Risk of theft and hacking. i. Smart contracts, software applications and the Platform may be exposed to attacks by hackers or other individuals, groups, organizations or countries that interfere with the Platform or the availability of the Tokens in any number of ways, including denial of service attacks, Xxxxx attacks, spoofing, smurfing, malware attacks, or consensus-based attacks, or phishing, or other novel methods that may or may not be known. Any such successful attacks could result in theft or loss of Tokens, adversely impacting the ability to further develop the Platform and/or related Platforms and derive any usage or functionality from Tokens. You must take appropriate steps to satisfy yourself of the integrity and veracity of relevant websites, systems and communications. Furthermore, because the Platform is based on open-source software, there is a risk that a third party or a member of the Company’s team may intentionally or unintentionally introduce weaknesses or defects into the core infrastructure of the Platform, which could negatively affect the Platform and Tokens.
Appears in 4 contracts
Samples: Simple Agreement, Simple Agreement, Simple Agreement
Risk of theft and hacking. i. Smart contracts, software applications and the Platform Protocol may be exposed to attacks by hackers or other individuals, groups, organizations or countries that interfere with the Platform Protocol or the availability of the Tokens in any number of ways, including denial of service attacks, Xxxxx attacks, spoofing, smurfing, malware attacks, or consensus-based attacks, or phishing, or other novel methods that may or may not be known. Any such successful attacks could result in theft or loss of Tokens, adversely impacting the ability to further develop the Platform Protocol and/or related Platforms Protocols and derive any usage or functionality from Tokens. You must take appropriate steps to satisfy yourself of the integrity and veracity of relevant websites, systems and communications. Furthermore, because the Platform Protocol is based on open-open- source software, there is a risk that a third party or a member of the Company’s team may intentionally or unintentionally introduce weaknesses or defects into the core infrastructure of the PlatformProtocol, which could negatively affect the Platform Protocol and Tokens.
Appears in 1 contract
Samples: Simple Agreement