Sveriges mest populära poddar

Bitcoin Takeover Podcast

S4 E7: Peter Todd on Hardware Wallets, Security & ProofMarshall

123 min • 4 februari 2020
<p>4:02 – Intro</p> <p> </p> <p>5:24 – Hardware Wallet Physical Security</p> <p> </p> <p>6:10 – Buying hardware wallets on eBay?</p> <p> </p> <p>7:04 – Toothbrush analogy</p> <p> </p> <p>7:26 – Supply chain attacks</p> <p> </p> <p>7:40 – Fake seed cards<span class="Apple-converted-space"> </span></p> <p> </p> <p>8:20 – Does Peter Todd use any hardware wallets?</p> <p> </p> <p>9:10 – Hardware wallets as part of the Bitcoin lifestyle<span class="Apple-converted-space"> </span></p> <p> </p> <p>9:30 – Dealing with Bitcoin in the early days</p> <p> </p> <p>10:40 – Peter Todd running Qubes and multiple virtual machines</p> <p> </p> <p>11:29 – Advice for newbies</p> <p> </p> <p>13:00 – The economics of hardware wallets</p> <p> </p> <p>13:50 – Markets for Bitcoin transaction data<span class="Apple-converted-space"> </span></p> <p> </p> <p>15:00 – Are Electrum servers ran by Chainalysis?</p> <p> </p> <p>16:30 – Chainalysis and Bitcoin exchanges</p> <p> </p> <p>17:00 – Shapeshift’s KeepKey</p> <p> </p> <p>18:31 – Does Peter Todd use a Coldcard?</p> <p> </p> <p>20:22 – The issue of hardware wallet screens and checking addresses</p> <p> </p> <p>21:55 – Packaging to discourage supply chain attacks</p> <p> </p> <p>23:00 – Coldcard and PSBT</p> <p> </p> <p>25:25 – Auditing trusted setups</p> <p> </p> <p>26:10 – Which hardware wallet does Peter Todd recommend?</p> <p> </p> <p>29:15 – Is the YubiKey better than a hardware wallet?</p> <p> </p> <p>31:57 – Setting up a watch-only wallet for cold storage</p> <p> </p> <p>32:58 – Is just using Bitcoin Core secure enough?</p> <p> </p> <p>35:14 – The psychology of having a piece of hardware that makes you feel safe</p> <p> </p> <p>36:36 – Ballet Crypto and trusted printing</p> <p> </p> <p>37:45 – BitAddress dot org</p> <p> </p> <p>39:00 – Generating randomness with a dice<span class="Apple-converted-space"> </span></p> <p> </p> <p>40:10 – Security is hard and complex</p> <p> </p> <p>41:00 – Security theatre<span class="Apple-converted-space"> </span></p> <p> </p> <p>42:47 – Cryptography vs Applied Cryptography<span class="Apple-converted-space"> </span></p> <p> </p> <p>44:30 – How can Trezor and Ledger steal funds from hardware wallet owners?</p> <p> </p> <p>46:41 – Liability for theft</p> <p> </p> <p>49:40 – Can hardware wallet manufacturers steal $1 from each user?</p> <p> </p> <p>51:00 – The perfect theft that hardware wallet manufacturers can coordinate</p> <p> </p> <p>52:10 – Bluetooth on hardware wallets?</p> <p> </p> <p>53:10 – RS 232<span class="Apple-converted-space"> </span></p> <p> </p> <p>55:20 – Faraday cages</p> <p> </p> <p>57:20 – Practical advice for bitcoiners<span class="Apple-converted-space"> </span></p> <p> </p> <p>59:00 – Tiger rocks, locks, and lock pickers<span class="Apple-converted-space"> </span></p> <p> </p> <p>1:00:20 – Is multisig a good idea?</p> <p> </p> <p>1:01:23 – Is memorizing your private key a good idea?</p> <p> </p> <p>1:01:56 – Security from yourself</p> <p> </p> <p>1:03:30 – Physical vs digital data security</p> <p> </p> <p>1:05:20 – Does Peter Todd like weed?</p> <p> </p> <p>1:06:16 – Bitcoin and drug sales</p> <p> </p> <p>1:07:41 – Peter Todd’s prediction for Bitcoin’s success</p> <p> </p> <p>1:09:50 – One day, Bitcoin will go to 0</p> <p> </p> <p>1:10:00 – The US dollar will fail before Bitcoin</p> <p> </p> <p> </p> <p> </p> <p> </p> <p> </p>
Förekommer på
00:00 -00:00