Comment on page
Please read this Disclaimer carefully before accessing, interacting with, or using the EYWA Protocol (hereafter "the Protocol") software, consisting of the Protocol technology stack (in particular its smart contracts).
This disclaimer relates to the use of the Protocol software. The Protocol is a decentralized peer-to-peer protocol that people can use to create liquidity and trade certain digital assets. Your use of the Protocol involves various risks, including, but not limited to, losses while digital assets are being supplied to the Protocol and losses due to the fluctuation of prices of tokens in a trading pair or liquidity pool. Before using the Protocol, you should review the relevant documentation to make sure you understand how the Protocol works. Additionally, just as you can access email protocols such as SMTP through multiple email clients, you can access the Protocol through dozens of web or mobile interfaces. You are responsible for doing your own diligence on those interfaces to understand the fees and risks they present.
No Relationship to EYWA Development / Usage of the Protocol Software at Own Risk
While EYWA Development (“we”, “our”, or “us”) developed the Protocol Software, the Protocol Software runs in a fully decentralized and autonomous manner on the Ethereum network. We are neither involved nor in any way responsible for the operation, running or functioning of the Protocol Software and/or any of the interactions, collaborations or factual relationships between Users and the smart contracts of the Protocol Software. We have neither access to nor any other possibility to control and/or influence the corresponding transactions, deposits and/or allocations made by the Users and the involved smart contracts using the Protocol Software. We do not operate an own frontend, nor has it entered in any relationship towards the frontend operators.
Although we developed much of the initial code for the Protocol, we do not provide, own, or control the Protocol, which is run by smart contracts deployed on the Ethereum blockchain. No developer or entity involved in creating the Protocol will be liable for any claims or damages whatsoever associated with your use, inability to use, or your interaction with other users of, the Protocol, including any direct, indirect, incidental, special, exemplary, punitive or consequential damages, or loss of profits, cryptocurrencies, tokens, or anything else of value.
In particular, we have not and will not enter into any legal or factual relationship with any User of the Protocol Software. Consequently, WE ARE NOT LIABLE TO ANY USER FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE, IN CONNECTION WITH THE USE OR INABILITY TO USE THE PROTOCOL SOFTWARE (INCLUDING BUT NOT LIMITED TO LOSS OF DATA, BUSINESS INTERRUPTION, DATA BEING PROVIDED BY THIRD PARTIES, E.G. ORACLES, DATA BEING RENDERED INACCURATE OR OTHER LOSSES SUSTAINED BY A USER OR THIRD PARTIES RELATED TO THE PROTOCOL SOFTWARE AND/OR ANY ACTIVITY OF A FRONTEND OPERATOR OR A FAILURE OF THE PROTOCOL SOFTWARE TO OPERATE WITH ANY OTHER SOFTWARE).
As the Protocol Software is of experimental nature it may contain bugs, defects, or errors (including any bug, defect, or error relating to or resulting from the display, manipulation, processing, storage, transmission, or use of data) that may materially and adversely affect the use, functionality, or performance of the Protocol Software or any product or system containing or used in conjunction with the Protocol Software.
THE PROTOCOL SOFTWARE HAS BEEN PROVIDED "AS IS" AND “AS AVAILABLE”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, USAGE, SUITABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, OR AS TO THE WORKMANSHIP OR TECHNICAL CODING THEREOF, OR THE ABSENCE OF ANY DEFECTS THEREIN, WHETHER LATENT OR PATENT.
There are no official frontend operators, and the use of any frontend is made by User at its own risk. To assess the trustworthiness of a frontend operator lies in the sole responsibility of the User and must be made carefully.
Further, as the Protocol Software is built on the Ethereum network its proper functioning is depending on the Ethereum network.
Assumption of Risks of Cryptographic Token, Currencies and Systems
There are also general risks associated with purchasing, owning and using cryptographic tokens and digital assets. The markets for these digital assets are highly volatile due to factors including (but not limited to) adoption, speculation, technology, security, and regulation. You acknowledge and accept that the cost and speed of transacting with cryptographic and blockchain-based systems such as Ethereum are variable and may increase dramatically at any time. You further acknowledge and accept the risk that your digital assets may lose some or all of their value while they are supplied to the Protocol through the Interface, you may suffer loss due to the fluctuation of prices of tokens in a trading pair or liquidity pool, and, especially in expert modes, experience significant price slippage and cost. You understand that anyone can create a token, including fake versions of existing tokens and tokens that falsely claim to represent projects, and acknowledge and accept the risk that you may mistakenly trade those or other tokens. You further acknowledge that we are not responsible for any of these variables or risks, do not own or control the Protocol, and cannot be held liable for any resulting losses that you experience while accessing or using the Interface. Accordingly, you understand and agree to assume full responsibility for all of the risks of accessing and using the Interface to interact with the Protocol.
User is solely responsible for transacting and holding cryptographic tokens and digital assets while accessing and/or interacting with the Protocol Software, and for implementing reasonable measures for securing the wallet, vault or other storage mechanism used to receive and hold such cryptographic tokens and digital assets, including any requisite private key(s) or other credentials necessary to access such storage mechanism(s). If User’s private key(s) or other access credentials are lost, User may lose access to cryptographic tokens and digital assets.
Risk of Regulatory Actions and Compliance with Laws
The Protocol Software could be impacted by one or more regulatory inquiries or regulatory actions, which could impede or limit User’s ability to access or use the Protocol Software.
User is solely responsible for complying with applicable law when interacting with the Protocol Software whatsoever.