AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
How Three Mo Works?
In a previous life, this is what I did full time, which is finding vulnerabilities. You start with reading the white paper, and then you see that they say, hey, we built our own custom protocol for the client server. But as soon as you find the first attack, then you are sure that there must be more,. Then you just go on.