Token Security. HILL Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the HILL Distribution Contract, the HILL Token Contract or the HILL Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensusbased attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and HILL Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the HILL Tokens or result in the loss of Buyer’s HILL Tokens, the loss of Buyer’s ability to access or control Buyer’s HILL Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of HILL Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Hill Token Purchase Agreement
Token Security. HILL CLEAR Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the HILL CLEAR Distribution Contract, the HILL CLEAR Token Contract or the HILL CLEAR Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensusbased consensus based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and HILL CLEAR Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the HILL CLEAR Tokens or result in the loss of Buyer’s HILL CLEAR Tokens, the loss of Buyer’s ability to access or control Buyer’s HILL CLEAR Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of HILL CLEAR Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Purchase Agreement
Token Security. HILL DML Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the HILL DML Distribution Contract, the HILL DML Token Contract or the HILL DML Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensusbased consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software technology and HILL DML Tokens are based on open source softwaretechnology, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the HILL DML Tokens or result in the loss of Buyer’s HILL DML Tokens, the loss of Buyer’s ability to access or control Buyer’s HILL DML Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of HILL DML Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Purchase Agreement
Token Security. HILL ARG Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the HILL Argentas Distribution Contract, the HILL ARG Token Contract or the HILL ARG Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensusbased consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and HILL ARG Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the HILL ARG Tokens or result in the loss of Buyer’s HILL ARG Tokens, the loss of Buyer’s ability to access or control Buyer’s HILL ARG Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of HILL ARG Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Token Purchase Agreement
Token Security. HILL EOT Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the HILL EOT Distribution Contract, the HILL EOT Token Contract or the HILL EOT Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensusbased consensus- based attacks, ▇▇▇▇▇ attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and HILL EOT Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the HILL EOT Tokens or result in the loss of Buyer’s HILL EOT Tokens, the loss of Buyer’s ability to access or control Buyer’s HILL EOT Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of HILL EOT Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Sources: Eot Token Purchase Agreement