BugBlow (@bugblow) 's Twitter Profile
BugBlow

@bugblow

Protecting DeFi and Web3 with indispensable cybersecurity skills.

Conducting security audits.

ID: 1813407468459864064

linkhttps://bugblow.com calendar_today17-07-2024 02:56:51

56 Tweet

158 Followers

76 Following

Aqua Protocol - CDP on TON (@aquaprotocolxyz) 's Twitter Profile Photo

Aqua Protocol completes second security audit! 🚀 Aqua Protocol has successfully passed another security audit, this time conducted by BugBlow. certificate: bugblow.com/ru/aquaprotocol full report: github.com/BugBlow/audits…

BugBlow (@bugblow) 's Twitter Profile Photo

A security mindset, or "thinking like an attacker," boils down to 2 key questions: 1. What is the easiest way to gain access (low-hanging fruits)? 2. What are the implicit assumptions built into the system that aren't always true? #security #web3

BugBlow (@bugblow) 's Twitter Profile Photo

It's impossible to do any security if you can't answer these questions: 1) What assets are you trying to protect? 2) Who are you trying to defend against 3) What will you trade for improved security?

Alex (@al3xdolgavin) 's Twitter Profile Photo

Software has bugs. Some bugs are weaknesses. Some weaknesses are vulnerabilities. Some vulnerabilities can be exploited. Someone has an interest in exploiting them.

BugBlow (@bugblow) 's Twitter Profile Photo

The best explanation of Confidentiality, Integrity and Availability (CIA) triad: 1. Confidentiality - information can’t be read by a 3rd party. 2. Integrity - information can’t be unknowingly modified by a 3rd party. 3. Availability - information is accessible at all times.

Alex (@al3xdolgavin) 's Twitter Profile Photo

‼️Attention developers. New DeFi scam. Hackers ask you to help with their software for money - do not let them trick you. The software contains obfuscated malware - stealer that grabs all your credentials, installs a backdoor and records all your keystrokes.🧵

BugBlow (@bugblow) 's Twitter Profile Photo

3 things you need to know well if you’re working with blockchain. - asymmetric & symmetric cryptography - decentralized storage - basic networking If you do, everything else will be easy to understand.