Preview

Case Study: Safe Exchange Coin (SAFEX)

Good Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: Safe Exchange Coin (SAFEX)
Safe Exchange Coin (SAFEX)

The Safe Exchange Platform allows the creation of digital assets and contracts, cryptographic data-storage and transfers. Users can define an item's attributes and then later offer that item in a contract to a marketplace where others can discover, scrutinize, and fulfill the terms of the contract autonomously without the necessity of a trusted third party.

SAFEX’s Core Development Team is composed by Daniel Dabek, Founder of Safe Exchange, and Lead Rust developer and Pavle Aleksic Lead Javascript developer.

Most of the platforms of what we now know as E-commerce are ridden with privacy risks issues that compromise the competitive advantages of customers and merchants and their personal and business data. When
…show more content…
The greatest protection is that your cryptographic wealth is secure because you cannot become the target of hackers or malicious actors.

The marketplace is to be called Chille. SAFEX token holders will be allowed to have the first minting of the market´s currency. Holders earn from the fees of the transactions on the marketplace. They will also be among the first who will be able to conduct transactions on the platform using SAFEX tokens.

The Chille cryptocurrency, also referred to as “Safex Cash” will have its own Blockchain called the Chille Blockchain. It will have a Proof of Work Consensus system. When the Chille Blockchain launches, 0.5% of Chille's supply will be doled out to SAFEX holders. Which makes interesting holding SAFEX at the time of the Chille Blockchain’s launch. The SAFEX Crowdsale ended in January 2016 and every SAFEX that will ever exist were sold, the total number of coins is 2.147.483.647 SAFEX.

These tokens also support voting services that allow you to participate actively in the decision making of processes related to the
…show more content…
We froze the markets in response but this just resulted in the SAFEX community doubling down their accusations...” “As a result, we have now decided to delist SAFEX due to the behavior of the community in general...” “Once the coin has fully synced (at block 394077) as of this post, the wallet will be re-enabled and you will be able to withdraw…” “We apologize of any inconvenience but we have a strict policy against behavior like this and will stamp it out immediately in a hope we can clean up Crypto in

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The frequent shopper program is subject to a certain degree of ethical consideration, it has been determined that the customers’ privacy will be under close evaluation in order to maintain a high degree of privacy and a overall good practice of integrity. The e-commerce has established that we will follow procedure with the protection of sensitive and personal data for our corporation and also the individuals who are considered to be our consumers.…

    • 813 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    ChoicePoint, A data broker, suffered a data breach in 2005. This breach led to the disclosure of thousands of people’s personal information. We will discuss the type of breach this would fall under, how it occurred, the losses of confidentiality, integrity, and availability (C.I.A.), and the types of improvements ChoicePoint could or did undertake to help prevent this from happening again.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What: the bottom fell out of the market, and shareholders frantically tried to sell before the prices plunged. 16.4 billion shares were dumped that day. People who bough stocks on credit were stuck with huge debts, and others lost most of their savings.…

    • 1627 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    The security mechanism existing in the current ING’s network is implemented a fire between the external brokers and the internal servers. Basically, this is not enough to protect the network, especially, the information of ING involves private personal information. The information should be protected carefully.…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Breach X

    • 925 Words
    • 4 Pages

    • Was TJX a victim of ingenious cyber crooks or did it create risk by cutting corners?…

    • 925 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Every company would like to have the top notch system that could not be hacked, but that is not feasible. For every new system there is a hacker waiting to try to get lucky and steal some information. This was not the case for TJX. Investigation into the case indicated that the company was not in compliance with the Payment Card Industry (PCI)…

    • 791 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Pii Research Paper

    • 484 Words
    • 2 Pages

    Most people don’t give a second thought to the information they are asked to provide when using ecommerce sites or creating accounts on various sites such as Facebook and Twitter. What is the data you entered being used for? What happens to this information once you have entered it and completed your transaction with a business? How is this information stored and for how long? How is my information protected from theft? Will my information be sold to third parties? What are my rights should my personal data be lost or compromised? These are questions everyone should ask because your information in the wrong hands can be used to steal your money, steal your identity or both.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Fortex Scandal

    • 1189 Words
    • 5 Pages

    Introduction Fortex was regarded as one of New Zealand’s top companies. They used innovative technology to add value to their product. They won awards, looked after employees, and paid suppliers well. But when the company collapsed in March 1994 it was revealed that the success was all based on false accounting. The management team was able to fool a company of respected auditors as well as everybody else for more than three years. Thousands of people suffered as a result.…

    • 1189 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The certificate has a security option that improves a business via increased customer confidence and trust and subsequently increasing the sales conversion.…

    • 969 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    With a heavy increase in the number of online trading account holders, from 20 million in 2012 to nearly 24 million in 2014, the IT sector has realized the potential that is available to exploit. Also, with internet continuously reaching sky-high numbers in terms of consumers, the nature of the financial services has dramatically changed. Online trading accounts removed the need for maintaining the necessary trading documents and certificates as an alternate trouble-free path via the internet.…

    • 1199 Words
    • 5 Pages
    Powerful Essays