cryptocurrency forum

AIDUS

Discussion in 'ICOs' started by AIDUS, Jan 2, 2019.

  1. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
  2. Karina

    Karina Contributor

    Messages:
    24
    Likes Received:
    2
    Trophy Points:
    8
    Credits
    16%
    wow..... mio congritulations :rolleyes:
     
  3. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
    ohoho, thank u :)
     
  4. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
  5. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
    The reason, you should get AID Coin! [​IMG]
     
  6. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
  7. Karina

    Karina Contributor

    Messages:
    24
    Likes Received:
    2
    Trophy Points:
    8
    Credits
    16%
    Can u give me the main information about Airdrop ?
     
  8. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
    sure, sir

    - Airdrop promotional campaign is valid until 15/03/2019.
    - The tokens will be distributed 30 days after the end of the event.
    - AID Tokens will be distributed through LATOKEN accounts, not directly from AIDUS
     
  9. AIDUS

    AIDUS Scholar

    Messages:
    147
    Likes Received:
    0
    Trophy Points:
    26
    Credits
    12%
    [ Blockchain News ]


    IBM Publishes Patent for Resisting Replay Attacks in
    Permissioned Blockchains

    Multinational computing giant IBM is adding to its arsenal of blockchain patents with an application for improving the security of permissioned blockchain networks.

    The patent is entitled “Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network,” and outlines security techniques for withstanding such attacks while maintaining valid user permissions and privacy.

    cointelegraph.com/news
     

Share This Page