Skip to content

Commit

Permalink
Updated20241114172627
Browse files Browse the repository at this point in the history
  • Loading branch information
PIKACHUIM committed Nov 14, 2024
1 parent c7704f3 commit 7617b15
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 131 deletions.
67 changes: 2 additions & 65 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,71 +28,8 @@ There are some leaked EV code signature certificates online, which can be used t

**This article involves network security experiments. Reading this article means that you have read, fully understood, and committed to complying with all the following terms and conditions:**

> <details>
> <summary><strong><red>"Implementing Pseudo Signature with Self-Sign Timestamp Servers" Disclaimers - English</red></strong></summary>
> <p><strong>Welcome to research and conduct the experiment on &quot;Implementing Pseudo Signature with Self-Sign Timestamp Servers&quot;</strong> </p>
> <p>Before using this experiment, <em><u>Please carefully read and agree to the following disclaimer license terms</u>.</em> </p>
> <p><strong>Continuing means that you agree to all the terms</strong>. <em>If you do not agree with any content of this license term,</em> </p>
> <p><em><u>Please immediately stop conducting this experiment and delete all content and its derivative data</u>.</em></p>
> <ol start=''>
> <li>
> <h6 id='explanation-of-terms'>Explanation of Terms</h6>
> <ol>
> <li>&quot;Experimental Content&quot;: This includes the technology (including but not limited to code, files, steps) and its derivative content provided by this website experiment.</li>
> <li>&quot;Violation of laws and regulations&quot;: refers to a violation of the relevant laws and regulations mentioned in this agreement and in your country or region, as well as their relevant provisions.</li>
> <li>&quot;Author&quot;: The provider of this experimental technology, including the creator of this document, website provider, and other assistance providers.</li>
> <li>&quot;User&quot;: The subject who uses the technology provided in this experiment (including but not limited to: code, files, steps) and its derivative content.</li>
> </ol>
> </li>
> <li>
> <h6 id='experimental-purpose'>Experimental Purpose</h6>
> <ol>
> <li>This experiment aims to provide practical learning and technical research on network security technology.</li>
> </ol>
> <ol start='2'>
> <li>This experiment is only for individuals or groups to conduct non commercial technological exploration.</li>
> </ol>
> </li>
> </ol>
> <ol start='2'>
> <li>
> <h6 id='usage-restrictions'>Usage Restrictions</h6>
> <ol>
> <li>You promise that the principles of this experiment will only be used for experiments and safety technology testing and technical experiments, and will not be used in confidential or important production environments.</li>
> <li>You are not allowed to use it for any activities that violate laws and regulations, including but not limited to criminal behavior, fraud, damage to computer information systems, etc.</li>
> </ol>
> </li>
> <li>
> <h6 id='legal-compliance'>Legal Compliance</h6>
> <ol>
> <li>You comply with the Cybersecurity Law of the People&#39;s Republic of China and are not allowed to use any technology on this website for illegal or criminal activities.</li>
> <li>You shall comply with Article 286 (1) of the Criminal Law of the People&#39;s Republic of China and shall not use any technology on this website to damage the computer information system.</li>
> <li>You shall comply with Article 32 of the Electronic Signature Law of the People&#39;s Republic of China and shall not use any technology of this website to forge, impersonate, or embezzle the electronic signature of others</li>
> <li>You shall comply with the laws and regulations of China and other countries and regions where you are located, and shall not use any technology on this website to violate laws and regulations, or cause problems or losses to any other individual or group.</li>
> </ol>
> </li>
> <li>
> <h6 id='disclaimer'>Disclaimer</h6>
> <ol>
> <li>This experiment is only for technical and safety technical testing purposes and is not responsible for the user&#39;s behavior</li>
> <li>The principles of this experiment are published on Github and can be freely accessed and used by anyone. The author is not responsible for the user behavior of the experiment.</li>
> <li>The principle of this experiment may have technical, safety, or other issues, and users are required to bear the risk of use and take necessary safety measures to protect their own and others&#39; interests.</li>
> <li>The author shall not be liable for any direct or indirect losses arising from the use of the principles of this experiment, including but not limited to profit losses, data losses, business interruptions, etc.</li>
> <li>This website reserves the right to interrupt or terminate this service at any time without prior notice to users.</li>
> </ol>
> </li>
> <li>
> <h6 id='violations'>Violations</h6>
> <ol>
> <li>If you violate any of the above terms, you will fully and independently bear any legal and other responsibilities and consequences that may arise</li>
> </ol>
> <p>&nbsp;</p>
> <p>Please carefully read and understand the above disclaimer terms before using this service.</p>
> <p>If you agree and accept the above terms, please continue to use this experiment.</p>
> <p>If you have any questions or need further explanation, please contact us.</p>
> </li>
> </ol>
> </details>
> <details><summary><strong><red>"Drivers Signning with Self-Sign Fake Timestamp Servers" Disclaimers - English</red></strong></summary><p><strong>Welcome to research and conduct the experiment on &quot;Drivers Signning with Self-Sign Fake Timestamp Servers&quot;</strong></p><p>Before using this experiment,<em><u>Please carefully read and agree to the following disclaimer license terms</u>.</em></p><p><strong>Continuing means that you agree to all the terms</strong>.<em>If you do not agree with any content of this license term,</em></p><p><em><u>Please immediately stop conducting this experiment and delete all content and its derivative data</u>.</em></p><ol start=''><li><h6 id='explanation-of-terms'>Explanation of Terms</h6><ol><li>&quot;Experimental Content&quot;: This includes the technology (including but not limited to code, files, steps) and its derivative content provided by this website experiment.</li><li>&quot;Violation of laws and regulations&quot;: refers to a violation of the relevant laws and regulations mentioned in this agreement and in your country or region, as well as their relevant provisions.</li><li>&quot;Author&quot;: The provider of this experimental technology, including the creator of this document, website provider, and other assistance providers.</li><li>&quot;User&quot;: The subject who uses the technology provided in this experiment (including but not limited to: code, files, steps) and its derivative content.</li></ol></li><li><h6 id='experimental-purpose'>Experimental Purpose</h6><ol><li>This experiment aims to provide practical learning and technical research on network security technology.</li></ol><ol start='2'><li>This experiment is only for individuals or groups to conduct non commercial technological exploration.</li></ol></li></ol><ol start='2'><li><h6 id='usage-restrictions'>Usage Restrictions</h6><ol><li>You promise that the principles of this experiment will only be used for experiments and safety technology testing and technical experiments, and will not be used in confidential or important production environments.</li><li>You are not allowed to use it for any activities that violate laws and regulations, including but not limited to criminal behavior, fraud, damage to computer information systems, etc.</li></ol></li><li><h6 id='legal-compliance'>Legal Compliance</h6><ol><li>You comply with the Cybersecurity Law of the People&#39;s Republic of China and are not allowed to use any technology on this website for illegal or criminal activities.</li><li>You shall comply with Article 286 (1) of the Criminal Law of the People&#39;s Republic of China and shall not use any technology on this website to damage the computer information system.</li><li>You shall comply with Article 32 of the Electronic Signature Law of the People&#39;s Republic of China and shall not use any technology of this website to forge, impersonate, or embezzle the electronic signature of others</li><li>You shall comply with the laws and regulations of China and other countries and regions where you are located, and shall not use any technology on this website to violate laws and regulations, or cause problems or losses to any other individual or group.</li></ol></li><li><h6 id='disclaimer'>Disclaimer</h6><ol><li>This experiment is only for technical and safety technical testing purposes and is not responsible for the user&#39;s behavior</li><li>The principles of this experiment are published on Github and can be freely accessed and used by anyone. The author is not responsible for the user behavior of the experiment.</li><li>The principle of this experiment may have technical, safety, or other issues, and users are required to bear the risk of use and take necessary safety measures to protect their own and others&#39; interests.</li><li>The author shall not be liable for any direct or indirect losses arising from the use of the principles of this experiment, including but not limited to profit losses, data losses, business interruptions, etc.</li><li>This website reserves the right to interrupt or terminate this service at any time without prior notice to users.</li></ol></li><li><h6 id='violations'>Violations</h6><ol> <li>If you violate any of the above terms, you will fully and independently bear any legal and other responsibilities and consequences that may arise</li></ol><p>&nbsp;</p><p>Please carefully read and understand the above disclaimer terms before using this service.</p><p>If you agree and accept the above terms, please continue to use this experiment.</p><p>If you have any questions or need further explanation, please contact us.</p></li></ol></details>
>
>
> <details>
> <summary><strong><red>《自建时间戳服务器实现伪签名驱动证书》免责声明 - 简体中文</red></strong></summary>
Expand Down
Loading

0 comments on commit 7617b15

Please sign in to comment.