Read our rules and policies

Run only on authorized computers

Run only on computers that you own, or for which you have obtained the owner's permission. Some companies and schools have policies that prohibit using their computers for projects such as

How will use your computer

When you run on your computer, it will use part of the computer's CPU power, disk space, and network bandwidth. You can control how much of your resources are used by, and when it uses them.

The work done by your computer contributes to the goals of, as described on its web site. The application programs may change from time to time.

Privacy policy

Your account on is identified by a name that you choose. This name may be shown on the web site, along with a summary of the work your computer has done for If you want to be anonymous, choose a name that doesn't reveal your identity.

If you participate in, information about your computer (such as its processor type, amount of memory, etc.) will be recorded by and used to decide what type of work to assign to your computer. This information will also be shown on's web site. Nothing that reveals your computer's location (e.g. its domain name or network address) will be shown.

To participate in, you must give an address where you receive email. This address will not be shown on the web site or shared with organizations. may send you periodic newsletters; however, you can opt out at any time.

Private messages sent on the web site are visible only to the sender and recipient. does not examine or police the content of private messages. If you receive unwanted private messages from another user, you may add them to your message filter. This will prevent you from seeing any public or private messages from that user.

If you use our web site forums you must follow the posting guidelines. Messages posted to the forums are visible to everyone, including non-members. By posting to the forums, you are granting irrevocable license for anyone to view and copy your posts.

Is it safe to run

Any time you download a program through the Internet you are taking a chance: the program might have dangerous errors, or the download server might have been hacked. has made efforts to minimize these risks. We have tested our applications carefully. Our servers are behind a firewall and are configured for high security. To ensure the integrity of program downloads, all executable files are digitally signed on a secure computer not connected to the Internet.

The applications run by may cause some computers to overheat. If this happens, stop running or use a utility program that limits CPU usage. was developed by africa@home. BOINC was developed at the University of California.

Liability and africa@home assume no liability for damage to your computer, loss of data, or any other event or condition that may occur as a result of participating in

Other BOINC projects

Other projects use the same platform, BOINC, as You may want to consider participating in one or more of these projects. By doing so, your computer will do useful work even when has no work available for it.

These other projects are not associated with, and we cannot vouch for their security practices or the nature of their research. Join them at your own risk.

Return to main page

Copyright © 2015 africa@home