Security and Privacy

As an object-centered blockchain, we believe our users' funds should not fall into the hands of threat actors, which is why we always emphasize security.

Technically, we built the 369 compiler to be immune to common bugs such as reentrancy, flow manipulation, and so on.

This is basic support to protect the builders and users of 369 from possible hack cases.

On the other hand, 369 has a no-loophole privacy underpinning. In the hood, 369 transactions are conducted with zero-knowledge technology, which makes it more anonymous.

Last updated