Difference between revisions of "Third-party security audits"

From Internet Computer Wiki
Jump to: navigation, search
Line 1: Line 1:
 
== Goal ==
 
 
In order to increase the security of the IC, the DFINITY foundation has on-going third-party audits of the IC.
 
 
 
 
== "IC Assessment" by Trail of Bits ==
 
== "IC Assessment" by Trail of Bits ==
  

Revision as of 23:02, 21 June 2022

"IC Assessment" by Trail of Bits

Report & Discussion

Date: January 4, 2022 Report Discussion: "IC Assessment" by Trail of Bits

Areas of the code which were audited:

  • Internet Computer Interfaces
  • Consensus Layer
  • Network Nervous System
  • Ledger Canister
  • Governance Canister
  • Registry Canister
  • Cycles Minting Canister
  • Genesis Token Canister
  • Cryptography libraries
  • Execution Environment
  • P2P Layer
  • Third Party Dependencies
  • Hardware Wallet

"Internet Computer Consensus: Security Assessment" by Trail of Bits

Report & Discussion

Date: March 11, 2022 Report & Discussion: "Internet Computer Consensus: Security Assessment" by Trail of Bits

Areas of the code which were audited:

  • Consensus Layer


IC "Threshold ECDSA Cryptography Review" by NCC Group

Report & Discussion

Date: June 16, 2022 Report & Discussion: IC "Threshold ECDSA Cryptography Review" by NCC Group

Areas of the code which were audited:

  • Threshold ECDSA