How can blockchain applications adapt and adopt software security best practices?
Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts. For added perspective, a smart contract is a […]
Posted in General | Comments Off on How can blockchain applications adapt and adopt software security best practices?