VaultBridge

    VAULTBRIDGE

    Secure File Sharing

    Version 3.1 (Quantum + R2)

    Terms of Engagement

    Binding protocols for the encrypted age.

    1

    1. The Agreement

    By initializing a secure channel on VaultBridge, you agree to these terms. If you intend to use this platform for malicious acts, leave now.

    2

    2. The Service

    VaultBridge provides ephemeral, encrypted data transfer focused on Zero-Knowledge architecture.

    Universal Live Clipboard: Real-time, RAM-only synchronization between devices via WebSocket.
    Secure Vaults: Time-limited encrypted file storage with adaptive streaming decryption and Dual-Provider Storage Routing (R2/Supabase).
    The "Burn" Protocol: A manual override to instantly incinerate session data from our volatile memory.
    Burn-on-Read: Option to auto-destruct a vault immediately after its first successful download.
    Instant Auto-Access: When sharing vaulted content via Direct Links or QR codes, the Access PIN serves strictly as a URL hash fragment (e.g., #code). This is processed strictly via your browser's client-side memory; we absolutely never log or retain it.
    3

    3. Usage Rules (The "Don't Be Evil" Clause)

    You agree NOT to use VaultBridge for:

    Hosting malware, ransomware, or C2 infrastructure.
    Distributing child exploitation material (CSAM).
    Phishing or social engineering.
    DoS / Resource Abuse: Intentionally holding WebSocket connections open to exhaust server memory or flooding the synchronization pipeline.

    Abuse Policy: While we cannot read your files, we monitor network traffic patterns (metadata only). If your connection behaves like a botnet, we will ban your IP range immediately.

    4

    4. No Warranties (The "Use At Your Own Risk" Clause)

    This software is provided "as is."

    We guarantee the math (AES-256-GCM is verified).
    We do NOT guarantee availability. We are not a backup service. If your timer runs out, your data is incinerated. If our server catches fire, your data is gone.
    Live Clipboard Volatility: Clipboard data exists ONLY in RAM. If the server restarts, data is lost. This is a feature, not a bug.
    Memory Storage Fallback: In the event of primary database failure, the system automatically switches to Volatile Memory Storage. Data stored in this mode exists ONLY in RAM and will be lost if the server restarts. We do not guarantee persistence in this state.
    5

    5. Liability

    You acknowledge that you are solely responsible for the custody of your encryption keys (PINs/Links). If you lose them, we cannot help you. We have explicitly removed all traditional "Lost Code / Recovery" functionality. We possess Zero Knowledge of your keys. If you share them with the wrong person, we cannot stop them.

    6

    6. Termination

    We reserve the right to terminate connections that destabilize our infrastructure. You also have the right to terminate us: use the "Burn" button to forcefully wipe your session data from our existence.

    7

    7. Governing Law

    Code is Law. But for the lawyers: These terms are governed by the laws of the State of Delaware.

    Encrypt everything. Trust nothing.