mining cryptocurrencies or using Shadow's® computing power to break encryption keys;</li> <li>sending unwanted messages, promotions or advertising, or spam, or modified, misleading or false source identification information, including by spoofing or techniques known as phishing techniques, and in general, taking the identity of any other person whatsoever;</li> <li>