Common use of Risk of Mining Attacks Clause in Contracts

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 3 contracts

Samples: Token Sale Agreement, Spectre Token Presale, Spectre Token Presale

AutoNDA by SimpleDocs

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.

Appears in 2 contracts

Samples: uptoken.org, uptoken.org

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the XXXXX Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Product and the XXXXX Tokens, including, but not limited to, accurate execution and recording of transactions involving XXXXX Tokens.

Appears in 2 contracts

Samples: Pre Order Agreement, Pre Order Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 2 contracts

Samples: Token Pre Sale Agreement, Token Pre Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Ecosystem and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 2 contracts

Samples: Base Token Sale Agreement, Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Ecosystem and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.

Appears in 2 contracts

Samples: Base Token Sale Agreement, Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocolBinance Security Chain, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Please Read

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Token Sale Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Ggcoin Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum blockchain protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-selfish- mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Applicable Tokens are susceptible to attacks by miners in the course of validating Token Applicable Tokens transactions on the Ethereum blockchain, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Applicable Tokens, including, but not limited to, including accurate execution and recording of transactions involving Applicable Tokens.

Appears in 1 contract

Samples: Hashfuture Platform User Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.

Appears in 1 contract

Samples: Token Pre Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions Tokentransactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-selfish- mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Purchase Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocoltokens, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchainTokens transactions, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network App and the Tokens, including, but not limited to, including accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Token Sale Agreement

AutoNDA by SimpleDocs

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Token Mining Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: F2k Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.

Appears in 1 contract

Samples: Token) Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-double- spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Token Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocolBinance blockchain, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum Binance blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.

Appears in 1 contract

Samples: Token Purchase Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum blockchain protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-double - spend attacks, majority mining power attacks, and selfish-selfish - mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Sale Agreement

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocoltokens, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchainTokens transactions, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network App and the Tokens, including, but not limited to, including accurate execution and recording of transactions involving Tokens.

Appears in 1 contract

Samples: Token Sale Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.