Public Key cover image

Behind The Scenes Of The BadgerDAO Hack

Public Key

00:00

How to Move Authentication From the Web Two Into the Web Three

There's a potential that the attacker may let the funds just sit there for a long period of time, hope people give up. And then they may very quickly attempt to move those funds through a series of, say, mixers and counterparties whoe are not collecting kwiseeor something like that. But they're not going to get away with that,. They're not wer. That last part is kind of amazing. I'm sure we have some people out there who are listening that either are yo members of a dow or use a defid protocol, or potential are building. Any advice that you would give to them on how they can cind of hard harden the platform,

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app