Image default
Cyber Security

aelf’s Hacker Bounty Phase 2 Kicks Off with US $100,000 At Stake

On July 16th, 2020 aelf announced their latest bounty program in which hackers will race against each other in an attempt to hack 1 million ELF tokens ($100,000 USD at time of press) in a Cross-Chain token transfer. The program demonstrates the team’s confidence in their cross-chain transfer protocol (CCTP) and the critical importance this protocol’s security will have in connecting blockchains together.

The program is co-hosted by aelf and CertiK, a blockchain security company. The co-organizers are DVP, a decentralized vulnerability platform, and SlowMist Technology, a blockchain security company. PeckShield, another blockchain security company, will be the vulnerability assessment partner. The program will be covered by dozens of leading media outlets at home and abroad and is expected to draw white hat hackers and cyber-security enthusiasts from all over the world.

The Bounty Program is about finding vulnerabilities in the Cross-Chain Transfer Protocol (CCTP), so those on the Ethereum Network or aelf will not count. During the program, users who retweet the event will also have the opportunity to share out 8888 ELF and win 52 ELF every day. Participants who are able to hack the CCTP and swap the ELF test tokens to their own account addresses during the event will be rewarded with the equivalent amount of ERC20 ELF tokens.

The amount of tokens put up for reward was decided upon by aelf’s core community as a way for aelf to hand more control to the community in decisions relating to the running and governing of the aelf ecosystem.

Earlier aelf announced the launch of the CCTP product which will allow asset transfers between multiple blockchains. One of the initial applications of this protocol will be to complete aelf’s highly anticipated Mainnet token swap via smart contract from the Ethereum network onto aelf’s Mainnet. The CCTP can be utilized by any blockchain seeking to interact with other chains and will drive adoption of blockchain applications.

The protocol has resolved one of IBC’s (Inter-Blockchain Communication) key complications in blockchains using a variety of governance consensus methods. This is achieved through the use of cross-chain existence proof, relying on the Merkle Proof mechanism.

The program will run until August 5th and anyone interested in participating or finding out more details can visit here.

Related posts

Cybersecurity Platform SightGain, Public Sector Partner for Mandiant

PR Newswire

Circle Security now available on SailPoint Compass Community

PR Newswire

HackNotice releases a new, free white paper series

PR Newswire