Terms & Conditions

These terms govern your access to and use of all services provided by Grey Node Security.

1. Service Engagement & Finalization

All service engagements are binding. Once a client project — including websites, mobile applications, software builds, penetration tests, or infrastructure configurations — is finalized and signed off, Grey Node Security's responsibility concludes. Any post-completion support, updates, or security audits will be billed as a separate service.

We are not responsible for third-party compromise, negligence, plugin vulnerabilities, or post-delivery system exposure. Clients may purchase additional protection or hardening plans if needed.

2. No Refunds Policy

All payments made to Grey Node Security are final. We do not offer refunds under any circumstances. Our time, code, analysis, recovery processes, and effort are valuable and non-reversible. We do not operate as a charity; we operate as a technical and cybersecurity agency offering premium solutions.

3. Wallet Recovery Disclaimer

We provide services to recover lost or inaccessible cryptocurrency wallets (e.g., wallet.dat files) when clients supply evidence or access credentials. Anonymous submissions are assumed to be the property of the submitter. If the wallet is not yours, do not submit it. We are not liable for misuse or misrepresentation of wallet ownership.

Grey Node Security will attempt recovery in good faith. If successful, our fee is 50% of the recovered amount, payable before release of recovered assets or keys. Wallets may be irrecoverable or corrupted — no guarantees are offered.

4. Ownership of Code & Intellectual Property

All code, systems, software, designs, mobile apps, and other technical deliverables created by Grey Node Security remain the intellectual property of Grey Node Security and the developers involved. Clients receive a usage license for the finalized product — they do not receive code ownership.

Any attempt to copy, redistribute, resell, reverse engineer, or repackage our code without formal licensing or written permission is strictly prohibited. Violators are subject to prosecution under Texas law and applicable federal computer and cybercrime regulations.

5. Indemnity & Client Responsibility

Clients agree to indemnify and hold Grey Node Security harmless against any damage, claim, breach, incident, or compromise resulting from their internal systems, third-party hosting, or mismanagement after the delivery of services. We provide secure systems; it is the client’s responsibility to maintain them unless under ongoing contract.

6. Governing Law

This agreement shall be governed by and interpreted in accordance with the laws of the State of Texas and the United States of America. All disputes shall be resolved in a Texas court of competent jurisdiction.

By engaging with Grey Node Security in any form, you hereby agree to these terms in full.