Web2 postmortems are good but this was handled fantastically well, only the fate of the entire crypto market hung in the balance - no pressure 😨 buff.ly/hZAgvci #podcast #web3security #cryptosecurity #web3hack #bybithack
Binance has more than one chain, so they needed a bridge buff.ly/3X5VYcH #podcast #cryptosecurity #web3security #binancehack #web3hack
Free the assets! buff.ly/3X5VYcH #podcast #cryptosecurity #web3security #binancehack #web3hack
Actually in hindsight the need for a mechanism to swap assets from different chains makes complete for interoperability - enter the bridge! buff.ly/3X5VYcH #podcast #cryptosecurity #web3security #binancehack #web3hack
New jargon alert, web3 bridges, not a networking bridge, although similar in role, we're all about web3 bridges now...until we're not buff.ly/3X5VYcH #podcast #web3hack #binancehack #cryptosecurity #blockchain #web3security
The community actually matters in web3 and when they collaborate they can do some cool things like mild vigilante justice? #podcast #web3security #nfthack #web3hack buff.ly/42AVKxX
In web3, they hack back! #podcast #web3security #nfthack #web3hack buff.ly/42AVKxX
Smart contract as a security boundary what could possibly go wrong? #podcast #web3security #nfthack #web3hack buff.ly/42AVKxX
NFT hacks happen but what is an NFT in this context? #podcast #web3security #web3hack buff.ly/40IeKIf
The big question though is whether this was an actual hack/compromise or some clever assailants taking advantage of those that exploit others? #podcast #web3security #web3hack buff.ly/40LQF3m
Front running users, is it a feature or a bug? #podcast #web3security #web3hack buff.ly/40LQF3m
Blockchains big or small require tokens to power themselves this leads to some interesting outcomes and incentives for both good and bad actors #podcast #web3security #web3hack buff.ly/40LQF3m
The second of our two parter about one of the most interesting compromises that we have come across in a long time #podcast #web3security #web3hack buff.ly/4gst39y
Transparency one of web3's superpowers meant that the victims essentially knew who the perpetrators were and so they very politely asked for the money back #podcast #web3security #web3hack buff.ly/4hjrQ5R
If the blockchain itself wasn't hacked then what was? #podcast #web3security #web3hack buff.ly/40ZiMgH
Just how does one go about stealing $25M in 12 seconds?! #web3security #web3hack #podcast buff.ly/4hFI6xM
When web3 hacks happen they happen quickly and at scale! #podcast #web3hack #web3security buff.ly/4hKHXJE
Emerging theme alert, decentralization isn't really a fixed state but rather a continuum where you constantly adjust your stance which has consequences...least of all for your security posture...#podcast #web3hack #web3security buff.ly/4jBQgsM
Scaleability problems need scaleable solutions, enter...(jargon alert!) Sidechains, did they help or hinder in this scenario #web3security #web3hack #podcast buff.ly/4aBRtfs
Web3 is designed with scalability in mind but as we have learned in our day jobs with scalability comes complexity...#podcast #web3hack #web3security https://buff.ly/4hAbAgC
When we aren't pondering on the meaning of all things web3 we are product security professionals, so with that in mind we decided to take a look at the Axie Infinity hack which had some interesting characteristics to it #web3 #web3security #web3hack #podcast https://buff.ly/4hAbAgC