- Project TypeToken
- Platform Ethereum
- Circulating Supply1,546,457,130
- Total SupplyNone specified
- Max SupplyNone specified
- Primary SectorPrivacy & Security
- JurisdictionNone specified
Steve previously founded Narf Industries, an information security R&D firm, with marquee clients from DARPA to members of the Fortune 500. He brings over 20 years of experience in Information Security focused development. He previously served in lead roles in a variety of projects for Government and Industry including: software development for advanced incident response, blockchain-based identity management R&D, and development of cutting-edge program analysis tools for DARPA’s CGC.
Paul brings over 10 years of experience in modern software exploitation, program analysis, vulnerability research, reverse engineering, cryptography, and low-level development. Paul has reverse engineered, sinkholed and written bespoke malware disinfection tools for Fortune 100 clients, has conducted cutting-edge research on partial homomorphic encryption and has co-designed a confidentiality system for a public / private hybrid blockchain used for identity management.
Ben brings over a decade of experience in information security to the table, having led research on automated program analysis, malware reverse engineering, secure software development, cryptography, cryptocurrency, and vulnerability analysis. Ben has uncovered hundreds of vulnerabilities in an impressive range of products, including widely-used open source products, hugely popular web applications, security-critical embedded devices, and multiple mobile platforms.
Nick brings substantial experience leading enterprise teams in the performance of real-world, large-scale digital forensics, malware reverse engineering, adversarial hunting, threat analysis and incident response. He helped deliver cutting-edge research using partial homomorphic encryption, audited thousands of lines of code for security vulnerabilities, and created a variety of custom-designed binary applications that are used to test the efficacy of automated program analysis tools.
Max brings 9 years of experience in secure software engineering, vulnerability analysis, digital forensics, and reverse engineering. He has developed software for a wide range of platforms, from embedded microcontrollers to large distributed systems. He developed innovative exploit mitigations including ELFbac, which he presented at Black Hat 2016. He also has developed custom tools for large-scale program analysis and vulnerability discovery which run on distributed systems.
Questions and Answers
- 8 of 27 Team Members Verified
- Company Verified
- KYC Interview Conducted
Our proprietary TrustScore algorithm uses artificial intelligence machinery and combines dozens of data points including ID verification of every team member, company verification data, video interview with the project directors and dozens of additional data points offered by the projects such as social media profiles, white paper, questions and answers and many more to calculate the TrustScore.
A = Excellent
B = Good
C = Average
D = Below Average
E = Low