Privacy Policy


Certain Risks Relating to Purchase, Sale, and Use of Tokens

By purchasing, owning, and using Tokens, you expressly acknowledge and assume the following risks:

Risk of Losing Access to Tokens Due to Loss of Private Key(s), Custodial Error or your Error. A private key, or a combination of private keys, is necessary to control and dispose of Tokens stored in your digital wallet or vault. Accordingly, loss of requisite private key(s) associated with your digital wallet or vault storing Tokens will result in loss of such Tokens. Moreover, any third party that gains access to such private key(s), including by gaining access to login credentials of a hosted wallet service you use, may be able to misappropriate your Tokens. Any errors or malfunctions caused by or otherwise related to the digital wallet or vault you choose to receive and store Tokens, including your own failure to properly maintain or use such digital wallet or vault, may also result in the loss of your Tokens. Additionally, your failure to precisely follow the procedures set forth in for buying and receiving Tokens, including, for instance, if you provide an incorrect Token Receipt Address, or provide an address that is not ERC-20 compatible, may result in the loss of your Tokens.

Risks Associated with the Ethereum Protocol. Because Tokens and the Ecosystem are partially based on the Ethereum protocol, any malfunction, breakdown or abandonment of the Ethereum protocol may have a material adverse effect on the Ecosystem or Tokens. Moreover, advances in cryptography, or technical advances such as the development of quantum computing, could present risks to the Tokens and the Ecosystem, including the utility of the Tokens for obtaining Services, by rendering ineffective the cryptographic consensus mechanism that underpins the Ethereum protocol.

Risk of Mining Attacks. As with other decentralized cryptographic tokens based on the Ethereum protocol, the Tokens are susceptible to attacks by miners in the course of validating Token transactions on the Ethereum blockchain, including, but not limited, to double-spend attacks, majority mining power attacks, and selfish-mining attacks. Any successful attacks present a risk to the Ecosystem and the Tokens, including, but not limited to, accurate execution and recording of transactions involving Tokens.