New products in stock today!

Terms of Service & End User License Agreement

Effective Date: [16/08/2025]

  1. ACCEPTANCE OF TERMS By purchasing, downloading, installing, or using Flowstate ("the Software"), you ("User," "you," or "your") agree to be bound by these Terms of Service & End User License Agreement ("Terms"). If you do not agree to these Terms, do not use the Software.

  2. SOFTWARE LICENSE

2.1 License Grant Subject to your compliance with these Terms, we grant you a limited, non-exclusive, non-transferable, revocable license to use the Software for your personal use only.

2.2 License Restrictions You may not:

  • Copy, modify, or create derivative works of the Software

  • Reverse engineer, decompile, disassemble, or attempt to extract the source code

  • Remove, alter, or obscure any proprietary notices or labels

  • Use the Software for any illegal or unauthorized purpose

  • Transfer, sublicense, or distribute the Software to third parties

  1. PAYMENT AND PURCHASE TERMS

3.1 Payment All payments must be made in full at the time of purchase. Prices are subject to change without notice.

3.2 Final Sale Policy ALL SALES ARE FINAL. Products sold on both Ozashub and Flowstate platforms are considered strictly as final sales with no refunds, returns, or exchanges.

3.3 Limited Refund Exception Refunds may ONLY be considered under the following strict conditions:

  • The Software does not function on your system

  • All available support options have been fully exhausted

  • Technical issues are verified and documented by our support team

  • The request is made within 30 days of purchase

Note: Refund approval is at our sole discretion and is not guaranteed.

  1. ANTI-TAMPERING AND SECURITY

4.1 Strict Prohibition Any attempt to decompile, crack, reverse engineer, or tamper with the Software is strictly prohibited and will result in immediate and permanent consequences.

4.2 Blacklisting Policy Violations of these Terms, including but not limited to:

  • Decompiling or reverse engineering attempts

  • Cracking or bypassing security measures

  • Sharing or distributing modified versions

  • Attempting to extract source code

Will result in:

  • IMMEDIATE BLACKLISTING from all our services

  • PERMANENT BAN from future purchases

  • LEGAL ACTION where applicable

  • REPORTING to relevant authorities and platforms

4.3 Zero Tolerance We maintain a zero-tolerance policy for any form of software tampering or security circumvention.

  1. INTELLECTUAL PROPERTY

5.1 Ownership The Software and all related content, including but not limited to code, graphics, text, and design, are owned by us and protected by copyright, trademark, and other intellectual property laws.

5.2 No Rights Granted These Terms do not grant you any rights to our intellectual property beyond the limited license described herein.

  1. USER CONDUCT AND MONITORING

6.1 Acceptable Use You agree to use the Software only for lawful purposes and in accordance with these Terms.

6.2 Prohibited Activities You may not use the Software to:

  • Violate any applicable laws or regulations

  • Infringe on the rights of others

  • Transmit harmful, offensive, or inappropriate content

  • Attempt to gain unauthorized access to systems or networks

  • Interfere with the operation of our services

  • Engage in any activity we deem inappropriate or suspicious

6.3 Monitoring and Investigation We maintain comprehensive monitoring and logging systems that track:

  • All user authentication and login attempts through KeyAuth

  • Application usage patterns, events, and user interactions

  • Network activity and connection data

  • User behavior analytics and patterns

  • All suspicious or potentially harmful activities

We reserve the right to:

  • Investigate any flagged or suspicious behavior

  • Analyze logged data for security threats

  • Take immediate action based on logged evidence

  • Blacklist users based on documented violations or suspicious patterns

6.4 Suspicious Activity We may blacklist or terminate accounts if our logging systems detect:

  • Unusual usage patterns or anomalies

  • Potential security threats or violations

  • Suspicious network or authentication activity

  • Any behavior that raises security concerns

  • Any activity that violates our Terms of Service

  1. ANTIVIRUS FALSE POSITIVES

7.1 Technical Implementation The Software includes legitimate macro functionality that may trigger antivirus software alerts. This is due to the following technical components:

  • Key listener functionality (not a keylogger) using libraries such as pynput

  • Custom Interception driver for advanced input handling

  • WinDivert DLL for network control features, including built-in lag switch functionality similar to Clumsy

7.2 False Positive Explanation ANTIVIRUS ALERTS ARE FALSE POSITIVES. The Software is completely safe and legitimate. These false positives occur because:

  • Many newer macro tools lack digital signatures

  • Digital signing requires expensive code-signing certificates ($100-$500)

  • Older macro applications avoid this issue due to established reputation

  • Antivirus software may flag legitimate macro functionality as suspicious

7.3 User Responsibility You acknowledge that:

  • The Software is safe and legitimate despite antivirus warnings

  • False positives are common with macro applications

  • You may need to add exceptions in your antivirus software

  • We are not responsible for antivirus software behavior

  1. DISCLAIMER OF WARRANTIES

8.1 "As Is" Basis The Software is provided "AS IS" and "AS AVAILABLE" without any warranties of any kind, either express or implied.

8.2 No Guarantees We do not guarantee that the Software will meet your requirements, operate without interruption, or be error-free.

  1. LIMITATION OF LIABILITY AND INDEMNIFICATION

9.1 Maximum Liability In no event shall our total liability exceed the amount you paid for the Software.

9.2 Excluded Damages We shall not be liable for any indirect, incidental, special, consequential, or punitive damages.

9.3 User Indemnification You agree to indemnify, defend, and hold us harmless from and against any and all claims, damages, losses, costs, and expenses (including reasonable attorneys' fees) arising from:

  • Your use of the Software

  • Your violation of these Terms

  • Your violation of any applicable laws or regulations

  • Any third-party claims related to your use of the Software

9.4 No Warranty Claims You waive any right to make warranty claims, product liability claims, or any other claims against us beyond the limited license granted herein.

9.5 Force Majeure We shall not be liable for any failure to perform due to circumstances beyond our reasonable control, including but not limited to acts of God, government actions, war, civil disturbance, or technical failures.

  1. DISPUTE RESOLUTION

10.1 Mandatory Direct Resolution ALL DISPUTES MUST BE RESOLVED DIRECTLY WITH US. Any attempt to resolve disputes through third parties, payment processors, banks, credit card companies, or other external channels will result in immediate and permanent blacklisting from all our services.

10.2 Dispute Channels You must contact us directly through our official channels for:

  • Refund requests

  • Technical support issues

  • Billing disputes

  • Account problems

  • Any other concerns or complaints

10.3 Blacklisting for External Disputes ZERO TOLERANCE POLICY: Initiating disputes through external channels (including but not limited to):

  • Credit card chargebacks

  • PayPal disputes

  • Bank disputes

  • Payment processor complaints

  • Social media complaints

  • Review platform complaints

Will result in:

  • IMMEDIATE BLACKLISTING from all our services

  • PERMANENT BAN from future purchases

  • ACCOUNT TERMINATION without refund

  • LEGAL ACTION where applicable

10.4 Our Commitment to Resolution We are committed to resolving legitimate issues through our direct support channels. We will work with you to find a satisfactory solution for valid concerns.

  1. TERMINATION AND ENFORCEMENT

11.1 Termination by Us We may terminate your license immediately if you violate these Terms, or for any other reason at our sole discretion.

11.2 Effect of Termination Upon termination, you must immediately cease all use of the Software and destroy all copies.

11.3 Broad Discretion We reserve the absolute right to:

  • Blacklist, ban, or terminate any user account at any time

  • Refuse service to anyone for any reason

  • Take any action we deem necessary to protect our interests

  • Modify, suspend, or discontinue any part of our services

  • Exercise our judgment in all matters related to user accounts and access

11.4 Appeal Process While we maintain strict enforcement of our Terms, we do provide an appeal process for users who believe they have been incorrectly penalized. Appeals must be submitted through our official support channels within 30 days of the action taken.

11.5 Logging and Monitoring We maintain comprehensive logging and monitoring systems, including:

  • KeyAuth authentication logs

  • Application usage patterns and events

  • Network activity monitoring

  • User behavior analytics

  • All actions and decisions are logged with timestamps and reasons

  1. GOVERNING LAW These Terms shall be governed by and construed in accordance with the laws of [Your Jurisdiction], without regard to conflict of law principles.

  2. CHANGES TO TERMS We reserve the right to modify these Terms at any time. Continued use of the Software after changes constitutes acceptance of the new Terms.

  3. CONTACT INFORMATION For questions about these Terms, contact us at:

  4. ACKNOWLEDGMENT By using the Software, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service & End User License Agreement

Privacy Policy

  1. INTRODUCTION Flowstate ("we," "our," or "us") values your privacy. This Privacy Policy explains how we collect, use, store, and protect your information when you purchase, download, install, or use our software ("the Software"). By using the Software, you agree to the terms of this Privacy Policy.

  2. INFORMATION WE COLLECT We may collect the following information:

  • Account information, including username and email, via KeyAuth authentication

  • Payment information (processed securely by third-party payment processors)

  • Usage data, such as application usage patterns, events, and interactions

  • Technical information, including device type, operating system, and IP address

  1. HOW WE USE YOUR INFORMATION We use the information we collect to:

  • Provide, maintain, and improve the Software

  • Authenticate and manage user accounts

  • Process payments and prevent fraud

  • Investigate and prevent suspicious or illegal activity

  • Respond to support requests and inquiries

  1. DATA SHARING AND DISCLOSURE We do not sell, rent, or trade your personal information to third parties. We may share your information only:

  • With trusted service providers to operate the Software (e.g., payment processors, KeyAuth)

  • When required by law or legal processes

  • To protect our rights, property, or safety, or the rights, property, or safety of others

  1. DATA SECURITY We implement reasonable security measures to protect your information from unauthorized access, alteration, disclosure, or destruction. However, no method of transmission over the Internet or electronic storage is 100% secure.

  2. DATA RETENTION We retain your information only as long as necessary to provide the Software, comply with legal obligations, resolve disputes, enforce our agreements, and for legitimate business purposes.

  3. THIRD-PARTY SERVICES The Software may use third-party services (such as KeyAuth or payment processors) that have their own privacy policies. We encourage you to review these third-party policies to understand how your data is handled.

  4. CHILDREN'S PRIVACY The Software is not intended for use by individuals under the age of 13. We do not knowingly collect personal information from children under 13.

  5. YOUR RIGHTS Depending on your jurisdiction, you may have rights regarding your personal information, including access, correction, deletion, or restriction of use. To exercise these rights, contact us using the details below.

  6. CHANGES TO THIS PRIVACY POLICY We may update this Privacy Policy from time to time. Continued use of the Software after changes constitutes acceptance of the updated Privacy Policy.

  7. CONTACT INFORMATION For questions about this Privacy Policy or your personal information, contact us at: