You are viewing a single comment's thread from:

RE: Security Vulnerabilities with IOTA - what other cryptos are vulnerable?

in #cryptocurrencies7 years ago (edited)

Good read, this girl knows her stuff, “textbook insecure code.” :)
“Using our techniques, a bad actor could have destroyed users’ funds, or possibly, stolen user funds.”

Sort:  

Thanks @ghostcode. Given you found the article interesting and useful is there would it be very cheeky to ask you to vote me up as your reputation is higher than me which means your vote would cause my reputation to increase by 1. Much appreciated:-;