Completed
Introduction
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Attacking and Defending Blockchains - From Horror Stories to Secure Wallets
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Crypto Wallets
- 3 Hot Wallets
- 4 Online Wallets
- 5 Advantages
- 6 Online interfaces
- 7 Phishing
- 8 Mobile Wallet
- 9 Mobile Wallet Advantages
- 10 Desktop Wallet Advantages
- 11 Desktop Wallet Interface
- 12 Desktop Wallet Example
- 13 Password Generation
- 14 Password Encryption
- 15 Paper Wallet
- 16 Hardware
- 17 Security Risks
- 18 Hardware vs Software
- 19 Best Practices
- 20 General Recommendations
- 21 Exchanges
- 22 Kraken
- 23 Hardware Storage
- 24 HSN
- 25 Warm Waters
- 26 Bitcoin
- 27 Design vs Implementation
- 28 Sonataker
- 29 Worst Bugs
- 30 Bitcoin Bug
- 31 DAO Bug
- 32 Smart Contract Attack
- 33 Smart Contract Programming
- 34 Ethics
- 35 Double Spend
- 36 Design Bug
- 37 Collisions
- 38 What can be done
- 39 Design Cryptography
- 40 Parity
- 41 Smart Contract
- 42 Bug in Pattern
- 43 IOTA
- 44 You just dont do this
- 45 This was ridiculous
- 46 In the java flow
- 47 Whitepaper
- 48 Blackpaper
- 49 Difficulty
- 50 Conclusion