ACCEPTANCE OF TERMS By purchasing, downloading, installing, or using Flowstate ("the Software"), you ("User," "you," or "your") agree to be bound by these Terms of Service & End User License Agreement ("Terms"). If you do not agree to these Terms, do not use the Software.
SOFTWARE LICENSE
2.1 License Grant Subject to your compliance with these Terms, we grant you a limited, non-exclusive, non-transferable, revocable license to use the Software for your personal use only.
2.2 License Restrictions You may not:
Copy, modify, or create derivative works of the Software
Reverse engineer, decompile, disassemble, or attempt to extract the source code
Remove, alter, or obscure any proprietary notices or labels
Use the Software for any illegal or unauthorized purpose
Transfer, sublicense, or distribute the Software to third parties
PAYMENT AND PURCHASE TERMS
3.1 Payment All payments must be made in full at the time of purchase. Prices are subject to change without notice.
3.2 Final Sale Policy ALL SALES ARE FINAL. Products sold on both Ozashub and Flowstate platforms are considered strictly as final sales with no refunds, returns, or exchanges.
3.3 Limited Refund Exception Refunds may ONLY be considered under the following strict conditions:
The Software does not function on your system
All available support options have been fully exhausted
Technical issues are verified and documented by our support team
The request is made within 30 days of purchase
Note: Refund approval is at our sole discretion and is not guaranteed.
ANTI-TAMPERING AND SECURITY
4.1 Strict Prohibition Any attempt to decompile, crack, reverse engineer, or tamper with the Software is strictly prohibited and will result in immediate and permanent consequences.
4.2 Blacklisting Policy Violations of these Terms, including but not limited to:
Decompiling or reverse engineering attempts
Cracking or bypassing security measures
Sharing or distributing modified versions
Attempting to extract source code
Will result in:
IMMEDIATE BLACKLISTING from all our services
PERMANENT BAN from future purchases
LEGAL ACTION where applicable
REPORTING to relevant authorities and platforms
4.3 Zero Tolerance We maintain a zero-tolerance policy for any form of software tampering or security circumvention.
INTELLECTUAL PROPERTY
5.1 Ownership The Software and all related content, including but not limited to code, graphics, text, and design, are owned by us and protected by copyright, trademark, and other intellectual property laws.
5.2 No Rights Granted These Terms do not grant you any rights to our intellectual property beyond the limited license described herein.
USER CONDUCT AND MONITORING
6.1 Acceptable Use You agree to use the Software only for lawful purposes and in accordance with these Terms.
6.2 Prohibited Activities You may not use the Software to:
Violate any applicable laws or regulations
Infringe on the rights of others
Transmit harmful, offensive, or inappropriate content
Attempt to gain unauthorized access to systems or networks
Interfere with the operation of our services
Engage in any activity we deem inappropriate or suspicious
6.3 Monitoring and Investigation We maintain comprehensive monitoring and logging systems that track:
All user authentication and login attempts through KeyAuth
Application usage patterns, events, and user interactions
Network activity and connection data
User behavior analytics and patterns
All suspicious or potentially harmful activities
We reserve the right to:
Investigate any flagged or suspicious behavior
Analyze logged data for security threats
Take immediate action based on logged evidence
Blacklist users based on documented violations or suspicious patterns
6.4 Suspicious Activity We may blacklist or terminate accounts if our logging systems detect:
Unusual usage patterns or anomalies
Potential security threats or violations
Suspicious network or authentication activity
Any behavior that raises security concerns
Any activity that violates our Terms of Service
ANTIVIRUS FALSE POSITIVES
7.1 Technical Implementation The Software includes legitimate macro functionality that may trigger antivirus software alerts. This is due to the following technical components:
Key listener functionality (not a keylogger) using libraries such as pynput
Custom Interception driver for advanced input handling
WinDivert DLL for network control features, including built-in lag switch functionality similar to Clumsy
7.2 False Positive Explanation ANTIVIRUS ALERTS ARE FALSE POSITIVES. The Software is completely safe and legitimate. These false positives occur because:
Many newer macro tools lack digital signatures
Digital signing requires expensive code-signing certificates ($100-$500)
Older macro applications avoid this issue due to established reputation
Antivirus software may flag legitimate macro functionality as suspicious
7.3 User Responsibility You acknowledge that:
The Software is safe and legitimate despite antivirus warnings
False positives are common with macro applications
You may need to add exceptions in your antivirus software
We are not responsible for antivirus software behavior
DISCLAIMER OF WARRANTIES
8.1 "As Is" Basis The Software is provided "AS IS" and "AS AVAILABLE" without any warranties of any kind, either express or implied.
8.2 No Guarantees We do not guarantee that the Software will meet your requirements, operate without interruption, or be error-free.
LIMITATION OF LIABILITY AND INDEMNIFICATION
9.1 Maximum Liability In no event shall our total liability exceed the amount you paid for the Software.
9.2 Excluded Damages We shall not be liable for any indirect, incidental, special, consequential, or punitive damages.
9.3 User Indemnification You agree to indemnify, defend, and hold us harmless from and against any and all claims, damages, losses, costs, and expenses (including reasonable attorneys' fees) arising from:
Your use of the Software
Your violation of these Terms
Your violation of any applicable laws or regulations
Any third-party claims related to your use of the Software
9.4 No Warranty Claims You waive any right to make warranty claims, product liability claims, or any other claims against us beyond the limited license granted herein.
9.5 Force Majeure We shall not be liable for any failure to perform due to circumstances beyond our reasonable control, including but not limited to acts of God, government actions, war, civil disturbance, or technical failures.
DISPUTE RESOLUTION
10.1 Mandatory Direct Resolution ALL DISPUTES MUST BE RESOLVED DIRECTLY WITH US. Any attempt to resolve disputes through third parties, payment processors, banks, credit card companies, or other external channels will result in immediate and permanent blacklisting from all our services.
10.2 Dispute Channels You must contact us directly through our official channels for:
Refund requests
Technical support issues
Billing disputes
Account problems
Any other concerns or complaints
10.3 Blacklisting for External Disputes ZERO TOLERANCE POLICY: Initiating disputes through external channels (including but not limited to):
Credit card chargebacks
PayPal disputes
Bank disputes
Payment processor complaints
Social media complaints
Review platform complaints
Will result in:
IMMEDIATE BLACKLISTING from all our services
PERMANENT BAN from future purchases
ACCOUNT TERMINATION without refund
LEGAL ACTION where applicable
10.4 Our Commitment to Resolution We are committed to resolving legitimate issues through our direct support channels. We will work with you to find a satisfactory solution for valid concerns.
TERMINATION AND ENFORCEMENT
11.1 Termination by Us We may terminate your license immediately if you violate these Terms, or for any other reason at our sole discretion.
11.2 Effect of Termination Upon termination, you must immediately cease all use of the Software and destroy all copies.
11.3 Broad Discretion We reserve the absolute right to:
Blacklist, ban, or terminate any user account at any time
Refuse service to anyone for any reason
Take any action we deem necessary to protect our interests
Modify, suspend, or discontinue any part of our services
Exercise our judgment in all matters related to user accounts and access
11.4 Appeal Process While we maintain strict enforcement of our Terms, we do provide an appeal process for users who believe they have been incorrectly penalized. Appeals must be submitted through our official support channels within 30 days of the action taken.
11.5 Logging and Monitoring We maintain comprehensive logging and monitoring systems, including:
KeyAuth authentication logs
Application usage patterns and events
Network activity monitoring
User behavior analytics
All actions and decisions are logged with timestamps and reasons
GOVERNING LAW These Terms shall be governed by and construed in accordance with the laws of [Your Jurisdiction], without regard to conflict of law principles.
CHANGES TO TERMS We reserve the right to modify these Terms at any time. Continued use of the Software after changes constitutes acceptance of the new Terms.
CONTACT INFORMATION For questions about these Terms, contact us at:
ACKNOWLEDGMENT By using the Software, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service & End User License Agreement
Email: [email protected]
Website: https://flowstate.best
INTRODUCTION Flowstate ("we," "our," or "us") values your privacy. This Privacy Policy explains how we collect, use, store, and protect your information when you purchase, download, install, or use our software ("the Software"). By using the Software, you agree to the terms of this Privacy Policy.
INFORMATION WE COLLECT We may collect the following information:
Account information, including username and email, via KeyAuth authentication
Payment information (processed securely by third-party payment processors)
Usage data, such as application usage patterns, events, and interactions
Technical information, including device type, operating system, and IP address
HOW WE USE YOUR INFORMATION We use the information we collect to:
Provide, maintain, and improve the Software
Authenticate and manage user accounts
Process payments and prevent fraud
Investigate and prevent suspicious or illegal activity
Respond to support requests and inquiries
DATA SHARING AND DISCLOSURE We do not sell, rent, or trade your personal information to third parties. We may share your information only:
With trusted service providers to operate the Software (e.g., payment processors, KeyAuth)
When required by law or legal processes
To protect our rights, property, or safety, or the rights, property, or safety of others
DATA SECURITY We implement reasonable security measures to protect your information from unauthorized access, alteration, disclosure, or destruction. However, no method of transmission over the Internet or electronic storage is 100% secure.
DATA RETENTION We retain your information only as long as necessary to provide the Software, comply with legal obligations, resolve disputes, enforce our agreements, and for legitimate business purposes.
THIRD-PARTY SERVICES The Software may use third-party services (such as KeyAuth or payment processors) that have their own privacy policies. We encourage you to review these third-party policies to understand how your data is handled.
CHILDREN'S PRIVACY The Software is not intended for use by individuals under the age of 13. We do not knowingly collect personal information from children under 13.
YOUR RIGHTS Depending on your jurisdiction, you may have rights regarding your personal information, including access, correction, deletion, or restriction of use. To exercise these rights, contact us using the details below.
CHANGES TO THIS PRIVACY POLICY We may update this Privacy Policy from time to time. Continued use of the Software after changes constitutes acceptance of the updated Privacy Policy.
CONTACT INFORMATION For questions about this Privacy Policy or your personal information, contact us at:
Email: [email protected]
Website: https://flowstate.best