Pages:
Author

Topic: [ANN] Buglab - Cybersecurity Penetration Testing on the Ethereum Blockchain - page 6. (Read 3313 times)

newbie
Activity: 49
Merit: 0
Hi! I really like your idea, nice whitepaper and great design. I only want to say you that you have a typo on your first post, the hyperlink of the website is not right. Anyway good job and I will follow your project closely.

Thanks for pointing that out we have fixed it  Smiley
member
Activity: 217
Merit: 10
Hi! I really like your idea, nice whitepaper and great design. I only want to say you that you have a typo on your first post, the hyperlink of the website is not right. Anyway good job and I will follow your project closely.
newbie
Activity: 49
Merit: 0
Buglab Bio: Azdine Bouhou, Software Architect

At buglab, we’re all about community. We’re a dedicated team of professionals, but we’re also a family of supportive peers.
And like any family, we all have our different attributes, our peculiar quarks, and our individual ambitions.

As we continue to work towards our common goal, we’re eager to share our dreams and personalities with you.

This Tuesday, we’re chatting with Azdine Bouhou, Software Architect at Buglab.


Find out more on the Buglab blog:

https://blog.buglab.io/buglab-bio-azdine-bouhou-software-architect-43769c35fb23


https://i.imgur.com/KtHgryr.jpg?1
member
Activity: 260
Merit: 15
This would be a wonderful project once it is released for the users due to a lot of security issues over the net however how can we ensure that this white hat hackers will not turn down the system in the future? Anyways,  I know that your team will definitely get all trusted people.

thank you for your support, to answer you, the first thing is that unlike the bug bounty platforms, we don’t let anyone contribute to our challenges. The pentesters who will be on our platform must already be certified and validated by our teams. In addition, a company has the posibility to invite pentesters from a defined their country.

Then on each competitions, the pentesters must agree our code of conduct.

Finally, the purpose of the competition is precisely to discover all the vulnerabilities and that these are fixed by the companies. So it should no longer be possible to exploit.

We remain at your disposal for any further details

How long will the certification and validation process of pentesters take, and what will it involve? It seems it would be quite a long and rigorous process.

The process should take a couple of hours once all the information requested is provided by the applicant security researcher, we have a list of cybersecurity certifications that we recognize and accept. Applicants can also prove their skills by participating in the vigilante protocol and earning points.

A series of strict confidentiality agreements should be signed, and any company does not like the loopholes in its own system to be publicized.
newbie
Activity: 49
Merit: 0
Interesting team line-up. So who's the official community manager here? Who's the bounty manager here? And will you bail out of Bitcointalk when you get your ICO funds? I would like to have a reply on this.

We have no bounty announcement for the moment, we will have an airdrop coming up soon as mentioned above.

More details will be announced in due course. We like Bitcointalk not sure what you mean with your assumption.
newbie
Activity: 49
Merit: 0
Hello! I am editor from icoholder.com. Your ICO was added to our listing and now is available to investors: https://icoholder.com/en/buglab-18235 You can edit your Page  by adding more information about your ICO after verification and also verify team members to improve ranking.

Thanks for setting it up and sharing!  Smiley
newbie
Activity: 49
Merit: 0
This sounds like a good upcoming project. Waiting for the Airdrop Grin

Thank you for the support, stay tuned, we should have some Airdrop details coming out soon.
legendary
Activity: 1652
Merit: 1007
Interesting team line-up. So who's the official community manager here? Who's the bounty manager here? And will you bail out of Bitcointalk when you get your ICO funds? I would like to have a reply on this.
legendary
Activity: 1722
Merit: 1000

How long will the certification and validation process of pentesters take, and what will it involve? It seems it would be quite a long and rigorous process.

That's a very good question, I also would like to know how hard the process is too.
newbie
Activity: 49
Merit: 0
This would be a wonderful project once it is released for the users due to a lot of security issues over the net however how can we ensure that this white hat hackers will not turn down the system in the future? Anyways,  I know that your team will definitely get all trusted people.

thank you for your support, to answer you, the first thing is that unlike the bug bounty platforms, we don’t let anyone contribute to our challenges. The pentesters who will be on our platform must already be certified and validated by our teams. In addition, a company has the posibility to invite pentesters from a defined their country.

Then on each competitions, the pentesters must agree our code of conduct.

Finally, the purpose of the competition is precisely to discover all the vulnerabilities and that these are fixed by the companies. So it should no longer be possible to exploit.

We remain at your disposal for any further details

How long will the certification and validation process of pentesters take, and what will it involve? It seems it would be quite a long and rigorous process.

The process should take a couple of hours once all the information requested is provided by the applicant security researcher, we have a list of cybersecurity certifications that we recognize and accept. Applicants can also prove their skills by participating in the vigilante protocol and earning points.
newbie
Activity: 349
Merit: 0
rather need a form of air
newbie
Activity: 49
Merit: 0
I just read the whitepaper and this is a very good idea/concept you guys have. Do you provide a possibility to get BGL tokens like a bounty campaign?

We are defining the terms of our Airdrop which should start soon, you will be able to earn some BGL tokens for very simple tasks.
newbie
Activity: 44
Merit: 0
This sounds like a good upcoming project. Waiting for the Airdrop Grin
newbie
Activity: 49
Merit: 0
Join our ever growing community on Telegram and Reddit.

Our team is available to answer any of your queries regarding the project, the TDE, and the upcoming Airdrop.

full member
Activity: 198
Merit: 100
I just read the whitepaper and this is a very good idea/concept you guys have. Do you provide a possibility to get BGL tokens like a bounty campaign?
hero member
Activity: 650
Merit: 502
This would be a wonderful project once it is released for the users due to a lot of security issues over the net however how can we ensure that this white hat hackers will not turn down the system in the future? Anyways,  I know that your team will definitely get all trusted people.

thank you for your support, to answer you, the first thing is that unlike the bug bounty platforms, we don’t let anyone contribute to our challenges. The pentesters who will be on our platform must already be certified and validated by our teams. In addition, a company has the posibility to invite pentesters from a defined their country.

Then on each competitions, the pentesters must agree our code of conduct.

Finally, the purpose of the competition is precisely to discover all the vulnerabilities and that these are fixed by the companies. So it should no longer be possible to exploit.

We remain at your disposal for any further details

How long will the certification and validation process of pentesters take, and what will it involve? It seems it would be quite a long and rigorous process.
newbie
Activity: 49
Merit: 0
We will soon be announcing an Airdrop for the community, in conjunction with the whitelisting for our TDE.

Stay tuned for more info!  Smiley
newbie
Activity: 49
Merit: 0
The latest Buglab blog is unleashed! 🎯

You Need to Know About These Small to Medium-Sized Business Vulnerabilities

In our busy culture, we’ve come to expect everything to happen at lightning speed. When we click on a map on our mobile device,
or anything else, we expect immediate results. Otherwise, it won’t take very long at all before we’ll upgrade our OS, or even swap
our devices for the newest hardware.

The chipmakers are well aware of this consumer behavior, one reason some of them, notably Intel, have integrated predictive
loading technology into firmware. It turns out that most modern microprocessors, particularly those in smartphones, are built to
anticipate what a user will do next. This provides an edge over the older chips not built with such firmware...


Read more below:

https://blog.buglab.io/you-need-to-know-about-these-small-to-medium-sized-business-vulnerabilities-cdeadf536c04


https://i.imgur.com/xl5LBdl.png

newbie
Activity: 49
Merit: 0
This would be a wonderful project once it is released for the users due to a lot of security issues over the net however how can we ensure that this white hat hackers will not turn down the system in the future? Anyways,  I know that your team will definitely get all trusted people.

thank you for your support, to answer you, the first thing is that unlike the bug bounty platforms, we don’t let anyone contribute to our challenges. The pentesters who will be on our platform must already be certified and validated by our teams. In addition, a company has the posibility to invite pentesters from a defined their country.

Then on each competitions, the pentesters must agree our code of conduct.

Finally, the purpose of the competition is precisely to discover all the vulnerabilities and that these are fixed by the companies. So it should no longer be possible to exploit.

We remain at your disposal for any further details

Thanks for popping around to answer Azdine! Smiley
newbie
Activity: 1
Merit: 0
This would be a wonderful project once it is released for the users due to a lot of security issues over the net however how can we ensure that this white hat hackers will not turn down the system in the future? Anyways,  I know that your team will definitely get all trusted people.

thank you for your support, to answer you, the first thing is that unlike the bug bounty platforms, we don’t let anyone contribute to our challenges. The pentesters who will be on our platform must already be certified and validated by our teams. In addition, a company has the posibility to invite pentesters from a defined their country.

Then on each competitions, the pentesters must agree our code of conduct.

Finally, the purpose of the competition is precisely to discover all the vulnerabilities and that these are fixed by the companies. So it should no longer be possible to exploit.

We remain at your disposal for any further details
Pages:
Jump to: