ICO AUDIT. Prepared for the McAfee Team by
|
|
- Anabel Houston
- 6 years ago
- Views:
Transcription
1 ICO AUDIT OF Prepared for the McAfee Team by
2 Crypto Connection ICO Trust Scale Overall Score: 3.9 Transparency: 4/5 Has the company established a roadmap? 5/5 Has the company met prior roadmap deadlines and provided evidence of completion? 3/5 Competency: 2/5 Do the team members have prior success working with blockchain applications? 0/5 Do the team members have prior success in engineering and data science? 2/5 Do the team members have prior success in business operations? 3/5 Do the team members have prior success in marketing? 3/5 Public Interaction: 5/5 Are the team members public-facing or Anonymous? 5/5 Does the company have an active social media presence? 5/5 Business Model: 3.5/5 Does it solve a problem? 4/5 Is it a unique idea? 5/5 Is it disintermediating technology? 1/5 Whitepaper: 4/5 Is the project and its goals clearly defined in a straightforward manner? 3/5 Spelling, grammar, punctuation, and clarity: 3/5 Is the whitepaper plagiarized? No Originality: 5/5 Digital and Network Forensic Analysis: 5/5 Integrity of historical DNS zone file changes 5/5 Integrity of other domains registered by CEO 5/5 Public smart contract and ERC-20 token? 5/5
3 The Development Team Jérémy Mathon ios &Android Developer Still attending university until months of occupational coding experience; GitHub projects date back to The below repo is revelant to building the framework for the Outing App A website in NodeJS where you can create an account, add a city in your favourite places or remove it. The list of cities is on Airtable. Romain Richard Chief Technical Officer Blockchain Expert Chief Technical Officer of Second LIFE a ecommerce website that sells screen replacement kits and batteries for smartphones Benjamin Somrani Android Developer No known LinkedIn No known Github Antonin Breton UX/UI Developer Experienced Graphic Designer Great portfolio Would make an excellent UI Developer The Facts 55% of the team is Marketing and Business focused The developers are young and for the most part, still in school
4 The ICO The Whitepaper Spelling, grammar, and clarity are not perfect, however, the whitepaper is translated from French and this accounts for the discrepancy Not plagiarized, 100% original Roadmap and milestones are clearly displayed The Product Outing is a social media platform that utilizes geolocations rewards users in ERC20 (OTG) tokens for notifying the community of events. Outing promises to offer a physical debit card that allows users to cash out their tokens for fiat and spend it anywhere. Beta wallet isn t due until Q3 of 2018 Currently no partners with card payment processors which could imply that there may be many hurdles in making the Outing Card a reality. See next page for Digital and Network Forensic Analysis
5 Digital and Network Forensics Analysis Domain: outing-app.com Current IP: First seen , Host: Google Nameservers: ns4.wixdns.net, ns5.wixdns.net Domain Registrar: 1&1 Internet SE Registration Date: Domain lifespan: ~ 2 months Registrant Name: WHOIS Protection Used Registrant Street: N/A Registrant City: N/A Registrant State/Province: N/A Registrant Postal Code: N/A Registrant Country: N/A Registrant Phone: N/A Registrant N/A Known Past Domains Registered by CEO: 0 Known Past Domains Registered by CTO: 3 Registrant Name: Romain Richard Registrant Street: 1 Avenue Du President Vincent Aurio C/C Hyper U Registrant City: Abbeville Registrant Postal Code: Registrant Country: France Registrant Phone: Registrant Romain77@icloud.com Registrar: 1&1 Internet SE Discovery Vector: Past Business (Second-Life) Historical DNS Records
6 Past Domains Categorization and Integrity: second-life.net - Category: IT/Telephony/Repair - Benign second-life.co - Category: IT/Telephony/Repair - Benign recophone.fr - Category: IT/Telephony/Repair - Benign Other Open Source Intelligence Discovery: > theharvester -d outing-app.com -b all -h Full harvest.. [-] Searching in Google.. Searching 0 results... Searching 100 results... [-] Searching in PGP Key server.. [-] Searching in Bing.. Searching 50 results... Searching 100 results... [-] Searching in Exalead.. Searching 50 results... Searching 100 results... Searching 150 results... [+] s found: info@outing-app.com pixel web-@outing-app.com pixel web-@outing-app.com Google Dorking: Discovery of possible open directory files or backup files Results: 0 Google Dork Search Used: +ext%3adocx+ +ext%3aodt+ +ext%3apdf+ +ext%3artf+ +ext%3 Asxw+ +ext%3apsw+ +ext%3appt+ +ext%3apptx+ +ext%3apps+ +ext%3acsv+ext%3ab kf+ +ext%3abkp+ +ext%3abak+ +ext%3aold+ +ext%3abackup&oq=site%3aoutingapp.com+ext%3adoc+ +ext%3adocx+ +ext%3aodt+ +ext%3apdf+ +ext%3artf+ +ext%3 Asxw+ +ext%3apsw+ +ext%3appt+ +ext%3apptx+ +ext%3apps+ +ext%3acsv+ext%3ab kf+ +ext%3abkp+ +ext%3abak+ +ext%3aold+ +ext%3abackup
7 Additional Address Pivoting: Other known s of CTO: Discovery Vector: Personal WHOIS Correlation Search Known database breaches involving CTO address: None Known database breaches involving any address (via LeakSource): None Whitepaper Metadeta review: 426cff11fc175dcad6a0dcf9/detection
8 Smart Contract Wallet and Contract Address: Token Address: 0x77a4a5b3007efa19b5d049b914a e27fe4 7fe4 Contract Owner's Address: 0x48689b92ca9bd41d33d74cf46e241fec150b9d5d b9d5d Total Contract Address Transactions as of 1/12/2018: 4 Number of smart contracts with identical code: 0 Outing App Smart Contract MD5 Hash: 733b253758aaba185d8d1cdc5c SSDeep Fuzzy Hash: 192:Zup/60OAJBbO3U7JxG9au9GEOkwBwOw6z4wIwBw4rFvwjwpHwctcvIEXhJb:Zu pyyqutxahtj a e6a30b9d3ac3f078/detection Current Token Holders: 3 Token Holder Proportions: 7fe4#pageSize=100&tab=tab-holders
9 Conclusion The Outing App has received a Crypto Connection Trust Score of 3.9. The team is transparent and public face. However, they have yet to show any tangible results or accomplishments. The team members are strong on the marketing and business side of the spectrum, but the developers seem to possess entry-level development experience. The whitepaper is original; however, some clarity was slightly lost due to it being translated from French. The business model is average. The Outing App doesn t pose to displace any current technology, but the idea is original, fun, and likely to be popular among millennials and marketers. One major hurdle for implementing the Outing Card is the current lack of partnerships with businesses in the financial industry. Digital forensic analysis of Outing's public facing network revealed no association with malicious code nor fraudulent content. Similarly, previous domains associated with chief staff of Outing showed no malicious attribution. Overall, while the team doesn t have a malicious past, and it would appear as if they have every intention on intending to deliver their product, there can be no guarantee that the Outing team will be able to successfully execute on the release of the app. The verdict: the Outing App can not be considered a scam, however one must invest with caution and be aware of investing in start up companies with limited talent and resources. As always, do your own due diligence! AUDITED! 4000 W. Montrose Ave Chicago, IL (312) @address.com
ICO AUDIT. Prepared for the McAfee Team by
ICO AUDIT OF Prepared for the McAfee Team by Crypto Connection ICO Trust Scale Overall Score: 4.6 Transparency: 4/5 Has the company established a roadmap? 5/5 Has the company met prior roadmap deadlines
More informationMobilink-Network Partial List of Partners
Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the user s phone will
More informationMobilink-Network Partial List of Partners
Introduction MOBILINK-Network will provide its users with unlimited voice and data services while eliminating all monthly fees. Revenues generated from digital mobile Ads shown on the users phone will
More informationVladimir Groshev. COO, Project Coordinator.
Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency
More informationTable Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...
Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7
More informationBlockchain-enabled peer-to-peer marketplaces
Blockchain-enabled peer-to-peer marketplaces Creating the infrastructure and UX to enable mainstream commercial transactions on Ethereum Matthew Liu Cofounder Company Overview 2 Origin will enable decentralized
More informationlifeid Foundation FAQ v.1
lifeid Foundation FAQ v.1 lifeid Foundation FAQ v.1 1 About the lifeid Foundation 2 1. What is the lifeid Foundation? 2 2. Who is on the lifeid Platform team? 2 3. What is the lifeid Foundation website
More informationToken White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e
Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency
More informationGROW YOUR BUSINESS ONLINE
GROW YOUR BUSINESS ONLINE ABOUT EXABYTES Exabytes Group is a leading Cloud Solutions Provider that was founded on the principle of providing the best web and ecommerce hosting solutions to its customers.
More informationCongratulations on Becoming an Internet Business Owner!
Congratulations on Becoming an Internet Business Owner! Those that take action receive all the rewards in life and business. Worth noting: the number one key characteristic of a successful business owner
More informationLaw Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version
Date: 18 October 2010 Law Enforcement Recommended RAA Amendments and ICANN Due Diligence Detailed Version Introduction: Below are: 1) suggested amendments to the RAA and; 2) due diligence recommendations
More informationClarity on Cyber Security. Media conference 29 May 2018
Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26
More informationWhitepaper Rcoin Global
Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global
More informationΟ ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος
Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General
More information31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation
31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation Manage Email Campaigns In-House 1. Quickly Design Emails Save time creating marketing emails using drag and drop template
More informationThe Small Business Owner s Role in Digital Marketing
The Small Business Owner s Role in Digital Marketing Growing Your Business with Digital Marketing Danny Star, CEO of Websites Depot Danny Star #dannyseostar Started marketing career in 1999 Migrated to
More informationPOLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS
POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS WHAT IS POLARCOIN? (POL) Polarcoin is an open source peer to peer decentralized cryptocurrency. There is no server for this network cause computer
More informationThree-Dimensional Scalable Blockchain. Tokenomics draft v. 0.3 (En)
Three-Dimensional Scalable Blockchain Tokenomics draft v. 0.3 (En) info@thepower.io Introduction to tokenomiсs 1 Token "Smart Key" 1 Token purpose and functions 1 Token key features 1 Token distribution
More informationMobiMoney Framework Card Control Card Alerts
MobiMoney Framework Card Control Card Alerts Application Install Start Once you decide to try MobiMoney, download the MobiMoney application from either the App Store or Google Play. A gray spring board
More informationSupercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness
Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness Introduction Drowning in data but starving for information. It s a sentiment that resonates with most security analysts. For
More informationMonitoring and Troubleshooting Smaller Office Networks with Savvius Insight
TM TECH BRIEF Monitoring and Troubleshooting Smaller Office Networks with Savvius Insight With the internet and network hardware being such essential commodities, your corporate network can easily extend
More informationICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014
ICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014 Myths, Misconceptions & Misinformation about the Recent US Government Announcement It s
More informationYOUR COMMUNITY WITH NABR NETWORK
YOUR COMMUNITY WITH NABR NETWORK Thank you for your interest in Nabr Network This exciting mobile app and website are designed to keep communication flowing in your community association. Many communities
More informationPECB Certified ISO/IEC Lead Auditor
When Recognition Matters Lead Auditor 25-29 March 2018 Master the Audit of Rainbow Towers Hotel, Harare Systems (ISMS) based on $1250.00 Who should attend? - Auditors seeking to perform and lead System
More informationPolicy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationCongratulations on Becoming an Internet Business Owner!
Congratulations on Becoming an Internet Business Owner! Those that take action receive all the rewards in life and business. Worth noting: the number one key characteristic of a successful business owner
More informationIF YOU ARE IN ANY DOUBT AS TO THE ACTION YOU SHOULD TAKE, YOU SHOULD CONSULT YOUR LEGAL, FINANCIAL, TAX OR OTHER PROFESSIONAL ADVISOR(S).
1 WHITE PAPER PAYMENT PLATFORM October 20, 2017 IMPORTANT NOTICES PLEASE READ THIS SECTION AND THE FOLLOWING SECTIONS ENTITLED DISCLAIMER OF LIABILITY, NO REPRESENTATIONS AND WARRANTIES, REPRESENTATIONS
More informationExecutive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation
2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we
More informationGENESIS VISION NETWORK
GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit
More informationBeEasy. blockchain ecosystem designed for mining, trading, and managing cryptocurrency investments
BeEasy blockchain ecosystem designed for mining, trading, and managing cryptocurrency investments Hello, we are BeEasy We use the following principle to accomplish our goal: we are making the cryptocurrency
More informationBlockchain! What consultants should know about it. Daniel
Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what
More informationA Decentralized Peer-to-Peer Media Editing, Transcoding & Distribution Platform
A Decentralized Peer-to-Peer Media Editing, Transcoding & Distribution Platform The Transcodium Team ( info@transcodium.com ) (Company registration number: 10975962, United Kingdom) https://transcodium.com
More informationThanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at
Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our
More informationBox Competitive Sheet January 2014
This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when
More informationErgo platform: from prototypes to a survivable cryptocurrency
January 2019 Dmitry Meshkov Ergo platform: from prototypes to a survivable cryptocurrency Outline Ergo Consensus Light Storage vision protocol clients fee Voting Smart Monetary Roadmap system contracts
More informationSIGN UP BLOCKCHAINS.MY
1 SIGN UP BLOCKCHAINS.MY 2 Step one: Download and install the mobile app available on Google Play Store. Step two: Open the installed application. Step three: On the login page click on Sign up to register
More informationGnosis Safe Documentation. Gnosis
Gnosis Aug 14, 2018 Content 1 Learn more about Gnosis Safe 3 1.1 Smart Contract Overview........................................ 3 1.2 Services Overview............................................ 10
More informationDRAFT: gtld Registration Dataflow Matrix and Information
DRAFT: gtld Registration Dataflow Matrix and Information Summary of Input Received From Contracted Parties and Interested Stakeholders. Version 2 6 November 2017 ICANN DRAFT: gtld Registration Dataflow
More informationRise Technology White Paper
Rise Technology White Paper Posted in White paper by Justin 1. Introduction 1. What is Rise We are Rise, a Lisk-based currency and distributed application platform heavily emphasizing security and ease
More informationBMIT Capstone Course Business Plan Rubric. Name of Social Enterprise: Type of Business: Owners Name: Evaluator(s):
BMIT Capstone Course Business Plan Rubric Name of Social Enterprise: Type of Business: Owners Name: Evaluator(s): Business Plan Rubric 0 = no evidence 1 = little evidence or major flaws 2 = adequate minimum
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationLast updated 31 March 2016 This document is publically available at
PRIVACY POLICY Last updated 31 March 2016 This document is publically available at http://www.conexusfinancial.com.au/privacy 1. INTRODUCTION This Privacy Policy sets out our commitment to protecting the
More informationTucows Guide to the GDPR. March 2018
Tucows Guide to the GDPR March 2018 About This Webinar Who is this webinar for? Resellers of Tucows services Familiar with the domain world and ICANN policy Familiar with our blog posts What are we doing
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationComodo HackerGuardian PCI Approved Scanning Vendor
Creating Trust Online TM E N T E R P R I S E Enterprise Security Solutions TM Comodo HackerGuardian PCI Approved Scanning Vendor Compliancy drives commerce: A reseller's Case Study - Merchant-Accounts.ca
More informationIncident Response Agility: Leverage the Past and Present into the Future
SESSION ID: SPO1-W03 Incident Response Agility: Leverage the Past and Present into the Future Torry Campbell CTO, Endpoint and Management Technologies Intel Security The Reality we Face Reconnaissance
More informationWHITEPAPER. Top Reasons Why Enterprises Must Automat DNS, DHCP and IP Address Management
WHITEPAPER Top Reasons Why Enterprises Must Automat DNS, DHCP and IP Address Management Top Reasons Why Enterprises Must Automate DNS, DHCP and IP Address Management Regardless of size, businesses face
More informationAWARD-WINNING CHANNEL SUCCESS FROM OVER THERE. NOW OVER HERE.
AWARD-WINNING CHANNEL SUCCESS FROM OVER THERE. NOW OVER HERE. Channel programme administered by VONAGE MEANS BUSINESS Vonage s pioneering cloud communications are now in the UK and we want you to be a
More informationKnownOrigin.io. Be Original. Buy Original. executive summary v0.4. KnownOrigin.io
KnownOrigin.io Be Original. Buy Original. executive summary v0.4 KnownOrigin.io 23.07.18 Our vision Empowering artists & collectors to create, discover and own rare assets on the most respected Ethereum
More informationBLOCK 1. General Company Data
Professional Solvency Form BLOCK 1. General Company Data 1. Name of your company: 2. Postal address: 3. Year established: 4. Main activity: 5. Indicate the mission and vision of your company: 6. Indicate
More informationETHERNITY DECENTRALIZED CLOUD COMPUTING
ETHERNITY DECENTRALIZED CLOUD COMPUTING Whitepaper 4 August 2013 v1.3 HODL UG crowdsale@ethernity.cloud DISCLAIMER: The ETHERNITY Tokens are a crypto asset that is currently being developed by the ETHERNITY
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationUsing Internet Data Sets to Understand Digital Threats
Using Internet Data Sets to Understand Digital Threats CONTENTS EXECUTIVE SUMMARY...1 ACTIONS LEAVE BREADCRUMBS. MAKE SURE TO FOLLOW THEM...2 INFRASTRUCTURE CHAINING...3 INTERNET DATA SETS...3 PASSIVE
More informationWHITE PAPER Version: V.1.4 Last Updated:
WHITE PAPER Version: V.1.4 Last Updated: 21.12.2017 Contents 1. 2. 3. Abstract 05 Vision 06 The FuzeX Ecosystem 07 The FuzeX Card 07 The FuzeX Wallet 09 The FuzeX Exchange 10 4. FuzeX Setup & Transaction
More informationBREAK THE CONVERGED MOLD
WHITE PAPER: BREAK THE CONVERGED MOLD HPE HYPER CONVERGED 380 Move at the Speed of Business Today s companies often have IT environments that face significant, similar challenges, including: Keeping up
More informationAs a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.
Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression
More informationTo learn more about Stickley on Security visit You can contact Jim Stickley at
Thanks for attending this session on March 15th. To learn more about Stickley on Security visit www.stickleyonsecurity.com You can contact Jim Stickley at jim@stickleyonsecurity.com Have a great day! Fraud
More information// EDITORIAL PASSION. Why we do what we live for. Every progress on earth is achieved by brilliant visionaries who. common.
I N N O V A T I O N T H R O U G H Q U A L I T Y 2 // EDITORIAL PASSION Why we do what we live for. Every progress on earth is achieved by brilliant visionaries who spare no effort to improve the present
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationDEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.
DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits
More informationJuyoung Ryu. Product Designer.
Juyoung Ryu Product Designer https://www.linkedin.com/in/juyoungryu/ Juyoung Ryu Product Designer Juyoung creates product design through the deep understanding of fundamental design and technology. Mobile,
More informationThe Future of Initial Coin Offerings
The Future of Initial Coin Offerings Wulf A. Kaal FinTank Chicago July 27, 2017 Slides available at: wulfkaal.com 1 Outline Case Study: Ties.Network ICO Basics ICO Trends Problems with ICOs Fixing ICOs
More informationDECENTRALIZING HEALTH AND FITNESS DATA THE LYMPO ECOSYSTEM
DECENTRALIZING HEALTH AND FITNESS DATA THE LYMPO ECOSYSTEM WHY LYMPO? THE PROBLEM 01 Why Lympo? THE HEALTH AND FITNESS INDUSTRY IS PLAGUED BY ONE-SIDED DOMINATION OF LARGE DATA-DRIVEN COMPANIES LACK OF
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationRADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE
ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this
More informationClient-Server Architecture PlusUltra beyond the Blockchain
1--------------------------------------------Table of Contents 2--------------------------------------------PlusUltra Single Sign On 3--------------------------------------------Client-Server Architecture
More informationCreating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia
Creating and Protecting Your Online Identity for Job Search Contents 1. Creating a Positive Online Presence... 2 2. Your Digital Tattoo... 3 3. Your Professional Identity... 5 4. Social Media Advice...
More informationWHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help
WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...
More information(Information Technology) Modernization Plan maintained by the Office of Information Technology, Requested date: 2016
Description of document: Consumer Product Safety Commission (CPSC) IT (Information Technology) Modernization Plan maintained by the Office of Information Technology, 2009 Requested date: 2016 Released
More informationKeys to Your Web Presence Checklist
Keys to Your Web Presence Checklist DOMAIN NAME REGISTRATION This is the most important key to your online presence. Your domain name is your business identity on the web. It serves as your address, and
More informationQUADCORECHAIN. White Paper ver.1
QUADCORECHAIN White Paper ver.1 INTRO QuadCoreChain is designed to be a smart contract, crypto currency platform, decentralizing Live Streaming of Video. The platform ecosystem is to create favorable conditions
More informationSECURITY AUDIT REPORT
PUBLIC REPORT SECURITY AUDIT REPORT of Smart Contracts December 27, 2017 Produced by for Table of Contents Foreword... 1 Introduction... 2 TGE overview... 2 Token distribution... 3 Extra features... 3
More informationVeChainThor. Token Swap. Mobile Wallet. Manual
VeChainThor Mobile Wallet Token Swap Manual Introduction and Overview The VeChainThor Mobile Wallet application will be available for download in the Apple App Store and the Android App Market as early
More informationTHE BANKING & FINTECH APP MARKET IN THE UNITED STATES
THE BANKING & FINTECH APP MARKET IN THE UNITED STATES BENCHMARKS & ANALYSES JULY 2016 In partnership with 1 INTRODUCTION Rankings and trends in the US banking & FinTech app market According to a Federal
More informationOuachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
More informationINX Tokenomics I
Content: 1. INX Tokenomics 2. Why is our blockchain needed? 3. Why are our INX needed? 4. Our technology 5. Blockchain specifications 6. INX details 7. INX distribution 8. INX sales 9. Use of funds 10.
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationThis document contains the steps which will help you to submit your business to listings. The listing includes both business and contact information.
This document contains the steps which will help you to submit your business to listings. The listing includes both business and contact information. You can also include details, such as search keywords,
More informationApp Blockchain Ecosystem. Decentralized Application Store
App Blockchain Ecosystem Decentralized Application Store 1 Catalog 1.Abstract... 4 2.Project Background... 5 2.1 Historical Background... 5 2.2 China App Store Industry Market... 6 2.3 Overseas App Store
More informationAdelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public.
Adelaide Fringe Privacy Statement Revised 16 July 2018 Our Commitment Adelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public.
More informationNEWS CORP AUSTRALIA PRIVACY POLICY
Effective 10 March 2014 Table of Contents: NEWS CORP AUSTRALIA PRIVACY POLICY 1. INTRODUCTION 2. WHAT INFORMATION DO WE COLLECT? 3. HOW DO WE USE YOUR INFORMATION? 4. HOW DO WE PROTECT YOUR INFORMATION?
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationRobert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe
Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international
More informationSecurity Awareness Training Courses
Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security
More informationGDPR COMPLIANCE REPORT
2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.
More informationThe Future of Mobility. Keith Kressin Senior Vice President, Product Management Qualcomm Technologies,
The Future of Mobility Keith Kressin Senior Vice President, Product Management Qualcomm Technologies, Inc. @qualcomm The future of mobility Path to 5G extended Reality Artificial Intelligence Trends Evolution
More information10 April 2016 Mobcon Europe Sofia, Bulgaria. DSK Bank s. experience in the field of Mobile applications
DSK Bank 1 10 April 2016 Mobcon Europe Sofia, Bulgaria DSK Bank s experience in the field of Mobile applications 2004 - launch of first e-channel for DSK Bank Provided to business clients. Run by dedicated
More informationQUADREAL S PURPOSE To create living and working environments that enhance the lives of the people and communities we serve.
QUADREAL S PURPOSE To create living and working environments that enhance the lives of the people and communities we serve. 49 17 6.165 N 123 7 9.182 W VANCOUVER We are a Vancouver-based company with a
More information108th Annual ICA Conference Registration
108th Annual ICA Conference 108th Annual ICA Conference The following is a preview of the registration website. Please be sure to register directly online. If your assistant will register on your behalf
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationICO Review: Zeepin (ZPT)
ICO Review: Zeepin (ZPT) Distributed Creative Economy January 13, 2018 PROJECT OVERVIEW What is Zeepin? Zeepin is aiming to be a disruptive creative platform and economy. Their goal is to provide an opportunity
More informationHow to Choose the Right Designer: A Checklist for Professional Web Design
How to Choose the Right Designer: A Checklist for Professional Web Design How to Choose the Right Designer 2 The Internet has changed the way the world does business and that s just as true for the business
More informationGoldfinger Monitors. High Quality LED LCD Touchscreen Monitors
Goldfinger Monitors High Quality LED LCD Touchscreen Monitors Introduction Dear Valued Customers, Betson Enterprises, A Division of H. Betti Industries, Inc. is pleased to announce they have signed a
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationChicago Energy Benchmarking
Chicago Energy Benchmarking USGBC Missouri Gateway Chapter February 2016 Kathryn Eggers Benchmarking Program Lead 2015 Elevate Energy We promote smarter energy use for all. We give people the resources
More informationTopic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services
Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services 2. Prohibition of Certain Illegal, Criminal or Malicious Conduct In the event ICANN establishes an accreditation
More informationTREEBLOCK.IO. Version Author: Anh Le, Advisor: Dr. Rex Yeap. Creating a high performance IoT Blockchain Network
TREEBLOCK.IO Version 1.3.2 Author: Anh Le, Advisor: Dr. Rex Yeap Creating a high performance IoT Blockchain Network Using Time Sharding Tree Architecture Prominent Value-Propositions 1. Multi-Millions
More informationOver-the-Top B2C Mobile Messaging
Over-the-Top B2C Mobile Messaging B2C Messaging Today B2C mobile messaging is a multi-billion dollar market in growth mode and is used by businesses to attract, retain, and engage with customers for both
More informationThe most extensive identity protection plan available
The most extensive identity protection plan available AGENDA Identity theft About InfoArmor PrivacyArmor coverage Portal walkthrough Q&A Sharing data is now a fact of daily life. Our work requires personal
More information