"The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer."
Links to the best articles, videos and podcasts about Security in the crypto space.
"Over 300 Twitter accounts are trying to steal your money."
"Within a matter of hours, Coinbase Security detected and blocked the attack. Here’s how it unfolded."
"The following text will guide you through the biggest advantages Security Tokens will bring to us."
"Only 2 percent of the 200,000 bitcoin transactions in the data set were deemed illicit as part of Eliptic’s initial work. While 21 percent were identified as lawful, the vast majority of the transactions, roughly 77 percent, remained unclassified."
"From Mt. Gox and Bitconnect to the recent QuadrigaCX scandal, the staggering amounts involved will make your jaw drop."
"This incredibly expensive approach is an unlikely strategy for Bitcoin fraud"
"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"
"An in-depth guide on how to be safe in the crypto world and the online world in general."
"An incident will happen at some point. Here’s how to respond."
"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."
"Be careful with what you install."
"Stop handing out your information without doing your due diligence."
"You are harming your users and the ecosystem when you allow people to enter their private keys, keystore files, or mnemonic phrases on your website."
"tldr: I got SIM swapped last weekend and you probably will too. Here’s how I walked away relatively unscathed (knock on wood) and what you should do to protect yourself."
"How to protect yourself from a SIM hijack, deal with an attack as it happens, and recover afterwards."
"Now, some big strides in another hugely important field of cryptography – secure multiparty computation, or MPC – point to a potential Holy Grail situation of both usability and security in a decentralized system."
"Warith Al Maawali, much to his dismay, found his Coinomi wallet compromised and the funds contained in it stolen"