1page.title=Android Security Acknowledgements 2@jd:body 3 4<!-- 5 Copyright 2015 The Android Open Source Project 6 7 Licensed under the Apache License, Version 2.0 (the "License"); 8 you may not use this file except in compliance with the License. 9 You may obtain a copy of the License at 10 11 http://www.apache.org/licenses/LICENSE-2.0 12 13 Unless required by applicable law or agreed to in writing, software 14 distributed under the License is distributed on an "AS IS" BASIS, 15 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16 See the License for the specific language governing permissions and 17 limitations under the License. 18--> 19<div id="qv-wrapper"> 20 <div id="qv"> 21 <h2>In this document</h2> 22 <ol id="auto-toc"> 23 </ol> 24 </div> 25</div> 26 27<p>The Android Security Team would like to thank the following people and 28parties for helping to improve Android security. They have done this either by 29finding and responsibly reporting security vulnerabilities through the AOSP bug 30tracker <a 31href="https://code.google.com/p/android/issues/entry?template=Security%20bug%20report">Security 32bug report</a> template or by committing code that has a positive 33impact on Android security, including code that qualifies 34for the <a href="https://www.google.com/about/appsecurity/patch-rewards/">Patch 35Rewards</a> program.</p> 36 37<h2 id=2016>2016</h2> 38 39<div style="LINE-HEIGHT:25px;"> 40 41<p>Abhishek Arya of Google Chrome Security Team</p> 42 43<p>Broadgate Team</p> 44 45<p>David Riley of the Google Pixel C Team</p> 46 47<p>Dongkwan Kim (<a href="mailto:dkay@kaist.ac.kr">dkay@kaist.ac.kr</a>) of System Security Lab, KAIST</p> 48 49<p>Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>, <a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p> 50 51<p>Gengjia Chen (<a href="https://twitter.com/@chengjia4574">@chengjia4574</a>) from Lab 0x031E of Qihoo 360 Technology Co. Ltd</p> 52 53<p>Hongil Kim (<a href="mailto:hongilk@kaist.ac.kr">hongilk@kaist.ac.kr</a>) of System Security Lab, KAIST</p> 54 55<p>Jann Horn (<a href="https://thejh.net/">https://thejh.net</a>)</p> 56 57<p>jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> 58 59<p>Jouni Malinen PGP id EFC895FA</p> 60 61<p>Martin Barbella of Google Chrome Security Team</p> 62 63<p>Oliver Chang of Google Chrome Security Team</p> 64 65<p>Quan Nguyen of Google Information Security Engineer Team</p> 66 67<p>Qidan He (<a href="https://twitter.com/@Flanker_hqd">@Flanker_hqd</a>) of KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent</p> 68 69<p>Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> 70 71<p>Seven Shen (<a href="https://twitter.com/@lingtongshen">@lingtongshen</a>) of Trend Micro (<a href="http://www.trendmicro.com">www.trendmicro.com</a>)</p> 72 73<p>Tom Craig of Google X</p> 74 75<p>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of Alibaba Inc</p> 76 77<p>Yabin Cui from Android Bionic Team</p> 78 79<p>Zach Riggle (<a href="https://twitter.com/@ebeip90">@ebeip90</a>) of the Android Security Team</p> 80 81</div> 82 83<h2 id=2015>2015</h2> 84 85<div style="LINE-HEIGHT:25px;"> 86<p>Abhishek Arya, Google Chrome Security Team</p> 87 88<p>Alex Copot</p> 89 90<p>Alex Eubanks</p> 91 92<p>Alexandru Blanda</p> 93 94<p>Artem Chaykin</p> 95 96<p>Ben Hawkes</p> 97 98<p>Brennan Lautner</p> 99 100<p>Chiachih Wu of C0RE Team from Qihoo 360</p> 101 102<p>Darmstadt (siegfried.rasthofer@gmail.com)</p> 103 104<p>Daniel Micay (daniel.micay@copperhead.co) at Copperhead Security</p> 105 106<p>Dongkwan Kim of System Security Lab, KAIST (dkay@kaist.ac.kr)</p> 107 108<p>dragonltx of Alibaba Mobile Security Team</p> 109 110<p>Gal Beniamini (<a href="http://bits-please.blogspot.com/">http://bits-please.blogspot.com</a>)</p> 111 112<p>Guang Gong (龚广) (<a href="https://twitter.com/oldfresher">@oldfresher</a>, higongguang@gmail.com) of <a href="http://www.360.cn/">Qihoo 360 Technology Co.Ltd</a></p> 113 114<p>Hongil Kim of System Security Lab, KAIST (hongilk@kaist.ac.kr)</p> 115 116<p>Ian Beer of Google Project Zero</p> 117 118<p>Iván Arce (@4Dgifts) of Programa STIC at Fundación Dr. Manuel Sadosky, Buenos 119Aires Argentina</p> 120 121<p>Jack Tang of Trend Micro (@jacktang310)</p> 122 123<p>jgor of <a href="http://security.utexas.edu/">The University of Texas at Austin</a> (<a href="https://twitter.com/indiecom">@indiecom</a>)</p> 124 125<p>Joaquín Rinaudo (@xeroxnir) of Programa STIC at Fundación Dr. Manuel Sadosky, 126Buenos Aires Argentina</p> 127 128<p>Jordan Gruskovnjak of Exodus Intelligence (@jgrusko)</p> 129 130<p>Joshua Drake of Zimperium</p> 131 132<p>Lei Wu of C0RE Team from Qihoo 360</p> 133 134<p>Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of <a href="http://k33nteam.org/">KeenTeam</a> (<a href="https://twitter.com/k33nteam">@K33nTeam</a>)</p> 135 136<p>Mark Carter (<a href="https://twitter.com/hanpingchinese">@hanpingchinese</a>) of EmberMitre Ltd</p> 137 138<p>Martin Barbella, Google Chrome Security Team</p> 139 140<p>Michael Peck of <a href="https://www.mitre.org/">The MITRE Corporation</a> (mpeck@mitre.org)</p> 141 142<p>Michał Bednarski (<a href="https://github.com/michalbednarski">https://github.com/michalbednarski</a>)</p> 143 144<p>Michael Roland of JR-Center u'smile at University of Applied Scienses, Upper 145Austria/Hagenberg</p> 146 147<p>Natalie Silvanovich of Google Project Zero</p> 148 149<p>Oliver Chang, Google Chrome Security Team</p> 150 151<p>Peter Pi of Trend Micro</p> 152 153<p>Ping Li of Qihoo 360 Technology Co. Ltd</p> 154 155<p>Qidan He (@flanker_hqd) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p> 156 157<p>Roee Hay and Or Peles</p> 158 159<p>Seven Shen of Trend Micro</p> 160 161<p><a href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software Engineering Group</a>, EC SPRIDE Technische Universität</p> 162 163<p>Stephan Huber of Testlab Mobile Security, <a href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (Stephan.Huber@sit.fraunhofer.de)</p> 164 165<p>Steven Vittitoe of Google Project Zero</p> 166 167<p>Tzu-Yin (Nina) Tai</p> 168 169<p>Wangtao(neobyte) of Baidu X-Team</p> 170 171<p>Wen Xu (@antlr7) from KeenTeam (@K33nTeam, <a href="http://k33nteam.org/">http://k33nteam.org/</a>)</p> 172 173<p>Wish Wu of Trend Micro Inc. (@wish_wu)</p> 174 175<p>Xuxian Jiang of C0RE Team from Qihoo 360</p> 176 177<p>Yajin Zhou of C0RE Team from Qihoo 360</p> 178 179 180</div> 181 182<h2 id=2014>2014</h2> 183 184<div style="LINE-HEIGHT:25px;"> 185<p>Jeff Forristal of <a href="http://www.bluebox.com/blog/">Bluebox 186Security</a></p> 187 188<p>Aaron Mangel of <a href="https://banno.com/">Banno</a> (<a 189href="mailto:amangel@gmail.com">amangel@gmail.com</a>)</p> 190 191<p><a href="http://www.linkedin.com/in/tonytrummer/">Tony Trummer</a> of <a 192href="http://www.themeninthemiddle.com">The Men in the Middle</a> <br>(<a 193href="https://twitter.com/SecBro1">@SecBro1</a>)</p> 194 195<p><a href="http://www.samsung.com">Samsung Mobile</a></p> 196 197<p>Henry Hoggard of <a href="https://labs.mwrinfosecurity.com/">MWR Labs</a> (<a 198href="https://twitter.com/henryhoggard">@HenryHoggard</a>)</p> 199 200<p><a href="http://www.androbugs.com">Yu-Cheng Lin 林禹成</a> (<a 201href="https://twitter.com/AndroBugs">@AndroBugs</a>)</p> 202 203<p><a 204href="http://www.ec-spride.tu-darmstadt.de/en/research-groups/secure-software-engineering-group/staff/siegfried-rasthofer/">Siegfried 205Rasthofer</a> of <a href="http://sseblog.ec-spride.de/">Secure Software 206Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a 207href="mailto:siegfried.rasthofer@gmail.com">siegfried.rasthofer@gmail.com</a>)</p> 208 209<p>Steven Arzt of <a href="http://sseblog.ec-spride.de/">Secure Software 210Engineering Group</a>, EC SPRIDE Technische Universität Darmstadt (<a 211href="mailto:Steven.Arzt@ec-spride.de">Steven.Arzt@ec-spride.de</a>)</p> 212 213<p><a href="http://blog.redfern.me/">Joseph Redfern</a> of <a 214href="https://labs.mwrinfosecurity.com/">MWR Labs</a> <br>(<a 215href="https://twitter.com/JosephRedfern">@JosephRedfern</a>)</p> 216 217<p><a href="https://plus.google.com/u/0/109528607786970714118">Valera 218Neronov</a></p> 219 220<p><a href="https://github.com/michalbednarski">Michał Bednarski</a></p> 221 222<p><a href="http://www.linkedin.com/in/luander">Luander Michel Ribeiro</a> (<a 223href="https://twitter.com/luanderock">@luanderock</a>)</p> 224 225<p>Stephan Huber of Testlab Mobile Security, <a 226href="https://www.sit.fraunhofer.de/">Fraunhofer SIT</a> (<a 227href="mailto:Stephan.Huber@sit.fraunhofer.de">Stephan.Huber@sit.fraunhofer.de</a>) 228</p> 229 230<p><a href="http://www.corkami.com">Ange Albertini</a> (<a 231href="https://twitter.com/angealbertini">@angealbertini</a>)</p> 232 233<p><a href="https://www.linkedin.com/in/tdalvi">Tushar Dalvi</a> (<a 234href="https://twitter.com/tushardalvi">@tushardalvi</a>)</p> 235 236<p>Axelle Apvrille of Fortinet, FortiGuards Labs</p> 237 238<p>Tongxin Li of Peking University (<a 239href="mailto:litongxin1991@gmail.com">litongxin1991@gmail.com</a>)</p> 240 241<p><a href="https://www.facebook.com/zhou.xiaoyong">Xiaoyong Zhou</a> of <a 242href="http://www.cs.indiana.edu/~zhou/">Indiana University Bloomington</a> <br>(<a 243href="https://twitter.com/xzhou">@xzhou</a>, <a 244href="mailto:zhou.xiaoyong@gmail.com">zhou.xiaoyong@gmail.com</a>)</p> 245 246<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana 247University Bloomington (<a 248href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> 249 250<p>Yeonjoon Lee of Indiana University Bloomington (<a 251href="mailto:luc2yj@gmail.com">luc2yj@gmail.com</a>)</p> 252 253<p><a href="http://www.informatics.indiana.edu/xw7/">Xiaofeng Wang</a> of 254Indiana University Bloomington (<a 255href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p> 256 257<p>Xinhui Han of Peking University (<a 258href="mailto:hanxinhui@pku.edu.cn">hanxinhui@pku.edu.cn</a>)</p> 259 260<p><a href="http://thejh.net/">Jann Horn</a> <a href="https://android-review.googlesource.com/#/c/98197/"> 261<img style="vertical-align:middle;" src="../images/tiny-robot.png" 262alt="Green Droid Patch Symbol" 263title="This person contributed code that improved Android security"> 264</a></p> 265 266<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/"> 267Trusted Systems Research Group</a>, US National Security Agency 268<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged"> 269<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol" 270title="This person contributed code that improved Android security"></a></p> 271 272<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/"> 273Trusted Systems Research Group</a>, US National Security Agency 274<a href= 275"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged"> 276<img style="vertical-align:middle" src="../images/tiny-robot.png" 277alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 278 279<p><a href="http://www.linkedin.com/in/billcroberts"> 280William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>) 281<a href= 282"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged"> 283<img style="vertical-align:middle" src="../images/tiny-robot.png" 284alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 285 286<p>Scotty Bauer of University of Utah (<a href="mailto:sbauer@eng.utah.edu">sbauer@eng.utah.edu</a>)</p> 287 288<p><a href="http://www.cs.utah.edu/~rsas/">Raimondas Sasnauskas</a> of University of Utah</p> 289 290<p><a href="http://www.subodh.io">Subodh Iyengar</a> of <a href="https://www.facebook.com">Facebook</a></p> 291 292<p><a href="http://www.shackleton.io/">Will Shackleton</a> of <a href="https://www.facebook.com">Facebook</a></p> 293 294<p>Kunal Patel of <a href="https://www.samsungknox.com/">Samsung KNOX Security Team</a> (<a href="mailto:kunal.patel1@samsung.com">kunal.patel1@samsung.com</a>)</p> 295 296<p>Sebastian Brenza</p> 297 298<p>Wang Tao of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="mailto:wintao@gmail.com">wintao@gmail.com</a>)</p> 299 300<p><a href="http://www.linkedin.com/in/danamodio">Dan Amodio</a> of <a href="https://www.aspectsecurity.com/">Aspect Security</a> (<a href="https://twitter.com/DanAmodio">@DanAmodio</a>)</p> 301 302<p><a href="http://davidmurdoch.com">David Murdoch</a></p> 303 304<p>Alexandru Gheorghita</p> 305 306<p>Mathew Solnik (<a href="https://twitter.com/msolnik">@msolnik</a>)</p> 307 308<p>Marc Blanchou (<a href="https://twitter.com/marcblanchou">@marcblanchou</a>)</p> 309 310<p>Wang Yu of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="https://twitter.com/xi4oyu">@xi4oyu</a>)</p> 311 312<p>Zhang Dong Hui of <a href="http://xteam.baidu.com">Baidu X-Team</a> (<a href="http://weibo.com/shineastdh">shineastdh</a>)</p> 313 314<p>Alex Park (<a href="https://twitter.com/saintlinu">@saintlinu</a>)</p> 315 316<p><a href="http://www.sonymobile.com">Sony Mobile</a></p> 317 318<p><a href="https://twitter.com/isciurus">Andrey Labunets</a> of <a href="https://www.facebook.com">Facebook</a></p> 319 320<p>Imre Rad of <a href="http://www.search-lab.hu/">Search-Lab Ltd.</a></p> 321 322</div> 323 324<h2 id=2013>2013</h2> 325 326<div style="LINE-HEIGHT:25px;"> 327 328<p>Jon Sawyer of <a href="http://appliedcybersecurity.com/">Applied Cybersecurity LLC 329</a> (<a href="mailto:jon@cunninglogic.com">jon@cunninglogic.com</a>)</p> 330 331<p>Joshua J. Drake of <a href="http://www.accuvant.com/">Accuvant LABS 332</a> (<a href="https://twitter.com/jduck">@jduck</a>) 333<a href="https://android-review.googlesource.com/#/q/change:72228+OR+change:72229"> 334<img style="vertical-align:middle" src="../images/patchreward.png" 335alt="Patch Rewards Symbol" title="This person qualified for the Patch Rewards program!"></a></p> 336 337<p>Ruben Santamarta of IOActive 338(<a href="https://twitter.com/reversemode">@reversemode</a>)</p> 339 340<p>Lucas Yang (amadoh4ck) of 341<a href="http://raonsecurity.com/">RaonSecurity</a> 342(<a href="mailto:amadoh4ck@gmail.com">amadoh4ck@gmail.com</a>)</p> 343 344<p><a href="https://tsarstva.bg/sh/">Ivaylo Marinkov</a> 345of <a href="http://www.ecommera.com/">eCommera</a> <br> 346(<a href="mailto:ivo@tsarstva.bg">ivo@tsarstva.bg</a>)</p> 347 348<p><a href="http://roeehay.blogspot.com/">Roee Hay</a> 349<br>(<a href="https://twitter.com/roeehay">@roeehay</a>, 350<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p> 351 352<p>Qualcomm Product Security Initiative</p> 353 354<p><a href="https://lacklustre.net/">Mike Ryan</a> of 355<a href="https://isecpartners.com/">iSEC Partners</a> 356<br>(<a href="https://twitter.com/mpeg4codec">@mpeg4codec</a>, 357<a href="mailto:mikeryan@isecpartners.com">mikeryan@isecpartners.com 358</a>)</p> 359 360<p><a href="http://cryptoonline.com/">Muhammad Naveed</a> 361of <a href="http://illinois.edu/">University of Illinois 362at Urbana-Champaign</a> 363<br>(<a href="mailto:naveed2@illinois.edu">naveed2@illinois.edu</a>)</p> 364 365<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/"> 366Trusted Systems Research Group</a>, US National Security Agency 367<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged"> 368<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol" 369title="This person contributed code that improved Android security"></a></p> 370 371<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/"> 372Trusted Systems Research Group</a>, US National Security Agency 373<a href= 374"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged"> 375<img style="vertical-align:middle" src="../images/tiny-robot.png" 376alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 377 378<p><a href="http://www.linkedin.com/in/billcroberts"> 379William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>) 380<a href= 381"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged"> 382<img style="vertical-align:middle" src="../images/tiny-robot.png" 383alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 384 385<p><a href="http://roeehay.blogspot.com/">Roee Hay</a> 386<br>(<a href="https://twitter.com/roeehay">@roeehay</a>, 387<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p> 388 389<p><a href="http://homes.soic.indiana.edu/luyixing">Luyi Xing</a> of Indiana 390University Bloomington (<a 391href="mailto:xingluyi@gmail.com">xingluyi@gmail.com</a>)</p> 392 393<p>Xiaorui Pan of Indiana University Bloomington (<a href="mailto:eagle200467@gmail.com">eagle200467@gmail.com</a>)<p> 394 395<p>XiaoFeng Wang of Indiana University Bloomington (<a href="mailto:xw7@indiana.edu">xw7@indiana.edu</a>)</p> 396 397<p>Kan Yuan</p> 398 399</div> 400<h2 id=2012>2012</h2> 401 402<div style="LINE-HEIGHT:25px;"> 403 404<p>Robert Craig of <a href="https://www.nsa.gov/research/ia_research/"> 405Trusted Systems Research Group</a>, US National Security Agency 406<a href="https://android-review.googlesource.com/#/q/owner:%22Robert+Craig+%253Crpcraig%2540tycho.ncsc.mil%253E%22+status:merged"> 407<img style="vertical-align:middle" src="../images/tiny-robot.png" alt="Patch Symbol" 408title="This person contributed code that improved Android security"></a></p> 409 410<p>Stephen Smalley of <a href="https://www.nsa.gov/research/ia_research/"> 411Trusted Systems Research Group</a>, US National Security Agency 412<a href= 413"https://android-review.googlesource.com/#/q/owner:%22Stephen+Smalley+%253Csds%2540tycho.nsa.gov%253E%22+status:merged"> 414<img style="vertical-align:middle" src="../images/tiny-robot.png" 415alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 416 417<p><a href="http://www.linkedin.com/in/billcroberts"> 418William Roberts</a> (<a href="mailto:bill.c.roberts@gmail.com">bill.c.roberts@gmail.com</a>) 419<a href= 420"https://android-review.googlesource.com/#/q/owner:bill.c.roberts%2540gmail.com+status:merged"> 421<img style="vertical-align:middle" src="../images/tiny-robot.png" 422alt="Patch Symbol" title="This person contributed code that improved Android security"></a></p> 423 424<p><a href="http://thejh.net/">Jann Horn</a></p> 425 426<p>Ravishankar Borgaonkar of TU Berlin 427(<a href="https://twitter.com/raviborgaonkar">@raviborgaonkar</a>)</p> 428 429<p><a href="http://roeehay.blogspot.com/">Roee Hay</a> 430<br>(<a href="https://twitter.com/roeehay">@roeehay</a>, 431<a href="mailto:roeehay@gmail.com">roeehay@gmail.com</a>)</p> 432 433<p>David Weinstein of <a href="https://viaforensics.com/">viaForensics</a> (<a href="https://twitter.com/insitusec">@insitusec</a>)</p> 434 435</div> 436 437<h2 id=2011>2011</h2> 438 439<div style="LINE-HEIGHT:25px;"> 440 441<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> 442 443</div> 444 445<h2 id=2009>2009</h2> 446 447<div style="LINE-HEIGHT:25px;"> 448 449<p>Collin Mulliner of <a href="http://www.mulliner.org/collin/academic">MUlliNER.ORG</a> (<a href="https://twitter.com/collinrm">@collinrm</a>)</p> 450 451<p>Charlie Miller (<a href="https://twitter.com/0xcharlie">@0xcharlie</a>)</p> 452 453</div> 454