matrix.jpg

Secure a thriving token economy.

Collectively Guard Against Fraud.

 

The Crypto Defenders Alliance aims to be a self-governing coalition of exchanges, blockchain projects and cybersecurity organizations dedicated to stopping fraud, theft and liquidation of stolen digital assets through deep industry collaboration, best practices and open-source software.

The detection and prevention of theft on the blockchain requires new tools and new forms of collaboration between industry leaders. CDA will leverage battle-tested forensic techniques in new ways to combat fraud and preserve the blockchain ecosystem, while orchestrating best practices for coordinated emergency evaluation and response across sectors.

 CDA is a not-for-profit initiative. 


CDA IS for:

  • Exchanges looking to prevent thieves from converting stolen tokens to fiat

  • On-chain liquidity providers wanting to block thieves from using their services

  • Cyber security firms looking to stay at the cutting edge of blockchain defense paradigms

  • Blockchain leaders protecting current and future users from fraud and theft on all networks

 
 

CDA will form an interdisciplinary alliance striving to protect the token economy from theft, manipulation, privacy violations and other malicious practices across blockchains.


Together We Pledge TO:

  • Collectively create the next generation of protection needs and best practices

  • Create a database of blacklisted addresses

  • Blockade stolen funds and coordinate their recovery

  • Develop open-source software to combat thieves

  • Facilitate member communication

Our Governance Model WILL INCLUDE:

  • Resource-sharing to develop and maintain security tools

  • Promoting the wider adoption of project tools

  • Including a diverse array of perspectives and participants

  • Collaborative engagement-based roadmap design and implimentation

  • Conducting board business openly and transparently

 

members of The alliance commit to allocating bounty programs for the COMMUNITY development of new security tools.

Development Bounty Programs