Preview

Case Study: Safe Exchange Coin (SAFEX)

Good Essays
Open Document
Open Document
724 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: Safe Exchange Coin (SAFEX)
Safe Exchange Coin (SAFEX)

The Safe Exchange Platform allows the creation of digital assets and contracts, cryptographic data-storage and transfers. Users can define an item's attributes and then later offer that item in a contract to a marketplace where others can discover, scrutinize, and fulfill the terms of the contract autonomously without the necessity of a trusted third party.

SAFEX’s Core Development Team is composed by Daniel Dabek, Founder of Safe Exchange, and Lead Rust developer and Pavle Aleksic Lead Javascript developer.

Most of the platforms of what we now know as E-commerce are ridden with privacy risks issues that compromise the competitive advantages of customers and merchants and their personal and business data. When
…show more content…
The greatest protection is that your cryptographic wealth is secure because you cannot become the target of hackers or malicious actors.

The marketplace is to be called Chille. SAFEX token holders will be allowed to have the first minting of the market´s currency. Holders earn from the fees of the transactions on the marketplace. They will also be among the first who will be able to conduct transactions on the platform using SAFEX tokens.

The Chille cryptocurrency, also referred to as “Safex Cash” will have its own Blockchain called the Chille Blockchain. It will have a Proof of Work Consensus system. When the Chille Blockchain launches, 0.5% of Chille's supply will be doled out to SAFEX holders. Which makes interesting holding SAFEX at the time of the Chille Blockchain’s launch. The SAFEX Crowdsale ended in January 2016 and every SAFEX that will ever exist were sold, the total number of coins is 2.147.483.647 SAFEX.

These tokens also support voting services that allow you to participate actively in the decision making of processes related to the
…show more content…
We froze the markets in response but this just resulted in the SAFEX community doubling down their accusations...” “As a result, we have now decided to delist SAFEX due to the behavior of the community in general...” “Once the coin has fully synced (at block 394077) as of this post, the wallet will be re-enabled and you will be able to withdraw…” “We apologize of any inconvenience but we have a strict policy against behavior like this and will stamp it out immediately in a hope we can clean up Crypto in

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The frequent shopper program is subject to a certain degree of ethical consideration, it has been determined that the customers’ privacy will be under close evaluation in order to maintain a high degree of privacy and a overall good practice of integrity. The e-commerce has established that we will follow procedure with the protection of sensitive and personal data for our corporation and also the individuals who are considered to be our consumers.…

    • 813 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What: the bottom fell out of the market, and shareholders frantically tried to sell before the prices plunged. 16.4 billion shares were dumped that day. People who bough stocks on credit were stuck with huge debts, and others lost most of their savings.…

    • 1627 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Every company would like to have the top notch system that could not be hacked, but that is not feasible. For every new system there is a hacker waiting to try to get lucky and steal some information. This was not the case for TJX. Investigation into the case indicated that the company was not in compliance with the Payment Card Industry (PCI)…

    • 791 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IFSM Paper B1

    • 476 Words
    • 2 Pages

    The dilemma in the above matrix is a hot button topic in today’s IT culture especially in regards to how marketing departments do business. Consumer information privacy is a sensitive issue to many companies and the…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Breach X

    • 925 Words
    • 4 Pages

    • Was TJX a victim of ingenious cyber crooks or did it create risk by cutting corners?…

    • 925 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to online marketing there are many risks an individual can face when it comes to purchasing online. As this generation is all about technology most things that are set up online require personal information for example New Look requires its customer to set up an online account to purchase items. This may make the customers wary, as they wouldn’t like to become a victim of fraud due to payment security being an issue.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pii Research Paper

    • 484 Words
    • 2 Pages

    Most people don’t give a second thought to the information they are asked to provide when using ecommerce sites or creating accounts on various sites such as Facebook and Twitter. What is the data you entered being used for? What happens to this information once you have entered it and completed your transaction with a business? How is this information stored and for how long? How is my information protected from theft? Will my information be sold to third parties? What are my rights should my personal data be lost or compromised? These are questions everyone should ask because your information in the wrong hands can be used to steal your money, steal your identity or both.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Fortex Scandal

    • 1189 Words
    • 5 Pages

    Introduction Fortex was regarded as one of New Zealand’s top companies. They used innovative technology to add value to their product. They won awards, looked after employees, and paid suppliers well. But when the company collapsed in March 1994 it was revealed that the success was all based on false accounting. The management team was able to fool a company of respected auditors as well as everybody else for more than three years. Thousands of people suffered as a result.…

    • 1189 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The certificate has a security option that improves a business via increased customer confidence and trust and subsequently increasing the sales conversion.…

    • 969 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    With a heavy increase in the number of online trading account holders, from 20 million in 2012 to nearly 24 million in 2014, the IT sector has realized the potential that is available to exploit. Also, with internet continuously reaching sky-high numbers in terms of consumers, the nature of the financial services has dramatically changed. Online trading accounts removed the need for maintaining the necessary trading documents and certificates as an alternate trouble-free path via the internet.…

    • 1199 Words
    • 5 Pages
    Powerful Essays