White Paper
Search
⌃K
Comment on page

What are the risks of general hacking, theft and vulnerabilities?

App Questions
The smart contract system concept, the underlying software application and software platform (i.e. the Ethereum blockchain) may be exposed to attacks by hackers or other individuals including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Sybil attacks, smurfing and spoofing.
Any such successful attacks could result in theft or loss of contributions or Tokens, adversely impacting the ability to develop the Tokens and derive any usage or functionality from the Tokens.
Tokenholders must take appropriate steps to satisfy themselves of the integrity and veracity of relevant websites, systems and communications.
Furthermore, because Vow app is based on open-source software, there is a risk that a third party or a member of the Issuer’s team may intentionally or unintentionally introduce weaknesses or defects into the core infrastructure of Vow, which could negatively affect Vow and the Tokens.