LogoLogo
DocsContracs
  • WELCOME TO EESEE
    • 🟒Introduction
      • ✨Overview
      • ❔How it works?
      • πŸ‘ΎUnique Features
  • Getting Started
    • πŸ—³οΈSupported Wallets
    • πŸ“²Wallet Creation
    • πŸ™Connect an Account
  • For Buyers
    • 🎨Exploring Digital Asset
    • 🌱Buying Process
    • βž•Bonus & Free Tickets
    • 🎫Digital Asset Ticketing
    • ☝️Winner Selection Model
    • 🧩Aggregation of Digital Assets
  • For Sellers
    • πŸ–ŒοΈList / Reclaim a Digital Asset
    • πŸ’ΈFees & Reward Pool
    • πŸ”„Transaction Process
  • IRO Launchpad
    • πŸš€Overview
    • πŸ› οΈHow it works
    • πŸͺœTiers
    • 🎟️Entry Requirements
  • Token
    • πŸ“–Tokenomics
    • πŸ—ƒοΈApplication of $ESE Token
    • πŸ’°How to buy $ESE
    • βš™οΈContracts
  • Rewards & Staking
    • πŸ‘©β€πŸŒΎ$ESE Staking Mechanism
    • πŸ§‘β€πŸ³$ESE Staking Guide
  • Cross-Chain Technology
    • πŸ—οΈKey Concepts
    • πŸ§ͺOther
  • Security & Privacy
    • πŸ”Security
    • 🦺Security & Audit
  • Additional
    • πŸ§‘β€πŸ€β€πŸ§‘Team & Advisors
    • 🌐Terminology / Glossary
    • πŸ–ΌοΈMedia / Brand Kit
    • πŸ”—Official Links
  • Support
    • πŸ‘‹FAQ
    • πŸ†˜Contact Support
Powered by GitBook
On this page
  • Asset Security
  • Counterfeit Prevention
  • How Counterfeiting Occur
  • How We Guard Against Counterfeiting
  • Conclusion
  1. Security & Privacy

Security

Asset Security & Counterfeit Prevention

Asset Security

We ensure the safety of your assets during transfers. If there’s an issue, our system is designed to safeguard your assets, allowing you to reclaim them if needed.

Counterfeit Prevention

The open design of our platform allows for broad participation, including the ability for users to create their own EeseeAssetSpokes. While this fosters innovation and accessibility, it also allows counterfeit tokens to be minted via EeseeAssetHub by entities without genuine backing assets.

How Counterfeiting Occur

Since anyone can create these tokens, some might be made without actual financial backing or real liquidity. This means you could encounter tokens that aren't as valuable or trustworthy as they seem.

How We Guard Against Counterfeiting

To tackle this issue, the system incorporates crucial verification mechanics. Every asset made through the EeseeAssetHub has a specific detail attached to it β€” a reference to the original creator, known as the EeseeAssetSpoke address. Think of it like a tag or a signature. This tag helps you trace where the asset came from. So, if someone tries to make and use a token that doesn't have genuine backing (essentially a fake EeseeAssetSpoke), this tag makes it easier to spot and avoid those inauthentic assets.

This layer of transparency and traceability is fundamental in safeguarding the authenticity of assets on our platform, offering users peace of mind and security in their digital transactions.

Conclusion

Our goal at eesee is to make cross-chain asset management as easy and user-friendly as possible. We continuously work on improving our platform to provide you with a seamless experience.

PreviousOtherNextSecurity & Audit

Last updated 1 year ago

πŸ”
Page cover image