argakiig 1 Share #1 Posted September 7, 2014 01 / DEVELOPER ID VERIFICATIONWe begin with a rigorous identity verification of the lead developers.Identity verification is a multi-step process that involves written and/or verbal communication,video chat and legal proof of identity, such as notarized identity verification.We ensure that only identified developers have access to code repositories.02 / CODE REVIEWIdentifed developers are then eligible for a complete code review wherein our cryptocurrencyexperts look for anomalies related to the money supply, such as obfuscated pre-mines or post-mines.Our experts also ensure that the money supply will stay within limits specified by the coin developers,and identify any potential bugs found during review.03 / TESTING AND BUILDINGOur development team then builds the wallet code as a deployable Microsoft Windows applicationand tests for basic wallet operations and networking. Part of the testing process includes a blockchainanalysis to verify that coin production meets specifications in terms of money supply and block times.We also provide similar services for Mac OS X and Linux deployment.04 / ELECTRONIC CODE CERTIFICATIONAfter testing, we electronically sign the code using a digital certificate recognized by Microsoft, Apple,and other major software vendors. This signature ensures that the program does not change betweenits digital certification and deployment to your users.05 / RATINGSFinally, as part of our process, we offer coin ratings based on identity verification, code review, testing,and whether certified wallets were used at launch. These ratings are: Go to top Share this post Link to post Share on other sites