Graphic 10. "Bright blue yet covert material hug the edge of the openness." [?]
"What are stealth, skunkworks or designated stealth entity (Desten) etc.?"
Stealth is used in business and technology when you need to do something unique in secret. Skunkworks are specific stealth entities. Designated stealth entities (Destens) remain in stealth for their whole existence.
STEALTH: The term stealth is often used in business and technology when someone is developing a new idea, prototype, invention, technology, product, service, project etc. in varying degrees of secrecy. This means that only a few key people are even aware of the existence of the development process, let alone know what it entails.
SKUNKWORKS: Skunkworks is a hidden project inside an existing company, usually a large multinational corporation, that has the aim of developing new technologies free from some of the restraints of operating under a typical corporate environment in relation to the culture, working styles, budgeting, on-going cost reduction efforts, hiring freezes and/or investment policies.
Usually, only the top management of the corporation is aware of the existence of such projects and they allocate resources to these projects that might not have any short-term profitability pipeline and/or require years of complex development work.
Typically a skunkworks project is in full internal control and this might have an impact on the outcomes of projects and the overal creative efforts by sustaining some of the internal guidelines, processes and culture.
External or partially external control structures for skunkworks provide more flexibility in terms of the scope and scale of the skunkworks as they are run or influenced by different people with different ways of doing things. These could result in new or changed tactics, strategies and goals which could in turn create vastly different outcomes.
DESTEN: The acronym Destens refer to companies or other entities that are meant to operate in the stealth mode throughout their whole existence. This means that they start in secrecy, develop in secrecy and launch their product, service, project, invention or technology in secrecy and finally even run their business, activities or other endeavors in secrecy. They usually license to a sole licensee, form a partnership with a company or small number of clients who are all contractually or otherwise bound to secrecy concerning the arrangement.
An example of a Desten could be a special purpose trading software that can take advantage of capturable excess return of a trading instrument or a category of instruments in a novel way, but that could only be profitable if other investment companies in that investment field would not be able to get the same level of technology, therefore having the need to always remain in the stealth mode.
"Who are the Approved Inventors, Entrepreneurs or Companies (AppIECs)?"
The Approved Inventors, Entrepreneurs or Companies (AppIECs [pron.: ap-ikes]) are Persons or Companies (PerComs) who pass the requirements set out by the Service Providers (SPs). One of the main requirements is the ability to operate in all the Selected Countries (SCs) that are part of the Countries or Territories.
APPROVED: The AppIECs are the PerComs who pass the requirements set out by the SPs. One of the main requirements is the ability to operate in all the Selected Countries (SCs) that are part of the Countries or Territories.
NOT FOR UNAPPROVED: Please do not try to register if you are not an AppIEC as failure to comply with the Service Terms of Use (SeToU) may result in the Termination of the Agreement (TotA), significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
ONLY FOR INTENDED USES: Also, you are not allowed to use the Service for any other purpose than it was intended for as per the SeToU. In particular, this means that you are not allowed to use the Service to defraud someone, to engage in corporate or industrial espionage or to engage in any other activities similar to these. Failure to comply with the SeToU may result in the TotA, significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
DUE DILIGENCE: It is very important to note that the term approved and the requirements for it differ greatly depending on the country or jurisdiction. You are required to conduct your own due diligence before using the Service and after having used the Service, when considering engaging in the Private Negotiations (PriNegs) as well as prior to the actual start of any of the PriNegs.
Due diligence should be conducted by all parties involved and they should focus on all parties involved. Among other things, this means that you must check that you are legally and otherwise able to act or operate in a way that you have planned, as well as checking that your counterpart is able to act or operate in their role. The PerComs are solely responsible for their own actions when engaging in the PriNegs.
Please consult Filetaacadse relating to your situation, if necessary. Generally speaking approved usually means someone in good standing or no limitations of conducting business in a specific country or jurisdiction.
"Who are the Accredited Investors (AccIs)"
The Accredited Investors (AccIs [pron.: ak-kis]) are the PerComs who pass the requirements set out by the SPs. One of the main requirements is the ability to operate as accredited investors in all the SCs that are part of the Countries or Territories. This means that the PerComs are considered accredited investors, sophisticated investors or high-net-worth individuals (HNWIs) or other similar terms within those countries or jurisdictions.
ACCREDITED: The AccIs are the PerComs who pass the requirements set out by the SPs. One of the main requirements is the ability to operate as accredited investors in all the SCs that are part of the Countries or Territories. This means that the PerComs are considered accredited investors, sophisticated investors or HNWIs or other similar terms within those countries or jurisdictions.
NOT FOR UNACCREDITED: Please do not try to register if you are not an AccI as failure to comply with the SeToU may result in the TotA, significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
ONLY FOR INTENDED USES: Also, you are not allowed to use the Service for any other purpose than it was intended for as per the SeToU. In particular, this means that you are not allowed to use the Service to defraud someone, to engage in corporate or industrial espionage or to engage in any other activities similar to these. Failure to comply with the SeToU may result in the TotA, significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
DUE DILIGENCE: It is very important to note that the term accredited and the requirements for it differ greatly depending on the country or jurisdiction. You are required to conduct your own due diligence before using the Service and after having used the Service, when considering engaging in the PriNegs as well as prior to the actual start of any of the PriNegs.
Due diligence should be conducted by all parties involved and they should focus on all parties involved. Among other things, this means that you must check that you are legally and otherwise able to act or operate in a way that you have planned, as well as checking that your counterpart is able to act or operate in their role. The PerComs are solely responsible for their own actions when engaging in the PriNegs.
Please consult Filetaacadse relating to your situation, if necessary. Generally speaking accredited usually means someone in good standing or no limitations of making sophisticated or high-risk investments in a specific country or jurisdiction. They usually have significant net assets.
"Who cannot use the Service?"
The Service is only for those who are approved or accredited within their countries or jurisdictions and no one else.
APPROVED OR ACCREDITED ONLY: The Service is only for the PerComs who are either approved or accredited within their countries or jurisdictions. No one else is allowed to use the Service.
NO ONE ELSE: Please do not try to register if you are not approved or accredited as failure to comply with the SeToU may result in the TotA, significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
NO OTHER PURPOSES: Also, you are not allowed to use the Service for any other purpose than it was intended, as stated in the SeToU.
In particular, this means that you are not allowed to use the Service to defraud someone, to engage in corporate or industrial espionage or to engage in any other activities similar to these.
Please do not try to use the Service for any other purpose than it was intended, as failure to comply with the SeToU may result in the TotA, significant liquidated damages and/or possible criminal prosecution and/or civil lawsuits.
"What is StealthPitch™?"
StealthPitch™ is a digital or physical service. The Service is only for the AppIECs and the AccIs. The Service is provided by the SPs.
THE SERVICE: StealthPitch™ is a digital or physical service. The Service is only for the AppIECs and the AccIs. The Service is provided by the SPs.
SUBMISSIONS: By using the Service the AccIs may receive Submissions from the AppIECs. These Submissions contain various highly restricted and structured content, including the Contact Details (CoDes). The CoDes may contain contact preferences and/or instructions on how to establish a contact using the Third-Party Communication Tools (3PCTs). No connection, contact, correspondence, the Private Contact (PriCon), establishing of a relationship or the PriNegs is provided or performed through or in association with the Service or the SPs. All contact only occur without the knowledge or consent of the SPs via the 3PCTs.
Among other things the Submissions contain selection for different stages, which the AppIECs may choose and the AccIs may be excluded to access or select to receive based on both of their account types and settings. Some of the main ones are: concept, idea, prototype, invention, pattern, structure, process, model, algorithm, system, development, technology link, technology, product, service, project, non-profit project, startup, company, skunkworks, Destens, scientific research, R&D etc.
FOCUS: The AccIs may customize the account type, their order, as well as, limiting the visibility of Submissions that they are able to view.
"Do you provide any financial, legal, tax or accounting advice or services (Filetaacadse)?"
No, we do not provide any financial, legal, tax or accounting advice or services (Filetaacadse). Information presented on the Site or Service, by us or any of the RegUs, does not constitute any activities that are regulated.
NO REGULATED ACTIVITIES: We do not provide any Filetaacadse. Information presented on the Site or Service, by us or any of the RegUs, does not constitute an advice, recommendation to buy or sell securities, offer, solicitation of investments, tip or any other regulated activity.
QUALIFIED ONLY: Only the PerComs that are qualified are allowed to use the Service. The PerComs must be either the AppIECs or AccIs. Please consult Filetaacadse relating to your personal situation and your potential use of the Service, if necessary.
"Do you curate or edit any of the Submissions?"
No, we do not curate or edit any of the Submissions. The SPs cannot be construed as the editors of any of the Submissions. The SPs make sure that the Submissions abide by the SeToU.
NO CURATION: We do not curate or edit any of the Submissions. The SPs cannot be construed as the editors of any of the Submissions. The SPs make sure that the Submissions abide by the SeToU.
REVIEW: The AppIECs must meet all the requirements set for them when creating their Submissions. The Submissions are carefully reviewed by us before any Submissions are allowed to go active or live within the System. If the Submissions do not meet all the requirements set out for them, then the Submissions are not activated. The creator of the Submissions must then make the appropriate changes to their Submissions so they can be reviewed again by us. All the PerComs using the Service must carefully abide by the SeToU.
THIRD PARTIES: For some versions of the Service, third parties are used to create the Submissions on behalf of the AppIECs by using limited free-form content and/or questionnaire responses from the AppIECs. The SPs then make sure that the Submissions abide by the SeToU. These versions are called Simplified Service™, Simplified Service™ CLEAR, Go Dark
™ and Go Dark
™ CLEAR DARK
.
Using these versions of the Service, the AppIECs never access the Submissions themselves. If the third parties do not receive certain information from the AppIECs, then this information is not entered into the Submissions. One of the purposes of these versions of the Service is to further shield both the System and AppIECs.
"Can I become a service presenter?"
Yes, the SPs are looking for Organization Level Service Presenters (OLSPs), Offline Service Presenters (OffSePres) and Online Service Presenters (OnSePres) to operate within specific organizations, regions, cities or universities as well as online.
SERVICE PRESENTERS: The SPs are looking for OLSPs, OffSePres and OnSePres to operate, e.g., as independent contractors within specific organizations, regions, cities or universities, where the AppIECs or AccIs congregate, and online for larger geographical regions or different niches.
You are free to form any legal entity of your liking to operate as a service presenter, e.g., an LLC. However, you may simply operate as a sole proprietor or under a trade name. You may also volunteer as an individual.
PSSST: You could become a Social Media Affiliate (SMA), Duplicate Social Media Affiliate (DSMA), Site Reference Affiliate (SRA) or Duplicate Site Affiliate (DSA). These provide less of a split as they are far reaching and likely not as effective as targeted marketing but may work for you, especially if you have an existing online presence related to the topics of interest.
CONTACT US: Please check our contact section for more information on how to contact us about this. Please feel free to contact us if you want to ask questions or negotiate the split. Never send us unsolicited personal details or attachments.
FREEDOM: The private membership association (PMA) provides even greater degree of freedom for the Private Membership Association Service Presenters (PMASPs). However, the rules of the PMA dictate how the PMASPs handle themselves within the PMA. Please contact us about the PMASPs, using the reference PMS, if you are interested.
The PMA is unincorporated and unregistered. The PMA is not for profit. The PMA does not engage in any sales or commercial activities.
"How can I contact the Service Providers (SPs)?"
Please check our contact section for more information on how to contact us. We will redirect your request to the appropriate SP based on your request type or location etc. The SPs work autonomously and have the ultimate control or ability to answer your questions or help with your issues.
CONTACT SECTION: Please check our contact section for more information on how to contact us. We will redirect your request to the appropriate SP based on your request type or location etc. The SPs work autonomously and have the ultimate control or ability to answer your questions or help with your issues, so they operate at their full discretion.
We are more than happy to answer any questions you may have, please use the general contact for any wildcard inquiries. If you are from the media use this. If your inquiry requires the highest level of security then please use this Go Dark
™.
NO RESPONSE GUARANTEED: In any case, please be 100% sure to follow the instructions provided, because we will not answer or process messages that are not following the protocol we have set out. This is simply due to security and/or privacy concerns or reasons. Never send us any unsolicited personal information or attachments! Pay attention to the coding system! It is possible to send us wildcard messages that do not conform to the coding system or our messaging protocol, but it is not guaranteed that we will answer them.
"How does the Service work?"
The AppIECs create the Submissions. The Submissions contain information in highly limited form with abstracted data points. The versions of the Service, packages, types and other settings chosen by the AppIECs change the amount and depth of data points as well as the level of abstraction that is used when creating the Submissions. The AccIs are able to view the CoDes within the Submissions that contain the information required to access the AppIECs via the 3PCTs.8
ORDERING THE SERVICE (DEVELOPERS): Usually, the PerComs apply to buy the Service or contact the Service Coordinator (SC). The SC then redirects the order request or message to the appropriate SP. The SP determines if they are the assigned SP for the specific order request or message. If the SP is not the assigned SP, they will redirect the order request or message to the assigned SP.8
The assigned SP interacts with the PerComs to determine if they are the AppIECs. The SP then discusses with the AppIECs regarding the versions of the Service, packages and other details. If the SP and AppIECs agree with the order details, then the AppIECs can continue with the Order Process (OP) by signing the Service Non-Disclosure Agreements (SeNDAs). The SeNDAs are in effect from this moment onwards and continue to be in effect during the use of the Service as well as after the use of the Service has ceased.8
The AppIECs that are consumers have to wait for the duration of the mandatory reconsideration period. After the mandatory reconsideration period has expired the AppIECs are asked to make the final decisions regarding their orders. If the AppIECs want to proceed, they are sent their invoices. After the money has cleared, the AppIECs are able to start using the Service.8
THE SERVICE (DEVELOPERS): The SP contacts the AppIECs digitally or physically regarding the Activation Processes (APs) and Submissions. The AppIECs create the Submissions.8
The Submissions contain information in highly limited form with abstracted data points. The versions of the Service, packages, types and other settings chosen by the AppIECs change the amount and depth of data points as well as the level of abstraction that is used when creating the Submissions.8
The Submissions are not allowed to contain any forward-looking statements, monetary figures, financial projections, growth estimates, other predictions, non-factual statements, illogical statements, investment pitches, offers or solicitations of investments.8
The AppIECs enter the CoDes within the Submissions that contain the information required to access the AppIECs via the 3PCTs.8
Only after the APs are successfully completed are the Submissions allowed to go live within the System. Then, the Submissions are available to the AccIs with the appropriate Access Levels (ALs). The settings that the AppIECs have chosen also impact the visibility of the Submissions within the System.8
During their use of the Service, the AppIECs will know nothing about the AccIs. The AccIs are able to access only the Submissions from the AppIECs. The Submissions do not contain any personal details of the AppIECs, so no names etc. The Submissions do not contain sufficient details or information to constitute offers or solicitations of investments.8
AFTER USING THE SERVICE (DEVELOPERS): The AppIECs are able to receive invitations, via the 3PCTs, from the AccIs regarding the establishment of the PriCon.8
The AppIECs may engage in the PriCon with the AccIs. This is the first moment that the parties are able to interact with each other.8
After the parties have established pre-existing relationships, both the AppIECs and AccIs must conduct due diligence, which may include self-assessments to evaluate compliance with laws, internal audits of financial practices, preparations for transactions, risk management and reputation management. Due diligence generally refers to the process of investigating various aspects, including financials, legal matters, operations, markets, taxes, environmental issues, human resources, IT systems, reputations and strategic considerations. After due diligence has been completed the AppIECs and AccIs may be able to engage in the PriNegs.8
ORDERING THE SERVICE (INVESTORS): Typically, the PerComs apply to buy the Service or contact the SC. The SC then redirects the order request or message to the appropriate SP. The SP determines if they are the assigned SP for the specific order request or message. If the SP is not the assigned SP, they will redirect the order request or message to the assigned SP.8
The assigned SP interacts with the PerComs to determine if they are the AccIs. The SP then discusses with the AccIs regarding the versions of the Service, packages and other details. If the SP and AccIs agree with the order details, then the AccIs can continue with the OP by signing the SeNDAs. The SeNDAs are in effect from this moment onwards and continue to be in effect during the use of the Service as well as after the use of the Service has ceased.8
The AccIs that are non-consumers are sent their invoices. After the money has cleared, the AccIs are able to start using the Service.8
THE SERVICE (INVESTORS): The SP contacts the AccIs digitally or physically regarding the APs.8
Only after the APs are successfully completed are the AccIs able to access the Submissions within the System. This access requires the appropriate ALs. The settings that the AppIECs have chosen also impact the visibility of the Submissions within the System. The AccIs receive or access digital or physical bundles of the Submissions.8
The Submissions contain information in highly limited form with abstracted data points. The versions of the Service, packages, types and other settings chosen by the AccIs plus other settings chosen by the AppIECs change the amount and depth of data points as well as the level of abstraction that is observed when viewing the Submissions.8
The Submissions are not allowed to contain any forward-looking statements, monetary figures, financial projections, growth estimates, other predictions, non-factual statements, illogical statements, investment pitches, offers or solicitations of investments.8
The AccIs are able to view the CoDes within the Submissions that contain the information required to access the AppIECs via the 3PCTs.8
During their use of the Service, the AppIECs will know nothing about the AccIs. The AccIs are able to access only the Submissions from the AppIECs. The Submissions do not contain any personal details of the AppIECs, so no names etc. The Submissions do not contain sufficient details or information to constitute offers or solicitations of investments.8
AFTER USING THE SERVICE (INVESTORS): The AccIs are able to send invitations, via the 3PCTs, to the AppIECs regarding the establishment of the PriCon.8
The AppIECs may engage in the PriCon with the AccIs. This is the first moment that the parties are able to interact with each other.8
After the parties have established pre-existing relationships, both the AppIECs and AccIs must conduct due diligence, which may include self-assessments to evaluate compliance with laws, internal audits of financial practices, preparations for transactions, risk management and reputation management. Due diligence generally refers to the process of investigating various aspects, including financials, legal matters, operations, markets, taxes, environmental issues, human resources, IT systems, reputations and strategic considerations. After due diligence has been completed the AppIECs and AccIs may be able to engage in the PriNegs.8
"Is the Service available in my country?"
Most likely it is, as the Service is currently available in 229 Countries or Territories. Please check the list here. The Service is only available for the AppIECs or AccIs.
WORLDWIDE: The Service is currently available in 229 Countries or Territories. Please check the list here. Unfortunately, we cannot accept any requests to add or remove any entries from the full list of the Countries or Territories. The Service is only available for the AppIECs or AccIs. Please consult Filetaacadse regarding your eligibility and suitability to use the Service, if necessary.
"What are the micro packages?"
The micro packages are intended for the AppIECs who operate in a micro level, e.g., as a micro startup. In most cases, the AccIs that operate on a micro level can only access the Submissions of the AppIECs that also operate on a micro level.
MICRO THIS: The micro packages are intended for the AppIECs who operate in a micro level, e.g., as a micro startup. Micro level entities have significantly leaner structures in comparison to their ordinary peers. Logically, this may result in a better ability to reach milestones with higher efficiency. However, these results are not guaranteed and these are just what people usually mean when they talk about the micro level. Micro level might also indicate something about the country of operation, outsourcing, team structures, talent and so on.
MICRO THAT: In most cases, the AccIs that operate on a micro level can only access the Submissions of the AppIECs that also operate on a micro level. This limited access is created so that the time of the AccIs is not wasted and no unnecessary exposure is created to better safeguard the underlying ideas, inventions and technologies or the mere knowledge of existence of a new, perhaps vague, category etc.
"Who are the Test Users (TesUs) or Alternative Users (AltUs)?"
The Test Users (TesUs) are exempt from purchasing a license to use the Service and they do not have to comply with some of the data collection requirements that are in place for most of the RegUs. It is important to note that the TesUs are still liable for liquidated damages associated with the breach or violation of the SeNDA or other part of the Rules that impose liquidated damages. The Alternative Users (AltUs) may purchase licenses using the Alternative Payment Methods (AltPMs) for security and/or privacy purposes. E.g., we may accept various cryptos, physical assets, products, services or other non-traditional payment methods.
TEST TEST: The TesUs are the RegUs with some differences. The RegUs are either the AppIECs or AccIs who use the Service. The TesUs are exempt from purchasing a license to use the Service and they do not have to comply with some of the data collection requirements that are in place for most of the RegUs.
It is important to note that the TesUs are still liable for liquidated damages associated with the breach or violation of the SeNDA or other part of the Rules that impose liquidated damages.
If you would like to become a TesU, please contact us here. If you plan to use a Go Dark
™ version of the Service, then your first contact with us must originate from this special web page called Go Dark
™.
ALTERNATIVE: The AltUs are the RegUs with the difference that the AltUs use the AltPMs. The AltUs may purchase licenses using the AltPMs for security and/or privacy purposes. E.g., we may accept various cryptos, physical assets, products, services or other non-traditional payment methods.
The AltUs are able to cancel their subscriptions but they will not be refunded for the unused duration of their licenses due to anti-money laundering (AML) requirements relating to the AltPMs.
It is very important to note that, similarly to rest of the RegUs, the AltUs cannot sell or transfer their access or license to any other entity. The SPs will decide which applicants it will accept as the AltUs in their sole discretion.
If you would like to become an AltU, please contact us here. If you plan to use a Go Dark
™ version of the Service, then your first contact with us must originate from this special web page called Go Dark
™.
"Who are the Private Membership Association Users (PMAUs)?"
The Private Membership Association Users (PMAUs) are able to use the Service through the Special Access Points (SAPs). The PMAUs are not subject to the Rules of the Service. The PMA does not engage in any sales or commercial activities.
NO TERMS OF USE: The PMAUs are able to use the Service through the SAPs. The PMAUs are not subject to the Rules of the Service.
The rules of the PMA and the contractual obligations of the PMAUs set limits to the PMAUs and their use of the Service through the SAPs.
If you are interested in becoming a PMAU, then please let us know when contacting us. You can use the reference PMA to speed up the process.
NOT FOR PROFIT: The PMA is unincorporated and unregistered. The PMA is not for profit. The PMA does not engage in any sales or commercial activities.
"Which edition is available in my country?"
The edition is determined automatically based on the package that you select as well as your country of residence, country of incorporation and/or intended country or jurisdiction. The editions are separated from each other and the AccIs can only receive the Submissions from the AppIECs within the same edition.
SEPARATION: The Service is divided into six different editions: the international, US, Russia, Israel, Japan and China edition. It is only possible to select one edition for one license.
The edition is determined automatically based on the package that you select as well as your country of residence, country of incorporation and/or intended country or jurisdiction. E.g., if you are a resident of Japan you are automatically served the Japan Edition. If you are from, e.g., Bolivia, you are automatically served the international edition. World licenses are only available for users of the international edition.
These six editions are separated from each other and the AccIs can only receive the Submissions from the AppIECs within the same edition.
"What is so unique about the Service for the Approved Inventors, Entrepreneurs or Companies (AppIECs)?"
For the first time in history an unknown inventor, entrepreneur or company can have a seat at the right table with the right people at just the right time without leaving the stealth mode.
FIRST: StealthPitch™ is the first of its kind in the world for the unknown inventor, entrepreneur or company.
After the use of the Service, the AppIECs are able to receive invitations for the PriCon from the AccIs that they did not personally know, while lowering their risks and increasing their control over the process.
VARIETY: The Service caters to all of the AppIECs in the stealth mode. This includes a variety of distinct entities in different stages of development, each with its own raison d'être. In the past, this type of service simply did not exist.
SUBSTANCE: If you have something worth hiding, then you have a reason to use StealthPitch™. The Service is designed for anything that is unique and thus requires secrecy, at least for now. There is an emphasis on both hard tech and deep tech.
There is also room for soft tech, fintech, health tech, edtech, agritech, clean tech and cybersecurity etc. The different needs of the dedicated inventors are considered, too.
"What is so unique about the Service for the Accredited Investors (AccIs)?"
For the first time in history the AccIs get a real chance of getting to know the creators of the next big thing on day one.
BEFORE OTHERS KNOW: For the first time in history the AccIs get a real chance of getting to know the creators of the next big thing before anyone else even hears about them. The AccIs get the chance to access unknown entities in different stages of development.
HIS STORY: In the past it was impossible to get to know the next big thing on day one for the overwhelming majority of investors. This was true even for deeply connected Silicon Valley investors. Traditionally, investors have relied on sourcing contacts from their friends, acquitances and business partners. Naturally, this was very limiting.
Maybe we do not live in the best version of the world. Consider that the historical winners suffer from a major survivorship bias, since it might have just as well been that the world missed out on other creators that could have created the winning thing or something much better, but now we live in a world where history has forgotten them simply because they did not have the right contacts.
SOMETHING TO HIDE: In recent times, a lot of platforms have emerged to openly promote or market startups or growth companies. However, if you could take the risk of openly promoting or marketing your startup or growth company, it usually meant one of three things.
One, you had nothing of value or no uniqueness, so you could expose your startup or growth company. You had no new technology and are were just copying someone else and trying to do a better job than they did.
Two, you had already been backed privately, while in the stealth mode, with backers who you knew before and now you were just promoting or marketing your startup or growth company for more rounds etc.
Three, you had something worth hiding, but you made the huge mistake of giving your IP to your competitors, basically for free, by openly engaging with them or their proxies. "Once an idea is out, it is out, and you are off to the races!"
Now, there is a solution for startups and growth companies etc. that have something to hide and it is called StealthPitch™.
"When should people use the Service?"
The AppIECs should use the Service when they have created something new. The AccIs should use it if they would like to get access to the stealth mode.
YANG: The AppIECs should use the Service when they have created something new should use the Service if they do not already have access to the AccIs or they want to increase the amount of contacts so that they could increase their options or possibilities.
YIN: The AccIs should use the Service if they would like to get access to the stealth mode, know about companies on day one or access early or later stage entities that they would not otherwise know to even exist.
"Why should some people not use the Service?"
Some of the PerComs should not use the Service, because it is only for people with unique ideas and developments that require secrecy.
NOT FOR THE ORDINARY: Some of the PerComs should not use the Service even if they are the AppIECs or AccIs because the Service would not be useful to them. The Service is only for people with unique ideas and developments that require secrecy. We proactively discourage people from joining and using the Service.
"Who can see the material entered into the System?"
Only the AccIs can access the information created by the AppIECs. The ALs of the AccIs are determined by their packages. The AppIECs can further limit this access based on various settings.
ONE WAY: Only the AccIs can access the information created by the AppIECs within the System. Specifically, the AccIs can access only the Submissions from the AppIECs. The Submissions are not allowed to contain any forward-looking statements, monetary figures, financial projections, growth estimates, other predictions, non-factual statements, illogical statements, investment pitches, offers or solicitations of investments. Please refer to the SePP for more details.
ACCESS LEVEL: The ALs of the AccIs are determined by their packages. The AppIECs can further limit this access based on various settings.
"What about 'You can't steal what isn't there' (Yoc's wit)?"
"You can't steal what isn't there" (Yoc's wit) means that no ideas, inventions or technologies are allowed to be submitted into the System or Service. The Service works by utilizing proxy variables and other abstractions to create datasets that have low correlations with the underlying information.
YOC: Our main philosophy for the System is: Yoc's wit. It means that no ideas, inventions or technologies are allowed to be submitted into the System or Service. While using the Service, the AppIECs continue to hold and retain the control of their underlying ideas, inventions or technologies by themselves completely independent of the Service. Instead, the Service works by utilizing proxy variables and other abstractions to create datasets that have low correlations with the underlying information.
PHILOSOPHY: You could think that "security" has three stages or levels to it. Theoretically, the best secure system contains all three of the following elements. The elements are not discrete and there is always room to improve. Let us go through them in order of importance. First, have a system that no one knows to exist. Second, do not have anything worth stealing within the system. Third, have technological and/or physical security in place.
PUBLIC: Since the Service is well known and publicly available, we completely fail the most important part, the first point. But we absolutely need to be publicly available, because otherwise the Service would not be very useful or able to fulfill its general purpose. However, we are doing really well on the second and third leg of security. We have minimized the amount of input data to acceptable levels by using proxy variables and other abstractions etc. Most notably, the System does not contain any underlying ideas, inventions or technologies. We have also created or implemented extensive technological and/or physical protections or security systems.
BESSER: We strongly encourage that the RegUs incorporate or make use of this philosophy of:"You can't steal what isn't there" in regard to their own activities and interactions with their counterparts via the 3PCTs. We have a favorite motto "better security serves everyone" (Besser), think Besser!
"How is the Service implemented to secure my information?"
The Service is carefully created to minimize the amount of critical information that is needed to run the Service, while still maintaining high quality features and experiences for the RegUs.
MINIMIZATION: The Service is carefully created to minimize the amount of critical information that is needed to run the Service, while still maintaining high quality features and experiences for the RegUs.
ACTIVATION: The Service does not contain any underlying ideas, inventions or technologies. We use proxy variables and require specific levels of abstraction to make the data within the System less likely to be successfully reverse engineered or otherwise uncovered.
We have a large number of requirements and limitations for both the unstructured and structured data points that we ask from the RegUs. Also, before the Submissions are allowed to go live within the System, the Submissions are carefully reviewed by us.
"What do the Submissions contain?"
The Submissions contain information from the AppIECs which is highly limited in its content with form requirements and abstractions. Only the AccIs can access the Submissions of the AppIECs. The Submissions do not contain any underlying ideas, inventions or technologies.
FROM THE SOURCE: The Submissions contain information from the AppIECs which is highly limited in its content with form requirements and abstractions. Only the AccIs can access the Submissions of the AppIECs.
HIGHLY LIMITED: The Submissions do not contain any underlying ideas, inventions or technologies. The AppIECs are required to abstract any information relating to any ideas, inventions and technologies to a specific level of abstraction that suits the purposes of operating the Service, while significantly reducing the likelihood of malicious actors being able to reverse engineer or otherwise uncover the underlying ideas, inventions and technologies.
The AppIECs are required to utilize a specific set of proxy variables and categorizations to structure parts of the Submissions. Other significant limitations and various requirements on both structured and unstructured data are imposed within the System. All information submitted into the System by any of the RegUs is carefully reviewed by us before any submitted information from that the RegUs is allowed to go live within the System.
TECHNOLOGY V. COMPANY: The Submissions are divided into technology and company. They differ in the content that is allowed. The Submissions are also divided into local and world plus there are micro and interface packages. The edition of the Service has an impact on the availability of certain divisions. All of these divisions and other aspects limit the visibility of the Submissions within the System.
HIDDEN ORIGIN: Some entities are in stealth because of hard tech, deep tech, pre-crypto or pre-decentralized, unprotected or protected material that existed prior to their previous bootstrapping, pre-seed or seed stage.
Others are in stealth for more traditional reasons, e.g., concepts, ideas, prototypes, inventions, patterns, structures, processes, models, algorithms, systems, developments, technology links, technologies, products, services, projects, non-profit projects, startups, companies, skunkworks, Destens, scientific research and R&D.
Because of how the System is designed, these things are not directly mentioned in the Submissions. Instead, you must carefully create the Submission in accordance with our instructions and the Rules of the Service.
"What about your security architecture?"
The System is carefully tucked away under different layers of security with customizations. There is no single source or machine that contains the System by itsellf. We use the most advanced publicly available technology with customizations. We minimize the input data to acceptable levels at all stages of operation.
ARCHITECTURE: The System is carefully tucked away under different layers of security with customizations. There is no single source for the whole of the System. We use the most advanced publicly available technology with customizations. This includes various physical machines and equipment.
We do not rely on the typical corporate security architecture at all, as it is fully compromised and just requires a look inside. We air gap often in our complex workflows. We often use physical systems and/or manual processing of data. Some versions of the Service work completely without computers. Many data operations are run on offline-only machines. High-level encryption is used when using various computer systems.
NO IDENTITY: The System is low-yield-low-payload (Loylop). Using the Loylop datasets, we are able to further discourage attackers and diminish the likelihood of data breaches, as the data itself becomes less viable or useful to the attacker. If the attacker never discovers the identity of the AppIECs, then the data is completely useless to them, because they cannot even spy on the AppIECs IRL.
We aim to know as little about the identity of the AppIECs as legally possible. This data is also stored elsewhere and the System endpoints, physical or digital, where the AccIs access the Submissions, do not contain any of this data. Sometimes, this data is even deleted prior to the access, or not even collected at all, depending on the package and the version of the Service.
DATA HYGIENE: We minimize the input data to acceptable levels at all stages of operation. Also, we use proxy variables and other abstractions to create datasets that have low correlations with the underlying information. Therefore, making it less likely that someone will be able to reverse engineer or otherwise gain access to the underlying ideas, inventions or technologies.
It is very important to note that no ideas, inventions or technologies are allowed to be submitted into the System while using the Service. In general, the Service is implemented in a way that significantly discourages hacking, because the information or material that we have is not, in itself, necessarily very useful even for highly sophisticated parties that are relevant to the Service. We really cannot provide more details, as doing so would be detrimental to the security of the Service.
"What is the Stealth by Design™ technology?"
This technology was used in a secret way during the concept stage of StealthPitch™.
CONCEPTION: We have the exclusive license to use the Stealth by Design™ technology. This technology was used in a secret way during the concept stage of the Service. This technology was also used in a similar fashion for our other service: StealthCareers™. We cannot really say anything more, because the specifics of this technology are intended to remain a secret.
"Can the Approved Inventors, Entrepreneurs or Companies (AppIECs) disclose their use of the Service?"
No, the AppIECs are not allowed to disclose or make public the fact that they use or have used the Service: for the duration that they use the Service and for as long as they accept invitations for the PriCon.
NO WAY: The AppIECs are not allowed to disclose or make public the fact that they use or have used the Service: for the duration that they use the Service and for as long as they accept invitations for the PriCon by responding to them via the 3PCTs or intend to do so.
PREVIOUS AGREEMENTS: When the appropriate amount of time has passed the AppIECs are allowed to mention that they have used the Service. However, they must be careful and make sure that they adhere to the SeToU and SeNDA.
The AppIECs must remember that they cannot disclose or make public any information relating to the Submission, including but not limited to: its content, structure, headings, options, instructions or trade secrets of the Service (including but not limited to: processes, techniques, designs or algorithms).
Also, the AppIECs cannot disclose or make public the identities of their counterparts in relation to their use of the Service or their interactions with the counterparts as a result of their use of the Service, because doing so would create a link between the Service and the counterparts.
"Can the Accredited Investors (AccIs) disclose their use of the Service?"
No, the AccIs are not allowed to disclose or make public the fact that they use or have used the Service: for the duration that they use the Service and for as long as they send invitations for the PriCon.
NOPE: The AccIs are not allowed to disclose or make public the fact that they use or have used the Service: for the duration that they use the Service and for as long as they send invitations for the PriCon via the 3PCTs or intend to do so.
STILL BOUND: When the appropriate amount of time has passed the AccIs are allowed to mention that they have used the Service. However, they must be careful and make sure that they adhere to the SeToU and SeNDA.
The AccIs must remember that they cannot disclose or make public any information relating to the Submission, including but not limited to: its content, structure, headings, options, instructions or trade secrets of the Service (including but not limited to: processes, techniques, designs or algorithms).
Also, the AccIs cannot disclose or make public the identities of their counterparts in relation to their use of the Service or their interactions with the counterparts as a result of their use of the Service, because doing so would create a link between the Service and the counterparts.
"Can the Approved Inventors, Entrepreneurs or Companies (AppIECs) engage in public fundraising while using the Service?"
No, the AppIECs are not allowed to engage in public fundraising or solicitation of investments: prior to or during their use of the Service and for as long as they accept invitations for the PriCon.
NADA DE NADA: The AppIECs are not allowed to engage in public fundraising or solicitation of investments, for a project that is linked in any way to the content, reasoning or reasons behind their use of the Service: prior to or during their use of the Service and for as long as they accept invitations for the PriCon by responding to them via the 3PCTs or intend to do so.
"How can I make the Contact Details (CoDes) more secure?"
The AppIECs should only use the CoDes, as a way to anonymously receive invitations for initial contact and then proceed to switch to other means of communication. The 3PCT should be as anonymous as possible, it should be as secure as possible and in particular it should have no links to critical devices or locations. Always remember that most of the 3PCTs are not very secure, and they are even less secure if others know that you use them for this purpose.
SMART: Only the AppIECs are able to specify the CoDes within their Submissions. The AccIs can then access these instructions on how to initiate contact with the AppIECs by using the 3PCTs. The AppIECs should only use the CoDes, as a way to anonymously receive invitations for initial contact and then proceed to switch to other means of communication, if necessary. This means that they should create a new account for a 3PCT, such as a new email address, specified in the CoDes that is only used for this purpose.
The 3PCT should be as anonymous as possible, it should be as secure as possible and in particular it should have no links to critical devices or locations. Always remember that most of the 3PCTs are not very secure, and they are even less secure if others know that you use them for this purpose.
We highly recommend that you provide a public key code, within the CoDes, for the AccIs to use to encrypt the messages that they send to you. You can also ask them to provide their own public key code within the encrypted message, so that you can respond to them using the 3PCTs. We do not recommend that you store any private or public keys with third parties.
MIRROR IMAGE: The AccIs should not use pre-existing accounts for the 3PCTs to initiate contact with the AppIECs, as doing so would likely expose their real identities and create a direct link between them and their counterparts. This is very problematic, since there is a significant risk that the AccIs are regularly monitored or spied on by malicious actors, and if the AppIECs are directly linked to them, then they too are potentially targeted.
Therefore, the AccIs should create new accounts for the 3PCTs, e.g., new email addresses, for the purposes of initiating contact with the AppIECs that is only used for this purpose and then discarded.
COUNTER: The AppIECs should anticipate and counter situations where less sophisticated counterparts (the AccIs) use the (pre-determined) 3PCTs that are unsecured or pre-existing. The AppIECs can counter this mainly by providing very specific instructions regarding the 3PCTs. Moreover, the AppIECs should never even respond to the AccIs that fail to follow their specific instructions (or follow them to unsatisfactory ends), containing critical pre-vetting or other instructions.
"What should I do before the Private Contact (PriCon)?"
You should only engage in the PriCon with the counterparts from whom you would like to receive initial introductions, and with whom you would potentially like to establish a relationship. The AppIECs should carefully examine the invitations.
NO UNNECESSARY CONTACT: You should only engage in the PriCon with the counterparts from whom you would like to receive initial introductions, and with whom you would potentially like to establish a relationship.
TREAD CAREFULLY: The AppIECs should think carefully before they respond to invitations from the AccIs to engage in the PriCon. Depending on the specifics of the CoDes, they should not respond to all invitations to guard their anonymity. Also, the AppIECs can save time for both parties by not responding if they are not interested.
The AppIECs should examine the invitations and possibly acquire more information from other sources, based on the contents of the invitations, before they engage in the PriCon.
Please note that your security may be compromised and your identity may be exposed, even if you do not engage in the PriCon, but merely search the internet for more information and your counterpart has set up tracking for your searches or honeypot websites etc.
Therefore, when searching do not directly search, use or reference specific terms that are unknown to you, but instead search surrounding fields or topics like a random internet surfer would and use protections and security measures while surfing to guard your identity.
LIKEWISE: The AccIs should think carefully before they send invitations to the AppIECs to engage in the PriCon. The AccIs should not send invitations to all counterparts to save time for both parties.
FULL CONTROL: It is the sole responsibility of the AppIECs to secure the 3PCTs of their choice that they mention as a part of the CoDes, so that they can securely engage in the PriCon via the 3PCTs with their counterparts after the use of the Service. All the PriCon is the responsibility of the AppIECs and their counterparts. The Service is independent of the 3PCTs.
"What should I do before the Private Negotiations (PriNegs)?"
When the AccIs and AppIECs have engaged in the PriCon via the 3PCTs and established a pre-existing relationship, they may choose to engage in the PriNegs. However, before they may engage in the PriNegs they must conduct due diligence. The AppIECs should also choose the level of disclosure.
PRECONDITION: When the AccIs and AppIECs have engaged in the PriCon via the 3PCTs and established a pre-existing relationship, they may choose to engage in the PriNegs. However, before they may engage in the PriNegs they must conduct due diligence.
DUE DILIGENCE: Both parties are required to conduct due diligence, which may include self-assessments to evaluate compliance with laws, internal audits of financial practices, preparations for transactions, risk management and reputation management, before and/or at the beginning of the PriNegs. Due diligence generally refers to the process of investigating various aspects, including financials, legal matters, operations, markets, taxes, environmental issues, human resources, IT systems, reputations and strategic considerations.
Due diligence is conducted to make sure that both parties are able to legally and otherwise operate in the roles that they intend to operate in within the specific countries or jurisdictions. Conducting due diligence is very important and can lead to a more transparent and informed negotiation process.
COUNTRY-SPECIFIC NEEDS: Due diligence varies significantly from jurisdiction to jurisdiction and on a case-by-case basis. Please consult Filetaacadse relating to due diligence, best practices and/or any other requirements within your jurisdiction, if necessary.
In general, both parties should check that all parties have valid identities, appropriate backgrounds for their roles, represent entities that they claim to represent and that these entities are owned by favorable parties who operate appropriately.
LEVELS OF DISCLOSURE: The AppIECs should also choose with which level of disclosure they are comfortable and can proceed further. Non-disclosure agreements should be signed between the parties, if necessary.
All parties should keep their wits about them and not forget common sense when interacting with each other. Ultimately, it all comes down to establishing a level of trust between the parties. No one should proceed further, if they have any doubts or trust issues with any other party or the situation.
"What am I not allowed to do while using the Service?"
You can only use the Service for the exact purposes for which it was designed or intended to be used, and nothing else. You are not allowed to engage in any illegal activities, including corporate or industrial espionage. The AppIECs are not allowed to engage in public fundraising or solicitation of investments. You are not allowed to share or distribute any information or content obtained through the Service with anyone. You are not allowed to disclose or make public your use of the Service.
RULES: You are required to carefully follow the SeToU and SeNDA at all times while using the Service and continuing for significant periods of time after your use of the Service has ceased.
PURPOSES: You can only use the Service for the exact purposes for which it was designed or intended to be used, and nothing else. Obviously, you are not allowed to engage in any illegal activities, including corporate or industrial espionage.
NO PUBLICITY: The AppIECs are not allowed to engage in public fundraising or solicitation of investments, for a project that is linked in any way to the content, reasoning or reasons behind their use of the Service: prior to or during their use of the Service and for as long as they accept invitations for the PriCon by responding to them via the 3PCTs or intend to do so.
NO SHARING: You are not allowed to share or distribute any information or content obtained through the Service with anyone. You are not allowed to disclose or make public your use of the Service or the fact that you use or have used the Service, for the duration that you use the Service and for as long as you either: accept invitations for the PriCon by responding to them via the 3PCTs or intend to do so, or send invitations for the PriCon via the 3PCTs or intend to do so, whichever applies to you.
"What are the risks associated with the use of the Service?"
The Service has the usual risks of any other service. The extra risks relate to the Submissions. There are other risks that go beyond the use of the Service.
DURING THE USE OF THE SERVICE: The Service has the usual risks of any other service. There is an additional risk that the Submission details of the AppIECs are uncovered and reverse engineered by malicious actors.
In addition to this risk there are other risks after the use of the Service has ceased.
AFTER THE USE OF THE SERVICE: The PerComs who are engaging in the PriCon or PriNegs, after having used the Service, face risks related to their interactions with their counterparts that are independent of the Service. During the PriCon or PriNegs the AppIECs encounter the potential risk of corporate or industrial espionage. Also, during the PriCon or PriNegs all parties involved bear the risk of encountering fraudulent activity.
This is why it is extremely important that all parties involved conduct due diligence on themselves and their counterparts before and/or at the beginning of the PriNegs. As a golden rule, you should only interact with people that you trust.
"What about the certifications, brands or technologies listed on the Site?"
The Site has various certifications, brands and technologies. They are very important. Some of them are mysterious.
MYSTERIES: If you look at the footer of any page of the Site you will see various certifications, brands and technologies listed. These are very important to the function of the Site and/or Service. Many of them are self-evident in their purpose after you view the details. Some of them are mysterious.
There are very good reasons for these mysterious entries to exist on the Site and it is up to you to figure them out. For privacy, security, legal and/or other reasons we cannot provide any more details or explanations about these certifications, brands or technologies than we have already provided on the Site. Many of them provide excellent safeguards for the PerComs and/or RegUs.
"Are there any fees, charges, carry-on or other expenses?"
No, you only make a one-time payment that enables you to use the Service for 12 months. VAT or GST is not included in the prices shown. Bank or wire transfer costs are not included in the price. Other than that there are no fees, charges, carry-on or other expenses associated with the normal use of the Service.
ONE-TIME PAYMENT: You only make a one-time payment that enables you to use the Service for 12 months. However, you should note that the price excludes VAT or GST, if applicable. VAT or GST will be calculated and presented before making an order, if applicable.
Also, bank or wire transfer costs are not included in the price, if applicable. There are no fees, charges, carry-on or other expenses associated with the normal use of the Service that would be payable to the SPs.
LOST LOGINS OR EQUIPMENT: Note that if you lose your login credentials we may charge you €10,000 / $11,000 (excl. VAT/GST if appl.) to send you new login credentials. If you lose your login credentials three (3) times the cost will increase to €50,000 / $57,000 (excl. VAT/GST if appl.) per renewal.19
If you lose physical equipment relating to your physical use of the Service we will charge you €100,000 / $114,000 (excl. VAT/GST if appl.) to send you new physical equipment.19
AFTERWARDS: You should be aware that there might be other costs created by various third parties regarding your activities after your use of the Service has ceased.
What you do after you have used the Service, such as engaging in the PriCon or PriNegs via the 3PCTs, is a private matter between you and your counterpart. Since, we do not know anything about the PriCon or PriNegs, we cannot impose any fees, charges, carry-on or other expenses in relation to them.
BREACHES: By using the Service you agree to the Rules of the Service, including the SeNDA, which has significant liquidated damages associated with it. However, these liquidated damages do not apply to you if you use the Service as instructed, do not disclose your use of the Service and abide by all the Rules of the Service.
"Do you provide trade discounts (Tradis), student discounts (Studis) or senior discounts (Sendis)?"
Yes, we provide trade discounts (Tradis), student discounts (Studis) and senior discounts (Sendis) for the PerComs. Studis are available for all educational levels, including homeschooling.
DISCOUNTS: We provide Tradis, Studis and Sendis for the PerComs. If you have been in talks with us, we may have provided you with a Tradi, Studi or Sendi code that you may enter on the order to apply the discount. You may also receive Tradi codes from other sources.
MATURE STUDENTS: If you have been in talks with us, we may have provided you with a Studi code that you may enter on the order to apply the discount. Please note that Studis are available for all educational levels, including homeschooling.
IMMATURE STUDENTS: We do not serve children. If you are a child, you cannot personally use the Service. Have your dad contact us. "You'd be surprised what the Service could do for you" (Y'd be su wat Sec do fo yo).
"Do you provide veteran discounts (Vetdis) or the Special Case Discounts (SCDs)?"
Yes, we provide veteran discounts (Vetdis) and the Special Case Discounts (SCDs) for the PerComs. If you have been in talks with us, we may have provided you with a Vetdi or the SCD code that you may enter on the order to apply the discount.
VETS: We provide Vetdis for the PerComs. If you have been in talks with us, we may have provided you with a Vetdi code that you may enter on the order to apply the discount.
SPECS: We provide the SCDs for the PerComs. If you have been in talks with us, we may have provided you with the SCD code that you may enter on the order to apply the discount. You may also receive the SCD codes from other sources.
"Do you accept the Alternative Payment Methods (AltPMs) like cash, gold, valuables, cryptos or other?"
Yes, we provide countless ways to pay us. The AltPMs are tangibles (e.g., cash, gold, equipment, machinery or land) and/or intangibles (e.g., cryptos [Bitcoin, Monero etc.], software or IP).
ALTERNATIVE: We provide countless ways to pay us. Only the AltUs can pay with the AltPMs. The AltPMs are tangibles (e.g., cash, gold, equipment, machinery or land) and/or intangibles (e.g., cryptos [Bitcoin, Monero etc.], software or IP).
This means that you can pay with silver, other metals, valuables or hundreds of different cryptos etc. We also like to barter.
SOMETIMES: If you cannot afford the Service and you are a AppIEC we can sometimes even combine the AltPMs with heavy discounts. In certain rare situations you can even get the Service for free with the TesUs accounts.
SAFER: Please contact us regarding the AltPMs before or as a part of your order. For added security, only use the Go Dark
™ portal when contacting us or ordering from us in connection with the AltPMs.
"Can I get a refund if I am not satisfied with the Service?"
Yes, you can get a refund if you are dissatisfied with the Service, but it will not help you much. We are not able to provide refunds in certain cases due to AML policies. No one should purchase a license to use the Service and expect to receive a meaningful refund.
SUBSCRIPTION: You can get a refund if you are dissatisfied with the Service, but it will not help you much. The price of the Service consists of at least two parts: the customization services and subscription.
Here is how the Service works from a refund perspective. In all cases, the Service has extensive customization work performed at the start of the use of the Service. These customization services incur most of the costs reflected in the price of the Service. The customization work is non-refundable.
You may cancel the 12-month subscription at any point and we will refund the unused duration of the subscription, but this will not amount to a meaningful sum of money in comparison to the total price of the Service.
POLICIES: We are not able to provide refunds to the AltUs who have used the AltPMs due to AML policies in place in various countries or jurisdictions. Similarly, we are not able to provide refunds for Go Dark
™ versions of the Service, due to AML policies in place in various countries or jurisdictions.
NOT MEANINGFUL: In conclusion, no one should purchase a license to use the Service and expect to receive a meaningful refund. Please refer to the Service Refund Policy (SeRP) for more details.
"Do you provide bulk discounts?"
Yes, we provide bulk discounts automatically.
BULK UP: We provide bulk discounts for the PerComs that purchase multiple licenses.
This discount is automatically applied at checkout and the same discount percentage applies to all licenses equally, even for the first license purchased, if all licenses are purchased simultaneously.
"How much does the Service cost?"
Our prices vary greatly based on the package and version of the Service. There are great benefits in remaining in the stealth mode. We provide many discounts.
COST-EFFICIENT AND FAST: The prices vary greatly based on the package and version of the Service. Since the Service is one of a kind, it is impossible to do a price comparison.
If we had to do a comparison, we would compare our prices to the costs associated with travelling around the world and going to a lot of seminars, events and meetings. The cost of meeting the right people this way would really add up to significant numbers, not to mention all that time wasted planning and travelling.
When you think about it, the benefits of remaining in the stealth mode really add up fast, as opposed to racking up travel costs or accounting for the increased risks when operating openly. Anyway you put it, meeting the right people is always priceless, whichever way you do it.
STRUCTURE: We have a straight forward and open pricing policy. We charge a one-time payment for 12 months of service. Most of the costs of the Service are in the customization work of setting up the Service specifically for you.
A minor component of the cost is the 12-month subscription that you can cancel at any time, but doing so will only grant you a small refund in relation to the total cost of the Service. We provide various discounts for different parties.
"What are the liquidated damages associated with breaching or violating the Service Terms of Use (SeToU) and/or Service Non-Disclosure Agreement (SeNDA)?"
Breaching or violating the SeToU and/or SeNDA may result in the TotA as well as significant liquidated damages and may subject you to legal actions. Depending on the type of the RegU, there are other liquidated damages as stated below.
NO REALLY MEANS NO: Breaching or violating the SeToU and/or SeNDA may result in the TotA as well as significant liquidated damages and may subject you to legal actions. If this occurs, we will not pay you back any money for the duration of the license that was unused by you. There are other liquidated damages associated with breaching or violating the SeToU and/or SeNDA depending on the type of the RegU.
DEVELOPER MISREPRESENTATIONS: If the purchaser of the developer package has misrepresented their status as an AppIEC for their country of residence, country of incorporation and/or for any of the Chosen Countries (CCs), at any time during their use of the Service, they agree to pay liquidated damages in the amount of €1,000,000 / $1,140,000 to the SP and potentially face criminal prosecution and/or civil lawsuits from various third parties and/or the SPs.19
If the AppIECs lose their approved status at any time while using the Service, they must immediately cease the use of the Service and contact the SP.
The AppIECs are also required to submit additional information if requested by the SPs which is used to investigate their representations or claims further, if deemed necessary by the SP in its sole discretion.
DEVELOPER DISCLOSURES: The AppIECs also agree to a SeNDA between themselves and the SPs in regard to the information that they are able to access while using the Service. This means that they are not able to make public or disclose any information that they obtain while using the Service.
If the purchaser of the developer package breaches or violates any of the terms in the SeNDA they agree to pay liquidated damages in the amount of €10,000,000 / $11,400,000 to the SP and potentially face criminal prosecution and/or civil lawsuits from various third parties and/or the SPs.19
INVESTOR MISREPRESENTATIONS: If the purchaser of the investor package has misrepresented their status as an AccI for their country of residence, country of incorporation and/or for any of the CCs, at any time during their use of the Service, they agree to pay liquidated damages in the amount of €10,000,000 / $11,400,000 to the SP and potentially face criminal prosecution and/or civil lawsuits from various third parties and/or the SPs.19
If the AccIs lose their accreditation status at any time while using the Service, they must immediately cease the use of the Service and contact the SP.
The AccIs are also required to submit additional information if requested by the SP which is used to investigate their representations or claims further, if deemed necessary by the SP in its sole discretion.
INVESTOR DISCLOSURES: The AccIs also agree to a SeNDA between themselves and the SPs in regard to the information that they are able to access while using the Service. This means that they are not able to make public or disclose any information that they obtain while using the Service.
If the purchaser of the investor package breaches or violates any of the terms in the SeNDA they agree to pay liquidated damages in the amount of €100,000,000 / $114,000,000 to the SP and potentially face criminal prosecution and/or civil lawsuits from various third parties and/or the SPs.19