[ EXECUTION_RULES_v1.0 ]
Violation results in immediate service termination.
The network shall not be used to store, host, or transmit materials that are ILLEGAL under any jurisdiction. This includes, but is not limited to: unlicensed copyrighted content, CSAM, or tools designed for financial fraud.
Users are strictly PROHIBITED from using our nodes for:
Our infrastructure is a "Clean Signal" zone. Sending UNSOLICITED BULK EMAIL (SPAM) is grounds for permanent account blacklisting. This includes the hosting of "link-farms" or sites intended to facilitate spamming activities.
Users must not execute processes that intentionally degrade the hardware performance for other counterparties on the shared grid (e.g., unauthorized crypto-mining on non-dedicated CPU nodes).
If utilizing the network for VPN or Proxy tunneling, the counterparty is responsible for all exit-traffic. You must not use our infrastructure to bypass geographical restrictions of streaming services in violation of their ToS, or to mask identity for the purpose of HARASSMENT or stalking.
We are respecting the digital rights of creators. Hosting or distributing pirated software, "cracks," or unauthorized media is a breach of protocol. Upon receipt of a valid DMCA Takedown Notice, access to the infringing node will be suspended until the conflict is resolved.
The hosting of Command and Control (C2) servers for botnets is strictly TERMINATED ON SIGHT. Any attempt to use our resources to manage a fleet of compromised "zombie" devices will result in an immediate report to the relevant cyber-defense authorities.
Forging or misrepresenting network headers or IP addresses to hide the origin of traffic (IP Spoofing) is prohibited. All outgoing packets must represent the true assigned identity of the source node.
Aggressive web scraping that ignores `robots.txt` protocols or causes service degradation to third-party targets is not permitted. High-frequency scraping must be throttled to prevent being flagged as a MALICIOUS AGENT.