top of page

Mako Inu

White Paper v 1.0

Find out More about Mako Inu

Introduction

Welcome to MAKO, a community utility token project on the LoopNetwork blockchain. Utility tokens provide access to services rather than a specific investment in an asset or company as do equity tokens. A community utility token means that the MAKO community decides what utilities are added to the MAKO environment. This will be accomplished through the tokens Telegram portal at https://t.me/makoinu. Ideas for utilities are pitched here and voted on by the community of MAKO holders. Your voting weight is defined by the amount of MAKO held.

Tokenomics

 

 

Contract 0x0260f0bf5362bc5b1a14a5605df1cff6ca4fe72b

Burn Wallet 0x000000000000000000000000000000000000dEaD

Sphynx LPs 0xba8AcEe49eA398b813CEd49A547c70077956934B

 

 

Max Supply 79,000,000,000

Full Supply in circulation

5% burnt

0% tax

Utilities

 

MAKO Security

The core utility of MAKO is a fee based mid-level security review of token contracts on the LoopNetwork blockchain (LRC). A mid-level security review is much more than the typical token sniffer that looks for honeypots or scam tokens.

 

The Evolution of Token Security

Digital currency has come a long way over the last 15 years. So has the number of scam coins and hacked projects. Scammers and Hackers have walked away with many millions of dollars from Web3 platforms and DeFi projects. The ability of the investor and developer to assess token security before investment or deployment is critical to keeping resources safe. MAKO provides the tools you need to make an informed investment or continue with development with confidence.

 

Mid-level security review for every investor

Mako Security Scanning is an algometric review. The Security algorithm will scan the contract for common vulnerabilities that are often overlooked / missed by developers by analyzing the bytecode of a contract. Items such as Reentrancy attacks, integer overflow, owner overwrite to loop withdrawal etc… can be identified. These are critical items that must adhere to industry security standards for your assets to be safe. Once completed, a numerical score is provided with the details about any specific vulnerability discovered. This automated algometric approach to smart contract review is a fast and cost effective process that provides significant insight to a contracts logic and its ability to function as intended. This utility is intended to be used by individual investors and projects throughout their various stages of development. The vulnerability Algorithm is continuously updated as new attack methodologies are developed by hackers.

How To Buy MAKO

 

1. Add Loop Chain to MetaMask

To get started, you’ll need to add Loop Chain to your Metamask Wallet.

Network Name: Loop Network

RPC-URL: https://api.mainnetloop.com/

Chain-ID: 15551

Symbol: LOOP

Blockexplorer-URL: https://explorer.mainnetloop.com/

 

2. Bridge your LOOP from BEP20 to native LOOP (LRC20)

For this step, you’ll need to already own LOOP (BEP20) tokens. If you don’t own any LOOP, you’ll need to get some using pancakeswap.

To use Loop Chain, you need to first bridge your assets onto Loop Chain from BSC Mainnet.

  • Open the bridge URL at https://thesphynx.co/bridge/56

  • Connect your wallet to Sphynx (Binance Smart Chain)

  • Choose the amount of LOOP (BEP20) you want to bridge

Make sure you have extra BNB to cover bridge fees.

 

3. Buy MAKO on SphynxSwap

You’re almost there! Now that your LoopChain wallet is funded and ready to go, its time to buy your MAKO.

Glossary

 

  1. 51% Attack: A situation where more than half of the computer power running a blockchain is controlled by one person or group with malicious intent. This majority power allows manipulation of transactions, such as preventing new transactions from being included in the blockchain and facilitating double-spending.

  2. Abstract: A summary of a larger written document, often found at the beginning of cryptocurrency whitepapers and technical documents. Abstracts provide a brief overview of the entire document.

  3. Anti-Money Laundering (AML): A set of laws designed to prevent the conversion of illegally earned money into what appears to be legally earned money. AML regulations aim to make it difficult for criminals to launder their money.

  4. Airdrop: The process of freely distributing a new cryptocurrency to individuals, aiming to create more demand. Airdrops are a strategy to attract users and generate interest in a new coin.

  5. Algorithm: A series of steps used to solve a problem. In cryptocurrencies, algorithms are employed to hide and reveal information securely.

  6. Atomic Swap: A mechanism enabling the direct exchange of one cryptocurrency for another without the need for a trusted third party, such as an exchange.

  7. Block Height: The number of blocks in the chain between any given block and the very first block in the blockchain.

  8. Block Reward: A reward given to those maintaining the blockchain. This involves contributing computer power and electricity or risking a significant amount of cryptocurrency as a guarantee of trustworthiness.

  9. Crypto: Short for cryptography or cryptocurrency. Derived from the Greek word meaning "hidden."

  10. Cold Storage: A type of digital data storage that is not readily accessible and often disconnected from the internet, known as a "cold wallet."

  11. Confirmation: Proof that a transaction was recorded and verified on the blockchain. A higher number of confirmations increases the trustworthiness of a transaction.

  12. Decentralized: A system where elements are spread out, decisions are made from many points, and independence is preserved across the network. It involves decentralized structure, management, and independence.

  13. Decentralized Application (dApp): A software application with its technology running publicly on a network of computers.

  14. Digital Currency: Currency available in digital form, exhibiting properties similar to physical currencies but allowing for instantaneous transactions and borderless transfer-of-ownership. Examples include virtual currencies, cryptocurrencies, and central bank digital currencies.

  15. Digital Signature: A mathematical scheme for verifying the authenticity of digital messages or documents, providing strong reasons to believe in the message's sender and integrity.

  16. Distributed Ledger: A system of independent computers simultaneously recording data, with identical copies of the recording kept by each computer.

  17. Double-Spending: A form of deceit involving the promise of the same digital money to two parties but delivering it to only one. Successful double-spending means one of the two recipients will not be paid.

  18. ERC-20: A proposed set of rules and standards for creating new cryptocurrencies using Ethereum as the foundation. Describes crypto made with Ethereum technology following these rules and standards.

  19. Exchanges: Platforms allowing customers to trade cryptocurrencies for other assets, such as fiat money or different digital currencies.

  20. Futures: A legal agreement to buy or sell a particular commodity or asset at a predetermined price and time in the future. Standardized for quality and quantity to facilitate trading on futures exchanges.

  21. Gas Price: The cost associated with executing operations or transactions on a blockchain network. It represents the fee users are willing to pay for the computational resources required to perform tasks like transactions or smart contract executions. A higher gas price generally prioritizes faster processing, and it serves as an incentive for network participants, such as miners, to include these operations in the blockchain.

  22. Genesis Block: The first block in a blockchain, marking the beginning of the digital ledger.

  23. Hard Fork: A permanent change to the technology used by a cryptocurrency.

  24. Hash Rate: The speed at which a computer can turn any set of information into a hash, measured in hashes per second (h/s). Also, the combined hash speed of all computers in the network.

  25. Initial Coin Offering (ICO): A time-sensitive process when a new cryptocurrency or token becomes available for public investment.

  26. Know Your Customer (KYC): A customer identification process required by law for financial organizations.

  27. Mining: The validation of transactions in cryptocurrency networks, with successful miners earning new cryptocurrency as a reward.

  28. Node: Any computing device participating in a network by receiving and sending data. Nodes support cryptocurrencies by keeping a digital record known as a blockchain.

  29. Peer to Peer (P2P): A direct connection between two or more computers allowing them to share information, files, or other data.

  30. Private Key: A string of letters and numbers known only by the owner, enabling them to spend their cryptocurrency securely.

  31. Proof of Work (PoW): A process for achieving consensus and building on a blockchain. Users compete to solve a puzzle using their computers.

  32. Proof of Stake (PoS): A process for achieving consensus and building on a blockchain, where users put up a collateral of tokens (a "stake") for a more energy and cost-efficient solution.

  33. Pump and Dump: An illegal manipulation of an asset's price, where individuals inflate the price (pump) to sell it at high prices for a profit (dump).

  34. Satoshi Nakamoto: The founder and creator of Bitcoin, the most popular cryptocurrency. The smallest amount of bitcoin (0.00000001) is also named after him, known as a Satoshi.

  35. Smart Contract: An agreement to exchange goods, services, or money that automatically executes without third-party oversight when established criteria are met.

  36. Timestamp: A proof-of-work scheme used in cryptocurrencies to validate transactions and prove their validity on the blockchain.

  37. Transaction Fee (TX Fee): Fees for cryptocurrency transactions depending on network capacity and user preferences. Users can choose a specific transaction fee for faster processing.

  38. Wallet: A storage system for cryptocurrency public and private keys, allowing users to receive or spend cryptocurrency securely.

bottom of page