Logo
    Search

    Crypto Security and the New Web3 Mindsets for Users

    enOctober 15, 2021

    Podcast Summary

    • Shifting from intermediaries to self-managed crypto securityUnderstand the importance of managing your own crypto security, as intermediaries are no longer responsible for securing your assets. Be vigilant against phishing attacks and other methods used to steal private information.

      In the world of crypto security, the shift from traditional financial institutions to decentralized systems brings both incredible opportunities and terrifying responsibilities. While the underlying crypto networks are strong and secure, users must take charge of their own security by managing the secrets that grant access to their assets. This means a mindset shift from relying on intermediaries to controlling access directly. However, it's important to understand that not all crypto hacks involve breaches of the blockchain itself. Some hacks involve tricking users into revealing their private information, which can then be used to gain unauthorized access to their crypto assets. As we navigate this new era of Web 3 and crypto, it's crucial to stay informed and prioritize security best practices.

    • Social engineering attacks in cryptoStay vigilant against social engineering attacks in crypto by never sharing your seed phrase and double-checking transactions, especially on new and unverified sites.

      While the security of cryptocurrency vaults has remained strong, users have fallen victim to various forms of social engineering attacks. One common method is when individuals posing as support agents ask for seed phrases under the guise of debugging issues. This is equivalent to handing over your password in the web 3.0 world. Another attack vector is during NFT transactions on untrusted sites. Users may unknowingly sign transactions that transfer funds or grant permissions to adversaries. As the crypto landscape has evolved over the last 12 years, the importance of security has become more apparent. Early adopters often stored keys on hard drives or wrote them down in notepad, but these methods were far from secure. The introduction of mnemonic seed phrases has made it easier for users to store and retain their keys. However, it's crucial to remember that these sequences are valuable and must be kept secret. The Wild West days of crypto are slowly fading, but users must remain vigilant against social engineering attacks. Always double-check transactions, especially on new and unverified sites, and never share your seed phrase with anyone.

    • The Importance and Portability of BIP 39 Seed Phrase in Web 3 WalletsThe BIP 39 seed phrase is a crucial component of web 3 wallets, representing your private key and allowing easy transfer of crypto assets between different wallet interfaces. Ensure its safe storage and recovery as it's the key to accessing your digital assets.

      The BIP 39 seed phrase is a crucial component of web 3 wallets, acting as a portable and encrypted representation of your private key. Unlike traditional banking methods, where you must close an account and create a new one to transfer funds, the seed phrase allows you to easily move your crypto assets between different wallet interfaces. However, it's essential to ensure the safe storage and recovery of these seed phrases, as they are the keys to accessing your digital assets. A common misconception is that the seed phrase is merely a password or a login credential. Instead, it is the actual representation of your private key. This portability is a significant improvement in the user experience of web 3, making it more accessible and convenient than the old banking models. Currently, people store their seed phrases on paper or use metal wallets to ensure their longevity. However, relying solely on memory or paper storage is not secure and user-friendly. As technology advances, new methods for securely storing and managing seed phrases will likely emerge. In summary, understanding the importance and portability of the BIP 39 seed phrase is vital in the world of web 3 and crypto wallets. It represents the future of secure, accessible, and decentralized financial transactions.

    • The future of crypto security goes beyond individual controlMethods like multi-party computation and Shamir's secret sharing offer more robust solutions for storing private keys by splitting them among trusted parties, ensuring recovery even if one piece is lost.

      The future of storing private keys in crypto security is not just about individual control but also about mitigating risks and avoiding single points of failure. While mnemonic cold storage wallets and personal control are steps in the right direction, they come with their own vulnerabilities. The best solution lies in methods like multi-party computation and Shamir's secret sharing, which involve splitting the private key among trusted parties to ensure recovery even if one piece is lost. This approach aims to address the potential loss of funds due to physical damage or theft. However, it's important to recognize that not everyone is comfortable with the level of control and responsibility required in crypto security. As mainstream adoption grows, there will be a demand for more bank-like experiences, where users can hold their assets in exchanges and recover them through traditional methods if lost. While this may limit the ability to use certain features, it offers a more convenient and reassuring experience for those who prefer not to worry about security complexities. Ultimately, the evolution of crypto security will involve catering to a diverse range of users, offering various solutions that allow them to choose their preferred balance of control, risk, and convenience.

    • Where is your private key stored?Software wallets store private keys in browsers, increasing vulnerability to hacking. Hardware wallets store keys offline and generate signatures, improving security. Cold wallets generate keys offline and never connect to the internet for the highest level of security.

      For users seeking control and security over their cryptocurrency, the question of where private keys are held is paramount. If you use a software wallet like MetaMask, the private key is stored in your browser, making it vulnerable to hacking. To enhance security, consider using a hardware wallet, which stores the private key offline and generates signatures for transactions. This removes the vulnerability of having the private key stored in your computer's memory. Even with hardware wallets, there's still a need to connect them to a computer or phone to issue transactions. For the highest level of security, consider a cold wallet, which never touches the internet. Cold wallets generate a seed phrase or private key offline, calculate the public key, and receive funds to that address without the private key ever being online. In summary, understanding where your private keys are held is crucial for maintaining control and security over your cryptocurrency. While software wallets offer convenience, they come with increased risk. Hardware wallets provide a significant improvement, but cold wallets offer the highest level of security by never exposing the private key to the internet.

    • Storing Cryptocurrency Offline with Cold WalletsCold wallets provide extra security by storing cryptocurrency offline with a private key, but it's essential to balance convenience and security. Modern devices can store keys securely, but seed phrases must be kept safe.

      A cold wallet is a method of storing cryptocurrency offline, using a private key that corresponds to a public address without the private key ever being accessed on the blockchain. This provides an extra layer of security, but it's not necessary for everyone interacting with crypto. Instead, there's a balance between convenience and security. Modern smartphones with secure enclaves can store private keys securely, but the risk is losing access to the key if the device is destroyed or lost. In such cases, methods like social recovery or seed phrases come into play. However, it's essential to remember that the seed phrase is the critical component, and it should be stored securely, not the hardware wallet itself. A hardware wallet is a recommended first step for new users, and they should never share their seed phrase with anyone.

    • Shifting to web 3.0 for crypto and DeFiWeb 3.0 will make crypto and DeFi more accessible and user-friendly through user-friendly interfaces, increased security, and mobile device connectivity.

      The future of crypto and DeFi adoption will rely heavily on user-friendly interfaces and connecting mobile devices to decentralized applications (DAPs) for increased security and accessibility. This paradigm shift towards web 3.0 will abstract away complex crypto features, allowing anyone to create high-quality interfaces, while maintaining personal control and responsibility over assets and data. The use of secure methods like QR codes, wallet Connect, and phone signatures will become the norm, making the crypto experience more accessible to a larger audience. This new security paradigm is a significant departure from the web 2.0 model, where control and data are centralized, and will lead to more personal control, greater interoperability, and superior interfaces. Ultimately, this transition will make crypto and DeFi more accessible and user-friendly for the masses, while maintaining the decentralized and secure nature of the technology.

    • Web 3 networks offer more secure authenticationWeb 3 networks provide a decentralized, single interface for authentication, reducing risk of hacks and technical issues, while using cryptography and blockchain for data security and immutability.

      Web 3 networks offer a more secure authentication system compared to traditional Web 2 methods due to their single interface design and decentralized nature. This single interface, which can be used by everyone, eliminates the need for individuals to implement their own security systems and reduces the risk of technical issues or hacks. The use of cryptography and blockchain technology further enhances security by ensuring the immutability and validity of data. However, current systems have limitations, such as the one-to-one relationship between private and public keys, which makes it difficult to rotate keys or maintain privacy. To address this, decentralized identifiers and multiple public keys can be used, allowing for greater flexibility and security. Overall, Web 3 networks represent a significant improvement in security, offering a more trustworthy and reliable authentication system for users.

    • The Future of Crypto: Easier Recovery of Lost AccessAdvancements in tech may lead to more secure and user-friendly methods for managing private keys, reducing the risk of losing access to crypto networks and assets.

      The future of cryptocurrency may hold more secure and user-friendly methods for managing private keys and recovering lost access, allowing users to maintain their networks, relationships, and assets even if they lose their seed phrase. Currently, losing a seed phrase can be a worst-case scenario, but as technology advances, easier recovery systems will likely be developed. People have varying risk tolerances and concerns, and while some may trust institutions or third parties, others prefer self-control. The flexibility of crypto to allow individuals to opt out and manage their own keys is a unique aspect of the technology. Eddie, thank you for your insightful discussion on this topic.

    Recent Episodes from a16z Podcast

    Cybersecurity's Past, Present, and AI-Driven Future

    Cybersecurity's Past, Present, and AI-Driven Future

    Is it time to hand over cybersecurity to machines amidst the exponential rise in cyber threats and breaches?

    We trace the evolution of cybersecurity from minimal measures in 1995 to today's overwhelmed DevSecOps. Travis McPeak, CEO and Co-founder of Resourcely, kicks off our discussion by discussing the historical shifts in the industry. Kevin Tian, CEO and Founder of Doppel, highlights the rise of AI-driven threats and deepfake campaigns. Feross Aboukhadijeh, CEO and Founder of Socket, provides insights into sophisticated attacks like the XZ Utils incident. Andrej Safundzic, CEO and Founder of Lumos, discusses the future of autonomous security systems and their impact on startups.

    Recorded at a16z's Campfire Sessions, these top security experts share the real challenges they face and emphasize the need for a new approach. 

    Resources: 

    Find Travis McPeak on Twitter: https://x.com/travismcpeak

    Find Kevin Tian on Twitter: https://twitter.com/kevintian00

    Find Feross Aboukhadijeh on Twitter: https://x.com/feross

    Find Andrej Safundzic on Twitter: https://x.com/andrejsafundzic

     

    Stay Updated: 

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

     

    The Science and Supply of GLP-1s

    The Science and Supply of GLP-1s

    Brooke Boyarsky Pratt, founder and CEO of knownwell, joins Vineeta Agarwala, general partner at a16z Bio + Health.

    Together, they talk about the value of obesity medicine practitioners, patient-centric medical homes, and how Brooke believes the metabolic health space will evolve over time.

    This is the second episode in Raising Health’s series on the science and supply of GLP-1s. Listen to last week's episode to hear from Carolyn Jasik, Chief Medical Officer at Omada Health, on GLP-1s from a clinical perspective.

     

    Listen to more from Raising Health’s series on GLP-1s:

    The science of satiety: https://raisinghealth.simplecast.com/episodes/the-science-and-supply-of-glp-1s-with-carolyn-jasik

    Payers, providers and pricing: https://raisinghealth.simplecast.com/episodes/the-science-and-supply-of-glp-1s-with-chronis-manolis

     

    Stay Updated: 

    Let us know what you think: https://ratethispodcast.com/a16z

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    The State of AI with Marc & Ben

    The State of AI with Marc & Ben

    In this latest episode on the State of AI, Ben and Marc discuss how small AI startups can compete with Big Tech’s massive compute and data scale advantages, reveal why data is overrated as a sellable asset, and unpack all the ways the AI boom compares to the internet boom.

     

    Subscribe to the Ben & Marc podcast: https://link.chtbl.com/benandmarc

     

    Stay Updated: 

    Let us know what you think: https://ratethispodcast.com/a16z

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    Predicting Revenue in Usage-based Pricing

    Predicting Revenue in Usage-based Pricing

    Over the past decade, usage-based pricing has soared in popularity. Why? Because it aligns cost with value, letting customers pay only for what they use. But, that flexibility is not without issues - especially when it comes to predicting revenue. Fortunately, with the right process and infrastructure, your usage-based revenue can become more predictable than the traditional seat-based SaaS model. 

    In this episode from the a16z Growth team, Fivetran’s VP of Strategy and Operations Travis Ferber and Alchemy’s Head of Sales Dan Burrill join a16z Growth’s Revenue Operations Partner Mark Regan. Together, they discuss the art of generating reliable usage-based revenue. They share tips for avoiding common pitfalls when implementing this pricing model - including how to nail sales forecasting, adopting the best tools to track usage, and deal with the initial lack of customer data. 

    Resources: 

    Learn more about pricing, packaging, and monetization strategies: a16z.com/pricing-packaging

    Find Dan on Twitter: https://twitter.com/BurrillDaniel

    Find Travis on LinkedIn: https://www.linkedin.com/in/travisferber

    Find Mark on LinkedIn: https://www.linkedin.com/in/mregan178

    Stay Updated: 

    Let us know what you think: https://ratethispodcast.com/a16z

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    California's Senate Bill 1047: What You Need to Know

    California's Senate Bill 1047: What You Need to Know

    On May 21, the California Senate passed bill 1047.

    This bill – which sets out to regulate AI at the model level – wasn’t garnering much attention, until it slid through an overwhelming bipartisan vote of 32 to 1 and is now queued for an assembly vote in August that would cement it into law. In this episode, a16z General Partner Anjney Midha and Venture Editor Derrick Harris breakdown everything the tech community needs to know about SB-1047.

    This bill really is the tip of the iceberg, with over 600 new pieces of AI legislation swirling in the United States. So if you care about one of the most important technologies of our generation and America’s ability to continue leading the charge here, we encourage you to read the bill and spread the word.

    Read the bill: https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1047

    a16z Podcast
    enJune 06, 2024

    The GenAI 100: The Apps that Stick

    The GenAI 100: The Apps that Stick

    Consumer AI is moving fast, so who's leading the charge? 

    a16z Consumer Partners Olivia Moore and Bryan Kim discuss our GenAI 100 list and what it takes for an AI model to stand out and dominate the market.

    They discuss how these cutting-edge apps are connecting with their users and debate whether traditional strategies like paid acquisition and network effects are still effective. We're going beyond rankings to explore pivotal benchmarks like D7 retention and introduce metrics that define today's AI market.

    Note: This episode was recorded prior to OpenAI's Spring update. Catch our latest insights in the previous episode to stay ahead!

     

    Resources:

    Link to the Gen AI 100: https://a16z.com/100-gen-ai-apps

    Find Bryan on Twitter: https://twitter.com/kirbyman

    Find Olivia on Twitter: https://x.com/omooretweets

     

    Stay Updated: 

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    Finding a Single Source of AI Truth With Marty Chavez From Sixth Street

    Finding a Single Source of AI Truth With Marty Chavez From Sixth Street

    a16z General Partner David Haber talks with Marty Chavez, vice chairman and partner at Sixth Street Partners, about the foundational role he’s had in merging technology and finance throughout his career, and the magical promises and regulatory pitfalls of AI.

    This episode is taken from “In the Vault”, a new audio podcast series by the a16z Fintech team. Each episode features the most influential figures in financial services to explore key trends impacting the industry and the pressing innovations that will shape our future. 

     

    Resources: 
    Listen to more of In the Vault: https://a16z.com/podcasts/a16z-live

    Find Marty on X: https://twitter.com/rmartinchavez

    Find David on X: https://twitter.com/dhaber

     

    Stay Updated: 

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    A Big Week in AI: GPT-4o & Gemini Find Their Voice

    A Big Week in AI: GPT-4o & Gemini Find Their Voice

    This was a big week in the world of AI, with both OpenAI and Google dropping significant updates. So big that we decided to break things down in a new format with our Consumer partners Bryan Kim and Justine Moore. We discuss the multi-modal companions that have found their voice, but also why not all audio is the same, and why several nuances like speed and personality really matter.

     

    Resources:

    OpenAI’s Spring announcement: https://openai.com/index/hello-gpt-4o/

    Google I/O announcements: https://blog.google/technology/ai/google-io-2024-100-announcements/

     

    Stay Updated: 

    Let us know what you think: https://ratethispodcast.com/a16z

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

     

     

    Remaking the UI for AI

    Remaking the UI for AI

    Make sure to check out our new AI + a16z feed: https://link.chtbl.com/aiplusa16z
     

    a16z General Partner Anjney Midha joins the podcast to discuss what's happening with hardware for artificial intelligence. Nvidia might have cornered the market on training workloads for now, but he believes there's a big opportunity at the inference layer — especially for wearable or similar devices that can become a natural part of our everyday interactions. 

    Here's one small passage that speaks to his larger thesis on where we're heading:

    "I think why we're seeing so many developers flock to Ollama is because there is a lot of demand from consumers to interact with language models in private ways. And that means that they're going to have to figure out how to get the models to run locally without ever leaving without ever the user's context, and data leaving the user's device. And that's going to result, I think, in a renaissance of new kinds of chips that are capable of handling massive workloads of inference on device.

    "We are yet to see those unlocked, but the good news is that open source models are phenomenal at unlocking efficiency.  The open source language model ecosystem is just so ravenous."

    More from Anjney:

    The Quest for AGI: Q*, Self-Play, and Synthetic Data

    Making the Most of Open Source AI

    Safety in Numbers: Keeping AI Open

    Investing in Luma AI

    Follow everyone on X:

    Anjney Midha

    Derrick Harris

    Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts.

     

    Stay Updated: 

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

    a16z Podcast
    enMay 16, 2024

    How Discord Became a Developer Platform

    How Discord Became a Developer Platform

    In 2009 Discord cofounder and CEO, Jason Citron, started building tools and infrastructure for games. Fast forward to today and the platform has over 200 million monthly active users. 

    In this episode, Jason, alongside a16z General Partner Anjney Midha—who merged his company Ubiquiti 6 with Discord in 2021—shares insights on the nuances of community-driven product development, the shift from gamer to developer, and Discord’s longstanding commitment to platform extensibility. 

    Now, with Discord's recent release of embeddable apps, what can we expect now that it's easier than ever for developers to build? 

    Resources: 

    Find Jason on Twitter: https://twitter.com/jasoncitron

    Find Anjney on Twitter: https://twitter.com/AnjneyMidha

     

    Stay Updated: 

    Find a16z on Twitter: https://twitter.com/a16z

    Find a16z on LinkedIn: https://www.linkedin.com/company/a16z

    Subscribe on your favorite podcast app: https://a16z.simplecast.com/

    Follow our host: https://twitter.com/stephsmithio

    Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.

     

    Related Episodes

    Ep 015 Boot Camp Day 4 - What Are the Best Tools for Analyzing and Buying Crypto?

    Ep 015 Boot Camp Day 4 - What Are the Best Tools for Analyzing and Buying Crypto?

    It's Day Four of the Crypto Takeover Podcast Intro to Crypto Bootcamp. We've covered A LOT of ground over the past 3 weeks and this one is no different. We've got a plethora of tools to utilize for deeper analysis, uncovering that hidden crypto gem, staying on top of all the best news, and staying in touch with decentralized finance as a whole. These are tools every crypto investor should have in their tool belt.

    Oh, and can't forget about some really interesting news that a lot of crypto enthusiasts have been waiting for. A very large deal has happened between Blackrock (the largest institutional investment management firm in the world) and Coinbase (one of the largest centralized exchanges in the world); you'll definitely want to read up on this one. Solana got hacked, or did it? And a really cool bill proposing for transactions of under $50 to not be taxed in the U.S. 

    All this jam packed into 30 minutes. And did I mention you can catch a glimpse of two of Brad's cute kiddos? That's worth the price of admission alone. Oh wait, it's FREE!

    Join in the conversation and let's talk crypto!

    Safe links to all news & tools mentioned in today's episode:


    Please leave us a rating and review so we can reach more who are looking for this crypto education! Thank you for doing your part! 🙏🏽

    Join the ever-growing Crypto Takeover community! You can join our public Telegram channel by clicking the link below. Make sure to say hi 👋🏽 and let us know you're joining from the Crypto Takeover Podcast 🎙! We'll see you in there!

    🖱 Crypto Takeover Telegram (public)

    📺 Crypto Takeover YouTube Channel (episode videos)

    👋🏽 Crypto Takeover Meetup Group (Meetup app)

    Want to follow us or reach out directly? Here's a few ways to do so:

    ✅ Click for Mike Newby's Instagram

    ✅ Click for Mike Newby's Twitter

    ✅ Click for Brad Lambert's Instagram

    ✅ Click for Brad Lambert's Twitter

    Be sure to let us know you heard us on the Crypto Takeover Podcast 🎙!

     


     

    Disclaimer: We are not financial advisors. No information spoken, displayed, portrayed, or inferred within or from this broadcast should be considered financial advice. This is for educational purposes only.

    Ep 013 Boot Camp Day 2 of 4 - How Do I Keep My Crypto Safe and Not Get Scammed?

    Ep 013 Boot Camp Day 2 of 4 - How Do I Keep My Crypto Safe and Not Get Scammed?

    Security! This is often yelled in jest with friends and family when someone stole a food item off your plate or took something from you in hopes you'd laugh about it. But, in the digital world, this is a very serious topic.

    We've all had them... scam emails, phishing attacks, scam phone calls, text messages, spam, and they're getting more and more sophisticated. Now, more than ever, it is so important to stay safe and keep your information secure. The FBI has released warnings that scam efforts are the highest they have ever been. Heed this warning and make sure you take every precaution to keep from getting your information and your crypto stolen. You don't want to be the subject of the next headline article.

    In today's episode we go over everything we know about protecting yourself in the digital space and how to best protect your crypto with the latest software and hardware. We'll chat about secure and encrypted email systems, SIM-swapping, hot wallets, cold wallets, cold storage, trading platforms, centralized exchanges, and your keys and where to store them. We have multiple recommendations, but ultimately the decision is up to you. Give this episode a listen a few times, do your homework, make your choices, and implement them immediately! This is not something to mess around with; we want you to be safe!

    Join in the conversation and let's talk security!

    Safe links to all software & hardware mentioned in today's episode:

     


    Please leave us a rating and review so we can reach more who are looking for this crypto education! Thank you for doing your part! 🙏🏽

    Join the ever-growing Crypto Takeover community! You can join our public Telegram channel by clicking the link below. Make sure to say hi 👋🏽 and let us know you're joining from the Crypto Takeover Podcast 🎙! We'll see you in there!

    🖱 Crypto Takeover Telegram (public)

    📺 Crypto Takeover YouTube Channel (episode videos)

    👋🏽 Crypto Takeover Meetup Group (Meetup app)

    Want to follow us or reach out directly? Here's a few ways to do so:

    ✅ Click for Mike Newby's Instagram

    ✅ Click for Mike Newby's Twitter

    ✅ Click for Brad Lambert's Instagram

    ✅ Click for Brad Lambert's Twitter

    Be sure to let us know you heard us on the Crypto Takeover Podcast 🎙!

     


     

    Disclaimer: We are not financial advisors. No information spoken, displayed, portrayed, or inferred within or from this broadcast should be considered financial advice. This is for educational purposes only.

    The Knight Show E1. The Highly Secure Mom Test

    The Knight Show E1. The Highly Secure Mom Test

    🔥Join the CryptoKnight Discord 👉 https://discord.gg/ajTvrenQ7v 

    🔥 For the launch of the show our viewers are getting 20% off your purchase* at getarculus.com through Nov. 15: KNIGHT20 👉 https://www.getarculus.com/?utm_source=youtube&utm_medium=video&utm_campaign=cryptoknight 

    ---------- 

    USEFUL LINKS 

    Josh’s Bitcoin ATM Video: https://www.tiktok.com/t/ZTRHc4wMe/ 

    Wanna learn more about Mt. Gox: https://buybitcoinworldwide.com/mt-gox-hack/#what-was-mt-gox 

    Aptos White Paper: https://aptos.dev/assets/files/Aptos-Whitepaper-47099b4b907b432f81fc0effd34f3b6a.pdf 

    ---------- 

    TIMESTAMPS 

    0:00 Intro 

    2:19 Arculus 

    5:36 How is Blockchain Changing Security 

    8:45 The Overlap in Digital Identity & Asset Security 

    10:07 What is a Smart Card 

    12:10 Making Crypto Easy to Use 

    18:32 What got Adam into Crypto 

    22:22 Be in Charge of Your Security 

    25:54 Learning About Blockchain 

    26:52 What’s the Driving Force Behind Arculus 

    31:24 20% off at GetArculus.com 

    32:10 Adam’s Favorite Projects 37:00 Closing 

    ---------- 

    Disclaimers CryptoKnight and its creators are not professional advisors. The content (written, verbal, or video) disseminated by and through "CryptoKnight" is only intended for general information purposes. None of the information shared is to be considered advice. The content created by "CryptoKnight" is based on subjective opinions. Always do your own research. 

    *T&Cs: Offer may not be combined with any other coupons, discounts, offers, or promotions. Not valid on prior purchases. Void where prohibited.

    66 - Crypto’s Existential Threat | MEV Panel: Phil Daian, Georgios Konstanopolus, Charlie Noyes

    66 - Crypto’s Existential Threat | MEV Panel: Phil Daian, Georgios Konstanopolus, Charlie Noyes

    Phil Daian is a researcher and software engineer and is leading the charge into mapping MEV with the Flashbots Project. Georgios Konstantopoulos and Charlie Noyes are both partners at Paradigm.

    ------
    🚀 SUBSCRIBE TO NEWSLETTER: https://newsletter.banklesshq.com/ 
    🎙️ SUBSCRIBE TO PODCAST: http://podcast.banklesshq.com/ 
    🎖 CLAIM YOUR BADGE: https://newsletter.banklesshq.com/p/-guide-2-using-the-bankless-badge 
    🎧 Get this Episode's Debrief: https://shows.banklesshq.com/p/exclusive-debrief-cryptos-existential 
    ------
    BANKLESS SPONSOR TOOLS:

    💰 GEMINI | FIAT & CRYPTO EXCHANGE
    https://bankless.cc/go-gemini 

    🔀 BALANCER | EXCHANGE & POOL ASSETS
    https://bankless.cc/balancer 

    👻 AAVE | LEND & BORROW ASSETS
    https://bankless.cc/aave 

    🦄 UNISWAP | DECENTRALIZED FUNDING
    http://bankless.cc/uniswap 

    ------

    Bankless Podcast #66: MEV Panel
    Guests: Charlie Noyes, Phil Daian, & Georgios Konstantopolous

    In this State of the Nation, we bring on big-brain experts behind projects like Paradigm and Flashbots to explain the complex but critical topic of MEV - commonly known as Miner Extractable Value, but as discussed in this episode, Maximum Extractable Value is a more appropriate descriptor. MEV is arguably the single most important unsolved problem in the crypto space.

    In the context of incentives and network security, MEV generally refers to the ability of miners & validators to take advantage of their position as securers of the network. Blocks are verified by single entities, and these block producers have tremendous power when they are the ones adding a particular block to the blockchain. We refer to this instance as ‘God-Mode,’ in which a node has the power to assemble & order transactions at will. The threat here is the potential gaps between what is best for the network and what is best for the node.

    As an internal and unbounded threat to blockchains, solving the problems that MEV presents is critical to maintaining proper consensus and ensuring decentralization and permissionless access. We take a deep dive into potential solutions, and the impact of EIP-1559 and Proof-of-Stake on MEV. Dive in to learn why despite the challenges ahead, Charlie says:

    “In the absence of certainty, I’m willing to take the optimistic perspective.”

    ------
    Resources:

    Phil on Twitter
    https://twitter.com/phildaian?s=20 
    Georgios on Twitter
    https://twitter.com/gakonst?s=20 
    Charlie on Twitter
    https://twitter.com/_charlienoyes?s=20 
    Exploring Ethereum’s Dark Forest with Dan Robinson
    https://youtu.be/MtpRDqrCfbc 
    Investing in DeFi Paradigms with Charlie Noyes
    https://youtu.be/dQOhbb5HmLA 

    -----
    Not financial or tax advice. This channel is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. This video is not tax advice. Talk to your accountant. Do your own research.

    Disclosure. From time-to-time I may add links in this newsletter to products I use. I may receive commission if you make a purchase through one of these links. Additionally, the Bankless writers hold crypto assets. See our investment disclosures here:
    https://newsletter.banklesshq.com/p/bankless-disclosures