Security Audits
Although it was not formally implemented, the protocol has been built with ISO 27001:2013 best practices on information security and data protection.
With additional risk measures, peer code reviews and additional security audits, the protocol should be resilient to the exploits.
Not all of these are implemented at the moment, please use the protocol on your sole responsibility.
Last updated