Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platform, which could negatively affect the platform and the Tokens, including the utility of the Tokens for obtaining services.
Appears in 2 contracts
Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on an open-source softwareprotocol, there is a risk that a third party or a member of the Company Foundation team or Carebig team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, including the utility of the Tokens Tokens’ use for obtaining servicesToken Utility.
Appears in 2 contracts
Samples: Token Purchase Agreement, Please Read
Risk of Hacking and Security Weaknesses. 4. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on open-source software, there is a risk that a third party or a member of the Company Company’s team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, Tokens and their value including the utility of the Tokens Token Utility. Risks Associated with Markets for obtaining services.Tokens
Appears in 1 contract
Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus - based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on open-open - source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, including Tokens’ utility for using the utility of the Tokens for obtaining servicesPlatform.
Appears in 1 contract
Samples: Sale Agreement