What does a “security audit” consist of?
We’ve spent months with Linden Lab engineers dedicated to reviewing the design decisions over the years, finding and fixing flaws that they find. We’ve had developers pore over the results of security flaw detection tools, meticulously sorting out false positives from potential issues, and placing additional safeguards in those areas.