• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1page.title=Android Security Acknowledgements
2@jd:body
3
4<!--
5    Copyright 2015 The Android Open Source Project
6
7    Licensed under the Apache License, Version 2.0 (the "License");
8    you may not use this file except in compliance with the License.
9    You may obtain a copy of the License at
10
11        http://www.apache.org/licenses/LICENSE-2.0
12
13    Unless required by applicable law or agreed to in writing, software
14    distributed under the License is distributed on an "AS IS" BASIS,
15    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16    See the License for the specific language governing permissions and
17    limitations under the License.
18-->
19<div id="qv-wrapper">
20  <div id="qv">
21    <h2>In this document</h2>
22    <ol id="auto-toc">
23    </ol>
24  </div>
25</div>
26
27<p>The Android Security Team would like to thank the following people and
28parties for helping to improve Android security. They have done this either by
29finding and responsibly reporting security vulnerabilities through the AOSP bug
30tracker <a
31href="https://code.google.com/p/android/issues/entry?template=Security%20bug%20report">Security
32bug report</a> template or by committing code that has a positive
33impact on Android security, including code that qualifies
34for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch
35Rewards</a> program.</p>
36
37<h2 id=2016>2016</h2>
38
39<div style="LINE-HEIGHT:25px;">
40
41<p>Abhishek Arya of Google Chrome Security Team</p>
42
43<p>Broadgate Team</p>
44
45<p>David Riley of the Google Pixel C Team</p>
46
47<p>Dongkwan Kim (<a href="mailto:dkay@kaist.ac.kr">dkay@kaist.ac.kr</a>) of System Security Lab, KAIST</p>
48
49<p>Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>, <a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p>
50
51<p>Gengjia Chen (<a href="https://twitter.com/@chengjia4574">@chengjia4574</a>) from Lab 0x031E of Qihoo 360 Technology Co. Ltd</p>
52
53<p>Hongil Kim (<a href="mailto:hongilk@kaist.ac.kr">hongilk@kaist.ac.kr</a>) of System Security Lab, KAIST</p>
54
55<p>Jann Horn (<a href="https://thejh.net/">https://thejh.net</a>)</p>
56
57<p>jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
58
59<p>Jouni Malinen PGP id EFC895FA</p>
60
61<p>Martin Barbella of Google Chrome Security Team</p>
62
63<p>Oliver Chang of Google Chrome Security Team</p>
64
65<p>Quan Nguyen of Google Information Security Engineer Team</p>
66
67<p>Qidan He (<a href="https://twitter.com/@Flanker_hqd">@Flanker_hqd</a>) of KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p>
68
69<p>Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
70
71<p>Seven Shen (<a href="https://twitter.com/@lingtongshen">@lingtongshen</a>) of Trend Micro (<a href="http://www.trendmicro.com">www.trendmicro.com</a>)</p>
72
73<p>Tom Craig of Google X</p>
74
75<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc</p>
76
77<p>Yabin Cui from Android Bionic Team</p>
78
79<p>Zach Riggle (<a href="https://twitter.com/@ebeip90">@ebeip90</a>) of the Android Security Team</p>
80
81</div>
82
83<h2 id=2015>2015</h2>
84
85<div style="LINE-HEIGHT:25px;">
86<p>Abhishek Arya, Google Chrome Security Team</p>
87
88<p>Alex Copot</p>
89
90<p>Alex Eubanks</p>
91
92<p>Alexandru Blanda</p>
93
94<p>Artem Chaykin</p>
95
96<p>Ben Hawkes</p>
97
98<p>Brennan Lautner</p>
99
100<p>Chiachih Wu of C0RE Team from Qihoo 360</p>
101
102<p>Darmstadt (siegfried.rasthofer@gmail.com)</p>
103
104<p>Daniel Micay (daniel.micay@copperhead.co) at Copperhead Security</p>
105
106<p>Dongkwan Kim of System Security Lab, KAIST (dkay@kaist.ac.kr)</p>
107
108<p>dragonltx of Alibaba Mobile Security Team</p>
109
110<p>Gal Beniamini (<a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p>
111
112<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>, higongguang@gmail.com) of <a href="http://www.360.cn/">Qihoo 360 Technology Co.Ltd</a></p>
113
114<p>Hongil Kim of System Security Lab, KAIST (hongilk@kaist.ac.kr)</p>
115
116<p>Ian Beer of Google Project Zero</p>
117
118<p>Iván Arce (@4Dgifts) of Programa STIC at Fundación Dr. Manuel Sadosky, Buenos
119Aires Argentina</p>
120
121<p>Jack Tang of Trend Micro (@jacktang310)</p>
122
123<p>jgor of <a href="http://security.utexas.edu/">The University of Texas at Austin</a> (<a href="https://twitter.com/indiecom">@indiecom</a>)</p>
124
125<p>Joaquín Rinaudo (@xeroxnir) of Programa STIC at Fundación Dr. Manuel Sadosky,
126Buenos Aires Argentina</p>
127
128<p>Jordan Gruskovnjak of Exodus Intelligence (@jgrusko)</p>
129
130<p>Joshua Drake of Zimperium</p>
131
132<p>Lei Wu of C0RE Team from Qihoo 360</p>
133
134<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of <a href="http://k33nteam.org/">KeenTeam</a> (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p>
135
136<p>Mark Carter (<a href="https://twitter.com/hanpingchinese">@hanpingchinese</a>) of EmberMitre Ltd</p>
137
138<p>Martin Barbella, Google Chrome Security Team</p>
139
140<p>Michael Peck of <a href="https://www.mitre.org/">The MITRE Corporation</a> (mpeck@mitre.org)</p>
141
142<p>Michał Bednarski (<a href="https://github.com/michalbednarski">https://github.com/michalbednarski</a>)</p>
143
144<p>Michael Roland of JR-Center u'smile at University of Applied Scienses, Upper
145Austria/Hagenberg</p>
146
147<p>Natalie Silvanovich of Google Project Zero</p>
148
149<p>Oliver Chang, Google Chrome Security Team</p>
150
151<p>Peter Pi of Trend Micro</p>
152
153<p>Ping Li of Qihoo 360 Technology Co. Ltd</p>
154
155<p>Qidan He (@flanker_hqd) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p>
156
157<p>Roee Hay and Or Peles</p>
158
159<p>Seven Shen of Trend Micro</p>
160
161<p><a href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software Engineering Group</a>, EC SPRIDE Technische Universität</p>
162
163<p>Stephan Huber of Testlab Mobile Security, <a href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (Stephan.Huber@sit.fraunhofer.de)</p>
164
165<p>Steven Vittitoe of Google Project Zero</p>
166
167<p>Tzu-Yin (Nina) Tai</p>
168
169<p>Wangtao(neobyte) of Baidu X-Team</p>
170
171<p>Wen Xu (@antlr7) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p>
172
173<p>Wish Wu of Trend Micro Inc. (@wish_wu)</p>
174
175<p>Xuxian Jiang of C0RE Team from Qihoo 360</p>
176
177<p>Yajin Zhou of C0RE Team from Qihoo 360</p>
178
179
180</div>
181
182<h2 id=2014>2014</h2>
183
184<div style="LINE-HEIGHT:25px;">
185<p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox
186Security</a></p>
187
188<p>Aaron Mangel of <a href="https://banno.com/">Banno</a> (<a
189href="mailto:amangel@gmail.com">amangel@gmail.com</a>)</p>
190
191<p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a
192href="http://www.themeninthemiddle.com">The Men in the Middle</a> <br>(<a
193href="https://twitter.com/SecBro1">@SecBro1</a>)</p>
194
195<p><a href="http://www.samsung.com">Samsung Mobile</a></p>
196
197<p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a
198href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p>
199
200<p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a
201href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p>
202
203<p><a
204href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried
205Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software
206Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a
207href="mailto:siegfried.rasthofer@gmail.com">siegfried.rasthofer@gmail.com</a>)</p>
208
209<p>Steven Arzt of <a href="http://sseblog.ec-spride.de/">Secure Software
210Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a
211href="mailto:Steven.Arzt@ec-spride.de">Steven.Arzt@ec-spride.de</a>)</p>
212
213<p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a
214href="https://labs.mwrinfosecurity.com/">MWR Labs</a> <br>(<a
215href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p>
216
217<p><a href="https://plus.google.com/u/0/109528607786970714118">Valera
218Neronov</a></p>
219
220<p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p>
221
222<p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a
223href="https://twitter.com/luanderock">@luanderock</a>)</p>
224
225<p>Stephan Huber of Testlab Mobile Security, <a
226href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a
227href="mailto:Stephan.Huber@sit.fraunhofer.de">Stephan.Huber@sit.fraunhofer.de</a>)
228</p>
229
230<p><a href="http://www.corkami.com">Ange Albertini</a> (<a
231href="https://twitter.com/angealbertini">@angealbertini</a>)</p>
232
233<p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a
234href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p>
235
236<p>Axelle Apvrille of Fortinet, FortiGuards Labs</p>
237
238<p>Tongxin Li of Peking University (<a
239href="mailto:litongxin1991@gmail.com">litongxin1991@gmail.com</a>)</p>
240
241<p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a
242href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> <br>(<a
243href="https://twitter.com/xzhou">@xzhou</a>, <a
244href="mailto:zhou.xiaoyong@gmail.com">zhou.xiaoyong@gmail.com</a>)</p>
245
246<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana
247University Bloomington (<a
248href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p>
249
250<p>Yeonjoon Lee of Indiana University Bloomington (<a
251href="mailto:luc2yj@gmail.com">luc2yj@gmail.com</a>)</p>
252
253<p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of
254Indiana University Bloomington (<a
255href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p>
256
257<p>Xinhui Han of Peking University (<a
258href="mailto:hanxinhui@pku.edu.cn">hanxinhui@pku.edu.cn</a>)</p>
259
260<p><a href="http://thejh.net/">Jann Horn</a> <a href="https://android-review.googlesource.com/#/c/98197/">
261<img style="vertical-align:middle;" src="../images/tiny-robot.png"
262alt="Green Droid Patch Symbol"
263title="This person contributed code that improved Android security">
264</a></p>
265
266<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
267Trusted Systems Research Group</a>, US National Security Agency
268<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
269<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
270title="This person contributed code that improved Android security"></a></p>
271
272<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
273Trusted Systems Research Group</a>, US National Security Agency
274<a href=
275"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
276<img style="vertical-align:middle" src="../images/tiny-robot.png"
277alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
278
279<p><a href="http://www.linkedin.com/in/billcroberts">
280William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>)
281<a href=
282"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
283<img style="vertical-align:middle" src="../images/tiny-robot.png"
284alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
285
286<p>Scotty Bauer of University of Utah (<a href="mailto:sbauer@eng.utah.edu">sbauer@eng.utah.edu</a>)</p>
287
288<p><a href="http://www.cs.utah.edu/~rsas/">Raimondas Sasnauskas</a> of University of Utah</p>
289
290<p><a href="http://www.subodh.io">Subodh Iyengar</a> of <a href="https://www.facebook.com">Facebook</a></p>
291
292<p><a href="http://www.shackleton.io/">Will Shackleton</a> of <a href="https://www.facebook.com">Facebook</a></p>
293
294<p>Kunal Patel of <a href="https://www.samsungknox.com/">Samsung KNOX Security Team</a> (<a href="mailto:kunal.patel1@samsung.com">kunal.patel1@samsung.com</a>)</p>
295
296<p>Sebastian Brenza</p>
297
298<p>Wang Tao of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="mailto:wintao@gmail.com">wintao@gmail.com</a>)</p>
299
300<p><a href="http://www.linkedin.com/in/danamodio">Dan Amodio</a> of <a href="https://www.aspectsecurity.com/">Aspect Security</a> (<a href="https://twitter.com/DanAmodio">@DanAmodio</a>)</p>
301
302<p><a href="http://davidmurdoch.com">David Murdoch</a></p>
303
304<p>Alexandru Gheorghita</p>
305
306<p>Mathew Solnik (<a href="https://twitter.com/msolnik">@msolnik</a>)</p>
307
308<p>Marc Blanchou (<a href="https://twitter.com/marcblanchou">@marcblanchou</a>)</p>
309
310<p>Wang Yu of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="https://twitter.com/xi4oyu">@xi4oyu</a>)</p>
311
312<p>Zhang Dong Hui of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="http://weibo.com/shineastdh">shineastdh</a>)</p>
313
314<p>Alex Park (<a href="https://twitter.com/saintlinu">@saintlinu</a>)</p>
315
316<p><a href="http://www.sonymobile.com">Sony Mobile</a></p>
317
318<p><a href="https://twitter.com/isciurus">Andrey Labunets</a> of <a href="https://www.facebook.com">Facebook</a></p>
319
320<p>Imre Rad of <a href="http://www.search-lab.hu/">Search-Lab Ltd.</a></p>
321
322</div>
323
324<h2 id=2013>2013</h2>
325
326<div style="LINE-HEIGHT:25px;">
327
328<p>Jon Sawyer of <a href="http://appliedcybersecurity.com/">Applied Cybersecurity LLC
329</a> (<a href="mailto:jon@cunninglogic.com">jon@cunninglogic.com</a>)</p>
330
331<p>Joshua J. Drake of <a href="http://www.accuvant.com/">Accuvant LABS
332</a> (<a href="https://twitter.com/jduck">@jduck</a>)
333<a href="https://android-review.googlesource.com/#/q/change:72228+OR+change:72229">
334<img style="vertical-align:middle" src="../images/patchreward.png"
335alt="Patch Rewards Symbol" title="This person qualified for the Patch Rewards program!"></a></p>
336
337<p>Ruben Santamarta of IOActive
338(<a href="https://twitter.com/reversemode">@reversemode</a>)</p>
339
340<p>Lucas Yang (amadoh4ck) of
341<a href="http://raonsecurity.com/">RaonSecurity</a>
342(<a href="mailto:amadoh4ck@gmail.com">amadoh4ck@gmail.com</a>)</p>
343
344<p><a href="https://tsarstva.bg/sh/">Ivaylo Marinkov</a>
345of <a href="http://www.ecommera.com/">eCommera</a> <br>
346(<a href="mailto:ivo@tsarstva.bg">ivo@tsarstva.bg</a>)</p>
347
348<p><a href="http://roeehay.blogspot.com/">Roee Hay</a>
349<br>(<a href="https://twitter.com/roeehay">@roeehay</a>,
350<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p>
351
352<p>Qualcomm Product Security Initiative</p>
353
354<p><a href="https://lacklustre.net/">Mike Ryan</a> of
355<a href="https://isecpartners.com/">iSEC Partners</a>
356<br>(<a href="https://twitter.com/mpeg4codec">@mpeg4codec</a>,
357<a href="mailto:mikeryan@isecpartners.com">mikeryan@isecpartners.com
358</a>)</p>
359
360<p><a href="http://cryptoonline.com/">Muhammad Naveed</a>
361of <a href="http://illinois.edu/">University of Illinois
362at Urbana-Champaign</a>
363<br>(<a href="mailto:naveed2@illinois.edu">naveed2@illinois.edu</a>)</p>
364
365<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
366Trusted Systems Research Group</a>, US National Security Agency
367<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
368<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
369title="This person contributed code that improved Android security"></a></p>
370
371<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
372Trusted Systems Research Group</a>, US National Security Agency
373<a href=
374"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
375<img style="vertical-align:middle" src="../images/tiny-robot.png"
376alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
377
378<p><a href="http://www.linkedin.com/in/billcroberts">
379William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>)
380<a href=
381"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
382<img style="vertical-align:middle" src="../images/tiny-robot.png"
383alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
384
385<p><a href="http://roeehay.blogspot.com/">Roee Hay</a>
386<br>(<a href="https://twitter.com/roeehay">@roeehay</a>,
387<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p>
388
389<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana
390University Bloomington (<a
391href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p>
392
393<p>Xiaorui Pan of Indiana University Bloomington (<a href="mailto:eagle200467@gmail.com">eagle200467@gmail.com</a>)<p>
394
395<p>XiaoFeng Wang of Indiana University Bloomington (<a href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p>
396
397<p>Kan Yuan</p>
398
399</div>
400<h2 id=2012>2012</h2>
401
402<div style="LINE-HEIGHT:25px;">
403
404<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/">
405Trusted Systems Research Group</a>, US National Security Agency
406<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged">
407<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol"
408title="This person contributed code that improved Android security"></a></p>
409
410<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/">
411Trusted Systems Research Group</a>, US National Security Agency
412<a href=
413"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged">
414<img style="vertical-align:middle" src="../images/tiny-robot.png"
415alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
416
417<p><a href="http://www.linkedin.com/in/billcroberts">
418William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>)
419<a href=
420"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged">
421<img style="vertical-align:middle" src="../images/tiny-robot.png"
422alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p>
423
424<p><a href="http://thejh.net/">Jann Horn</a></p>
425
426<p>Ravishankar Borgaonkar of TU Berlin
427(<a href="https://twitter.com/raviborgaonkar">@raviborgaonkar</a>)</p>
428
429<p><a href="http://roeehay.blogspot.com/">Roee Hay</a>
430<br>(<a href="https://twitter.com/roeehay">@roeehay</a>,
431<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p>
432
433<p>David Weinstein of <a href="https://viaforensics.com/">viaForensics</a> (<a href="https://twitter.com/insitusec">@insitusec</a>)</p>
434
435</div>
436
437<h2 id=2011>2011</h2>
438
439<div style="LINE-HEIGHT:25px;">
440
441<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p>
442
443</div>
444
445<h2 id=2009>2009</h2>
446
447<div style="LINE-HEIGHT:25px;">
448
449<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p>
450
451<p>Charlie Miller (<a href="https://twitter.com/0xcharlie">@0xcharlie</a>)</p>
452
453</div>
454