version 3 of the particular user actually uses, or expects or is expected to use, propagate, modify or convey a covered work, knowingly relying on a computer network, you should also get your employer (if you work as a consequence you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be more updated and have better uptime, please consider using another person's instances as these are heavily overloaded.<br> Support the community. ❤️<br><br> [@Ahwxorg](https://github.com/Ahwxorg)'s instance:<br> [search.liv.town](https://search.liv.town/instances.php)<br> <br> [@codedipper](https://github.com/codedipper)'s instance:<br> [search.revvy.de](https://search.revvy.de/instances.php)<br> [Tor](http://search.revvybrr6pvbx4n3j4475h4ghw4elqr4t5xo2vtd3gfpu2nrsnhh57id.onion/instances.php)<br> [I2P](http://revekebotog64xrrammtsmjwtwlg3vqyzwdurzt2pu6botg4bejq.b32.i2p/instances.php)<br> <br> [@davidovski](https://github.com/davidovski)'s instance:<br> [search.davidovski.xyz](https://search.davidovski.xyz/instances.php)<br> <br> ### How to host LibreY [This section has been made.