Главная
Study mode:
on
1
Introduction
2
Crypto Wallets
3
Hot Wallets
4
Online Wallets
5
Advantages
6
Online interfaces
7
Phishing
8
Mobile Wallet
9
Mobile Wallet Advantages
10
Desktop Wallet Advantages
11
Desktop Wallet Interface
12
Desktop Wallet Example
13
Password Generation
14
Password Encryption
15
Paper Wallet
16
Hardware
17
Security Risks
18
Hardware vs Software
19
Best Practices
20
General Recommendations
21
Exchanges
22
Kraken
23
Hardware Storage
24
HSN
25
Warm Waters
26
Bitcoin
27
Design vs Implementation
28
Sonataker
29
Worst Bugs
30
Bitcoin Bug
31
DAO Bug
32
Smart Contract Attack
33
Smart Contract Programming
34
Ethics
35
Double Spend
36
Design Bug
37
Collisions
38
What can be done
39
Design Cryptography
40
Parity
41
Smart Contract
42
Bug in Pattern
43
IOTA
44
You just dont do this
45
This was ridiculous
46
In the java flow
47
Whitepaper
48
Blackpaper
49
Difficulty
50
Conclusion
Description:
Explore a comprehensive conference talk that delves into the world of blockchain security, examining notorious failures and providing strategies for risk mitigation. Analyze dramatic Ethereum smart contract issues, objectively evaluate the case of Iota's custom crypto, and discover how millions of dollars worth of tokens could have been stolen. Gain insights into bugs found in popular Bitcoin software utilities and learn about various types of crypto wallets, including hot wallets, online wallets, mobile wallets, desktop wallets, paper wallets, and hardware wallets. Understand the advantages and disadvantages of each wallet type, and discover best practices for securing your digital assets. Examine the design and implementation of Bitcoin, explore the worst bugs in blockchain history, and learn about smart contract attacks and programming. Dive into the ethics of blockchain security, double spend attacks, and design bugs. Conclude with a discussion on the importance of proper cryptography design and the challenges faced in the blockchain industry. Read more

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Black Hat
Add to list