Mapping the ICO threat landscape

You’re already on the path for an ICO. Along with you, there are numerous people trying to do the same. Not all of them have that great idea of yours, but they might know that you do. They could just join you, and you know, not all people are polite enough to ask. Who knows, they might even do your ICO without you.Going through an ICO makes you a target for hackers, adversaries capable of finding ways to steal your incoming funds.In this post, we will go through the most common assets an attacker will go over when trying to disrupt a company aiming for an ICO.A very high-level aspect of a company’s assetsBlockchain SecurityThere are endless articles detailing every single hack that occurred by exploiting smart contracts. One of the greatest flaws in the smart contract technology is that they cannot be updated. Once they are on the blockchain they are written in stone, they cannot be changed. If the contract is vulnerable, it will stay that way.A smart contract, being code, is prone to vulnerabilities. Even though there are multiple solid attempts to make the ICO contract development easier and more secure like OpenZeppelin, ConsenSys etc. your...
Read more