
A blockchain ecosystem that links crypto and traditional finance by bringing real-world data onchain in a Know-Your-Customer (KYC) and AML compliant environment.
1.1.3 Tokenomics
Token name: CRD

Protocol: ERC-20
Contract Address: 0xcaaa93712bdac37f736c323c93d4d5fdefcc31cc
Total Market Cap: 1 000 000 000 (pre-minted)
piechart-01
CRDs were initially distributed via ICO in 2018, and traded on the main exchange (Cryptaldash), as well as secondary markets, like SushiSwap and UniSwap.
Portion of the tokens was bought back with the intention of reinvesting in the project.
Disclosure
This white paper is for information purposes only and may be subject to change. We cannot guarantee the accuracy of the statements made or conclusions reached in this white paper and we expressly disclaim all representations and warranties (whether express or implied by statute or otherwise) whatsoever, including but not limited to: • any representations or warranties relating to merchantability, fitness for a particular purpose, suitability, wage, title or noninfringement; • that the contents of this document are accurate and free from any errors; and • that such contents do not infringe any third party rights. We shall have no liability for damages of any kind arising out of the use, reference to or reliance on the contents of this white paper, even if advised of the possibility of damages arising. This white paper may contain references to third party data and industry publications. As far as we are aware, the information reproduced in this white paper is accurate and that the estimates and assumptions contained herein are reasonable. However, we offer no assurances as to the accuracy or completeness of this data. Although information and data reproduced in this white paper are believed to have been obtained from reliable sources, we have not independently verified any of the information or data from third party sources referred to in this white paper or ascertained the underlying assumptions relied upon by such sources. As of the date of publication of this white paper, CRD tokens have no known or intended future use (other than on the CRD Network, as more specifically defined in this White Paper). No promises of future performance or value are or will be made with respect to CRD Tokens, including no promise of inherent value, no promise of continuing payments, and no guarantee that CRD Tokens will hold any particular value. Unless prospective participants fully understand and accept the nature of the CRD business and the potential risks associated with the acquisition, storing and transfer of CRD Tokens, they should not participate in the CRD Token event. CRD Tokens are not being structured or sold as securities or investments. CRD Tokens hold no right and confer no interests in the equity of any company. CRD Tokens are sold with an intended future functionality and utility on the CRD network and This white paper does not constitute a prospectus or disclosure document and is not an offer to sell, nor the solicitation of any offer to buy any investment or financial instrument in any jurisdiction. CRD Tokens should not be acquired for speculative or investment purposes with the expectation of making an investment return. No regulatory authority has examined or approved any of the information set out in this white paper. No such action has or will be taken under the laws, regulatory requirements or rules of any jurisdiction. The publication, distribution or dissemination of this white paper does not imply that applicable laws or regulatory requirements have been complied with. Participation in cryptocurrency projects carries a substantial risk and may involve special risks that could lead to a loss of all or a substantial portion of your contribution.
1- Introduction
CRD Network is delivering real world data OnChain, resulting in a Finance 2.0 ecosystem delivered via API endpoints to the oracles, dApps and end users directly. We define Finance 2.0 as a combination of DeFi transactions and services with CeFi (centralized finance).
Ecosystem includes KYC Data Module, Transaction Banking Module and a set of crypto and traditional finance microservices which are using Hyperledger Besu private sidechain to maintain immutability of all major events within databases. Each significant transaction is stored, broadcasted and validated by the independent set of Masternodes within Hyperledger chain, and further enhanced by regular rollups state of the system into ETH mainnet.
The Network’s infrastructure, built on Hyperledger Besu, ensures that any major transactions and sets of data (like KYC data) are stored in an immutable manner. The data cannot be counterfeited without leaving any trace, which greatly aids the compliance.
Goal of CRD Network is to create a set of unified and standardized CeFi data and DeFi protocols. Moreover, CRD network aims to reduce AML risks as well as transaction data for institutions and users.
1.1 Basic Concepts
1.1.1 The CRD Network ecosystem
CRD Network merges Decentralized Finance (DeFi) with everyday real-world data, Including financial history, real Asset prices and compliance data by creating a GDPR and AML compliant environment that lessens the points of friction between you and the future of finance.
FinTech products enjoy great flexibility due to Microservice architecture. This particular technology allows to plug and integrate new services (or blockchains) without any major changes to the system.
The main benefit of using this setup is its ability to interact and bring your everyday financial data on-chain.
CRD Network bridges the Data and Regulatory gap between the Onchain and the “offline” economy.
Currently, CRD Network consists of the following modules:
bullent-point
KYC+KYT Module - Identity and document verification, AML, liveness check + crypto transactions compliance.
Rectangle
Proof-of-KYC engine (on-demand broadcasting KYC status of the user/address without revealing user details to the 3rd parties)
bullent-point
Proof of Real Assets Reserves - Providing the capacity to connect your real world assets value to the onchain & DeFi world. It enables you to leverage your full asset base and interact with lending and the stack protocol.
bullent-point
Transactional Banking module - IBAN accounts, cards & transfers.
bullent-point
Crypto Custody - Iinsured custody, transfers & yield.
bullent-point
DeFi module - Crypto decentralized trades in compliant manner.
Supplementary modules:
bullent-point
Node explorer (validator nodes for all major transactions)
https://netstats.crdtoken.org
bullent-point
Auditing module (regulator/auditor access point to verify KYC data)
https://auditing.app.crdtoken.org
bullent-point
Auditing tools for regulators (to trace data)
1.1.2 CRD Token
CRD is a utility token based on the ERC-20 protocol, which is issued by the Ethereum blockchain.
There are several use cases for the token:
bullent-point
Some transactions within CRD Network require to hold or spend CRD by the users
bullent-point
Private CRD Masternodes, which allows users to stake CRD and validate transactions, thus increasing the strength of the network (in development).
bullent-point
Several tiers of the crypto cards, where each tier requires to stake some CRD to get better rewards (in development).
bullent-point
Cashback on cards in form of CRD (in development).
1.1.3 Tokenomics
Token name: CRD
Protocol: ERC-20
Contract Address: 0xcaaa93712bdac37f736c323c93d4d5fdefcc31cc
Total Market Cap: 1 000 000 000 (pre-minted)
piechart-01
CRDs were initially distributed via ICO in 2018, and traded on the main exchange (Cryptaldash), as well as secondary markets, like SushiSwap and UniSwap.
Portion of the tokens was bought back with the intention of reinvesting in the project.
2 - Infrastructure Overview
CRD and the aggregate CRD Network are designed to be built upon and have Decentralized Finance (DeFi) apps deployed on them. In other words, its primary value stems from its modularity, whereby third-party developers can build virtually any FinTech application on the network.
In this section, we will be discussing proposed use cases of the CRD Network as consumer, business and institutional products. But primarily, we will showcase various products and services that are currently being developed by our DeFi innovation partner, DLTify.
A blockchain ecosystem that links crypto and traditional finance by bringing real-world data onchain in a Know-Your-Customer (KYC) and AML compliant environment.

reNFT (Blockchain Service)
As part of reNFT’s community focus, the team decided after a brief period of reduced interaction to get the community engaged again. Recent weeks have seen the team hard at work and striving for the goals set in their initial article seen on Notion! This weeks Community Call was held on Discords platform, all chat history can be seen under “Calls Chat”.

THE DAO TREASURY: 60%
Reserved for successfully passed DAO proposals
- Further protocol development
- Strategic Partnerships
- Marketing Efforts
- New Product Development etc
EARLY CONTRIBUTORS: 15%
- Vested in a drip contract over 2 years
COMMUNITY AIRDROPS: 15%
- Discord/Twitter/Telegram follower airdrops
- Early reNFT supporters/contributors
- Specific NFT holders
LIQUIDITY PROVIDERS: 10%
- LPs on Uniswap or Sushiswap
Community Call
- Rarible integration
- Team Expansion & Community Participation
- Mainnet update
- The Mystery of the 3rd Utility
- Q&A
Rarible Integration:
If you saw our Tweet, you would know that we announced that our Rarible proposal had passed with retro colours! We will be fully integrating in to the Rarible platform to allow rentals. Super exciting! People will be able to put out there NFT’s for rental, additionally allowing users to mint rentable NFT’s. A new spin on a very established platform.
We are really appreciative to those of you who voted for this to happen, we are very pumped to begin integrating them. This should take about a month, maybe slightly more but the work will begin very soon!
*Cue applause from the audience*
Team Expansion & Community Participation:
As you may have seen we have put out our advert that we would like to onboard further developers. The Rarible funding has allowed us to level things up. Our current developers Naz & Sundeep, have been working intensely so this will allow us to share some work load. Check out our Front End Developer listing here. We have had a few applications but we feel it’s important to hire somebody who fits in line with the project. So please if you know of anybody suitable for the job then by all means give them a nudge in the reNFT direction.
We want to take this moment to address that absolutely anybody who wants to get involved, can! This can be as simple as contacting any of the Team members on Telegram or Discord. If you see something that you could help with or improve on then we welcome all ideas, proposals and solutions.
It was only 2 weeks ago that Sundeep contacted the Team, since then Sundeep has been coding nonstop, slotting into the team like a true reNFT coder. In fact, he has just dropped an update for MoonCats, now he’s helping on a current project that hopefully will be announced shortly.
On top of this, I (Naz) was communicating in the community channels how we can start utilising the skills of the community. Ralph contacted my self with a Notion document thats yet to be reviewed by the team but outlines a plan to have the community fill out a form highlighting skill sets of people that we could call upon when needed such as Marketing Content, Gifs etc. Right now however we ask that you simply reach out to us. If there is a way you see fit where you can help, we are open to lots of ideas, from Marketing Content to Full Development. Given that this is a full DAO approach all contributions will be rewarded.
Community Proposal Idea:
“Im Yawn, also known as Nemo in the Telegram. I act as a Community Moderator for reNFT. I’d like to go through an idea for a DAO proposal i have been working on. I have been putting together a proposal for the last week and a half which would be curated and sponsored by reNFT, an NFT museum. The idea being the DAO would be minting a NFT ticket similar to rehab Festival. Im trying to work on the utility based products for reNFT. The best thing about the reNFT community so far is the reaction to the utility of the AstroCat NFT. There has been a lot of price talk, which seems to be a focus currently! But the benefit of hanging out in the Discord + TG every one seems to believe in utilities. I have thought about making the AstroCat NFT act as a season pass, obviously original community may not have to purchase due to the airdrop. But i will be uploading an official proposal for this to reNFT Discourse proposal area in the coming week. Id like to ask if anyone has any further ideas or opinions on this to DM on TG or Discord.”
reNFTs Naz added to this saying that Luis had also thought about a similar idea, NFT Festivals! Both ideas tie in closely and we can expect Yawn, Naz & Luis to be in close contact from this. These ideas highlight that there are so many examples of criteria based events in real life that can be ported into blockchain, ie Museums, Gallery’s & Sponsored Artists.
Do you have an idea for a Proposal? Head over to the reNFT Discourse proposal section and tell us all about it! Not curated a full idea yet? Then simply discuss it openly in the socials. Two AstroCats are better than one….
Mainnet Update:
A hint was given, not sure if anybody picked this up, that Mainnet would be ready to go by the end of April. To date we are still on track for mainnet completion including testing. We are aiming for the first week of may for a true launch, a super exciting landmark right around the corner. We wanted to tease our User interface (UI), we’d love to hear your thoughts on this so comment in our socials your thoughts!
reNFT UI
Big thanks to Luis who created this masterpiece, some hard work has really paid off!
The front end is predominantly finished, the contracts are complete, all that is left is integration testing to see that the front works effortlessly with the back end. Optimising for both NFT standard tokens. Batching ERC 1155 & 721’s can be expensive dependant on contract interaction, but here at reNFT we want you to do this ‘optimally’. We will be planning to build a ‘reNFT price estimate service’ which will allow you to estimate total gas fees taking into account : Transfer, deposit, withdraw etc. A global circular economical estimation! Truely caring for our community.
As the mainnet draws in closer we have plans to up the marketing, therefore if your reading this now, please consider your self early!
The AstroCat NFT Utility:
Viewable on Opensea : https://opensea.io/assets/0x0db8c099b426677f575d512874d45a767e9acc3c/1
On the 1st of April the first 2 AstroCat NFT utilities were announced :
Discounted Fee’s on NFT Rentals
Yield Boost in Liquidity Mining
Our next hint for our 3rd utility of the AstroCat NFT is……
It will involve the $RENT token.
More detailed articles to come on the utilities.
Open Question & Answers:
Are you planning to subsidize users with $rent rewards early on while we’re stuck with eth L1 fees?
There are some ideas circulating around this matter. We have a lot of interesting ways of hedging against this! More to come on this…
Thoughts on EIP 2615?
We are actually in the working group for EIP 2615, there are a lot of things in them that are super bloated that may prove near impossible on mainnet. Theres not much happening there quite honestly, it obviously requires port of any 721 / 1155 in this space as well as each project porting. EIP could end up costing alot in transaction fees. We are actively involved like we said though, we are always open to new ways of adapting rental contracts.
What is happening with MATIC?
MATIC is definitely happening, it’s in the immediate next steps. Really we plan to be anyway that there are strong rental use case happening or great NFT use case going on. We see a lot of games going on to MATIC. End of the day, we are a protocol layer that can easily adapt to any scaling solution where we see opportunity.
Will there be anti-bot protection integrated into the protocol? Being bombarded with bots in opensea on my nfts constantly. Anything thoughts?
Assume you mean the bots that are bidding the absolute floor for our current NFT’s. In our case, if you have an NFT and you send it to our contract to lend it out to somebody, with that you specify the parameters such as amount daily + Collateral. There is no spamming in this setup. They either take the deal or do not.
When Proof of attendance for community calls?
This is not a bad idea, we will see what we can do!
Are cats reNFTs mascot?
The cats came about given that we were putting out the moon cat shop! Its funny because Luis created this reNFT AstroCat before we got involved in any of the Mooncat work, It came full circle from there so it fealt meant to be!
What’s the easiest and quickest way to get $rent token and start LP pool to provide liquidity?
There is no token generation event, there is no sale of $rent YET! We are true DAO in the sense that it will be distributed accordingly and from then there will be creation of pairs!
Since your initial reNFT proposal that was put out on Notion, has anything changed? Have tokenomics changed, gas fees became an issue have you changed anything as a result?
Nothing too major. We are currently looking at other L2 and other chains where there are true NFT rental use cases and action on going. We are at an interesting time in the market where people are actively exploring this. The ultimate plan of iteration 0 which will be first product launching early may, will be to be a generalised protocol. From here it gets really exciting, where we can talk to projects about direct integrations and scaling solutions! This will be just the start.
Rarible integration is super cool, any plans for integration with other platforms at the moment?
We are actively acting on this. We don’t like to jump the gun however. We don’t want to alpha leak. But we are talking to a lot of other Games, other DAO’s that may have rental use cases, potentially collateral free. Watch this space.
Regarding tokenomics, is there going to be any direct use with Rarible with the $RENT token?
They are giving us the RARI funding to build the integration which is great as it allows us to hire more devs to build more. We would first need to build our reputation further before we could do things like this. The first steps are to get it built, get lots of activity going and then build on from there.
Thank you for taking your time to join us for our Community Call. We do plan on doing these more regularly, as soon as the work load eases slightly we will engaging a lot more with the community. We will be able to release somethings that have been under wraps! We should all be really excited about whats to come.

The Future of Climate Change: 5 Highlights in February 2022The Future of Climate Change: 5 Highlights in February 2022
The Future of Climate Change: 5 Highlights in February 2022
“The Future of Climate Change: 5 Highlights in February 2022
“The Future of Climate Change” is a monthly series: we choose 5 beautiful things that shaped the future of climate action in the past month.

Plus! When you start looking, you’ll notice so much good happening. That’s why we had to include a Biodiversity & Sustainability bonus at the end!
So, what is the good climate news in January 2022?
🛢 Greenland permanently bans all oil and gas exploration
What a way to start the year -- Greenland announced it is permanently halting all new oil and gas exploration!
“The future does not lie in oil. The future belongs to renewable energy, and in that respect, we have much more to gain,” commented the government.
In addition to oil and gas bans, Greenland has introduced plans to halt uranium usage: its investigation, exploration, and extraction.
Go on, Greenland!
As a part of UNESCO’s ocean mapping initiative, a huge coral reef was discovered off the coast of Tahiti!
This reef is special as it's 30m below the surface and, therefore, more protected. Most reefs sit in shallow water so they're more impacted by rising ocean temperatures, which often lead to coral bleaching.
This discovery gives hope that there are even more deep reefs out there than previously thought! They could be crucial in offering refuge for fish species.
“It was magical to witness giant, beautiful rose corals which stretch for as far as the eye can see. It was like a work of art,” said Alexis Rosenfeld, a photographer part of the Unesco-led expedition.
This finding is vital for research as coral reefs are an important food source and home to many organisms -- researching coral reefs can teach us a lot about biodiversity.
Yet another study proving cutting meat out of your diet will be good for the planet.
That’s according to the study “Dietary change in high-income nations alone can lead to substantial double climate dividend" from Leiden University, Netherlands. The study looked closely at if high-income countries would adopt a plant-based diet.
The calculations show that switching to a veggie diet would reduce agricultural emissions by 61%.
“It’s a remarkable opportunity for climate mitigation. It would also have massive benefits for water quality, biodiversity, air pollution and access to nature, to name just a few.” said the university’s Paul Behrens.
Have you discovered the veggie diet for yourself already?
The British government is planning a big rewilding initiative: to pay English farmers for rewilding their land.
The exact funding hasn’t been disclosed but the government is planning both ‘landscape recovery’ and ‘local nature recovery’ projects.
These projects are planned to include
Managing cast tracts of land to conserve species
Providing habitats for wildlife
Restoring health to rivers and streams
Planting more trees
Restoring peatlands and wetlands
Rare fauna like sand lizards, water woles, and curlews will be targeted
The aim is to improve the status of about half of the most threatened species in England.
“We want to see profitable farm businesses producing nutritious food and underpinning a growing rural economy, where nature is recovering and people have better access to it. Through our new schemes, we are going to work with farmers and land managers to halt the decline in species, reduce our greenhouse gas emissions, increase woodland, improve water and air quality and create more space for nature,” commented George Eustice, the Secretary of State for the Environment.
Shark fishing is banned in Hawaii: the new act makes it illegal to knowingly capture, entangle, or kill a shark in Hawaii’s state waters. It applies to all shark species in Hawaiian waters.
It’s recommended for fishers to avoid fishing in areas known to be frequented by sharks (especially pupping areas) and to use barbless circle hooks. If a shark gets caught, it has to be released back into the water. There are fines in place for violations.
“Our Department is well aware of how important sharks are to maintain healthy marine ecosystems. And we recognize their importance for native Hawaiian cultural practices and beliefs,” said the Brian Neilson, Division of Aquatic Resources Administrator.
Hopefully this ban inspires other places around the world to protect marine ecosystems, as well.
Oh also, did you see the beautiful 12 Positive Climate Stories from 2021?
Do you have feedback or ideas? Reach out to us on Instagram, Facebook,
Do you want to save the world with us? We’re hiring!
Author note about the “Future of Climate Change” series: the climate crisis has become an inevitable part of our everyday lives, making it easy to get lost in Doomsday thoughts. In reality, attempts to halt climate change are happening all the time. The key is to notice them. That's what this series is about. Will you come back next month to read the new one?
The US Environmental Protection Agency announces the strictest auto pollution rules to date.
Spain is banning fruit and vegetable wrapped in plastic weighing less than 1.5kg as of 2023.
France’s plastic packaging ban started on 1.01.2022!
Burger King UK pledges to make half of its menu meat-free by 2030 to cut emissions.
Africa’s ‘Great Green Wall’ could have an even greater climate halting effect than imagined.
Mechanical trees are set for major first trial and are promised to such CO2 out of the atmosphere 1000 times faster than real trees.
Fungi captures more carbon than previously thought.
New York aims to produce 70% of its electricity from renewable sources by 2030.
The world’s largest floating solar farm was completed in China.
Denmark promises zero-emission flights by 2030.
List of Sustainability News
A report highlights the importance and power of small gardens on bee pollutions.
Argentina saw the return of a very rare bird called bare-faced curassow.
A thousand fin whales were spotted near Antarctica.
The Eurasian lynx was released into Germany's Palatinian Forest. So far 18 kittens have been recorded.
A world-first rewilding centre will open in Scotland within a year.
Forest schools help children reconnect with nature and are very popular in the UK.
The Italian government voted to ban fur farming and shut down mink farms.
2021 was a record-breaking year for whale sightings in Puget Sound, USA.
List of Biodiversity News
Shark fishing banned in Hawaii as of January 1, 2022
England farmers to be paid to rewild their farms
Once again a study revealed the climate benefits of a veggie diet
Let’s hope there are many healthy coral reefs still to discover.
A pristine coral reef discovered off Tahiti, French Polynesia
Many potentially significant oil reserves were discovered in Greenland. Instead of digging, the government made a decision based on humankind's future, not financial gains.
News on halting biodiversity loss, reducing carbon footprints, becoming carbon neutral, cleantech innovations, climate change solutions, and everything in between.
If it makes the world a better place, we want to talk about it.

Meow can turn the 0% from your savings account into 4%. Meow keeps things compliant and simple. Deposit cash and earn high yield.
Last updated: June 3, 2021

Meow Technologies Inc. (who we refer to, together with our affiliates, as “MTI,” “us,” “we,” or “our,” depending on the context) respects your privacy, and takes the privacy and security of personal information seriously. This Privacy Policy explains:
What information we collect, how we collect that information, and how we use that information;
When and with whom we may share information we collect; and
Your choices and rights regarding your personal information.
MTI understands that privacy is an important issue to you, and we respect the privacy of our customers, consumers, and users. To that end, we aim to protect the security and confidentiality of Personal Information that we acquire or obtain. YOU SHOULD CAREFULLY READ THIS PRIVACY POLICY. By opening an account with us, utilizing our services, products, website, and web application, or by accessing, browsing, or otherwise using the Site, you are creating a binding contract between you and us, and you are acknowledging that you have read, understood, and agreed to be bound by this Privacy Policy. If you do not agree to the terms of our Privacy Policy, you cannot use our services or products and should not access our website or web application.
COLLECTION AND USE OF PERSONAL INFORMATION
A. What We Mean By “Personal Information.”
“Personal Information” refers to information that can be used to personally identify you, a specific individual. Different states, countries, and laws define Personal Information (or similar terms, such as “personally identifiable information” and “personal data”) differently, but Personal Information generally includes information such as your name, mailing address, e-mail address, and phone number. It may also include the internet protocol (IP) address of your computer or mobile device if that IP address can be associated with other Personal Information and used to identify a particular person, or geo-location information, again if that information can be used to pinpoint a specific party. It may also mean your financial or account information. The types of Personal Information that we collect are identified in Subsection C., infra.
B. Your choices regarding your Personal Information.
Except as set forth below, we will collect Personal Information from you only if you voluntarily provide it to us. For example, if you submit information in connection with opening an account, if you decide to contact us, such as through a “Contact Us,” “Request More Information,” or similar links on the Site, if you request information about our services, if you enter your information on our Site, or if you sign up to receive newsletters or other materials, you may provide us with your name, email address, and any other information you include with your submission.
If you choose not to provide certain Personal Information, that choice may make it difficult or impossible for you to access services through the Site. For example, you may not be able to set up an account or access our services. However, it is ultimately your choice whether you want to interact with us. In addition, our site, like most websites, automatically collects certain information from site visitors, such as the IP address or other unique identifier of your computer or other device, and information about the browsing history and website interactions associated with that device. This device and online activity information may be considered Personal Information. However, we do not use this type of automatically-collected Personal Information to identify or to further interact with a particular person unless and until that user voluntarily provides other Personal Information in the manner outlined above. More information about how we use this information on an anonymous and/or aggregate basis is described below under “How We Collect and Use Non-Personally Identifiable Information.”
C. The Type of Personal Information We Collect and How We Use It.
1. Personal Information We Collect Directly
The Personal Information you may be asked to provide to us, and how we may use that Personal Information, is described below. We present this information based on the categories of Personal Information collected, but please note that similar specific pieces of information may apply to multiple categories. For example, your name and email address may be included within each of the “Contact Information,” and “Communication, Activity and Marketing Information,” described below.
Category of Information Why We Collect It How We Use It
Contact/Identity Information Examples:
Full name
Email address
Phone Number
Address/Location
Contact preferences
IP address
Cookies data on browsing preferences and behavior and contact preferences
The reason for your contact (i.e., the details of your inquiry or request)
Tax Identification Number
Social Security Number
Government Issued ID
We collect this information as necessary for us to enter into and/or perform a contract with you and as required or permitted by applicable law. For example, we collect information:
In connection with MTI’s provision of services and products to you, and in order to meet our contractual obligations to you;
Where it is necessary for our legitimate interests. For example, conducting background checks for Know Your Customer (KYC) reviews and Anti-Money Laundering (AML) Watchlists, sending you notices regarding your money/cryptocurrency transfers to and from MTI, sending you confirmations and other information on your transactions, earnings, or account status, to create your account statements, maintaining records on your transactions and providing support to your account generally;
To deliver content about our services and products, and to send promotional or other information to you; and
To conduct analysis regarding your usage of our services and products, and the effectiveness of our marketing initiatives
To help us identify you.
To provide you with information and services you have requested.
To provide relevant information to you while browsing our website or upon your request, to assist you with products and services. Subject to your right to opt out, to market to you by email or other electronic means.
To provide relevant information to you while browsing our website or upon your request, to assist you with products and services.
Subject to your right to opt out, to market to you by email or other electronic means.
Communication. Activity and Marketing Information Examples: Contact Information, Email communications, Text (SMS) communications, Phone conversations/recordings, Appointment requests, dates and statuses, Public posts made by you, Testimonials and opinions, Images
We collect this information as necessary for us to enter into and/or perform a contract with you. For example, we may need to provide you with information about products or services you have purchased. We also collect this information so that we can operate our business and provide services to you and others, as discussed further below. Where legally necessary, we will obtain your consent to collect this information (such as to use your image in photos and videos).
To allow you to participate in interactive areas of the Site, such as participating in discussion forums or providing comments to others’ posts. To ensure the quality of our services and interactions with you. To provide you with information and services you have requested. To assist you with the products and services that you have purchased. Subject to your right to opt out, to market to you by email or other electronic means. To provide the public with information about the products and services for purposes of marketing.
Personal/Demographic Information Examples:
Contact Information
Educational History Information
Employment History Information
Age/age range
Internet access/IP address
Currency
Languages
Nationality
Gender
Religious affiliation
Racial/Ethnic background
Veteran or military status
We collect this information as necessary for us to enter into and/or perform a contract with you and as required or permitted by applicable law. For example, we collect information:
In connection with MTI’s provision of services and products to you, and in order to meet our contractual obligations to you;
Where it is necessary for our legitimate interests. For example, conducting background checks for Know Your Customer (KYC) reviews and Anti-Money Laundering (AML) Watchlists, sending you notices regarding your money/cryptocurrency transfers to and from MTI, sending you confirmations and other information on your transactions, earnings, or account status, to create your account statements, maintaining records on your transactions and providing support to your account generally;
To deliver content about our services and products, and to send promotional or other information to you; and
To conduct analysis regarding your usage of our services and products, and the effectiveness of our marketing initiatives
To ensure the quality of our services and interactions with you.
To respond to and/or address your requests and inquiries, and/or to provide requested information to you.
To assist you with the products and services that you have purchased.
Application Information Examples:
Contact Information
Personal/Demographic Information
Educational History Information
Employment History Information
Other identifiers (e.g., government-issued ID numbers)
Special needs information (e.g., physical or mental disabilities)
Letters of recommendation
Criminal history/convictions
Financial Data, such as bank name, bank account number, and information received from credit reporting agencies
We collect this information as necessary for us to enter into and/or perform a contract with you and as required or permitted by applicable law. For example, we collect information:
In connection with MTI’s provision of services and products to you, and in order to meet our contractual obligations to you;
Where it is necessary for our legitimate interests. For example, conducting background checks for Know Your Customer (KYC) reviews and Anti-Money Laundering (AML) Watchlists, sending you notices regarding your money/cryptocurrency transfers to and from MTI, sending you confirmations and other information on your transactions, earnings, or account status, to create your account statements, maintaining records on your transactions and providing support to your account generally;
To deliver content about our services and products, and to send promotional or other information to you; and
To conduct analysis regarding your usage of our services and products, and the effectiveness of our marketing initiatives.
To assist you with the products and services that you have purchased.
2. Personal Information We Obtain From Third Parties
In addition to the Personal Information that we collect directly from you through your interaction with the Site and your participation in services we offer, we may collect some Personal Information from third parties. We collect Personal Information from these third parties as required or permitted by applicable law. In particular, third-party sources may include public databases, credit bureaus, identity verification and due diligence providers, resellers and channel partners, joint marketing partners, and social media platforms. We also receive Personal Information from third parties who you have authorized to disclose information about you and that we need to open your account or to effect transactions and operations for you. We also collect Personal Information about you from third parties to satisfy our KYC and AML obligations.
3. Certain Generally-Applicable Uses of Personal Information
In addition, all of the Personal Information we collect may be used for the following additional purposes, all of which are related to the operation of our business and our provision of services:
Our internal record-keeping;
To enable us to contact you by e-mail, text or phone for any of the above reasons;
Where necessary as part of any restructuring of MTI or its affiliates;
For compliance with legal, regulatory, and other good governance obligations;
To convert Personal Information into pseudonymous and/or anonymous data, and use it (normally on an aggregated statistical basis) for research and analysis;
To gain insight that enables us to measure the effectiveness of our services;
To learn about potential and current customers so that we can improve our products and provide you and others with better services; and
To evaluate potential and current customers’ needs and resources, and to tailor our marketing messages to your specific interests, needs, and abilities.
When we use your Personal Information for our business purposes, those business purposes include making our products available, responding to your, our customers’ and potential customers’ comments and complaints, marketing our products and services, improving and developing new products and services, and ensuring the productivity, functionality, and security of the Site.
D. How Long We Keep Personal Information.
We will keep your Personal Information as long as we have a business need to do so and/or as necessary to meet the purpose for which the information was collected and used, unless a longer period is required by law. For example, we will keep Personal Information for at least as long as you continue to maintain an account on our Site. Business needs for which Personal Information may be retained include legal, tax, accounting, risk management, and other business purposes.
We are required, moreover, under certain applicable laws and regulatory requirements to retain certain information, including Personal Information of clients, client profiles, identity verification documents, and other information used to satisfy our KYC and AML obligations. We retain these records for the minimum amount of time required by law and as specified in MTI’s document retention policy. Even after you deactivate your account, we can and may retain information about you, your transactions, and services, for a period of time consistent with applicable law and/or as is reasonably necessary to comply with regulations, legal processes, or government requests.
In addition, it is important to note that some information may be made public. For example, with your consent we may use your image and testimonials in promotional materials. Accordingly, your information will be able to be seen and republished for as long as the marketing materials continue to be posted online, or as long as the hard copies remain in existence. In addition, we may make available services that enable you to post information on the Site in public forums and on message boards. In these cases, once posted the information will be able to be seen and republished by others for as long as the web page remains active. Even if web pages are deleted, they may continue to be accessed if they are archived or cached. Therefore, you should think carefully before giving your consent to the use of your name, image, and comments in any materials and, if applicable, before posting anything in any public area of the Site.
How We Collect and Use Non-Personally Identifiable Information
A. What Is Non-Personally Identifiable Information?
Non-personally identifiable information refers to information that is not and cannot be used to identify a specific individual. This may include information about the statistical characteristics of the visitors to the Site or persons who purchase our products or services. While this information may define how you fit into a particular group of people, it is not unique to you, and it cannot be used (without other information) to specifically identify you. This section describes how we collect and use non-personally identifiable information.
B. The Non-Personally Identifiable Information We Collect and Why.
When you visit the Site or interact with us electronically (such as through email), we may automatically collect standard internet and website log information, and details of patterns about how the Site visitors behave. This information includes your internet service provider name, your operating system, your browser type and browser language, the IP address of your computer or other device (unless such IP address can be used to identify you), your access times, the website that referred you to the Site, the specific web pages you visit and the date and time of those visits, and links clicked as you visit the Site. We use this information to evaluate the Site, to find out which parts of the Site are popular or that may need improvement, and to enhance your and others’ Site experiences.
C. Cookies and Other Tracking Technologies.
The Site utilizes “cookies”, anonymous identifiers and other tracking technologies such as web beacons, which enable us to distinguish you from other users and provide you with information that is customized for you. For more information, see the “Cookie Policy” section of this Privacy Policy.
D. Analytics Services.
The Site may use analytics tools and services to collect information about use of the Site, such as how often users visit the Site, what pages they visit when they do so, and what other sites they used prior to visiting the Site. We use the information we collect from the analytics services to maintain and improve the Site and our services. The analytics services we use include Google Analytics, Facebook Ads, and others.
E. Anonymous Information.
Anonymous information refers to information that does not enable identification of an individual user, such as aggregated or demographic information. We may use anonymous information or disclose it to third party service providers to improve the Site and our services. We may also disclose anonymous information to third parties, including market research firms.
COOKIES POLICY
A. What Are Cookies?
Cookies are small amounts of data that are stored on your browser, device, or the page you are viewing when you visit a website. Some cookies are deleted once you close your browser or application (session cookies), while other cookies are retained even after you exit so that you can be recognized when you return (persistent cookies). Cookies do not typically contain any information that personally identifies a user, but Personal Information that we store about you may be linked to the information stored in and obtained from cookies.
B. How We Use Cookies.
We use both session and persistent cookies on the Site. The cookies we use are generally divided into the following categories:
Mandatory cookies: These are cookies that are required for the operation of the Site, such as cookies that enable you to log into secure areas.
Functional cookies: These are cookies that remember choices that you make when you visit the Site such as language options. They help to make your visit more personal and assist your navigation of the Site.
Analytics/Marketing cookies: These are cookies that automatically collect information about your use of the Site, such as the pages you visit, and the links you followed. These help us recognize previous visitors to the Site, and understand how many people are using the Site and how they navigate through it. As mentioned above, we use analytics services to analyze user behavior, so these third parties will place these types of cookies on the Site.
C. Your Choices About Cookies.
Most web browsers automatically accept cookies, but you can usually change your settings to prevent that, such as by having your device warn you each time a cookie is being sent or choosing to turn off all cookies. On the Site, you will be able to disable all cookies other than mandatory cookies. This can be done through your web browser settings, and because each browser is different, you should look at your browser’s “Help” menu to learn how to modify your cookie settings. There are also online resources that may help you learn more how to opt out of targeted behavioral advertising from many major third-party network advertisers. If you do disable cookies from your browser you may not be able to access certain sections of the Site that use essential cookies, and this may make your experiences on the Site less efficient.
D. Do Not Track Requests
Currently, certain browsers, including Firefox, Google Chrome, Safari and Internet Explorer, offer a “do not track” (DNT) option. This option, using a technology known as a DNT header, sends a signal to websites visited by the user about the user’s DNT preference, if any, set on the browser. However, we do not currently commit to responding to browsers’ DNT signals. We cannot make this commitment because no common industry standard for DNT has been adopted by industry groups, technology companies, or regulators.
HOW WE MAY SHARE INFORMATION
A. Sharing Information with Others.
We may share information with third parties in the following circumstances:
We may share your information, including Personal Information, so that we or others may provide you with periodic mailings, or may contact you regarding products, services, or events. This may include sharing your Personal Information with affiliates so that we or they can contact you regarding other services. If you do not wish for us to share your information in this manner, please let us know by contacting us at team@meow.co.
We may employ other companies and people to perform tasks on our and our customers’ behalf and we may need to share Personal Information with them to provide services to you. For example, such parties may handle our data management and/or email distribution. Other parties are provided with Personal Information so that they can provide the yield services discussed above. Unless we tell you differently, they do not have any right to use your Personal Information beyond what is necessary to assist us.
We may share information, including Personal Information, with our corporate partners, such as Genesis Capital, for our and their legitimate business purposes, including to provide services to you, the potential expansion and promotion of our and their product and service offerings, and other uses consistent with the purposes described in this Privacy Policy.
We will share Personal Information with third parties for other purposes if we have your express “opt-in” consent to do so.
We may disclose non-personal, aggregate, anonymous data in a de-identified format for any legitimate business purpose.
We may disclose Personal Information at the request of law enforcement or government agencies or in response to subpoenas, court orders, or other legal process to establish, protect, or exercise our legal or other rights or to defend against a legal claim, or as otherwise required or allowed by law.
We may disclose Personal Information if we believe that such action is appropriate to (a) protect the rights, property, or safety of a user of the Site or any other person, (b) investigate or prevent a violation by you of any contractual or other relationship with us, (c) investigate or prevent your actual or potential illegal, fraudulent, or harmful activity, or (d) detect, prevent, or otherwise address fraud, security, or technical issues.
We may share information, including Personal Information, in connection with, during negotiations of, or as a part of the closing of any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
We will never sell your Personal Information.
SOCIAL SHARING FEATURES AND THIRD-PARTY WEBSITES
The Site may offer social network and similar sharing features, such as Facebook, Twitter, Instagram, and YouTube buttons, which let you share information related to the Site and/or the products or services that you elect to use through your preferred social media platforms. In addition, the Site may include links to other third party websites. Those sites, and the third parties’ use of any data that may be collected by those sites, is not governed by this Privacy Policy. You should always review the privacy policies of any site you visit before submitting your Personal Information. If you permit a connection between the Site and your social network page(s) or another third party site, we (and the other site operator) may be able to identify you, and associate the information we (and they) receive with information we (and they) already have about you. In addition, depending on how you use those features and your settings with the social network or other third party site, the information you share may be available to others, including your friends and/or the public. For more information about how your information may be shared through those social networks and other third party sites once it is provided to them, review the privacy policies of those social networks and other third party sites.
A. Our Security Measures
We use a variety of industry-standard security measures to maintain the safety of your Personal Information, including measures designed to secure your Personal Information from accidental loss and from unauthorized access, use, alteration and disclosure. We store the Personal Information you provide on secure (password- and firewall-protected) servers. Unfortunately, no electronic data transmission over the Internet can be guaranteed to be 100% secure. As a result, while we believe that we use reasonable measures to protect Personal Information, we cannot ensure or warrant the security of any information transmitted or otherwise provided to us or received from us. If any portion of the Site allows you to create an account, it will be your responsibility for keeping your account and password confidential. We will never ask for your password (except, if applicable, when you create your account and log into the Site).
YOUR RIGHTS REGARDING YOUR INFORMATION
A. General Rights.
If you have any questions regarding this Privacy Policy or our use of your Personal Information, you can contact us by email at team@meow.co. In addition, you can also contact us at any time at team@meow.co to request that we make any edits to your Personal Information. If, where applicable, you have an account on any Site, you can access and edit your account information online, by signing into your account and selecting the information you want to edit. As noted above, we have standard retention practices with respect to the Personal Information we collect. If you would like to request any earlier removal of your Personal Information, please contact us at team@meow.co. Please note that we may not be able to completely remove Personal Information from the Site or our systems in certain circumstances. This will be true if the data is not in a searchable format, if it is retained in backup systems or cached or archived pages, if we need it to prevent fraud or future abuse, or if we are required by law to keep it.
B. Your Rights Regarding Direct Marketing.
As noted above in this Privacy Policy, we may use your Personal Information to provide you with marketing and promotional information about our products and services. These promotions may be made by mail, email, telephone, instant messaging application, or text (SMS) message, or other methods that may become relevant or available. All promotional materials that are sent by use using electronic means will include a simple means for you to stop receiving further communications. For example, we may provide you with an “unsubscribe” link, or any email address to which you can send an opt-out request. In addition, if we need your consent for direct marketing communications under applicable law, and if you provide your consent, you will be able to change your mind at any time. You can manage your consent preferences with respect to direct marketing activities by contacting us at team@meow.co. Please note that despite your email preferences, we may need to contact you regarding your account, as required by law, or regarding legal matters. However, we will not send you marketing communications if you have opted out of receiving them.
C. Sale of Personal Information.
Currently, we do not sell your personal information
Privacy Rights
A. General Privacy Rights.
Depending on the jurisdiction in which you reside, you may have certain rights over the Personal Information that we collect about you. You may exercise these rights by contacting us at team@meow.co.
B. Rights of Vermont Residents
The Vermont Financial Privacy Act limits what we can do with your financial information and gives you the right to limit our sharing of your financial information. Under this Act, Vermont residents have the right to receive notice and opt-in to us sharing non-public personal information with non-affiliated third parties. In addition, residents must consent to us sharing information regarding credit worthiness. Please contact us at team@meow.co to opt-in to, or opt-out of, sharing your non-public personal information.
C. Rights of California Residents
1. California Consumer Privacy Act (CCPA)
The CCPA went into effect on January 1, 2022. It affords California residents with specific rights over their Personal Information, which are described in more detail in the following paragraphs.
2. The Personal Information We Collect and how we use it
We collect personal information as defined in the CCPA, which generally means any information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device. Please note that personal information does not include the following:
Publicly available information that we access from government records;
Deidentified or aggregated consumer information; and
Other information that is expressly excluded from the CCPA’s scope such as personal information covered by certain sector-specific privacy laws, such as the Fair Credit Reporting Act, the Gramm-Leach-Bliley Act, the Health Insurance Portability and Accountability Act, or the Driver’s Privacy Protection Act of 1994.
We use the information for one or more of the following purposes:
To create, maintain, customize, and secure our customers’ online account.
To provide, support, personalize, and develop our services.
To launch, maintain, and improve products and services.
To contact prospective, current, and former customers regarding products and services.
To research, design, and develop products and service offerings.
To market products and services.
To assess the effectiveness of our outreach and marketing efforts.
In addition to the business and commercial purposes of collection of personal information described above, we may use any of the personal information we collect for the following purposes:
To prevent transaction or user fraud, and to help maintain the safety, security, and integrity of the Site and our and our business.
To respond to law enforcement requests and as required by applicable law, court order, or governmental regulations.
To evaluate or conduct a merger, divestiture, restructuring, reorganization, dissolution, or other sale or transfer of some or all of our assets in which personal information held by use about our Site users is among the assets transferred.
As otherwise described to you when collecting your personal information.
We will not use the personal information we have collected for any materially different, unrelated, or incompatible purposes not disclosed in this California Privacy Notice without providing you notice and, if required by the CCPA, the opportunity to consent to such use
D. How and why We Share Personal Information
1. Disclosures of Personal Information for a Business Purpose
With respect to the personal information we collect, we may share information in the following categories with third parties, in each case for a business or commercial purpose:
Category 1 – Identifiers
Category 2 – Personal information categories listed in the California Consumer Records statute (Cal. Civ. Code §1798.80(e))
Category 3 – Protected classification characteristics under California or Federal law
Category 6 – Internet or other similar network activity
Category 7 – Geolocation data
Category 9 – Professional or employment-related information
Category 10 – Non-public education information (per the Family Educational Rights and Privacy Act, 20 U.S.C. §1232g, 34 C.F.R. Part 99
Category 11 – Inferences drawn from other personal information
We may share the personal information in the categories identified above with our corporate partners, such as Genesis Capital, and our service providers, such as companies who handle our data management and/or email distribution, parties who provide us with data enrichment services, our website and infrastructure hosting providers and our managed information technology support service provider, and also to third parties to whom you authorize us to disclose your personal information in connection with our services.
2. Other Disclosures of Personal Information
In addition, you should be aware that we may share information with third parties in the following circumstances:
We will share personal information with third parties for other purposes if we have your express “opt-in” consent to do so.
We may disclose non-personal, aggregate, anonymous data in a de-identified format for any legitimate business purpose.
We may disclose personal information at the request of law enforcement or government agencies or in response to subpoenas, court orders, or other legal process to establish, protect, or exercise our legal or other rights or to defend against a legal claim, or as otherwise required or allowed by law.
We may disclose personal information if we believe that such action is appropriate to (a) protect the rights, property, or safety of a user of the Site or any other person, (b) investigate or prevent a violation by you of any contractual or other relationship with us, (c) investigate or prevent your actual or potential illegal, fraudulent, or harmful activity, or (d) detect, prevent, or otherwise address fraud, security, or technical issues.
We may share information, including personal information, in connection with, during negotiations of, or as a part of the closing of any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
3. Sales of Personal Information
We do not sell personal information to third parties.
E. California Consumers’ Rights and Choices
The CCPA provides California residents with specific rights regarding their personal information. If you are a California resident, this section describes your CCPA rights, and explains how to exercise them.
1. Rights to Access Certain Information
You have the right to ask up to provide you with information about our collection and use of your personal information over the past 12 months. You may request the following information:
The categories of personal information we collect about you;
The categories of sources of personal information we collect about you;
Our business or commercial purpose for collecting or selling that personal information’
The categories of third parties with whom we share that personal information;
The specific pieces of personal information we collected about you (also called a “data portability right”); and
If we disclosed your personal information for a business purpose, or if we sold your personal information, two separate lists describing:
Disclosures for a business purpose, identifying the categories of personal information that each category of recipient obtained; and
Sales identifying the categories of personal information that each category of recipient purchased.
2. Rights to Request Deletion of Certain Information
You have the right to ask us to delete any of your personal information that we collected from you and have retained. However, there are certain exceptions to our obligation to delete the information, which we describe below. We may deny your deletion request if we or our service providers need to keep the information to:
Complete the transaction for which we collected the personal information, provide you with a product or service you have requested, take other actions reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform a contract with you;
Detect security incidents, protect against illegal or fraudulent behavior, or engage in legal actions with persons responsible for such activities;
Debug products to identify and repair errors impacting the functionality of our Site or services;
Exercise free speech or ensure other consumers’ rights to free speech, or otherwise exercise rights provided by law;
Comply with the California Electronic Communications Privacy Act (Cal. Penal Code §1546)
Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when the information’s deletion may likely render impossible or seriously impair the research’s achievement, if you previously provided informed consent;
Enable solely internal uses that are reasonably aligned with consumer expectations based on your relationship with us;
Comply with a legal obligation; or
Make other internal and lawful uses of that information that are compatible with the context in which you provided it.
3. How to Submit a Verifiable Consumer Request and Exercise Your Rights
To exercise any of the rights described above, you must submit a verifiable consumer request to us by emailing us at team@meow.co. Only you, or a person registered with the California Secretary of State that you expressly authorize to act on your behalf, can make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child. You may only make a verifiable consumer request for access or data portability twice within any 12-month period. The verifiable consumer request must:
Provide sufficient information that allows us to reasonably verify that you are the person about whom we requested personal information, or are an authorized representative of that person, which may include (by way of example, but not limited to) verification of your current address, Student ID, date of birth, email address, or telephone number; and
Describe your request with sufficient detail that enables us to understand, evaluate, and respond to it.
We cannot respond to your request or provide you with information if we cannot identify you or confirm your authority to make the request. We will only use any personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.
4. How and When We Will Respond to Verifiable Consumer Requests
We will confirm receipt of a verifiable consumer request within 10 days, and with that confirmation, we will include a description of our verification process and will provide an expected response timeframe. Generally, we will respond to each verifiable consumer request within 45 days of receipt. If we require more time, subject to the limitations imposed by the CCPA, we will inform you of the reason and extension period in writing. We will deliver our written response by mail or electronically using the contact information you have provided. Any disclosure we provide in response will only cover the 12-month period preceding our receipt of the request. If we cannot comply with your request, we will explain why. If you request that we provide you with a copy of your data, we will select a format in which to provide your personal information that is readily usable, and should allow you to transmit the information from one entity to another without undue difficulty. We do not generally charge a fee to process or respond to requests, unless the request is excessive, repetitive, or manifestly unfounded. If we determine that a fee is warranted by the circumstances, we will tell you why, and will provide you with a cost estimate before completing your request.
5. Non-Discrimination
We will not discriminate against you for exercising any of your CCPA rights. This means that unless we are permitted to do so by the CCPA, we will not:
Deny you any goods or services;
Charge you different prices or rates for goods or services, including by granting discounts or other benefits, or imposing penalties;
Provide you with a different level or quality of goods or services; or
Suggest that you may receive a different price or rate for goods or services, or a different level or quality of goods or services.
6. Other California Privacy Rights
In addition to the CCPA, California’s “Shine the Light” law permits California residents to request certain details about our disclosure of their personal information to third parties for those third parties’ own direct marketing purposes. If are a California resident and you would like to make such a request, please contact us at team@meow.co. Please note that there are legal limits on how often you can make such a request, and we are only obligated to respond to one information request per customer per year. The California Financial Privacy Information Act also limits what we can do with your financial information and affords you rights to limit our sharing of your financial information. Under this Act, California residents have the right to receive: receive notice and opt-in to us sharing non-public personal information with non-affiliated third parties; receive notice and opt-out of sharing non-public personal information with affiliates; and opt-out of personal information sharing resulting from joint marketing agreements with non-affiliated third parties to market financial products and services. Please contact us at team@meow.co to opt-in to, or opt-out of, sharing your non-public personal information. In addition, if any California residents under the age of 18 have used the Site, created an account (if applicable), and posted content or information on the Site, they can request removal by contacting us at team@meow.co, detailing where the content is posted and confirming that they posted it. Following such as request, we will terminate any unauthorized account, and will make reasonable good faith efforts to remove the post from public view, or anonymize it so that the minor cannot be individually identified. However, as noted above in this privacy policy, removal of public postings cannot ensure complete or comprehensive removal, as third parties may republish, archive, or cache web content in a manner that is out of our control
A NOTE ABOUT CHILDREN
The Site is not targeted to, and we have no interest in collecting information from, children, and we do not knowingly gather any Personal Information from children under the age of 13. If you are a parent or a legal guardian who believes that your minor child provided us with any Personal Information, please contact us at team@meow.co.
CHANGES TO THIS PRIVACY POLICY
We may make changes to this Privacy Policy. Any modifications will be effective when the changes are posted to the Site. You can review the most current version of this Privacy Policy at any time by accessing the section of the Site labeled Privacy Policy, and you can determine when this Privacy Policy was last revised by referring to the “Last Updated” legend at the top of this Privacy Policy. You are expected to check this Privacy Policy from time to time to take notice of any changes. You understand and agree that your continued access to or use of the Site after any posted modification to this Privacy Policy indicates your acceptance of the modification, even if you did not take the time to read the modification.
Meow is a company founded in 2021 by Packy McCormick.

InSilico offers a suite of technical indicators which gives traders access to raw market data visualized in ways which can help provide a deeper level of analysis, and help in making timely, informed trading decisions.
The InSilico suite of indicators includes a wide range of tools, each precisely designed for different trading styles including momentum, mean reversion, volume analysis, volatility analysis, and more.

Market views
InSilico offers a suite of technical indicators which gives traders access to raw market data visualized in ways which can help provide a deeper level of analysis, and help in making timely, informed trading decisions.
Crayons Overview
Crayons 0.27 Product Guide | Insilico Research
Pivotal and Trend Following System
There are numerous ways that people may use the same indicator, discretion and personal preference is key. The methods showcased are simply an introduction, but are not at all the only or even the “best” way to utilize the trading suite.
Trading is not a race to the finish line, so find what works best for you personally. Crayons is simply a tool - one of many, to help increase your profitability, and ultimately getting you to the finish line - having your portfolio and equity curve where you would like it to be.
Crayons 0.27
Background
Crayons has been worked on and updated continually since 2017 - it’s color coding approach follows in the footsteps of the trading legends that pioneered the original discretional trend following systems.
The script is designed to give high probability trade opportunities, and help traders to analyze charts in a simple and intuitive manner, by using color coding to both compress and express information. There are two major components and also a complimentary zero confirmation pivot system. The first component is BC which stands for base coloring - the second component is SC which stands for signal coloring.
Signal Coloring
Users should look at every SC as an “area of effect” that suggests the general price range in which the market may turn and in which you should place your orders. If the area gets violated by price movement in the opposite direction, the signal candle loses its value as a signal and thus gets invalidated.
FSVZO Overview
Fourier Smoothened Volume Zone Oscillator
A leading/predictive volume based oscillator
FSVZO is a unique proprietary volume focused indicator, born from experimentation with leading indicator concepts, incorporating Fourier transformation for smoother and more responsive curvature, providing a statistical component to volume based logic. It leads price action, has clear divergences and provides re-entry points. It can Identify when the trend is losing momentum & strength.
The statistical components in FSVZO equation helps to provides very smooth curvature of signal lines and responsiveness to overbought/oversold levels, that have similar efficiency even in parabolic trends. This and other factors make FSVZO stand out from similar volume based oscillators
The most striking feature of FSVZO - predicting trend shifts and reversals with sophisticated accuracy.
InSilico offers a suite of technical indicators which gives traders access to raw market data visualized in ways which can help provide a deeper level of analysis, and help in making timely, informed trading decisions.

The decentralized and scaled blockchain
VISION
A blockchain is a decentralized database stored by a community who control it together. It’s thus a challenge to build a blockchain at scale. Today’s famous blockchains failed you: they are controlled by a few powerful entities, and their tech is overloaded.
Massa: multithreaded graph of blocks

Our vision at Massa Labs is beyond tradeoff. First, we solved the blockchain scaling problem with a multithreaded block graph which scales up performances massively. Second, we designed the Massa coin distribution to give full control to the community and keep the database safe.
Massa is for crypto payments and smart contracts innovations set for mass adoption.
Current blockchains are limited: for instance Bitcoin can only process 5 transactions per second. This is due to the sequential structure of the blockchain, forcing nodes to receive the previous block before creating the next one, which in a decentralized p2p network takes time.
Massa uses a multithreaded block graph allowing nodes to create blocks in parallel and process 10’000 transactions per second. With this parallel block structure, Massa is the first blockchain technology to solve the trilemma: it’s scaled, decentralized and secure at the same time.

An end-to-end blockchain and NFT solution for video games.
nWay’s Vision of a Unified Fighting Game Community
The studio seeks balance in a traditionally complex and fragmented game genre.

Headquartered in San Francisco, nWay was founded in 2011 on the thesis that there was a potent market for robust, console-like game experiences on web browsers, connected TVs, and mobile devices. It saw how mainstream audiences connected with simple, accessible, and social game experiences, creating an entirely new community of players.
“Facebook and social games were seeing incredible growth around that time,” nWay cofounder and CEO Taehoon Kim tells us. “All of a sudden, people who typically didn’t play games, including my own mother, were suddenly spending a lot of time doing just that.”
Rather than attempting to capitalize on this phenomenon, nWay saw a void to be filled. What if it could make rich, sophisticated game experiences similar to those found on dedicated game platforms, that also resonated with casual audiences? If successful, it would be a win for the studio, the player community, and possibly the game industry, too.
Almost a decade after its inception, the studio has proven its thesis: nWay’s games have been downloaded over 75 million times to date, and counting.
In the early 2000s, Kim was working in Samsung’s New Business Development division, plotting the South Korean company’s first foray into games. Nokia, its great rival during those years, had recently revealed a gaming phone, the short-lived N-Gage. Samsung began development on its own device, and tasked Kim with persuading developers around the globe to make games for it.
That experience was a turning point for Kim. “I fell in love with the game industry immediately,” he recalls. “Games are this thrilling intersection of technology and art, and I wanted to dive deeper into them.” As luck would have it, one of the companies Kim gave his pitch to, Realtime Worlds, responded with their own: come work for us instead.
Taehoon Kim, Cofounder and CEO, nWay
Taehoon Kim, nWay Cofounder and CEO | Photo: nWay
Realtime Worlds was founded by industry icon Dave Jones, the creator of such celebrated games as Grand Theft Auto and Lemmings. His cofounder was Tony Harman, another industry veteran who climbed the development ranks at Nintendo before partnering with Jones in the creation of multiple game studios. The two foresaw how online connectivity—then still an emerging technology for games—would reshape the industry, and asked Kim to leave his role at Samsung and set up a Realtime Worlds office in South Korea.
“There was a massive shift in Korea from single-player game experiences to online multiplayer ones around that time,” Kim says. “A lot of the engineering skills we needed, especially those related to the server end of online games, were difficult to find in the West but plentiful in South Korea. Strategically, it made perfect sense to open a studio there.”
The studio’s first game, Crackdown, was a critical and commercial hit. Their follow-up title, APB: All Points Bulletin, a bold, ambitious take on an online Grand Theft Auto-style experience, failed to take off resulting in Realtime Worlds shutting down operations in 2010. The closure didn’t deter Kim, Jones, and Harman from their aspirations, though. With online games having finally become mainstream, the three turned their attention to the next emerging game platforms: browsers, smart TVs, and mobile devices. The following year, nWay was officially born.
ChronoBlade, nWay’s first game, was a deep, snappy, and satisfying action-RPG, which housed an optional competitive multiplayer mode. What made the game special, however, was not just great gameplay and design. Rather, it was what the team was able to accomplish technically: ChronoBlade was the first game to run on Facebook, mobile devices, and smart TVs—and have all of the players networked together for competitive multiplayer matches.
nWay’s achievement in cross-platform game design was a milestone that wasn’t obvious to many. While more common today, games with unified player communities across consoles and PC were the exception, not the rule, in 2012. On emerging platforms, and for the type of competitive games nWay was creating, they were nonexistent. One probable reason for this was the technical challenge posed by such an experience.
Dave Jones and Taehoon Kim with ex-VP of Creative Stieg Hedlund promoting ChronoBlade at the ChinaJoy Expo. | Photo: nWay
Dave Jones and Taehoon Kim with ex-VP of Creative Stieg Hedlund promoting ChronoBlade at the ChinaJoy Expo. | Photo: nWay
Creating a consistent player experience across vastly different hardware devices is not for the faint of heart. “Developing for even a single phone model was enormously challenging, because the phone software would differ depending on which carrier the device was built for,” Kim explains. “We had to build support for just about every protocol that existed at the time, which resulted in a development schedule for ChronoBlade that was much longer and more difficult than we expected.”
Supporting a wide spectrum of hardware and software also had a direct impact on the game’s ability to effectively pair players together (what’s known as “matchmaking” in game parlance). Good matchmaking groups players of equivalent skill together, and does so quickly. The vast range of network protocols, devices, and input methods that ChronoBlade supported made developing a good algorithm extremely complex.
After overcoming the challenges posed by fragmented hardware and software, nWay self-published ChronoBlade in the West. Soon after, the studio partnered with major publishers in South Korea and China to bring the game to new audiences. While the business grew, the global expansion surfaced a different type of fragmentation: game design. What was originally intended to be a consistent game experience regardless of platform slowly started to fork into three different games to meet varying local requirements. “In hindsight, I think trying to expand ChronoBlade the way we did was a mistake,” says Kim. “It strayed too far from our vision of a single, global game experience.”
Kim admits the studio was never fully satisfied with its work on ChronoBlade. nWay was breaking new ground with the game, and with no playbook to follow, it was as much an exploration as it was a creative endeavor. The benefit of being a trailblazer, though, is that your work becomes the first chapter of a new one. nWay leveraged that newfound knowledge and experience in its next game, Power Rangers: Legacy Wars, and forever changed the course of the studio.
Legacy Wars challenges established notions of how fighting games work. Instead of using tricky physical motions to perform moves, players simply tap color-coded cards. And the game’s take on combos, an archetypical gameplay mechanic of the genre, encourages players to experiment and improvise in real time rather than forcing them to memorize a complex sequence of directional moves and button presses.
At first blush, Legacy Wars may seem like a fighting game that’s been watered down for the masses. The genius behind its design, though, is the way it pushes the entire fighting genre forward by separating the essence from the substance. nWay realized that any good fighting game is, at its core, a battle of wits, reaction, and raw psychology. With this understanding as a foundation, the studio knew it could build a compelling, authentic fighting game for touchscreen devices—and it did just that.
Despite the confidence it had around the game’s quality, nWay’s initial expectations for Legacy Wars were relatively modest. Would people give its unorthodox design a chance? Could it stand out in a sea of millions of other mobile apps and games? What would success even look like?
Right before the game launched, Kim and the rest of the team agreed that if the game received five million downloads over its lifetime, they’d consider it a success.
Legacy Wars launched on a Thursday. By the end of the weekend, it had been downloaded six million times.
An artist storyboards sequences sequences for Legacy Wars. | Photo: nWay
An artist storyboards sequences for Legacy wars. | Photo: nWay
While Legacy Wars’ quality speaks for itself, nWay is quick to share the game’s success with the passionate Power Rangers community. “The truth is that the fanbase has been greatly underserved over the years in terms of games,” says Kim. “We put everything we had into Legacy Wars with the hope that fans would feel it was a legitimate fighting game, as well as an authentic Power Rangers experience.” Suffice it to say, nWay proved that if you build it (well), the fans will in fact come.
Since launch, Legacy Wars has been dabbling in the esports space, making an appearance at Amazon’s Mobile Masters series in 2017 and 2018, as well as other less formal tournaments. At the latter tournament, nWay invited a trio of veteran fighting-game pros—including the inimitable Justin Wong—to battle against a team composed of several Legacy Wars enthusiasts, including the actor who played Blue Ranger in the TV series Power Rangers Ninja Steel. “The pros got their asses kicked,” Kim says with a laugh.
nWay’s soul peeks through in this tale. As noted by Kim earlier, social games tore down any arbitrary walls around what it means to be a “gamer,” showing that anyone and everyone can play games if the experience is accessible enough. Inversely, ChronoBlade brought a traditional game experience to mainstream audiences through emerging platforms that were not specifically built for playing games on.
Legacy Wars expertly straddles these two ideas. It’s sophisticated enough to not be out of place in an esports tournament, while being accessible enough that everyday fans can play the game and meaningfully compete—and even win—against professional players. All of this speaks loudly to the soundness of the game’s design and the studio’s original vision.
The accomplished execution of Legacy Wars had an unexpected outcome, as Kim explains:
“The Power Rangers community embraced Legacy Wars with open arms. You could feel how much they appreciated having a game that treated the franchise they love with respect. We made sure it had all of the characters, looked amazing, and was authentic to the brand. Of course, we made sure it was a legit fighting game, too. This all made a lot of people who saw ads for it think it was a console game. When they realised it was a mobile game, many of them asked us to make a more traditional fighting game for consoles and PC with the same level of quality. The requests were literally coming in daily!”
Unbeknown to the fans, nWay had already been doing research and development for its follow-up title, Power Rangers: Battle for the Grid. Unlike the mobile-only Legacy Wars, Battle for the Grid was targeted for a wide range of game platforms, and was planned to be just what the fans were asking for: a more traditional fighting-game experience. Given its innovator’s spirit, nWay wasn’t content to simply copy and reskin any number of existing fighting game formats and call it a day. Rather, the studio doubled down on its belief that games can be both broadly accessible, and satisfying experiences for enthusiast players.
The nWay team with actor Jason David Frank from the Power Rangers franchise. | Photo: nWay
The nWay team with actor Jason David Frank from the Power Rangers franchise. | Photo: nWay
For the development of Battle for the Grid, the studio made what might seem like a counterintuitive move given its approach to games: it enlisted two legends from the professional fighting-game scene to work on the game. As combat designers, Long ‘ShadyK’ Tran and Daniel ‘Clockw0rk’ Maniago—most famous for their expertise in the Marvel vs. Capcom fighting-game series—imbued their deep understanding of the genre’s mechanics into Battle for the Grid. The end result, though, was not a traditional, complex fighting game, but something very…nWay.
If Legacy Wars was about distilling a fighting game down to its essence, Battle for the Grid can be seen as pushing the traditional experience to new levels of accessibility. They are, in a sense, two sides of the same coin.
Upon its release, Battle for the Grid was quickly adopted by the fighting game community—not an easy feat by any means. And not an accident either. nWay had dipped its toes in the esports waters with Legacy Wars and saw the potential in opening it up to more people.
The studio formalized its move into the pro-gaming scene this year via the launch of the Power Rangers: Battle For The Grid League. The national tournament was originally set to culminate in a final showdown at the Evolution Championship Series (EVO) in Las Vegas, the largest and most prestigious fighting game tournament in the world. The ongoing COVID-19 pandemic ultimately forced it to move entirely online.
With the success nWay has found through creating thoughtful game experiences, being the official custodian for Power Rangers fighting games, and earning credibility with a game community known for its incredibly high standards, it’s easy to forget about one of the biggest challenges the studio faced over the years: building the technology that powers its games.
Battle for the Grid is the first game to use nWayPlay, the studio’s in-house technology platform. It addresses many of the technical challenges associated with making and operating online competitive games. More specifically, it provides balanced matchmaking services, unifies players from different game platforms, facilitates online connections with little to no lag, and more. The $64,000 question is, does it work?
The proof is, as they say, in the pudding. Battle for the Grid has earned the public’s seal of approval, being praised by fans both for the quality of its design and the smoothness of its online gameplay. It is also the first fighting game in history to allow players from five (soon to be six) different game platforms—Xbox One, PlayStation 4, Nintendo Switch, PC, and Stadia—to seamlessly compete against one another. It’s a remarkable achievement.
Taehoon Kim and Tony Harman (center) with the rest of the nWay team at its San Francisco office in 2015. | Photo: nWay
Taehoon Kim and Tony Harman (center) with the rest of the nWay team at its San Francisco office in 2015. | Photo: nWay
Taking a step back, you might notice that nWay has been working on addressing similar technical challenges ever since ChronoBlade. (It’s actually more accurate to say since Kim’s days at Realtime Worlds. Remember the studio Kim started in South Korea to tap into the country’s pool of excellent online game engineers? Today, nWay has a local office in Seoul for the same reason.)
It’s taken the studio nearly a decade—the problems it solved are very hard, and technology has changed quite a bit over the years—but it finally has a robust, scalable solution to power its current and future games. Better yet, nWay just launched a partnership program that allows other game developers to benefit from its years of hard work.
Every major point on nWay’s achievement timeline is rooted in breaking down barriers. ChronoBlade gave casual players and platforms a rich game experience unlike anything else they had access to; Legacy Wars opened up the traditionally complex fighting-game genre to anyone who could tap a screen; Battle for the Grid threw the idea of platform-specific players out the window, letting players with virtually any game hardware be a part of one universal community; and with nWayPlay, the studio is taking the burden of creating and operating a Byzantine live service infrastructure off the shoulders of game developers who don’t have the experience, resources, or desire to do so on their own.
As it looks to the future, nWay believes the game industry is on the cusp of huge, and positive, change. It just needs a nudge forward. “People are finally starting to realize how integral player communities are to the game experience itself, but don’t know exactly what to do about it,” says Kim. “We have a lot of unique thoughts on this given our experience with online games and passionate player communities, and hope to share more soon.”
Follow @FortePlatform for the latest updates.

Block Earner is a blockchain powered fintech on a mission to provide a user-friendly interface for everyday Australians to access the benefits of decentralised finance.
Unlock fixed or
variable rates*
Liberate your dollars using the power of blockchain. No technological hurdles. Just better yields for the people.

* All yield is USD denominated. Fixed rate may change quarterly and variable rates may change daily. For more info please see FAQs.
How is yield generated?
Your money is converted to digital dollars (stablecoins) and lent to other borrowers who pay you the yield.
The borrowers are required to provide digital assets much greater than the borrowed amount as security.
Check
Access to your capital anytime
Check
Access to your yield anytime
To understand the world of cryptocurrency, simply break it down into its component words: crypto- and -currency.
‘Crypto’ is from the Greek word ‘kryptos’, meaning ‘hidden’. In its modern usage, cryptography is simply the technique of using hidden codes. Remember when you were a child and you would create your own secret alphabet so your parents wouldn’t be able to read your diary? That was an act of cryptography! And you may even have sent that secret code to your friends so you could pass mysterious messages to each other? That act of securing communications was also cryptography.
As for currency, well that simply refers to the world of money, or more specifically, the system of exchanging money between interested parties. To boil it down again to childhood terms, perhaps you remember agreeing upon the value of your pack of chocolates compared to the pack of chips your friend brought. You desired something salty, and she desired something sweet. So you engaged in an exchange of food currency (and of course, the teacher would be overseeing any potential scams or cheats in this food currency…).
Combining these two concepts, with a little bit of computer programming trickery, is the basis of cryptocurrency.
While cryptocurrency in its current widely popularised form can be traced to the late 2000s/early 2010s, the academic idea of assigning value to computer programs’ ability to solve secret codes has existed in some form since the 90s. The surge of IT connectivity in the world, accompanied by the rise in hacker culture of the 2000s led to the birth of the Bitcoin.
In the wake of the Financial Crisis of 2008, the world was in economic upheaval. Out of the ashes, a mysterious individual (or group of individuals, nobody knows still…) calling themselves Satoshi Nakamoto released a paper. This revolutionary paper proposed the idea of a publicly open ledger, onto which was attached a long chain of complex addresses and confirmation checks (you may have heard of this called the blockchain).
Satoshi’s research ultimately facilitated the exchange of money directly between individuals without the need for traditional banks or financial institutions. Bitcoin was designed to be an open, fair and free alternative to the traditional financial world around it.
From its infancy as an intellectual IT curiosity, to its shady adolescence as a currency of the dark web, to its current incarnation as a globally recognised investment opportunity, cryptocurrency has gone through many evolutionary steps. Bitcoin was the leader, but now there is a plethora of coins, tokens and opportunities for the everyday citizen to get involved.
Through the interconnectedness of our internet-rich lives, the ever-increasing computational technology around us, and the constant search for economic stability, cryptocurrency offers an exciting, uncharted way forward.
But for all its apparent complexities, in many ways, it’s no different to the time when we were children in the playground agreeing on secret codes and swapping the things we valued.
Block Earner is a blockchain powered fintech on a mission to provide a user-friendly interface for everyday Australians to access the benefits of decentralised finance.

Celestia is a modular data availability layer built for rollups to utilize. Celestia doesn’t function like a typical layer 1 blockchain. Its only job is to order transactions and verify that the data being published is available. By taking this approach, Celestia achieves properties of scalability, flexibility and interoperability unmatched by prev
Separation of consensus and execution layers

Standard “world computer" blockchains bundle consensus and execution while Celestia decouples them. Celestia provides a pluggable consensus layer, allowing developers to deploy their own execution layers to run on top. This enables more customizability and sovereignty for applications built on Celestia.
Data availability proofs
Celestia uses a 2-dimensional reed-solomon encoding scheme to encode block data such that only a small sample of data is enough to verify with statistical certainty that the entire block has been published. If data is incorrectly encoded, the network is notified via a data availability fraud proof.
Rollups for off-chain execution
Celestia is perfectly suited for a novel scaling solution called rollups which push state execution off-chain and rely on a base chain for consensus and data availability. Optimistic rollups require data availability to detect fraud and zero-knowledge rollups require data availability to reconstruct the state of the chain.
Secure light clients for interoperability
Cross-chain interoperability relies on light clients which are typically not secure because they make an honest majority assumption. Light clients in Celestia do not make an honest majority assumption, unlocking truly secure cross-chain interoperability. Connecting chains will be as simple as deploying a smart contract.
Celestia is for decentralized apps what cloud computing is for the traditional web.
Web infrastructure evolved from individual servers, to shared hosting services and finally individual virtual machines on a shared server. Similarly, decentralized infrastructure is evolving from individual execution chains to shared execution chains and finally individual execution chains on a shared consensus layer.
Celestia is a stripped-down layer-1 blockchain that focuses solely on ordering transactions and making the data for transactions available. The blockchain does not handle smart contracts or perform computations.
Single.Earth is a GreenTech company focused on natural sciences and blockchain technology. Single.Earth is also the company behind the MERIT token.

Grow your money stash with a self-custody, permissionless, trustless bank. MeanFi brings crypto and DeFi to everyday banking with over $3.8 billion dollars in aggregate liquidity.
Official Mean DAO Docs
The financial equalizer for people and businesses worldwide
Mean DAO
Mean DAO is a decentralized autonomous organization (DAO) with a single purpose:
Build the decentralized products and blockchain infrastructure necessary to act as the financial equalizer for people and businesses worldwide.
To fulfill this ultimate goal, the DAO funds and operates the Mean Protocol and the MeanFi web3 decentralized app.
If you are a developer, looking to leverage any of the Mean Protocol money legos, head over to the or hit us up on the , we are a helpful bunch.
Make sure to keep in touch with the latest by following us on .
Mean Protocol
The Mean Protocol is a set of rules and interoperable smart contracts that help application developers facilitate everyday banking workflows and investment banking operations.
The Mean Protocol is maintained by the Mean DAO and is deployed on the . The protocol facilitates transaction coordination using several sub-graphs and programs, such as the Hybrid Liquidity Aggregator, DDCA, and Money Streaming programs. To explore all the different components of the Mean Protocol, read the .
MeanFi
is a self-custody, permissionless & trustless web3 banking application powered by the Mean Protocol, and facilitates everyday banking and retail investment banking workflows to people and businesses around the world.
MeanFi is both a production web3 app and a reference implementation of the Mean Protocol smart contracts developers can use as a starting point for building apps that leverage the Mean Protocol.
Learn more about the DAO and how it works on the . Looking for tokenomics head over to the .
Unofficial Guide to MeanFi
This site is maintained by the Mean DAO community and serves as a resource to explore the breadth of DeFi applications associated with the Mean Protocol platform and MeanFi.
Is this guide approved by the community?
This guide was written by members of the Mean Community, also known as Mean Apes, to explore the MeanFi decentralized platform in greater detail and present a variety of DeFi strategies by which users can derive additional value from the platform.
This is not an official guide for Mean DAO, MeanFi, or Mean Protocol, nor it should be construed as financial advice. As always with DeFi and cryptocurrency in general, do your own research, and only invest what you’re comfortable with potentially losing.
Where can I find the official documentation?
Official documentation for the Mean DAO:
What's the link for the application?
The MeanFi application can be found here:
What will I find on this website?
The goal of this website is to present a variety of tutorials, getting started guides, and investment strategies that utilize the MeanFi. Topic samples include managing money streams, DCA, vaults, borrowing and repayments, and how to integrate Mai Finance into other DeFi protocols/strategies.
Lastly, information on how to efficiently use Mean DAO's native token, MEAN, will be provided, as they develop.
What will I not find on this website?
Some assumptions we are making are:
Readers are already aware of DeFi projects on Solana, and the Solana Ecosystem in general.
Have a good understanding of how cryptocurrency works, and are informed of the different risks related to the cryptocurrency industry in general.
If you have questions about the Tokenomics of MEAN, and other basic tenants of the Mean Protocol and MeanFi, please read the official documentation (link above) or join the community.
Developers
How developers can make use of the different protocols offered by Mean Protocol on their own Dapps
Getting started
Developers can make use of the different sub-graphs within the Mean Protocol. They are:
The Money Streaming Protocol (MSP) is perfect when your app wants to exchange money for time, like Payroll or Remittances. The use cases are endless for Money Streaming, from subscriptions to consultants, fund managers, retirement accounts, and more. Read the to learn more.
The Hybrid Liquidity Aggregator (HLA) is great to help your users aggregate liquidity from multiple protocols and optimize their routing, fees, slippage, and pricing impact. This is useful if you want to guarantee the best swap prices across multiple AMMs and Serum's CLOB without having to manually implement each of them.
The Block Tempo Protocol (BTP). The BTP helps developers register time-sensitive callbacks on-chain in the Solana Network. It's the equivalent of having a cron-job on Solana, where you can subscribe a program deployed on MAINNET to receive a callback after a certain amount of time has elapsed.
The Decentralized Dollar Cost Average Protocol (DDCA) is great to help people become regular investors every day. Decentralized DCA gives account owners a way to automate their investment strategy without the dependence on a centralized entity like Coinbase or Robinhood.
The P2P Exchange Protocol (P2PX) works well if you want to provide your users with swaps between any two parties in a peer-to-peer fashion with the safety of 2/2 token vaults. This is useful in countries where on-ramps and off-ramps are not very available, or with a highly unbanked population.
Authentication
Interacting with the Mean Protocol Programs deployed on Solana's DEVNET, and MAINNET doesn't require any authentication. The protocol is completely open and anyone can start using it without having to contact us.
Please refer to the section and the respective open-source projects that support the different developer SDKs for these programs.
Source Code
Mean Protocol on GitHub:
Mean Protocol SDK on GitHub:
Smart Contracts
Mean Protocol Programs:
Money Streaming Account:
Decentralized DCA Account:
Liquidity Aggregator Account:
Program Vaults and Treasuries:
Money Streaming Operating Acc:
Decentralized DCA Operating Acc:
Fees
There are three kinds of fees charged by every Dapp in crypto-land Network Fees, Protocol Fees, and App Fees.
→ Network Fees
These are paid to the Solana Network directly to sign transactions and submit them to validator nodes.
The current transaction fee in Solana as of Sept 2021 is:
5,000 Lamports, equivalent to
0.000005 SOL, equivalent to
$0.000365 (at ~$73 / SOL)
→ Protocol Fees
These are fees paid to different protocols, like the Serum, Raydium, and Mean protocols for using their resources, such as liquidity pools, treasury pools, borrowing, and lending protocols, etc.
Please refer to each protocol documentation for the most up-to-date fee schedule. Here's the list of dependent protocols used by ours through cross-program invocations.
Project Serum →
Raydium →
Orca →
Saber →
Mercurial →
To see Mean Protocol Fees, refer to the section.
The Architecture
Your app can interact directly with any of the Mean Protocol Programs (smart contracts) deployed on-chain, or through the provided Mean SDK, depending on your needs.
NOTE: Server vs Client-side program invocation
Be aware of your use case when deciding between server-side vs client-side program invocation. Consider the limitations on performance and latency when making your decision.
If you are a developer leveraging the Mean Protocol as part of multi-instructional transactions, or from cross-program invocation use cases, we recommend using the Rust API directly against the Solana Sealevel runtime, as it will perform better, and will save you time.
For those wanting to leverage out-of-the-box functionality like creating a treasury pool, or opening a money stream directly from a web or mobile app, the easiest route is to leverage the JS API with the provided Mean SDK, as it abstracts a lot of the complexities and serialization boilerplate required to send queries and commands to Solana. See .