Airdrop & Bounty Trends 2018

In the years of 2017 and 2018, the airdrop as the procedure of free token distribution for the couple of easy social tasks completed, become an inevitable stage of every cryptocurrencies project. Viceversa, everyone who issues the token, need to organize the airdrop.

Airdrop manager sets the two main group of tasks for the execution of which the reward in tokens is announced. First of all, there is a group of tasks directed to the promotion of the information about the product in social networks and new media. The participant of the airdrop using his social capital fills the news of friends in Facebook, Twitter, Telegram with the information about the project. Then, the organizer of the airdrop forms the database of people interested in purchasing of his token – their ETH-wallets, e-mail addresses, phone numbers, social media details etc. We have found even the project of universal gambling token asking for the national passport scanned copy and driver license (see the Point 25 of the Figure attached). After all, the organizer uses this database for the promotion of his projects but also (off the record) he can somehow sell it.

Airdrop & Bounty: where’s the difference?

Every beginner decided to get free tokens using  the social networks accounts only meets two definitions: Airdrop & Bounty. There are a lot of manuals and articles about it, but they cause confusion. Where the airdrop ends and bounty starts? What’s the difference in very nature of these processes?

Analysts of SWAP.Online see there two fundamental approaches. The first one is widespread in Russian media and analytics. Journalists from Forklog, Insider, Cryptograph usually clearly separate airdrop from the bounty. In accordance to their columns, the airdrop covers only getting tokens for the piece of personal data. All the following proceedings connected with the social tasks are treated as the bounty campaign.

Western media take this moment much easier. From Forbes to Cryptovest, they don’t separate bounty and airdrop procedures. For them, two processes at the same time mean the completing of social tasks for the project tokens demanding different level of preparation and different investments of time. The sectoral websites (Icoalert, follow the second way. So, we too.

Airdrop & Bounty: there is no easy way.

When our colleagues start writing about the airdrops, they usually show it from the purchaser’s point of view. They describe the principles of distribution, give the tips to avoid the dangers. In fact, there are only three ‘tips’: save your precious time, don’t send your money or personal data, don’t tempt yourself by the huge rewards in dubious projects. Also, you shouldn’t use your main crypto wallet for the participation in bounty and airdrops. Well, finally, don’t be upset in case of organizers failure to send you the tokens – even in good projects things can go wrong.

But really complicated is the mission of token distribution organizer. It takes really brilliant foresight and creativity to attract the public attention. Thus can be described the shortlist of the bounty organizers’ severest headaches:


  • The token distribution may go unnoticed compared to the competitors.
  • The tokens may come to the ‘dummies’ with no ideas what to do with it  
  • The tokens may come to the ‘freeloaders’ with very little social capital, so, the hype may not be reached
  • The token may be compromised by low-quality content made by butterfinger bounty-hunters
  • Operational difficulties may occur: Telegram bot may be shut down, Google Spreadsheet with the hunters’ data may come to the competitors, the participants may receive no tokens and write about it in all social media etc.

What can we do?

No ideas.  But we decided to trace the ways the prominent market players solve the problems. We analyzed a couple of dozens of Aidrop&Bounty programs marked as hottest by one of the leading sectoral website in May, 2018. Please, find the results on the first sheet of the Table attached. The main channels of information distribution are presented on the second sheet. Some basic notes can be found on the third sheet.

The Table:

Feel free to use.

Best regards,

Zakhar B and Vladislav Sopov

SWAP.Online team