-
What is token migration? Can I send old MYST to an exchange?
Migrating a token is simply upgrading the smart contract of that token (its “standard”). In the case of Mysterium, we are upgrading our ERC-20 token to include the ERC-721 token functionality. This is a 1:1 token migration so there will be no new tokens created. You should not send MYST tokens that have not been migrated to an exchange. Make sure to migrate your tokens before sending them on to exchanges. See the MYST token migration guide for step by step instructions on how to migrate your tokens.
-
What if I'm a Binance user?
This is the cheapest way to get some MYST if you're Binance user. If you have Binance, but don't have Bittrex account, and don't want to pay high transaction fees on Ethereum network, then you can follow these steps: 1. Buy the amount of MATIC tokens you'd like to trade for MYST. 2. Install Metamask (or use Trezor / Ledger hardware wallet if you need additional security). 3. Configure it to worth with Polygon chain (use this guide if you need) 4. Withdraw your MATIC into your wallet address generated by MataMask. Don't forget to choose Polygon (not Ethereum) in the Binance withdrawal interface. 5. Go to QuickSwap and swap your MATIC to MYST. NOTE: Don't forget to leave 1 MATIC for yourself to cover future Polygon tx fees.
-
How do I store my MYST?
MYST is an ERC-20 token and can be stored in any Ethereum wallet (MyEtherWallet, Metamask, Ledger, Trezor, etc). MYST is also compatible with the ERC-721 token standard. MYST is also compatible with Binance Smart Chain and Polygon.
-
How do I buy MYST?
See the "Where to find MYST" section on this page, or find a full list also on CoinMarketCap. MYST is available on Bittrex Global, HitBTC, Uniswap V3 (Ethereum), PancakeSwap (Binance Smart Chain) and QuickSwap (Polygon). Token holders can transfer MYST between the Ethereum and Binance Smart Chain networks using this guide. You can then start trading on PancakeSwap. Token holders can also transfer MYST beteween the Ethereum and Polygon blockchains, so you can trade on QuickSwap. Check out this guide.
-
Do I need MYST?
All nodes will receive their payments in MYST. MYST can be manually converted into your cryptocurrency of choice. Beyond its use as a transfer of value, MYST is a representation of your active involvement and intention to participate within Mysterium Network. In this way, MYST enables more than just P2P payments. When network actors have “skin in the game” they help increase the overall security of the network, protecting against various types of attacks. It also establishes a community around a purpose, so the network can grow and evolve with its token holders.
-
What is MYST token?
MYST is a type of cryptocurrency known as a utility token. This means it serves a specific purpose as a native digital currency within a particular network or platform. In this instance, MYST enables peer-to-peer (p2p) transactions within the Mysterium Network. For example, one of the use cases is to enable a p2p VPN. Instead of paying a regular VPN service to unblock websites and apps, you can use MYST to pay people around the world when you connect to their IP address.
-
Why use cryptocurrency?
Just like Bitcoin and other cryptocurrencies, MYST tokens are censorship-resistant and pseudo-anonymous by default. Instead of regular fiat money, where governments control the supply, a cryptocurrency acts like universal internet cash. It is borderless and nationless, as it can be ‘minted’, owned and used by anyone. Cryptocurrencies have helped forge new online communities, like Mysterium. Peers within a distributed network like ours can easily share resources with each other, such as storage, computing power and even internet accessibility. Cryptocurrency provides a way for all these participants to interact and trade with one another without trusting each other and without third parties being involved (permissionless). In this way, we can leverage cryptocurrency to enable fast, cheap and anonymous transactions between these peers.
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
What's the criteria for my IP address?
You can run a node with dynamic IP, it does not have to be static. However, only 1 node per IP address is allowed. We do not support multiple devices under a single internet line. Having multiple nodes will likely to affect your internet connection quality as well as reduce service stability. Each node must be linked to a different residential IP address, so unless you have multiple routers, each with their own IP and node linked to it, it's not possible. Residential = IP in people’s homes. Non-residential = Data center, college or business IP.
-
What fees do node runners pay?
The network takes a 20% service fee. This is the only fee charged by Mysterium, which is used to continue building, maintaining and improving the service. It’s purpose is similar to other peer-to-peer platforms, like Uber or AirBnB. However, in this case it’s our smart-contract automating the pay outs and fees. Without a percentage cut, the node network must maintained by a team voluntarily (for free), which means quality would go down and general network growth very slow. Note that you will also pay blockchain transaction fees when you withdraw your earnings “on-chain”, though if you do this using a Layer 2 such as Polygon, you should only pay very little (cents at a time). During the BETA period of our Tokenomics 2.0, network fees are being distributed as rewards to MYST token holders who stake in the Mysterium Delegation Pool. You can learn more about that here.
-
What is MystNodes.com?
This is where all the magic happens. Through your personal MystNodes.com dashboard, you can create a node runner account, connect your node to your IP address ("claim it"), access your node’s information, track your performance, and see your monthly earnings. Create an account at MystNodes.com
-
How can I maximize my earning potential?
1 - Don’t enable the only “whitelisted traffic option” if you’re not based in the following countries: Canada, U.S., UK, Italy, Australia, Germany or India. 2 - Have a strong and stable internet connection. 3 - Run your node 24/7; some user sessions can be very long and if you are disconnected from a client, they will be reconnected to a more competitive node, which means losing that client. 4 - Double-check your configuration and ensure users can access your node. 5 - When users have discovered your node, bookmark it as a favourite. Note that prices will be set based on a supply and demand algorithm for each region. The algorithm will assess the node type, which considers factors such as region, IP location (residential / non-residential), and quality. It could be compared to Uber’s surge pricing, where demand determines price based on the availability of the network. Note that Mysterium isn’t particularly demanding of your CPU, it cares more about bandwidth. If you’re not getting traffic, it could be because your node is poorly configured E.g. Your router is blocking Mysterium traffic, which you’ll need to correct by downloading the Mysterium VPN app and check the connection.
-
How can I get support as a node?
There are plenty of ways to get support: 1. In-app 2. Through our Discord server at https://discord.com/invite/n3vtSwc 3. Through email at help@mysterium.network 4. Through Intercom chat on our website
-
How do we protect node runners?
Whitelisting We have a whitelisting option available which we recommend to nodes from certain regions (e.g. UK, US, DE) who would like extra protection. This function allows traffic from known sources, however, may result in lower earnings. Exit node guidance There is always some risk when running a node, as is the case with Tor, which has been around for 10 years. You can enable whitelisted traffic and there will be no chance for someone to do anything illegal (like torrenting, accessing illegal websites, etc.) but in some regions you’ll not have any issue if someone accesses torrent websites. If you don’t select the whitelisting option, you increase your risk factor but with it, significantly increase your earning potential. Please make sure you’re up to date with the regulations in your country. https://docs.mysterium.network/legal/ For those who have a greater technological understanding of how to run an exit node safely and protect the privacy of their node running activities from ISPs, this will be a viable option. Please read our guide on running an exit node: https://dvpnalliance.org/exit-node/ For everyday users, it’s best to select the whitelisting option.
-
How do I run a Mysterium Node?
The easiest way is to get set up with mystnodes.com The onboarding wizard will walk you through every step, depending on your device. You can also follow the tutorials at https://docs.mysterium.network/ If you have AVADO box: https://docs.mysterium.network/node-runners/setup/avado/ You also can run node on Windows, Linux or Mac through Docker: https://docs.mysterium.network/node-runners/setup/docker/ For Raspberry Pi: https://docs.mysterium.network/node-runners/setup/raspberry-pi/ And for Linux (not Docker): https://docs.mysterium.network/node-runners/setup/linux/ There is an opportunity to run a node on a mobile device, depending on if your mobile provider provides CGNAT or not. If it does, then it's not possible. https://en.m.wikipedia.org/wiki/Carrier-grade_NAT
-
What is whitelisted traffic?
We have a whitelisting option available which we recommend to nodes from certain regions (e.g. UK, US, DE) who would like extra protection. This function allows traffic from known sources, however, may result in lower earnings. Whitelisted traffic is a technology built by Mysterium that only allows pre-approved traffic from “known” sources to pass through your node. This means you’ll have no problems if someone tries to do anything illegal, because they will not be able to. For those who have a greater technological understanding of how to run an exit node safely and protect the privacy of their node running activities from ISPs, this will be a viable option. Please read our guide on running an exit node: https://dvpnalliance.org/exit-node/ For everyday users, it’s best to select the whitelisting option.
-
What is a Mysterium Node?
Nodes are devices, such as an AVADO box, Raspberry Pi or computer, which help power and maintain our distributed network. Most of the internet you pay for goes to waste, sitting idle or completely unused. Peers within a distributed network like ours can easily share these excess internet resources with each other, such as storage, computing power, bandwidth and IP addresses. Any user of the network can pay to connect to your node, providing them with a VPN service, access to the open internet and a secure line of communication. Nodes replace the traditional role of a server. You can run Mysterium's node software on Mac, Linux, Windows, AVADO and Raspberry Pi. Head to My.Mysterium.Network to get onboarded in a few steps.
-
Can nodes see my traffic?
Mysterium encrypts all traffic that is routed through a node, and therefore no traffic is visible on the provider side. However - it holds with the same potential as Tor, which is that an exit node could potentially see traffic if a user is looking at unencrypted sites (eg. A site without HTTPS). The person running the exit node would have to have a sophisticated understanding and tools in order to do this, so it’s not a huge concern for network users.
-
Do you plan on adding multi-hop routing?
At the moment, all nodes are exit nodes. This is where the whitelisting option comes into play. We are exploring the possibility to add relay nodes with a traffic slicing option. This will allow nodes to only accept traffic from certain domains they choose, such as blogging, social media or streaming sites (ie. Netflix).
-
Does Mysterium VPN work in China?
Yes, we’re very happy that our VPN works in China so we can support the community there. But this is a constant cat and mouse game, and sometimes we are blocked yet again. However, we will continue refining our bypassing techniques. We actually have a pretty nice article for you to read about this.
-
What is Mysterium VPN?
Mysterium VPN is a permissionless, peer-to-peer VPN. It's Mysterium's flagship product and showcases the potential of our residential IP network. Access anything, anywhere, anytime Our network is blind to borders. Select any IP you like from our global list and get unlimited access to worldwide content. Over 135 countries and 11,000 IPs to choose from. Trustless technology Direct payments between consumers and service providers are settled immediately. We’re also open source, so you can pop by and poke your head in any time you like. No centralised logs It’s technologically impossible for us to store logs centrally. Traffic is distributed across our global network of residential IPs. Pay as you go Using our micropayments system, Hermes Protocol, you only pay for the gigabytes you actually use. Multiple payment options, and no subscriptions or locked in contracts – just minute-by-minute payments.
-
My VPN app is frozen - what should I do?
Try the following: 1) Close the app and open it again; 2) Reboot/restart your phone (turn off/turn on) and computer; 3) Delete the app and reinstall it again.
-
How is Mysterium VPN different from regular VPNs?
A decentralized VPN is peer to peer, meaning instead of paying a business for your VPN connection, you pay every day people around the world who rent out their IP address to you. You will see a global list of IP addresses to choose from, with over 135 countries. You can even customise your connect based on the type of activity you want eg. browsing, streaming, downloading. You pay nodes for the minutes you are connected and amount of traffic served through the node. On a technical level, it mimics the architecture of Tor more closely, but has the same ease of use as a VPN. Unlike Tor network, all of your internet activity is encrypted (not just a single browser). Traffic is encrypted with the WireGuard protocol, the highest industry standard available.
-
How do I pay for Mysterium VPN?
Our VPN is fully pay-as-you-go, so you only pay for the gigabytes you actually use. No subscriptions, no monthly fees – just minute-by-minute payments. Pay with PayPal, Google Pay, debit/credit card or a range of cryptocurrencies.
-
How do you encrypt the network?
We encrypt the network with WireGuard protocol, the highest standard available industry-wide. While both decentralised VPNs and Tor both leverage node networks, Tor’s main goal and purpose is to offer anonymity. Mysterium's goal is about censorship-resistance and unblocking content. Tor uses a different encryption method, functioning more similarly to an encrypted proxy, which means that not all traffic from your computer is going via the Tor network. As an encrypted browser, it’s only what you’re browsing or accessing through the browser that is protected (Tor essentially protects its own browser). With a dVPN, we use VPN tunnels. This means you’re protected when you’re accessing apps, browsing content, encrypted messaging services etc. All your internet traffic is going via an encrypted VPN tunnel using UDP communication protocol. Tor is using TCP, which is slower - sometimes up to 10 times slower!
-
What is Mysterium Network?
Mysterium is a permissionless protocol and network to liberate the web and all its information. We made some tools which allow you to browse the internet freely and earn by sharing your connection. You can also build censorship-resistant applications. The network itself is made up of residential and non-residential IPs as exit nodes, spread across more than 135 countries globally. It's used by everyday users and businesses looking for networking and unblocking solutions. We want to enable secure access into an open internet for everyone by building technology that makes the internet blind to borders.
-
What can you build on Mysterium Network?
Though there are many more, these are the first use cases which have already shown promise and will be a major focus in the short-term: VPNs and DPNs. With new and existing commercial applications that can plug into our node network, creating a truly borderless web experience. Enterprise-level proxy services and data mining. A new proxy protocol has been developed for unblocking corporate censorship, allowing projects to scrape the web at a fraction of current costs. By removing these centralised middlemen, we can bring even more value to our node runners. Third-party Integrations. Mysterium has developed easy tooling and APIs for major Web2 and Web3 platforms, which could be utilised by browsers, search engines, cryptocurrency wallets and streaming services, bringing our unblockable tech to everyone though the applications we already use. See our Developer and Docs pages for more inspiration and details.
-
How does MYST work in Mysterium Network?
MYST is a type of cryptocurrency known as a utility token. This means it serves a specific purpose as a native digital currency within a particular network or platform. MYST is the native utility token at the heart of Mysterium and poweres our payemnts smart contracts. It allows you to make fast and cheap micropayments for peer-to-peer VPN services. You can also stake your MYST tokens to the Mysterium Delegation Pool, to earn rewards. For more FAQs, check out the Token page.
-
What is a decentralised VPN (dVPN)?
Yes! Users can add video from YouTube or Vimeo with ease: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a video to When editing your answer, click on the video icon and then paste the YouTube or Vimeo video URL That's it! A thumbnail of your video will appear in answer text box
-
How do I store my MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
Do I need MYST?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I buy MYST?
The FAQ title can be adjusted in the settings tab of the App Settings. You can also remove the title by unchecking its checkbox in the settings tab.
-
What is MYST token?
To add a new question go to app settings and press "Manage Questions" button.
-
Why use cryptocurrency?
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
-
How do I store my MYST?
Yes! To add a picture follow these simple steps: Enter App Settings Click the "Manage Questions" button Click on the question you would like to attach a picture to When editing your answer, click on the picture icon and then add an image from your library
-
8. Service providers
We may employ third party companies and individuals to: Facilitate our Service (“Service Providers”) and, provide the Service on our behalf These may be other VPN service providers who build on Mysterium Network and Mysterium Protocol. Perform Service-related value add offerings Mysterium Network offers a network of Mysterium Node Runners which you can hop traffic through. This can add value to several internet services today. Chat applications, IoT ecosystems, content delivery systems are some of the many ways 3rd party service providers can provide value added offerings on Mysterium Network. Assist us in analyzing how our Service is used. We may use third party tools across marketing, product development and support functions. This could be google analytics, cookie tracking for retargeting marketing messages and more. Crash reporting for Mysterium VPN Bug reporting within tools such as Zendesk, Intercom and more. Personal data collection tools such as Typeform, Mailchimp and Intercom. These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose. 1. Analytics We may use third-party Service Providers to monitor and analyse the use of our Service. Google Analytics Google Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualise and personalise the ads of its own advertising network. You can opt-out of having made your activity on our Service available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js and dc.js) from sharing information with Google Analytics about your browsing activity. For more information on the privacy practices of Google, please visit the https://policies.google.com/privacy. Google Tag Manager Google Tag Manager is a solution that allows marketers to manage website tags through a single interface. The tool Google Tag Manager itself (which implements the tags) is a cookieless domain and does not collect any personal data. The tool triggers other tags, which in turn may collect data. Google Tag Manager does not access this data. If deactivation has been made at the domain or cookie level, it will remain in effect for all tracking tags implemented with Google Tag Manager. For more information on the privacy practices of Google, please visit the https://policies.google.com/privacy. Microsoft Clarity Microsoft Clarity is a technology service that helps us better understand users of our Service needs and to optimize our service and their experience (e.g. how much time they spend on which pages, which links they choose to click, what users do and don’t like, etc.) and this enables us to build and maintain our Service by means of user feedback. For more information on how Microsoft uses your information, how to opt out, and how to protect your privacy, please visit the following Microsoft website: https://clarity.microsoft.com/terms. 2.Behavioral Remarketing We may use remarketing services to advertise on third party websites to you after you visited our Service. We and our third-party vendors use cookies to inform, optimise and serve ads based on your past visits to our Service. Facebook Facebook remarketing service is provided by Facebook Inc. To opt-out from Facebook’s interest-based ads, follow these instructions from Facebook: Facebook adheres to the Self-Regulatory Principles for Online Behavioural Advertising established by the Digital Advertising Alliance. You can also opt-out from Facebook and other participating companies through the Digital Advertising Alliance in the USA , the Digital Advertising Alliance of Canada in Canada or the European Interactive Digital Advertising Alliance in Europe. Alternatively you can opt-out using your mobile device settings. For more information on the privacy practices of Facebook, read more about Facebook’s Data Policy. Linkedin Linkedin remarketing services is provided by LinkedIn Corporation. Please read more about Linkedin marketing solutions at You can opt out of LinkedIn data collection and targeting cookies following the instructions here. Reddit Reddit is a service run by Reddit, Inc. Please learn more about Reddit remarketing tools and how to opt out by visiting this page. Twitter Twitter remarketing service is provided by Twitter Inc.You can opt-out from Twitter’s interest-based ads by following their instructions: https://support.twitter.com/articles/20170405 3.Personal data collection tools Typeform Typeform service provided by TYPEFORM S. L. We use Typeform for conducting the surveys. For more information about Typeform’s data processing, please refer to the https://admin.typeform.com/to/dwk6gt. Intercom Intercom service is provided by Intercom, Inc. We use Intercom for communication and analytics purposes. For more information on what type of information Intercom collects, see Intercom Terms and Policies: https://www.intercom.com/terms-and-policies#terms. Mailchimp Mailchimp service is provided by The Rocket Science Group LLC. We use Mailchimp for marketing messages distribution purposes. For more information on the privacy practices of Mailchimp, visit their Privacy Policy: https://mailchimp.com/legal/privacy/
-
2. Legal Basis for Processing Personal Data under the GDPR
If you are from the European Economic Area (EEA), our legal basis for collecting and using the personal information described in this Privacy Policy depends on the Personal Data we collect and the specific context in which we collect it. We may process your Personal Data because: We need to perform a contract with you You have given us permission to do so The processing is in our legitimate interests and it is not overridden by your rights To comply with the law
-
13. Definitions
Us”, “we”, or “our” This refers to BlockDev AG. “Service” is the mysterium.network website operated by us. “Personal Data” means data about a living individual who can be identified from those data (or from those and other information either in our possession or likely to come into our possession). “Usage Data” is data collected automatically either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit). “Cookies” are small files stored on your device (computer or mobile device). “Data Controller” means the natural or legal person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal information are, or are to be, processed. For the purpose of this Privacy Policy, we are a Data Controller of your Personal Data. “Data Processor (or Service Provider)” means any natural or legal person who processes the data on behalf of the Data Controller. “Data Subject” is any living individual who is using our Service and is the subject of Personal Data.
-
10. Children’s privacy
Our Service does not address anyone under the age of 18 (“Children”). We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Child has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from Children without verification of parental consent, we will take steps to remove that information from our servers.
-
7. Your Data Protection Rights under the GDPR
If you are a resident of the European Economic Area (EEA), you have certain data protection rights. We aim to take reasonable steps to allow you to correct, amend, delete or limit the use of your Personal Data. If you wish to be informed about what Personal Data we hold about you and if you want it to be removed from our systems, please contact us. In certain circumstances, you have the following data protection rights: The right to access, update or delete the information we have on you. Whenever made possible, you can access, update or request deletion of your Personal Data directly within your account settings section. If you are unable to perform these actions yourself, please contact us to assist you. The right of rectification. You have the right to have your information rectified if that information is inaccurate or incomplete. The right to object. You have the right to object to us processing your Personal Data. The right of restriction. You have the right to request that we restrict the processing of your personal information. The right to data portability. You have the right to be provided with a copy of the information we have on you in a structured, machine-readable and commonly used format. The right to withdraw consent. You also have the right to withdraw your consent at any time where we rely on your consent to process your personal information. Please note that we may ask you to verify your identity before responding to such requests. You have the right to complain to a Data Protection Authority about our collection and use of your Personal Data. For more information, please contact your local data protection authority in the European Economic Area (EEA).
-
4. Transfer of data
Your information, including Personal Data, may be transferred to and maintained on computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ from those of your jurisdiction. Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer. We will take all the steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organisation or a country unless there are adequate controls in place including the security of your data and other personal information.
-
6. Security of Data
The security of your data is important to us. In saying that, there is no method of transmission over the Internet or method of electronic storage that is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.
-
1. What data do we collect and how do we use them?
We collect several different types of information for various purposes to provide and improve our Service. 1. Types of Data Collected Personal Data While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you (“Personal Data”). Personally identifiable information may include, but is not limited to: Your email address Cookies and Usage Data Usage Data We may also collect information on how the Service is accessed and used (“Usage Data”). Usage Data may include information such as your computer’s Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, time and date of your visit, time spent on those pages, unique device identifiers and other diagnostic data. Tracking Cookies Data We use cookies and similar tracking technologies to track the activity on our Service and we hold certain information. Cookies are files with a small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Other tracking technologies such as beacons, tags and scripts are used to collect and track information to analyse and improve our Service. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some aspects of our Service. Examples of Cookies we use: Session Cookies. We use Session Cookies to operate our Service. Preference Cookies. We use Preference Cookies to remember your preferences and various settings. Security Cookies. We use Security Cookies for security purposes. Advertising Cookies. Advertising Cookies are used to serve you with advertisements that may be relevant to you and your interests. Use of Data We use the collected data for various purposes: To provide and maintain our Service To notify you about changes to our Service To allow you to participate in interactive features of our Service when you opt in To provide customer support To gather analysis or valuable insights as tot how we can improve our Service To monitor the usage of our Service To detect, prevent and address technical issues To provide you with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about, unless you have opted out of receiving such information If you consent, we may use your Personal Data to contact you with newsletters, marketing or promotional materials and other information that may be of interest to you. You may withdraw your consent to receive any, or all, of these communications from us by following the unsubscribe link or instructions provided in any email we send or by contacting us.
-
5. Disclosure of data
1. Business Transaction If we are involved in a merger, acquisition or asset sale, your Personal Data may be transferred. We will provide notice before your Personal Data is transferred and becomes subject to a different Privacy Policy. 2. Legal Requirements We may disclose your Personal Data in the good faith belief that such action is necessary to: To comply with a legal obligation To protect and defend our rights or property To prevent or investigate possible wrongdoing in connection with our Service To protect the personal safety of users of our Service and/or the general public To protect against legal liability
-
9. Links to Other Sites
Our Service may contain links to other sites that are not operated by us. If you click a third party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit. We have no control over, and assume no responsibility for the content, privacy policies or practices of any third party sites or services.
-
11. Changes to This Privacy Policy
We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page. We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the “effective date” at the top of this Privacy Policy. We recommend that you review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.
-
12. Contact Us
If you have any questions about this Privacy Policy, please contact us.
-
3. Retention of data
We will retain your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes and enforce our legal agreements and policies. We will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of our Service, or we are legally obligated to retain this data for longer periods.
-
1. Acceptance of Terms
These terms and conditions (the “Terms”) is a binding legal agreement between you and NetSys Inc. (“Mysterium Networks” or “we”) that governs your participation in the early open alpha testing program (the “Program”) of the Mysterium network (the “Network”). Your enrolment and participation in the Program and use of the Network is subject to these Terms. By participating in the Program or using the Network you are fully accepting the terms, conditions and disclaimers contained in this document and all policies and guidelines that are incorporated by reference. If you do not accept these terms and conditions you must immediately stop using the Network and withdraw from the Program. You shall not enroll into the Program or use the Network in contradiction with these Terms or any applicable law or regulation of the country or territory you originate from or reside in or any applicable jurisdiction (the “Applicable Law”). For the purposes of these Terms, the term “using the Network” means accessing, connecting to or utilizing the Network in any other way. You may not sign up for and participate in the Program (a) if you have not reached the age of majority in your territory of residence (in most cases, 18 to 21) or if you do not have the ability to form binding contracts under the Applicable law or (b) if you are not the owner of the device on which you use the Network.
-
8. Your Conduct
Monitoring and Whitelisting You must respect the net neutrality principle, i.e. except for the limited cases of whitelisting as described below, you must not filter, limit, restrict, inhibit or obstruct any lawful communication or types of communication which passes through your Node and treat all lawful data as the same regardless of its kind, source, or destination. For the sole purpose of whitelisting the exit destinations for outgoing traffic you can monitor and filter the data which passes through your Node. However, in any case you must not log and / or store any such data, including connection time stamps, used bandwidth, traffic logs, Users’ IP addresses, destinations IP addresses and other communication data, and not disclose such information to a third party. Restricted Conduct You may not use the Network in any manner that could damage, disable, overburden, or impair the servers and other resources of Network or other Nodes, or interfere with any third party’s use of the Network. You may not attempt to gain unauthorized access to any aspect of the Network or to information for which you have not been granted access. Without limiting the generality of the foregoing, you shall not use or encourage, authorize or facilitate others to use the Network for any illegal, harmful, fraudulent, infringing or offensive use, including: uploading, transmitting, streaming, accessing, displaying, receiving, or distributing any copyrighted, trademark, or patented content which you do not own or lack consent or a license from the owner; extortion, blackmail, kidnapping, rape, murder, sale/purchase of stolen credit cards, sale/purchase of stolen sale/purchase, sale/purchase of illegal sale/purchase, performance of identity theft; use of stolen credit cards, credit card fraud, wire fraud, bank fraud; hacking, pharming, phishing, or spamming of any form through our service in any form or scale; exploitation of or contribution to children exploitation photographically, digitally or in any other way; connecting to the Network any devices, software and/or hardware which does or may do any of the above; any other activities that are against the law of the country you originate from or reside in, and/or any other activities that are not compatible with the principles of democracy, freedom of speech, freedom of expression, and human rights. Your internet service provider (ISP) may set additional or stricter rules and requirements for using their services, including usage caps, speed limits, traffic management, etc. Please check your ISP terms of use and acceptable use policy for details. You agree to use the Network in full compliance with the rules and requirements of your ISP.
-
3. Your Role
The Network allows users (the “Users”) to enhance their security and increase privacy while using the internet. It is accomplished by creating virtual tunnels through one or more connections to other users of the Network (the “Nodes”) and by using their equipment and resources to route the Users to their final destinations. By enrolling into the Program or using to the Network, you agree to act as an Node operator and become a part of the Network. These Terms govern your participation in the Program as an Node. Therefore, you consent that the Users and we use your equipment, communication and other resources for the purposes of the Program.
-
4. Network and Feedback
The Network is still in its early development stage. The sole purpose of the Program is to obtain feedback on the performance of the Network and to identify its defects. You expressly acknowledge that the Network is a test product and may contain bugs, errors and other problems that could cause loss of data store in the platform, inconsistent performance and other failures including but not limited to systems crashes, interruptions and data loss. You are advised to use caution and not to rely in any way on the performance and functioning of the Network . We do not guarantee that the Network will be developed to reach any subsequent development stage (e.g. release version) or that any subsequent versions will have the same or similar functionality and characteristics to the ones that the Network have. To maintain and develop the Network we may collect limited and anonymized information and performance data.
-
9. Your Account, Password, and Security"
An ID and a private key (jointly, the “ID Data”) will be automatically created for your when use the Network for the first time. You are entirely responsible for maintaining the confidentiality of your ID Data. Furthermore, you are entirely responsible for any activities that occur under your ID Data. You agree to notify us immediately of any unauthorized use of your account or any other breach of security. We will not be liable for any loss that you may incur as a result of someone else using your ID Data, either with or without your knowledge. However, you could be held liable for losses incurred by us or another party due to someone else using your account. You may not use anyone else’s ID Data at any time, without the permission of the account holder.
-
11. Disclaimer of Warranty; Limitation of Liability
YOU EXPRESSLY AGREE THAT USE OF THE NETWORK IS AT YOUR SOLE RISK. NEITHER WE, OUR AFFILIATES NOR ANY OF THEIR RESPECTIVE EMPLOYEES, AGENTS, THIRD PARTY CONTENT PROVIDERS OR LICENSORS WARRANT THAT THE NETWORK WILL BE UNINTERRUPTED OR ERROR FREE; NOR DO THEY MAKE ANY WARRANTY AS TO THE RESULTS THAT MAY BE OBTAINED FROM USE OF THE NETWORK, OR AS TO THE ACCURACY, RELIABILITY OR CONTENT OF ANY INFORMATION, SERVICE, OR MERCHANDISE PROVIDED THROUGH THE NETWORK. THE NETWORK IS PROVIDED ON AN “AS IS” BASIS WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION OR MODIFICATION UNDER THE LAWS APPLICABLE TO THIS AGREEMENT. THIS DISCLAIMER OF LIABILITY APPLIES TO ANY DAMAGES OR INJURY CAUSED BY ANY FAILURE OF PERFORMANCE, ERROR, OMISSION, INTERRUPTION, DELETION, DEFECT, DELAY IN OPERATION OR TRANSMISSION, COMPUTER VIRUS, COMMUNICATION LINE FAILURE, THEFT OR DESTRUCTION OR UNAUTHORIZED ACCESS TO, ALTERATION OF, OR USE OF RECORD, WHETHER FOR BREACH OF CONTRACT, TORTIOUS BEHAVIOR, NEGLIGENCE, OR UNDER ANY OTHER CAUSE OF ACTION. YOU SPECIFICALLY ACKNOWLEDGE THAT WE IS NOT LIABLE FOR THE DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD-PARTIES AND THAT THE RISK OF INJURY FROM THE FOREGOING RESTS ENTIRELY WITH YOU. IN NO EVENT WILL WE, OR ANY PERSON OR ENTITY INVOLVED IN CREATING, DEVELOPING OR MAINTAINING THE NETWORK, BE LIABLE FOR ANY DAMAGES, INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES ARISING OUT OF THE USE OF OR INABILITY TO USE THE NETWORK. IN ADDITION TO THE TERMS SET FORTH ABOVE NEITHER, WE, NOR OUR AFFILIATES OR CONTENT PARTNERS SHALL BE LIABLE REGARDLESS OF THE CAUSE OR DURATION, FOR ANY ERRORS, INACCURACIES, OMISSIONS, OR OTHER DEFECTS IN, OR UNTIMELINESS OR UNAUTHENTICITY OF, THE INFORMATION CONTAINED IN THE NETWORK, OR FOR ANY DELAY OR INTERRUPTION IN THE TRANSMISSION THEREOF TO YOU, OR FOR ANY CLAIMS OR LOSSES ARISING THEREFROM OR OCCASIONED THEREBY. NONE OF THE FOREGOING PARTIES SHALL BE LIABLE FOR ANY THIRD-PARTY CLAIMS OR LOSSES OF ANY NATURE, INCLUDING, BUT NOT LIMITED TO, LOST PROFITS, PUNITIVE OR CONSEQUENTIAL DAMAGES. FORCE MAJEURE. NEITHER PARTY WILL BE RESPONSIBLE FOR ANY FAILURE OR DELAY IN PERFORMANCE DUE TO CIRCUMSTANCES BEYOND ITS REASONABLE CONTROL, INCLUDING, WITHOUT LIMITATION, ACTS OF GOD, WAR, RIOT, EMBARGOES, ACTS OF CIVIL OR MILITARY AUTHORITIES, FIRE, FLOODS, ACCIDENTS, SERVICE OUTAGES RESULTING FROM EQUIPMENT AND/OR SOFTWARE FAILURE AND/OR TELECOMMUNICATIONS FAILURES, POWER FAILURES, NETWORK FAILURES, FAILURES OF THIRD PARTY SERVICE PROVIDERS (INCLUDING PROVIDERS OF INTERNET SERVICES AND TELECOMMUNICATIONS). THE PARTY AFFECTED BY ANY SUCH EVENT SHALL NOTIFY THE OTHER PARTY WITHIN A MAXIMUM OF FIFTEEN (15) DAYS FROM ITS OCCURENCE. THE PERFORMANCE OF THIS AGREEMENT SHALL THEN BE SUSPENDED FOR AS LONG AS ANY SUCH EVENT SHALL PREVENT THE AFFECTED PARTY FROM PERFORMING ITS OBLIGATIONS UNDER THIS AGREEMENT.
-
10. Copyright Notice
Our logos are our trademarks. All rights reserved. All other trademarks appearing on the Network are the property of their respective owners.
-
12. Indemnification
You agree to defend, indemnify and hold harmless us, our affiliates and their respective directors, officers, employees and agents from and against all claims and expenses, including attorneys’ fees, arising out of the use of the Network by you or your account.
-
6. Equipment
You shall be responsible for obtaining and maintaining all necessary hardware, software and other equipment and resources needed to use of the Network and all charges related thereto. As an option, you can use Mysterium software (https://github.com/mysteriumnetwork/) to use the Network.
-
2. Changed Terms
We shall have the right at any time to change or modify the Terms or any part thereof, or to impose new conditions, including, but not limited to, adding fees and charges for use. Such changes, modifications, additions or deletions shall be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on our website, or by electronic or conventional mail, or by any other means by which you obtain notice thereof. Any use of the Network after such notice shall be deemed to constitute acceptance of such changes, modifications or additions.
-
13. Termination
You may terminate the Terms at any time by ceasing your use of the Network and closing your account with us. We may terminate these Terms at any time for any reason whatsoever, including without limitation if you breach the Terms or the Applicable Law. Upon termination we may delete your data which is under our control.
-
5. No Compensation
You will get no remuneration or compensation of any kind for the participation in the Program from us unless we have agreed otherwise in writing.
-
PRIVACY POLICY & NO-LOGS PLEDGE
Effective date: May 22, 2020 Netsys Inc. (“us”, “we”, or “our”) operates the Mysterium network (the “Network”). This privacy policy (the “Privacy Policy”) informs you of our policies regarding the collection, use and disclosure of data when you use the Network and the choices you have associated with that data. This Privacy Policy applies only if and to the extent we process the data in relation to the Network. This Privacy Policy supplements our Terms of Use /link/ (“ToU”) and is an integral part of it. If any provisions of the Privacy Policy and the ToU cannot be read in any manner other than a one that produces an irreconcilable conflict between them, the provisions of this Privacy Policy shall prevail. Unless otherwise defined in this Privacy Policy, the terms used in this Privacy Policy have the same meanings as in our ToU. A. NO-LOGS PLEDGE We will not collect any information or store any logs about your browsing activity, queries, data destinations, IP addresses or timestamps. We are based in a jurisdiction (Panama) which laws do not require us to retain any of such data. The only information we collect in connection to your use of the Network is the information listed in this Privacy Policy below. Additionally, as we provide the Network by creating virtual tunnels through one or more connections to other users of the Network (i.e. the Nodes, as defined in the ToU) and by using their equipment and resources to route you to your destination, it is not technically possible for us monitor your activities in the Network. In addition to our no-logs pledge this creates an additional layer of privacy for you. Having said this we feel that it is our obligation to inform you that the Network cannot guarantee 100% privacy. We enter into binding legal agreements with our users who run the nodes in the Network to prevent them from logging and storing the traffic which passes their nodes, but we cannot promise they will not. If the applicable law requires us to disclose your data, we will be forced to do so; however, as we collect and store just minimal data which does not allow to identify you (see below), the impact of such disclosure on your privacy will be minimal. B. ANONYMOUS DATA To use the Network you need to create a public / private key pair. Your public key will be passed to us to register you with the Network. Note, that this public key will not include any of your personal data and you cannot be identified by it. When you use the Network we may collect minimal information on how the Network is used and whether the connection was successful. However, this information is anonymous and cannot identify you and we use it to develop and maintain the Network. C. CHANGES TO THE PRIVACY POLICY We may update our Privacy Policy from time to time. Such changes, modifications, additions or deletions shall be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on our website, or by electronic or conventional mail, or by any other means by which you obtain notice thereof. Any use of the Network after such notice shall be deemed to constitute acceptance of such changes, modifications or additions. D. CONTACT US If you have any questions about this Privacy Policy, please contact us by email: support@netsys.technology
-
7. Our Role
We do not encourage, support and contribute to illegal activities and we are resolved to keep the Network operating legally and to protect you. To this end, we enter into binding agreements with the Users by which they undertake to use the Network only for legal purposes; however, we have no technical possibility to monitor and control their activities on the Network and cannot guarantee that the Users will comply. Although we strongly believe that you should not be liable for the traffic which passes through your Node, you accept, agree and fully understand that we cannot guarantee that no illegal or criminal traffic passes in or through the Network and that you will never face any legal liability. In the case you will obtain any inquiries from legal authorities about your participation in the Program or face an official investigation related to the use of your resources by the User using the Network, we are free to take a decision to provide you with any help and assistance, including legal advice, that we might find necessary or suitable in the specific situation. If you need our help or advice, please contact us immediately at team@netsys.technology
-
14. Miscellaneous
You agree to comply with all applicable export laws and restrictions and regulations and agree that you will not export, or allow the export or re-export of the Network or any part of it in violation of the Applicable Law. The Terms constitute the entire agreement of the parties with respect to the subject matter hereof, and supersede all previous written or oral agreements between the parties with respect to such subject matter. This Agreement shall be construed in accordance with the laws of the Republic of Panama, without regard to its conflict of laws rules. You agree that any legal action arising out of or relating to these Terms shall be filed exclusively in the competent courts of the Republic of Panama. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default. The headings used herein are for convenience only and shall not be given any legal import. You agree that these Terms and our rights hereunder may be assigned, in whole or in part, by us or our affiliate to any third party, at our sole discretion, including an assignment in connection with a merger, acquisition, reorganization or sale of substantially all of our assets, or otherwise, in whole or in part. You may not delegate, sublicense or assign your rights under these Terms.
-
3. Description of Network
The Network allows you to enhance your security and increase privacy while using the internet. We accomplish this by creating virtual tunnels through one or more connections to other users of the Network (the “Nodes”) and by using their equipment and resources to route you to your final destination. The Network is not designed or intended to circumvent any access control or security measures and should not be used for such purposes.
-
10. Indemnification
You agree to defend, indemnify and hold harmless us, our affiliates and their respective directors, officers, employees and agents from and against all loss, claim, damage, expense or liability (including all reasonable attorneys’ fees and other expenses reasonably incurred in investigating, preparing or defending against litigation, commenced or threatened), incurred by the aggrieved party as a result of, or arising out of, or relating to (a) any misrepresentation or breach of any representation or warranty made by you, (b) any breach of these Terms by you, (c) your violation of the Applicable Law or any rights of another, including any intellectual property rights, or (c) any cause of action, suit or claim brought or made against us and arising out of or resulting from your use of the Network.
-
4. Opne Apha Feedback
The Network is still in its early development stage. The sole purpose of the Program is to obtain feedback on the performance of the Network and to identify its defects. You expressly acknowledge that the Network is a test product and may contain bugs, errors and other problems that could cause loss of data store in the platform, inconsistent performance and other failures including but not limited to systems crashes, interruptions and data loss. You are advised to use caution and not to rely in any way on the performance and functioning of the Network. The Network is made available to you free of charge and no warranty shall be provided for the Network. We do not guarantee that the Network will be developed to reach any subsequent development stage (e.g. release version) or that any subsequent versions will have the same or similar functionality and characteristics to the ones that the Network have. To maintain and develop the Network we may collect limited and anonymized information and performance data.
-
1. Acceptance of Terms
These terms and conditions (the “Terms”) is a binding legal agreement between you and Netsys Inc. (“Mysterium Networks” or “we”) that governs your participation in the early open alpha testing program (the “Program”) of the Mysterium network (the “Network”). Your enrolment and participation in the Program and access to and use of the Network is subject to these Terms. By participating in the Program or using the Network you are fully accepting the terms, conditions and disclaimers contained in this document and all policies and guidelines that are incorporated by reference. If you do not accept these terms and conditions you must immediately stop using the Network. You shall not enroll into the Program or use the Network in contradiction with these Terms or any applicable law or regulation of the country or territory you originate from or reside in or any applicable jurisdiction (the “Applicable Law”). For the purposes of these Terms, the term “using the Network” means accessing, connecting to or utilizing the Network in any other way. You may not sign up for and participate in the Program (a) if you have not reached the age of majority in your territory of residence (in most cases, 18 to 21) or if you do not have the ability to form binding contracts under the Applicable law or (b) if you are not the owner of the device on which you use the Network.
-
5. Equipment
You shall be responsible for obtaining and maintaining all hardware, software and other equipment needed for access to and use of the Network and all charges related thereto. Should you need any licenses, equipment or software to access and/or use the resources or services which are made conditional upon prior authorization, you shall be solely responsible for obtaining and maintaining such licenses, equipment and software. As an option, you can use Mysterium software (https://github.com/mysteriumnetwork/) to use the Network.
-
2. Changed Terms
We shall have the right at any time to change or modify the Terms or any part thereof, or to impose new conditions, including, but not limited to, adding fees and charges for use. Such changes, modifications, additions or deletions shall be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on our website, or by electronic or conventional mail, or by any other means by which you obtain notice thereof. Any use of the Network after such notice shall be deemed to constitute acceptance of such changes, modifications or additions.
-
9. Disclaimer of Warranty; Limitation of Liability
YOU EXPRESSLY AGREE THAT USE OF THE NETWORK IS AT YOUR SOLE RISK. NEITHER WE, OUR AFFILIATES NOR ANY OF THEIR RESPECTIVE EMPLOYEES, AGENTS, THIRD PARTY CONTENT PROVIDERS OR LICENSORS WARRANT THAT THE NETWORK WILL BE UNINTERRUPTED OR ERROR FREE; NOR DO THEY MAKE ANY WARRANTY AS TO THE RESULTS THAT MAY BE OBTAINED FROM USE OF THE NETWORK, OR AS TO THE ACCURACY, RELIABILITY OR CONTENT OF ANY INFORMATION, SERVICE, OR MERCHANDISE PROVIDED THROUGH THE NETWORK. THE NETWORK IS PROVIDED ON AN “AS IS” BASIS WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OTHER THAN THOSE WARRANTIES WHICH ARE IMPLIED BY AND INCAPABLE OF EXCLUSION, RESTRICTION OR MODIFICATION UNDER THE LAWS APPLICABLE TO THIS AGREEMENT. THIS DISCLAIMER OF LIABILITY APPLIES TO ANY DAMAGES OR INJURY CAUSED BY ANY FAILURE OF PERFORMANCE, ERROR, OMISSION, INTERRUPTION, DELETION, DEFECT, DELAY IN OPERATION OR TRANSMISSION, COMPUTER VIRUS, COMMUNICATION LINE FAILURE, THEFT OR DESTRUCTION OR UNAUTHORIZED ACCESS TO, ALTERATION OF, OR USE OF RECORD, WHETHER FOR BREACH OF CONTRACT, TORTIOUS BEHAVIOR, NEGLIGENCE, OR UNDER ANY OTHER CAUSE OF ACTION. YOU SPECIFICALLY ACKNOWLEDGE THAT WE IS NOT LIABLE FOR THE DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD-PARTIES AND THAT THE RISK OF INJURY FROM THE FOREGOING RESTS ENTIRELY WITH YOU. IN NO EVENT WILL WE, OR ANY PERSON OR ENTITY INVOLVED IN CREATING, DEVELOPING OR MAINTAINING THE NETWORK, BE LIABLE FOR ANY DAMAGES, INCLUDING, WITHOUT LIMITATION, DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES ARISING OUT OF THE USE OF OR INABILITY TO USE THE NETWORK. IN ADDITION TO THE TERMS SET FORTH ABOVE NEITHER, WE, NOR OUR AFFILIATES OR CONTENT PARTNERS SHALL BE LIABLE REGARDLESS OF THE CAUSE OR DURATION, FOR ANY ERRORS, INACCURACIES, OMISSIONS, OR OTHER DEFECTS IN, OR UNTIMELINESS OR UNAUTHENTICITY OF, THE INFORMATION CONTAINED WITHIN THE NETWORK, OR FOR ANY DELAY OR INTERRUPTION IN THE TRANSMISSION THEREOF TO YOU, OR FOR ANY CLAIMS OR LOSSES ARISING THEREFROM OR OCCASIONED THEREBY. NONE OF THE FOREGOING PARTIES SHALL BE LIABLE FOR ANY THIRD-PARTY CLAIMS OR LOSSES OF ANY NATURE, INCLUDING, BUT NOT LIMITED TO, LOST PROFITS, PUNITIVE OR CONSEQUENTIAL DAMAGES. FORCE MAJEURE. NEITHER PARTY WILL BE RESPONSIBLE FOR ANY FAILURE OR DELAY IN PERFORMANCE DUE TO CIRCUMSTANCES BEYOND ITS REASONABLE CONTROL, INCLUDING, WITHOUT LIMITATION, ACTS OF GOD, WAR, RIOT, EMBARGOES, ACTS OF CIVIL OR MILITARY AUTHORITIES, FIRE, FLOODS, ACCIDENTS, SERVICE OUTAGES RESULTING FROM EQUIPMENT AND/OR SOFTWARE FAILURE AND/OR TELECOMMUNICATIONS FAILURES, POWER FAILURES, NETWORK FAILURES, FAILURES OF THIRD PARTY SERVICE PROVIDERS (INCLUDING PROVIDERS OF INTERNET SERVICES AND TELECOMMUNICATIONS). THE PARTY AFFECTED BY ANY SUCH EVENT SHALL NOTIFY THE OTHER PARTY WITHIN A MAXIMUM OF FIFTEEN (15) DAYS FROM ITS OCCURENCE. THE PERFORMANCE OF THS AGREEMENT SHALL THEN BE SUSPENDED FOR AS LONG AS ANY SUCH EVENT SHALL PREVENT THE AFFECTED PARTY FROM PERFORMING ITS OBLIGATIONS UNDER THIS AGREEMENT.
-
PRIVACY POLICY & NO-LOGS PLEDGE
Effective date: May 22, 2020 Netsys Inc. (“us”, “we”, or “our”) operates the Mysterium network (the “Network”). This privacy policy (the “Privacy Policy”) informs you of our policies regarding the collection, use and disclosure of data when you use the Network and the choices you have associated with that data. This Privacy Policy applies only if and to the extent we process the data in relation to the Network. This Privacy Policy supplements our Terms of Use (“ToU”) and is an integral part of it. If any provisions of the Privacy Policy and the ToU cannot be read in any manner other than a one that produces an irreconcilable conflict between them, the provisions of this Privacy Policy shall prevail. Unless otherwise defined in this Privacy Policy, the terms used in this Privacy Policy have the same meanings as in our ToU. A. NO-LOGS PLEDGE We will not collect any information or store any logs about your browsing activity, queries, data destinations, IP addresses or timestamps. We are based in a jurisdiction (Panama) which laws do not require us to retain any of such data. The only information we collect in connection to your use of the Network is the information listed in this Privacy Policy below. Additionally, as we provide the Network by creating virtual tunnels through one or more connections to other users of the Network (i.e. the Nodes, as defined in the ToU) and by using their equipment and resources to route you to your destination, it is not technically possible for us monitor your activities in the Network. In addition to our no-logs pledge this creates an additional layer of privacy for you. Having said this we feel that it is our obligation to inform you that the Network cannot guarantee 100% privacy. We enter into binding legal agreements with our users who run the nodes in the Network to prevent them from logging and storing the traffic which passes their nodes, but we cannot promise they will not. If the applicable law requires us to disclose your data, we will be forced to do so; however, as we collect and store just minimal data which does not allow to identify you (see below), the impact of such disclosure on your privacy will be minimal. B. ANONYMOUS DATA To use the Network you need to create a public / private key pair. Your public key will be passed to us to register you with the Network. Note, that this public key will not include any of your personal data and you cannot be identified by it. When you use the Network we may collect minimal information on how the Network is used and whether the connection was successful. However, this information is anonymous and cannot identify you and we use it to develop and maintain the Network. C. CHANGES TO THE PRIVACY POLICY We may update our Privacy Policy from time to time. Such changes, modifications, additions or deletions shall be effective immediately upon notice thereof, which may be given by means including, but not limited to, posting on our website, or by electronic or conventional mail, or by any other means by which you obtain notice thereof. Any use of the Network after such notice shall be deemed to constitute acceptance of such changes, modifications or additions. D. CONTACT US If you have any questions about this Privacy Policy, please contact us by email: support@netsys.technology
-
12. Miscellaneous
You agree to comply with all applicable export laws and restrictions and regulations and agree that you will not export, or allow the export or re-export of the Network or any part of it in violation of the Applicable Law. The Terms constitute the entire agreement of the parties with respect to the subject matter hereof, and supersede all previous written or oral agreements between the parties with respect to such subject matter. This Agreement shall be construed in accordance with the laws of the Republic of Panama without regard to its conflict of laws rules. You agree that any legal action arising out of or relating to these Terms shall be filed exclusively in the competent courts of the Republic of Panama. No waiver by either party of any breach or default hereunder shall be deemed to be a waiver of any preceding or subsequent breach or default. The section headings used herein are for convenience only and shall not be given any legal importance. You agree that these Terms and our rights hereunder may be assigned, in whole or in part, by us or our affiliate to any third party, at our sole discretion, including an assignment in connection with a merger, acquisition, reorganization or sale of substantially all of our assets, or otherwise, in whole or in part. You may not delegate, sublicense or assign your rights under these Terms.
-
7. Your ID and Security
An ID and a private key (jointly, the “ID Data”) will be automatically created for your when you use the Network for the first time. You are entirely responsible for maintaining the confidentiality of your ID Data. Furthermore, you are entirely responsible for any activities that occur under your ID Data. You agree to notify us immediately of any unauthorized use of your account or any other breach of security. We will not be liable for any loss that you may incur as a result of someone else using your ID Data, either with or without your knowledge. However, you could be held liable for losses incurred by us or another party due to someone else using your account. You may not use anyone else’s ID Data at any time, without the permission of the account holder.
-
8. Copyright Notice
Our logos are our trademarks. All rights reserved. All other trademarks appearing on the Network are the property of their respective owners.
-
6. Restricted Conduct
We do not encourage, support and contribute to illegal activities and we are resolved to keep the Network operating legally. You shall use the Network for any purpose that is unlawful or prohibited by these Terms or any Applicable Law. You shall not request, receive, post, upload, download, display, distribute, transmit or make available through the Network (“Communicate”) any information and material which violates or infringes in any way upon the rights of others, which is unlawful, threatening, abusive, defamatory, invasive of privacy or publicity rights, which encourages conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate the Applicable Law. You may not use or encourage or assist others to use the Network in any manner that could damage, disable, overburden, or impair the servers and other resources of Network or of the Nodes, or interfere with any third party’s use of the Network. You may not attempt to gain unauthorized access to any aspect of the Network or to information for which you have not been granted access. Without limiting the generality of the foregoing, you shall not use or to encourage, authorize or assist others to use the Network for: uploading, transmitting, streaming, accessing, receiving, or distributing any copyrighted, trademark, or patented content which you do not own or lack written consent or a license from the owner; accessing or using any resources or services (e.g. web pages, television or radio broadcastings, cable or satellite services, streaming media services, VOD services, etc.) which are made conditional upon prior authorization which you do not have; circumventing any access control, technical protection or security measures; extortion, blackmail, kidnapping, rape, murder, sale/purchase of stolen credit cards, sale/purchase of stolen sale/purchase, sale/purchase of illegal sale/purchase, performance of identity theft; use of stolen credit cards, credit card fraud, wire fraud, hacking, pharming, phishing, or spamming of any form through our service in any form or scale; exploitation of or contribution to children exploitation photographically, digitally or in any other way; assaulting in any way or form any other network or computer while using the Network; connecting to the Network any devices, software and/or hardware which does or may do any of the above; any other activities that are against the Applicable Law, and/or any other activities that are not compatible with the principles of democracy, freedom of speech, freedom of expression, and human rights.
-
11. Termination
You may terminate the Terms at any time by ceasing your use of the Network and closing your account with us. We may terminate these Terms at any time for any reason whatsoever, including without limitation if you breach the Terms or the Applicable Law. Upon termination we may delete your data which is under our control.
-
Product Owner
We are looking for a Product Owner who would be interested in facing new challenges and contributing to the revolution of giving privacy to people by owning one or more of the Mysterium Network products. Your focus will be on creating and developing innovative software solutions with the team while focusing on value created to the end users, task prioritization and delivery. Roles and responsibilities: Defining product vision based on market research, user feedback and company’s overall strategy Creating, managing and making visible the product backlog, or the prioritized list of requirements for the further product development Learning the market and users’ needs Analyzing potential integration partners needs and delivering on such integrations Understanding the product architecture & limitations Working closely with your engineering team to deliver with quick time-to-market and optimal resources Requirements: At least 2 years of experience in the Product Ownership, Project Management and / or Business Analysis Experience driving teams and management to decisions Ability to effectively break down barriers to maintain progress on initiatives Great communication skills and proven ability to work in a cross-functional team with engineers, designers, marketers and business stakeholders Demonstrate strategic thinking by using appropriate information to diagnose problems, identify possible solutions and collaborate with impacted groups to drive decisions Extra points for: Blockchain knowledge and understanding Know-how of VPN products Team lead experience What we offer: Ownership of the area, freedom to experiment, opportunity to learn new things in the ever-developing field of web 3, blockchain, and privacy Guidance from ambitious, open-minded professionals, eager to make a change in the world Benefits include flexible hours, the ability to work remotely or from the office and all of the other goodies as MYST tokens Interested? Shoot an email to mysterium-hr@mysterium.network shortly explaining why you’d be a great fit!
-
Senior Blockchain Engineer (go+payments)
We are looking for a senior blockchain developer to design, build, deploy and support our second generation of micropayments solution and tokenomics model. Perfect candidate should be with a strong mix of skills in areas like backend development, distributed systems, smart contracts and permissionless micro services. He/she also should have basic knowledge of blockchains (L1) & related scaling solutions such as sidechains/parachains, rollups, state channels. Roles and responsibilities: Maintain Mysterium micropayment system (based on state channels) and related software (such as payment hub or meta transactions service). Work on off-chain SDK for upcoming tokenimics upgrade (DeFi, DAO, staking and delegation). If needed, contribute into smart contracts and be able to extend needed logic. Extend Mysterium node software (written in golang) so it would work correctly with the updated system. If needed migrate our micropayments solution into alternative blockchains (e.g. one of Ethereum rollups, Solana, NEAR or Polkadot). Integrate various internal microservices to support the Mysterium payments system. Define requirements, prototype and design new features for product users. Effectively communicate technical details via open source documentation. Diagnose and resolve system issues in production and external customer facing environments. Requirements: 5 years of software engineering experience. At least 2 years of experience working with various blockchain related solutions. Knowledge of Solidity or other smart contracting language and related tooling. Golang or Rust development experience. Experience with EVM compatible blockchain protocols such as Ethereum, Polygon, BSC etc. Experience with non EVM smart contract platforms is a plus. What we offer: Ownership of the area, freedom to experiment, opportunity to learn new things in the ever-developing field of web 3, blockchain, and privacy Guidance from ambitious, open-minded professionals, eager to make a change in the world Benefits include flexible hours, the ability to work remotely or from the office and all of the other goodies as MYST tokens Interested? Shoot an email to mysterium-hr@mysterium.network shortly explaining why you’d be a great fit!
-
Smart Contract Developer
We are looking for a senior blockchain developer to design, build, deploy and support our second generation of micropayments solution and tokenomics model. Perfect candidate should be with a strong mix of skills in areas like smart contracts development, cryptography and DeFi. He/she also should have basics of game theory, knowledge of ethereum & related skaling solutions such as sidechains, rollups, state channels. Roles and responsibilities: Maintain Mysterium micropayment system (based on state channels) Work on smart contracts and off-chain SDK for upcoming tokenimics upgrade (DEFI, staking and delegation) Integrate various internal microservices to support the Mysterium payments system Define requirements, prototype and design new features for product users Effectively communicate technical details via open source documentation Diagnose and resolve system issues in production and external customer facing environments Requirements: At least 2 years of experience as blockchain / smart contracts engineer Deep knowledge of Solidity or other EVM compatible language and tooling Golang or Node.js development experience Experience with EVM compatible decentralized blockchain protocols such as Ethereum, Polygon, RSK etc What we offer: Ownership of the area, freedom to experiment, opportunity to learn new things in the ever-developing field of web 3, blockchain, and privacy Guidance from ambitious, open-minded professionals, eager to make a change in the world Benefits include flexible hours, the ability to work remotely or from the office and all of the other goodies as MYST tokens Interested? Shoot an email to mysterium-hr@mysterium.network shortly explaining why you’d be a great fit!
-
Senior Backend Developer
We’re looking for a dedicated, methodical, and versatile backend engineer with experience and passion for solving tough problems. We need someone who can quickly adapt to shifting approaches, situations, and priorities. You will need to be able to work in a team with fellow engineers venturing into an uncharted territory – creating a protocol capable of routing and encrypting worlds traffic via a decentralized network of nodes and accompanying technologies. Join our global team. Roles and responsibilities Work on designing and developing basic Mysterium node and related services infrastructure core components Create clean and maintainable code base Cover all functionality with unit and end to end tests Collaborate with a team in solving problems Review code and provide constructive feedback Required skills Passion for open source software projects 5+ years of practical coding experience Any strict-type languages (Golang, Rust, Java, C/C++) Impeccably clean code beautiful enough to make grown men weep Love for unit tests with big coverage Practical understanding of SSL certificates, public-key infrastructures & cryptography, plus secure design Love for modern engineering: Github contribution, SOLID principles, Modularity, design patterns, etc. Self-motivated, ambitious, flexible, self-sufficient and collaborative. Contributions to open-source projects or solve “Winter is coming”challenge https://github.com/MysteriumNetwork/winter-is-coming Extra bonus for Passion for OpenSource projects Knowledge of IP networking, Android/iOS, React.js Experience in building RESTful web services Advanced degree (M.S., Ph.D.) in a relevant field Experience or background in distributed algorithms, machine learning, artificial intelligence, complexity science What we offer Ownership of the area, freedom to experiment, opportunity to learn new things in the ever-developing field of web 3, blockchain, and privacy Guidance from ambitious, open-minded professionals, eager to make a change in the world Possibility to learn Golang Benefits include flexible hours, the ability to work remotely or from the office and all of the other goodies as MYST tokens Interested? Shoot an email to mysterium-hr@mysterium.network shortly explaining why you’d be a great fit!