Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Security

Links to the best articles, videos and podcasts about Security in the crypto space.

2/ 3
Bitcoin Cash 51% Attack & On-Chain Analysis With Willy Woo

"A 51% attack took place on the Bitcoin Cash blockchain and brings the key value proposition of the network into question"

1/ 3
MyCrypto’s Security Guide For Dummies And Smart People Too

"An in-depth guide on how to be safe in the crypto world and the online world in general."

1/ 3
MyCrypto’s (Opinionated) Security Incident Response 101

"An incident will happen at some point. Here’s how to respond."

2/ 3
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

"We present eclipse attacks on bitcoin’s peer-to-peer net-work. Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connec-tions to and from a victim bitcoin node. The attacker canthen exploit the victim for attacks on bitcoin’s miningand consensus system, includingN-confirmation doublespending, selfish mining, and adversarial forks in theblockchain."

2/ 3
The dangers of malicious browser extensions

"Be careful with what you install."

2/ 3
Be careful with your KYC documents

"Stop handing out your information without doing your due diligence."

2/ 3
Private Keys + Websites = 💀

"You are harming your users and the ecosystem when you allow people to enter their private keys, keystore files, or mnemonic phrases on your website."

1/ 3
Everybody is getting tragically sim swapped and you will too

"tldr: I got SIM swapped last weekend and you probably will too. Here’s how I walked away relatively unscathed (knock on wood) and what you should do to protect yourself."

2/ 3
The SIM Swapping Bible: What To Do When SIM-Swapping Happens To Yo

"How to protect yourself from a SIM hijack, deal with an attack as it happens, and recover afterwards."

2/ 3
MPC Explained: The Bold New Vision for Securing Crypto Money

"Now, some big strides in another hugely important field of cryptography – secure multiparty computation, or MPC – point to a potential Holy Grail situation of both usability and security in a decentralized system."

2/ 3
How (Not) To React When Your Cryptocurrency Is Stolen

"Warith Al Maawali, much to his dismay, found his Coinomi wallet compromised and the funds contained in it stolen"

1/ 3
Current security threats in crypto and how to mitigate them

"With the advent of Bitcoin and cryptocurrencies we acquire the ability to be our own banks, with the set back that we don’t acquire natively the ability to safeguard it."

2/ 3
The Most Expensive Lesson Of My Life: Details of SIM port hack

"I lost north of $100,000 last Wednesday. It evaporated over a 24-hour time span in a “SIM port attack” that drained my Coinbase account. It has been four days since the incident and I’m gutted. I have zero appetite; my sleep is restless; I am awash in feelings of anxiety, remorse, and embarrassment."

2/ 3
Bitcoin’s Security is Fine

"This article comprehensively addresses concerns around Bitcoin’s security model which is funded by the block subsidy and transaction fees."

1/ 3
If bitcoin is so safe, why does it keep getting hacked?

"Thieves have stolen millions of dollars in bitcoin from exchanges. Here’s why it keeps happening."

2/ 3
Rewriting History: A Brief Introduction to Long Range Attacks

"One of the greatest threats against Proof of Stake protocols is Long Range attacks. Due to the existence of Weak Subjectivity and Costless Simulation, these attacks are more dangerous than in Proof of Work protocols."

1/ 3
A Timeline of the Most Infamous 51% Attacks in Crypto History

"Proof-of-work cryptocurrencies solve the Byzantine General's Problem and allow for the coordination of a decentralized network of nodes, where some of those nodes may be bad actors. This does, however, creates an attack surface for proof-of-work cryptocurrencies, known as a 51% attack."

2/ 3
Breaking Down the “Flash Boys” DEX Trading Bots Bloomberg Article

"It’s great to see this type of thing picked up by larger media outlets, but while it highlights a lot of interesting points, some of the concepts in the bloomberg article are pretty vague and oversimplified. For example, the main front running problem with DEX’s discussed only applies to a specific type of DEX — others have already solved this."

Subscribe to our newsletter - get a weekly round-up right to your inbox.