How To Compromise A Cryptocurrency Hardware Wallet

  • With anything involving tech and security, what is a question that we should consider that I mention early in the video?
  • How can we apply this question to topics which may make us feel uncomfortable or uncertain and what is it about our present behavior that makes us feel uncomfortable?
  • What is wrong with the two lines of thinking — “It’s safe because I don’t know” and “It’s safe because it hasn’t been done before”? In what other areas of security are these lines of thinking dangerous?
  • When it comes to security, how can we apply “what people want to know” versus “what is actually true” and what are some action steps we can take to ensure we’re not doing the same thing?
  • What is one counterparty risk of the digital world and how are your actions in the digital world taking this into account?




Data | Development | Security.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Hackster’s Handpicked Projects of the Week

[Some Interesting] Cloud ‘n Sec news: 25th Feb 22

CHFI - The Ultimate Ticket to Computer Forensics

Understanding Threat Modeling

Writeup: CSRF where token is tied to non-session cookie @ PortSwigger Academy

What If You Were President? BANANO and NFT prizes!

How to Use the Hurricane Bridge (For Heco & BSC Users)

Why is randomness important, especially in the world of cryptocurrencies? (Part 1)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
SQLInSix Minutes

SQLInSix Minutes

Data | Development | Security.

More from Medium

Tokenization on a blockchain

Crypto Daily News 5/19

Degens gone charity: An online series exploring new Web3 use cases

Buying or selling on Smartplace is easier than you think