Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Introduction
00:00 ⢠2min
The Three Body Problems
02:11 ⢠5min
Mark Carpilis: The King of Bitcoin
06:57 ⢠2min
The DAO Hack
08:51 ⢠4min
Ethereum's Re-Entrancy Attack
12:25 ⢠2min
The History of Cryptocurrency Hacks
13:55 ⢠2min
The Economic Hack Bundle
16:13 ⢠2min
The Mango Native Token Hack
18:25 ⢠2min
Cryptocurrency: How to Avoid Price Manipulation
20:42 ⢠2min
The Hacker's Flash Loan
22:46 ⢠2min
The Hacker Takes Off With $180 Million
24:57 ⢠2min
The Unsafe External Calls Attack
26:33 ⢠4min
The Top 4 Bridge Hacks in History
30:35 ⢠2min
The Binance Hack
32:15 ⢠3min
The Nuance of Bridge Hacks
35:16 ⢠3min
The Importance of Trust in Blockchain
38:00 ⢠2min
The Different Types of Bridges I Trust
40:29 ⢠2min
The Risks of Using Cryptocurrencies
42:49 ⢠2min
The Axie Infiniti Bridge Hack
44:48 ⢠2min
The Crypto Security Stack
46:23 ⢠2min
How to Protect Yourself From Phishing Attacks
48:49 ⢠4min
How to Use Phantoms to Protect Your Assets
52:23 ⢠2min
How to Protect Your Cryptocurrency From Phishing
54:22 ⢠3min
Zappo: The Basics
57:31 ⢠2min
How to Write a Secure Smart Contract
59:18 ⢠2min
Automated Auditing for Smart Contracts
01:00:57 ⢠2min
The Importance of Automated Auditing in the Smart Contract Industry
01:03:11 ⢠2min
The Importance of Bug Bounty Platforms
01:05:04 ⢠3min
The Importance of Monitoring Hacks Early
01:07:35 ⢠3min


