🇺🇦 Hacken was born in Ukraine, and we stand with all Ukrainians in our fight for freedom!

🇺🇦 Hacken stands with Ukraine!

Learn more
bg

TTC Protocol launches public bug bounty on HackenProof

TTC Protocol launches public bug bounty on HackenProof

Published: 17 Sep 2018 Updated: 19 Oct 2022

We are proud to announce the launch of a bug bounty program for TTC Protocol.

TTC Protocol is a decentralized and token incentivized social networking protocol that aims to provide a brand new social experience for users all over the world. It is one of the largest social networking ecosystems on the blockchain, with over 23 million users. TTC Protocol provides a simple-to-integrate and fully-customizable blockchain-based SDK for existing communities, which acknowledges users’ contribution to the community and rewards them.

By providing a brand new social experience, TTC Protocol a highly rewarding and dynamic user experience to all participants.

Social network services deal with a massive number of users and their private moments. Hence, it is very natural for TTC Protocol to set “security” as one of the top priorities. TTC Protocol understands that there is no such thing as a perfectly secured environment and constantly challenge themselves to improve its security standard. Hosting a public bug bounty program is a great way to do just that! We are looking forward to spotting and fixing security vulnerabilities of TTC Protocol in order to create a safe and secure environment for everyone.

TTC Protocol will award hackers up to $5,000 for critical security vulnerabilities. You can read more about the program here
Please join us in welcoming TTC Protocol to the family of public bug bounty programs on the HackenProof platform!

About TTC Protocol:

The TTC Protocol connects every participant in the TTC ecosystem by establishing common guidelines for different DAPPs. TTC is the circulating currency, incentivizing all participants in the ecosystem of the TTC Protocol. Network users on social platforms are rewarded for generating, distributing, and interacting with content, and interacting with other users. The TTC Protocol returns the commercial value in the attention economy to those same users who generated that value. For more information, please visit: https://ttc.eco.

share via social

Subscribe to our research

Enter your email address to subscribe to Hacken Research and receive notifications of new posts by email

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo