Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Secured no. 1

Earlier this year, we launched a bug bounty program focused on finding issues in the beacon chain specification, and/or in client implementations (Lighthouse, Nimbus, Teku, Prysm etc…). The results (and…

Read More »

Recent Twitter Hack Proves the Vulnerability of Centralized Platforms

As the community was astounded by the bold hack of prominent Twitter accounts, it revealed the general vulnerability of centralised social media, where all information is kept at one place….

Read More »