|
本帖最后由 nafizcristia98 于 2024-3-4 01:27 编辑
After spending about a year on the BYOT experiment, we’ve decided to sunset it. In short, it didn’t work; we didn’t hire any teams as a result. There were a few reasons for this, which we learned along the way. First, coordinating multiple career moves at once is even more logistically tricky than we realized. Many candidates who considered BYOT ended up applying as individuals. Second, much of the interest in We’re excited to be in touch with some of these teams again when we expand to their home countries. We’ll be taking much of what we learned through this experiment and applying it to our standard hiring process.
For example, many candidates appreciated the explicit guidance for what to expect when interviewing, and the timeline on which to expect it. We’re also still open to allowing multiple candidates who know each other to apply at the sametime without the BYOT Binance App Users Data structure; if you’re interested, come talk to us. While we’re sorry this experiment didn’t work out, we’re never done tweaking and improving our hiring process. If you’ve got suggestions, let us know!Upgrading to SHA- and TLS April , Karla Burnett User Security Update All requests made to Stripe servers using older versions of TLS are now blocked.
We've announced our final deprecation timeline for older versions of TLS. The Payment Card Industry Security Standards Council has extended its deadline for phasing out TLS As a result, we are re-evaluating our deprecation schedule for SHA- based ciphers, TLS , and TLS Our SHA- signed certificate will still expire on December th. To keep your integration with Stripe secure, we plan to progressively phase out support for old technologie (These protocols currently power the ‘Secure’ in ‘HTTPS’.) We’re sticklers for API backwards-compatibility and make potentially breaking changes only when absolutely necessary. Our users’ security is paramount, so deprecating these outdated technologies is one of those rare cases. We hope their flawed designs become footnotes in cryptographic history as quickly as possible.
|
|