Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Sale Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook BBDC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook BBDC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Terms of Token Sale
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook PINGPAID Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook PINGPAID Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Purchase Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook Astox Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook Astox Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Terms of Token Sale
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook BDCC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook BDCC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensationorcompensation.
Appears in 1 contract
Sources: Token Sale Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook CPU Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook CPU Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Sales Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook mHealthCoin Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook mHealthCoin Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Purchase Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the BitBook DTF Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BitBook DTF Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Sales Agreement