USDT0 Reveals Security Architecture Details: Implements 3/3 Verification Mechanism and Launches $6 Million Bug Bounty Program

robot
Abstract generation in progress

On May 9, following the Kelp security incident, Tether’s asset interoperability protocol USDT0 announced details of its security architecture. The protocol stated that the current system employs a proprietary Decentralized Verification Network (DVN) and has message veto power, requiring three independent validators to reach a 3/3 consensus based on different codebases before cross-chain messages can be settled. The current validating nodes include USDT0’s proprietary DVN, LayerZero, and Canary, with plans to expand to 4/4 and 5/5 verification mechanisms in the future. USDT0 also stated that all multi-signature transactions must undergo multiple reviews by internal teams, external security teams, and auditing agencies before submission for signing. Relevant contracts have been audited by organizations such as Guardian and OpenZeppelin, and a $6 million bug bounty program has been launched on Immunefi.

ZRO-0.55%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin