Risk Disclosures
Important risk factors associated with the JIL Sovereign platform, JIL tokens, and digital asset participation.
Table of Contents
This Risk Disclosures document ("Disclosures") is issued by JIL Sovereign Technologies, Inc. ("JIL Sovereign," "we," "us," or "our"). It should be read in conjunction with our Terms of Service, Privacy Policy, and Risk Disclosure Statement. The risks described herein are not exhaustive. The digital asset industry evolves rapidly, and new or unforeseen risks may emerge at any time. You should carefully evaluate all of the risks below - as well as any risks specific to your circumstances - before using the JIL Sovereign platform, acquiring JIL tokens, or participating in the JIL ecosystem in any capacity.
1. General Risk Statement
Digital assets, including the JIL token, involve significant risk. Users should only participate with funds they can afford to lose entirely. The value of digital assets can fluctuate dramatically and may decline to zero. Past performance of any digital asset - including JIL tokens - is not indicative of future results, and no representation or warranty is made regarding future value or performance.
JIL tokens are utility tokens. They are designed to provide functional access to the JIL Sovereign settlement network, including validator participation, protocol governance, transaction fee settlement, and ecosystem services. JIL tokens are not securities, investment contracts, shares, equity, debt instruments, or any form of investment product. Holding JIL tokens does not confer ownership, dividend rights, profit-sharing rights, or control rights in JIL Sovereign Technologies, Inc. or any affiliated entity.
Digital assets are not legal tender and are not backed by any government. Tokens held on the JIL Sovereign platform are not protected by the Federal Deposit Insurance Corporation (FDIC), the Securities Investor Protection Corporation (SIPC), or any equivalent government deposit insurance program in any jurisdiction. You bear the full risk of loss associated with your digital asset holdings.
Nothing in these Disclosures, on the JIL Sovereign website, in our documentation, or in any communication from JIL Sovereign constitutes financial, investment, legal, or tax advice. You should consult qualified professional advisors before making any decisions related to digital assets.
2. Technology Risks
2.1 Smart Contract Vulnerabilities
The JIL Sovereign protocol relies on smart contracts deployed on the JIL settlement layer, the Ethereum mainnet (JIL ERC-20 token, JILTreasury, JILTokenSwap), and other bridged chains. Smart contracts are immutable once deployed and may contain undiscovered vulnerabilities, logic errors, or exploitable conditions. Despite rigorous testing, formal verification efforts, and code reviews, no software can be guaranteed to be free of defects. A smart contract vulnerability could result in the loss, freezing, or unauthorized transfer of digital assets.
2.2 Software Bugs and Defects
The JIL Sovereign platform consists of over 180 interconnected services. Software of this complexity inherently carries the risk of bugs, errors, race conditions, and unexpected behavior. While we employ comprehensive testing and monitoring, undiscovered defects may exist that could cause service disruptions, data inconsistencies, or asset loss. Updates and patches deployed to address known issues may themselves introduce new problems.
2.3 Consensus Mechanism Risks
The JIL settlement protocol uses a BFT-style Proof-of-Stake consensus mechanism with BPoH (Blockchain Proof of History) timestamps and a 14-of-20 Byzantine Fault Tolerant (BFT) validator model. This design tolerates up to 6 faulty or compromised validators while maintaining network integrity. However, if 7 or more validators simultaneously fail, become compromised, or act maliciously, the network may halt, produce incorrect state transitions, or become unable to finalize transactions. Consensus mechanisms of this nature have not been tested at scale across decades of real-world operation.
2.4 Bridge Security
The JIL cross-chain bridge uses a 14-of-20 multi-signature validator model distributed across 13 jurisdictions to mitigate single points of failure. This architecture significantly reduces - but does not eliminate - the risk of bridge exploits. Cross-chain bridges have historically been among the most targeted attack vectors in the digital asset industry. Vulnerabilities in bridge contracts, validator key compromise, or coordinated validator collusion could result in the theft or permanent loss of bridged assets. Additionally, finality differences between chains and chain reorganizations on external networks may affect bridge transfer integrity.
2.5 MPC Key Management
JIL Sovereign operates a non-custodial MPC (Multi-Party Computation) 2-of-3 threshold signing model. Users hold one key shard, and the remaining shards are distributed across independent infrastructure. The user is solely responsible for the security and safekeeping of their key shard. Loss, theft, or destruction of a user's key shard - combined with failure of recovery mechanisms - may result in the permanent and irreversible loss of access to digital assets. JIL Sovereign cannot recover lost key shards on your behalf.
2.6 Post-Quantum Cryptography
JIL Sovereign implements post-quantum cryptographic algorithms, including Dilithium (digital signatures) and Kyber (key encapsulation), to provide forward-looking protection against quantum computing threats. These algorithms have been standardized by NIST but are relatively new compared to classical cryptographic schemes such as RSA and ECDSA. They have not undergone decades of real-world adversarial testing. Unforeseen mathematical weaknesses, side-channel vulnerabilities, or implementation flaws in post-quantum algorithms may be discovered in the future that could compromise the security of the protocol.
3. Regulatory and Legal Risks
3.1 Evolving Regulatory Landscape
The legal and regulatory framework governing digital assets, blockchain technology, decentralized finance, and utility tokens is in a state of rapid evolution across virtually every jurisdiction. Laws, regulations, administrative guidance, and enforcement priorities may change with little or no advance notice. Regulatory developments in any of the 13 jurisdictions where JIL Sovereign validators operate - or in any jurisdiction where users or token holders reside - could materially and adversely affect the operation of the platform, the functionality of JIL tokens, or users' ability to participate in the ecosystem.
3.2 Potential Changes in Law
Future legislation or regulatory action could restrict, limit, or prohibit the issuance, sale, transfer, possession, or use of utility tokens such as JIL. Governments may impose licensing requirements, registration obligations, capital requirements, operational standards, or outright bans that could require JIL Sovereign to modify, suspend, or discontinue services in certain jurisdictions. There is no guarantee that JIL Sovereign will be able to adapt to all regulatory changes in a timely or commercially viable manner.
3.3 Licensing and Compliance
JIL Sovereign operates across multiple jurisdictions and seeks to comply with applicable laws and regulations in each. However, there is no guarantee that JIL Sovereign will obtain, maintain, or renew all necessary licenses, registrations, or approvals in every jurisdiction where it operates or intends to operate. The loss or denial of a required license could force the discontinuation of services in the affected jurisdiction.
3.4 Cross-Border Regulatory Divergence
Regulatory treatment of digital assets and utility tokens varies significantly across borders. A token classified as a utility token in one jurisdiction may be treated as a security, a financial instrument, or a regulated payment token in another. This divergence creates legal uncertainty for users who access the platform from multiple jurisdictions or who transfer tokens across borders. Users are solely responsible for understanding and complying with the laws applicable in their own jurisdiction.
4. Market and Liquidity Risks
4.1 Token Price Volatility
The market price of JIL tokens, like all digital assets, is subject to extreme and unpredictable volatility. Price swings of 10-50% or more within a single day are not uncommon in digital asset markets. The price of JIL tokens may be influenced by factors entirely outside of JIL Sovereign's control, including broader cryptocurrency market movements, macroeconomic conditions, regulatory announcements, media coverage, social media sentiment, and speculative trading activity. There is no guarantee that JIL tokens will maintain any particular market value.
4.2 No Guarantee of Liquidity
JIL tokens may trade on a limited number of exchanges, decentralized platforms, or automated market makers. Trading volume, market depth, and the availability of trading pairs may be limited, particularly during the early stages of the ecosystem's development. During periods of extreme market stress or low liquidity, it may be difficult or impossible to sell JIL tokens at any price, or to execute trades at prices that reflect fair market value.
4.3 AMM and DEX Risks
Participation in decentralized exchange (DEX) trading and automated market maker (AMM) liquidity pools carries specific risks, including but not limited to: impermanent loss (where the value of deposited tokens diverges from the value they would have held outside the pool), price slippage on large orders, front-running and sandwich attacks by sophisticated actors, and smart contract exploits targeting DEX or AMM contracts. These risks are inherent to decentralized trading infrastructure and cannot be entirely mitigated by protocol design.
4.4 Market Manipulation
Digital asset markets may be subject to market manipulation, wash trading, spoofing, pump-and-dump schemes, and other practices that distort true market conditions. Such practices may be illegal in some jurisdictions but may not be effectively detected, regulated, or enforced in all markets where JIL tokens are traded. Manipulative activity could cause artificial price inflation or deflation that does not reflect genuine supply and demand.
4.5 Concentration Risk
A significant portion of the JIL token supply is allocated to treasury vaults (Validator Incentives, Protocol Treasury, Operations, Ecosystem Fund, and Strategic Reserve), team allocations, and early participants. Concentrated holdings mean that sales or transfers by a small number of large holders could materially affect the market price. Vesting schedules and treasury governance mechanisms are designed to mitigate abrupt supply shocks, but cannot eliminate concentration risk entirely.
5. Operational Risks
5.1 Platform Downtime
The JIL Sovereign platform may experience planned or unplanned downtime due to maintenance, upgrades, infrastructure failures, software defects, or external events. During downtime, users may be unable to access their wallets, execute transactions, or interact with the protocol. While JIL Sovereign maintains redundant infrastructure and monitoring systems, no system can guarantee 100% uptime.
5.2 Network Congestion
Periods of high transaction volume may cause network congestion, resulting in delayed transaction processing, increased fees, or temporary inability to submit transactions. Network congestion may be caused by legitimate demand, spam attacks, or coordinated abuse of the network's throughput capacity.
5.3 Validator Node Failures
The security and performance of the JIL settlement network depend on the continuous, reliable operation of validator nodes distributed across 13 jurisdictions. Individual validator nodes may fail due to hardware malfunctions, software errors, network connectivity issues, data center outages, or operator error. The 14-of-20 BFT consensus model is designed to tolerate up to 6 simultaneous validator failures without network disruption. However, correlated failures affecting 7 or more validators - such as a widespread infrastructure provider outage or a coordinated attack - could cause the network to halt or degrade.
5.4 Third-Party Service Dependencies
The JIL Sovereign platform depends on third-party infrastructure and services, including cloud hosting providers (GCP, Hetzner), DNS services (Cloudflare), hardware security modules, external blockchain networks (Ethereum, Solana), KYC/AML providers, and fiat on/off-ramp partners. Outages, security incidents, policy changes, or discontinuation of any third-party service could affect the availability, performance, or security of the JIL Sovereign platform. JIL Sovereign does not control and cannot guarantee the reliability of third-party services.
5.5 Human Error
Despite established operational procedures, automated safeguards, and SentinelAI monitoring, human error in system administration, code deployment, configuration management, or operational decision-making could result in service disruptions, data loss, or security incidents. No operational framework can entirely eliminate the risk of human error.
6. Custody and Self-Custody Risks
6.1 User Responsibility for Key Shards
JIL Sovereign operates a non-custodial MPC 2-of-3 model in which users hold one of three key shards required for transaction signing. This design ensures that users retain direct control over their assets - but it also places a critical security responsibility on the user. If you lose, destroy, or fail to properly secure your key shard, and if available recovery mechanisms (including social recovery and guardian attestation) are also unavailable, your digital assets may become permanently and irretrievably inaccessible. JIL Sovereign cannot recover, reconstruct, or replace a lost user key shard.
6.2 Loss of Access
Loss of access to your key shard, authentication credentials, registered devices, or recovery contacts may result in the permanent loss of your digital assets. Blockchain transactions are final and irreversible once confirmed. If digital assets are sent to an incorrect address, or if an unauthorized party gains access to your signing credentials, those assets cannot be recovered or reversed by JIL Sovereign or by any third party.
6.3 Wallet Protection Coverage
Eligible Premium-tier accounts include wallet protection coverage of up to $250,000 per qualifying incident. This coverage is provided by private third-party underwriters and is subject to the terms, conditions, exclusions, and limitations of the applicable protection coverage agreement. Coverage does not extend to all scenarios - it specifically does not cover losses attributable to user error, negligence, unauthorized sharing of credentials, market volatility, regulatory actions, sanctions compliance events, or force majeure events. Coverage availability, limits, and terms are determined by our underwriting partners and may change at any time without notice.
6.4 Protection Coverage Is Not Government Insurance
Wallet protection coverage is not equivalent to FDIC insurance, SIPC protection, or any government-backed deposit guarantee program. Claims are subject to investigation, verification, and approval by the underwriter. There is no guarantee that any particular claim will be approved or paid. Aggregate policy limits may be exhausted in the event of a systemic incident affecting multiple accounts simultaneously.
7. Cross-Border Settlement Risks
7.1 Foreign Exchange Risks
Cross-border settlement transactions may involve multiple currencies and are subject to foreign exchange rate fluctuations. Exchange rates between fiat currencies and digital assets can change rapidly and unpredictably. Users who settle transactions denominated in a currency other than their home currency bear the risk of adverse exchange rate movements between the time a transaction is initiated and the time it is finalized.
7.2 Jurisdictional Conflicts
Transactions that cross national borders may be subject to conflicting legal requirements, regulatory standards, or enforcement priorities in different jurisdictions. A transaction that is lawful in one jurisdiction may violate the laws of another. JIL Sovereign cannot provide legal advice regarding the legality of cross-border transactions in your specific circumstances. Users are solely responsible for ensuring that their use of the platform complies with all applicable laws in every relevant jurisdiction.
7.3 Sanctions Compliance
JIL Sovereign is committed to compliance with applicable international sanctions regimes, including those administered by the U.S. Office of Foreign Assets Control (OFAC), the European Union, the United Nations, and other relevant authorities. Transactions involving sanctioned persons, entities, regions, or jurisdictions may be blocked, delayed, or reversed. Changes in sanctions designations may affect users without prior notice. Users are responsible for ensuring that their activities do not violate applicable sanctions laws.
7.4 Correspondent Banking Dependencies
Fiat on-ramp and off-ramp services may depend on correspondent banking relationships and traditional payment infrastructure. These relationships are subject to the policies, risk appetite, and regulatory obligations of participating financial institutions. Banks may decline to process transactions related to digital assets, terminate correspondent banking relationships, or impose additional compliance requirements that could delay or prevent fiat settlement.
8. Cybersecurity Risks
8.1 Hacking and Exploitation
The JIL Sovereign platform, its infrastructure, smart contracts, and user accounts are potential targets for sophisticated cyberattacks. These include, but are not limited to, distributed denial-of-service (DDoS) attacks, zero-day exploits, supply chain attacks, man-in-the-middle attacks, and protocol-level exploits. Despite layered security architecture, intrusion detection systems, and active monitoring, no system connected to the internet can be guaranteed to be impervious to attack.
8.2 Phishing and Social Engineering
Attackers may attempt to compromise user accounts through phishing emails, fraudulent websites that impersonate JIL Sovereign, social media impersonation, SIM-swapping attacks, or other social engineering techniques. JIL Sovereign will never ask for your private key shards, passwords, seed phrases, or authentication codes via email, social media, or unsolicited communications. Users should exercise extreme caution and verify the authenticity of all communications purporting to be from JIL Sovereign.
8.3 DDoS and Network Attacks
Distributed denial-of-service attacks targeting the JIL Sovereign platform, individual validator nodes, or supporting infrastructure could cause temporary service disruptions, degraded performance, or temporary inability to process transactions. While DDoS mitigation measures are in place, sufficiently large or sophisticated attacks may temporarily overwhelm defensive capabilities.
8.4 Insider Threats
JIL Sovereign mitigates insider threats through zone-based isolation, least-privilege access controls, multi-party authorization for sensitive operations, and continuous SentinelAI monitoring of validator fleet behavior. However, no access control framework can entirely eliminate the risk that a trusted insider could misuse their access to cause harm, exfiltrate data, or compromise system integrity. The 14-of-20 multi-signature requirement for bridge operations ensures that no single validator operator can unilaterally authorize asset transfers.
9. Token-Specific Risks
9.1 Utility Token Classification
JIL tokens are utility tokens designed to facilitate network functionality within the JIL Sovereign ecosystem. They provide access to settlement services, validator staking, governance participation, and ecosystem services. JIL tokens are not securities, investment contracts, or financial instruments. They do not represent ownership in any entity, do not pay dividends or interest, and do not entitle holders to any share of profits or revenues. Acquiring JIL tokens should not be undertaken with the expectation of profit derived from the efforts of JIL Sovereign or any third party.
9.2 Network Adoption Dependency
The utility and functionality of JIL tokens are directly tied to the adoption, growth, and continued operation of the JIL Sovereign network. If the network fails to achieve sufficient adoption among institutional users, validators, developers, and ecosystem participants, the utility of JIL tokens may be limited or diminished. Network effects are critical to the value proposition - a network with insufficient participation may not provide meaningful settlement, governance, or ecosystem utility.
9.3 Token Supply Mechanics
The JIL token has a fixed total supply of 10 billion (10,000,000,000) tokens. The supply is distributed across five treasury vaults (Validator Incentives - 1B, Protocol Treasury - 3B, Operations - 2B, Ecosystem Fund - 1B, Strategic Reserve - 0.5B), with the remaining allocation designated for public distribution, founders vesting, and ecosystem development. Token releases from treasury vaults, vesting schedule unlocks, and ecosystem distribution events may increase the circulating supply over time, which could affect token price and liquidity dynamics.
9.4 Legacy Token Swap Deadlines
Holders of deprecated JIL token versions (v1 and v2) may swap their tokens for the current JIL token (contract 0x9347efffa3e8985e0d35536b408cab48599971e8) via the designated swap contracts at a 1:1 ratio. The swap deadline is May 1, 2026. After the deadline, swap contracts may be deactivated and unswapped legacy tokens may become permanently non-exchangeable. JIL Sovereign is under no obligation to extend swap deadlines or provide alternative migration paths after the stated deadline. Users holding legacy tokens should review the Token Swap page for instructions.
10. Third-Party Risks
10.1 Ethereum Network Dependency
The JIL ERC-20 token contract, JILTreasury contract, and JILTokenSwap contracts are deployed on the Ethereum mainnet. The functionality of these contracts depends on the continued operation, security, and performance of the Ethereum network. Ethereum network congestion, gas price spikes, consensus failures, hard forks, or protocol changes could affect the ability to interact with JIL token contracts, execute swaps, or access treasury functions. JIL Sovereign does not control and cannot guarantee the availability or performance of the Ethereum network.
10.2 Protection Coverage Underwriters
Wallet protection coverage is provided by third-party underwriting partners. The financial strength, claims-paying ability, and continued willingness of underwriters to provide coverage are outside of JIL Sovereign's control. Underwriters may modify coverage terms, increase premiums, reduce limits, add exclusions, or discontinue coverage at any time. The insolvency or inability of an underwriter to pay claims would directly affect the availability of protection coverage for platform users.
10.3 Validator Operators
The JIL settlement network is operated by independent validator nodes distributed across 13 jurisdictions. While JIL Sovereign establishes operational standards, monitors validator performance via SentinelAI, and enforces compliance through the Fleet Inspector, individual validator operators are independent entities. Their operational practices, security measures, and compliance with local laws are ultimately their own responsibility. The failure, misconduct, or regulatory non-compliance of individual validator operators could affect network performance and security.
10.4 Infrastructure Providers
JIL Sovereign relies on infrastructure providers including Hetzner (validator hosting, portal hosting, object storage), Cloudflare (CDN, DDoS mitigation, DNS), and others. These providers operate under their own terms of service and may experience outages, modify their services, change pricing, or terminate service relationships. A significant disruption at a major infrastructure provider could affect the availability of the JIL Sovereign platform or validator network. JIL Sovereign mitigates provider concentration risk through geographic distribution, but cannot eliminate it entirely.
11. Force Majeure
JIL Sovereign shall not be liable for any failure or delay in performing its obligations where such failure or delay results from circumstances beyond its reasonable control. Force majeure events include, but are not limited to: natural disasters (earthquakes, floods, hurricanes, volcanic eruptions), pandemics or epidemics, armed conflicts or acts of terrorism, civil unrest or insurrection, government actions (including sanctions, embargoes, asset freezes, executive orders, or legislative changes), power grid failures, internet infrastructure outages, catastrophic hardware failures, acts of cyberwarfare, and any other events of similar nature that are unforeseeable or, if foreseeable, unavoidable.
In the event of a force majeure occurrence, JIL Sovereign will use commercially reasonable efforts to resume normal operations as soon as practicable. However, no assurance can be given regarding the timeline for restoration of services, the recovery of assets, or the resumption of normal platform operations following a force majeure event. Users acknowledge that digital assets held on or transacted through the platform may be at risk during force majeure events, and that JIL Sovereign's liability in such circumstances is limited as set forth in the Terms of Service.
12. No Guarantees
JIL Sovereign does not guarantee any particular transaction outcome, settlement speed, or system availability. While the JIL settlement protocol is designed to achieve deterministic finality - meaning that confirmed transactions are intended to be irreversible and final - deterministic finality is a design objective, not an absolute guarantee against all conceivable failure modes. Extreme circumstances, including but not limited to consensus failures, bridge exploits, smart contract vulnerabilities, or systemic infrastructure failures, could theoretically affect the finality of transactions.
Wallet protection coverage is provided subject to the terms and conditions of the applicable underwriting agreement. JIL Sovereign does not guarantee that any claim will be approved or paid. Coverage is limited to qualifying losses arising from platform infrastructure failures and is subject to per-incident and aggregate policy limits, exclusions, deductibles, and underwriter approval. Protection coverage does not constitute a guarantee against loss.
All services, software, documentation, and information provided by JIL Sovereign are offered on an "as is" and "as available" basis, without warranties of any kind, whether express, implied, or statutory, including but not limited to warranties of merchantability, fitness for a particular purpose, non-infringement, accuracy, or completeness.
13. Acknowledgment
By accessing or using the JIL Sovereign platform, acquiring or holding JIL tokens, participating in the JIL ecosystem, or using any services provided by JIL Sovereign Technologies, Inc., you acknowledge and confirm that:
- You have read, understood, and accepted the risks described in these Disclosures in their entirety;
- You understand that digital assets - including JIL tokens - are subject to significant risk of loss, up to and including the total loss of all assets;
- You are acquiring and/or using JIL tokens for their intended utility purposes within the JIL Sovereign ecosystem, and not as an investment, security, or financial instrument, nor with the expectation of profit derived from the efforts of others;
- You have not relied on any statement, representation, or communication by JIL Sovereign as financial, investment, legal, or tax advice;
- You have the financial resources, knowledge, and risk tolerance to bear the risks described herein;
- You accept sole responsibility for the security and safekeeping of your key shard, authentication credentials, and recovery mechanisms;
- You will comply with all applicable laws and regulations in your jurisdiction;
- You acknowledge that these Disclosures may be updated from time to time and that your continued use of the platform constitutes acceptance of any such updates.
JIL Sovereign Technologies, Inc.
Email: contact@jilsovereign.com
Wilmington, Delaware (Incorporated Headquarters)
Hubs: Texas · Switzerland · UAE · Singapore