Ruby One V2
  • Ruby One V2 - Your Complete Ruby One Wallet Guide
  • General Introduction
    • Vision of Ruby One
    • What is Ruby One V2?
    • What is MPC technology?
    • Is MPC technology secure?
    • What are the benefits of MPC technology?
  • Why Use Ruby One
    • High-Security Wallet Access Through MPC
    • Contract Accounts for Secure and User-Friendly Blockchain Interaction
    • Third-Party DApp Integration with the Ruby DApp Bridge
    • Bridging the Web2-Web3 Gap
  • Tech Introduction
    • MPC-Secret Sharing
    • MPC-Threshold Signature Scheme
    • Social Recovery - DKIM
    • Contract Account Dynamic Upgrade
    • DApp Bridge
    • Ruby One V2 Upgrade Log
  • How to Use Ruby One V2
    • Launch App
    • Sign Up
    • Login Via Google
    • Login Via Email
    • Set Local Password
    • Backup Key Fragments
    • Three Test Networks
    • Send & Receive Crypto
    • Social Recovery Your Account
    • Sign Out & Clear Data
  • Term of Use
    • Welcome to Ruby Protocol
    • About the Website
    • Intellectual Property
    • Acceptable Use of the Website
    • Wallet Address, Private Key, and Backup Capabilities
    • Accuracy of Information Provided by User
    • Your Use of Ruby’s Services
    • Privacy Policies
    • Disclosure of Information
    • Changes and Availability
    • Contacting us via the Website
    • Age Restriction and Eligibility
    • Disclaimer of Warranty
    • Limitation of Liability
    • Changes to the Terms
    • Contact Us
  • Ruby One - MPC Wallet
Powered by GitBook
On this page
  1. Term of Use

Your Use of Ruby’s Services

You agree that you will not violate any laws when using our Services. This includes any local, provincial, state, federal, national, or international laws that may apply to you. You agree that you will not use our Services to pay for, support, or otherwise engage in any illegal activities including, but not limited to, illegal or otherwise prohibited trade, illegal gambling, fraud, money laundering, or terrorist activities. For the avoidance of doubt, if we discover that you have violated these Terms and/or any applicable laws or regulatory requirements, we reserve all of our rights and remedies under these Terms and at law and will take all necessary actions against you. You further agree that: (i) you will not encourage or induce any third party to engage in any of the activities prohibited under this Section; (ii) you will not impersonate someone or use or attempt to use another user’s wallet without authorization or use our Services in any manner that could interfere, disrupt, negatively affect, or inhibit other users from fully enjoying it; (iii) you will not distribute any virus or other harmful computer code through Ruby Protocol; (iv) you will not take any action that may impose an unreasonable or disproportionately large load on our or any of our third party providers’ infrastructure; (v) you will not reverse engineer or bypass, circumvent, or attempt to bypass or circumvent any measures that we may use to prevent or restrict access to the Services including, without limitation, other accounts, computer systems, or networks connected to the Services; and (vi) you will not violate, misappropriate or infringe the rights of Ruby Protocol, our users, or others, including privacy, publicity, intellectual property, or other proprietary rights.

Although we have no obligation to monitor any user content, we have absolute discretion to take any necessary actions any time and for any reason without notice in the event you breach these Terms. Any use of Ruby Protocol other than as specifically authorized in these Terms, without our prior written permission, is strictly prohibited and we shall have the right to terminate your license to use Ruby Protocol immediately without notice. You acknowledge and accept that by using the Services, you may be exposed to content that is offensive, indecent, or objectionable. We take no responsibility and assume no liability for any user content, including any loss or damage to any of your user content.

PreviousAccuracy of Information Provided by UserNextPrivacy Policies

Last updated 1 year ago