JIL Sovereign JIL Sovereign
  • Products
    The 5 Pillars Pre-Settlement Attestation Retroactive Settlement Verification Asset Intelligence Wallet Intelligence Pre-Clearance & Verdict Confirmation Money Passport API AccreditedID Issuer · 506(c) ProofOfFunds · Title / Escrow SourceOfFunds · Exchange / OTC IncomeVerify · Lender (non-QM) Deployment Sovereign Stack · turnkey
  • How It Works
    Use cases by industry Financial Institutions Healthcare & Medicare / MCO Insurance & Claims Vendor & Payroll Government Entitlements Card Networks Custodian Transfer & Capital Markets Legal / Asset Investigation
    Try it live Live Demo · 7 scenarios, all 8 capabilities Public-Data POC · $165M flagged from CMS MCO Introduction · 5 slides MCO Detection Deck · 20 slides How it works Wallet Intelligence demo Attestation Engine demo Pilot Sandbox · free API key Sample Court-Ready Record
  • Platform
    Architecture Infrastructure Sovereign Compliance Network Security & Compliance Catalog & Compliance Attestation Checks (148) Regulatory Positioning Pricing Fee Model Economics Overview
  • Investors
    Pitch Deck Valuation Comparisons Institutional Materials Pack Submit Inquiry
  • Company
    About Founder Message Team Roadmap Partnership Inquiry Contact
  • Portals
    Customer surfaces Pilot Sandbox · free, synthetic data, KYC-gated Retail · subscriptions, claims, Tier 1 + Ava customer workspace Live Demo · public, no login
🇺🇸 English
🇫🇷 Français
🇩🇪 Deutsch
🇨🇭 Deutsch (CH)
🇪🇸 Español
🇧🇷 Português
🇵🇱 Polski
🇺🇦 Українська
🇸🇦 العربية
🇮🇱 עברית
🇮🇳 हिन्दी
🇯🇵 日本語
🇨🇳 中文
Schedule a Call
🇺🇸 English
🇫🇷 Français
🇩🇪 Deutsch
🇪🇸 Español
🇧🇷 Português
🇵🇱 Polski
🇺🇦 Україн.
🇸🇦 العربية
🇮🇱 עברית
🇮🇳 हिन्दी
🇯🇵 日本語
🇨🇳 中文
Products - The 5 Pillars All Pillars Overview Pre-Settlement Attestation Retroactive Settlement Verification Asset Intelligence Wallet Intelligence Pre-Clearance & Verdict Confirmation Tier 1 detection plus Ava How it works Live Demo MCO Introduction · 5 slides MCO Detection Deck Money Passport API AccreditedID Issuer · 506(c) ProofOfFunds · Title / Escrow SourceOfFunds · Exchange / OTC IncomeVerify · Lender (non-QM) Try It Sandbox · free, instant API key Attestation Engine demo Sample Court-Ready Record Deployment Sovereign Stack · turnkey Fraud Prevention Financial Institutions Insurance & Claims Vendor & Payroll Healthcare & Medicare Government Entitlements Legal / Asset Investigation Card Networks Tier 1 detection plus Ava · retroactive payment integrity Capital Markets Custodian Transfer Fund Operations Institutional Onboarding Treasury & Cross-Border Live Demos Wallet Intelligence (live) 5-Vertical Verdict Demo Attestation Engine (69 Checks) Platform Infrastructure Sovereign Compliance Network Security & Compliance Attestation Checks (148) Regulatory Positioning Trust Center Economics Overview ROI Calculator Fee Model & Routing Sample MSA & DPA Agreement Investors Investor Brief $100M Funding Structure Valuation Comparisons Infrastructure Valuation Memo Download Institutional Materials Submit Inquiry Company About Founder Message Team Roadmap Partnership Inquiry Contact Portals Pilot Sandbox · free, synthetic data Retail · subscriptions, claims, Tier 1 + Ava customer workspace Live Demo · public, no login
Language
Schedule a Call
Home › Platform › Technical Docs › JIL_Risk_Disclosures
Legal

Risk Disclosures

Important risk factors associated with the JIL Sovereign platform, JIL tokens, and digital asset participation.

Effective Date: February 26, 2026  |  Last Updated: February 26, 2026

Table of Contents

  1. General Risk Statement
  2. Technology Risks
  3. Regulatory and Legal Risks
  4. Market and Liquidity Risks
  5. Operational Risks
  6. Custody and Self-Custody Risks
  7. Cross-Border Settlement Risks
  8. Cybersecurity Risks
  9. Token-Specific Risks
  10. Third-Party Risks
  11. Force Majeure
  12. No Guarantees
  13. Acknowledgment

This Risk Disclosures document ("Disclosures") is issued by JIL Sovereign Technologies, Inc. ("JIL Sovereign," "we," "us," or "our"). It should be read in conjunction with our Terms of Service, Privacy Policy, and Risk Disclosure Statement. The risks described herein are not exhaustive. The digital asset industry evolves rapidly, and new or unforeseen risks may emerge at any time. You should carefully evaluate all of the risks below - as well as any risks specific to your circumstances - before using the JIL Sovereign platform, acquiring JIL tokens, or participating in the JIL ecosystem in any capacity.

1. General Risk Statement

Digital assets, including the JIL token, involve significant risk. Users should only participate with funds they can afford to lose entirely. The value of digital assets can fluctuate dramatically and may decline to zero. Past performance of any digital asset - including JIL tokens - is not indicative of future results, and no representation or warranty is made regarding future value or performance.

JIL tokens are utility tokens. They are designed to provide functional access to the JIL Sovereign settlement network, including Sovereign Compliance Network (SCN) validator participation, protocol governance, transaction fee settlement, and ecosystem services. JIL tokens are not securities, investment contracts, shares, equity, debt instruments, or any form of investment product. Holding JIL tokens does not confer ownership, dividend rights, profit-sharing rights, or control rights in JIL Sovereign Technologies, Inc. or any affiliated entity.

Digital assets are not legal tender and are not backed by any government. Tokens held on the JIL Sovereign platform are not protected by the Federal Deposit Insurance Corporation (FDIC), the Securities Investor Protection Corporation (SIPC), or any equivalent government deposit insurance program in any jurisdiction. You bear the full risk of loss associated with your digital asset holdings.

Nothing in these Disclosures, on the JIL Sovereign website, in our documentation, or in any communication from JIL Sovereign constitutes financial, investment, legal, or tax advice. You should consult qualified professional advisors before making any decisions related to digital assets.

2. Technology Risks

2.1 Smart Contract Vulnerabilities

The JIL Sovereign protocol relies on smart contracts deployed on the JIL verification layer, the Ethereum mainnet (JIL ERC-20 token, JILTreasury, JILTokenSwap), and other bridged chains. Smart contracts are immutable once deployed and may contain undiscovered vulnerabilities, logic errors, or exploitable conditions. Despite rigorous testing, formal verification efforts, and code reviews, no software can be guaranteed to be free of defects. A smart contract vulnerability could result in the loss, freezing, or unauthorized transfer of digital assets.

2.2 Software Bugs and Defects

The JIL Sovereign platform consists of 192 interconnected services. Software of this complexity inherently carries the risk of bugs, errors, race conditions, and unexpected behavior. While we employ comprehensive testing and monitoring, undiscovered defects may exist that could cause service disruptions, data inconsistencies, or asset loss. Updates and patches deployed to address known issues may themselves introduce new problems.

2.3 Consensus Mechanism Risks

The JIL settlement protocol uses a BFT-style Proof-of-Stake consensus mechanism with BPoH (Blockchain Proof of History) timestamps and a 14-of-20 Byzantine Fault Tolerant (BFT) SCN validator model. This design tolerates up to 6 faulty or compromised SCN validators while maintaining network integrity. However, if 7 or more SCN validators simultaneously fail, become compromised, or act maliciously, the network may halt, produce incorrect state transitions, or become unable to finalize transactions. Consensus mechanisms of this nature have not been tested at scale across decades of real-world operation.

2.4 Bridge Security

The JIL cross-chain bridge uses a 14-of-20 multi-signature SCN validator model distributed across 13 jurisdictions to mitigate single points of failure. This architecture significantly reduces - but does not eliminate - the risk of bridge exploits. Cross-chain bridges have historically been among the most targeted attack vectors in the digital asset industry. Vulnerabilities in bridge contracts, SCN validator key compromise, or coordinated SCN validator collusion could result in the theft or permanent loss of bridged assets. Additionally, finality differences between chains and chain reorganizations on external networks may affect bridge transfer integrity.

2.5 MPC Key Management

JIL Sovereign operates a self-custody MPC (Multi-Party Computation) 2-of-3 threshold signing model. Users hold one key shard, and the remaining shards are distributed across independent infrastructure. The user is solely responsible for the security and safekeeping of their key shard. Loss, theft, or destruction of a user's key shard - combined with failure of recovery mechanisms - may result in the permanent and irreversible loss of access to digital assets. JIL Sovereign cannot recover lost key shards on your behalf.

2.6 Post-Quantum Cryptography

JIL Sovereign implements post-quantum cryptographic algorithms, including Dilithium (digital signatures) and Kyber (key encapsulation), to provide forward-looking protection against quantum computing threats. These algorithms have been standardized by NIST but are relatively new compared to classical cryptographic schemes such as RSA and ECDSA. They have not undergone decades of real-world adversarial testing. Unforeseen mathematical weaknesses, side-channel vulnerabilities, or implementation flaws in post-quantum algorithms may be discovered in the future that could compromise the security of the protocol.

3. Regulatory and Legal Risks

3.1 Evolving Regulatory Landscape

The legal and regulatory framework governing digital assets, blockchain technology, decentralized finance, and utility tokens is in a state of rapid evolution across virtually every jurisdiction. Laws, regulations, administrative guidance, and enforcement priorities may change with little or no advance notice. Regulatory developments in any of the 13 jurisdictions where JIL Sovereign SCN validators operate - or in any jurisdiction where users or token holders reside - could materially and adversely affect the operation of the platform, the functionality of JIL tokens, or users' ability to participate in the ecosystem.

3.2 Potential Changes in Law

Future legislation or regulatory action could restrict, limit, or prohibit the issuance, sale, transfer, possession, or use of utility tokens such as JIL. Governments may impose licensing requirements, registration obligations, capital requirements, operational standards, or outright bans that could require JIL Sovereign to modify, suspend, or discontinue services in certain jurisdictions. There is no guarantee that JIL Sovereign will be able to adapt to all regulatory changes in a timely or commercially viable manner.

3.3 Licensing and Compliance

JIL Sovereign operates across multiple jurisdictions and seeks to comply with applicable laws and regulations in each. However, there is no guarantee that JIL Sovereign will obtain, maintain, or renew all necessary licenses, registrations, or approvals in every jurisdiction where it operates or intends to operate. The loss or denial of a required license could force the discontinuation of services in the affected jurisdiction.

3.4 Cross-Border Regulatory Divergence

Regulatory treatment of digital assets and utility tokens varies significantly across borders. A token classified as a utility token in one jurisdiction may be treated as a security, a financial instrument, or a regulated payment token in another. This divergence creates legal uncertainty for users who access the platform from multiple jurisdictions or who transfer tokens across borders. Users are solely responsible for understanding and complying with the laws applicable in their own jurisdiction.

4. Market and Liquidity Risks

4.1 Token Price Volatility

The market price of JIL tokens, like all digital assets, is subject to extreme and unpredictable volatility. Price swings of 10-50% or more within a single day are not uncommon in digital asset markets. The price of JIL tokens may be influenced by factors entirely outside of JIL Sovereign's control, including broader cryptocurrency market movements, macroeconomic conditions, regulatory announcements, media coverage, social media sentiment, and speculative trading activity. There is no guarantee that JIL tokens will maintain any particular market value.

4.2 No Guarantee of Liquidity

JIL tokens may trade on a limited number of exchanges, decentralized platforms, or automated market makers. Trading volume, market depth, and the availability of trading pairs may be limited, particularly during the early stages of the ecosystem's development. During periods of extreme market stress or low liquidity, it may be difficult or impossible to sell JIL tokens at any price, or to execute trades at prices that reflect fair market value.

4.3 AMM and DEX Risks

Participation in decentralized exchange (DEX) trading and automated market maker (AMM) liquidity pools carries specific risks, including but not limited to: impermanent loss (where the value of deposited tokens diverges from the value they would have held outside the pool), price slippage on large orders, front-running and sandwich attacks by sophisticated actors, and smart contract exploits targeting DEX or AMM contracts. These risks are inherent to decentralized trading infrastructure and cannot be entirely mitigated by protocol design.

4.4 Market Manipulation

Digital asset markets may be subject to market manipulation, wash trading, spoofing, pump-and-dump schemes, and other practices that distort true market conditions. Such practices may be illegal in some jurisdictions but may not be effectively detected, regulated, or enforced in all markets where JIL tokens are traded. Manipulative activity could cause artificial price inflation or deflation that does not reflect genuine supply and demand.

4.5 Concentration Risk

A significant portion of the JIL token supply is allocated to treasury vaults (SCN Validator Incentives, Protocol Treasury, Operations, Ecosystem Fund, and Strategic Reserve), team allocations, and early participants. Concentrated holdings mean that sales or transfers by a small number of large holders could materially affect the market price. Vesting schedules and treasury governance mechanisms are designed to mitigate abrupt supply shocks, but cannot eliminate concentration risk entirely.

5. Operational Risks

5.1 Platform Downtime

The JIL Sovereign platform may experience planned or unplanned downtime due to maintenance, upgrades, infrastructure failures, software defects, or external events. During downtime, users may be unable to access their wallets, execute transactions, or interact with the protocol. While JIL Sovereign maintains redundant infrastructure and monitoring systems, no system can guarantee 100% uptime.

5.2 Network Congestion

Periods of high transaction volume may cause network congestion, resulting in delayed transaction processing, increased fees, or temporary inability to submit transactions. Network congestion may be caused by legitimate demand, spam attacks, or coordinated abuse of the network's throughput capacity.

5.3 SCN Validator Node Failures

The security and performance of the JIL settlement network depend on the continuous, reliable operation of SCN validator nodes distributed across 13 jurisdictions. Individual SCN validator nodes may fail due to hardware malfunctions, software errors, network connectivity issues, data center outages, or operator error. The 14-of-20 BFT consensus model is designed to tolerate up to 6 simultaneous SCN validator failures without network disruption. However, correlated failures affecting 7 or more SCN validators - such as a widespread infrastructure provider outage or a coordinated attack - could cause the network to halt or degrade.

5.4 Third-Party Service Dependencies

The JIL Sovereign platform depends on third-party infrastructure and services, including cloud hosting providers (GCP, Hetzner), DNS services (Cloudflare), hardware security modules, external blockchain networks (Ethereum, Solana), KYC/AML providers, and fiat on/off-ramp partners. Outages, security incidents, policy changes, or discontinuation of any third-party service could affect the availability, performance, or security of the JIL Sovereign platform. JIL Sovereign does not control and cannot guarantee the reliability of third-party services.

5.5 Human Error

Despite established operational procedures, automated safeguards, and SentinelAI monitoring, human error in system administration, code deployment, configuration management, or operational decision-making could result in service disruptions, data loss, or security incidents. No operational framework can entirely eliminate the risk of human error.

6. Custody and Self-Custody Risks

6.1 User Responsibility for Key Shards

JIL Sovereign operates a self-custody MPC 2-of-3 model in which users hold one of three key shards required for transaction signing. This design ensures that users retain direct control over their assets - but it also places a critical security responsibility on the user. If you lose, destroy, or fail to properly secure your key shard, and if available recovery mechanisms (including social recovery and guardian attestation) are also unavailable, your digital assets may become permanently and irretrievably inaccessible. JIL Sovereign cannot recover, reconstruct, or replace a lost user key shard.

6.2 Loss of Access

Loss of access to your key shard, authentication credentials, registered devices, or recovery contacts may result in the permanent loss of your digital assets. Blockchain transactions are final and irreversible once confirmed. If digital assets are sent to an incorrect address, or if an unauthorized party gains access to your signing credentials, those assets cannot be recovered or reversed by JIL Sovereign or by any third party.

6.3 Wallet Protection Coverage

Eligible Premium-tier accounts include wallet protection coverage of up to $250,000 per qualifying incident. This coverage is provided by private third-party underwriters and is subject to the terms, conditions, exclusions, and limitations of the applicable protection coverage agreement. Coverage does not extend to all scenarios - it specifically does not cover losses attributable to user error, negligence, unauthorized sharing of credentials, market volatility, regulatory actions, sanctions compliance events, or force majeure events. Coverage availability, limits, and terms are determined by our underwriting partners and may change at any time without notice.

6.4 Protection Coverage Is Not Government Insurance

Wallet protection coverage is not equivalent to FDIC insurance, SIPC protection, or any government-backed deposit guarantee program. Claims are subject to investigation, verification, and approval by the underwriter. There is no guarantee that any particular claim will be approved or paid. Aggregate policy limits may be exhausted in the event of a systemic incident affecting multiple accounts simultaneously.

7. Cross-Border Settlement Risks

7.1 Foreign Exchange Risks

Cross-border settlement transactions may involve multiple currencies and are subject to foreign exchange rate fluctuations. Exchange rates between fiat currencies and digital assets can change rapidly and unpredictably. Users who settle transactions denominated in a currency other than their home currency bear the risk of adverse exchange rate movements between the time a transaction is initiated and the time it is finalized.

7.2 Jurisdictional Conflicts

Transactions that cross national borders may be subject to conflicting legal requirements, regulatory standards, or enforcement priorities in different jurisdictions. A transaction that is lawful in one jurisdiction may violate the laws of another. JIL Sovereign cannot provide legal advice regarding the legality of cross-border transactions in your specific circumstances. Users are solely responsible for ensuring that their use of the platform complies with all applicable laws in every relevant jurisdiction.

7.3 Sanctions Compliance

JIL Sovereign is committed to compliance with applicable international sanctions regimes, including those administered by the U.S. Office of Foreign Assets Control (OFAC), the European Union, the United Nations, and other relevant authorities. Transactions involving sanctioned persons, entities, regions, or jurisdictions may be blocked, delayed, or reversed. Changes in sanctions designations may affect users without prior notice. Users are responsible for ensuring that their activities do not violate applicable sanctions laws.

7.4 Correspondent Banking Dependencies

Fiat on-ramp and off-ramp services may depend on correspondent banking relationships and traditional payment infrastructure. These relationships are subject to the policies, risk appetite, and regulatory obligations of participating financial institutions. Banks may decline to process transactions related to digital assets, terminate correspondent banking relationships, or impose additional compliance requirements that could delay or prevent fiat settlement.

8. Cybersecurity Risks

8.1 Hacking and Exploitation

The JIL Sovereign platform, its infrastructure, smart contracts, and user accounts are potential targets for sophisticated cyberattacks. These include, but are not limited to, distributed denial-of-service (DDoS) attacks, zero-day exploits, supply chain attacks, man-in-the-middle attacks, and protocol-level exploits. Despite layered security architecture, intrusion detection systems, and active monitoring, no system connected to the internet can be guaranteed to be impervious to attack.

8.2 Phishing and Social Engineering

Attackers may attempt to compromise user accounts through phishing emails, fraudulent websites that impersonate JIL Sovereign, social media impersonation, SIM-swapping attacks, or other social engineering techniques. JIL Sovereign will never ask for your private key shards, passwords, seed phrases, or authentication codes via email, social media, or unsolicited communications. Users should exercise extreme caution and verify the authenticity of all communications purporting to be from JIL Sovereign.

8.3 DDoS and Network Attacks

Distributed denial-of-service attacks targeting the JIL Sovereign platform, individual SCN validator nodes, or supporting infrastructure could cause temporary service disruptions, degraded performance, or temporary inability to process transactions. While DDoS mitigation measures are in place, sufficiently large or sophisticated attacks may temporarily overwhelm defensive capabilities.

8.4 Insider Threats

JIL Sovereign mitigates insider threats through zone-based isolation, least-privilege access controls, multi-party authorization for sensitive operations, and continuous SentinelAI monitoring of SCN validator fleet behavior. However, no access control framework can entirely eliminate the risk that a trusted insider could misuse their access to cause harm, exfiltrate data, or compromise system integrity. The 14-of-20 multi-signature requirement for bridge operations ensures that no single SCN validator operator can unilaterally authorize asset transfers.

9. Token-Specific Risks

9.1 Utility Token Classification

JIL tokens are utility tokens designed to facilitate network functionality within the JIL Sovereign ecosystem. They provide access to settlement services, SCN validator staking, governance participation, and ecosystem services. JIL tokens are not securities, investment contracts, or financial instruments. They do not represent ownership in any entity, do not pay dividends or interest, and do not entitle holders to any share of profits or revenues. Acquiring JIL tokens should not be undertaken with the expectation of profit derived from the efforts of JIL Sovereign or any third party.

9.2 Network Adoption Dependency

The utility and functionality of JIL tokens are directly tied to the adoption, growth, and continued operation of the JIL Sovereign network. If the network fails to achieve sufficient adoption among institutional users, SCN validators, developers, and ecosystem participants, the utility of JIL tokens may be limited or diminished. Network effects are critical to the value proposition - a network with insufficient participation may not provide meaningful settlement, governance, or ecosystem utility.

9.3 Token Supply Mechanics

The JIL token has a fixed total supply of 10 billion (10,000,000,000) tokens. The supply is distributed across five treasury vaults (SCN Validator Incentives - 1B, Protocol Treasury - 3B, Operations - 2B, Ecosystem Fund - 1B, Strategic Reserve - 0.5B), with the remaining allocation designated for public distribution, founders vesting, and ecosystem development. Token releases from treasury vaults, vesting schedule unlocks, and ecosystem distribution events may increase the circulating supply over time, which could affect token price and liquidity dynamics.

9.4 Legacy Token Swap Deadlines

Holders of deprecated JIL token versions (v1 and v2) may swap their tokens for the current JIL token (contract 0x9347efffa3e8985e0d35536b408cab48599971e8) via the designated swap contracts at a 1:1 ratio. The swap deadline is May 1, 2026. After the deadline, swap contracts may be deactivated and unswapped legacy tokens may become permanently non-exchangeable. JIL Sovereign is under no obligation to extend swap deadlines or provide alternative migration paths after the stated deadline. Users holding legacy tokens should review the Token Swap page for instructions.

10. Third-Party Risks

10.1 Ethereum Network Dependency

The JIL ERC-20 token contract, JILTreasury contract, and JILTokenSwap contracts are deployed on the Ethereum mainnet. The functionality of these contracts depends on the continued operation, security, and performance of the Ethereum network. Ethereum network congestion, gas price spikes, consensus failures, hard forks, or protocol changes could affect the ability to interact with JIL token contracts, execute swaps, or access treasury functions. JIL Sovereign does not control and cannot guarantee the availability or performance of the Ethereum network.

10.2 Protection Coverage Underwriters

Wallet protection coverage is provided by third-party underwriting partners. The financial strength, claims-paying ability, and continued willingness of underwriters to provide coverage are outside of JIL Sovereign's control. Underwriters may modify coverage terms, increase premiums, reduce limits, add exclusions, or discontinue coverage at any time. The insolvency or inability of an underwriter to pay claims would directly affect the availability of protection coverage for platform users.

10.3 SCN Validator Operators

The JIL settlement network is operated by independent SCN validator nodes distributed across 13 jurisdictions. While JIL Sovereign establishes operational standards, monitors SCN validator performance via SentinelAI, and enforces compliance through the Fleet Inspector, individual SCN validator operators are independent entities. Their operational practices, security measures, and compliance with local laws are ultimately their own responsibility. The failure, misconduct, or regulatory non-compliance of individual SCN validator operators could affect network performance and security.

10.4 Infrastructure Providers

JIL Sovereign relies on infrastructure providers including Hetzner (SCN validator hosting, portal hosting, object storage), Cloudflare (CDN, DDoS mitigation, DNS), and others. These providers operate under their own terms of service and may experience outages, modify their services, change pricing, or terminate service relationships. A significant disruption at a major infrastructure provider could affect the availability of the JIL Sovereign platform or SCN validator network. JIL Sovereign mitigates provider concentration risk through geographic distribution, but cannot eliminate it entirely.

11. Force Majeure

JIL Sovereign shall not be liable for any failure or delay in performing its obligations where such failure or delay results from circumstances beyond its reasonable control. Force majeure events include, but are not limited to: natural disasters (earthquakes, floods, hurricanes, volcanic eruptions), pandemics or epidemics, armed conflicts or acts of terrorism, civil unrest or insurrection, government actions (including sanctions, embargoes, asset freezes, executive orders, or legislative changes), power grid failures, internet infrastructure outages, catastrophic hardware failures, acts of cyberwarfare, and any other events of similar nature that are unforeseeable or, if foreseeable, unavoidable.

In the event of a force majeure occurrence, JIL Sovereign will use commercially reasonable efforts to resume normal operations as soon as practicable. However, no assurance can be given regarding the timeline for restoration of services, the recovery of assets, or the resumption of normal platform operations following a force majeure event. Users acknowledge that digital assets held on or transacted through the platform may be at risk during force majeure events, and that JIL Sovereign's liability in such circumstances is limited as set forth in the Terms of Service.

12. No Guarantees

JIL Sovereign does not guarantee any particular transaction outcome, settlement speed, or system availability. While the JIL settlement protocol is designed to achieve deterministic finality - meaning that confirmed transactions are intended to be irreversible and final - deterministic finality is a design objective, not an absolute guarantee against all conceivable failure modes. Extreme circumstances, including but not limited to consensus failures, bridge exploits, smart contract vulnerabilities, or systemic infrastructure failures, could theoretically affect the finality of transactions.

Wallet protection coverage is provided subject to the terms and conditions of the applicable underwriting agreement. JIL Sovereign does not guarantee that any claim will be approved or paid. Coverage is limited to qualifying losses arising from platform infrastructure failures and is subject to per-incident and aggregate policy limits, exclusions, deductibles, and underwriter approval. Protection coverage does not constitute a guarantee against loss.

All services, software, documentation, and information provided by JIL Sovereign are offered on an "as is" and "as available" basis, without warranties of any kind, whether express, implied, or statutory, including but not limited to warranties of merchantability, fitness for a particular purpose, non-infringement, accuracy, or completeness.

13. Acknowledgment

By accessing or using the JIL Sovereign platform, acquiring or holding JIL tokens, participating in the JIL ecosystem, or using any services provided by JIL Sovereign Technologies, Inc., you acknowledge and confirm that:

  • You have read, understood, and accepted the risks described in these Disclosures in their entirety;
  • You understand that digital assets - including JIL tokens - are subject to significant risk of loss, up to and including the total loss of all assets;
  • You are acquiring and/or using JIL tokens for their intended utility purposes within the JIL Sovereign ecosystem, and not as an investment, security, or financial instrument, nor with the expectation of profit derived from the efforts of others;
  • You have not relied on any statement, representation, or communication by JIL Sovereign as financial, investment, legal, or tax advice;
  • You have the financial resources, knowledge, and risk tolerance to bear the risks described herein;
  • You accept sole responsibility for the security and safekeeping of your key shard, authentication credentials, and recovery mechanisms;
  • You will comply with all applicable laws and regulations in your jurisdiction;
  • You acknowledge that these Disclosures may be updated from time to time and that your continued use of the platform constitutes acceptance of any such updates.

JIL Sovereign Technologies, Inc.
Email: support@jilsovereign.com
Wilmington, Delaware (Incorporated Headquarters)
Hubs: Texas · Switzerland · UAE · Singapore

Products - The 5 Pillars

Pre-Settlement Attestation Retroactive Verification Asset Intelligence Wallet Intelligence Pre-Clearance Layer Sample Court-Ready Record

How It Works

Financial Institutions Insurance & Claims Healthcare & Medicare Custodian Transfer Treasury & Cross-Border Human Flourishing

Platform

Infrastructure Security & Compliance Regulatory Positioning Build Status Technical Docs API Reference

Economics & Investors

Economics Overview Pricing ROI Calculator Investor Brief Funding Structure Patents

Company & Partners

About Founder Message Team Roadmap Partners Contact

Legal & Resources

Verify a Record Terms Privacy Disclosures FAQ SLA
Legal Terms of Service Privacy Policy Risk Disclosures Compliance Posture Verify a Record Patent Filings (53 claims)
JIL Sovereign

© 2026 JIL Sovereign Technologies, Inc. All rights reserved. Patent Pending (2026). Delaware Incorporated · Texas HQ · Switzerland · UAE · Singapore

Provenance-aware verified settlement infrastructure for digital finance. Identity verification, payment-origin verification, beneficiary binding, policy enforcement, and deterministic finality before value moves.

JIL Sovereign provides settlement verification, payment-origin verification, provenance attestation, policy enforcement, and finality proof infrastructure. JIL does not custody customer assets, guarantee transaction outcomes, or replace regulated intermediaries. Settlement execution occurs through regulated partners and authorized participants.

JIL provides technology infrastructure for settlement integrity. Nothing on this website constitutes financial, legal, or investment advice. JIL tokens are utility tokens for network functionality and protocol participation. Fraud statistics sourced from FBI IC3 Annual Reports across multiple categories and time periods.