<p>4:02 – Intro</p>
<p> </p>
<p>5:24 – Hardware Wallet Physical Security</p>
<p> </p>
<p>6:10 – Buying hardware wallets on eBay?</p>
<p> </p>
<p>7:04 – Toothbrush analogy</p>
<p> </p>
<p>7:26 – Supply chain attacks</p>
<p> </p>
<p>7:40 – Fake seed cards<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>8:20 – Does Peter Todd use any hardware wallets?</p>
<p> </p>
<p>9:10 – Hardware wallets as part of the Bitcoin lifestyle<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>9:30 – Dealing with Bitcoin in the early days</p>
<p> </p>
<p>10:40 – Peter Todd running Qubes and multiple virtual machines</p>
<p> </p>
<p>11:29 – Advice for newbies</p>
<p> </p>
<p>13:00 – The economics of hardware wallets</p>
<p> </p>
<p>13:50 – Markets for Bitcoin transaction data<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>15:00 – Are Electrum servers ran by Chainalysis?</p>
<p> </p>
<p>16:30 – Chainalysis and Bitcoin exchanges</p>
<p> </p>
<p>17:00 – Shapeshift’s KeepKey</p>
<p> </p>
<p>18:31 – Does Peter Todd use a Coldcard?</p>
<p> </p>
<p>20:22 – The issue of hardware wallet screens and checking addresses</p>
<p> </p>
<p>21:55 – Packaging to discourage supply chain attacks</p>
<p> </p>
<p>23:00 – Coldcard and PSBT</p>
<p> </p>
<p>25:25 – Auditing trusted setups</p>
<p> </p>
<p>26:10 – Which hardware wallet does Peter Todd recommend?</p>
<p> </p>
<p>29:15 – Is the YubiKey better than a hardware wallet?</p>
<p> </p>
<p>31:57 – Setting up a watch-only wallet for cold storage</p>
<p> </p>
<p>32:58 – Is just using Bitcoin Core secure enough?</p>
<p> </p>
<p>35:14 – The psychology of having a piece of hardware that makes you feel safe</p>
<p> </p>
<p>36:36 – Ballet Crypto and trusted printing</p>
<p> </p>
<p>37:45 – BitAddress dot org</p>
<p> </p>
<p>39:00 – Generating randomness with a dice<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>40:10 – Security is hard and complex</p>
<p> </p>
<p>41:00 – Security theatre<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>42:47 – Cryptography vs Applied Cryptography<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>44:30 – How can Trezor and Ledger steal funds from hardware wallet owners?</p>
<p> </p>
<p>46:41 – Liability for theft</p>
<p> </p>
<p>49:40 – Can hardware wallet manufacturers steal $1 from each user?</p>
<p> </p>
<p>51:00 – The perfect theft that hardware wallet manufacturers can coordinate</p>
<p> </p>
<p>52:10 – Bluetooth on hardware wallets?</p>
<p> </p>
<p>53:10 – RS 232<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>55:20 – Faraday cages</p>
<p> </p>
<p>57:20 – Practical advice for bitcoiners<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>59:00 – Tiger rocks, locks, and lock pickers<span class="Apple-converted-space"> </span></p>
<p> </p>
<p>1:00:20 – Is multisig a good idea?</p>
<p> </p>
<p>1:01:23 – Is memorizing your private key a good idea?</p>
<p> </p>
<p>1:01:56 – Security from yourself</p>
<p> </p>
<p>1:03:30 – Physical vs digital data security</p>
<p> </p>
<p>1:05:20 – Does Peter Todd like weed?</p>
<p> </p>
<p>1:06:16 – Bitcoin and drug sales</p>
<p> </p>
<p>1:07:41 – Peter Todd’s prediction for Bitcoin’s success</p>
<p> </p>
<p>1:09:50 – One day, Bitcoin will go to 0</p>
<p> </p>
<p>1:10:00 – The US dollar will fail before Bitcoin</p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>