Implementation Protocol
Aegis is committed to the continuous improvement of its technical architecture to raise the privacy and sovereignty standards of the network.
Implementation on Demand: Due to the Zero-Backdoor protocol, Aegis has no technical access to perform modifications, patches, or updates on an infrastructure already delivered and under the Holder's control. Therefore, any functional improvement or security update will be performed exclusively by deploying a new infrastructure instance.
Migration Decision: The Holder has absolute power to decide if they wish to maintain their current operational environment indefinitely or if they voluntarily request the delivery of a new improved infrastructure.
13 Structural Transparency and Absence of Commissions
Aegis does not apply commissions for transactions, capital management, or operational maintenance after the final deployment of the instance. The only operational costs are those derived from network fees ("Gas fees") intrinsic to the underlying decentralized protocols, which are managed directly by the Holder's infrastructure and are external to Aegis.
""The initiation of the Admission Protocol constitutes full and conscious acceptance of these terms, acknowledging that inexpugnable financial sovereignty requires absolute individual responsibility for the security and management of private assets.""
For any technical inquiry: infraestructura@aegispls.com