Difference between revisions of "Third-party security audits"

From Internet Computer Wiki
Jump to: navigation, search
Line 9: Line 9:
 
2. [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits] on March 11, 2022
 
2. [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits] on March 11, 2022
  
3. [https://forum.dfinity.org/t/threshold-ecdsa-cryptography-review-by-ncc-group-third-party-security-audit-3/13853 IC "Threshold ECDSA Cryptography Review" by NCC Group]
+
3. [https://forum.dfinity.org/t/threshold-ecdsa-cryptography-review-by-ncc-group-third-party-security-audit-3/13853 IC "Threshold ECDSA Cryptography Review" by NCC Group] on June 16, 2022

Revision as of 22:56, 21 June 2022

Goal

In order to increase the security of the IC, the DFINITY foundation has on-going third-party audits of the IC.

Previous audits

1. "IC Assesment" by Trail of Bits

2. "Internet Computer Consensus: Security Assessment" by Trail of Bits on March 11, 2022

3. IC "Threshold ECDSA Cryptography Review" by NCC Group on June 16, 2022