Disclaimer & Caution

LEGAL DISCLAIMER:

A. Information published on https://cipher.com.co

The website https://cipher.com.co (hereinafter, referred to as the "website") provides information and material of a general nature. You are not authorized and nor should you rely on the website for legal advice, business advice, or advice of any kind. You act at your own risk in reliance on the contents of the website. Should you make a decision to act or not act you should contact a licensed attorney in the relevant jurisdiction in which you want or need help. In no way are the owners of, or contributors to, the website responsible for the actions, decisions, or other behavior taken or not taken by you in reliance upon the website. The official token contracts are different in each respective blockchain and users be cautious and use / refer right and correct contract address and wallet addresses for the transactions.

Official Token Contracts:

1.Ethereum Blockchain: https://etherscan.io/token/0x20AE0cA9D42e6Ffeb1188F341A7D63450452dEF6

2. Binance Smart Chain: https://bscscan.com/token/0x40c1b6f93901733629605d271268a6935f323748

3. Algorand Blockchain: https://algoexplorer.io/asset/125584116 https://algoexplorer.io/address/UBEOMHQPVUTSKKILGGTJ32X7VG35HDVSZILU4NZXRUMSBTISHYQG7YGPCM

4. Stellar Blockchain: https://stellar.expert/explorer/public/asset/CIPHER-GCVAN6WSFRYAL2JCZMMGDGHEYUZVJKUQ7737NEDRNG4OE4TCJUJ6EOU4

NOTE: CIPHER (CPR) project migrated to POLYGON PoS network.

5. Polygon Blockchain : https://polygonscan.com/token/0xaa404804ba583c025fa64c9a276a6127ceb355c6

B. Translations:

The website may contain translations of the English version of the content available on the website. These translations are provided only as a convenience. In the event of any conflict between the English language version and the translated version, the English language version shall take precedence. If you notice any inconsistency, please report them on us by sending an email: support@cipher.com.co

C. Risks related to the use of CIPHER(CPR) utility token:

The Website will not be responsible for any losses, damages or claims arising from events falling within the scope of the following five categories:

(1) Mistakes made by the user of any Cipher-related software or service, e.g., forgotten passwords, payments sent to wrong Cipher (CPR), token contract addresses, wallet addresses and accidental deletion of wallets.

(2) Software problems of the website and/or any Cipher-related software or service, e.g., corrupted wallet file, incorrectly constructed transactions, unsafe cryptographic libraries, malware affecting the website and/or any Cipher-related software or service.

(3) Technical failures in the hardware of the user of any Cipher-related software or service, e.g., data loss due to a faulty or damaged storage device.

(4) Security problems experienced by the user of any Cipher-related software or service, e.g., unauthorized access to users' wallets and/or accounts.

(5) Actions or inactions of third parties and/or events experienced by third parties, e.g., bankruptcy of service providers, information security attacks on service providers, and fraud conducted by third parties.

D. Investment risks:

The investment in Cipher can lead to loss of money over short or even long periods. The investors in Cipher should expect prices to have large range fluctuations. The information published on the website cannot guarantee that the investors in Cipher would not lose money.

E. Compliance with tax obligations:

The users of the website are solely responsible to determinate what, if any, taxes apply to their Cipher transactions. The owners of, or contributors to, the website are NOT responsible for determining the taxes that apply to Cipher transactions.

F. Regulations

The users should abide by their own country’s Rules and Regulations for Cryptocurrency/Crypto asset/digital asset/utility token.

G. The website does not store, send, or receive Cipher (CPR) Tokens:

The website does not store, send or receive Cipher tokens. This is because Cipher tokens exist only by virtue of the ownership record maintained in the Cipher network. Any transfer of title in Cipher occurs within a decentralized Cipher network, and not on the website.

H. No warranties:

The website is provided on an "as is" basis without any warranties of any kind regarding the website and/or any content, data, materials and/or services provided on the website.

I. Limitation of liability:

Unless otherwise required by law, in no event shall the owners of, or contributors to, the website be liable for any damages of any kind, including, but not limited to, loss of use, loss of profits, or loss of data arising out of or in any way connected with the use of the website.

J. Arbitration:

The user of the website agrees to arbitrate any dispute arising from or in connection with the website or this disclaimer, except for disputes related to copyrights, logos, trademarks, trade names, trade secrets or patents.

K. Last amendment:

This disclaimer was amended for the last time on February 19th, 2021. The disclaimer will be amended in a timely manner.

CAUTION: Be aware of unsolicited practice in the crypto industry.

1.Avoid Scams

Familiarize yourself with some of the most commonly observed crypto related scams to help protect yourself and your finances.

2. Blackmail

Be wary of blackmail attempts in which strangers threaten you in exchange for cryptocurrency as a means of extortion. One common execution of this method is by email, where-in the sender transmits a message claiming that he/she has hacked into your computer and is operating it via remote desktop protocol (RDP). The sender says that a key logger has been installed and that your web cam was used to record you doing something you may not want others to know about. The sender provides two options - send cryptocurrency to suppress the material, or send nothing and see the content sent to your email contacts and spread across your social networks. Scammers use stolen email lists and other leaked user information to run this scheme across thousands of people in masse.

3.Fake Exchanges

As cryptocurrency has become more popular, more people have sought to acquire it. Unfortunately, nefarious people have taken advantage of this and have been known to set up fake cryptocurrency exchanges. These fake exchanges may trick users by offering extremely competitive market prices that lull them into thinking they're getting a steal, with quick and easy access to some cheap cryptocurrency. Be sure to use a reputable exchange when buying or selling cryptocurrency.

4.Free Giveaways

Due to the viral nature of how information spreads across on the internet, scammers seek to take advantage of people by offering free giveaways of cryptocurrency or other digital currencies in exchange for sending a small amount to register, or by providing some personal information. When you see this on a website or social network, it's best to immediately report the content as fraudulent, so that others don't fall victim.

5.Impersonation

Unfortunately, it's very easy for con-artists to create social media accounts and impersonate people. Often times they lie in wait, until the person they're trying to impersonate publishes content. The impersonator then replies to it with a follow-up message or call to action - like a free giveaway - using an account that looks almost identical to the original poster or author. This makes it seem like the original person is saying it. Alternatively, impersonators may also try to use these same fake accounts to trick others via private or direct message into taking some kind of action in an attempt to defraud or compromise. Never participate in free giveaways, and if you receive an odd request via someone in your network, it's best to double check to confirm the authenticity via multiple mediums of communication.

6.Malware

Hackers have become very creative at finding ways to steal from people. When sending cryptocurrency, always be sure to double or triple check the address you're sending to. Some malware programs, once installed, will change cryptocurrency addresses when they're pasted from a user's clipboard, so that all of the cryptocurrency unknowingly gets sent to the hacker's address instead. Since there is little chance of reversing a cryptocurrency transaction once it's confirmed by the network, noticing this after the fact means it's too late and most likely can't be recovered. It's a good idea to be super-cautious about what programs you allow to have administrator access on your devices. An up-to-date, reputable virus scanner can also help but is not foolproof.

7.Meet in Person

When buying or selling cryptocurrency locally, a counterparty may ask you to meet in person to conduct the exchange. If it isn't a trusted party that you already know, this is a very risky proposition that could result in you getting robbed or injured. Con-artists have also been known to exchange counterfeit fiat currency in exchange for cryptocurrency. Consider using a peer-to-peer platform to escrow the funds in place of meeting in person.

8.Money Transfer Fraud

Do not reply to emails or inbound communications from strangers telling you they need help moving some money, whereafter in exchange for your services, you'll get a portion of the funds.

9.Phishing Emails

Beware of emails purported to be from services you use soliciting you for action, such as resetting your password, or clicking through to provide some sort of interaction with regard to your account. It can be very difficult to spot the difference in a fake email that's trying to entice you to compromise your account, and a legitimate one sent on behalf of a product or service that you use. When in doubt, considering triple-checking the authenticity of the communication by forwarding it to the company, using the contact email address on their website, calling them on the telephone, and/or reaching out to them via their official social media accounts.

10.Phishing websites

Phishing websites often go hand-in-hand with phishing emails. Phishing emails can link to a replica website designed to steal login credentials or prompt one to install malware. Do not install software or log in to a website unless you are 100% sure it isn't a fake one. Phishing websites may also appear as sponsored results on search engines or in app marketplaces used by mobile devices. Be wary that you aren't downloading a fake app or clicking a sponsored link to a fake website.

11.Ponzi Schemes

Do not participate in offerings where one or more people offer you a guaranteed return in exchange for an upfront deposit. This is known as a Ponzi scheme, where-in future depositor’s principals are used to pay previous investors. The end result is usually a lot of people losing a lot of money.

12.Pyramid Schemes

A pyramid scheme promises returns to participants based on the number of people they invite to join. This enables the scheme to grow virally and rapidly, however, it most often doesn't result in any kind of meaningful return for the members and/or those invited who also joined. Never invite your personal network under the sole goal of accumulating rewards or returns from a product or service, and do not contribute your own capital at the behest of others to accelerate the process.

13.Prize Giveaways

Similarly, to free giveaways, prize giveaway scams trick people into taking action or supplying information about themselves. For example, supplying a name, address, email and phone number in order to claim a prize. This can allow a hacker to attempt to use the information to gain access to accounts by impersonating you.

14.Pump and Dumps

Do not trust people who entice you or others to invest because they claim that they know what the cryptocurrency price is going to be. In a pump and dump scheme, a person (or persons) tries to artificially drive up or pump the price so that they can dump their holdings for a profit.

15.Ransomware

This is a type of malware that partially or completely blocks access to a device unless you pay a ransom in cryptocurrency. It's best to consult the advice of a trusted computer professional for removal assistance, rather than paying the ransom. Be careful about what programs you install on your devices, especially those that request administrator access. Also be sure to double-check that the application you are downloading isn't a fake one that's impersonating a legitimate one you've used in the past

.

16.Scam Coins

Be careful when investing in alternative coins (altcoins). Amongst altcoins there may be scam coins, enticing users to invest via private sales, or with presale discounts. Scam coins may feature a flashy website and/or boast a large community to create a fear of missing out effect on people who discover it. This helps early holders pump up the price so that they can dump and exit their positions for a profit. Scam coins without large communities may do airdrops - offering free coins (or tokens) to people in exchange for joining their communities. This enables scam coins to present their initiatives with inflated traction metrics to make investors feel like they're missing out when it comes time for them to decide if they'd like to buy-in. Scam coins may also use the word Cryptocurrency in them in an effort to trick or mislead people into thinking there is a legitimate relationship.

We thank Bitcoin.org for the source of the content

.