|
|
| (18 intermediate revisions by 3 users not shown) |
| Line 1: |
Line 1: |
| − | == "IC Assessment" by Trail of Bits ==
| + | This page moved here: https://dfinity.org/third-party-security-audits/ |
| − | | |
| − | === Report & Discussion ===
| |
| − | | |
| − | Date: January 4, 2022
| |
| − | | |
| − | Report Discussion: [https://forum.dfinity.org/t/internet-computer-security-assessment-by-trail-of-bits-third-party-security-audit/10113 "IC Assessment" by Trail of Bits]
| |
| − | | |
| − | === Areas of the code which were audited: ===
| |
| − | * Internet Computer Interfaces
| |
| − | * Consensus Layer
| |
| − | * Network Nervous System
| |
| − | * Ledger Canister
| |
| − | * Governance Canister
| |
| − | * Registry Canister
| |
| − | * Cycles Minting Canister
| |
| − | * Genesis Token Canister
| |
| − | * Cryptography libraries
| |
| − | * Execution Environment
| |
| − | * P2P Layer
| |
| − | * Third Party Dependencies
| |
| − | * Hardware Wallet
| |
| − | | |
| − | == "Internet Computer Consensus: Security Assessment" by Trail of Bits ==
| |
| − | | |
| − | === Report & Discussion ===
| |
| − | | |
| − | Date: March 11, 2022
| |
| − | Report & Discussion: [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits]
| |
| − | | |
| − | === Areas of the code which were audited: ===
| |
| − | * Consensus Layer
| |
| − | | |
| − | | |
| − | | |
| − | == IC "Threshold ECDSA Cryptography Review" by NCC Group ==
| |
| − | | |
| − | === Report & Discussion ===
| |
| − | Date: June 16, 2022
| |
| − | Report & Discussion: [https://forum.dfinity.org/t/threshold-ecdsa-cryptography-review-by-ncc-group-third-party-security-audit-3/13853 IC "Threshold ECDSA Cryptography Review" by NCC Group]
| |
| − | | |
| − | === Areas of the code which were audited: ===
| |
| − | * Threshold ECDSA
| |
Latest revision as of 13:06, 8 January 2026