logo
IDEX Wallet
  • Home
  • Learn
  • Stake
  • FAQ
  • Community
  • Support
  • Docs
Launch App

Legal Information

Last Updated: January 15, 2025

1. Company Information

IDEX Wallet operates as an independent decentralized technology platform focused on simplifying access to digital finance. Our mission is to provide secure, transparent, and efficient tools for managing, trading, and storing digital assets – all while maintaining full user custody. The platform functions without intermediaries, giving every user complete control over their keys, assets, and on-chain activity.

As part of this mission, IDEX Wallet emphasizes open access to decentralized markets, interoperability across multiple blockchains, and transparent smart contract systems that allow users to engage confidently in DeFi ecosystems. Our operations center around technological innovation, security, and reliability rather than custodial financial management – meaning users remain the sole owners of their crypto assets at all times.

Corporate Details

  • Company Name: IDEX Technologies Ltd.
  • Registration: Registered in accordance with applicable jurisdictional requirements
  • Business Type: Technology Platform Provider

The company operates in alignment with applicable international laws and digital asset frameworks while prioritizing the privacy and independence of its users. All development and governance decisions are guided by the long-term goal of building a self-sustaining, open, and auditable financial ecosystem that does not rely on centralized intermediaries.

2. Regulatory Compliance

IDEX Wallet operates in accordance with international best practices and evolving regulatory frameworks within the cryptocurrency industry. Although the platform is fully non-custodial, meaning users maintain direct control over their assets, we adhere to global compliance standards that promote lawful, transparent, and responsible use of decentralized technologies. Our regulatory philosophy is built around risk reduction, data protection, and collaboration with recognized authorities – all while maintaining user sovereignty and privacy.

2.1 Licensing and Operational Framework

As a decentralized technology provider, IDEX Wallet is not a traditional financial institution and therefore does not require the same types of licenses as custodial exchanges or payment processors. However, our operations are structured to align with regional laws and industry compliance principles to ensure safe access to DeFi services. We regularly review the evolving regulatory landscape across key jurisdictions to maintain transparency, prevent misuse, and operate within accepted boundaries.

Where applicable, we comply with financial technology regulations concerning digital asset infrastructure, while preserving the decentralized and open-access nature of our products. This means IDEX Wallet does not take custody of user funds, manage client accounts, or provide investment services – it functions purely as a technical interface between the user and the blockchain.

2.2 Know Your Customer (KYC) and Identity Verification

While IDEX Wallet never holds user assets or intermediates transactions, we recognize the importance of preventing misuse of blockchain systems for illicit purposes. To that end, we implement risk-based compliance mechanisms that detect suspicious activity patterns without compromising decentralization or anonymity. These measures may include transaction behavior analysis, wallet screening for known high-risk addresses, and automated systems that prevent interaction with sanctioned smart contracts.

We maintain cooperation protocols with recognized law enforcement agencies and compliance partners to respond to legitimate, narrowly scoped legal requests. Such cooperation is always limited to metadata or publicly available blockchain data – private keys, user credentials, and personal wallet information remain beyond our access and control.

2.3 Know Your Customer (KYC)

The non-custodial design of IDEX Wallet means users can access, trade, and stake digital assets without completing traditional KYC procedures. We do not collect identification documents or personal data for core wallet functionality, as the platform does not store or control any user funds.

However, in certain circumstances – such as when accessing advanced features, participating in institutional-grade integrations, or engaging in jurisdiction-specific partnerships – users may be asked to complete optional verification in accordance with relevant regulatory requirements. Any such verification process, when applied, is handled through secure, third-party systems that maintain strict data isolation and confidentiality.

In summary, our compliance framework is guided by three principles:

  • Transparency: Maintaining open operational standards and clear communication of regulatory obligations.
  • User Control: Ensuring users retain full authority over their data and assets at all times.
  • Accountability: Operating within international guidelines to protect both users and the ecosystem from unlawful activities.

This approach allows IDEX Wallet to remain globally accessible while maintaining trust, integrity, and alignment with legitimate regulatory expectations – without compromising decentralization.

3. Risk Disclosures

Using IDEX Wallet involves interaction with decentralized technologies that operate independently of centralized oversight. While we design every component to maximize safety, reliability, and transparency, users must understand the inherent risks associated with digital assets and blockchain-based systems. Awareness of these risks helps ensure informed decisions when managing funds, trading, or staking.

3.1 General Cryptocurrency Risks

Digital assets are highly volatile and speculative by nature. Prices of cryptocurrencies can fluctuate dramatically over short periods, sometimes driven by market sentiment, liquidity shifts, or regulatory changes.

Engaging with blockchain networks carries several key risks:

  • Market Volatility: Token values may rise or fall unpredictably, which can lead to partial or total capital loss.
  • Regulatory Uncertainty: Changing government policies or new legal interpretations may affect how digital assets can be used, traded, or taxed.
  • Technological Failures: Bugs, software vulnerabilities, or human error during transactions can result in lost funds.
  • Liquidity Constraints: Some assets or trading pairs may have limited market depth, making it difficult to enter or exit positions efficiently.
  • Irreversibility: Once a blockchain transaction is confirmed, it cannot be canceled or reversed, even in cases of error.

Every user should assess their own risk tolerance before engaging in digital asset activity and recognize that past performance or stability does not guarantee future results.

3.2 Smart Contract Risks

IDEX Wallet interfaces directly with smart contracts deployed on multiple blockchain networks. These contracts enable features such as trading, staking, and liquidity management without intermediaries. However, despite rigorous auditing and testing, smart contracts inherently carry code-level risks.

Potential vulnerabilities include:

  • Logical or arithmetic errors within the contract’s source code.
  • Exploits through third-party dependencies or composable DeFi integrations.
  • Malicious governance proposals or unauthorized contract upgrades.
  • Cross-chain bridge failures that affect asset portability or availability.

We engage professional security firms to conduct audits and maintain a public bug bounty program to encourage responsible disclosure. Even with these protections, users should understand that no audit can eliminate all risk in decentralized software.

3.3 Network and Protocol Risks

IDEX Wallet operates across several independent blockchain networks such as Ethereum, Polygon, Arbitrum, and others. Each network functions autonomously, and IDEX has no control over their operational integrity or performance.

Common risks include:

  • Network Congestion: Heavy activity can cause delayed confirmations or increased gas fees.
  • Forks and Upgrades: Protocol changes can temporarily disrupt compatibility with wallet features or dApps.
  • Consensus Failures: Errors in block validation or malicious node behavior may impact network reliability.
  • Chain Reorganizations (Reorgs): Rare events where recent blocks are replaced, potentially reversing transactions that appeared final.

We continuously monitor supported blockchains to mitigate the impact of disruptions and promptly release compatibility updates when necessary.

4. Data Security and Protection

Security is one of the core foundations of IDEX Wallet. As a non-custodial platform, we are designed so that users – and only users – have full control over their digital assets. Our role is to provide the infrastructure that protects those assets through encryption, isolation, and transparent security practices, while ensuring that no third party, including IDEX itself, can access private user information or wallet data.

To safeguard every interaction, IDEX Wallet uses end-to-end encryption for all communications between your device and our infrastructure. All sensitive actions, including transaction signing, seed phrase generation, and key storage, take place entirely on the user’s local device. Private keys, passwords, and seed phrases are never transmitted, stored, or recoverable by our systems. This ensures that complete custody of assets always remains in the user’s hands, even in the event of system downtime or network disruption.

The platform is built around a zero-access architecture, meaning that we cannot decrypt or view user wallet data under any circumstances. Regular internal and external audits, penetration tests, and continuous code reviews are performed to validate the resilience of our software. Every dependency, from cryptographic modules to smart contract libraries, is routinely reviewed and updated to maintain the highest security standards.

While our infrastructure protects against external threats, users play a critical role in maintaining their own security posture. We recommend keeping operating systems updated, using reputable antivirus or endpoint protection tools, and enabling device-level encryption. Recovery phrases should always be stored securely offline and never shared online or entered into untrusted applications. Caution is also advised when connecting to decentralized applications (dApps) or signing smart contracts from unknown sources.

In line with our data minimization policy, we retain only the minimal amount of technical information necessary to ensure the stability and performance of the service. Diagnostic logs, uptime metrics, and anonymized usage data are automatically purged after short retention periods, typically between 30 and 90 days, unless extended retention is required for legitimate operational or security reasons. No transaction history, behavioral analytics, or identifiable wallet data is ever stored or profiled on IDEX Wallet servers.

We also provide users with full transparency and control over local session data. At any time, you may clear cached files, reset analytics preferences, or request clarification on how temporary diagnostic information is handled. Our commitment is to make sure that users remain in control – not only of their assets but also of their data – and that privacy and security are built into every layer of the IDEX Wallet experience.

5. Sanctions and Compliance

IDEX Wallet maintains strict adherence to international sanctions laws and compliance frameworks to ensure that the platform cannot be misused for illicit financial activity. Even though our wallet is decentralized and non-custodial, we follow established standards that align with the requirements of global regulators and industry best practices. Our mission is to protect the integrity of decentralized finance while preserving user autonomy and privacy.

We observe and respect the directives of leading international authorities, including the U.S. Office of Foreign Assets Control (OFAC), the United Nations Security Council, the European Union, and other global sanctions bodies. Regional access may be restricted for users or entities operating in sanctioned jurisdictions, or for individuals appearing on government-issued watchlists. These restrictions exist solely to ensure that IDEX Wallet remains compliant with international laws governing digital asset use.

To balance transparency and user privacy, IDEX Wallet uses non-intrusive compliance systems based entirely on blockchain-level data. Instead of collecting personal identification information, our risk controls analyze wallet activity patterns, transaction origins, and on-chain associations with known sanctioned addresses. This model ensures that compliance checks never compromise the non-custodial design or the confidentiality of user assets.

We may limit access or connectivity in the following situations:

  • When a wallet interacts with blacklisted smart contracts or sanctioned addresses.
  • When access originates from restricted jurisdictions or regions under embargo.
  • When regulatory requirements necessitate temporary restrictions to maintain lawful operations.

These measures protect not only IDEX Wallet but also the broader decentralized finance ecosystem from potential misuse. Users are expected to conduct their own due diligence and ensure that their activities comply with local and international laws. Engaging in prohibited or high-risk behavior may result in restricted access, limited connectivity to specific protocols, or permanent suspension of service for the affected wallet.

6. Intellectual Property Rights

IDEX Wallet and all associated technologies are the result of extensive research, development, and innovation focused on advancing decentralized finance. Every component of the platform – from its user interface to its smart contract architecture – is protected by intellectual property rights that safeguard the originality and functionality of our ecosystem. These rights ensure that users can rely on a secure, authentic, and legally protected environment when interacting with IDEX Wallet.

6.1 Platform Ownership

All elements of the IDEX Wallet platform, including its design systems, software architecture, graphical assets, trademarks, and written materials, are the exclusive property of IDEX Technologies Ltd. or its licensors. This protection extends to proprietary technologies developed specifically for wallet integration, cross-chain interoperability, and decentralized trading execution. Users are granted a limited, non-exclusive, and revocable right to use the platform in accordance with our Terms of Service. This right does not grant ownership, sublicensing authority, or permission to modify or reproduce any part of the system.

The following restrictions apply to all users:

  • You may not copy, redistribute, or reverse-engineer any portion of the platform’s software or source code.
  • You may not use IDEX trademarks, logos, or other identifiers in ways that suggest endorsement, partnership, or affiliation without prior authorization.
  • You may not extract, scrape, or repurpose data from the platform for commercial or competitive purposes.
  • Any unauthorized use of IDEX Wallet’s intellectual property constitutes a violation of applicable copyright and trademark laws.

6.2 Open Source Components

Certain modules within IDEX Wallet incorporate open-source software that enhances transparency, reliability, and interoperability. These components are governed by their respective licenses, which are publicly accessible in our code repositories. We maintain full attribution to all open-source projects utilized in our architecture and ensure compliance with each license’s terms. By using the platform, users acknowledge that open-source components remain subject to their original licensing conditions, which may differ from IDEX’s proprietary terms. Open collaboration with the open-source community helps us build a more secure and innovative decentralized ecosystem.

6.3 Trademark Usage

The IDEX name, logo, and all associated marks are trademarks of IDEX Technologies Ltd. They represent our brand integrity and may only be used with express written consent. We actively monitor and enforce proper usage across digital platforms to prevent misuse, brand dilution, or misrepresentation. Permitted usage examples include factual mentions in media, research, or integration guides, provided they do not imply official partnership or sponsorship. Unauthorized commercial use, imitation of branding elements, or deployment of derivative versions of the logo is strictly prohibited.

IDEX Wallet’s intellectual property policy is built on the balance between openness and protection – encouraging innovation through collaboration while ensuring that the brand, its technologies, and its users remain secure and respected across the decentralized ecosystem.

7. Security and Audits

Security is the foundation of IDEX Wallet’s reliability and reputation. Every component – from the user-facing interface to the underlying smart contract architecture – is designed with security first in mind. Because IDEX operates as a non-custodial platform, we have implemented multilayer protection systems to ensure that no external entity, including IDEX itself, can compromise user assets or private data.

7.1 Trademark Usage

All smart contracts deployed by IDEX Wallet undergo independent, third-party security audits before being launched on any supported blockchain network. These audits verify the logic, resilience, and safety of each contract to prevent vulnerabilities such as:

  • Reentrancy attacks
  • Overflow and underflow issues
  • Unauthorized access or privilege escalation
  • Logic errors in trade execution or staking mechanics

Each audit follows standardized procedures used by leading cybersecurity firms in the blockchain industry. Results from these audits are made publicly available whenever possible to maintain transparency and foster user trust. Should a potential issue be identified, it is resolved before deployment, and the patch is re-audited to confirm effectiveness.

7.2 Infrastructure Security

Beyond smart contracts, our backend systems and APIs are continuously monitored and fortified to prevent unauthorized access.

We implement:

  • Penetration Testing: Regular, simulated attacks designed to uncover and fix system-level weaknesses.
  • Zero-Trust Network Architecture: Every internal request is verified and authenticated, reducing the risk of lateral movement in case of a breach.
  • Redundancy and Load Balancing: Infrastructure is distributed globally to ensure uptime and resilience against denial-of-service (DoS) events.
  • Encrypted Key Storage: All operational keys related to infrastructure management are encrypted using hardware-level security modules (HSMs).

Our monitoring systems operate in real-time, detecting and isolating anomalies before they impact performance or user security. Every deployment and infrastructure change passes through a rigorous internal review and approval process.

7.3 Bug Bounty and Responsible Disclosure

We maintain an active bug bounty program to encourage responsible disclosure from security researchers and ethical hackers. Verified vulnerabilities are rewarded according to their severity and potential impact. This initiative allows the community to contribute to the ongoing safety of IDEX Wallet by reporting vulnerabilities directly through official channels. All submissions are handled confidentially and prioritized for patching. This open collaboration model strengthens the platform’s long-term defense posture and builds transparency between developers and users.

7.4 Transparency and User Assurance

Transparency is central to our approach to security. All major updates, audit results, and security-related announcements are published through our official channels. Users can review these materials to verify the measures taken to safeguard their funds and data. We believe that trust in decentralized systems must be earned through open communication and visible accountability. Our ultimate goal is to maintain a security framework that evolves alongside the technology it protects – one that remains proactive, transparent, and community-oriented.

8. Dispute Resolution and Arbitration

At IDEX Wallet, we believe most issues can be resolved through clear communication and mutual understanding. Our approach to dispute resolution prioritizes fairness, efficiency, and transparency while minimizing unnecessary legal escalation. Because our platform operates globally and in a decentralized environment, our dispute process is designed to accommodate users from different jurisdictions while maintaining consistency in how concerns are handled.

All users are encouraged to first contact our legal or compliance team with any issue, claim, or disagreement related to IDEX Wallet’s functionality, transactions, or terms of use. We treat every inquiry seriously and aim to resolve most matters through direct dialogue before involving third parties.

If a matter cannot be resolved informally, it will proceed to independent arbitration – a neutral, legally binding process designed to deliver fair outcomes without the need for prolonged court litigation. Arbitration is faster, less adversarial, and ensures confidentiality for all parties involved. It also allows for expert adjudication in cases involving blockchain technology, smart contract behavior, or digital asset management – areas where traditional courts may lack technical expertise.

To ensure a fair and transparent process, arbitration follows these guiding principles:

  • Impartial Oversight: Arbitration is administered by a recognized international arbitration organization with no affiliation to IDEX Wallet.
  • Neutral Venue: Hearings are conducted in English and can be held remotely, ensuring accessibility for global participants.
  • Binding Outcome: The arbitrator’s decision is final and enforceable according to applicable arbitration rules.
  • Confidential Handling: All records, submissions, and outcomes remain confidential unless disclosure is legally required.
  • Cost Efficiency: Parties share arbitration costs fairly to prevent financial barriers to resolution.

In addition, all claims must be brought on an individual basis. Class actions, representative suits, and collective proceedings are not permitted. This ensures that every case is reviewed based on its specific circumstances rather than being generalized across unrelated user situations.

Our philosophy is that dispute resolution should protect the interests of both users and the platform without unnecessary friction. We encourage good-faith communication as the first step, arbitration as the structured next stage, and continuous collaboration to maintain trust between IDEX and its global community.

9. Limitation of Services

IDEX Wallet continuously evolves, adapting to changes in the decentralized ecosystem and regulatory environment. Because of this, we reserve the right to modify, restrict, or discontinue any part of our services to maintain operational stability, compliance, and security. These adjustments are never arbitrary – they are made to protect users, preserve network integrity, and ensure the long-term sustainability of the platform.

While IDEX Wallet strives to provide consistent and uninterrupted service, certain factors beyond our control may occasionally affect access or functionality. Examples include blockchain network congestion, third-party service disruptions, or emergency maintenance following security updates. In such cases, we act swiftly to restore functionality and maintain transparency through official communication channels.

The following limitations may apply under specific circumstances:

  • Service Modifications: Features or integrations may be temporarily paused, redesigned, or deprecated when necessary for performance improvements or security enhancements.
  • Jurisdictional Restrictions: Certain regions may face limited access due to local regulations, sanctions, or compliance obligations.
  • Access Controls: IDEX may apply additional verification layers or usage limits in response to suspicious activity or compliance requirements.
  • Operational Interruptions: Scheduled maintenance, upgrades, or unforeseen technical incidents may lead to brief periods of unavailability.

We also reserve the right to refuse or restrict service to any user who engages in conduct that violates our Terms of Service, undermines platform integrity, or poses a risk to the community. Such measures are taken cautiously, with consideration for both security and fairness.

Fee structures, network integrations, and supported blockchains may also evolve over time. We aim to provide reasonable notice of any material changes through in-app updates, announcements, or our official documentation. However, in urgent cases – particularly those involving security vulnerabilities or compliance enforcement – modifications may take effect immediately without prior notice.

Our ultimate goal is not to limit access, but to preserve reliability and safeguard user trust. By maintaining flexibility in how services are delivered, IDEX Wallet ensures that the platform remains secure, compliant, and responsive to the rapidly changing decentralized finance landscape.

10. Third-Party Services

IDEX Wallet may integrate with or provide access to third-party services, including:

IDEX Wallet connects to the broader Web3 ecosystem through:

  • Blockchain Networks: Ethereum, Polygon, BNB Chain, and other supported networks that process and confirm transactions.
  • Decentralized Applications (dApps): Interfaces for swapping, staking, lending, or interacting with smart contracts directly through the wallet.
  • Data and Price Providers: Services that deliver token prices, market information, and on-chain analytics for accurate portfolio tracking.
  • Infrastructure Partners: Cloud and node providers used to maintain uptime, scalability, and reliable connectivity with multiple blockchains.

Each of these integrations operates autonomously, which means IDEX Wallet cannot control or guarantee their performance, uptime, or data accuracy. We conduct due diligence when selecting partners and continuously monitor the stability of integrated services, but decentralized protocols inherently function on their own consensus rules and technical limitations.

Users should always verify the authenticity of third-party services before approving any transactions or connecting external accounts. When interacting with dApps or smart contracts, the wallet will clearly display permission requests such as token approvals or spending limits – and users are responsible for reviewing and confirming them. IDEX Wallet never executes transactions without explicit user authorization.

To help users manage risk effectively, we recommend the following best practices:

  • Review smart contract addresses and audit history before confirming interactions.
  • Revoke unnecessary token approvals periodically using built-in or third-party tools.
  • Avoid connecting your wallet to unverified or newly launched decentralized applications.
  • Monitor announcements from official IDEX channels regarding supported integrations and potential service updates.

While we strive to maintain compatibility and stability across the decentralized ecosystem, we cannot assume responsibility for losses or issues caused by external services, including but not limited to bugs in third-party code, downtime, or compromised dApps. By choosing to interact with external protocols through IDEX Wallet, users acknowledge and accept the decentralized, trust-based nature of those systems.

11. Force Majeure

Despite every effort to maintain continuous and reliable service, certain events may occur that are beyond IDEX Wallet’s control. These circumstances, often referred to as force majeure events, can temporarily disrupt or limit platform functionality. Examples include network outages, blockchain consensus failures, cyberattacks, regulatory interventions, power or data-center interruptions, natural disasters, or large-scale internet disruptions.

In such cases, IDEX Wallet cannot be held responsible for delays, losses, or interruptions arising from these uncontrollable factors. Our commitment is to act promptly once normal conditions are restored, recover operations as efficiently as possible, and maintain transparency through official updates.

The decentralized nature of blockchain systems means that certain disruptions – such as network congestion, chain forks, or validator outages – are outside the control of any single participant, including IDEX Wallet. Recognizing these limits allows users to better understand the shared responsibility inherent in decentralized technology.

12. Legal Continuity and Amendments

IDEX Wallet’s legal documentation is built to remain durable and enforceable under all foreseeable circumstances. If any clause, section, or statement within these documents is found to be invalid, illegal, or unenforceable under the laws of a specific jurisdiction, such determination does not affect the validity of the remaining provisions. Instead, the affected clause will be interpreted, limited, or reformulated in a manner that best preserves its original intent and remains consistent with applicable regulations. The goal is to maintain the full integrity of the legal agreement – even when small portions may require adjustment.

The decentralized and evolving nature of our platform means that updates and refinements to these terms are sometimes necessary. We may amend, revise, or restate parts of this documentation to align with technological progress, operational changes, or new regulatory guidance. Each modification is made with care to ensure clarity and fairness. Updated versions are published through official channels such as our website or in-app notices, with the “Last Updated” date reflecting when those changes take effect. In some cases – for example, when a security or compliance matter demands immediate attention – amendments may become effective upon release.

Users are encouraged to review these terms periodically to remain aware of their rights, responsibilities, and the ongoing evolution of our legal framework. By continuing to access or use IDEX Wallet after updates are implemented, you acknowledge and accept the revised conditions. If at any time you disagree with the changes, discontinuing use of the platform remains your right and remedy.

This approach ensures that IDEX Wallet’s legal foundation remains stable, transparent, and responsive – a structure that adapts without compromising the trust and continuity at the core of our ecosystem.

logo IDEX Wallet

IDEX Wallet — a next-gen, omnichain wallet for secure self-custody and decentralized trading

Product

  • Download
  • Release
  • Stake
  • Documentation

Resources

  • Learn
  • FAQ
  • Support
  • Community

Legal

  • Privacy Policy
  • Terms of Service
  • Legal

© IDEX Wallet. All rights reserved.