You cannot sell Pi Network coins (Pi) on external exchanges. The Pi Network is currently in the Enclosed Network phase of its Mainnet, which restricts the connectivity between the Pi blockchain and other blockchains or crypto exchanges.
The SW Token operates on the Ice Open Network (ION) blockchain, ensuring secure, transparent, and seamless transactions within the Sunwaves ecosystem.
The Enclosed Network phase allows time for:Millions of Pioneers to complete their KYC verification. The development and deployment of more Pi Apps, creating more utility for Pi. Transitioning Pi Apps from Testnet to Mainnet. Iterating on modifications and adjustments to the Mainnet and ...Read more
SW Token holders can access exclusive areas, receive special discounts, and enjoy unique festival offerings. The token also supports community engagement and sustainable practices.
During the Enclosed Network phase, you can:Use Pi to purchase goods and services through Pi Apps within the Pi ecosystem. Transfer Pi to other Pioneers (users of the Pi Network). Lock up Pi for a higher mining rate. Participate in transactions and activities ...Read more
The SW Token aims to create a seamless, transparent, and dynamic festival ecosystem that transforms attendee interactions and fosters a deeper sense of community and loyalty.
The Open Network phase, which will allow external connectivity and trading on crypto exchanges, is expected to begin after the Enclosed Network phase. The transition date to the Open Network phase is dependent on the maturity of the ecosystem and ...Read more
Yes, Pioneers can earn Pi through various activities within Pi Apps, such as participating in app-based services, completing tasks, or engaging in transactions. Each app may have different mechanisms for rewarding users with Pi.
The Sunwaves Token (SW) is a blockchain-based token designed to enhance the festival experience by providing exclusive benefits and engaging the community.
The Pi Apps Platform employs several security measures, including: Running apps in a sandboxed environment to prevent malicious activities. Implementing stringent review processes for apps before they go live. Regularly updating security protocols to protect user data and transactions.