Privacy Statement |
|
|
Terms & Conditions |
|
|
Donation Terms and Conditions
By making a donation to The De-Extinction Company (“we,” “us,” or “our”), you agree to the following terms and conditions:
- Purpose of Donations: Donations made to The De-Extinction Company are intended to support our pioneering project, to reintroduce the Dodo. While we strive to achieve the goals set for this cause/project, we cannot guarantee that a specific fundraising target will be reached or that the desired outcomes will be fully realized.
- Use of Funds: All donations received will be used at our discretion for the stated purpose. In the event that the fundraising goal is not met or if there are excess funds after the goal is achieved, we reserve the right to allocate the funds to related projects or general support for The De-Extinction Company.
- Refunds: Donations are non-refundable. Once a donation is made, it cannot be cancelled or returned except in the event of fraud or error in the amount donated.
- Acknowledgment of Donations: Via Paypal as our donation portal, it will provide an acknowledgment of your donation via email. This acknowledgment will serve as your receipt for tax purposes if applicable. Please consult with a tax professional regarding the deductibility of your donation.
- Privacy: Your personal information will be handled in accordance with our Privacy Policy. We are committed to protecting your privacy and will not share your personal information with third parties without your consent, except as required by law.
- Changes to Terms and Conditions: We reserve the right to make changes to these terms and conditions at any time. Any changes will be posted on our website, and continued donations after such changes will constitute your acceptance of the new terms and conditions.
- Limitation of Liability: To the fullest extent permitted by law, The De-Extinction Company shall not be liable for any loss or damage arising from or in connection with your donation, including any indirect, incidental, consequential, or punitive damages.
By making a donation, you acknowledge that you have read, understood, and agreed to these terms and conditions.
Thank you for your generous support!
DODO@Home Security & Legal Overview
Your computer gets a set of tasks from the dodo@home server. You have full control over when tasks are assigned. For instance, you can restrict the times of day or suspend tasks when you’re using the computer or running on battery power.
Your computer downloads the necessary files and analyzes the data in the background.
When complete, your computer uploads the results to the server and assigns you credit for the work completed.
Legal & Security
- Usage Rules for Volunteers. Only run the software on computers that you own, or for which you have obtained the owner’s permission.
- Computer Resources Used. The software will use part of the computer’s CPU power, disk space and network bandwidth. You can control how much of your resources are used, and when it uses them.
- Privacy Policy. To avoid computing while you’re typing, the software monitors mouse and keyboard activity. It does not record keystrokes. This may trigger some anti-virus software.
- Your account on the dodo@home project is identified by a name that you choose. This name may be shown on the project’s web site, along with a summary of the work your computer has done for the project. If you want to be anonymous, choose a name that doesn’t reveal your identity.
- Information about your computer (such as its processor type, amount of memory, etc.) will be recorded by the project and used to decide what type of work to assign to your computer. This information will also be shown on the project’s web site. Nothing that reveals your computer’s location (e.g. its domain name, network address or physical location) will be visible to anyone but you.
- To participate in dodo@home, you must provide a legitimate email address. This address will not be shown on the project’s web site or shared with organizations. The project may send you periodic newsletters; however, you can choose not to be sent these at any time.
Liability.
- The BOINC project, the University of California and the De-Extinction Company assume no liability for damage to your computer, loss of data, or any other event or condition that may occur as a result of participating in dodo@home.
- THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Security Overview.
- BOINC downloads programs and data over the Internet and runs them on your computer. You may be concerned that BOINC could be exploited by hackers to run malware on your computer (“malware” is software that does malicious things such as stealing private data).
- Is BOINC safe? The short answer: in practice, yes. After 16 years, running on millions of computers, there have been no security incidents due to BOINC. However, the lack of incidents does not mean that none are possible. All software has security risks, and BOINC is no exception.
Security Measures.
- Code Signing. BOINC uses a mechanism called code signing that protects you in the event that the project servers are compromised and someone tries to add malware to the files that are downloaded to your computer.
- Code signing is based on public-key cryptography. Each project has a code-signing key pair consisting of a public key and a private key. The public key is sent to your client when you add the project. The private key is used to create “signatures” for programs. The BOINC client will only run programs with valid signatures.
- The private key is kept on a computer that is never connected to a network, and that is physically secure. This computer is used to create signatures. This means hackers cannot sign malware, even if they break into the project’s server. Therefore they cannot trick BOINC into running malware.
- Account-based Sandboxing. BOINC’s second line of defense is called account-based sandboxing. Operating systems (Windows, Mac OS X, Linux) have a notion of user accounts. Each file and program is associated with a user account. An unprivileged account is one that has access only to its own files; a program running under such an account is not able to access or modify any other data on the computer.
- BOINC can be configured to use account-based sandboxing – that is, to run project applications under an unprivileged account. This is the default on Android, Mac OS X and on the installers provided by Linux distributions. Currently, it is not the default on Windows because GPU applications can’t run under unprivileged accounts. However, you can enable it on Windows by checking the Protected execution mode or Service install box during installation (depending on the version of BOINC).
- BOINC Software Download Security. The BOINC software is created, maintained and distributed by the University of California at Berkeley. They methods they use to ensure the security of the BOINC software installers is detailed below.
- On Windows, you are protected from this by another form of code signing. When you run the BOINC installer on Windows, the first thing you should see is an “Open File – Security Warning” window. This window verifies that the installer is valid. If you do not see such a window, do not install the software.
- On Mac OS 10.8 and later, you can select your security settings in System Preferences to allow running only applications from the App store or those signed by trusted developers registered with Apple. BOINC installers for the Mac are code signed with credentials provided by Apple, so OS X will accept them after warning you they have been downloaded from the Internet (as long as you have set your security preferences in this way.)
- On Linux, code signing is not used.