Fairpool

Fairpool AMA on Jun 2, 2023


Listen Later

We talked about attack vectors in crypto.


Broadly speaking, the attack vectors can be divided into "physical" and "logical".


Physical attack vectors:


* Theft

* Extortion

* Kidnapping

* Duplication (physical copy)


Logical attack vectors:


* Without secret extraction

* With secret extraction


Logical attack vectors without secret extraction:


* Phishing

* Spoofing

* Social engineering ("Claim your airdrop", etc)


Logical attack vectors with secret extraction:


* Side channel attacks

* Code dependency attacks

* Weak password decryption

* Signature algorithm hacks

* Malware

* Ransomware


Lastly, we have events that are not attacks but still lead to loss-of-funds:


* Forgetting the password

* Loss of multiple backups


We'll be researching the best strategy for dealing with those threats.

...more
View all episodesView all episodes
Download on the App Store

FairpoolBy Fairpool