Step-by-step guide with screenshots "How to buy tokens with cryptocurrency?"

1. Sign up at (with same email as at

2. Go to wallets. Select Memority Token wallet. Memority Token

3. Select “Buy with cryptocurrency” tab.

4. Choose cryptocurrency you want to use for the purchase. Accepted currencies are Bitcoin, Litecoin, BitcoinCash. You can make the payment with wallet or your personal wallet.

5. Choose the amount you want to spend on tokens and in a few seconds you will get the final payment amount with all fees.

6. If you’ve chosen wallet press the “Pay” button and confirm the purchase with your password.

7. If you’ve chosen to use your personal wallet, you will get a QR-code with a wallet address to which you need to send the required amount of coins. Be sure not to send less than enough to purchase 5,000 EMT tokens or more than equivalent to 9,999 USD.

8. EMT tokens will be credited your wallet within 24 hours.

Memority is the platform for a completely decentralized, ultra-secure storage of valuable data on the blockchain, which ensures the continued availability of several encrypted copies of data on unrelated storage locations around the world.

Automated Investing icon
The data is encrypted with your private key

No one except the owner can physically view the contents of the files, because they are encrypted with a private key, which is stored only by the data owner

Data is protected from accidental deletion

The system always stores multiple copies of data (default is 10), the monitoring system will periodically check their availability and creates new copies in other stores in case of insufficient number of duplicates

Automated Investing icon
Data is protected from forgery

Unique data identifiers are stored in the blockchain database, the system regularly searches for fakes and restores the correct number of copies with genuine data if files have been forged

Automated Investing icon
The system is completely self-contained and independent

Data storage, the process of files copies monitoring and recovering, data encryption and validation for authenticity are completely decentralized, there is no dependence on any centralized systems

Have questions?