
Sign up to save your podcasts
Or
We talked about attack vectors in crypto.
Broadly speaking, the attack vectors can be divided into "physical" and "logical".
Physical attack vectors:
* Theft
* Extortion
* Kidnapping
* Duplication (physical copy)
Logical attack vectors:
* Without secret extraction
* With secret extraction
Logical attack vectors without secret extraction:
* Phishing
* Spoofing
* Social engineering ("Claim your airdrop", etc)
Logical attack vectors with secret extraction:
* Side channel attacks
* Code dependency attacks
* Weak password decryption
* Signature algorithm hacks
* Malware
* Ransomware
Lastly, we have events that are not attacks but still lead to loss-of-funds:
* Forgetting the password
* Loss of multiple backups
We'll be researching the best strategy for dealing with those threats.
We talked about attack vectors in crypto.
Broadly speaking, the attack vectors can be divided into "physical" and "logical".
Physical attack vectors:
* Theft
* Extortion
* Kidnapping
* Duplication (physical copy)
Logical attack vectors:
* Without secret extraction
* With secret extraction
Logical attack vectors without secret extraction:
* Phishing
* Spoofing
* Social engineering ("Claim your airdrop", etc)
Logical attack vectors with secret extraction:
* Side channel attacks
* Code dependency attacks
* Weak password decryption
* Signature algorithm hacks
* Malware
* Ransomware
Lastly, we have events that are not attacks but still lead to loss-of-funds:
* Forgetting the password
* Loss of multiple backups
We'll be researching the best strategy for dealing with those threats.