Security

Security
Photo by Bruno Coimbra / Unsplash

The security of web3 architectures depends on secure design and implementation at each layer of the stack. The consensus algorithms on most proof of stake networks require that 2/3rds of validators are honest in order to remain secure.

Our validator operations benefit from our team's extensive experience as full stack penetration testers as well as running highly available secure infrastructure for a major Web2 platform.

If you believe that you have discovered a vulnerability in one of our systems, please contact security at zanshindojo dot org.  A GPG key for our security team is available on Keybase.