Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

2/ 3
Quantum Attacks on Bitcoin, and How to Protect Against Them

"The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer."

1/ 3
Research into Trust-Trading Scams on Twitter

"Over 300 Twitter accounts are trying to steal your money."

2/ 3
Responding to Firefox 0-days in the wild

"Within a matter of hours, Coinbase Security detected and blocked the attack. Here’s how it unfolded."

1/ 3
5 Advantages of Security Tokens

"The following text will guide you through the biggest advantages Security Tokens will bring to us."

2/ 3
MIT’s AI Lab Analyzed 200,000 Bitcoin Transactions. Only 2% Were ‘Illicit’

"Only 2 percent of the 200,000 bitcoin transactions in the data set were deemed illicit as part of Eliptic’s initial work. While 21 percent were identified as lawful, the vast majority of the transactions, roughly 77 percent, remained unclassified."

1/ 3
7 most-damaging Bitcoin scams and hacks of all time

"From Mt. Gox and Bitconnect to the recent QuadrigaCX scandal, the staggering amounts involved will make your jaw drop."

1/ 3
What is a 51% attack, and what can a successful attacker do?

"This incredibly expensive approach is an unlikely strategy for Bitcoin fraud"

2/ 3
Bitcoin Cash 51% Attack & On-Chain Analysis With Willy Woo

"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"

1/ 3
MyCrypto’s Security Guide For Dummies And Smart People Too

"An in-depth guide on how to be safe in the crypto world and the online world in general."

1/ 3
MyCrypto’s (Opinionated) Security Incident Response 101

"An incident will happen at some point. Here’s how to respond."

2/ 3
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."

2/ 3
The dangers of malicious browser extensions

"Be careful with what you install."

2/ 3
Be careful with your KYC documents

"Stop handing out your information without doing your due diligence."

2/ 3
Private Keys + Websites = 💀

"You are harming your users and the ecosystem when you allow people to enter their private keys, keystore files, or mnemonic phrases on your website."

1/ 3
Everybody is getting tragically sim swapped and you will too

"tldr: I got SIM swapped last weekend and you probably will too. Here’s how I walked away relatively unscathed (knock on wood) and what you should do to protect yourself."

2/ 3
The SIM Swapping Bible: What To Do When SIM-Swapping Happens To Yo

"How to protect yourself from a SIM hijack, deal with an attack as it happens, and recover afterwards."

2/ 3
MPC Explained: The Bold New Vision for Securing Crypto Money

"Now, some big strides in another hugely important field of cryptography – secure multiparty computation, or MPC – point to a potential Holy Grail situation of both usability and security in a decentralized system."

2/ 3
How (Not) To React When Your Cryptocurrency Is Stolen

"Warith Al Maawali, much to his dismay, found his Coinomi wallet compromised and the funds contained in it stolen"

Subscribe to our newsletter - get a weekly round-up right to your inbox.