Hacker And The Fed cover image

The Silk Road Bitcoin Hack

Hacker And The Fed

CHAPTER

Is There Still a Risk?

Hector: If you're using a phone that is compromised or a device that is compromised, all of those security features and tools become academic and best. This is why it's extremely important to make sure that your devices, your endpoints, your mobile phones are always updated. And then take the extra steps, like Hector said, knowing if your phone's been maliciously taken over. Use networks that you know are secure.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner