Zelentio Exchange
Loading live prices...
โ† Policy Center

Features

ZELENCIO CODE (ENCRYPTED VOUCHERS)

Last updated: April 23, 2026

๐Ÿ”Š Listen to this policy
Press play to listen to this policy...
0:00 โ€”

ON-CHAIN DEPOSIT PROTOCOL


1. Functional Definition and Scope

The Zelencio On-Chain Deposit feature serves as the primary gateway for the migration of digital assets from decentralized blockchain networks into the Zelencio custodial ecosystem. This protocol allows verified users to generate unique, platform-hosted blockchain addresses for the purpose of receiving supported cryptocurrencies from external wallets, third-party exchanges, or decentralized finance (DeFi) protocols.

Upon successful confirmation on the underlying blockchain, the deposited assets are credited to the userโ€™s "Crypto Account" on the Zelencio internal ledger, enabling subsequent trading, swapping, and internal transfer activities.

2. Technical Execution and Address Generation

2.1. Unique Address Allocation:
Zelencio utilizes a proprietary address-generation engine that assigns a distinct, one-of-a-kind public key (wallet address) to each user for every supported asset. To ensure maximum security and auditability, these addresses are never shared between multiple users. Once an address is generated, it is permanently linked to the userโ€™s Zelencio Identity Number (ZIN).

2.2. Custodial Architecture:
Zelencio operates a high-security custodial model. While users are provided with a public address for deposits, the private keys associated with these addresses are managed by Zelencio using multi-layer cold storage and Hardware Security Modules (HSMs). This architecture protects user funds from the risks associated with personal private key management while maintaining instant liquidity within the platform.

3. Network and Asset Compatibility Policy

3.1. Mainnet and Layer-2 Verification:
Zelencio currently supports several prominent blockchain networks, including but not limited to: Bitcoin (BTC), Ethereum (ERC-20), BNB Smart Chain (BEP-20), Tron (TRC-20), Solana, Polygon, and TON.

3.2. Mandatory Network Matching:
It is the user's absolute responsibility to ensure that the asset being sent matches the selected network within the Zelencio interface.

  • Example: Sending USDT via the ERC-20 network to a Zelencio BEP-20 address will result in the permanent and irretrievable loss of funds.

  • Notice of Non-Liability: Zelencio does not possess the technical ability to "undo" or "reverse" cross-chain errors. Users are prompted via a mandatory "Notice Dialog" to reconfirm the network selection before the deposit address is revealed.

4. Deposit Limits and KYC Tiering

Deposit capabilities are governed by the userโ€™s Identity Verification (KYC) level. Zelencio implements these limits to prevent platform abuse and ensure compliance with global Anti-Money Laundering (AML) standards:

  • KYC Tier 1: Authorized for deposits up to an equivalent value of $10,000 USD daily.

  • KYC Tier 2: Authorized for deposits up to an equivalent value of $50,000 USD daily.

  • KYC Tier 3: Authorized for institutional or high-volume deposits up to $50,000,000 USD daily.

Any deposit exceeding these thresholds may be held in a "Security Crypto Account" until the user provides the necessary "Proof of Funds" to upgrade their KYC status.

5. Confirmation and Settlement Protocol

5.1. Blockchain Confirmations:
Deposits are not credited to the userโ€™s available balance until they reach a pre-defined number of "Confirmations" on the relevant blockchain. The number of required confirmations varies by network (e.g., 2 confirmations for BTC, 15 for Ethereum) to mitigate the risk of "Double-Spend" attacks or "Chain Reorganizations."

5.2. Minimum Deposit Threshold:
Zelencio sets a minimum deposit amount for each asset (e.g., 0.00005 BTC). Deposits below this threshold will not be processed by the internal ledger and will not be credited to the userโ€™s account. These "dust" deposits are considered non-recoverable.

6. Fee and Pricing Transparency

6.1. Platform Zero-Fee Policy:
Zelencio does not charge users a fee for incoming on-chain deposits. 100% of the asset amount received at the blockchain address (after any sender-side or network gas fees) will be credited to the userโ€™s account.

6.2. External Costs:
Users acknowledge that the sending platform or personal wallet used to initiate the deposit may charge "Gas Fees" or "Withdrawal Fees." Zelencio has no control over these external costs.

7. Security and Anti-Fraud (AML/CFT)

7.1. Dirty Crypto and Flagged Wallets:
Zelencio utilizes real-time blockchain analytics to scan all incoming deposits. Assets originating from "Flagged" sources (e.g., mixers, darknet markets, or sanctioned addresses) will be automatically frozen in the "Security Crypto Account."

7.2. Investigation Rights:
Zelencio reserves the right to request additional information regarding the origin of any deposit. Failure to comply with an AML inquiry will result in the permanent suspension of the account and the potential reporting of the event to regional financial authorities (e.g., the SEC or EFCC in Nigeria).

8. Risk Disclosure and Legal Disclaimer

8.1. Technical Finality:
Blockchain transactions are immutable. Zelencio cannot retrieve assets sent to the wrong address, assets sent via an unsupported network, or assets sent while the userโ€™s device is compromised by malware.

8.2. Market Volatility:
The value of a deposit may fluctuate significantly between the time of initiation and the time of successful confirmation. Zelencio is not liable for any decrease in fiat-equivalent value during the confirmation period.

8.3. Third-Party Delays:
Zelencio is not responsible for delays caused by network congestion, blockchain forks, or technical failures within the userโ€™s external sending platform.


INTERNAL DEPOSIT & TRANSFER PROTOCOL


1. Functional Definition and Ecosystem Scope

The Zelencio Internal Deposit and Transfer system is a high-speed, proprietary protocol designed to facilitate the seamless movement of digital assets between verified accounts within the Zelencio ecosystem. Unlike "On-Chain" transactions which occur on public blockchains, internal transfers are executed on the Zelencio Internal Ledger.

This feature is categorized as a "Social Finance" utility, allowing users to send and receive crypto-assets near-instantly without the latency or "Gas Fees" associated with traditional blockchain networks.

2. Identification Framework (The ZIN Protocol)

To ensure precision and user privacy, Zelencio utilizes a multi-identifier approach for internal deposits. Users may initiate a transfer using any of the following verified data points:

  • 2.1. Zelencio Identity Number (ZIN): A unique, platform-generated numeric identifier that allows users to receive funds without disclosing their personal contact information.

  • 2.2. Verified Email/Phone: Assets can be routed directly to the email address or mobile number associated with a recipient's verified account.

  • 2.3. Usernames: Branded "Handshake" identifiers (e.g., @sixtus) allow for human-readable transaction routing.

  • 2.4. Personal QR Codes: A machine-readable format of the userโ€™s ZIN, enabling "Scan-to-Pay" functionality.

3. Privacy and The "Zelencio Card" Interface

3.1. Branded Asset Cards:
The Internal Deposit interface features the "Zelencio Card," a professional UI component that displays the user's receiving credentials in a secure format.
3.2. Data Masking and Privacy Toggles:
In compliance with global data privacy standards (including Nigeriaโ€™s NDPR), the platform provides a "Privacy Toggle." When activated, sensitive data such as the userโ€™s full email address and phone number are masked (e.g., s8@gl.com), leaving only the ZIN and QR code visible for public sharing. This prevents "doxing" and unauthorized data harvesting by third parties.

4. Mandatory Security Gating and Anti-Fraud Checks

4.1. The "Verify-Before-Send" Protocol:
Before any internal transfer is finalized, the Zelencio matching engine performs a real-time database query to pull the recipientโ€™s Profile Avatar, Verified Username, and Approximate Geolocation.

  • Purpose: This serves as a critical anti-fraud barrier. By displaying these details to the sender, the platform mitigates the risk of assets being sent to the "Wrong User" due to a typo.
    4.2. Request Blocking Utility:
    To prevent "Solicitation Spam" and fraudulent "Request for Funds" scams, every user has access to a "Block Request" toggle in their Security Settings. When enabled, the account becomes "Invisible" to incoming requests, and any attempt by another user to "Request Money" will be automatically rejected by the platformโ€™s API.

5. Regulatory Compliance and the "Travel Rule"

5.1. Non-Anonymity to the Platform:
While internal transfers may appear "private" between users, they are 100% traceable by Zelencio. Every internal movement of value is logged with the Unique Identifier (UID) of both the Sender and the Receiver.
5.2. Travel Rule Adherence:
In accordance with FATF standards, Zelencio maintains a permanent record of the "Originator" and "Beneficiary" information for every internal ledger update. This ensures that the platform can provide comprehensive audit trails to regulatory bodies (such as the SEC or CBN) during a legal investigation.
5.3. Mandatory KYC:
The Internal Deposit and Withdrawal features are Strictly Prohibited for unverified users. Both the sender and the receiver must maintain at least a Tier 1 KYC status. Any attempt to bypass this via the API will result in a "403 Forbidden" error and an automatic account flag.

6. Operational Limits and Tiered Access

Internal transfers are subject to strict "Anti-Abuse" limits to prevent the platform from being used for high-frequency unlicensed currency exchange:

  • Transaction Limit: A standard daily limit of $20,000 USD equivalent applies to all internal transfers for Tier 2 users.

  • Spam Prevention: Users are limited to a maximum of five (5) "Request for Funds" notifications per 24-hour period.

  • Asset Locking: Funds sent via internal transfer are debited from the sender's balance and credited to the receiver's "Crypto Account" or "Zelencio Crypto Account" instantly, depending on the sender's selection.

7. Fee Policy and Economic Logic

7.1. Zero-Fee Ecosystem:
To encourage growth within the Zelencio network, internal transfers are currently offered at 0% Service Fees.
7.2. Logic of Value:
Because internal transfers do not interact with the public blockchain, no "Network Fee" or "Gas" is required. 100% of the sent amount is received by the beneficiary. Zelencio reserves the right to implement a nominal "Ledger Processing Fee" for high-frequency commercial users in the future.

8. Technical Finality and Limitation of Liability

8.1. Irreversibility:
Users acknowledge that internal ledger updates are instantaneous. Once a user enters their 5-digit PIN and 6-digit Google 2FA code and confirms the "Slide to Trade," the transaction is final. Zelencio cannot "claw back" or reverse a transfer sent to a friend or a P2P partner by mistake.
8.2. User-to-User Disputes:
In cases of "Social Engineering" (e.g., a user is tricked into sending funds internally), Zelencio will provide the necessary logs to law enforcement but is not financially liable for the loss. Users are warned via a "Confirm Transaction" modal that they are solely responsible for verifying the counterparty's identity.


ZELENCIO CODE (ENCRYPTED VOUCHERS)


1. Functional Definition and System Architecture

The Zelencio Code system is a proprietary, high-security internal transfer protocol that utilizes encrypted voucher logic to move digital assets between verified accounts within the Zelencio ecosystem. This feature allows for the "decoupling" of asset movement from personal metadata, enabling users to facilitate transactions without the direct exchange of wallet addresses, emails, or phone numbers.

Technically, a Zelencio Code is a unique, one-time-use cryptographic string (20-to-25 alpha-numeric characters) that represents a specific value of a digital asset held on the Zelencio Internal Ledger.

2. Generation and Encryption Protocol

2.1. The Creation Cycle:
A verified user (the "Creator") initiates the process by selecting a supported digital asset and entering an amount within the platformโ€™s established limits. Upon authorization via multi-factor authentication, the Zelencio matching engine "locks" the principal amount from the Creator's available balance and generates the encrypted code.

2.2. The Zelencio Voucher Card:
The output of this process is the "Zelencio Card"โ€”a high-resolution, branded digital image containing a machine-readable QR code and the raw alphanumeric string. This card is designed for secure peer-to-peer sharing and includes a timestamp and the Zelencio corporate watermark to ensure authenticity.

3. Redemption and Settlement Logic

3.1. Instant Settlement:
Redemption is near-instant. When a recipient (the "Claimer") scans the QR code or enters the string into the "Redeem" interface, the platform verifies the code's validity against the internal ledger. If the code is active, the assets are moved immediately from the platform's escrow-holding account to the Claimerโ€™s Zelencio Crypto Account.

3.2. One-Time Validity:
Every Zelencio Code is a "Single-Use" instrument. Once a code has been successfully redeemed by a verified UID, the string is invalidated across the global ledger and cannot be reused or reactivated under any circumstances.

4. Anti-Money Laundering (AML) and "Travel Rule" Compliance

4.1. The Traceability Mandate:
While Zelencio Codes provide privacy at the User Interface (UI) level (meaning the Creator and Claimer do not see each other's personal data), the protocol is not anonymous at the Platform Level.

  • Logging: Every generated code is permanently linked to the Creatorโ€™s Unique Identifier (UID) and KYC profile.

  • Redemption Logging: Upon redemption, the system logs the Claimerโ€™s UID and IP address.

  • Audit Trail: This creates a 100% transparent audit trail that complies with the FATF Travel Rule, allowing Zelencio to provide full transaction maps to authorized financial regulators (e.g., Nigerian SEC or EFCC) if illegal activity is suspected.

4.2. Mandatory KYC Gating:
The use of the Zelencio Code system is strictly restricted to users who have completed Tier 1 Identity Verification or higher. Unverified users are technically barred from both generating and redeeming codes.

5. Fee Structure and Economic Finality

5.1. Non-Refundable Service Fee:
The generation of an encrypted Zelencio Code is a premium technical service. A service fee (typically 3.6% or as displayed on the confirmation screen) is applied at the moment of creation.

  • Deduction Policy: The fee is deducted from the Creator's balance in addition to the principal amount.

  • No Refunding of Fees: You acknowledge and agree that service fees are final and non-refundable upon the generation of the code. Even if a code is cancelled by the Creator before redemption, the technical fee for the generation and encryption service remains the property of the Platform.

5.2. Cancellation and Principal Recovery:
Creators may cancel an unredeemed code via the "Voucher History" tab. In the event of a cancellation, the principal asset amount will be returned to the Creator's balance, but the technical service fee will not be credited back.

6. Operational Limits and Anti-Abuse Policies

To prevent the system from being utilized for high-frequency unlicensed currency exchange or "Structuring" of funds, Zelencio enforces the following limits:

  • Daily Frequency: Users are limited to generating a maximum of five (5) codes per 24-hour period.

  • Value Thresholds: Codes must be created for a minimum value of

            15USDโˆ—โˆ—andamaximumvalueofโˆ—โˆ—15 USD** and a maximum value of **
          
    20,000 USD
    equivalent.

  • Automatic Expiration: Codes that remain unredeemed for a period exceeding 180 days may be automatically cancelled by the system, with the principal amount returned to the Creator's wallet.

7. Security Protocols: PIN and G2FA

To ensure that codes are not generated by unauthorized third parties, Zelencio implements a "Triple-Lock" security verification for every generation:

  1. Session Authorization: The user must be logged in on an "Authorized Device."

  2. Internal App PIN: The user must input their unique 5-digit security PIN.

  3. Google Authenticator (2FA): The user must provide a time-sensitive 6-digit 2FA code.

  • Note: If a user loses their phone or provides their code to a scammer, Zelencio is not responsible for the resulting loss of funds.

8. Prohibited Use Cases and Sanctions

Zelencio monitors all code-related activity 24/7. Any user found utilizing the voucher system for the following will face an immediate permanent ban:

  • Commercial Reselling: Operating a "Voucher Exchange" or reselling codes for profit without a Bureau de Change license.

  • Illicit Payments: Using codes to pay for illegal goods or services on third-party platforms (Darknet, etc.).

  • Mixer Activity: Rapidly generating and redeeming codes between secondary accounts to obscure the source of funds (Smurfing).

9. Risk Disclosure and Limitation of Liability

9.1. Sharing Risk:
You are solely responsible for the safe distribution of your Zelencio Code. Anyone who possesses the code or the QR image can redeem the funds. Zelencio will never ask for your code via Support or Email.
9.2. No Intermediation:
Zelencio acts only as the technology provider. We do not participate in, or guarantee the outcome of, any "Off-Platform" deal where a code is used as payment.
9.3. Market Volatility:
The fiat-equivalent value of the assets locked in a code may fluctuate between the time of generation and redemption. Zelencio is not liable for changes in the purchasing power of the assets while they are held in voucher format.


REFERRAL AND REWARDS ECOSYSTEM


1. Functional Definition and Program Objective

The Zelencio Referral and Rewards system is a multi-dimensional incentive framework designed to facilitate platform growth, user retention, and community engagement. The program rewards users for two primary behaviors:

  1. Network Expansion: Inviting new, verified users to the platform (Referral Program).

  2. Operational Activity: Completing specific trading, deposit, and engagement milestones (Daily Tasks and Trade-and-Earn).

All rewards are issued as promotional credits (internal app tokens) which can be converted into stable digital assets (USDC) upon meeting specific eligibility criteria.

2. Tiered Referral Commission Structure

Zelencio operates a transparent, one-level deep referral hierarchy. To ensure a professional and sustainable ecosystem, commissions are based on a tiered "Incentive Rate":

  • 2.1. Level 1 (Bronze): New users begin with a 20% commission rate on the trading fees generated by their direct referees.

  • 2.2. Level 2 (Silver): Upon successfully inviting 5 verified referees, the userโ€™s commission rate increases to 25%.

  • 2.3. Level 3 (Gold): Upon reaching 100 verified referees, the user achieves the professional tier with a 30% commission rate.

  • 2.4. Maximum Potential: High-performing partners can earn a combined total of over 1,720 USDC through cumulative milestone bonuses. Note: These amounts are potential ceilings and are not guaranteed fixed returns.

3. "Daily Tasks" and "Trade-and-Earn" Milestones

The platform features a gamified engagement module that rewards users for daily technical interactions:

  • 3.1. Daily Check-in: Small rewards are granted for consecutive days of app usage, promoting long-term user retention.

  • 3.2. Trading Volume Milestones: Users receive incremental rewards for reaching specific spot trading volumes (e.g., $100, $1,000, or $10,000 daily).

  • 3.3. P2P/C2C Activity: Rewards are issued to active marketplace participants who complete a high frequency of successful orders (e.g., completing 50 or 100 trades).

  • 3.4. Deposit Incentives: Promotional bonuses are available for users who fund their accounts with specific minimum amounts (e.g., a $10 bonus for a $100 deposit).

4. Reward Conversion and Withdrawal Logic

4.1. Internal Points (GBRT):
Initial rewards are credited to the user's "Earn Account" in the form of internal platform points (GBRT). These points serve as a secondary ledger to separate promotional credits from primary user-deposited capital.
4.2. Conversion to USDC:
Once a user accumulates a minimum threshold (e.g., 5,000 coins), they may initiate a "Withdraw to USDC" action. This process converts the internal points into USDC stablecoins at a pre-defined rate, moving the value into the user's "Crypto Account" for standard trading or withdrawal.
4.3. Finality:
Once rewards are converted to USDC and moved to the primary balance, they are treated as standard assets and are subject to the platform's standard withdrawal fees and security protocols (PIN/2FA).

5. Program Integrity and Anti-Fraud (Anti-Sybil) Policy

To prevent "Sybil Attacks" (creation of fake accounts to farm rewards), Zelencio enforces the following technical barriers:

  • 5.1. Mandatory KYC: No referral bonus or task reward can be claimed, converted, or withdrawn unless both the Invitor and the Referee have successfully passed Tier 1 Identity Verification.

  • 5.2. Unique Identity Check: Rewards are restricted to one (1) reward per physical person. Zelencio utilizes hardware fingerprinting, IP monitoring, and "Authorized Device" logs to detect and disqualify self-referral attempts.

  • 5.3. Wash Trading Prohibition: Any trading volume generated through "Wash Trading" (buying and selling the same asset to yourself to hit volume targets) will be automatically flagged by the AI monitoring system, resulting in the forfeiture of all associated rewards.

6. Transparency and Leaderboards

6.1. Real-Time Tracking:
The "Invite Friends" dashboard provides users with an itemized history of their referees, showing the registration date and current verification status of each invitee.
6.2. Public Ranking:
Top earners are featured on a Leaderboard. In compliance with privacy regulations, users may opt-out of the public ranking through their General Settings to hide their username and profile picture from other participants.

7. Disclaimers and Limitation of Liability

  • 7.1. Promotional Nature: The Referral and Rewards program is a discretionary marketing incentive provided by Zelencio. It does not constitute a "Financial Product" or "Investment Contract."

  • 7.2. Modification Rights: Zelencio reserves the absolute right to modify reward amounts, change conversion rates, or terminate the program at any time without prior notice.

  • 7.3. No Guaranteed Income: The program is designed for community engagement. Zelencio makes no representation that participation will result in consistent or guaranteed financial income.

  • 7.4. Tax Responsibility: Users are solely responsible for reporting any income derived from Zelencio rewards to their local tax authorities.

8. Prohibited Promotion Methods

Users are strictly prohibited from:

  • Using spam or unsolicited emails to share referral links.

  • Purchasing fake traffic or paying users to sign up.

  • Representing the referral program as an "Investment Scheme" or "Ponzi Structure."

  • Using the Zelencio brand in a way that suggests a formal employment relationship or "Partnership" beyond the standard user agreement.


CRYPTO GIFT & MASS DISTRIBUTION PROTOCOL

1. Functional Definition and Promotional Scope

The Zelencio Crypto Gift feature is a proprietary mass-distribution protocol designed to facilitate community engagement, peer-to-peer gifting, and corporate promotions. The system allows a verified user (the "Creator") to distribute a specific volume of digital assets to a group of recipients (the "Claimers") simultaneously through a secure, passcode-protected interface.

This feature is strictly intended for personal gifting and marketing incentives. Any use of this protocol for commercial settlement or unlicensed money transmission is a violation of the Zelencio User Agreement.

2. Distribution Models and Algorithmic Logic

Zelencio provides two distinct algorithmic models for asset distribution, managed by the Zacuz Intelligent Bot (ZIB):

  • 2.1. Equal Amount Distribution:
    The principal amount is divided equally among all participants. (e.g., A gift of 1,000 USDT for 100 participants results in exactly 10 USDT per Claimer).

  • 2.2. Random Amount Distribution:
    ZIB utilizes a randomized weighting algorithm to distribute the principal amount. While the total sum remains fixed, individual participants receive varying amounts.

    • Regulatory Transparency: Zelencio provides this feature for "surprise and delight" marketing purposes. Claiming is 100% free for all participants; there is no "buy-in" or entry fee, ensuring the feature is classified as a "Promotional Giveaway" and not "Gambling" or a "Lottery."

3. Participation Gating and Requirements

Creators have the technical ability to enforce specific "Participation Requirements" to ensure their gifts reach the intended audience:

  • No Requirements: Accessible to any KYC-verified Zelencio user with the passcode.

  • Referees Only: Restricted to users who registered using the Creatorโ€™s unique referral link.

  • New Users Only: Restricted to accounts created within a specific timeframe (e.g., the last 7 days) to incentivize new platform adoption.

4. Mandatory AML and Traceability Protocols

To comply with global financial security standards, Zelencio enforces "Hard Traceability" on every gift created:

  • 4.1. Purpose of Gift Requirement:
    Creators are required to state the "Purpose of Gift" (e.g., "Marketing Reward," "Wedding Gift," "Community Airdrop"). This data is logged permanently in the Zelencio ledger.

  • 4.2. Transaction Identity Mapping:
    Every Crypto Gift is linked to the Unique Identifier (UID) of the Creator. Upon claiming, the system logs the UID and IP address of the Claimer.

  • 4.3. Anti-Abuse Monitoring:
    The system monitors for "Mule Activity" (e.g., a single individual creating dozens of gifts to themselves to obscure the origin of funds). Detected abuse results in immediate account suspension and the freezing of all associated assets.

5. Financial Architecture and Expiration

  • 5.1. Asset Locking:
    Upon creation, the total gift amount plus the service fee is immediately debited from the Creator's Zelencio Crypto Account and moved to the platform's secure giveaway escrow.

  • 5.2. Non-Refundable Service Fees:
    A service fee (typically 3.9%) is charged for the technical management, encryption, and distribution service. Service fees are final and non-refundable at the moment of gift creation, regardless of whether the gift is claimed.

  • 5.3. The 14-Day Expiration Rule:
    Crypto Gifts remain active for a maximum of fourteen (14) days. Any balance remaining unclaimed after this period is automatically returned to the Creator's Zelencio Crypto Account.

6. Operational Limits

To prevent platform stress and mitigate the risk of large-scale structuring, the following limits apply:

  • Participant Limit: Gifts may be shared with a minimum of 2 and a maximum of 100 participants.

  • Value Thresholds: Creation is limited to a minimum of

            20USDโˆ—โˆ—andamaximumofโˆ—โˆ—20 USD** and a maximum of **
          
    20,000 USD
    equivalent per gift.

  • Daily Creation Limit: Users are restricted to generating a maximum of five (5) gift codes per 24-hour cycle.

7. Security Verification

Asset security is maintained via the Zelencio "Triple-Verification" stack. To generate a gift code, the Creator must:

  1. Verify the transaction details in a "Confirm Transaction" modal.

  2. Input their unique 5-digit App PIN.

  3. Provide a time-sensitive 6-digit Google Authenticator (2FA) code.

8. Legal Disclaimer and Risk Warning

8.1. Irreversibility:
Once a Crypto Gift code is shared, any user with the passcode who meets the participation requirements may claim the funds. Zelencio cannot reverse a claim or "cancel" a code once it has been broadcast by the Creator.
8.2. Third-Party Claims:
Zelencio is not responsible for losses caused by the Creator sharing their passcode on public or insecure forums.
8.3. Compliance with Local Law:
Users are responsible for ensuring that mass-distributing assets via Zelencio does not violate the local gifting or promotional laws of their jurisdiction.

USER-TO-USER (U2U) P2P MARKETPLACE


1. Functional Definition and Market Role

The Zelencio U2U (User-to-User) / P2P (Peer-to-Peer) Marketplace is a decentralized trading venue hosted within the Zelencio infrastructure. This protocol enables verified users to negotiate and execute the exchange of digital assets (cryptocurrencies) directly with one another using local fiat currency methods (e.g., bank transfers, mobile money).

In these transactions, Zelencio acts solely as a Neutral Facilitator and Escrow Custodian of the digital assets. Zelencio is not a party to the fiat currency exchange and does not provide banking or traditional payment processing services.

2. The Escrow and Locking Protocol

To protect all parties from the risk of non-delivery, Zelencio enforces a mandatory "Hard-Lock" escrow protocol:

  • 2.1. Asset Sequestration: When a Sell Advertisement is posted or a Buy Order is initiated, the required volume of digital assets is immediately debited from the Sellerโ€™s available balance and moved to the "In-Use Balance".

  • 2.2. Custodial Security: These assets remain under the technical custody of the platform and cannot be withdrawn or traded by the Seller until the transaction is either successfully completed or cancelled via an official dispute resolution.

  • 2.3. Release Authority: Assets are only released to the Buyerโ€™s wallet upon the Sellerโ€™s explicit confirmation of receipt of fiat funds, or via an administrative override by the Zelencio Dispute Team in the case of a proven payment.

3. External Fiat Payment Disclaimer

3.1. Non-Integration with Banking Systems:
You acknowledge and agree that the fiat payment portion of a U2U trade occurs entirely outside the Zelencio platform. Zelencio does not have access to, nor does it track, verify, or monitor user bank accounts or mobile money ledgers.
3.2. Verification Responsibility:
It is the absolute and sole responsibility of the Seller to log in to their banking application and verify that "Cleared Funds" have been received before releasing the cryptocurrency. Zelencio is not liable for losses incurred if a Seller relies on a fraudulent "Proof of Payment" screenshot provided by a Buyer without verifying their actual bank balance.

4. Advanced Anti-Fraud and Third-Party Verification

To mitigate the risk of "Triangular Scams" and the use of stolen bank accounts, Zelencio implements the following safety moats:

  • 4.1. Name Matching Protocol: By default, users must use payment accounts that match the legal name verified in their Zelencio KYC profile.

  • 4.2. Third-Party Face Verification: If a user must use a third-party payment account (e.g., a family memberโ€™s bank account), Zelencio may enforce a Mandatory Live Face Capture specifically for that transaction. This ensures that the individual initiating the payment is the same individual authorized on the Zelencio account, creating a cryptographic link between the fiat payer and the crypto recipient.

  • 4.3. Block and Report Utility: Every marketplace interface includes a "Block User" and "Report" button. High-frequency reporting of a user will result in an automatic temporary suspension of their trading privileges pending human review.

5. Merchant Reputation and Public Metrics

The platform maintains a transparent "Trust Score" for every U2U participant to assist users in selecting reliable trading partners:

  • 5.1. 30-Day Completion Rate: The percentage of orders successfully finalized without a dispute.

  • 5.2. Average Release/Payment Time: Data-driven metrics showing how quickly a user typically completes their side of the trade.

  • 5.3. Reputation Score: A weighted calculation based on historical volume, longevity on the platform, and user reviews.

  • 5.4. Verification Badges: Users may earn "Trusted Responder" or "VIP" status based on consistent high-performance and passing advanced KYC (Tier 3).

6. Advertisement and Price Management

Users acting as "Merchants" have access to professional-grade advertisement tools:

  • 6.1. Price Configuration Models: Merchants can set prices based on Market Price (Standard), Market + Premium %, Market - Discount %, or a Custom Fixed Price.

  • 6.2. Order Limits: Merchants must set "Minimum" and "Maximum" order limits to manage their liquidity and prevents platform stress.

  • 6.3. Payment Windows: All trades are governed by a time-limit (e.g., 15 minutes). If a Buyer fails to click "I Have Paid" within this window, the order is automatically cancelled, and the crypto is returned to the Sellerโ€™s available balance.

7. Dispute Resolution and Human Moderation

In the event of a disagreement where the Buyer claims to have paid and the Seller claims not to have received funds:

  • 7.1. Opening a Dispute: Either party may initiate an "Order Dispute" after the payment window has expired.

  • 7.2. Admissible Evidence: Only records within the Zelencio Internal Chat (including uploaded receipts and communication logs) are admissible. Records from external apps (WhatsApp/Telegram) are strictly excluded from evidence.

  • 7.3. Moderator Authority: By using the U2U Marketplace, you irrevocably agree that the final decision of the Zelencio moderator regarding the release or refund of the escrowed crypto is Final and Legally Binding.

8. Prohibited Marketplace Conduct

The following actions will result in an immediate permanent ban and potential reporting to financial authorities:

  • Crypto-Slang in Bank References: Including words like "BTC," "Crypto," or "Zelencio" in bank transfer descriptions. This puts both parties at risk of bank account closure by central regulators.

  • Social Engineering: Attempting to trick users into releasing crypto before payment is confirmed.

  • Wash Trading: Coordinated activity between two accounts to artificially inflate a reputation score or success rate.

9. Risk Disclosure and Financial Negligence

9.1. Volatility Risk:
Digital asset prices may fluctuate significantly during the 15-minute trade window. The price agreed upon at the start of the trade is final, regardless of market movements during execution.
9.2. Limitation of Liability:
Zelencio is a technology provider. We are not liable for bank account freezes, reversals, or losses caused by user negligence, including the failure to verify bank balances or the selection of unreliable trading partners.


ON-CHAIN WITHDRAWAL PROTOCOL


1. Functional Definition and Technical Scope

The Zelencio On-Chain Withdrawal feature facilitates the secure migration of digital assets from the Zelencio custodial ecosystem to external, decentralized blockchain endpoints (e.g., personal hardware wallets, third-party exchanges, or smart contracts). This protocol executes a "Settlement Event" where the internal ledger balance is debited and a corresponding transaction is broadcasted to the public blockchain.

2. Mandatory Security Gating and Multi-Factor Authentication (MFA)

To ensure the absolute protection of user assets against unauthorized access or device compromise, Zelencio enforces a Sequential Security Stack for every outbound on-chain movement:

  • 2.1. Verified Session Requirement: Withdrawals can only be initiated from an "Authorized Device" recognized by the platformโ€™s security hardware fingerprinting system.

  • 2.2. The Primary Lock (App PIN): The user must successfully input their unique 5-digit security PIN to authorize the withdrawal interface.

  • 2.3. The Hard Lock (2FA): Every withdrawal requires the submission of a time-sensitive, 6-digit code from a linked Google Authenticator (2FA) app.

  • 2.4. Confirmation Notice: Prior to broadcasting, a final "Notice Modal" is displayed, requiring the user to reconfirm the recipient address and the specific network. By clicking "Slide to Confirm," the user acknowledges that they have performed a final audit of the transaction details.

3. Network Compatibility and Chain-Matching Policy

3.1. User Duty of Care:
Zelencio supports a multi-chain environment (including BTC, ERC-20, BEP-20, TRC-20, SOL, and others). It is the Userโ€™s Absolute Duty to ensure that the recipient wallet address is compatible with the network selected within the Zelencio interface.
3.2. Warning Systems:
The platform utilizes an "Amber Warning" system that triggers when a user switches networks, alerting them to the risk of asset loss.
3.3. Irreversibility of Blockchain Transactions:
You acknowledge and agree that once an on-chain withdrawal is broadcast to the network, it cannot be cancelled, reversed, or "retrieved" by Zelencio. Assets sent to an incorrect address or via an unsupported network are considered permanently lost.

4. Advanced Fee Management: "Who Pays the Fee?" Protocol

Zelencio provides a transparent and flexible fee-allocation system, allowing users to manage their liquidity with precision:

  • 4.1. Network Fee (Gas): This is the mandatory cost paid to blockchain miners/validators to process the transaction. This fee is determined by real-time network congestion and is not retained by Zelencio.

  • 4.2. Platform Service Fee: Zelencio charges a nominal administrative fee for the technical management and security of the withdrawal broadcast.

  • 4.3. Allocation Options:

    • Option A (User Pays): The total fee is added to the withdrawal amount and debited from the user's remaining balance.

    • Option B (Deduct from Amount): The fee is deducted from the principal amount being sent. The receiver will get the "Net Amount" after fees (displayed as "Receive Amount" in green on the UI).

5. Withdrawal Limits and KYC Synchronization

Withdrawal capacity is strictly synced with the userโ€™s Identity Verification (KYC) tier to ensure compliance with global AML standards:

  • Tier 1: Standard users are limited to a daily withdrawal ceiling of $5,000 USD equivalent.

  • Tier 2: Verified users are granted a daily limit of $20,000 USD equivalent.

  • Tier 3: High-volume/Institutional users may withdraw up to $10,000,000 USD daily.

  • Security Holds: In accordance with our security policy, any change to your account credentials (e.g., changing password or resetting 2FA) will result in an automatic 24-hour withdrawal freeze to prevent potential account takeovers.

6. Anti-Money Laundering (AML) and Address Monitoring

6.1. Transaction Monitoring:
All withdrawal requests are scanned 24/7 by Zelencioโ€™s AI-driven AML monitoring engine.
6.2. Sanctioned Address Blocking:
Zelencio maintains a real-time list of "Prohibited and Sanctioned Wallet Addresses." Withdrawal attempts to addresses associated with illicit activity, mixers, or darknet markets will be automatically blocked, and the account may be placed under investigation in the Security Crypto Account.

7. Transparency and Status Tracking

  • Real-Time History: Every withdrawal is recorded in the "Transaction History" with an associated Order ID and Transaction Hash (TxID) once broadcast.

  • Arrival Estimates: Zelencio provides a data-driven "Arrival Estimate" (e.g., "~2 Mins"). However, you acknowledge that these are estimates and actual arrival times depend on third-party blockchain network performance.

8. Limitation of Liability and Non-Refundable Fees

  • 8.1. Network Failure: Zelencio is not responsible for losses caused by blockchain "Forks," network congestion, or bugs within the protocol of a specific cryptocurrency.

  • 8.2. Fee Non-Refundability: Once a withdrawal is authorized and the service fee is debited, the fee is final and non-refundable, even if the external network experiences a delay or the user provides an invalid recipient address.

  • 8.3. External Platform Errors: If you withdraw to another exchange that fails to credit your account due to their internal policies, Zelencioโ€™s responsibility ends at the moment of successful broadcast to the blockchain.


ESCROW HUB FOR DIGITAL PRODUCTS


1. Functional Definition and Venue Scope

The Zelencio Escrow Hub is a specialized, multi-party secure settlement environment designed for the exchange of digital products and intangible services (e.g., software code, domain names, freelance deliverables, or social media assets).

Unlike the standard U2U Marketplace, which is dedicated to crypto-fiat exchange, the Escrow Hub serves as a technological "Safety Chamber" where assets are held in a secure, time-locked state until specific contract milestones are met or proof of delivery is verified.

2. The Tri-Party Role Framework

To facilitate trust in high-value digital transactions, Zelencio supports a unique three-role infrastructure:

  • 2.1. The Buyer: The participant providing the digital asset funding for the acquisition. The Buyer has the right to inspect "Item Proof" before authorizing a release.

  • 2.2. The Seller: The participant providing the digital product or service. The Seller is protected by the knowledge that the Buyerโ€™s funds are "Hard-Locked" by the platform before work begins.

  • 2.3. The Middle Man (Strategic Overseer): An optional, third-party verified participant who acts as a neutral observer. The Middle Man may assist in verifying the deliverable or facilitating communication.

    • KYC Mandate: Every participant in an Escrow deal, including the Middle Man, must be at least Tier 1 KYC verified. Zelencio does not permit unverified users to participate in the Escrow ecosystem.

3. Transaction Initiation and "In-Use" Asset Locking

3.1. The Join Code Protocol:
Every Escrow deal is assigned a unique, alphanumeric "ZE-Join Code" (e.g., ZE-201F53EB). This code must be shared by the Creator with the other participants to link them to the specific deal.
3.2. Mandatory Asset Locking:
Upon the initiation of a deal, the total contract amount is immediately moved from the Buyerโ€™s available balance to the "In-Use Balance".
3.3. Platform Custody:
Once locked, these funds are held in a secure, non-circulating state by the Zelencio Matching Engine. Neither the Buyer nor the Seller can withdraw these assets until the deal status is updated to "Completed" or "Disputed/Cancelled."

4. Evidence, Item Proof, and Milestones

4.1. The "Item Proof" Module:
The Hub provides a dedicated interface for the Seller to upload up to three (3) high-resolution screenshots or documents as "Proof of Work" or "Proof of Delivery."
4.2. Milestone Settlement:
For complex, multi-stage digital projects, the Hub supports "Payment Milestones." This allows the Buyer to release portions of the total amount as different stages of the digital product are delivered. You acknowledge that each milestone release is final and irreversible.

5. Fee Allocation and Non-Refundability

5.1. Flexible Fee Sourcing:
The Creator of the Escrow deal has the technical authority to designate the "Fee Payer." Options include:

  • Buyer Pays Everything.

  • Seller Pays Everything.

  • Middle Man Pays Everything.

  • Split Fee Between Parties.
    5.2. Technical Service Finality:
    The platform fee for the Escrow Hub covers the cost of asset locking, secure chat hosting, and the availability of the Zelencio Dispute Team. You agree that Escrow fees are 100% non-refundable once the deal is initiated, regardless of whether the deal is successfully completed or cancelled by the parties.

6. Communication and UGC Moderation

6.1. The Trade Chat Protocol:
All negotiations and delivery confirmations must occur within the Zelencio Internal Trade Chat.
6.2. Moderation and Safety:
In compliance with Google Play UGC policies, the Hub features:

  • 24/7 Logging: All chat history is recorded for five (5) years as an audit trail for dispute resolution.

  • Report & Block: Any party can report a counterparty for harassment, fraudulent intent, or abusive language.

  • Prohibition of External Links: Users are warned against following external links (e.g., Telegram/WhatsApp) to avoid "Phishing" and "Off-Platform Scams."

7. Human-Moderated Dispute Resolution

In the event that the digital product is not delivered, or the quality is contested:

  • 7.1. Opening a Dispute: Any party may trigger an "Order Dispute" after a deal has been active for more than 24 hours.

  • 7.2. The 72-Hour Grace Window: Once a dispute is opened, a 72-hour grace period begins to allow for mutual resolution.

  • 7.3. Administrative Judgment: If the parties cannot agree, a Zelencio Human Moderator will join the chat to review the "Item Proof" and chat logs.

  • 7.4. Finality of Decision: By utilizing the Escrow Hub, you irrevocably agree that the decision of the Zelencio Moderator is Final, Binding, and non-challengeable in any court of law.

8. Limitation of Liability and Product Disclaimer

8.1. Quality of Deliverables:
Zelencio provides the Settlement Infrastructure only. We are not responsible for the technical quality, functionality, or legality of the digital products traded between users.
8.2. Third-Party Middle Men:
Zelencio does not employ "Middle Men." These are independent platform users. Zelencio is not liable for the personal conduct or errors made by a third-party Middle Man chosen by the users.
8.3. Negligence and Reversals:
Zelencio will not reverse a transaction if a Buyer clicks "Release Funds" before inspecting the digital product. The Buyer assumes all risk upon the manual authorization of asset release.


SECURITY INFRASTRUCTURE & AUTHENTICATION PROTOCOLS


1. Functional Definition of the Security Ecosystem

Zelencio operates a high-integrity security framework designed to protect digital assets, user identity, and transactional data from unauthorized access, systemic exploits, and social engineering. Our "Triple-Lock" security architecture ensures that no outbound movement of value can occur without three distinct layers of verification: Knowledge (PIN), Possession (2FA Device/Email), and Inherence (Biometrics/Face Verification).

2. Layer 1: The Proprietary 5-Digit App PIN

2.1. The Access Barrier:
Zelencio enforces a mandatory 5-digit numeric App PIN. This PIN is required for initial application entry (if biometrics are disabled) and for high-sensitivity internal ledger actions, such as generating a Zelencio Code or initiating a Swap.
2.2. Zero-Knowledge Storage:
To ensure the highest level of data integrity, Zelencio does not store your PIN in a human-readable format. All PINs are subject to Cryptographic Hashing on our secure servers. This means that even in the event of a server-side breach, your raw PIN remains unreadable.
2.3. Anti-Brute Force Protection:
The system automatically monitors for failed PIN attempts. Multiple incorrect entries will trigger an incremental "Cool-Down Period" (e.g., 30 seconds, 5 minutes, 1 hour) or a temporary account freeze requiring manual identity re-verification.

3. Layer 2: Multi-Factor Authentication (MFA) Protocols

Zelencio utilizes two distinct channels of secondary verification to mitigate the risk of account takeover via password theft.
3.1. Email One-Time Password (OTP):
During registration, login from a new device, or password resets, Zelencioโ€™s backend issues a time-sensitive, 6-digit alphanumeric OTP to the userโ€™s verified email address. This ensures that the user maintains control over their primary communication channel.
3.2. Google 2FA (The "Hard Lock"):
Zelencio integrates with the Google Authenticator protocol to provide Time-based One-Time Passwords (TOTP).

  • Mandatory for Outbound Funds: Users are strictly required to bind a 2FA device before they can execute On-Chain Withdrawals, P2P releases, or internal transfers.

  • Recovery Keys: Upon setup, the user is provided with a unique "Recovery Secret." Zelencio does not store this secret. The user is solely responsible for storing this key offline; loss of both the 2FA device and the recovery key will result in a mandatory 7-day security hold on the account.

4. Layer 3: Identity Assurance and Face Verification (Liveness)

To counter "Synthetic Identity Fraud" and "Identity Theft," Zelencio utilizes an AI-driven biometric verification engine.
4.1. Liveness Detection:
During KYC and high-risk transactions (such as third-party P2P payments), the platform requires a "Liveness Check." This involves a live video capture where the user must perform specific movements (e.g., smiling, blinking, or rotating the head) as instructed by the Zacuz Intelligent Bot (ZIB).
4.2. Biometric Data Privacy:

  • Face ID / Fingerprint: When using biometric login (Face ID or Fingerprint), the actual biometric data is stored and processed exclusively by the user's device (Secure Enclave on iOS or Trusted Execution Environment on Android). Zelencio receives only a "Success/Fail" token from the operating system.

  • Face Verification (KYC): Video data captured for KYC/Liveness is transmitted via encrypted channels to Zelencioโ€™s secure, air-gapped identity servers for matching against the provided government ID.

5. Account Activity and Authorized Device Tracking

5.1. Hardware Fingerprinting:
Zelencioโ€™s security engine logs the Device Name/Model, IP Address, Network Type (WiFi/Cellular), and Approximate Geolocation for every session.
5.2. Authorized Devices List:
Users can view a real-time list of "Trusted Login Sources" within the Security Settings. Users have the power to "De-authorize" any device instantly, which kills all active sessions and requires a full MFA re-login on that hardware.
5.3. Real-Time Alerting:
The platform issues immediate push notifications and emails for any "New Device Login." If a user does not recognize the login, they can hit a "Secure Account" button to lock all withdrawals and transfers instantly.

6. Asset Protection: The "Security Crypto Account"

6.1. The Isolation Chamber:
If Zelencioโ€™s AI detects "Abnormal Behavior" (e.g., a login from a high-risk IP followed by a massive withdrawal attempt), funds are automatically moved from the primary balance to the Security Crypto Account.
6.2. Mandatory Investigation:
Funds in the Security Account are "Hard-Locked." These funds can only be released after the user passes an "Enhanced Liveness Check" and provides additional proof of transaction intent. This prevents "Drainer" attacks from emptying a userโ€™s wallet.

7. Transaction Finality and "Negligence" Disclaimer

7.1. User Authorization:
By entering your App PIN and 2FA code and performing the "Slide to Trade" action, you provide irrevocable authorization for the transaction. Zelencio considers these credentials to be a digital signature of the account holder.
7.2. Social Engineering Risk:
Zelencio staff will NEVER ask for your App PIN, 2FA code, or Email OTP. You are strictly responsible for protecting these credentials. Zelencio is not liable for losses caused by "Phishing" or "Social Engineering" where you voluntarily provided your security codes to a third party.
7.3. Device Compromise:
Zelencio shall not be liable for assets lost due to a "Rooted" or "Jailbroken" device, as such modifications bypass the operating system's built-in security barriers.

8. Data Retention and Encryption Standards

  • Encryption at Rest: All user data, including transaction history and hashed credentials, is encrypted using AES-256 standards.

  • Encryption in Transit: All communication between the Zelencio mobile app and our servers is secured via Transport Layer Security (TLS 1.3).

  • Post-Deletion Retention: Even upon account closure, security logs and KYC metadata are retained for five (5) years to assist law enforcement in the event of a post-hoc fraud investigation, in accordance with global AML mandates.