3hom Security Policies & Terms
Effective Date: August 20, 2025
1. Agreement to Security Terms
This document (“Policy”) defines the terms between you (“User”) and 3hom Security Systems (“Company”). By using 3hom devices or secure platforms, you acknowledge and accept these terms.
Activating a device is considered a digital acknowledgment. Blockchain-based timestamps are maintained for verification and audit purposes.
3hom manufactures only air-gapped hardware security devices and does not offer custody, trading, or investment services.
2. Device Features & Specifications
All hardware incorporates state-of-the-art security components:
- CC EAL 6+ certified processors
- FIPS 140-3 Level 4 tamper-resistant hardware
- Quantum-safe encryption protocols
- Optical anti-tampering mechanisms
Firmware is rigorously evaluated through:
- Static and dynamic code reviews
- Side-channel and vulnerability assessments
- Formal cryptography validation
- 72-hour expert-led penetration tests
3. User Responsibilities
Users are expected to:
- Create and securely store recovery seeds
- Physically protect authentication devices
- Install firmware updates promptly
- Maintain accurate custody and transfer records
Recommended practices include:
- Faraday-shielded storage for backups
- Multi-factor authentication
- Distribution of recovery keys across secure locations
- Periodic device integrity checks
4. Liability Limitations
3hom liability is limited to defective device replacement. The company is not liable for:
- Loss or theft of cryptocurrency assets
- Transaction errors
- Blockchain forks or protocol updates
- Quantum computing risks
- Phishing or social engineering attacks
Users acknowledge:
- No system guarantees complete security
- Threats evolve continuously
- User errors are the main risk source
- Regulatory requirements may change without notice
5. Data Privacy & Handling
3hom enforces strict privacy protocols:
- Zero-knowledge encryption
- Minimal and temporary data retention
- On-device cryptographic processing
- Optional anonymous routing via Tor
Collected data is restricted to:
- Device attestation proofs
- Anonymous telemetry for security monitoring
- Transaction logs for compliance purposes
6. Intellectual Property
All proprietary technologies belong to 3hom , including:
- Seventeen active patents in security hardware
- Confidential physical security systems
- Exclusive anti-tamper firmware
- Custom secure element designs
Unauthorized actions such as:
- Hardware reverse engineering
- Bypassing security mechanisms
- Firmware or software extraction
may result in legal action.
7. Warranty & Support
3hom devices include:
- Two-year limited warranty for defects
- Secure documented replacement procedures
- Forensic evaluation of returned devices
- Chain-of-custody verification
Warranty exclusions:
- Damage from tampering or unauthorized modifications
- Accidental or environmental damage
- Minor cosmetic wear
8. Governing Law & Disputes
This Policy is governed by:
- Texas Uniform Electronic Transactions Act
- Computer Fraud and Abuse Act
- Relevant cryptography export laws
Dispute resolution:
- Binding arbitration in Travis County, Texas
- Strict confidentiality
- Preservation of forensic evidence
9. Policy Termination
The Policy ends when:
- All 3hom devices are destroyed
- A notarized termination request is submitted
- Official device decommissioning is completed
Post-termination obligations:
- Maintain confidentiality
- Respect liability limitations
- Follow dispute resolution protocols
10. Support & Contact
Questions regarding this Policy:
- Contact via on-chain address:3hom.com
Emergency support includes:
- 24/7 security hotline
- Remote device zeroization
- Forensic support team
Security Operations HQ
Address:
3hom Security Complex
120 Berkeley Dr, Hamilton, OH 45013