Skip to content

Security of the provided Service

Under no circumstances may you exploit the Service in order to:

  • Gain unauthorized access to parts of the provided Offering that are restricted.
  • Intercept (passively or actively) a data flow of the provided Service/ Offering that is restricted.
  • Falsify or forge security mechanisms of the provided Service/ Offering. This includes forging protocol headers (e.g., IP, TCP or UDP) and the illegitimate use of the provided Service/ Offering to hide certain activities (e.g., using a proxy or providing a pseudonymous or anonymous network node through the provided Service/ Offering).
  • Usage of the provided Service/ Offering to publish, send or facilitate the sending of unsolicited mass e-mail or other messages, promotions, advertising, or solicitations ("spam"), including commercial advertising and informational announcements.
  • Access or diminish resources (computational, storage or otherwise) of other users of the provided Service/ Offering.

Last update: January 22, 2024