Freedom Online: Secure, Limitless, Fearless

elonVPN: the only VPN that you can make a lot of money from.

USER AGREEMENT

Effective Date: 1 January 2025
Provider: Elon Tech Inc., an Australian incorporated entity (“Company”, “We”, “Us”)
User: Any individual or entity accessing the Services (“User”, “You”)


1. Acceptance of Terms

1.1 By accessing or using the VPN and network acceleration services (“Services”), You agree to be bound by this Agreement. If You do not agree, immediately cease using the Services.
1.2 We reserve the right to modify this Agreement at any time. Continued use after changes constitutes acceptance.


2. Service Description

2.1 The Services provide encrypted internet connectivity and network optimization tools. We do not guarantee uninterrupted access, specific speeds, or compatibility with all devices/websites.

2.2 Prohibited Jurisdictions: The Services are not intended for use in countries where VPNs are restricted. You are solely responsible for compliance with local laws. You must NOT use our product if you are citizen of UAE, Iran, Russia, Iraq, Türkiye and China. We do not have any responsibility for any consequence if this term is violated.


3. User Obligations

3.1 Lawful Use: You agree NOT to use the Services for:

  • (a) Illegal activities under Australian or Your jurisdiction’s laws (e.g., hacking, copyright infringement, fraud);
  • (b) Transmitting harmful content (malware, phishing, etc.);
  • (c) Bypassing geo-restrictions to infringe third-party rights;
  • (d) Any action threatening national security or public order.

3.2 Account Security: You are responsible for maintaining login credentials confidentiality. Notify us immediately of unauthorized access.

3.3 Cash Transfer of Commissions: You are responsible for providing a bank account or debit card number in countries other than UAE, Iran, Russia, Iraq, Türkiye and China for cash transfer of the commissions.

3.4 Device Limit: No more than 3 users can be registered on each device and no user can log in to more than 3 devices at the same time.

3.5 Refund Policy: Unless there are special circumstances, we provide a seven-day no-reason refund policy, but the refund will deduct the handling fee we paid. We reserve the right to interpret the refund policy.


4. No Warranty & Liability Limitation

4.1 “As Is” Basis: The Services are provided without warranties of any kind, express or implied, including merchantability, fitness for purpose, or non-infringement.

4.2 Exclusion of Liability: To the fullest extent permitted by law, We shall not be liable for:

  • (a) Indirect, incidental, or consequential damages (e.g., data loss, profits loss);
  • (b) User misconduct or third-party actions;
  • (c) Service interruptions due to force majeure (e.g., government blocking, natural disasters).

4.3 Total Liability Cap: Our aggregate liability under this Agreement is limited to the fees paid by You in the 6 months preceding the claim.


5. Indemnification

You agree to indemnify, defend, and hold harmless the Company and its affiliates from any claims, damages, or costs (including legal fees) arising from:

  • (a) Your breach of this Agreement;
  • (b) Your illegal use of the Services;
  • (c) Third-party claims related to Your activities.

6. Data & Privacy

6.1 No-Logs Policy: We do not store logs of Your browsing history, traffic content, or DNS queries. However:

  • (a) We collect minimal metadata (e.g., connection timestamps, bandwidth usage) for service optimization;
  • (b) We may retain data required by law (see Section 7).
  • (c) We will collect the user’s input information for user registration, login, basic device information and network information to provide the best network encryption channel and potential network attacks.

6.2 Privacy Policy: Detailed data practices are governed by our separate Privacy Policy.


7. Compliance with Laws

7.1 Cooperation with Authorities: We may disclose Your information if legally compelled (e.g., court order under Australia’s Telecommunications Act 1997 or Surveillance Legislation Amendment Act 2021).
7.2 User Responsibility: You must comply with all applicable laws, including export controls and sanctions (e.g., Australian Autonomous Sanctions).


8. Termination

8.1 By Us: We may suspend or terminate Your access immediately if:

  • (a) You violate this Agreement;
  • (b) Required by law;
  • (c) To protect our network or other users.

8.2 No Refunds: Termination for cause does not entitle You to refunds.


9. General

9.1 Governing Law: This Agreement is governed by the laws of Queensland, Australia. Disputes shall be resolved in courts within that jurisdiction.

9.2 Severability: If any provision is invalid, the remainder remains enforceable.

9.3 Entire Agreement: This document supersedes all prior agreements.


ACKNOWLEDGEMENT:
BY USING THE SERVICES, YOU CONFIRM THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THIS AGREEMENT.

PRIVACY POLICY

Effective Date: 1 January 2025
Last Updated: 1 January 2025
Company: Elon Tech Inc., an Australian entity (“Elon Tech”, “We”, “Us”)


1. Scope & Consent

This Policy explains how we collect, use, and protect your data when you use our VPN and network acceleration services (“Services”). By using the Services, you consent to this Policy.


2. Data We Collect

2.1 Account Information

  • Voluntary Data: Email address, payment details (processed by third-party gateways), and subscription plan.
  • Purpose: Account creation, billing, and customer support.

2.2 Technical & Usage Data

  • Connection Metadata: Timestamps, bandwidth usage, server location, and device/IP address (randomized, not linked to your identity).
  • Diagnostic Data: Crash reports and performance logs (optional, shared only with your consent).
  • Purpose: Service optimization, troubleshooting, and abuse prevention.

2.3 Strict No-Logs Policy

  • We Do NOT Collect:
    • Your browsing history, DNS queries, or traffic content.
    • Files downloaded, search terms, or visited URLs.
  • Even with advanced encryption, we never store decryption keys or session logs that could link your activity to your identity

3. How We Use Your Data

PurposeLegal Basis
Deliver and maintain ServicesContractual necessity
Prevent fraud/abuseLegitimate interests
Comply with legal obligationsLegal compliance (e.g., court order)
Send service noticesConsent (opt-out available)

4. Data Sharing

We do not sell or rent your data to third parties. Limited sharing occurs only in these cases:

4.1 Service Providers

  • Payment Processors: Stripe, PayPal (only transaction data, not stored by us).
  • Infrastructure Partners: Trusted server hosting providers (data encrypted in transit).

4.2 Legal Compliance

  • Government Requests: Data disclosure only if legally compelled (e.g., valid Australian warrant under Telecommunications Act 1997).
  • Transparency: We will notify you of requests unless prohibited by law.

4.3 Business Transfers

If Elon Tech is acquired, user data may transfer to the new entity under this Policy’s terms.


5. Data Security

No encryption method is 100% secure. While we implement industry-leading standards, absolute security cannot be guaranteed.

5.1 Encryption Standards

We use Elliptic Curve Cryptography (ECC) to secure your data, combined with modern protocols to ensure maximum protection:

  • Key Exchange: Elliptic Curve Diffie-Hellman (ECDH) with Curve25519 for perfect forward secrecy (PFS), generating temporary session keys to prevent retroactive decryption.
  • Data Encryption: AES-256-GCM (symmetric encryption) for traffic protection, authenticated with SHA-384 hashing.
  • Handshake Protocol: TLS 1.3 or WireGuard® protocol for secure connection establishment.

5.2 Why ECC?

ECC provides stronger security with shorter keys compared to traditional RSA, reducing computational overhead while maintaining military-grade protection. Our implementation complies with NIST standards (FIPS 186-4) and avoids deprecated curves (e.g., NIST P-256).

5.3 Network Security

  • Zero-Trust Architecture: Strict access controls and micro-segmentation for internal systems.
  • Regular Audits: Third-party penetration testing and cryptographic protocol audits

5.4 We will change the encryption method to ensure the operation of the product without notifying users based on specific circumstances.


6. Data Retention & Deletion

  • Account Data: Retained until account deletion.
  • Connection Metadata: Automatically deleted after 30 days.
  • Legal Holds: Data may be retained longer if required by law.

7. Your Rights

Under Australian law and GDPR (if applicable), you may:

  • Access/Correct Data: Request a copy of your data via [support email].
  • Delete Data: Close your account and request data erasure.
  • Opt-Out: Unsubscribe from non-essential communications.

8. International Data Transfers

  • Server Locations: Your traffic routes through global servers (e.g., Australia, Singapore, Germany).
  • Safeguards: Data transferred outside Australia is protected by encryption and contractual clauses.
  • All data transferred through our global servers is protected by ECC encryption, regardless of jurisdiction

9. Children’s Privacy

Our Services are not intended for users under 16. If we discover a minor’s account, we will promptly delete it.


10. Policy Updates

We will notify changes via email or in-app notice. Continued use after 30 days implies acceptance.