Legal · AUP

Acceptable Use Policy

What we will not provide infrastructure for.

You agree not to use Beacons to

  • Send unsolicited commercial communications (spam).
  • Operate command and control infrastructure for malware.
  • Conduct attacks against third parties (DDoS, credential stuffing, etc.).
  • Violate sanctions law or export controls.
  • Process content that is illegal in the jurisdictions where the relevant peers operate.
  • Knowingly facilitate human rights abuses.
  • Misrepresent the identity of a peer, fleet, or operator.

Enforcement

Violations are evaluated on a case-by-case basis. We will typically reach out before taking action. Account suspension and termination are last resorts but available.

Reporting abuse

Email abuse@beacons.sh with details. We respond within 24 hours.

Open a fleet

The mesh that fits agents and humans.

A `did:oas`-rooted private mesh that ships peer configurations to any device, anywhere, by policy — not by hand.

Open consoleRead the quickstart