\4. Security weaknesses Hackers or other malicious groups or organizations may attempt to interfere with BOP or the Boring protocol in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Sybil attacks, smurfing, and spoofing. Furthermore, there is a risk that a third party or a member of the Company, the Distributor, or their respective affiliates may intentionally or unintentionally introduce weaknesses into the core infrastructure of BOP or the Boring protocol, which could negatively affect BOP or the Boring protocol. The future of cryptography and security innovations are highly unpredictable, and advances in cryptography, or technical advances (including without limitation development of quantum computing), could present unknown risks to BOP or the Boring protocol by rendering ineffective the cryptographic consensus mechanism that underpins that blockchain protocol.