Unikname Community Bounty Program

10 June 2020 | Authentification, Cybersecurity, News

Charlène Demaret


Bounty program

Since Unikname has been in existence, we have always made it a point of honor to exchange with the community. Indeed, we believe that it is thanks to your feedback, but also to your mobilization, that the project will succeed! That’s why we have decided to launch a Community Bounty Program with UNS tokens to win.

Details about the Community Bounty Program


The idea behind the Community Bounty Program is to make you participate actively in the development of the Unikname project but also in its whole ecosystem. Thus, you will be able to obtain UNS by participating in tasks that may concern :


During the entire duration of the Community Bounty Program, rewards will be distributed after validation by a member of the Unikname project. Thus, it will remain at the discretion of the project to validate or not a task, depending on the performance level of the realization.

Also, the program has no fixed duration for the moment. Nevertheless, if it changes, you will be notified.

Finally, all your tasks will have to be posted on our forum in the Community Bounty section! This will allow us to inspect them, validate them, and reward you. There is a sample topic on the forum to guide you on what to provide.

Funds’ origin

All rewards will be paid in UNS token, our native protocol token to our blockchain uns.network. These won’t come out of anywhere. Indeed, 3 delegates are dedicated to this in our blockchain protocol.

Out of the 23 delegates that make up the chain, we have 10 individual delegates, 10 organization delegates, and 3 network delegates.

These network community delegates are therefore three in number as seen in the diagram and are as follows:

UNS Labs and UNS Bounty will be dedicated to helping the developers around our project. But today, it’s UNS Support that interests us.

All UNS tokens issued and mined by network delegates (UNS Support) will be 100% allocated to rewarding the community for their help to the project. In addition, the @UNS wallet will provide token UNS Support to found the Community Bounty Program if necessary.

Community Bounty Program tasks

Now that the conditions of this program have been explained, let’s get to the heart of the matter: rewarded work!

Light feedback about one of our products — 500 UNS (or a 8+ character @unikname)

You have tried a product from our ecosystem (the mobile application, installing a node, trying to connect with your @unikname, …) and you have a comment to make on it? Whether positive or negative, we are always interested in knowing your feedback! Go on the forum, create a topic following the current model, and give your opinion in a few lines!

Complete feedback about one of our products — 5000 US (or a 6+ character @unikname)

Here we are in the same case as above: you give us feedback. However, this feedback will have to be much more extensive.

The idea is to give us constructive feedback on elements to change, modify, create, improve.

Do you find a manipulation complex, or even not ergonomic? Have you found a bug? Come and tell us!

The feedback will have to be detailed and constructive enough for our teams to reproduce the situation.

In order to be validated, this feedback must be accompanied by all the information requested in the model topic on the forum.

Short text redaction — 5000 UNS (or a 6+ character @unikname)

Do you feel like writing for our project? That’s good, we’re looking for writers!

By short text, we mean simple articles like:

  • Tutorial on how to use a product
  • News about Unikname
  • Demonstration of one of our products

This article has to be published in your name. It could be on your personal website, on Medium, or any other platform!

Long text redaction — 10 000 UNS (or a 6+ character @unikname)

Within the framework of the long texts, we expect articles of reflection and research, which are detailed and worked on.

Here are some examples:

  • Long-form on our project
  • Comparison with other solutions
  • Study cases

This article has to be published in your name. It could be on your personal website, on Medium, or any other platform!

Article translation — 1 UNS per word

Some of our articles are written in French and not in English, as the whole Unikname team is based in France.

If you wish, you can translate these contents into English. Pricing is then based on the number of words present in the original article.

Create your @unikname now!

Our main safety recommendations for teleworkers

1- Protect your wifi

It is essential to secure your wifi connection properly to avoid any intrusion on your network that could be used to attack your business. Use a sufficiently long and complex password and make sure that you are using the encryption of your WPA2 connection. Also remember to update your Internet router regularly by restarting it or via its administration interface.

According to the actual standard of security, the cryptographic mechanisms impose a password to be a minimum key size of 100 bits to be secure (for example : a minimum of 16 characters in a 90 symbols symbols set). The number of bits define the “strength” of a password. Have a look at :

4- Don’t open suspicious content

Be more vigilant about scam messages and emails, do not click on suspicious attachments or links.
As listed above, you could be exposed to an attempt of phishing, to a virus hidden in the attachment or any other inventive scam. If you are suspicious follow up with a phone call or a message sent via other means. Simultaneously, avoid COVID-19 hoax messages. Lots of messages about the spread of Covid-19 are being used to spread malware.

“The most effective phishing attacks play on emotions and concerns, and that coupled with the thirst for urgent information around coronavirus makes these messages hard to resist” says Luke Vile, a cybersecurity expert at PA Consulting.

5- Secure and save your devices when you finish work

Backup is the only way to find your data in the event of cyberattacks, but also in case of system failure or data loss. If you have the possibility to do so, regularly save your work on the company network, but also somewhere external to your equipment (USB key or external disk). Don’t forget to disconnect and unplug your external device from your machine once the backup is done.

6- Make sure that you regularly update your antivirus software

Check that all your connected equipment (PC, phones, tablets, etc.) is safely protected with an antivirus that is up to date. Also it’s best if you regularly perform a complete analysis (scan) of your equipment.

7- Don’t do anything at home that you won’t do at work

Especially on your professional equipment. Have responsible and vigilant use of your professional equipment and professional access. If you use your personal devices when working remotely, be aware that your personal activities can somehow be risky for your business, therefore be focus and cautious.

8- Our extra tip : Banish social authentication

You should avoid as much as possible using social login solutions especially when authenticating on your professional platforms. For multiple reasons that you probably already know : Lack of privacy, professional and economic spying, lack of resilience (what if your social account get suspended?), lack of security (how many times web giants has been hacked?) etc.

The ideal alternative to social login is Unikname Connect. Our decentralized and strong authentication solution answers to the issue of credential theft, phishing hacks and is also respectful to user’s privacy since it doesn’t store any data. Learn more at unikname.com

While this doesn’t wrap the full list of security concerns to keep in mind in situations like these, the primary security tips stated above should help you remote working in the best way and be safe at home.