Welcome!

News Feed Item

MaidSafe Crowd-Sale Begins on April 22

Groundbreaking Peer-to-Peer System Designed to Decentralize the Entire Internet and Web Will Crowd-Sale Its First $8 Million of Software Tokens, With 10-40 Percent Bonus for Early Participation

TROON, SCOTLAND -- (Marketwired) -- 04/21/14 -- MaidSafe (http://maidsafe.net/), creators of a peer-to-peer encrypted network of tokens that can decentralize nearly every aspect of the Internet, including all Web services, today announced the opening of a 30-day crowd-sale of its enabling software, Project SAFE, taking place at www.safecoin.io. Purchasers will receive additional tokens descending in amount by algorithm as the sale progresses, starting at 40 percent for the first purchases and descending via a smooth linear algorithm to no additional tokens on the final day.

Safecoins are tokens generated and protected by the SAFE network, which facilitate the wide array of applications which can be developed using them, from decentralized cloud storage to secure websites which cannot be attacked. Ten percent of all safecoins (429,496,729) will be made available during the crowd-sale, with a value of 17,000 safecoins per Bitcoin. An additional 15 percent will be reserved for the MaidSafe Foundation, which will use these coins to reward developers and operate the foundation, and 5 percent will be returned to the early investors in MaidSafe.

The crowd-sale begins at 9 a.m. GMT (British Summer Time), Tuesday, April 22, 2014 (1 am PST, 4 am EST). The exact amount of money generated depends upon the price that day of bitcoin (currently around $500) and the time at which the tokens are purchased. A complete sale of all 429,496,729 safecoins would generate roughly $8 million, depending upon how many coins are sold during which weeks and the price of Bitcoin during each transaction, as the price per safecoin will remain fixed throughout the sale at 17,000 safecoins per bitcoin.

Upon the completion of this crowd-sale, the value of existing safecoins will be approximately $24-30 million, with the remaining 70 percent of a capped number (like Bitcoin) of safecoins to be "farmed" (analogous to mining, but created by contributing resources, such as storage space) by anyone who wishes to add value to the network. The initial tokens will utilize a proxy token, the MaidSafeCoin, which will be recorded on the Bitcoin blockchain. When the full SAFE network becomes operational, MaidSafeCoins will be swapped for safecoins on a 1-to-1 ratio.

Project SAFE (Secure Access For Everyone) is a fully distributed platform that rides on top of the Transmission Control Protocol of the Internet Protocol (TCP/IP). It uses key/value storage and Kademlia-based routing to decentralize every aspect of the Internet, including all Web services. "What Bitcoin is doing for decentralizing money, safecoin will do for decentralizing all Internet services, including enterprise data centers," said David Irvine, MaidSafe founder and CEO.

There are two ways of taking part in the safecoin crowd-sale:

1) Send bitcoin to the address provided on the crowd sale site (buysafecoins.com) from a wallet you control (e.g., not Coinbase).
2) Mastercoin holders can send direct to the MSC address provided on the crowd sale site (buysafecoins.com).

For step-by-step instructions, please refer to this presentation link (which will be updated on the day of the sale with additional information): http://bit.ly/1mq2rqj

During the crowd-sale, 10 percent of all safecoins will be made available to buyers from anywhere in the world (429,496,729) through a proxy token, the MaidSafeCoin. Once the MaidSafe network goes live, the MaidSafeCoins will be redeemable for the network's native safecoins at a 1-to-1 ratio.

By decentralizing the Internet, Project SAFE will enable:

  • Private, secure communications, with autonomous handling of structured and unstructured data types.
  • Decentralized solutions that replace HTTP, SMTP, FTP, etc., and are immune to DNS manipulation, (i.e., this network cannot be blocked)
  • Ability for people to self-authenticate onto the network and join anonymously
  • A network that requires no administrators nor human intervention of any kind
  • A highly usable and free API that enables a plethora of developers to create the next wave of secure applications not possible with today's centralized architecture
  • An underlying cryptocurrency (safecoin) that will incentivize all actors in the ecosystem

Project SAFE will operate on an incentivized proof-of-resource model. Once a computer becomes part of the network, its ability to store data chunks (CPU speed, bandwidth, online time, etc.) will be measured and the computer's account will be issued the corresponding amount of safecoins. This software may also be traded or purchased.

About MaidSafe
Founded in February, 2006, with the intent to decentralize the Internet, MaidSafe has been working on Project SAFE for eight years (longer than the Bitcoin blockchain has been in existence). Based in Troon, Scotland, the 14-person team has received a total of $5 million in private investment to date, and it will be using the not-for-profit MaidSafe Foundation (http://www.maidsafefoundation.org) to control issuance and manage the funds generated during the April 2014 crowd-sale.

The MaidSafe platform is designed for third-party application providers to create their own application environment and removes developer risk for startups. Self-authentication allows for everyone to be in complete control of all data, beyond encryption to include physical access. In essence, nobody knows where any data is located, thereby providing completely private and unilateral access by individuals. The network lets users manage any information completely free of any third-party involvement. Users can store, share, chat and publish 100 percent under their own control and knowledge. For more information, visit http://maidsafe.net.

References
MaidSafe white paper: https://github.com/maidsafe/Whitepapers/blob/master/Project-Safe.md

Metaquestions essay: http://metaquestions.me/2014/04/12/safecoin-why-its-safe-and-what-it-means-for-us-all/

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
The Internet giants are fully embracing AI. All the services they offer to their customers are aimed at drawing a map of the world with the data they get. The AIs from these companies are used to build disruptive approaches that cannot be used by established enterprises, which are threatened by these disruptions. However, most leaders underestimate the effect this will have on their businesses. In his session at 21st Cloud Expo, Rene Buest, Director Market Research & Technology Evangelism at Ara...
"We are a monitoring company. We work with Salesforce, BBC, and quite a few other big logos. We basically provide monitoring for them, structure for their cloud services and we fit into the DevOps world" explained David Gildeh, Co-founder and CEO of Outlyer, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, paneli...
Join us at Cloud Expo June 6-8 to find out how to securely connect your cloud app to any cloud or on-premises data source – without complex firewall changes. More users are demanding access to on-premises data from their cloud applications. It’s no longer a “nice-to-have” but an important differentiator that drives competitive advantages. It’s the new “must have” in the hybrid era. Users want capabilities that give them a unified view of the data to get closer to customers and grow business. The...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.