Welcome!

News Feed Item

MaidSafe Crowd-Sale Begins on April 22

Groundbreaking Peer-to-Peer System Designed to Decentralize the Entire Internet and Web Will Crowd-Sale Its First $8 Million of Software Tokens, With 10-40 Percent Bonus for Early Participation

TROON, SCOTLAND -- (Marketwired) -- 04/21/14 -- MaidSafe (http://maidsafe.net/), creators of a peer-to-peer encrypted network of tokens that can decentralize nearly every aspect of the Internet, including all Web services, today announced the opening of a 30-day crowd-sale of its enabling software, Project SAFE, taking place at www.safecoin.io. Purchasers will receive additional tokens descending in amount by algorithm as the sale progresses, starting at 40 percent for the first purchases and descending via a smooth linear algorithm to no additional tokens on the final day.

Safecoins are tokens generated and protected by the SAFE network, which facilitate the wide array of applications which can be developed using them, from decentralized cloud storage to secure websites which cannot be attacked. Ten percent of all safecoins (429,496,729) will be made available during the crowd-sale, with a value of 17,000 safecoins per Bitcoin. An additional 15 percent will be reserved for the MaidSafe Foundation, which will use these coins to reward developers and operate the foundation, and 5 percent will be returned to the early investors in MaidSafe.

The crowd-sale begins at 9 a.m. GMT (British Summer Time), Tuesday, April 22, 2014 (1 am PST, 4 am EST). The exact amount of money generated depends upon the price that day of bitcoin (currently around $500) and the time at which the tokens are purchased. A complete sale of all 429,496,729 safecoins would generate roughly $8 million, depending upon how many coins are sold during which weeks and the price of Bitcoin during each transaction, as the price per safecoin will remain fixed throughout the sale at 17,000 safecoins per bitcoin.

Upon the completion of this crowd-sale, the value of existing safecoins will be approximately $24-30 million, with the remaining 70 percent of a capped number (like Bitcoin) of safecoins to be "farmed" (analogous to mining, but created by contributing resources, such as storage space) by anyone who wishes to add value to the network. The initial tokens will utilize a proxy token, the MaidSafeCoin, which will be recorded on the Bitcoin blockchain. When the full SAFE network becomes operational, MaidSafeCoins will be swapped for safecoins on a 1-to-1 ratio.

Project SAFE (Secure Access For Everyone) is a fully distributed platform that rides on top of the Transmission Control Protocol of the Internet Protocol (TCP/IP). It uses key/value storage and Kademlia-based routing to decentralize every aspect of the Internet, including all Web services. "What Bitcoin is doing for decentralizing money, safecoin will do for decentralizing all Internet services, including enterprise data centers," said David Irvine, MaidSafe founder and CEO.

There are two ways of taking part in the safecoin crowd-sale:

1) Send bitcoin to the address provided on the crowd sale site (buysafecoins.com) from a wallet you control (e.g., not Coinbase).
2) Mastercoin holders can send direct to the MSC address provided on the crowd sale site (buysafecoins.com).

For step-by-step instructions, please refer to this presentation link (which will be updated on the day of the sale with additional information): http://bit.ly/1mq2rqj

During the crowd-sale, 10 percent of all safecoins will be made available to buyers from anywhere in the world (429,496,729) through a proxy token, the MaidSafeCoin. Once the MaidSafe network goes live, the MaidSafeCoins will be redeemable for the network's native safecoins at a 1-to-1 ratio.

By decentralizing the Internet, Project SAFE will enable:

  • Private, secure communications, with autonomous handling of structured and unstructured data types.
  • Decentralized solutions that replace HTTP, SMTP, FTP, etc., and are immune to DNS manipulation, (i.e., this network cannot be blocked)
  • Ability for people to self-authenticate onto the network and join anonymously
  • A network that requires no administrators nor human intervention of any kind
  • A highly usable and free API that enables a plethora of developers to create the next wave of secure applications not possible with today's centralized architecture
  • An underlying cryptocurrency (safecoin) that will incentivize all actors in the ecosystem

Project SAFE will operate on an incentivized proof-of-resource model. Once a computer becomes part of the network, its ability to store data chunks (CPU speed, bandwidth, online time, etc.) will be measured and the computer's account will be issued the corresponding amount of safecoins. This software may also be traded or purchased.

About MaidSafe
Founded in February, 2006, with the intent to decentralize the Internet, MaidSafe has been working on Project SAFE for eight years (longer than the Bitcoin blockchain has been in existence). Based in Troon, Scotland, the 14-person team has received a total of $5 million in private investment to date, and it will be using the not-for-profit MaidSafe Foundation (http://www.maidsafefoundation.org) to control issuance and manage the funds generated during the April 2014 crowd-sale.

The MaidSafe platform is designed for third-party application providers to create their own application environment and removes developer risk for startups. Self-authentication allows for everyone to be in complete control of all data, beyond encryption to include physical access. In essence, nobody knows where any data is located, thereby providing completely private and unilateral access by individuals. The network lets users manage any information completely free of any third-party involvement. Users can store, share, chat and publish 100 percent under their own control and knowledge. For more information, visit http://maidsafe.net.

References
MaidSafe white paper: https://github.com/maidsafe/Whitepapers/blob/master/Project-Safe.md

Metaquestions essay: http://metaquestions.me/2014/04/12/safecoin-why-its-safe-and-what-it-means-for-us-all/

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.