Syd Intelligence
  • Syd Overview
  • Applications
    • Wallet Protection
    • Social Threat Intelligence
  • Vision for Open Threat Intelligence
  • Bounty Program
    • Bounty Events
    • Syd Ambassador Program
Powered by GitBook
On this page
  1. Applications

Social Threat Intelligence

PreviousWallet ProtectionNextVision for Open Threat Intelligence

Last updated 7 months ago

The majority of online threats originate from social networks like Twitter, Telegram, and Discord. Despite this fact, most web3 security products focus their protection entirely on the digital asset space.

Syd goes beyond traditional web3 threat intelligence, augmenting best-of-breed data sources with an additional layer of social intelligence. For wallets, this means users gain protection from the most common real-world attack vectors in addition to traditional dApp-based intelligence.