jewelry wholesale place Who will ensure the security of the blockchain platform after the vulnerability of 10 billion US dollars?

jewelry wholesale place

1 thought on “jewelry wholesale place Who will ensure the security of the blockchain platform after the vulnerability of 10 billion US dollars?”

  1. sea lily wholesale jewelry On June 8th, the high -risk vulnerability exposed by 360 caused many heated discussions between the Internet. In the early morning of June 2, Beijing time, EOS officially thanked the 360 ​​security team and provided a bounty of 30,000 US dollars. It strongly called on security community personnel to work together to ensure the continuous improvement of EOS software security.
    As EOSIO's main online online is approaching, how to ensure the safety of blockchain nodes, providing users with reliable and stable chain services has become the focus of global EOSIO community attention. To this end, 360 forward -looking proposal to EOS super node security solutions, relying on the "safe brain" and continuous investment in the EOSIO ecosystem, is committed to building a systematic security guarantee system for EOS ecology, providing more secure users of EOSIO to be safer to the majority of users of EOSIO more secure , More reliable and more stable basic services.
    20s paralysis digital currency system! EOS has a super node attack
    In May 29, Beijing time, 360Vulcan (Volgan) team announced that it discovered a series of high -risk security vulnerabilities on the EOS platform. Verification, some of the vulnerabilities can execute any code remotely on the EOS node, that is, it can directly control and take over all nodes running on EOS through remote attacks. In the early morning of the 29th, before the loopholes were announced, the 360 ​​had reported this type of vulnerability to EOS officials as soon as possible, and assisted them to repair hidden safety hazards.
    360 exposed EOS vulnerabilities, if they are used, can control each node and every server in the EOS network, not only to take over the virtual currencies, various transactions and applications in the network, but also to take over everything in the node. Participate the server. It can be said that if someone makes a malicious smart contract, you can take all the digital currencies in it directly.
    eos vulnerabilities can spread between multiple nodes and super nodes at a speed of seconds. From the control node to generating new blocks to continue spreading is continuous, chain -type explosion, it is likely to take over in 20 seconds to take over in 20 seconds. All nodes have completed the operation.
    Image that when the attacker has obtained the supreme permissions of the entire EOS network, it is equivalent to extinguishing the hegemony to make the six universe rough stones. In the universe, they can change rapidly and do whatever they want.
    Source: China News Network

Leave a Comment