Risk of Mining Attacks Sample Clauses

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
AutoNDA by SimpleDocs
Risk of Mining Attacks. As with other decentralized cryptocurrencies, Ethereum blockchain, which is used for the CTY Tokens, is susceptible to mining attacks, including but not limited to double‐spend attacks, majority mining power attacks, “selfish-mining” attacks, and race condition attacks. Any successful attacks present a risk to the CTY Tokens. Despite the efforts of the Company and Ethereum Foundation, the risk of known or novel mining attacks exists.
Risk of Mining Attacks. As with other decentralized cryptographic Coins based on the Blockchain protocol, Coins are susceptible to attacks by miners in the course of validating Coins transactions on the Blockchain, including, but not limited, to double-spend attacks, majority mining XXXXX.xx Page 33 of 36 Transitioning humanity into a decentralized crypto economy power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Platform and Coins, including, but not limited to, accurate execution and recording of transactions involving Coins.
Risk of Mining Attacks. As with other decentralized cryptocurrencies, Ethereum blockchain, which is used for the Tokens, is susceptible to mining attacks, including but not limited to double-spend attacks, majority mining power attacks, “selfish-mining” attacks, and race condition attacks. Any successful attacks present a risk to the Tokens, expected proper execution and sequencing of Tokens, and expected proper execution and sequencing of Ethereum contract computations in general. Despite the efforts of the Borrower and Ethereum Foundation, the risk of known or novel mining attacks exists. Mining attacks, as described above, may also target other blockchain networks, with which the Tokens interact with and consequently the Tokens may be impacted also in that way to the extent described above.
Risk of Mining Attacks. The Participant understands and accepts that, as with other cryptocurrencies, cryptographic tokens, and blockchain based software systems, the Ethereum blockchain used for BC Crowdsale campaign is susceptible to mining attacks, including but not limited to doublespend attacks, majority mining power attacks, “selfishmining” attacks, and race condition attacks. Any successful attacks present a risk to BC Crowdsale campaign, expected proper execution and sequencing of token transactions, and expected proper execution and sequencing of contract computations.
Risk of Mining Attacks. As with any cryptocurrencies based on the Ethereum protocols, Tree Tokens are susceptible to mining attacks, including but not limited to double-spend attacks, majority mining power attacks, “selfish-mining” attacks, and race condition attacks. Any successful attack presents a risk to Tree Tokens, the Company, its ability to develop and provide the Ekofolio Platform and accompanying services, including accurate execution and recording the transactions involving Tree Tokens.
Risk of Mining Attacks. As with other decentralized ledger, iTerraPay is susceptible to miningattacks, including but not limited to double-spend attacks, majority mining power attacks, ˘selfish-mining˙ attacks, and race condition attacks. Any successful attacks can affect access to the Software and Services. Mining attacks, as described above, may also target other blockchain networks, which the Software interacts with, and consequently affect the Software performance and your access to the Services.
AutoNDA by SimpleDocs
Risk of Mining Attacks. You understand and accept that the blockchain used for the Project is susceptible to mining attacks, including but not limited to double-spend attacks, majority mining power attacks, “selfish-mining” attacks, and race condition attacks. Every successful attack constitutes a risk to the Project, to the expected proper execution and sequencing of Coin transactions, and to the expected proper execution and sequencing of contract computations.
Risk of Mining Attacks. As with other decentralized cryptocurrencies, the Stellar blockchain, which is used for the GlitzKoin tokens, is susceptible to mining attacks, including but not limited to double-spend attacks, majority mining power attacks, “selfish-mining” attacks, and race condition attacks. Any successful attacks present a risk to the GlitzKoin tokens, expected proper execution and sequencing of GlitzKoin tokens, and expected proper execution and sequencing of Stellar contract computations in general. Despite the efforts of Glitter Holdings and Stellar Foundation, the risk of known or novel mining attacks exists. Mining Attacks, as described above, may also target other blockchain networks, with which the GlitzKoin tokens interact with and consequently the GlitzKoin tokens may be impacted also in that way to the extent, described above.
Risk of Mining Attacks. As with other decentralized ledger, Pradexx is susceptible to mining attacks, including but not limited to double-spend attacks, majority mining power attacks, ˘selfish-mining˙ attacks, and race condition attacks. Any successful attacks can affect access to the Software and Services. Mining attacks, as described above, may also target other blockchain networks, which the Software interacts with, and consequently affect the Software performance and your access to the Services.
Time is Money Join Law Insider Premium to draft better contracts faster.