PENA — Terms & Conditions of Use (User Agreement)

Last Updated: January 2026

Welcome to PENA. These Terms & Conditions ("Terms") govern your access to and use of the PENA application, software, website, and all related features ("Services").

By installing, accessing, or using PENA, you represent that you have read, understood, and agree to these Terms in full.

If you do not agree to these Terms, please stop using the Service immediately.

1. Definition

In all legal documents, policies, terms, and conditions relating to the PENA application, the following terms have the following meanings:

PENA
is a super high privacy and security-based Super Apps that provide digital communication services and a Bitcoin-only wallet (BTC only), equipped with VPN features, built on Real Peer-to-Peer (P2P) architecture, using 3.20 F (Post-Quantum) and 3.20 W (Post-Quantum Cryptography) encryption, and applying the principles of end-to-end encryption, self-custody, and zero-access, so that all control of Bitcoin's data, communications, and assets is fully in the hands of users.

Applications
Are PENA software in the form of Super Apps that provide a variety of integrated services in one platform, and can be accessed through electronic devices, including but not limited to mobile phones, tablets, or other compatible devices.

User
Is any individual or party who downloads, installs, accesses, or uses the PENA application, either directly or indirectly.

The Service
is all features and functions provided by PENA, including but not limited to text messaging, file delivery, 3.20 F (Post-Quantum) Encryption, Real P2P network, anti-malware features, auto-delete, recovery phrase, PENA Wallet with 3.20 W (Post-Quantum Cryptography) Encryption, as well as Basic and Premium services.

Real Peer-to-Peer (P2P)
is a method of direct communication between a user's devices without going through a central server or third-party intermediary.

End-to-End Encryption
is a method of securing communications in which messages and files are encrypted on the sender's device and can only be decrypted on the receiving device.

3.20 F (Post-Quantum) Encryption
Is an advanced symmetric encryption system used by PENA, where encryption keys and patterns are dynamic and variable for each communication session, in order to increase resistance to cryptographic analysis and attacks.

3.20 W (Post-Quantum Cryptography) Encryption
It is an advanced encryption system designed to protect digital assets and cryptographic keys from future computing threats, including Quantum Computing.

In PENA Wallet, 3.20 W (Post-Quantum Cryptography) is used to protect the wallet's private keys, secure transactions, and ensure that only the wallet owner has full access.

Post-Quantum
is a cryptographic security mechanism designed to remain secure against potential attacks from quantum computers in the future.

Anti-Malware
Is a security system within PENA that automatically scans received files to detect and prevent files that are malicious, dangerous, or potentially damaging to the user's device.

Auto-Delete
Is a feature that allows messages or files to be deleted automatically after a certain period of time.

Recovery Phrase
PENA uses recovery phrase as an account recovery mechanism if the user forgets or loses the password.

Data
Is all messages, files, local metadata, or other information that is generated, sent, received, or stored locally by a user through the PENA application.

Personal Data
is information that can identify a person directly or indirectly. PENA does not collect, store, or process users' personal data.

Device
Is the user-owned hardware used to access and run the PENA application.

Basic Plan
Is a version of PENA service that is available to users with standard security features, including anti-malware, as well as access to the core features of PENA in accordance with applicable terms.

Premium Plan
Is a paid version of the PENA service that provides Ultra Secure Mode with advanced security and privacy features, including but not limited to VPN features and other additional features in accordance with applicable regulations.

PENA Wallet (BTC Only)
PENA Wallet is a Bitcoin wallet (BTC only) designed for maximum security and full user control, using 3.20 W (Post-Quantum Cryptography) Encryption, and applying the principles of self-custody and zero-access, and can only be used to receive, send, and store Bitcoin.

Third Party
Means any party other than PENA and users, including but not limited to individuals, legal entities, or other entities.

Terms
are all terms, policies, agreements, and rules that govern the use of the PENA application, including their changes and updates.

2. Scope of Service

General Description of Service

PENA is a digital communication application that provides instant messaging and file exchange services with a primary focus on user security, privacy, and anonymity. All PENA services are designed using a real peer-to-peer (P2P) architecture, with no central servers, no cloud storage, and no collection of personal identities.

Communication Services

PENA provides communication services in the form of:

File Exchange Services

Within the scope of the PENA service, users can:

The terms of anti-malware service include:

Security & Privacy Services

PENA provides security and privacy services that include:

Local Data Management Services

Within the scope of this service, the user has full control over the data residing on his device, including:

All data deletions are permanent and cannot be recovered.

Additional Features Services

PENA provides additional features as part of the scope of services, including:

Limitations on the Scope of Services

The scope of PENA services does not include:

Changes in the Scope of Services

PENA reserves the right to:

Changes in the scope of the service will take effect from the moment they are published in the application or official platform of PENA.

User Responsibility

In using the PENA service, the user is solely responsible for:

3. User Eligibility

General Requirements

Users are declared eligible to use the PENA application if they meet the following conditions:

Age Restrictions

Legal Capacity

By using PENA, users represent and warrant that:

Device Eligibility

To be able to use PENA optimally, users must:

Compliance with the Law

The user is declared eligible to use PENA during:

Anonymity & Personal Responsibility

Eligibility Denial

PENA reserves the right to:

No Identity Verification

Eligibility Requirements

User eligibility occurs during:

4. Account & Security

No Conventional Account

Phone number
Email address
Original name
Other official identities

User's Local Identity

Connection requirements between users
Communication encryption
P2P session management

Local identity:

Application Access Security

Users can secure access to the PENA application through:

User Safety Responsibilities

The User is solely responsible for:

PENA is not responsible for:

Encryption and Data Protection

All communications are protected by End-to-End Encryption.

PENA uses 320 F (Post-Quantum) Encryption to improve data security from future computing threats.

PENA Wallet uses 3.20 W (Post-Quantum Cryptography) Encryption to protect private keys and transactions from future computing threats, including Quantum Computing.

Encryption key:

PENA applies the principle of Zero-Knowledge, where the system does not have access to the content of the user's communication.

Peer-to-Peer Real Network Security

Additional Security Features

PENA provides advanced security features, including but not limited to:

Anti-Malware & File Protection

Loss of Access & Recovery

PENA does not provide an account recovery feature.

If the device is lost, damaged, or data is deleted:

Users fully understand and agree to these risks.

Limitation of Security Liability

PENA is not responsible for:

Security Updates

Increase protection
Closing security gaps
Adapting to technological developments

Users are advised to always use the latest version of the app.

5. Intellectual Property Rights & Licenses

Ownership of Intellectual Property Rights

Software
Source code
Security algorithm
Interface design (UI/UX)
Logos, icons, and visual identities
Documentation and supporting materials are the legal property of PENA and/or the party that granted the license to PENA.

License to Use to Users

Non-exclusive
Non-transferable
Cannot be sublicensed
Can be revoked at any time

This license is granted solely for:

Download
Install
Using the PENA application in accordance with the applicable Terms of Service.

License Restrictions

In using the PENA application, users are prohibited from:

User Content & Data

End-to-end encrypted
No central server

Therefore, PENA does not have access to the content of user communications.

Limited License to Technical Content

Processing non-identifying technical data
Running the app's functions normally

This license does not include access to the content of messages or files.

Trademarks

Third Party Rights

Intellectual Property Rights Infringement

Access restrictions
Termination of service
Legal steps in accordance with applicable provisions

The user is responsible for any violations he commits.

License Termination

The user violates these terms
The user stops using the app

After the license expires, the user is obliged to stop all use of the PENA application.

Legal Protection

The content you submit remains entirely yours.

6. Privacy & Encryption

Privacy Policy Principles

Original name
Phone number
Email address
Other identity information

No Collection of Personal Data

Centralized user profiles
Identity database
User behavior tracking

All communication data is located and processed locally on the user's device.

Real Peer-to-Peer (P2P) Architecture

The user's devices are directly connected to each other
There is no central server that stores messages

Messages and files don't pass through intermediary servers.

This model eliminates the risk:

End-to-End Encryption

Read messages
Save messages
Decrypt user files

AES-320 F (Post-Quantum) Encryption

A strengthened version of the symmetric encryption standard
Generates a different encryption pattern each session

Each communication:

The AES-320 F (Post-Quantum) Encryption approach increases resilience against:

Post-Quantum Protection

Reduces the risk of quantum computing attacks
Maintain long-term confidentiality

Zero-Knowledge System

The system does not know the content of the communication
Doesn't store encryption keys

Even under certain technical conditions, PENA cannot provide the content of the message to any party.

Local & Cloudless Data Storage

Stored only on the user's device
Not backed up to the cloud

PENA does not provide:

Permanent Data Deletion

Permanent
Irreversible

The Auto-Delete feature allows automatic deletion as per the user's settings.

File Security & Anti-Malware

Malware
Malicious files
Other security threats

Anti-malware system:

Privacy Protection Limitations

The condition of the user's device
Operating system
Usage behavior

User Responsibility

The User is responsible for:

Compliance with the Law

Privacy & Encryption System Changes

Full details are available in PENA's Privacy Policy.

7. User Behavior

General Principles of Behavior

Individual Responsibilities

The User is responsible for:

PENA does not monitor, store, or control the content of user communications because the system is in nature:

General Prohibitions of Use

Users are prohibited from using PENA to:

Abuse of the Service

System exploit activity
Permissionless security testing
Hacking attempts or technical glitches

Any attempt to bypass or damage the security system is considered a serious violation.

Content & Communication

Content censorship
Message moderation
Communication surveillance

Users understand that freedom of communication also means:

Digital Ethics

Users are expected to:

Interaction Between Users

Disputes between users
Disadvantages due to direct communication

Users are encouraged to stop communications that they feel are unsafe.

Reporting & Actions

Secure your device
Stop communication
Take personal legal steps when necessary

Consequences of Violations

Feature restrictions
Termination of service

The action is carried out as far as technically possible without violating the principle of privacy.

No Responsibility for Content

The content of the message
File
Impact of user communication

All risk of using the service is borne solely by the user.

Legal Compliance

8. Service Reliability

Reliability Principle

User device infrastructure
Each party's network connection
Technical conditions of the application system

Decentralized Architecture

There is no single point of failure
The risk of mass disruption can be minimized

However, the quality of service is greatly affected by:

Service Availability

Always available without interruption
Free from delays or connection failures

Disorders can occur as a result of:

Communication Quality

The quality of message and file delivery is affected by:

Delays, delivery failures, or disconnections may occur and are beyond PENA's control.

Security as a Reliability Priority

Delivery time
Data reception process

Users understand that additional security measures are part of long-term reliability.

Updates & Maintenance

System updates
Technical maintenance
Feature customization

The update aims to:

During the update, the service may experience temporary limitations.

Reliance on Third Parties

Device operating system
Internet network
Application distribution services

Interference with third parties is beyond PENA's responsibility.

Limitations of Service Guarantee

Uninterrupted availability
Fit for a specific purpose
Absolute reliability of the system

User Responsibility

The User is responsible for:

Limitation of Liability

Service interruptions due to external factors
Data loss due to device or network failure
Indirect losses due to service limitations

The User agrees that the use of the service is at his own risk.

Service Reliability Changes

Quality improvement
Security
Legal compliance

Changes take effect from the date of announcement on the official PENA application or platform.

9. Paid Services (Premium)

General Description of Premium Services

Advanced security protection
Greater usage capacity
Additional privacy features

Premium Services are optional and not mandatory to use PENA.

Premium Service Features

With a Premium subscription, users can gain access to additional features, including but not limited to:

PENA Wallet

PENA Wallet is a Bitcoin (BTC Only) wallet designed for maximum security and full user control.

Payment Mechanism

Official app distribution platform
Third-party provided payment methods

PENA does not store user payment data.

All financial transactions are processed by third-party payment service providers.

Validity Period & Extension

Disabled
Return to the Basic service without deleting the user's local data

Cancellation Policy

Subscription period that has been running
Features that have been used

Pricing Changes & Features

Premium service pricing
Package structure
List of features

Changes will be notified via:

Changes are effective from the specified date.

Limitations of Premium Services

Does not guarantee absolute protection
Doesn't eliminate all technical risks

Security and performance remain dependent on:

No Special Warranties

Uninterrupted availability
Suitability for specific needs

Termination of Premium Services

Violation of the provisions
Required for system security

Termination does not delete the user's local data.

Legal & Tax Compliance

Premium Service Updates

Security
Quality of service

Updates are effective from the time they are announced.

10. Suspension / Termination

General Principles

Keeping the system secure
Protect other users
Comply with applicable legal provisions

Suspension or termination is carried out as far as technically feasible without violating the principles of privacy and anonymity.

Service Suspension

Basis of Deferment

PENA may suspend part or all of service access if:

Form of Suspension

Suspension can be done in the form of:

Service Termination

Termination by PENA

PENA reserves the right to permanently terminate the service if:

Termination by Users

Users can stop using the app at any time.

Termination can be done by:

Termination by the user is final and irreversible.

Impact of Suspension & Termination

Service access will be restricted or terminated
Local data remains on the user's device until it is deleted

PENA has no obligation to:

No Account Recovery

No account recovery available
No access rollback available

Users fully understand and agree to these risks.

Termination of Premium Services

Subscription period ends
Violation of the provisions

Premium termination does not delete the user's local data.

There are no refunds for the remaining unused subscription period, unless required by law.

Notice

Application
Official platform

Under certain circumstances, advance notice may not be possible for security or legal reasons.

Limitation of Liability

Losses due to suspension or termination of services
Data loss due to deletion by users

Users use the service at their own risk.

Applicability of Terms

Privacy
Intellectual Property Rights
The limitation of liability remains binding on the user.

11. Disclaimer of Liability

General Terms

Service availability
Absolute reliability
Fit for a specific purpose

Disclaimer of the Content of Communication

The content of the message
File
Information exchanged between users

Because the system uses:

Without a central server, PENA does not have technical access to the content of user communications.

Disclaimer of User Actions

Violations of the law committed by the user
Losses arising from interactions between users

Anonymity does not eliminate the legal responsibility of individuals.

Disclaimer of Technical Glitches

Internet network failure
Third-party system disruptions
The condition of the user's device

Delays, data loss, or delivery failures may occur beyond PENA's control.

Data Loss Disclaimer

Loss of messages or files
User-generated data deletion
Device damage

There is no recovery system or data backup.

Disclaimer of Absolute Security

Although PENA implements:

No system is completely risk-free.

PENA does not guarantee absolute protection against:

Disclaimer of Premium Services

Absolute security
Uninterrupted availability

PENA is not responsible for:

Limitation of Legal Liability

Direct or indirect losses
Loss of profits
Intangible losses

PENA's total liability, if any, is limited to the amount permitted by applicable law.

Force Majeure

PENA is not responsible for service failures or delays due to circumstances beyond its control, including but not limited to:

12. Changes in Terms

These terms are subject to renewal at any time.
Important changes will be announced through the app or official website.

General Terms of Change

PENA reserves the right, fully and at any time, to change, add, delete, or update all or part of the terms and conditions of use of the application, including but not limited to:

Changes to the conditions are made to adapt to:

The User understands and agrees that PENA is an application with an architecture without a central server, without identity, and without data storage, so the change in terms is not related to the management of the user's personal data.

Mechanism for Implementing Changes

Any changes to the terms will take effect from:

PENA is under no obligation to provide individual notices to each user, remembering:

By continuing to use the PENA application after the changes take effect, users are considered:

User's Right to Change of Terms

If the user does not agree to part or all of the changes to the terms, the user has the right to:

Because PENA does not store data on servers and does not have a data recovery mechanism, users understand that:

Feature & Security Changes

PENA may make changes or updates related to:

These changes may include:

Users understand that security changes are made to enhance protection, and not to weaken user privacy or anonymity.

Limitation of Liability for Change

PENA is not responsible for:

PENA cannot be held liable for direct or indirect losses arising from changes in conditions, as long as such changes are made reasonably and in the interests of security, law, or operation.

Applicability of Terms

If one or more provisions in the Amendment section of these Terms are held to be invalid by law, the remaining provisions shall remain valid and binding.

This section is an integral part of the Terms of Service and other PENA legal documents.

Continued use means that you agree to the updated Terms.

13. Applicable Law & Dispute Resolution

Disputes will be resolved in accordance with the legal jurisdiction chosen by the PENA manager. If an informal settlement fails, arbitration or legal proceedings may be conducted in accordance with the applicable rules.

Governing Law

These Applicable Legal Terms & Dispute Resolution govern the entire legal relationship between users and the PENA application, including but not limited to the use of the service, security features, encryption systems, real peer-to-peer (P2P) networks, anti-malware, and all policies and agreements attached to the application.

By using the PENA application, the user consciously and voluntarily agrees that the legal relationship that arises is governed and interpreted based on the applicable law in the jurisdiction where the developer of the PENA application is registered, regardless of the conflict of laws.

The user understands that PENA is an application:

Therefore, PENA does not play the role of a content organizer, communication intermediary, or party that stores user data.

All legal responsibility for the content of communications, messages, files, or other activities carried out through the application rests solely with the user. PENA does not have the technical capability or access to:

Users acknowledge that PENA's security system uses AES-320 F (Post-Quantum) Encryption, end-to-end encryption, as well as other advanced security mechanisms.

However, no digital system can guarantee absolute security, so PENA cannot be held liable for losses incurred as a result of:

Limitation of Legal Liability

PENA is provided on an "as is" and "as available" basis without warranties of any kind, either express or implied.

PENA is not responsible for:

Since PENA does not store data and does not have a central server, users hereby agree that there is no data recovery mechanism under any circumstances.

Dispute Resolution

Deliberation & Peaceful Settlement
Any disputes, differences of opinion, or disputes arising from the use of the PENA application will be sought first to be resolved through deliberation and good faith between the parties.

No Class Action
The User hereby agrees that each dispute is resolved individually, and the User waives the right to file a class action.

Limitations of PENA's Role
Considering the nature of PENA as a P2P communication platform without a central server:

Legal Forum
If a peaceful settlement is not reached, the dispute will be resolved through the competent legal forum in accordance with applicable law, taking into account the limitations of PENA's liability as stipulated in this provision.

Release of Additional Liability
The User hereby releases PENA from all legal claims arising out of:

Applicability & Changes to Terms

PENA reserves the right to change, update, or adjust the provisions of this Applicable Law & Dispute Resolution at any time.

Changes will take effect from the moment they are published in the application or official PENA platform.

By continuing to use the application after the changes are made, the user is considered to have agreed to all the updated terms.

14. Official Contact

For legal questions or violation reports:

📩[email protected]

Final Statement

PENA was created so that privacy does not depend on promises, but on systems that are technically impossible to access your data.

Your privacy remains completely in your hands. Forever.