Difference between revisions of "Third-party security audits"
From Internet Computer Wiki
Diego.prats (talk | contribs) |
Diego.prats (talk | contribs) |
||
Line 9: | Line 9: | ||
2. [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits] on March 11, 2022 | 2. [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits] on March 11, 2022 | ||
− | 3. [https://forum.dfinity.org/t/threshold-ecdsa-cryptography-review-by-ncc-group-third-party-security-audit-3/13853 IC "Threshold ECDSA Cryptography Review" by NCC Group] | + | 3. [https://forum.dfinity.org/t/threshold-ecdsa-cryptography-review-by-ncc-group-third-party-security-audit-3/13853 IC "Threshold ECDSA Cryptography Review" by NCC Group] on June 16, 2022 |
Revision as of 22:56, 21 June 2022
Goal
In order to increase the security of the IC, the DFINITY foundation has on-going third-party audits of the IC.
Previous audits
1. "IC Assesment" by Trail of Bits
2. "Internet Computer Consensus: Security Assessment" by Trail of Bits on March 11, 2022
3. IC "Threshold ECDSA Cryptography Review" by NCC Group on June 16, 2022