Private USDC, USDT & SOL payments are opening to everyone soon.

Legal · Terms

Terms of Use.

Last updated · April 1, 2026

Effective immediately upon access
Cloak Privacy Corp. · PH The Century Tower, Office 317 · Panama

Mainnet Alpha — Unaudited Software

Cloak is live on Solana Mainnet in alpha. The protocol has not yet undergone formal third-party security audits. Smart contracts are immutable once deployed and fixes may require full redeployment.

01

Acceptance of Terms

By accessing or using the Cloak Protocol, interface, SDK, relay infrastructure, or related services (collectively, the Protocol), you confirm that you have read, understood, and agree to be bound by these Terms of Use.

If you do not agree, you must not access or use the Protocol. These Terms constitute a binding agreement between you and Cloak Privacy Corp. (Cloak, we, us).

02

Description of Service

Cloak is a privacy-preserving execution layer built on Solana. It enables zero-knowledge private transactions, including transfers, swaps, and batch payments, with cryptographic proofs verified on-chain.

The Protocol includes: (i) an on-chain Shield Pool program (open-source, Apache License 2.0), (ii) Cloak-operated relay infrastructure, and (iii) Cloak-operated SDK and interface components. The Protocol is non-custodial: Cloak does not hold or control user funds.

If Cloak relay infrastructure is unavailable, funds remain in the on-chain pool and may be accessed through compatible relay infrastructure. Dependency is availability, not custody.

03

Eligibility

To use the Protocol, you must:

  • Be at least 18 years old
  • Have legal capacity to enter binding contracts in your jurisdiction
  • Not be a Restricted Person (Section 05)
  • Comply with applicable laws, including digital asset, financial services, privacy, AML, and sanctions laws
04

Security Disclosures

Important

  • The Protocol is live on Solana Mainnet in alpha phase and has not undergone formal third-party security audits
  • Smart contracts are immutable once deployed; vulnerabilities may require full redeployment
  • Cryptographic systems, including zero-knowledge implementations, may contain undiscovered flaws
  • Relay infrastructure may experience downtime or service degradation
  • Loss of funds may result from bugs, vulnerabilities, user error, network conditions, or unforeseen protocol behavior
05

Restricted Persons and Jurisdictions

You may not use the Protocol if you are a Restricted Person, including persons or entities subject to applicable sanctions or blocked-party restrictions. This includes entities owned or controlled by such persons.

Cloak may implement interface-level controls, geographic restrictions, wallet blocklists, and related compliance safeguards. Circumventing these controls is a material breach of these Terms.

06

Wallet Connection and Non-Custodial Nature

The Protocol is entirely non-custodial. You are solely responsible for wallet security, private keys, seed phrases, transaction approvals, and account permissions.

Cloak cannot recover lost credentials, reverse blockchain transactions, freeze assets, or provide account recovery.

07

Acceptable Use

  • Do not use the Protocol for money laundering, sanctions evasion, terrorism financing, fraud, or other unlawful purposes
  • Do not process proceeds of criminal activity
  • Do not reverse-engineer, decompile, exploit, or interfere with proprietary protocol components
  • Do not disrupt Protocol performance, security, or availability
  • Do not bypass technical access controls, wallet blocklists, or geographic restrictions
  • Do not use the Protocol if you are a Restricted Person or acting on behalf of one
08

Sanctions Compliance

Cloak maintains sanctions controls for hosted components, including screening and blocking wallet addresses listed under applicable sanctions frameworks and maintaining a wallet blocklist at the interface level.

Cloak cannot guarantee that direct interactions with immutable on-chain programs can be technically blocked in all cases. Users remain independently responsible for sanctions compliance.

09

Privacy Architecture and Selective Transparency

Cloak is designed so base-layer protocol operators cannot directly link deposits and withdrawals or reconstruct complete user transaction histories from private execution flows alone. This is a cryptographic architecture property, not a policy promise.

For enterprise configurations, Cloak supports selective transparency through optional viewing-key workflows, enabling permissioned audit visibility for authorized internal teams, external auditors, or regulators where applicable.

10

Intellectual Property

The on-chain Shield Pool program is open-source software under the Apache License 2.0. That license governs use of that component.

All other Protocol components, including relay infrastructure, SDK, interface, documentation, branding, and proprietary algorithms, are owned by Cloak Privacy Corp. unless otherwise stated in a written agreement.

11

Fees

The Protocol may charge transaction fees, including fixed and variable components. Current schedules are published in Cloak documentation.

Cloak may update fee schedules by publishing notice in documentation or interface channels. Fees are non-refundable once a transaction is submitted to blockchain infrastructure.

12

Disclaimer of Warranties

AS IS · AS AVAILABLE

TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE PROTOCOL IS PROVIDED WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.

13

Limitation of Liability

To the maximum extent permitted by law

Cloak and its officers, directors, employees, and contributors are not liable for direct, indirect, incidental, consequential, special, exemplary, or punitive damages, including loss of assets, revenue, data, or goodwill, arising from Protocol use, smart contract issues, cryptographic failures, relay downtime, user error, unauthorized wallet access, network conditions, or regulatory action.

14

Indemnification

You agree to indemnify and hold harmless Cloak Privacy Corp. and its representatives from claims, liabilities, losses, costs, and expenses (including reasonable legal fees) arising out of your access to or use of the Protocol, your breach of these Terms, or your violation of applicable law.

15

Modifications & Termination

Cloak may modify these Terms at any time. Updated Terms become effective upon posting at cloak.ag/terms. Continued use after updates constitutes acceptance of revised Terms.

Cloak may suspend or terminate access to hosted interface and relay infrastructure for legal, compliance, security, or policy reasons. Due to decentralized architecture, direct on-chain interactions may remain technically possible outside hosted services.

16

Governing Law and Dispute Resolution

These Terms are governed by the laws of the Republic of Panama, without regard to conflict-of-law provisions.

Disputes arising from or relating to these Terms shall be finally settled by binding arbitration under the UNCITRAL Arbitration Rules. Seat of arbitration: Panama City, Republic of Panama. Language: English.

17

Severability and Entire Agreement

If any provision of these Terms is found invalid or unenforceable, the remaining provisions remain in full force and effect. These Terms constitute the entire agreement between you and Cloak regarding the Protocol and supersede prior understandings relating to this subject.

18

Contact

For legal inquiries, sanctions notices, compliance requests, or questions about these Terms:

Cloak Privacy Corp.
PH The Century Tower, Office 317
Vía Ricardo J. Alfaro, Betania, District of Panama
Republic of Panama
legal@cloak.ag

Contact

Questions about these Terms?