Find more information about MaidSafeCoin including social sentiment and CP Risk Score.
Data / Computing / AI
CHG % (24H)
CHG % (7D)
Social Sentiment Social sentiment analysis Twitter posts and reflects how wider public feels about one or another coin at this particular moment of time.
| Previous Close
| 1 Week Ago
| 1 Month Ago
Coin Risk Assessment The CPR Score is a cryptocurrency risk score combining Liquidity, Market and Issuer Risk. BETA
Liquidity Risk Liquidity risk is the risk that stems from the lack of marketability of an coin that cannot be bought or sold quickly enough to prevent or minimize a loss.
Market Risk Market risk is the risk of losses in positions arising from movements in cryptocurrency market prices.
Issuer Risk Issuer risk is addressing the various risks associated with the specific coin itself. This contains a variety of risk metrics related to the product, its market, developer and social community.
Most Similar Coins Shows the 10 most similar coins based on the information available on this page. BETA
MaidSafeCoin (MAID)Historical Price & Volume Charts
MaidSafe is a fully decentralized platform on which application developers can build decentralized applications. The network is made up by individual users who contribute storage, computing power and bandwidth to form a world-wide autonomous system.
Safecoin can only reside within the SAFE network and will be stored in a users wallet and used in exchange for network services; such as increased storage space and access to network applications. There is no set distribution time for safecoins. Unlike many currencies, the distribution of safecoin is backed by information and the amount of coins generated by the SAFE network is directly related to the amount of resource provided to it.
Genesis Date: 2014-12-06
The SAFE (Secure Access for Everyone) network can be best described as a fully distributed data management service. This network manages static and dynamic data as well as communications. Importantly the data held is either :
- Encrypted by clients
- Cryptographically signed by clients
In either case the network cannot decrypt any of the data on the network. This can be thought of as a decentralized server that performs the tasks of today's httpd, ssh, scp, ftp, smtp, pop3, imap etc. servers.
The SAFE network is made up of unused hard drive space, CPU and communications capabilities of commodity computers. These computers are likely owned by the very users of the system, but need not be limited to that. Each computer will effectively mine for credits which can be traded for many other goods and services. These credits are called safecoin.
Client applications can access, store, mutate and communicate on the network. The clients allow people to anonymously join the network and cannot prevent people joining. Data is presented to clients as virtual drives mounted on their machines, application data, internal to applications, communication data as well as dynamic data that is manipulated via client applications depending on the programming methods employed.
Examples of client apps are; cloud storage, encrypted messaging, web sites, crypto wallets, document processing of any data provided by any program, distributed databases, research sharing of documents, research and ideas with IPR protection if required, document signing, contract signing, decentralized co-operative groups or companies, trading mechanisms and many others. The clients can access every Internet service known today and introduce many services currently not possible with a centralised architecture.
These clients, when accessing the network, will ensure that users never type another password to access any further services. The client contains many cryptographically secured key pairs and can use these automatically sign requests for session management or membership of any network service. Therefore, a website with membership can present a join button and merely clicking that would sign an authority and allow access in the future. Digital voting, aggregated news, knowledge transfer of even very secret information is now all possible, and this is just the beginning!