▲ | neilv 13 hours ago | |
This kind of thing can be a useful tool, including for privacy&security use cases that the page doesn't mention. But be conscious and thoughtful when using it. Some terms to consider whether they apply to a particular use include "unauthorized access", "circumvention", and "theft of service". |