All transactions on this platform are protected with bullet-proof cryptographic verification signatures. Every payment is verified on-chain before any transaction executes, ensuring maximum security and transparency.
- On-Chain Verification: All transactions are cryptographically verified on the blockchain before execution
- Bullet-Proof Signatures: Every payment requires cryptographic signature verification
- Multi-Chain Support: Secure transactions across Ethereum, Base, Polygon, Arbitrum, and Optimism
- No Transaction Without Verification: No transaction proceeds without full cryptographic verification
- 100% Transparent: All transactions are publicly verifiable on-chain
- Transaction Tracking: Each transaction hash is stored and tracked to prevent duplicate downloads
- Wallet Signature Required: Users must sign a message authorizing the transaction
- On-Chain Verification: Transactions are verified on-chain before any action is taken
- Transaction Hash Tracking: Resume downloads are tied to specific transaction hashes to prevent abuse
- LocalStorage Protection: Transaction hashes are stored locally to prevent multiple downloads from the same payment
- Real-Time Price Conversion: ETH prices are fetched from CoinGecko API for accurate conversion
- Ethereum Mainnet (Chain ID: 1)
- Base (Chain ID: 8453)
- Polygon (Chain ID: 137)
- Arbitrum (Chain ID: 42161)
- Optimism (Chain ID: 10)
Note: Testnet support has been removed. Only mainnet chains are supported for production use.
- Always verify the recipient address before sending transactions
- Double-check transaction details in your wallet before confirming
- Keep your wallet software and browser extensions updated
- Never share your private keys or seed phrases
- Verify transaction hashes on block explorers after completion
If you discover a security vulnerability, please report it responsibly:
Email: sebejaz99@gmail.com
- Description of the vulnerability
- Steps to reproduce (if applicable)
- Potential impact
- Suggested fix (if you have one)
- Initial Response: Within 48 hours
- Status Update: Within 7 days
- Resolution: As quickly as possible, depending on severity
We appreciate responsible disclosure of security vulnerabilities. We will:
- Acknowledge receipt of your report within 48 hours
- Provide regular updates on the status of the vulnerability
- Credit you for the discovery (if desired) after the issue is resolved
- Work with you to ensure the vulnerability is properly addressed
- No Transaction Without Verification: All transactions require cryptographic verification
- On-Chain Transparency: All transactions are publicly verifiable
- No Backdoors: No hidden mechanisms that bypass security checks
- Open Source: Core security mechanisms are transparent and auditable
Last Updated: 17th Nov, 2025