Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to spot a fake ICO (in pictures)

8 of 9 NEXT PREV
  • What is an ICO?

    What is an ICO?

    An Initial Coin Offering (ICO), in simple terms, is a way for blockchain-related startups to raise funds. Akin to crowdfunding, the projects generally offer their own brand of 'tokens' in exchange for popular cryptocurrencies such as Bitcoin (BTC) or Ethereum (ETH).

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • ICO, or IPO?

    ICO, or IPO?

    The differences between an ICO and a traditional Initial Public Offering (IPO), in which company shares can be purchased in a traditional manner, are not only related to the purchase of tokens instead of shares.

    IPOs worldwide are protected by financial authorities which ensure conditions and particular standards are met, however, ICOs are not protected by the same rules, which may place investor funds at risk with no hope of recovery when they are scams.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • Why would you invest in an ICO?

    Why would you invest in an ICO?

    Like many angel investments in startups, it is a risk which may later offer good returns. Many ICO tokens promise high returns, which leads many to invest in the blockchain space.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • What a beautiful website

    What a beautiful website

    If an ICO website looks professional, this may indicate a scam. Fraudsters will often spend a small fortune on a spotless website and marketing materials but this money is spent purely to promote trust in potential victims.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • Too high a return?

    Too high a return?

    A return on investment (ROI) which seems too good to be true often is. In the case of Bitconnect, in which investors were offered a 120 percent return on their investment annually, the company performed an exit scam and rendered its tokens useless, leaving investors heavily out of pocket.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • What does the project actually do?

    What does the project actually do?

    Blockchain-related startups appear, offer an ICO, and investors bite -- all without offering one whit of evidence to back up their claims.

    If you cannot find project timelines, legitimate whitepapers, patents, or evidence to back up projects, steer clear or risk losing your funds.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • Fluff and buzzwords

    Fluff and buzzwords

    If company websites, whitepapers, and project descriptions are full of fluff, buzzwords, and lack real substance, this is a clear warning sign that all may not be as it seems.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • Who is running the ICO, anyway?

    Who is running the ICO, anyway?

    Research who is running the project to avoid failing for a fake ICO. A quick search can sometimes reveal who actually has experience in the field and who does not.

    There are many ICOs out there which are legitimate and have been launched by people who truly believe in their projects.

    Those that do will have legitimate social media accounts and email addresses -- and will be available to answer questions relating to their ICOs and blockchain development.

    Some scam artists, however, may go so far as to create fake social media accounts to back up their claims, so take nothing at face value.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

  • Show me the code and the escrow

    Show me the code and the escrow

    If the blockchain startup has no links to samples or code uploaded to repositories such as GitHub, this may be an indicator that there is no blockchain development to start with.

    Suspicious ICOs will also ask investors to send their funds to a personal cryptocurrency wallet rather than a legitimate escrow service, and both practices may indicate a fraudulent token sale.

    Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

    Caption by: Charlie Osborne

8 of 9 NEXT PREV
  • What is an ICO?
  • ICO, or IPO?
  • Why would you invest in an ICO?
  • What a beautiful website
  • Too high a return?
  • What does the project actually do?
  • Fluff and buzzwords
  • Who is running the ICO, anyway?
  • Show me the code and the escrow

Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fraudulent and what is legitimate?

Read More Read Less

Who is running the ICO, anyway?

Research who is running the project to avoid failing for a fake ICO. A quick search can sometimes reveal who actually has experience in the field and who does not.

There are many ICOs out there which are legitimate and have been launched by people who truly believe in their projects.

Those that do will have legitimate social media accounts and email addresses -- and will be available to answer questions relating to their ICOs and blockchain development.

Some scam artists, however, may go so far as to create fake social media accounts to back up their claims, so take nothing at face value.

Published: September 10, 2018 -- 10:44 GMT (03:44 PDT)

Caption by: Charlie Osborne

8 of 9 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • How to protect your Google Account with the Advanced Protection Program

    If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, ...

  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums