We began this chapter by making a clear distinction between a token and a coin. Then, we discussed how to use the Truffle framework to develop ERC20-compliant tokens. We then explored the concept of arbitrage trading of cryptocurrencies and how to distinguish legitimate ICOs from scams and Ponzi schemes.
We spoke about the Crypterium ICO and how it can revolutionize C2C and F2C exchange. We concluded the chapter by analyzing yet another parity hack, which froze multimillion dollar ethers forever in a suicidal smart contract library.
In Chapter 9, Enterprise Use Cases, we will look into some enterprise usecases of Ethereum smart contracts.