I’m thrilled to announce that Colm is joining our little project as Security Engineer, starting today.

Colm is a longstanding (and outstanding!) member of our community who has been involved with the the DAO 1.0 Framework since January. He uncovered some very clever security issues including the so called “Colm Attack” *.

In a past life, Colm worked in application security for a payment processing company, but “got bored of this quickly” as he puts it. He has also worked for Intel and as a co-founder of a startup which taught computer programming.

Colm holds a BENG from Maynooth University and a MSc from UCD. He is also currently working on his PhD in Theoretical Physics in UCD, where he studies the conformational dynamics of biological systems using atomistic molecular dynamic simulations. I actually didn’t make that last sentence up, believe it or not.

Colm will be working part time at Slock.it as a Security Engineer to continuously studying and improve the security of the Framework smart contracts.

He will also perform security audits of the upcoming Slock.it smart contracts at the heart of the Ethereum Computer. We’re excited to have Colm as part of team, and we can’t wait to build amazing products together!

Welcome, Colm!

* In the Colm Attack, an attacker could create a proposal with an extremely large deposit, then immediately create a split DAO proposal to get his share of initial ETH plus his share of the deposit he put in. Because the deposit artificially inflates the DAO ETH holdings, the attacker could obtain slighlty more than he should have received post split.