top of page
Blog: Blog2

We say, "TRIO is Free from Theft," but can we prove that for cyber security?

Updated: Mar 15

In the "old days," such a claim would require commissioning a penetration test report from a cybersecurity auditor to prove that the product is built according to the best practices known during the tests. The experience shows that after some time, the evidence of unforeseen vulnerabilities ("zero-day attacks") occurs that will require patching. After repeated instances of bad PR - very little remains from the original claims. Until the new product, new test report, and new unforeseen vulnerabilities cycle pops up.

TRIO does not belong to the "old days" infrastructure. It is an attempt to build cybersecurity by design that will be logically immune to these "zero-day attacks."

Let's start with the issue of Theft.

The attacker wishing to steal the funds from the victim overcomes the defenses and sends the money to the money mule. A money mule is a person who transfers stolen money on behalf of thieves. Typically the mule is paid with a small part of the money transferred.

The currently adopted logic is to try to make defenses invincible, As it has been proven all over again – there is no such thing.

What is the characteristic of the mule account – it is unknown to the victim. We cannot always ask the victim if he recognizes this account simply because the malicious software (malware) will trick him into masking the mule account. And money does not care about cybersecurity because it will flow wherever we send it.

TRIO logic is entirely different: let's control the money flow. Can we prevent the transfer to a mule? Which mule? – Any mule! But how can we do that?

Let's divide the public into two groups: the people whose Identities we know and those whose identities we don't (anonymous to us).

It is improbable that the mule's Identity is known to the victim – so the mule is deemed anonymous. If we define the money transfer rule that transfers to an unidentified person is forbidden, that will do the job. Unfortunately – fiat money is not programmable.

But crypto tokens are! You can define such a rule, which is what the TRIO token does!

TRIO tokens cannot be transferred outside the TRIO community of people whose Identities are known.

One may argue that if the TRIO community proliferates and everyone joins, including mules, – we are back to the situation where the victim can transfer TRIO tokens to a mule. The difference is that this transfer is traceable and can be reversed by burning stolen tokens and minting stolen tokens for the victim. This action is, of course, impossible with fiat money.

Finally, the smart contract of the TRIO token is entirely transparent and can be audited by anyone.

Smart contracts on a blockchain are immutable due to blockchain technology's fundamental design principles and characteristics. Immutability means that once data or code is recorded on a blockchain, it cannot be altered, deleted, or tampered with. This immutability is a crucial feature of blockchain technology and has several important implications for smart contracts.

15 views0 comments

Recent Posts

See All


bottom of page