Terms of business

CRYPTOCURRENCIES ARE HIGH-RISK ASSETS AND YOU SHOULD NEVER USE FUNDS THAT YOU CANNOT AFFORD TO LOSE TO PURCHASE CRYPTOCURRENCIES.

1. PRICE VOLATILITY The price of tokens can be subject to dramatic fluctuations and high volatility due to the rapid shifts in offer and demand resulting from events such as but not limited to: (a) good or bad publicity, (b) changes in the financial technology industry, (c) technological advancement, (d) market trends, (e) general economic and/or political conditions, (f) degree of adoption, (g) degree of institutional support, (h) regulatory measures, (i) degree of government support, (l) market dynamics, (m) trading activities, (n) hacking, and (o) events affecting large service providers, including exchanges. AS A RESULT OF PRICE VOLATILITY, YOUR TOKENS MAY LOSE ALL VALUE AND BECOME WORTHLESS. WE SHALL NOT BE RESPONSIBLE FOR ANY LOSS INCURRED BY YOU AS A RESULT OF THE INHERENT PRICE-VOLATILITY OF TOKENS. 2. CRYPTOGRAPHIC WALLETS Tokens are stored on cryptographic wallets ("Wallets"). A private key (for example, a passphrase) is usually necessary to access, control and/or dispose of tokens that are stored in your Wallet. Losing access to the private key(s) associated with your Wallet may result in the permanent loss of your ability to access and dispose of your tokens. You are solely responsible for implementing all reasonable and appropriate measures 3.1 Malfunction, breakdown and/or abandonment of protocols Any malfunction, breakdown, and/or abandonment of the protocols (and of any consensus mechanism, where applicable) on which the tokens are based could severely affect the price of the tokens as well as your ability to dispose of the tokens (particularly where the protocol relies on substantial participation and wide networks to operate properly). 3.2 Mining attacks Some protocols integrate consensus-based mechanisms for the validation of transfers (“Consensus Protocols”). Consensus Protocols are, therefore, susceptible to attacks at the stage of validation, where the token transactions is approved by the network. This may affect the accuracy of transactions occurring on the protocol, and in your tokens being misappropriated (for example, through what is typically referred to as double spending attacks). 3.3 Hacking and security weaknesses Tokens may be subject to expropriation and/or theft. Bad actors (including hackers, groups and organisation) may attempt to interfere with the protocols or the tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, sybil attacks, smurfing and spoofing. Furthermore, some protocols are based on open-source software and, as a result, subject to the risk of weakness being introduced to the protocols (either willingly or accidentally) at the development stage. Any such weakness may be exploited by bad actors for the purposes of misappropriating your tokens, or otherwise affect the functionality of the protocol and of your ability to dispose of your tokens. 4. LAWS AND REGULATIONS The legal and/or regulatory framework surrounding tokens and distributed ledger technology is uncertain, not harmonised, and unsettled in many jurisdictions. It is difficult to predict what framework will become applicable to tokens in the near future and how the implementation of dedicated legal and/or regulatory frameworks will affect the price of tokens. A newly introduced legal and regulatory framework may interfere with or otherwise limit your ability to hold or dispose of your tokens, which in turn could result in a financial loss on your part.

WE ARE NOT RESPONSIBLE FOR ANY LOSS WHICH YOU MAY SUFFER AS A RESULT OF ANY NEWLY INTRODUCED LEGAL AND/OR REGULATORY FRAMEWORK.