Skip to content

Customer Service:

Buy 2 for a 5% discount, 3 for an 8% discount, and 4 or more for a 12% discount


Top 10 Rank Cold Weapons In History By Swordier

by CeladonerKiki 13 Jan 2024

Cold weapons, also known as edged weapons, refer to close combat weaponry that does not utilize gunpowder, explosives, or other incendiary materials to directly inflict harm on enemies while defending oneself. Throughout human history, cold weapons played a pivotal role in warfare and also served as significant carriers of cultural heritage. In various regions, among different ethnic groups, and across various epochs, distinctive cold weapons emerged, combining functionality as tools for inflicting harm with their status as artistic masterpieces. So, who makes it to the global top ten list of cold weapons, and which Chinese cold weapon has earned a place among them?

This image has an empty alt attribute; its file name is earthed.jpg

Tenth place belongs to the Japanese Tachi. During Japan's Warring States period, many exceptional swordsmen, such as Miyamoto Musashi and Ito Ittosai, rose to prominence and were revered as "swordmasters" or "kenshi." They wielded a weapon known as the Japanese Tachi, which evolved from the Chinese Tang Dao. In Japan, there's a saying that goes, "A treasured sword must be tested on a living body." While this may sound somewhat grim, there's no denying the formidable power possessed by the Japanese Tachi.

The Japanese Tachi features a distinctive appearance, characterized by its long, straight, single-edged blade with a slight curve and a subtly inclined tip. This shape excels in combat, especially suited for delivering precise, lethal strikes. The techniques associated with the Japanese Tachi are agile and swift, emphasizing precise movements, making it appear nimble and difficult to defend against in battle. Tachi swords are known for their significant curvature, with blade lengths typically exceeding 3 shaku (approximately 1 meter) but not reaching 5 shaku (approximately 1.5 meters), as seen in smaller Tachi variants.

This image has an empty alt attribute; its file name is the-saen-1024x386.jpgThe name of this type of sword may have its origins in the Japanese word for "cutting," and there is also a theory that connects it to the pronunciation of "たち" (tachi). Although the Tachi bears some similarities in its shape to the Chinese Tang Dao, archaeological evidence and historical artifacts suggest a closer connection to the Han Dynasty Huan Shou Dao.

This image has an empty alt attribute; its file name is 640-2-5-1024x670.jpgCompared to the well-known Samurai Katana, the most significant difference in the Tachi lies in its greater length, making it more suitable for battlefield use and fostering its rapid development as a weapon for mounted warriors. When wielding a Tachi, a samurai needed to hold the sword firmly, leaving no gaps. The ring and pinky fingers tightly gripped the hilt, while the thumb and index finger lightly held it, and the middle finger rested steadily on the hilt.When delivering strikes, the hands must remain steady and firm, with movements executed swiftly and decisively, focusing on a single objective: defeating the opponent. The swinging of the Tachi demands a consistent grip, free from wavering or hesitation. Tachi techniques call for extended arm movements followed by a powerful strike.

This image has an empty alt attribute; its file name is BAITININW-P-1024x537.jpgIn terms of cultural dissemination abroad, the Tachi has performed admirably, and it commands a high price in the international market. Some renowned Tachi swords can fetch prices in the range of several hundred thousand dollars. Due to the fame of the Tachi worldwide, it earns its place among the top ten cold weapons, albeit towards the end of the list.

This image has an empty alt attribute; its file name is 640-4-4-1024x511.jpgNinth place belongs to the Aztec Obsidian Greatsword. The Obsidian Greatsword is a unique weapon of the Aztec people.

This image has an empty alt attribute; its file name is 640-4-1024x855.png

During the height of the Aztec civilization, the Aztecs revered the jaguar, and their most elite warriors were known as Jaguar Warriors. These brave warriors wielded a distinctive weapon known as the Obsidian Greatsword, which resembled a giant double-edged blade. Crafted from sharp obsidian, this enormous sword possessed formidable killing power.

This image has an empty alt attribute; its file name is 640-5-4.jpgThe unique Obsidian Greatsword had a length of around one meter, featuring a double edge. Due to the relatively limited ironworking technology of the Aztec civilization, they turned to obsidian as a material for crafting weapons. However, this specially crafted greatsword possessed immense killing power when swung, and its blade's sharpness could rival that of iron weaponry.

This image has an empty alt attribute; its file name is 640-6-2-1024x768.jpgDuring the wars of the Spanish conquest of the Americas, this ancient weapon, with its unique sharpness and deadly striking power, struck fear into the hearts of the Spanish conquistadors. The Spanish even referred to it as "as sharp as a razor" and held it in great dread.

This image has an empty alt attribute; its file name is 640-2-1.png

Eighth place goes to the Malay Kris Sword from the Malay Archipelago. The Malay Kris Sword, often referred to as the Malay Kris, may not be a household name for many, but it boasts a long and mysterious history. It was once popular in regions such as Indonesia, Malaysia, Brunei, southern Thailand, and the southern Philippines, representing the rich heritage of Malay culture.

This image has an empty alt attribute; its file name is 640-5.png

The Kris sword has a distinctive appearance, slightly shorter than the Jian or "Golden Snake Sword," yet it is exceptionally sturdy. The material used in crafting the Malay Kris is quite special, typically made from pure meteorite iron. The forging process is exceptionally precise, involving hundreds of heating cycles to create a powerful and exquisite sword.

This image has an empty alt attribute; its file name is Fore.-E-1024x810.jpg

This image has an empty alt attribute; its file name is 640-4-1.pngThe name of the sword "Kris" may have its origins in the ancient Javanese word "ngiris." Its hilt symbolizes a ship's captain, the guard represents a vessel, and the wave-like shape of the blade represents the adventurous spirit of riding the waves. The United Nations Educational, Scientific and Cultural Organization (UNESCO) has recognized the Indonesian Malay Kris as a part of the world's intangible cultural heritage. However, the history of this short sword dates back even further, with roots tracing back to the 14th century.

This image has an empty alt attribute; its file name is 640-7-2.jpg

Crafting the perfect Malay Kris sword is a time-consuming process, taking over a year, and it requires meticulous attention to the blade, hilt, and scabbard to create a flawless short sword. The hilt is often made from precious materials like rare woods, animal bones, ivory, gold, silver, and adorned with gemstones for decoration. This has elevated the Malay Kris beyond being just a weapon; it has become a symbol of status for nobility, royalty, and merchants, representing not only a weapon but also a cultural belief and a symbol of power.

Seventh place is occupied by the Nepalese Khukuri, also known as the Kukri. It is a traditional Nepalese curved knife with a unique shape and history.

The most distinctive feature of the Khukuri is its curved blade, often with a notch or indentation along the edge.

This image has an empty alt attribute; its file name is 640-8-2.jpgThe unique shape of the Khukuri allows it to function both as a chopping tool and a stabbing weapon when in use. Its curved design aids in reducing impact and provides superior cutting power. Khukuris are typically very sharp, making them versatile tools in Nepal, used for various purposes including agriculture, hunting, and military applications. In a broader sense, the Khukuri is seen as a symbol representing the courage and honor of Nepal.

This image has an empty alt attribute; its file name is 640-5-1-1024x748.png

It is also widely used within the Nepalese military and is considered one of the iconic weapons of the Gurkhas, the soldiers of the Nepalese Army. Nepalese Army personnel typically carry the Khukuri as a sign of respect and loyalty.

Internationally, the Khukuri is highly regarded for its unique design and historical significance, making it a cherished and prized item among collectors and enthusiasts.

This image has an empty alt attribute; its file name is 640-9-1-1024x810.jpgThe craftsmanship of the Khukuri is typically very intricate, with the blade often made from high-carbon steel, while the handle can be crafted from various materials, including bone, wood, and ivory. In summary, the Nepalese Khukuri is both a symbol of Nepalese culture and a powerful functional weapon.

This image has an empty alt attribute; its file name is 640-10-1-1024x702.jpgSixth place goes to the American Bowie Knife, named after the American frontier hero Jim Bowie. The Bowie Knife originated in the 1830s and gained its name from Jim Bowie's notable feats. Jim Bowie became legendary for his heroic actions in a land dispute battle in 1827, where he successfully defended himself against three adversaries while wielding the Bowie Knife.

This image has an empty alt attribute; its file name is to-diOn-1024x810.jpg

The Bowie Knife, originally designed as a combat knife, boasts exceptional combat capabilities and aggressiveness. Today, its applications have expanded significantly. It has found use as a standard issue knife in modern military contexts, such as the United States Air Force Survival Knife, the M9 bayonet, and the Ka-Bar knife, among others. These knives not only possess the combat and cutting power of the Bowie Knife but are also versatile for tasks like cutting and opening containers. They are widely utilized by the United States military and special forces.

This image has an empty alt attribute; its file name is donaadaaaaaasansaeaapoba-1000x1024.jpg

The Bowie Knife features a clip-point design for its blade, with a narrow and fine tip that is well-suited for both quick thrusting and precise work. The blade is typically broad and robust, making it durable for tasks such as digging, prying, cutting, and chopping. All in all, the American Bowie Knife is not just a potent weapon but also a traditional cultural heritage.

This image has an empty alt attribute; its file name is 640-6.png

Fifth place is claimed by the Roman Short Sword. During the era of cold weapons, the choice of weaponry played a crucial role in determining a military's combat style. In ancient China, long weapons like spears, pikes, and long swords were widely used on the battlefield due to their advantages in attack range and power. However, the Roman Empire took a different path, primarily favoring the short sword. Of course, behind this decision lay profound strategic considerations.

This image has an empty alt attribute; its file name is 640-15.jpgThe Roman military strategy heavily emphasized close combat, and they favored the use of the short sword because it was highly effective in close-quarters combat. Roman soldiers would begin a battle with long-range attacks using javelins and then swiftly transition to close combat, where their short swords became lethal weapons. Coupled with the small shields carried by the soldiers, these short swords enabled them to dispatch multiple enemies in a short amount of time.

This image has an empty alt attribute; its file name is 640-2-6-1024x721.jpgDespite their relatively short length, the Roman short swords were not light in weight. They were primarily designed for thrusting but also featured double edges, making them suitable for slashing. They could be thrust directly into an enemy's heart or abdomen, inflicting fatal wounds. Of course, a crucial factor in achieving this effectiveness was the highly professional nature of the Roman military, characterized by rigorous military training. Their soldiers possessed exceptional skills in using short swords and shields.

This image has an empty alt attribute; its file name is 640-2-2-1024x707.pngOne of the advantages of the short sword was its ability to inflict lethal damage rapidly, making it difficult for the enemy to continue fighting once wounded. In the tactical framework of the Roman military, the swift thrusting of the short sword made it an efficient weapon. Overall, the Roman short sword represents the diverse combat philosophies of different civilizations during the era of cold weapons.

This image has an empty alt attribute; its file name is 640-3-5.jpgFourth place belongs to the Central Asian Damascus Sword, a blade featuring intricate water-like patterns on its surface. These blades, characterized by their high precision, hardness, toughness, and elasticity, are considered one of the top three renowned swords globally, making them one of the most influential cold weapons in the world.

This image has an empty alt attribute; its file name is 640-4-5-1024x734.jpgThe razor-sharp tip of the Central Asian Damascus Sword was known for its ability to cleave knights in armor in two on the battlefield and hold its own when clashing with other swords. Due to its unique smelting and forging methods, the beautiful patterns on the blade contained distinctive chemical compositions. Wounds inflicted by this sword would rapidly deteriorate and prove challenging to heal.

This image has an empty alt attribute; its file name is canyons.jpgIn ancient times, when medical science was not as advanced, even a minor wound could prove fatal to a soldier. Therefore, the reputation of the Central Asian Damascus Sword has endured throughout history. These ancient swords not only symbolize the beauty of blades but also carry the glory of history, intertwining human civilization with weapon craftsmanship.

This image has an empty alt attribute; its file name is 640-5-5.jpg

Third place is occupied by the Ancient Egyptian Khopesh Sword. Ancient Egypt, with its rich history and civilization, left behind magnificent pyramids and mysterious pharaohs' tombs. It also crafted some remarkable weapons, including the Khopesh sword.

This image has an empty alt attribute; its file name is Acne-alooivo.jpgThe Khopesh sword, also known as the Sickle sword, gets its name from the Egyptian term "Khopesh." It was a bronze sword widely used by the ancient Egyptians between 3000 BC and 1300 BC. The sword features an unusual and distinctive design, typically measuring around 50 to 60 centimeters in length. It combines the cutting effectiveness of a sword with the force of an axe, and its most eye-catching feature is its unique curved hook design.

This image has an empty alt attribute; its file name is 640-6-3.jpgThe design is believed to be intended for hooking an opponent's weapon or shield to restrict their movement. Once the enemy is disarmed, the sword wielder can deliver a lethal strike. However, the pain inflicted by a Khopesh sword piercing the body was excruciating and almost unbearable.

This image has an empty alt attribute; its file name is 640-7-3-1024x720.jpgIn addition to its battlefield utility, the Ancient Egyptian Khopesh sword also carried a symbolic meaning of high social status. In early ancient Egypt, figures like Ramesses II were depicted wielding this sword, turning it into a symbol of authority and political power, akin to a scepter representing rulership and leadership.

This image has an empty alt attribute; its file name is 640-8-3-1000x1024.jpgSecond place is claimed by the Russian Cossack Cavalry Saber. Russia is renowned for its warrior culture, and the Cossack cavalry represents one of its most fearless groups. The blades they wield are known as the "Eagle's Claw," making the Cossack Cavalry Saber a unique weapon globally.

This image has an empty alt attribute; its file name is 640-3-1-1024x745.pngThis remarkable weapon is crafted from sturdy high-carbon steel, with a blade approximately 90 centimeters in length. It has a wide back and a leaf-shaped tip, combining both aesthetics and ferocity. Its cutting power is outstanding, effortlessly slicing through enemies as if chopping wood. The Cossack cavalry, mounted on horseback and wielding this formidable blade, charged onto the battlefield, making significant contributions during Russia's expansion into Siberia. They are often referred to as the "Eagles of the Don River region."

This image has an empty alt attribute; its file name is 640-9-2.jpgThe Cossack Cavalry Saber has a long-standing tradition in Russian history and is forged from high-carbon steel, smelted using Central Asian iron ore. Its blade is wide and thick, forming a curved oak-leaf shape that occupies almost two-thirds of the blade, creating a deep blood groove, which imparts a unique curve and power to the blade. The hilt is in the shape of an eagle's head, typically made of wrapped copper, and the sword's balance is towards the rear of the blade.

This image has an empty alt attribute; its file name is 640-10-2.jpg

While the Cossack Cavalry Saber may not appear particularly striking in its scabbard, once wielded, its curved blade can easily cleave small trees and shatter wooden stakes, demonstrating its formidable chopping power. Additionally, the copper eagle head on the hilt serves not only as decoration but also as a practical element. In emergencies, it can be used as an effective weapon to stun an opponent or damage their armor.

Taking the first place is the Chinese Mò Dāo, particularly the Great Tang Divine Weapon Mò Dāo. The description in historical records of the Tang Dynasty Mò Dāo reads, "Where the Mò Dāo passes, both people and horses are shattered," highlighting the awe-inspiring reputation of this weapon.

The Mò Dāo can be considered the king of cold weapons, and its name is legendary among enthusiasts of such weapons.

This image has an empty alt attribute; its file name is 640-11-1-1024x681.jpg

The Mò Dāo displayed exceptional versatility on ancient battlefields, excelling in individual combat, city defense, and close-quarters fighting. Its history can be traced back to the Han Dynasty's "Zhǎn Mǎ Dāo," but it reached its pinnacle during the Tang Dynasty.

During the Tang Dynasty, the Mò Dāo became standard equipment in the Tang military. These blades were long, reaching up to one zhang (approximately 3.3 meters) in length, had double-edged blades, and weighed up to 15 catties (approximately 9 kilograms), demonstrating their formidable killing power.

In Tang Dynasty murals, soldiers wielding the Mò Dāo can be seen, and although the blade hung from their waist, it still surpassed the length of other swords. When you add the length of the hilt, it was about 8 to 9 feet long, designed to withstand cavalry charges. The Mò Dāo had a double edge, a thick and heavy back, and a sharp tip, making it highly effective for pursuing and killing enemies. Each swing was accompanied by the spectacle of "white blades like frost flying, and red blood flowing like stars."

This image has an empty alt attribute; its file name is %E4%BB%AA%E5%88%80-1024x709.jpg

Given the need to withstand the charges of cavalry, the Mò Dāo required exceptional toughness. It was made from high-quality steel to ensure it could bear heavy pressure without deformation, which also contributed to its relatively high manufacturing cost.

Li Sìyè, an advocate of the Mò Dāo, led a Mò Dāo unit, becoming a specialized Tang Dynasty soldier tasked with subduing the formidable Turkic cavalry.

This image has an empty alt attribute; its file name is 143-FXI-1024x818.jpg

The Mò Dāo unit became the forerunners of the infantry using double-edged long swords in Chinese military history, and they performed exceptionally well. Li Sìyè himself was tall and imposing, earning praise such as "When Sìyè wields the Mò Dāo, both people and horses are shattered."

However, due to the complex manufacturing process and high cost of the Mò Dāo, the government during the Tang Dynasty imposed strict regulations on its production and use.

This image has an empty alt attribute; its file name is 640-12-1.jpgEven emperors and generals were not allowed to bring the Mò Dāo into their tombs. Therefore, in modern archaeological excavations, it is challenging to find traces of the Mò Dāo. Although the Mò Dāo has vanished in the long river of history, it continues to be an object of longing and fascination for those interested in ancient cold weapons.


Prev Post
Next Post

Thanks for subscribing!

This email has been registered!

Shop the look

Choose Options

Swordier Official
Sign up for exclusive updates, new arrivals & insider only discounts

Recently Viewed

Edit Option
Back In Stock Notification
Terms & Conditions

Last updated: 02/23/2024

This Privacy Policy describes how Swordier Official (the "Site", "we", "us", or "our") collects, uses, and discloses your personal information when you visit, use our services, or make a purchase from (the "Site") or otherwise communicate with us (collectively, the "Services"). For purposes of this Privacy Policy, "you" and "your" means you as the user of the Services, whether you are a customer, website visitor, or another individual whose information we have collected pursuant to this Privacy Policy.

Please read this Privacy Policy carefully. By using and accessing any of the Services, you agree to the collection, use, and disclosure of your information as described in this Privacy Policy. If you do not agree to this Privacy Policy, please do not use or access any of the Services.

Changes to This Privacy Policy

We may update this Privacy Policy from time to time, including to reflect changes to our practices or for other operational, legal, or regulatory reasons. We will post the revised Privacy Policy on the Site, update the "Last updated" date and take any other steps required by applicable law.

How We Collect and Use Your Personal Information

To provide the Services, we collect and have collected over the past 12 months personal information about you from a variety of sources, as set out below. The information that we collect and use varies depending on how you interact with us.

In addition to the specific uses set out below, we may use information we collect about you to communicate with you, provide the Services, comply with any applicable legal obligations, enforce any applicable terms of service, and to protect or defend the Services, our rights, and the rights of our users or others.

What Personal Information We Collect

The types of personal information we obtain about you depends on how you interact with our Site and use our Services. When we use the term "personal information", we are referring to information that identifies, relates to, describes or can be associated with you. The following sections describe the categories and specific types of personal information we collect.

Information We Collect Directly from You

Information that you directly submit to us through our Services may include:

  • Basic contact details including your name, address, phone number, email.
  • Order information including your name, billing address, shipping address, payment confirmation, email address, phone number.
  • Account information including your username, password, security questions.
  • Shopping information including the items you view, put in your cart or add to your wishlist.
  • Customer support information including the information you choose to include in communications with us, for example, when sending a message through the Services.

Some features of the Services may require you to directly provide us with certain information about yourself. You may elect not to provide this information, but doing so may prevent you from using or accessing these features.

Information We Collect through Cookies

We also automatically collect certain information about your interaction with the Services ("Usage Data"). To do this, we may use cookies, pixels and similar technologies ("Cookies"). Usage Data may include information about how you access and use our Site and your account, including device information, browser information, information about your network connection, your IP address and other information regarding your interaction with the Services.

Information We Obtain from Third Parties

Finally, we may obtain information about you from third parties, including from vendors and service providers who may collect information on our behalf, such as:

  • Companies who support our Site and Services, such as Shopify.
  • Our payment processors, who collect payment information (e.g., bank account, credit or debit card information, billing address) to process your payment in order to fulfill your orders and provide you with products or services you have requested, in order to perform our contract with you.
  • When you visit our Site, open or click on emails we send you, or interact with our Services or advertisements, we, or third parties we work with, may automatically collect certain information using online tracking technologies such as pixels, web beacons, software developer kits, third-party libraries, and cookies.

Any information we obtain from third parties will be treated in accordance with this Privacy Policy. We are not responsible or liable for the accuracy of the information provided to us by third parties and are not responsible for any third party's policies or practices. For more information, see the section below, Third Party Websites and Links.

How We Use Your Personal Information

  • Providing Products and Services. We use your personal information to provide you with the Services in order to perform our contract with you, including to process your payments, fulfill your orders, to send notifications to you related to you account, purchases, returns, exchanges or other transactions, to create, maintain and otherwise manage your account, to arrange for shipping, facilitate any returns and exchanges and to enable you to post reviews.
  • Marketing and Advertising. We use your personal information for marketing and promotional purposes, such as to send marketing, advertising and promotional communications by email, text message or postal mail, and to show you advertisements for products or services. This may include using your personal information to better tailor the Services and advertising on our Site and other websites.
  • Security and Fraud Prevention. We use your personal information to detect, investigate or take action regarding possible fraudulent, illegal or malicious activity. If you choose to use the Services and register an account, you are responsible for keeping your account credentials safe. We highly recommend that you do not share your username, password, or other access details with anyone else. If you believe your account has been compromised, please contact us immediately.
  • Communicating with you. We use your personal information to provide you with customer support and improve our Services. This is in our legitimate interests in order to be responsive to you, to provide effective services to you, and to maintain our business relationship with you.


Like many websites, we use Cookies on our Site. For specific information about the Cookies that we use related to powering our store with Shopify, see We use Cookies to power and improve our Site and our Services (including to remember your actions and preferences), to run analytics and better understand user interaction with the Services (in our legitimate interests to administer, improve and optimize the Services). We may also permit third parties and services providers to use Cookies on our Site to better tailor the services, products and advertising on our Site and other websites.

Most browsers automatically accept Cookies by default, but you can choose to set your browser to remove or reject Cookies through your browser controls. Please keep in mind that removing or blocking Cookies can negatively impact your user experience and may cause some of the Services, including certain features and general functionality, to work incorrectly or no longer be available. Additionally, blocking Cookies may not completely prevent how we share information with third parties such as our advertising partners.

How We Disclose Personal Information

In certain circumstances, we may disclose your personal information to third parties for legitimate purposes subject to this Privacy Policy. Such circumstances may include:

  • With vendors or other third parties who perform services on our behalf (e.g., IT management, payment processing, data analytics, customer support, cloud storage, fulfillment and shipping).
  • With business and marketing partners, including Shopify, to provide services and advertise to you. We use Shopify to support personalized advertising with third-party services. Our business and marketing partners will use your information in accordance with their own privacy notices.
  • When you direct, request us or otherwise consent to our disclosure of certain information to third parties, such as to ship you products or through your use of social media widgets or login integrations, with your consent.
  • With our affiliates or otherwise within our corporate group, in our legitimate interests to run a successful business.
  • In connection with a business transaction such as a merger or bankruptcy, to comply with any applicable legal obligations (including to respond to subpoenas, search warrants and similar requests), to enforce any applicable terms of service, and to protect or defend the Services, our rights, and the rights of our users or others.

We have, in the past 12 months disclosed the following categories of personal information and sensitive personal information (denoted by *) about users for the purposes set out above in "How we Collect and Use your Personal Information" and "How we Disclose Personal Information":

Category Categories of Recipients
  • Identifiers such as basic contact details and certain order and account information
  • Commercial information such as order information, shopping information and customer support information
  • Internet or other similar network activity, such as Usage Data
  • Vendors and third parties who perform services on our behalf (such as Internet service providers, payment processors, fulfillment partners, customer support partners and data analytics providers)
  • Business and marketing partners
  • Affiliates

We do not use or disclose sensitive personal information for the purposes of inferring characteristics about you.

We have “sold” and “shared” (as those terms are defined in applicable law) personal information over the preceding 12 months for the purpose of engaging in advertising and marketing activities, as follows.

Category of Personal Information Categories of Recipients
Identifiers such as basic contact details and certain order and account information Business and marketing partners
Commercial information such as records of products or services purchased and shopping information Business and marketing partners
Internet or other similar network activity, such as Usage Data Business and marketing partners

User Generated Content

The Services may enable you to post product reviews and other user-generated content. If you choose to submit user generated content to any public area of the Services, this content will be public and accessible by anyone.

We do not control who will have access to the information that you choose to make available to others, and cannot ensure that parties who have access to such information will respect your privacy or keep it secure. We are not responsible for the privacy or security of any information that you make publicly available, or for the accuracy, use or misuse of any information that you disclose or receive from third parties.

Third Party Websites and Links

Our Site may provide links to websites or other online platforms operated by third parties. If you follow links to sites not affiliated or controlled by us, you should review their privacy and security policies and other terms and conditions. We do not guarantee and are not responsible for the privacy or security of such sites, including the accuracy, completeness, or reliability of information found on these sites. Information you provide on public or semi-public venues, including information you share on third-party social networking platforms may also be viewable by other users of the Services and/or users of those third-party platforms without limitation as to its use by us or by a third party. Our inclusion of such links does not, by itself, imply any endorsement of the content on such platforms or of their owners or operators, except as disclosed on the Services.

Children’s Data

The Services are not intended to be used by children, and we do not knowingly collect any personal information about children. If you are the parent or guardian of a child who has provided us with their personal information, you may contact us using the contact details set out below to request that it be deleted.

As of the Effective Date of this Privacy Policy, we do not have actual knowledge that we “share” or “sell” (as those terms are defined in applicable law) personal information of individuals under 16 years of age.

Security and Retention of Your Information

Please be aware that no security measures are perfect or impenetrable, and we cannot guarantee “perfect security.” In addition, any information you send to us may not be secure while in transit. We recommend that you do not use unsecure channels to communicate sensitive or confidential information to us.

How long we retain your personal information depends on different factors, such as whether we need the information to maintain your account, to provide the Services, comply with legal obligations, resolve disputes or enforce other applicable contracts and policies.

Your Rights and Choices

Depending on where you live, you may have some or all of the rights listed below in relation to your personal information. However, these rights are not absolute, may apply only in certain circumstances and, in certain cases, we may decline your request as permitted by law.

  • Right to Access / Know. You may have a right to request access to personal information that we hold about you, including details relating to the ways in which we use and share your information.
  • Right to Delete. You may have a right to request that we delete personal information we maintain about you.
  • Right to Correct. You may have a right to request that we correct inaccurate personal information we maintain about you.
  • Right of Portability. You may have a right to receive a copy of the personal information we hold about you and to request that we transfer it to a third party, in certain circumstances and with certain exceptions.
  • Right to Opt out of Sale or Sharing or Targeted Advertising. You may have a right to direct us not to "sell" or "share" your personal information or to opt out of the processing of your personal information for purposes considered to be "targeted advertising", as defined in applicable privacy laws. Please note that if you visit our Site with the Global Privacy Control opt-out preference signal enabled, depending on where you are, we will automatically treat this as a request to opt-out of the "sale" or "sharing" of information for the device and browser that you use to visit the Site.
  • Right to Limit and/or Opt out of Use and Disclosure of Sensitive Personal Information. You may have a right to direct us to limit our use and/or disclosure of sensitive personal information to only what is necessary to perform the Services or provide the goods reasonably expected by an average individual.
  • Restriction of Processing: You may have the right to ask us to stop or restrict our processing of personal information.
  • Withdrawal of Consent: Where we rely on consent to process your personal information, you may have the right to withdraw this consent.
  • Appeal: You may have a right to appeal our decision if we decline to process your request. You can do so by replying directly to our denial.
  • Managing Communication Preferences: We may send you promotional emails, and you may opt out of receiving these at any time by using the unsubscribe option displayed in our emails to you. If you opt out, we may still send you non-promotional emails, such as those about your account or orders that you have made.

You may exercise any of these rights where indicated on our Site or by contacting us using the contact details provided below.

We will not discriminate against you for exercising any of these rights. We may need to collect information from you to verify your identity, such as your email address or account information, before providing a substantive response to the request. In accordance with applicable laws, You may designate an authorized agent to make requests on your behalf to exercise your rights. Before accepting such a request from an agent, we will require that the agent provide proof you have authorized them to act on your behalf, and we may need you to verify your identity directly with us. We will respond to your request in a timely manner as required under applicable law.

We use Shopify's ad services such as Shopify Audiences to help personalize the advertising you see on third party websites. To restrict Shopify merchants that use these ad services from using your personal information for such services, visit


If you have complaints about how we process your personal information, please contact us using the contact details provided below. If you are not satisfied with our response to your complaint, depending on where you live you may have the right to appeal our decision by contacting us using the contact details set out below, or lodge your complaint with your local data protection authority.

International Users

Please note that we may transfer, store and process your personal information outside the country you live in, including the United States. Your personal information is also processed by staff and third party service providers and partners in these countries.

If we transfer your personal information out of Europe, we will rely on recognized transfer mechanisms like the European Commission's Standard Contractual Clauses, or any equivalent contracts issued by the relevant competent authority of the UK, as relevant, unless the data transfer is to a country that has been determined to provide an adequate level of protection.


Should you have any questions about our privacy practices or this Privacy Policy, or if you would like to exercise any of the rights available to you, please email us at

this is just a warning
Shopping Cart
0 items