Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 3 contracts
Samples: Token Sale Agreement, Spectre Token Presale, Spectre Token Presale
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Ecosystem and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 2 contracts
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Ecosystem and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.
Appears in 2 contracts
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.
Appears in 2 contracts
Samples: uptoken.org, uptoken.org
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 2 contracts
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the XXXXX Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Product and the XXXXX Tokens, including, but not limited to, accurate execution and recording of transactions involving XXXXX Tokens.
Appears in 2 contracts
Samples: Pre Order Agreement, Pre Order Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocolBinance blockchain, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum Binance blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.
Appears in 1 contract
Samples: Token Purchase Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Applicable Tokens are susceptible to attacks by miners in the course of validating Token Applicable Tokens transactions on the Ethereum blockchain, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Applicable Tokens, including, but not limited to, including accurate execution and recording of transactions involving Applicable Tokens.
Appears in 1 contract
Samples: Hashfuture Platform User Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocolBinance Security Chain, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Please Read
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum blockchain protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-double - spend attacks, majority mining power attacks, and selfish-selfish - mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Token Mining Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: F2k Token Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.
Appears in 1 contract
Samples: Token) Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchainBlockchain, including, but not limited, to double-double- spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Token Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving TokensXxxxxx.
Appears in 1 contract
Samples: Token Pre Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions Tokentransactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-selfish- mining attacks. Any successful attacks present a risk to the Network and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Purchase Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocoltokens, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchainTokens transactions, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network App and the Tokens, including, but not limited to, including accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Token Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network Token Sale Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Ggcoin Token Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens Tokens based on the Ethereum blockchain protocol, the Tokens are susceptible to attacks by miners in the course of validating Token Tokens transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-selfish- mining attacks. Any successful attacks present a risk to the Network Platform and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Token Sale Agreement
Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocoltokens, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchainTokens transactions, including, but not limited, including to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Network App and the Tokens, including, but not limited to, including accurate execution and recording of transactions involving Tokens.
Appears in 1 contract
Samples: Token Sale Agreement