Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Introduction
00:00 • 2min
The Three Body Problems
02:11 • 5min
Mark Carpilis: The King of Bitcoin
06:57 • 2min
The DAO Hack
08:51 • 4min
Ethereum's Re-Entrancy Attack
12:25 • 2min
The History of Cryptocurrency Hacks
13:55 • 2min
The Economic Hack Bundle
16:13 • 2min
The Mango Native Token Hack
18:25 • 2min
Cryptocurrency: How to Avoid Price Manipulation
20:42 • 2min
The Hacker's Flash Loan
22:46 • 2min
The Hacker Takes Off With $180 Million
24:57 • 2min
The Unsafe External Calls Attack
26:33 • 4min
The Top 4 Bridge Hacks in History
30:35 • 2min
The Binance Hack
32:15 • 3min
The Nuance of Bridge Hacks
35:16 • 3min
The Importance of Trust in Blockchain
38:00 • 2min
The Different Types of Bridges I Trust
40:29 • 2min
The Risks of Using Cryptocurrencies
42:49 • 2min
The Axie Infiniti Bridge Hack
44:48 • 2min
The Crypto Security Stack
46:23 • 2min
How to Protect Yourself From Phishing Attacks
48:49 • 4min
How to Use Phantoms to Protect Your Assets
52:23 • 2min
How to Protect Your Cryptocurrency From Phishing
54:22 • 3min
Zappo: The Basics
57:31 • 2min
How to Write a Secure Smart Contract
59:18 • 2min
Automated Auditing for Smart Contracts
01:00:57 • 2min
The Importance of Automated Auditing in the Smart Contract Industry
01:03:11 • 2min
The Importance of Bug Bounty Platforms
01:05:04 • 3min
The Importance of Monitoring Hacks Early
01:07:35 • 3min