58 min listen
CryoSecurity: Crypto Security Horror Stories, Personal Best Practices, and Preserving Privacy Online
CryoSecurity: Crypto Security Horror Stories, Personal Best Practices, and Preserving Privacy Online
ratings:
Length:
63 minutes
Released:
Feb 11, 2022
Format:
Podcast episode
Description
In this episode, we sit down with security expert Logan from CryoSecurity, a cryptocurrency security consultancy firm. We discuss lesser known attack vectors, social engineering attacks, personal best practices, and much more!
Show Notes:
(00:00:00) – Introduction.
(00:06:16) – Security horror stories and lesser known attack vectors.
(00:14:48) – Attack vectors that scare Logan.
(00:19:56) – Social engineering attacks.
(00:25:44) – Advice to anonymous teams / VPNs.
(00:35:40) – Personal security best practices.
(00:56:47) – Advice for funds, founders, and teams.
(01:01:04) – Closing.
Resources:
CryoSecurity Twitter
CryoSecurity Website
Browser fingerprinting
VPN comparison chart
VPN comparison chart 2
Data breach website
Email alias service
Email alias service 2
Delphi Podcast Summaries
More
? Watch Video Interviews
? Follow Delphi Podcast on Twitter
✅ Follow Delphi Digital on Twitter
? Access Delphi's Research
Disclosures: This podcast is strictly informational and educational and is not investment advice or a solicitation to buy or sell any tokens or securities or to make any financial decisions. Do not trade or invest in any project, tokens, or securities based upon this podcast episode. The host and members at Delphi Digital may personally own tokens or art that are mentioned on the podcast. Our current show features paid sponsorships which may be featured at the start, middle, and/or the end of the episode. These sponsorships are for informational purposes only and are not a solicitation to use any product, service or token. Delphi’s transparency page can be viewed here.
Show Notes:
(00:00:00) – Introduction.
(00:06:16) – Security horror stories and lesser known attack vectors.
(00:14:48) – Attack vectors that scare Logan.
(00:19:56) – Social engineering attacks.
(00:25:44) – Advice to anonymous teams / VPNs.
(00:35:40) – Personal security best practices.
(00:56:47) – Advice for funds, founders, and teams.
(01:01:04) – Closing.
Resources:
CryoSecurity Twitter
CryoSecurity Website
Browser fingerprinting
VPN comparison chart
VPN comparison chart 2
Data breach website
Email alias service
Email alias service 2
Delphi Podcast Summaries
More
? Watch Video Interviews
? Follow Delphi Podcast on Twitter
✅ Follow Delphi Digital on Twitter
? Access Delphi's Research
Disclosures: This podcast is strictly informational and educational and is not investment advice or a solicitation to buy or sell any tokens or securities or to make any financial decisions. Do not trade or invest in any project, tokens, or securities based upon this podcast episode. The host and members at Delphi Digital may personally own tokens or art that are mentioned on the podcast. Our current show features paid sponsorships which may be featured at the start, middle, and/or the end of the episode. These sponsorships are for informational purposes only and are not a solicitation to use any product, service or token. Delphi’s transparency page can be viewed here.
Released:
Feb 11, 2022
Format:
Podcast episode
Titles in the series (100)
ConsenSys Capital Co-Founder Andrew Keys: The Future of Ethereum and ConsenSys by The Delphi Podcast