This left only one thing to do: reverse engineer his bank’s security token and build a hardware device to replicate the app’s functionality. After downloading the bank’s app off his phone ...
Users must first get an offer from another user before they can start mining the Pi token on their phone. After that, they are given an invite code that they can use to invite others. More tokens ...