Crowdsourced Threat Detector PolySwarm Goes Live on Mainnet

0
75

Here’s the way it works: Users submit their URLs or recordsdata to PolySwarm to verify for malicious code that may very well be embedded inside such recordsdata. An automated engine then runs a search in opposition to a number of different “safe” codes, following which the user-submitted file is both deemed malicious or protected. Transactions for this service are carried out by way of nectar tokens, that are moreover rewarded to software program companions and clients utilizing PolySwarm.