diff --git a/README.md b/README.md index 07813fc..f0ba74a 100644 --- a/README.md +++ b/README.md @@ -1,22 +1,23 @@ -Nunya.business +Nunya.business ============== > Receive business payments without revealing to others what you've earned. **Table of contents** -- [Nunya.business](#nunyabusiness) - - [About ](#about-) - - [User focused summary ](#user-focused-summary-) - - [Investor pitch ](#investor-pitch-) +- [Nunya.business](#top) + - [About ](#about) + - [User focused summary ](#user-focused-summary) + - [Investor pitch ](#investor-pitch) - [What is the problem it solves and the product market fit](#what-is-the-problem-it-solves-and-the-product-market-fit) - - [Development Deepdive ](#development-deepdive-) - - [Demo and Video ](#demo-and-video-) - - [Specification ](#specification-) - - [Setup and Usage ](#setup-and-usage-) - - [License ](#license-) - - [Disclaimer ](#disclaimer-) + - [Development Deepdive ](#development-deepdive) + - [Demo and Video ](#demo-video) + - [Specification ](#specification) + - [Setup and Usage ](#setup) + - [License ](#license) + - [Compliance and Security](#compliance-and-security) + - [Disclaimer ](#disclaimer) > Important: README.md should be **MAX 2 PAGES** @@ -69,6 +70,10 @@ It was built based on Scaffold ETH 2 that has MIT license that must be respected The Secret contracts were built based on the example [SecretPath Confidential Voting Tutorial](https://github.com/SecretFoundation/Secretpath-tutorials/tree/master/secretpath-voting). +## Compliance and Security + +See the [COMPLIANCE_AND_SECURITY](./_COMPLIANCE_AND_SECURITY.md) file for details of managing compliance and security. + ## Disclaimer -See the [DISCLAIMER](./_DISCLAIMER.md) file for details. +See the [DISCLAIMER](./_DISCLAIMER.md) file for details of managing liabilities and compliance. diff --git a/_COMPLIANCE_AND_SECURITY.md b/_COMPLIANCE_AND_SECURITY.md new file mode 100644 index 0000000..3deb505 --- /dev/null +++ b/_COMPLIANCE_AND_SECURITY.md @@ -0,0 +1,40 @@ +# Compliance and Security + +**Table of contents** + +* [User Restrictions](#user-restrictions) +* [User Responsibility](#user-responsibility) +* [Geographical Restrictions](#geographical-restrictions) +* [Anonymity](#anonymity) +* [Wallet Compliance](#wallet-compliance) +* [Conclusion](#conclusion) + +### User Restrictions + +Nunya.business and its associated and its use of cross-chain privacy gateway, proxy, and bridge contracts are designed for legitimate and lawful use only, and are not to be exploited by means of criminal or illicit activities. Users are obliged to adhere to all laws and regulations of their respective jurisdiction. Usage by politically exposed persons or their associates is strictly prohibited as per prevailing laws. + +Before using Nunya.business and its services, users must confirm and accept the following terms: + +If acting individually, you are of legal age as specified in your jurisdiction. You are not a politically exposed person currently in or recently retired from a prominent public role. You are not an immediate family member or closely associated with a politically exposed person. You are not involved in money laundering or financing of terrorism. Your access to the network doesn't violate any rules, laws, regulations, or directives in your country of residence or jurisdiction. You have never been arrested or convicted of any offence or crime. You are prepared to verify your identity upon request. + +### User Responsibility + +Use of Nunya.business and its use of cross-chain privacy gateway, proxy, and bridge contracts is solely at the risk of the user. The codebase, autonomous protocol, and decentralized networks are all open-source and are not controlled by any specific team. Contributors to Nunya.business are not liable for any loss or damage resulting from inherent risks associated with cryptography, blockchain, and digital wallet usage. + +The user agrees not to bypass location-based restrictions through the use of any technology. Users bear the responsibility of reporting and paying any relevant taxes. Any addresses suspected of malpractice can be blocked. + +### Geographical Restrictions + +While Nunya.business is in its Alpha stage with minimal restrictions, users must comply with their local, state, and federal laws. We strongly advise checking this before using Nunya.business and the networks that it uses. Certain jurisdictions may be programmatically restricted due to local regulatory authorities' policies that prevent anonymous transactions. + +### Anonymity + +The Securet Network token may, when used with cross-chain privacy gateway, proxy, and bridge contracts, cause privacy to be enabled. For the safety of all users, those from certain jurisdictions may be prohibited from using Nunya.business and accessing protocols that it uses. Post-alpha, restrictions may be implemented for additional countries based on legal considerations. + +### Wallet Compliance + +Nunya.business may in the future pursue integrations to ensure that wallets interacting with the Nunya.business do not contain funds from illicit sources. In that future case, suspicious wallets may be barred from depositing into Nunya.business and any protocols that it uses, and funds may not be withdrawn from Nunya.business to such wallets. + +### Conclusion + +Credit to the reference: https://docs.webb.tools/docs/projects/compliance-statement/ diff --git a/_DISCLAIMER.md b/_DISCLAIMER.md index 859a92b..6adce48 100644 --- a/_DISCLAIMER.md +++ b/_DISCLAIMER.md @@ -1,5 +1,15 @@ # Disclaimer +**Table of contents** + +* [Intro](#intro) +* [Regulatory Landscape](#regulatory-landscape) +* [Liabilities and Risks](#liabilities-and-risks) +* [Mitigation Strategies](#mitigation-strategies) +* [Regulatory Examples](#regulatory-examples) +* [Illustrative Cases](#illustrative-cases) +* [Conclusion](#conclusion) + Nunya.business implementation code is for testing purposes only using local or testnet tokens that have no monetary value. It is not to be used in production for facilitating the execution of making and receiving privacy-enhanced transactions. This guide is not intended to provide legal advice and should not be used as a substitute for seeking professional legal counsel. It is intended to provide a general overview of the regulatory landscape, potential liabilities, risks, and mitigation strategies associated with the execution of making and receiving privacy-enhanced transactions that interact with relayers using Nunya.business. @@ -12,7 +22,7 @@ No reader should act or refrain from acting based on the information in this gui We strongly recommend that all potential users of this Nunya.business implementation that wish to try to execute privacy-enhanced transactions with it and interact with relayers to consult with a qualified legal professional who is familiar with the blockchain and cryptocurrency industry in their jurisdiction. This will ensure you receive advice tailored to your specific circumstances and stay in compliance with all relevant laws and regulations. -### Regulatory Landscape +### Regulatory Landscape Executing privacy-enhanced transactions and interacting with relayers can bring with it an obligation to comply with several laws and regulations. This section aims to provide an overview of the regulatory landscape pertinent to privacy-enhanced transactions and relayer activities, though it is essential to consult with legal professionals for advice tailored to individual circumstances. @@ -42,7 +52,7 @@ Given the rapidly evolving nature of the blockchain and cryptocurrency industry, Understanding the regulatory landscape is critical for any entity operating in the blockchain and cryptocurrency space. Failure to comply with applicable laws and regulations can lead to substantial penalties and reputational damage. As such, potential users of privacy-enhancing transactions and relayers should seek legal advice to ensure their operations align with all relevant legal requirements. -### Liabilities and Risks +### Liabilities and Risks Operating a relayer in the Secret Network and making privacy-enhancing transactions involves potential liabilities and risks. This section will provide an overview of these risks, though it is not exhaustive, and operators are urged to seek professional advice to understand all potential liabilities and risks. @@ -70,7 +80,7 @@ Relayers and users making privacy-enhancing transactions might also face financi Non-compliance with regulations, involvement in illicit activities, or failure to provide reliable service could harm a relayer's reputation and those wishing to make and receive privacy-enhanced transactions. In a competitive market, reputation is critical to attracting and retaining users. Consequently, operators should ensure they operate ethically and reliably to maintain a strong reputation. -### Mitigation Strategies +### Mitigation Strategies To manage the potential liabilities and risks involved in operating a relayer and making and receiving privacy-enhanced transactions, it's essential to develop and implement effective mitigation strategies. Here are some suggested strategies, but please note that they should be customized to your specific circumstances and legal jurisdiction: @@ -104,7 +114,7 @@ Consider obtaining insurance coverage to protect against potential losses from l Developing effective mitigation strategies is a key part of managing the liabilities and risks of operating a relayer and making and receiving privacy-enhanced transactions. Regularly reviewing and updating these strategies is also important, as the operational and regulatory environment can change rapidly. As always, seek professional advice when developing these strategies to ensure they are comprehensive and comply with all relevant laws and regulations. -### Regulatory Examples +### Regulatory Examples While the regulations governing the blockchain and cryptocurrency sector vary significantly across different jurisdictions, here are some examples that can illustrate the diversity in the regulatory landscape: @@ -132,7 +142,7 @@ Switzerland has a supportive regulatory environment for blockchain and digital a These examples underscore the diversity in the regulatory environment for blockchain and digital assets worldwide. Regulations can change quickly and vary significantly by jurisdiction, emphasizing the importance for potential relayers and those making and receiving privacy-enhanced transactions to seek professional legal advice specific to their situation and jurisdiction. -### Illustrative Cases +### Illustrative Cases To help understand the potential liabilities and risks involved in operating a relayer and those making and receiving privacy-enhanced transactions using Secret Network and Nunya.business, let's consider some hypothetical scenarios: @@ -162,7 +172,7 @@ In this case, the operator could face significant penalties under data protectio These hypothetical cases provide examples of how the failure to properly manage the regulatory landscape, comply with legal obligations, implement technological safeguards, and respect user privacy can lead to significant liabilities and risks. As always, it's crucial to seek professional advice to ensure all potential issues are adequately addressed. -### Conclusion +### Conclusion Operating a relayer and making and receiving privacy-enhanced transactions in the Secret Network and using Nunya.business presents a unique opportunity in the rapidly evolving blockchain and cryptocurrency industry. While the potential rewards can be significant, it's important to understand and manage the associated liabilities and risks.