Joran Honig
Security, Software Analysis and more.
Feb
13

4 Strategies for picking the perfect bounty hunting targets

5 min read
Dec
03

Bounties & Two Sided Reputation

3 min read
Oct
12

Stealing all your secrets using IPFS Mounts

5 min read
May
21

Getting familiar with systems thinking, modelling and cadCAD

5 min read
Feb
17

Security Analysis - Diving into Dataflow Analysis and Reaching Definitions

4 min read