So you believe Thorchain is vulnerable … How Vulnerable?

  1. Consider the Source,
  2. Consider the Market,
  3. Consider the Product/Code

1. Consider the Source

2. Consider the Market

3. Consider the Product/Code




Automated Cover Maker

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Hack The Box: Networked Write-up (#19)

Top 5 Two-Factor Authentication Products by Protectimus

ChangeNOW Android App Update — Fiat-to-crypto & DeFi Abundance

Who You Are

An investigation of Google’s ad personalisation

Crypto Privacy and Security Basics

GSoC 2021 with OpenMR — final evaluation

Russian Hacker Caught and Convicted: From US With Love

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Automated Cover Maker

More from Medium

Those that see the future win: an intro to FLEX

What is Axelar Network?

Liquidity Bootstrapping Event: 300k MIM Raised

Immediate Edge || Immediate Edge Review || Immediate Edge Register