Unikname Community Bounty Program

Charlène Demaret

Bounty program
Since Unikname has been in existence, we have always made it a point of honor to exchange with the community. Indeed, we believe that it is thanks to your feedback, but also to your mobilization, that the project will succeed! That’s why we have decided to launch a Community Bounty Program with UNS tokens to win.
Details about the Community Bounty Program
Presentation
The idea behind the Community Bounty Program is to make you participate actively in the development of the Unikname project but also in its whole ecosystem. Thus, you will be able to obtain UNS by participating in tasks that may concern :
- Unikname Connect (our authentication solution)
- My Unikname App (our mobile application)
- uns.network (our blockchain)
Conditions
During the entire duration of the Community Bounty Program, rewards will be distributed after validation by a member of the Unikname project. Thus, it will remain at the discretion of the project to validate or not a task, depending on the performance level of the realization.
Also, the program has no fixed duration for the moment. Nevertheless, if it changes, you will be notified.
Finally, all your tasks will have to be posted on our forum in the Community Bounty section! This will allow us to inspect them, validate them, and reward you. There is a sample topic on the forum to guide you on what to provide.
Funds’ origin
All rewards will be paid in UNS token, our native protocol token to our blockchain uns.network. These won’t come out of anywhere. Indeed, 3 delegates are dedicated to this in our blockchain protocol.
Out of the 23 delegates that make up the chain, we have 10 individual delegates, 10 organization delegates, and 3 network delegates.

These network community delegates are therefore three in number as seen in the diagram and are as follows:

UNS Labs and UNS Bounty will be dedicated to helping the developers around our project. But today, it’s UNS Support that interests us.
All UNS tokens issued and mined by network delegates (UNS Support) will be 100% allocated to rewarding the community for their help to the project. In addition, the @UNS wallet will provide token UNS Support to found the Community Bounty Program if necessary.
Community Bounty Program tasks
Now that the conditions of this program have been explained, let’s get to the heart of the matter: rewarded work!
Light feedback about one of our products — 500 UNS (or a 8+ character @unikname)
You have tried a product from our ecosystem (the mobile application, installing a node, trying to connect with your @unikname, …) and you have a comment to make on it? Whether positive or negative, we are always interested in knowing your feedback! Go on the forum, create a topic following the current model, and give your opinion in a few lines!
Complete feedback about one of our products — 5000 US (or a 6+ character @unikname)
Here we are in the same case as above: you give us feedback. However, this feedback will have to be much more extensive.
The idea is to give us constructive feedback on elements to change, modify, create, improve.
Do you find a manipulation complex, or even not ergonomic? Have you found a bug? Come and tell us!
The feedback will have to be detailed and constructive enough for our teams to reproduce the situation.
In order to be validated, this feedback must be accompanied by all the information requested in the model topic on the forum.
Short text redaction — 5000 UNS (or a 6+ character @unikname)
Do you feel like writing for our project? That’s good, we’re looking for writers!
By short text, we mean simple articles like:
- Tutorial on how to use a product
- News about Unikname
- Demonstration of one of our products
- …
This article has to be published in your name. It could be on your personal website, on Medium, or any other platform!
Long text redaction — 10 000 UNS (or a 6+ character @unikname)
Within the framework of the long texts, we expect articles of reflection and research, which are detailed and worked on.
Here are some examples:
- Long-form on our project
- Comparison with other solutions
- Study cases
- …
This article has to be published in your name. It could be on your personal website, on Medium, or any other platform!
Article translation — 1 UNS per word
Some of our articles are written in French and not in English, as the whole Unikname team is based in France.
If you wish, you can translate these contents into English. Pricing is then based on the number of words present in the original article.
Create your @unikname now!
Our main safety recommendations for teleworkers
1- Protect your wifi
It is essential to secure your wifi connection properly to avoid any intrusion on your network that could be used to attack your business. Use a sufficiently long and complex password and make sure that you are using the encryption of your WPA2 connection. Also remember to update your Internet router regularly by restarting it or via its administration interface.
According to the actual standard of security, the cryptographic mechanisms impose a password to be a minimum key size of 100 bits to be secure (for example : a minimum of 16 characters in a 90 symbols symbols set). The number of bits define the “strength” of a password. Have a look at :
Especially when it comes to communications and sharing files and documents. Don’t send company information across personal email or social network accounts — no matter how tempting that might be. This could generate security faults and could be detrimental to your business. Strengthen the security of your passwords: Use sufficiently long, complex and different passwords on all the equipment and services you access, whether personal or professional. The majority of attacks are caused by overly simple or reused passwords. For prevention, change them and activate double authentication whenever possible.2- Keep work and home separate
3- Secure your password
Even better that having to secure your passwords is using a passwordless solution or a strong authentication and decentralized solution like Unikname Connect.
4- Don’t open suspicious content
Be more vigilant about scam messages and emails, do not click on suspicious attachments or links.
As listed above, you could be exposed to an attempt of phishing, to a virus hidden in the attachment or any other inventive scam. If you are suspicious follow up with a phone call or a message sent via other means. Simultaneously, avoid COVID-19 hoax messages. Lots of messages about the spread of Covid-19 are being used to spread malware.
“The most effective phishing attacks play on emotions and concerns, and that coupled with the thirst for urgent information around coronavirus makes these messages hard to resist” says Luke Vile, a cybersecurity expert at PA Consulting.
5- Secure and save your devices when you finish work
Backup is the only way to find your data in the event of cyberattacks, but also in case of system failure or data loss. If you have the possibility to do so, regularly save your work on the company network, but also somewhere external to your equipment (USB key or external disk). Don’t forget to disconnect and unplug your external device from your machine once the backup is done.
6- Make sure that you regularly update your antivirus software
Check that all your connected equipment (PC, phones, tablets, etc.) is safely protected with an antivirus that is up to date. Also it’s best if you regularly perform a complete analysis (scan) of your equipment.
7- Don’t do anything at home that you won’t do at work
Especially on your professional equipment. Have responsible and vigilant use of your professional equipment and professional access. If you use your personal devices when working remotely, be aware that your personal activities can somehow be risky for your business, therefore be focus and cautious.
8- Our extra tip : Banish social authentication
You should avoid as much as possible using social login solutions especially when authenticating on your professional platforms. For multiple reasons that you probably already know : Lack of privacy, professional and economic spying, lack of resilience (what if your social account get suspended?), lack of security (how many times web giants has been hacked?) etc.
The ideal alternative to social login is Unikname Connect. Our decentralized and strong authentication solution answers to the issue of credential theft, phishing hacks and is also respectful to user’s privacy since it doesn’t store any data. Learn more at unikname.com
While this doesn’t wrap the full list of security concerns to keep in mind in situations like these, the primary security tips stated above should help you remote working in the best way and be safe at home.
Product Development Update – The 13th Edition
Every month we share with community a short summary of what happened during the last four weeks in Unikname and uns.network ecosystems.
E-commerce: Is converting more users by choosing your authentication possible?
Today more and more businesses, entrepreneurs and even SaaS solutions are choosing the internet to develop their business. To stand out, a lot of energy is spent on creating an original graphical...
Unikname Connect, the European alternative to social sign-in solutions
Many of us have gotten used to connecting to our favorite websites with a single click. The buttons offered by the web giants are very convenient for this. Even though most of us are aware that...
Open Data and the Unikname Blockchain to fight the COVID-19 pandemic and others like it
Individual tracking as advocated by the StopCovid app cannot work in France and the outcry against this application shows the limits of this approach. We want to promote an Open Data type approach,...
Unikname’s blockchain LIVENET is on the go!
A great milestone has been reached. 4th of May 2020 the Unikname’s blockchain, uns.network, is up and running with its 23 delegates. The LIVENET network becomes live after more than 6 months of...
Unikname C.A.R.E™, a protocol for a successful end to the coronavirus lockdown
As France prepares to lift coronavirus lockdown measures, the conditions of this re-opening still raise questions. States have to protect their population from contagion, but also ensure personal...
7 tips to avoid spear phishing attacks for Remote workers
As you know, the crisis and containment situation due to the COVID-19 epidemic has led to an intensification of remote working. Internet privacy and safety are still our priority so we wanted to...
UNS Core 5.0 on SANDBOX Network
On March 24, 2020, the new version 5.0 of UNS Core is released! This version is a major update for the community since it introduces the token economy of the uns.network blockchain! On this post we...
How phishing works and how to prevent it?
It’s official : Cybercrime profits reached 3.5 billions dollars in 2019 with phishing in the top scams, according to the service’s internet crime complaint centre. 2019 was, by far, the worst year...
Unikname Connect is about Privacy and Confidentiality
The recent data breaches from web giants only contributed to the overall decline of consumer trust. For 86%, data protection is a priority when choosing online services (Dark Reading). Have...