Главная
Study mode:
on
1
Intro
2
What's a wallet
3
Hot vs. Cold
4
Different types of wallets
5
Online wallet
6
Online interfaces
7
Mobile wallet
8
Desktop wallet
9
Paper wallet
10
Hardware wallet: not perfect
11
Typical setup for individuals
12
Recommendations
13
Exchanges and wallets
14
Exchanges and hardware wallets?
15
"Warm" wallets
16
Are blockchains secure?
17
Blockchain bugs?
18
Multiple targets
19
Attackers goals
20
Bitcoin overflow (CVE-2010-5139)
21
Ethereum reentrancy (a.k.a. DAO bug)
22
What happened? (simplified)
23
Lessons and solutions
24
3. Zerocoin multi-spend
25
Lisk account hijack
26
Parity wallet bug
27
IOTA's hash function
28
Bitgrail withdrawals
29
Batch Overflow
30
Verge
31
BIP32 tools (pt. 1)
Description:
Explore a comprehensive review of blockchain security failures and risk mitigation strategies in this Black Hat conference talk. Delve into various wallet types, including hot, cold, online, mobile, desktop, paper, and hardware wallets, and understand their strengths and vulnerabilities. Learn about typical setups for individuals and receive recommendations for secure practices. Examine the relationship between exchanges and wallets, and investigate the concept of "warm" wallets. Analyze notable blockchain bugs and attacks, such as the Bitcoin overflow, Ethereum reentrancy, Zerocoin multi-spend, Lisk account hijack, Parity wallet bug, IOTA's hash function issues, Bitgrail withdrawals, Batch Overflow, and Verge vulnerabilities. Gain insights into BIP32 tools and their implications for blockchain security.

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Black Hat
Add to list