Legal Agreement

End User License Agreement

LAST UPDATED: MAY 15, 2026

High-Integrity System Notice

By installing and running Simple Productivity Blocker, you grant permissions to alter registry structures, filter DNS ports, and secure system files. Please read these terms carefully before initialization.

1. Grant of License

Subject to the terms of this Agreement, nvusdev grants you a personal, non-transferable, non-exclusive license to use the Software on your Windows devices in accordance with the official MIT License terms.

2. System-Level Enforcement

You acknowledge that the Software operates at the deep Windows operating system level and performs high-integrity system adjustments:

  • DNS Interception: Reconfigures network adapters to query a loopback-bound DNS proxy.
  • Hosts File Modification: Appends redundancy blocking records to the system hosts file.
  • NTFS ACL Management: Restructures directory and file security descriptors to lock execution.
  • Process Management: Monitors active task names and forcibly terminates targeted executables.
  • Registry Overrides: Applies policy edits to restrict browser DNS-over-HTTPS bypass vectors.

3. 'As-Is' Warranty Disclaimer

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. THE DEVELOPER DOES NOT WARRANT THAT THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE. YOU ASSUME ALL RISKS ASSOCIATED WITH SYSTEM-LEVEL PERMISSION MODIFICATIONS AND NETWORK ADAPTER MANIPULATIONS.

4. Strict Limitation of Liability

IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT, OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS.

This exclusion specifically limits liability for data loss, OS instability, or loss of access to files resulting from password losses, configuration corruption, or improper execution of background services.

5. Non-Bypass & Recovery Paths

The software is intentionally designed to bridge the "willpower gap." You agree not to attempt to reverse engineer, decompile, or bypass the application rules during active enforcement sessions.

If a lock becomes orphaned or unstable, you are expected to use the provided recovery utility (recovery_uplift.exe) in Windows Safe Mode. You are solely responsible for keeping system backups.