Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

1/ 3
10 Ways Hackers Will Try to Steal Your Bitcoin

"Ten of these threats involved attacks from hackers rather than something like user error or hardware malfunction. Let’s take a closer look at the ten different ways hackers can try to gain access to your Bitcoin private keys."

1/ 3
How To Make A Bitcoin Paper Wallet & How To Spend Bitcoins

"When you are storing your bitcoins for a longer term, using a paper wallet ensures maximum safety. In this tutorial, you will learn how you can make a Bitcoin paper wallet."

2/ 3
Bitcoin Timestamp Security

"Bitcoin is often referred to as a secure timestamping service. We never had a global record of truth with trustworthy timestamps, so how did this come about? It’s generally due to Proof of Work being combined to a few simple rules by which miners must abide."

1/ 3
Is blockchain hackable?

"Blockchain is hackable but it’s often an expensive and time-consuming process. A blockchain can be hacked via three main avenues: on protocol, in exchanges and via people’s wallets through phishing and other classic online scams.

1/ 3
How to Store Your Bitcoin

"Before owning any bitcoin, you need somewhere to store them. That place is called a “wallet.” Rather than actually holding your bitcoin, it holds the private key that allows you to access your bitcoin address (which is also your public key). If the wallet software is well designed, it will look as if your bitcoins are actually there, which makes using bitcoin more convenient and intuitive."

1/ 3
Don’t make these five common mistakes about blockchains and cryptocurrency.

"Breaking down misconceptions about these technologies"

2/ 3
Bitcoin’s Security Model: A Deep Dive

"Every security model has two main parts: assumptions and guarantees. If the assumptions used as inputs hold true, then so should the guarantees that are output by the model."

2/ 3
Quantum Attacks on Bitcoin, and How to Protect Against Them

"The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer."

1/ 3
Research into Trust-Trading Scams on Twitter

"Over 300 Twitter accounts are trying to steal your money."

2/ 3
Responding to Firefox 0-days in the wild

"Within a matter of hours, Coinbase Security detected and blocked the attack. Here’s how it unfolded."

1/ 3
5 Advantages of Security Tokens

"The following text will guide you through the biggest advantages Security Tokens will bring to us."

2/ 3
MIT’s AI Lab Analyzed 200,000 Bitcoin Transactions. Only 2% Were ‘Illicit’

"Only 2 percent of the 200,000 bitcoin transactions in the data set were deemed illicit as part of Eliptic’s initial work. While 21 percent were identified as lawful, the vast majority of the transactions, roughly 77 percent, remained unclassified."

1/ 3
7 most-damaging Bitcoin scams and hacks of all time

"From Mt. Gox and Bitconnect to the recent QuadrigaCX scandal, the staggering amounts involved will make your jaw drop."

1/ 3
What is a 51% attack, and what can a successful attacker do?

"This incredibly expensive approach is an unlikely strategy for Bitcoin fraud"

2/ 3
Bitcoin Cash 51% Attack & On-Chain Analysis With Willy Woo

"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"

1/ 3
MyCrypto’s Security Guide For Dummies And Smart People Too

"An in-depth guide on how to be safe in the crypto world and the online world in general."

1/ 3
MyCrypto’s (Opinionated) Security Incident Response 101

"An incident will happen at some point. Here’s how to respond."

2/ 3
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."

Subscribe to our newsletter - get a weekly round-up right to your inbox.