In-Stream Audio SearchNEW
Search across all episodes within this podcast
Episode 37 · 1 year ago
Managing crypto keys is difficult enough for private holders, but when managing large portfolios of cryptocurrency assets on an institutional level, the risk surface increases tremendously. Base Zero has devised a suite of tools to manage multisignature signing over an air-gapped signing device and a sharded backup system to ensure security for large organizations. This unique approach enables these institutions to mitigate risk associated with large fund transfers without any one single person being able to compromise the system and with highly secured disaster recovery.
- Matt Zimmerman: https://www.linkedin.com/in/mdzin/
- Ken Sedgwick: https://www.linkedin.com/in/ken-sedgwick-83541/
Episode 36 · 1 year ago
We have the pleasure to present one of the more entertaining speakers at SBC19, Dan Robinson. After two talks on Hash Time Locked Contracts (HTLCs), he drops a massive bomb in with a slide deck entitled, "HTLCs (And why they suck)." Lively and entertaining, we have him step through is thoughts on HTLCs and the alternate solutions to this technique that Interleger implements. Bombastic show chocked full information and analysis!
Episode 35 · 1 year ago
Back with season 2 of Hashing It Out, and we have a doozy! This Episode features Trail of Bits and ChainSecurity to talk about their amazing last-minute catch of EIP-1283's impact on the Constantinople Ethereum hard fork. We go over how they found it, what recommendations they made, and how the hard fork was postponed to quickly. We also discuss the tooling behind analyzing such a vulnerability, the true impact had it been released, and how the processes around hard fork release candidates could be altered by this detection.
Episode 34 · 1 year ago
File storage has long been known as a centralized solution. Storj seeks to change this with their decentralized file storage and retrieval architecture. We'll go over their design, engineering goals, and challenges. We dive deep into how erasure codes can be used to mitigate replication requirements, how trust is managed on their decentralized platform, and how one can be incentivized to donate their storage space and bandwidth to the world through their network.
**Links** https://storj.io/ https://github.com/Storj/