Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Black Hat via YouTube Direct link

Intro

1 of 31

1 of 31

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What's a wallet
  3. 3 Hot vs. Cold
  4. 4 Different types of wallets
  5. 5 Online wallet
  6. 6 Online interfaces
  7. 7 Mobile wallet
  8. 8 Desktop wallet
  9. 9 Paper wallet
  10. 10 Hardware wallet: not perfect
  11. 11 Typical setup for individuals
  12. 12 Recommendations
  13. 13 Exchanges and wallets
  14. 14 Exchanges and hardware wallets?
  15. 15 "Warm" wallets
  16. 16 Are blockchains secure?
  17. 17 Blockchain bugs?
  18. 18 Multiple targets
  19. 19 Attackers goals
  20. 20 Bitcoin overflow (CVE-2010-5139)
  21. 21 Ethereum reentrancy (a.k.a. DAO bug)
  22. 22 What happened? (simplified)
  23. 23 Lessons and solutions
  24. 24 3. Zerocoin multi-spend
  25. 25 Lisk account hijack
  26. 26 Parity wallet bug
  27. 27 IOTA's hash function
  28. 28 Bitgrail withdrawals
  29. 29 Batch Overflow
  30. 30 Verge
  31. 31 BIP32 tools (pt. 1)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.