Acceptable Use Policy
Last Updated: 2/19/2026
1. Purpose
This Acceptable Use Policy ("AUP") defines prohibited uses of OpenSSD. Violation of this policy may result in immediate account termination, content removal, and legal action.
2. General Prohibitions
YOU MAY NOT use this service to:
2.1 Illegal Activities
- Violate any local, state, national, or international law
- Distribute illegal content
- Facilitate criminal activity
- Evade law enforcement
- Money laundering or financial fraud
2.2 Intellectual Property Infringement
- Upload copyrighted material without authorization
- Distribute pirated software, movies, music, or books
- Share cracked software or license keys
- Distribute trademark-infringing content
- Share trade secrets or confidential information without authorization
2.3 Malicious Content
- Upload or distribute malware, viruses, trojans, ransomware, or spyware
- Share exploit code or hacking tools for malicious purposes
- Distribute keyloggers or remote access tools
- Host phishing kits or credential stealers
- Share zero-day exploits for illegal purposes
2.4 Harmful or Objectionable Content
- Child sexual abuse material (CSAM) - ZERO TOLERANCE
- Content depicting violence or harm to minors
- Terrorist content or recruitment materials
- Content promoting violence, hatred, or discrimination
- Graphic violence or gore
- Non-consensual intimate images
2.5 Privacy Violations
- Share personal information without consent (doxxing)
- Distribute stolen databases or data breaches
- Share medical records or private communications without authorization
- Upload surveillance or secretly-recorded content
2.6 Spam and Abuse
- Mass unsolicited distribution of files
- Email spam or phishing campaigns
- Automated bulk uploads
- Creating multiple accounts to evade limits
- Selling or transferring accounts
2.7 System Abuse
- Attempt to bypass rate limits or quotas
- Probe, scan, or test system vulnerabilities without authorization
- Interfere with service operation or other users
- Launch denial-of-service attacks
- Reverse engineer or decompile the service
- Scrape or harvest data using automated tools
2.8 Misrepresentation
- Impersonate another person or entity
- Misrepresent affiliation with any organization
- Use misleading file names to deceive users
- Distribute fake or manipulated content as authentic
3. Specific Restrictions
3.1 File Types
Executable files and scripts may be blocked or subject to enhanced scanning. Large files (>75MB) are restricted to static file types only (images, videos, documents, archives).
3.2 Commercial Use
Commercial use is permitted with the following restrictions:
- No mass distribution platforms or file lockers
- No premium link generators or pay-per-download schemes
- No hosting services or CDN use
- Respect rate limits and quotas
3.3 Bandwidth Abuse
- Do not use as a CDN for high-traffic websites
- Do not hotlink to files from high-traffic pages
- Do not use for video streaming services
- Excessive bandwidth usage may result in throttling or blocking
4. Security Scanning
All uploaded files are subject to automated security scanning including:
- YARA malware detection
- Polyglot file format detection
- Steganography analysis
- Content entropy analysis
- Magic byte validation
Files flagged as malicious (threat score ≥50) will be automatically blocked.
5. Enforcement
5.1 Detection Methods
We detect violations through:
- Automated security scanning
- User reports
- DMCA notices
- Law enforcement requests
- Manual review
5.2 Actions We May Take
Upon detecting violations, we may:
- Remove content immediately without notice
- Suspend or terminate your account
- Block your IP address
- Report to law enforcement
- Preserve evidence for legal proceedings
- Take legal action against you
5.3 No Warning Required
WE ARE NOT REQUIRED TO PROVIDE WARNING BEFORE TAKING ACTION. Severe violations (CSAM, malware, terrorism) will result in immediate termination and reporting to authorities.
6. DMCA and Copyright
We comply with the Digital Millennium Copyright Act (DMCA). See our DMCA Policy for details. Repeat copyright infringers will have their accounts permanently terminated.
7. Legal Cooperation
We cooperate with law enforcement and legal authorities. We will:
- Respond to valid subpoenas and court orders
- Preserve evidence when legally required
- Report CSAM to the National Center for Missing & Exploited Children (NCMEC)
- Report terrorist content to appropriate authorities
- Provide user information when legally compelled
8. User Responsibility
YOU ARE SOLELY RESPONSIBLE FOR:
- Ensuring your content complies with this AUP
- Obtaining necessary rights and permissions
- Compliance with applicable laws
- Content shared by others using your account or links
- Monitoring files you share publicly
9. No Monitoring Obligation
WE ARE NOT OBLIGATED TO MONITOR CONTENT. We do not pre-screen uploads. Automated scanning is for our protection, not a guarantee of content safety or legality.
10. Reporting Violations
To report violations of this AUP, contact us through the service interface or use our DMCA process for copyright issues.
False reports may result in action against your account.
11. Examples of Acceptable Use
Appropriate uses include:
- Sharing your own original content
- Distributing open-source software
- Sharing public domain materials
- Transferring files with proper authorization
- Legitimate research or educational purposes
- Backup of your own data (subject to quotas)
12. Changes to This Policy
We reserve the right to modify this AUP at any time. Continued use after changes constitutes acceptance. We may add new restrictions or prohibitions without notice.
13. No Liability
WE ARE NOT LIABLE FOR:
- User content or violations by users
- False positives in security scanning
- Failure to detect violations
- Actions taken to enforce this policy
- Damages resulting from content removal or account termination
⚠️ ZERO TOLERANCE: CSAM, terrorism content, and malware distribution will result in IMMEDIATE PERMANENT BAN and REPORTING TO LAW ENFORCEMENT. No exceptions.
When in doubt, don't upload it. If you're unsure whether content is acceptable, contact us first or refrain from uploading.