Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Platform or Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Platform is based on an open-source protocol, there is a risk that a third party or a member of the Foundation team or Carebig team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Platform, which could negatively affect the Platform and Tokens, including Tokens’ use for Token Utility.
Appears in 2 contracts
Samples: Token Purchase Agreement, Agreement for Sale of Tokens
Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Platform platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Platform platform is based on an open-source protocolsoftware, there is a risk that a third party or a member of the Foundation team or Carebig Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Platformplatform, which could negatively affect the Platform platform and the Tokens, including Tokens’ use the utility of the Tokens for Token Utilityobtaining services.
Appears in 2 contracts
Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Platform or Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus - based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Platform is based on an open-open - source protocolsoftware, there is a risk that a third party or a member of the Foundation team or Carebig Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Platform, which could negatively affect the Platform and Tokens, including Tokens’ use utility for Token Utilityusing the Platform.
Appears in 1 contract
Samples: Token Sale Agreement
Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx Sxxxx attacks, smurfing and spoofing. Furthermore, because the Platform is based on an open-source protocolsoftware, there is a risk that a third party or a member of the Foundation team or Carebig Company’s team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Platform, which could negatively affect the Platform and Tokens, the Tokens and their value including Tokens’ use for the Token Utility.
Appears in 1 contract
Samples: Private Token Purchase Commitment Agreement (Blockchain Industries, Inc.)