USDT0 announces security architecture details, adopting a 3/3 verification mechanism and launching a $6 million bug bounty program
After the Kelp security incident, Tether's asset interoperability protocol USDT0 announced details of its protocol security architecture, stating that the current system uses a proprietary DVN (Decentralized Verification Network) and has message veto power, while requiring 3 independent validators to reach a 3/3 consensus based on different codebases before cross-chain messages can be settled.
The current validating nodes include USDT0's proprietary DVN, LayerZero, and Canary, with plans to expand to 4/4 and 5/5 verification mechanisms in the future. USDT0 also stated that all multi-signature transactions must undergo multiple reviews by internal teams, external security teams, and auditing institutions before submission for signing. Relevant contracts have been audited by organizations such as Guardian and OpenZeppelin and have launched a $6 million bug bounty program on Immunefi.








