VOIDPOST exists for lawful personal time-capsule use. You may not use it to harm other people, commit fraud, test abusive automation, store prohibited content, or interfere with the platform, its operators, vendors, or other users.
This policy is enforced together with the Terms, Privacy Policy, payment-provider rules, and any mandatory legal requirements.
Prohibited activity
You may not use the service for spam, phishing, fraud, social engineering, impersonation, stalking, harassment, hate, extortion, blackmail, threats, doxxing, malware, unauthorized surveillance, revenge content, deceptive conduct, copyright infringement, or any unlawful, tortious, or abusive activity.
You may not use the service to store or send content intended to evade law enforcement, conceal criminal activity, facilitate self-harm instructions, distribute malicious payloads, or target another person's systems, reputation, privacy, finances, or safety.
Recipient and identity restrictions
The service is designed for personal delayed messages to yourself using your own account and delivery details. You may not use the service to target unrelated third parties, harvest addresses, test whether another person's inbox exists, or bypass consent expectations.
You are responsible for ensuring that all submitted identity and delivery information is accurate and lawfully used. Misaddressed orders, impersonation attempts, and identity misuse may be blocked or cancelled without refund.
Security restrictions
You may not probe, scan, scrape, overload, reverse engineer, decompile, benchmark abusively, bypass rate limits, circumvent anti-fraud controls, tamper with checkout state, replay payment events, attack encryption workflows, or attempt unauthorized access to any account, endpoint, secret, database, worker, or admin interface.
You may not use vulnerability scanners, bots, scripts, headless browsers, or any other tools against the service in a way that creates risk, instability, noise, fraud signals, or operational burden unless you have explicit prior written permission.
Automation and bulk behavior
Automated usage that creates excessive load, unusual purchase patterns, repeated failed requests, synthetic traffic, fake accounts, or payment noise may be rate-limited, blocked, or treated as abuse. The service may also restrict repetitive, high-velocity, or suspicious actions even where they are not clearly illegal.
You may not use the service as a backend, relay, testing farm, scraping target, or mass-notification mechanism without explicit authorization.
Content responsibility
You remain solely responsible for all text and data submitted through the service. Do not submit content that is illegal, defamatory, threatening, sexually exploitative, privacy-invasive, infringing, fraudulent, abusive, or otherwise harmful.
We are not obligated to monitor every message in advance, but we may take action when we detect or reasonably suspect prohibited content, technical abuse, payment abuse, or other rule violations.
Investigations and evidence preservation
We may investigate suspected violations using logs, payment records, technical metadata, delivery records, complaints, and other available evidence. We may preserve content, metadata, or account history where reasonably necessary for dispute handling, abuse response, legal compliance, security remediation, or cooperation with vendors and authorities.
You must not interfere with an investigation, provide false statements, destroy evidence under your control, or attempt to re-enter the service through alternate accounts while a restriction or review is active.
Enforcement actions
We may issue warnings, rate-limit activity, cancel orders, refuse delivery, disable reveal access, suspend or terminate accounts, preserve logs, report activity, cooperate with payment providers or infrastructure vendors, and take any other action we reasonably consider necessary to protect the service, our rights, third parties, or the public.
Enforcement may occur with or without prior notice and with or without a refund where permitted by law and consistent with payment-provider rules, security obligations, and abuse-prevention needs.