Protocol bugs. Despite the aim to have at least one independent audits of the protocol by a leading firm, exploits in the software or incentive structure may exist. While we do not maintain custody of any funds, success depends on the proper alignment of architecture with incentives. As at the date hereof, the cypher protocol is still under development and its design concepts, consensus mechanisms, algorithms, codes, and other technical details and parameters may be constantly and frequently updated and changed. Although these documents contain the most current information relating to the cypher protocol, they are not absolutely complete and may still be adjusted and updated by the cypher team from time to time. The cypher team has neither the ability nor obligation to keep users informed of every detail (including development progress and expected milestones) regarding the project to develop the cypher protocol, hence insufficient information disclosure is inevitable and reasonable.