Terms of Use

Latest revision: 05 Jan 2021

Code of conduct

Run Kryptos@Home only on computers/devices that you own, or for which you have obtained the owner's permission. Some companies and schools have policies that prohibit using their computers/devices for projects such as Kryptos@Home.

You should not manipulate the task assignment logic to unfairly obtain a specific work unit (WU) and/or block any specific WUs (for the purpose of gaming the credit system).

You should not should suspend/abort a WU for any reason other than the ones enlisted below. Aborting WUs disrupts the project, since it takes longer for WUs to pass their deadline, get reassigned, and finally completed. The permitted reasons for suspending/aborting WUs are:

You should not use flags/switches to mislead the task assignment server.

You should not use any means to force client software - the official BOINC client, or otherwise - to download a WU that is not natively designed for the hardware on which the client runs.

You should not intentionally stop/pause client software - the official BOINC client, or otherwise - to manipulate the completion time or result upload time of work units.

You should not re-distribute Kryptos@Home files (such as work unit files, result files or application files).

You should not package Kryptos@Home files inside another software package.

You should not modify Kryptos@Home files, with the sole exception of legitimate, non-malicious use, via client software, such as the official BOINC client.

Utilization of volunteered computational resources

When you run Kryptos@Home on your computer/device, it will use part of the computer/device's CPU power, disk space, and network bandwidth. You can control how much of your resources are used by Kryptos@Home, and when it uses them.

The work done by your computer/device contributes to the goals of Kryptos@Home, as described on its web site. The application programs may change from time to time.

Privacy policy

Your account on Kryptos@Home is identified by a name that you choose. This name may be shown on the Kryptos@Home web site, along with a summary of the work your computer/device has done for Kryptos@Home. If you want to be anonymous, choose a name that doesn't reveal your identity.

If you participate in Kryptos@Home, information about your computer/device (such as its processor type, amount of memory, etc.) will be recorded by Kryptos@Home and used to decide what type of work to assign to your computer/device. This information will also be shown on Kryptos@Home's web site. Nothing that reveals your computer/device's location (e.g. its domain name or network address) will be shown.

To participate in Kryptos@Home, you must give an address where you receive email. This address will not be shown on the Kryptos@Home web site or shared with organizations. Kryptos@Home may send you periodic newsletters; however, you can opt out at any time.

Private messages sent on the Kryptos@Home web site are visible only to the sender and recipient. Kryptos@Home does not examine or police the content of private messages. If you receive unwanted private messages from another Kryptos@Home user, you may add them to your message filter. This will prevent you from seeing any public or private messages from that user.

If you use the Kryptos@Home forums, you must follow the posting guidelines. Messages posted to the Kryptos@Home forums are visible to everyone, including non-members. By posting to the forums, you are granting irrevocable license for anyone to view and copy your posts.

Safety

Any time you download a program through the Internet you are taking a chance: the program might have dangerous errors, or the download server might have been hacked. Kryptos@Home has made efforts to minimize these risks. We have tested our applications carefully. Our servers are behind a firewall and are configured for high security. To ensure the integrity of program downloads, all executable files are digitally signed on a secure computer/device.

The applications run by Kryptos@Home may cause some computers/devices to overheat. If this happens, stop running Kryptos@Home or use a utility program that limits CU usage.

BOINC was developed at the University of California. Kryptos@Home was developed independently of BOINC, by a team not associated with either BOINC, or the University of California in any way whatsoever.

Liability

Kryptos@Home, the Kryptos@Home Team, and BOINC assume no liability for damage to your computer/device, loss of data, or any other event or condition that may occur as a result of participating in Kryptos@Home.

Other BOINC projects

Other projects use the same platform, BOINC, as Kryptos@Home. You may want to consider participating in one or more of these projects, in addition to participating in Kryptos@Home.

These other projects are not associated with Kryptos@Home, and we cannot vouch for their security practices or the nature of their research. Join them at your own risk.

Computation results

By participating in Kryptos@Home, you agree to donate computing power to the advancement of science, as a direct consequence of attempting to solve a decades-old puzzle.

In the event of a successful discovery of solution (see below for what constitutes a successful discovery) to the fourth Kryptos puzzle (K4), via a work unit which your computer/device successfully completed, you agree that:

A successful discovery of solution to K4 is one which has been verified by:

Kryptos@Home applications

We may occasionally use solved or unsolved puzzles, other than Kryptos, for the purpose of validation and/or calibration of some of our algorithms.

For the purpose of full disclosure and transparency, the full list of such puzzles will be maintained on our dedicated page.



©2021 Kryptos@Home