Blockchain Characteristics


At the time of drafting this whitepaper, the Ethereum blockchain relies on proof of work to determine block production timing, which means block production can occur at random times.

For instance, ETH contributed to the token distribution contract in the final seconds of a distribution period may not be included for that period. The buyer acknowledges and understands that the Ethereum blockchain may not include the buyer's transaction when expected, and the buyer may not receive tokens on the same day the buyer sends ETH.

The Ethereum blockchain is susceptible to periodic congestion, during which transactions can be delayed or lost. Individuals may also intentionally spam the Ethereum network to gain an advantage in purchasing cryptographic tokens. The buyer acknowledges and understands that Ethereum block producers may not include the buyer's transaction as desired or at all.

Tokens may be subject to expropriation and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the token distribution contract or the token in various ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Sybil attacks, smurfing, and spoofing.

Furthermore, since the Ethereum platform relies on open-source software and tokens are based on open-source software, there is a risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses, which may negatively affect the tokens or result in the loss of the buyer's tokens, the loss of the buyer's ability to access or control their tokens, or the loss of ETH in the buyer's account. In the event of such software bugs or weaknesses, there may be no remedy, and token holders are not guaranteed any remedy, refund, or compensation.

Although DEVITA and the blockchain are operational at the time of the ICO, they may not function as intended, and any tokens may not have functionality that is desirable or valuable.


DEVITA tokens are utility tokens. By design, there is no proximity to financial instruments, and no financial instrument is provided to token holders in return. The token is used solely within the blockchain, as described in the respective section of this whitepaper. Further use cases, such as charging stations and other additions, will include elements that will not turn the token into a security.


In consideration of anti-money laundering and anti-terrorism national and international regulations, DEVITA reserves the right to develop and apply KYC rules and procedures before the sale of tokens, before trading such tokens, and before or during the execution of any transactions. Likewise, depending on the findings of such rules and procedures or when there exists reasonable doubt that a certain participant/interested party is involved in money laundering or terrorism, DEVITA reserves the right to refuse a transaction, trade, or sale of tokens to any third party and has the right to refuse or suspend access to its platform at any given moment. DEVITA's KYC service provider uses machine learning technology to identify trustworthy clients by cross-referencing them against international credit and watchlist databases.

Last updated