Keybase Acceptable Use Policy
Effective: July 23, 2021 (previous update December 4, 2020)
When you use the Keybase Services, you may not, nor may you encourage or assist any third party to:
- reproduce, modify, alter, tamper with, repair or create derivative works of any Software, unless that permission is granted in our open source licenses;
- use the Services in any manner that could damage, disable, overburden, or impair the Services (or any network connected to the Services), interfere with any other party’s use of the Services, or use any device, software or routine that causes the same;
- sell, lend, rent, resell, lease, sublicense or otherwise transfer any of the rights granted to you with respect to the Services to any third party, unless our open source licenses permit you to do so;
- use, reproduce or remove any copyright, trademark, trade names, slogan, logos, images, service marks, fonts or other proprietary notations displayed on or through the Services;
- remove, obscure or alter any proprietary rights notice pertaining to the Services;
- use the services in a way that is inconsistent with our open source licenses;
- use the Services in connection with the operation of nuclear facilities, aircraft navigation, communication systems, medical devices, air traffic control devices, real time control systems or other situations in which the failure of the Services could lead to death, personal injury, or physical property or environmental damage;
use the Services to store or transmit any inappropriate content, such as content that is, contains or promotes:
- child sexual exploitation material;
- counterfeit goods and services;
- illegal drugs and controlled substances;
- human smuggling or trafficking;
- products made from endangered or protected species;
- sexual services;
- sexual content in avatars or profiles;
- unauthorized multi-level marketing businesses;
- stolen goods;
- weapons, including firearms, ammunition, and explosives, instructions on making weapons (e.g., bombs, 3D printed guns, etc.);
- unlawful or fraudulent activity or hoaxes;
- phishing schemes, forgery or other similar falsification or manipulation of data;
- unsolicited or unauthorized junk mail, spam, chain letters, pyramid schemes or any other form of duplicative or unsolicited messages, whether commercial or otherwise;
- violations of the legal rights of another person or organization;
- private information of another person without their express permission;
- violations or infringement of the intellectual property rights, or the privacy or publicity rights of any person or entity, or that may otherwise be unlawful or give rise to civil or criminal liability;
- a denial of service attack, software viruses or other harmful or deleterious computer code, files or programs such as Trojan horses, worms, time bombs, cancelbots, or spyware; or
- illegal, unlawful, defamatory, threatening, harassing, abusive, libelous or otherwise objectionable material of any kind or nature,
circumvent, remove, alter, deactivate, degrade or thwart any technological or security measure or content protections of the Services;
- access or attempt to access Keybase’s other accounts, computer systems or networks through password mining or any other means; or
- use the Services in any manner or for any purpose that is inconsistent with this Acceptable Use Policy, the Terms of Service, the Privacy Policy, any User Guides or any other policy, instruction or terms applicable to the Services that are available on the Services.