🇺🇦 Hacken was born in Ukraine, and we stand with all Ukrainians in our fight for freedom!

🇺🇦 Hacken stands with Ukraine!

Learn more
bg

Hacken will Help TTC Protocol to Protect Customer Data

Hacken will Help TTC Protocol to Protect Customer Data
  • Case Studies
  • bug bounty
  • case study
  • Company News
  • cybersecurity
  • Hacken service
  • Hackenproof
  • new customer
  • program launch
  • security analisys

Updated: 21 Oct 2022

Company: TTC Protocol
Company description: Social networking ecosystem on the blockchain
Service: Smart contract audit, penetration testing, and bug bounty


In 2016, Yahoo! announced a massive data breach which affected around 500 million user accounts. The same year, hackers attacked Uber exposing data of 20 million users. In about a year, both companies started a bug bounty program to reveal their security flaws.

Learning from other companies’ mistakes, TTC Protocol decided to ensure the protection of their users at early stages and partnered up with Hacken, the largest professional white hat hacker company and community in the blockchain, to collaborate and build a safer blockchain.

What is TTC Protocol?

TTC Protocol is one of the largest social networking ecosystems on the blockchain, with over 23 million users. It aims to provide a brand new social experience for users all over the world by connecting different DAPPs in the ecosystem of TTC Protocol with common guidelines for every participant. Moreover, TTC is the circulating currency, incentivizing all participants in the ecosystem.

Basis for security cooperation

TTC Protocol is aware of risks and challenges themselves to make their environment as secure as possible. Hacken and TTC Protocol communities will work together to grow a secure and transparent blockchain ecosystem, making sure that user data is protected in a world of data leaks.

TTC Protocol and Hacken aim to have a long-term partnership on a subject of security, starting with the improvement of blockchain tool and TTC Wallet. Several days ago, specialists from Hacken started the penetration testing of TTC test-net and a bug bounty program was launched on HackenProof. TTC Protocol accepts all reports that demonstrate vulnerabilities for the blockchain security and have real-life impact. Soon, the security audit will be performed to reveal bugs and vulnerabilities in the smart contract (if any).

“We aim to build the most user-friendly and secure social network protocol on the blockchain. We are thrilled to collaborate with hundreds of white hat hackers around the globe to build a safer blockchain for billions.” — Brian Cheong, CEO of TTC Protocol.

Moreover, TTC Protocol will showcase its philosophy and security strategy in front of world’s top hackers, security experts, and blockchain community at the HackIT forum on October 8 to 11 in Kyiv, Ukraine. TTC Protocol becomes a lanyard sponsor at the forum.

“Finding bugs is a priority for us as a cybersecurity company. The highest level of protection that we offer customers is a core principle of our business,” said Dmytro Budorin, CEO of Hacken. “Hacken team is excited to bring a new mission-critical asset to the white hat hackers community with the aim of protecting the sensitive TTC Protocol data. We’re looking forward to taking a page in their history.”

About Hacken

At Hacken, we take security extremely seriously, and all the checks are performed according to the highest standards. If you have any questions about the topic or need a consultation, feel free to contact our Team!

Read also:
Crypto Exchange Penetration Testing by Hacken
A Hacker Conference That’s Once in a Lifetime
Hacken Summer Report Summer 2018

Want to improve your security?

share via social

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Reach our team

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo