Security of the provided Service¶
Under no circumstances may you exploit the Service in order to:
- Gain unauthorized access to parts of the provided Offering that are restricted.
- Intercept (passively or actively) a data flow of the provided Service/ Offering that is restricted.
- Falsify or forge security mechanisms of the provided Service/ Offering. This includes forging protocol headers (e.g., IP, TCP or UDP) and the illegitimate use of the provided Service/ Offering to hide certain activities (e.g., using a proxy or providing a pseudonymous or anonymous network node through the provided Service/ Offering).
- Usage of the provided Service/ Offering to publish, send or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations ("spam"), including commercial advertising and informational announcements.
- Access or diminish resources (computational, storage or otherwise) of other users of the provided Service/ Offering.
Last update: January 22, 2024