Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Black Hat via YouTube Direct link

Introduction

1 of 50

1 of 50

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Attacking and Defending Blockchains - From Horror Stories to Secure Wallets

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Crypto Wallets
  3. 3 Hot Wallets
  4. 4 Online Wallets
  5. 5 Advantages
  6. 6 Online interfaces
  7. 7 Phishing
  8. 8 Mobile Wallet
  9. 9 Mobile Wallet Advantages
  10. 10 Desktop Wallet Advantages
  11. 11 Desktop Wallet Interface
  12. 12 Desktop Wallet Example
  13. 13 Password Generation
  14. 14 Password Encryption
  15. 15 Paper Wallet
  16. 16 Hardware
  17. 17 Security Risks
  18. 18 Hardware vs Software
  19. 19 Best Practices
  20. 20 General Recommendations
  21. 21 Exchanges
  22. 22 Kraken
  23. 23 Hardware Storage
  24. 24 HSN
  25. 25 Warm Waters
  26. 26 Bitcoin
  27. 27 Design vs Implementation
  28. 28 Sonataker
  29. 29 Worst Bugs
  30. 30 Bitcoin Bug
  31. 31 DAO Bug
  32. 32 Smart Contract Attack
  33. 33 Smart Contract Programming
  34. 34 Ethics
  35. 35 Double Spend
  36. 36 Design Bug
  37. 37 Collisions
  38. 38 What can be done
  39. 39 Design Cryptography
  40. 40 Parity
  41. 41 Smart Contract
  42. 42 Bug in Pattern
  43. 43 IOTA
  44. 44 You just dont do this
  45. 45 This was ridiculous
  46. 46 In the java flow
  47. 47 Whitepaper
  48. 48 Blackpaper
  49. 49 Difficulty
  50. 50 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.