SlideShare a Scribd company logo
1 of 35
Download to read offline
How to Stop Bitcoin Theft: 

Multi-Sig Wallets Make Bitcoin
Secure and Useful for New
Industries


Will O’Brien
CEO & Co-Founder, BitGo
will@bitgo.com

April 8, 2014
Today’s Talk
•  Landscape of Bitcoin security
•  Introduction to multi-sig
•  Multi-sig for the enterprise
•  Multi-sig for new industries
COPYRIGHT © 2014 BITGO, INC. 
2
Who Am I?
•  Will O’Brien
•  CEO & Co-Founder of BitGo
•  Computer Science, Harvard
•  FinTech, trading platforms and capital markets
•  MBA, MIT Sloan
•  Startups and mid-size companies in consumer,
payments, video games, and media
•  Obsessed with Bitcoin since 2012
COPYRIGHT © 2014 BITGO, INC. 
3
BitGo: Multi-Sig Security-as-a-Services
•  First	
  multi-­‐sig	
  wallet	
  
•  Monitor	
  holdings	
  of	
  any	
  
other	
  wallet	
  or	
  address	
  
•  BitGo	
  Enterprise	
  
•  BitGo	
  API	
  
COPYRIGHT © 2014 BITGO, INC. 
4
Q: What is the biggest
threat to Bitcoin adoption?
Threats to Bitcoin Adoption
COPYRIGHT © 2014 BITGO, INC. 
6
Regulation	
  
Price	
  volatility	
  
Security	
  
Liquidity	
  
Security a Fundamental Threat
“An	
  Australian	
  bitcoin	
  bank	
  has	
  been	
  hacked,	
  the	
  service’s	
  operator	
  only	
  known	
  as	
  ‘Tradefortress’	
  
refused	
  to	
  give	
  his	
  name	
  to	
  the	
  press,	
  stressing	
  he	
  was	
  not	
  much	
  older	
  than	
  18.”	
  
Over $40,000 has been stolen from Bitcoin wallet provider Coinbase.
”	
  “ The Bloomberg reporter opened up his paper
wallet to show the private key, and, not too
surprisingly, the funds were quickly stolen.
“ ”	
  
$1.2M hack shows why you should never store
Bitcoins on the Internet
COPYRIGHT © 2014 BITGO, INC. 
7
Market analog: IT security now a
primary concern for CXOs and BoDs
22%	
  
54%	
  
2007	
   2012	
  
%	
  of	
  Enterprises	
  
Sources:	
  Cisco,	
  Forrester,	
  Gartner,	
  IDC,	
  IBM,	
  Ponemon	
  Institute,	
  analyst	
  reports,	
  Bain	
  analysis	
  
SECURITY	
  ISSUES	
  FREQUENTLY	
  DISCUSSED	
  
WITH	
  BOD	
  ON	
  QUARTERLY	
  BASIS	
  
HIGHER	
  PROFILE	
  OF	
  SECURITY	
  IS	
  DUE	
  TO	
  FREQUENCY,	
  
SCALE	
  &	
  IMPACT	
  OF	
  ATTACKS	
  
•  Cost	
  of	
  cybercrimes	
  rose	
  to	
  a	
  median	
  $5.9M	
  per	
  
organization	
  in	
  2011,	
  a	
  56%	
  increase	
  	
  
•  Security	
  vulnerability	
  disclosures	
  grew	
  to	
  ~9K	
  in	
  
2012,	
  a	
  29%	
  increase	
  	
  
•  Symantec	
  blocked	
  more	
  than	
  5.5B	
  malware	
  attacks	
  
in	
  2011,	
  an	
  81%	
  increase	
  
•  Web	
  based	
  attacks	
  rose	
  to	
  4.5K	
  per	
  day	
  in	
  2011,	
  a	
  
36%	
  increase	
  
•  Mobile	
  malware	
  grew	
  by	
  400%,	
  with	
  Android	
  
attacks	
  growing	
  by	
  2577%	
  in	
  2013	
  
•  DDoS	
  attacks	
  increased	
  by	
  27%,	
  with	
  the	
  largest	
  
attack	
  measuring	
  at	
  100.84	
  Gbps	
  and	
  lasting	
  20	
  
minutes	
  in	
  2013	
  
SIGNIFICANT	
  %	
  OF	
  CSOS	
  (SECURITY)	
  NOW	
  
REPORT	
  TO	
  TOP	
  LEADERSHIP	
  
•  54%	
  report	
  to	
  C-­‐level	
  execs	
  (including	
  CIOs)	
  
•  30%	
  report	
  to	
  CEO,	
  BoD,	
  or	
  enterprise	
  risk	
  
team	
  
COPYRIGHT © 2014 BITGO, INC. 
8
Global IT security market growing to
$92B with strong consolidation trend
COPYRIGHT © 2014 BITGO, INC. 
9
43	
  
60	
  
16	
  
23	
  
5	
  
8	
  
2012	
   2016F	
  
Enterprise	
   SMB	
   Consumer	
  
9%	
  
10%	
  
14%	
  
CAGR	
  
12-­‐16	
  
Note:	
  Excludes	
  MPLS	
  VPN	
  
Sources:	
  IDC,	
  Gartner,	
  analyst	
  reports,	
  Bain	
  analysis,	
  company	
  financials	
  
25	
  
35	
  
$0B	
  
$10B	
  
$20B	
  
$30B	
  
$40B	
  
$50B	
  
$60B	
  
$70B	
  
$80B	
  
$90B	
  
$100B	
  
2012	
   2016F	
  
ROW	
   US	
  
10%	
  
9%	
  
CAGR	
  
12-­‐16	
  
$64B	
  
$92B	
  
$64B	
  
$92B	
  
Global	
  IT	
  security	
  	
  
market	
  
GLOBAL	
  IT	
  SECURITY	
  MARKET	
  
Identity	
  theft	
  protection	
  
$7.68B	
  (acquired	
  by	
  Intel	
  in	
  2010)	
  
$14.5B	
  (NASDAQ:SYMC)	
  
$1.29B	
  (acq.	
  by	
  Symantec	
  in	
  2010)	
  
$1.97B	
  (NYSE:LOCK)	
  
$17.5B	
  (LON:EXPN)	
  
Private	
  ($130m	
  revenue)	
  
Anti-­‐virus	
  and	
  corporate	
  security	
  
Identity	
  and	
  authentication	
  
LEADING	
  COMPANIES	
  AND	
  EXITS	
  
Quick Primer: Bitcoin Keys
COPYRIGHT © 2014 BITGO, INC. 
10
SECRET!	
  
SAFE	
  
Bitcoin Storage: A Costly Trade-Off
COPYRIGHT © 2014 BITGO, INC. 
11
Security	
  
Accessibility	
  
low	
  
low	
  
high	
  
high	
  
If	
  all	
  systems	
  can	
  be	
  
hacked,	
  where	
  do	
  you	
  
store	
  your	
  private	
  key?	
  
Private	
  key	
  storage	
   local	
  computer	
  
Security	
  threats	
   malware	
  
key	
  logging	
  
hard	
  drive	
  failure	
  
forgotten	
  password	
  
Examples	
  
Bitcoin Storage: Desktop Wallets
COPYRIGHT © 2014 BITGO, INC. 
12
Security	
  
Accessibility	
  
desktop	
  
wallets	
  
low	
  
low	
  
high	
  
high	
  
Bitcoin-­‐QT	
  
Android	
  
wallet	
  
Note:	
  some	
  of	
  these	
  wallets	
  are	
  exploring	
  multi-­‐sig	
  	
  
Private	
  key	
  storage	
   online	
  
Security	
  threats	
   server	
  hacking	
  
denial	
  of	
  service	
  
phishing	
  
key	
  logging	
  
insider	
  theft	
  
Examples	
  
Bitcoin Storage: Hosted Wallets
COPYRIGHT © 2014 BITGO, INC. 
13
Security	
  
Accessibility	
  
desktop	
  
wallets	
  
low	
  
low	
  
high	
  
high	
  
hosted	
  wallets	
  
Note:	
  Blockchain	
  does	
  not	
  store	
  your	
  keys	
  
Private	
  key	
  storage	
   online	
  
Security	
  threats	
   server	
  hacking	
  
denial	
  of	
  service	
  
phishing	
  
key	
  logging	
  
insider	
  theft	
  
regulatory	
  action	
  
Examples	
  
Bitcoin Storage: Exchanges
COPYRIGHT © 2014 BITGO, INC. 
14
Security	
  
Accessibility	
  
desktop	
  
wallets	
  
low	
  
low	
  
high	
  
high	
  
hosted	
  wallets	
  
&	
  exchanges	
  
Note:	
  for	
  illustration	
  purposes	
  only	
  
Private	
  key	
  storage	
   offline	
  
Security	
  threats	
   physical	
  loss	
  
physical	
  theft	
  
coercion	
  
forgotten	
  password	
  
Examples	
  
Bitcoin Storage: Offline
COPYRIGHT © 2014 BITGO, INC. 
15
Security	
  
Accessibility	
  
desktop	
  
wallets	
  
low	
  
low	
  
high	
  
high	
  
hosted	
  wallets	
  
&	
  exchanges	
  
cold	
  storage	
  paper	
  wallets	
  
cold	
  
storage	
  
paper	
  
wallets	
  
brain	
  
wallets	
  
physical	
  
tokens	
  
brain	
  wallets	
  
Private	
  key	
  storage	
  
(multi-­‐signature)	
  
3	
  keys	
  distributed	
  
-­‐  hosted	
  key	
  
-­‐  user	
  key	
  
-­‐  backup	
  (offline)	
  
Security	
  threats	
   server	
  hacking	
  
malware	
  
key	
  logging	
  
insider	
  theft	
  
coercion	
  
forgotten	
  password	
  
Increased	
  security	
  
measures	
  
fraud	
  detection	
  
spending	
  limits	
  
corporate	
  treasury	
  
cold	
  keys	
  
Bitcoin Storage: Multi-Sig
COPYRIGHT © 2014 BITGO, INC. 
16
Security	
  
Accessibility	
  
desktop	
  
wallets	
  
low	
  
low	
  
high	
  
high	
  
hosted	
  wallets	
  
&	
  exchanges	
  
cold	
  storage	
  paper	
  wallets	
  brain	
  wallets	
  
Comparing Bitcoin Wallet Architectures
COPYRIGHT © 2014 BITGO, INC. 
17
With Multi-Sig You Hold Your Own
Bitcoin, 100% on Blockchain
COPYRIGHT © 2014 BITGO, INC. 
18
Multi-Sig for the
Enterprise
COPYRIGHT © 2014 BITGO, INC. 
 19
Evolution of Bitcoin Corporate Adoption
COPYRIGHT © 2014 BITGO, INC. 
20
Lower	
  costs,	
  
reduce	
  fraud	
  
PR	
  and	
  sales	
  
increase	
  
Accept	
  Bitcoin	
  
Asset	
  
investment	
  
Digital	
  
currency	
  
trading	
  
Hold	
  Bitcoin	
  
Supply	
  chain	
  
Payroll	
  
Promotions	
  
Use	
  Bitcoin	
  
-­‐  Big	
  Fish	
  Games	
  
-­‐  Overstock.com	
  
-­‐  Square	
  
-­‐  TigerDirect	
  
-­‐  Zynga	
  
-­‐  30K+	
  merchants	
  
-­‐  Bitcoin	
  Investment	
  Trust	
  
-­‐  Fortress/	
  Pantera	
  
-­‐  Sator	
  Square	
  
-­‐  BitPay	
  
-­‐  Gyft	
  
-­‐  Lamassu	
  ATM	
  
Company	
  
Profile	
  
Businesses	
  accepting	
  and	
  
spending	
  Bitcoin	
  
Family	
  office	
  investors	
  and	
  
financial	
  institutions	
  
Key	
  Needs	
   •  Accountant-­‐friendly	
  UI	
  
•  Enterprise	
  security	
  
•  Spending	
  limits	
  and	
  
transaction	
  approvals	
  for	
  
various	
  users	
  in	
  the	
  org	
  
•  Regular	
  financial	
  reports	
  
•  Trader-­‐friendly	
  UI	
  
•  Enterprise	
  security	
  for	
  large	
  
Bitcoin	
  holdings	
  
•  Fund	
  administration	
  that	
  
meets	
  corporate	
  governance	
  
requirements	
  
•  Robust	
  audit	
  trail	
  and	
  
financial	
  reporting	
  
Multi-­‐Sig	
  
Setup	
  
•  2-­‐of-­‐3	
  key	
  wallets	
  
•  Access	
  by	
  multiple	
  users	
  
with	
  different	
  rights	
  
•  M-­‐of-­‐N	
  key	
  wallets	
  
•  Secondary	
  approval	
  for	
  large	
  
transactions	
  
Organizational Needs for Multi-Sig
BITGO, INC. CONFIDENTIAL
21
How an Organization Uses Multi-Sig
COPYRIGHT © 2014 BITGO, INC. 
22
Person	
   Spending	
  limit	
   Creates	
  wallets	
   Approves	
  spending	
   Views	
  holdings	
  
CEO	
   $100,000	
   ✓	
   ✓	
   ✓	
  
CFO	
   $100,000	
   ✓	
   ✓	
   ✓	
  
VP	
  finance	
   $50,000	
   ✓	
   ✓	
  
Director	
  accounting	
   $25,000	
   ✓	
  
Financial	
  analyst	
   $0	
   ✓	
  
Auditor	
   n/a	
   ✓	
  
Enterprise	
  security	
  features	
  
•  Network	
  fraud	
  detection	
  
•  Spending	
  and	
  velocity	
  limits	
  
•  Approval	
  chains	
  
•  Time-­‐delayed	
  transactions	
  
Corporate Dashboard
COPYRIGHT © 2014 BITGO, INC. 
23
Wallet-Based Security and Permissions
COPYRIGHT © 2014 BITGO, INC. 
24
Spending Limits in Action
COPYRIGHT © 2014 BITGO, INC. 
25
Security and Approval Flow
COPYRIGHT © 2014 BITGO, INC. 
26
Multi-Sig for

New Industries
COPYRIGHT © 2014 BITGO, INC. 
 27
Multi-Sig Custodial Accounts
•  Escrow
•  Gifts
•  Auctions
•  Real estate
COPYRIGHT © 2014 BITGO, INC. 
28
Exchanges: Preventing the Next MtGox
COPYRIGHT © 2014 BITGO, INC. 
29
Risks	
  of	
  “pooled	
  holdings”	
  exchange	
  
•  Theft	
  or	
  loss	
  of	
  all	
  funds	
  
•  Government	
  seizure	
  of	
  funds	
  
•  Limited	
  independent	
  auditing	
  
•  No	
  insurance	
  
•  No	
  notification	
  of	
  account	
  breach	
  
POOLED	
  EXCHANGE	
  MODEL	
  
Exchange Powered by Multi-Sig
COPYRIGHT © 2014 BITGO, INC. 
30
Five Parties Model
COPYRIGHT © 2014 BITGO, INC. 
31
http://www.systemics.com/docs/ricardo/issuer/faq_governance.html#5PM	
  
http://bitcoinmagazine.com/10639/five-­‐parties-­‐model/	
  
Get Started with Multi-Sig
•  Individual: 

Use a multi-sig secure wallet
•  Merchant or financial institution: 

Use a multi-sig, multi-signer
wallet
•  Bitcoin exchange or business:

Bake multi-sig in to your
transaction model using
custodial accounts
COPYRIGHT © 2014 BITGO, INC. 
32
API	
  
Build on the BitGo API
•  Exchanges,	
  trading	
  platforms,	
  funds,	
  marketplaces,	
  escrow	
  
services,	
  and	
  beyond	
  can	
  build	
  systems	
  on	
  the	
  BitGo	
  API	
  
•  The	
  BitGo	
  API	
  enables	
  the	
  following	
  operations:	
  
–  Creation	
  of	
  M-­‐of-­‐N	
  P2SH	
  (multi-­‐sig)	
  addresses	
  
–  Hierarchical	
  Deterministic	
  Wallet	
  management	
  (BIP32)	
  
–  Transaction	
  creation	
  
–  Transaction	
  signing	
  
–  Spending	
  limits	
  
–  Multi-­‐signer	
  address	
  flow	
  
COPYRIGHT © 2014 BITGO, INC. 
33
Industry Goals for Multi-Sig
•  Secure the majority of Bitcoin holdings with
multi-sig by the end of 2014
•  Embrace standards and industry best
practices like BIP32 (HD wallets)
•  Innovate on new models based on multi-sig
Make 2014 the Year of Multi-Sig!
COPYRIGHT © 2014 BITGO, INC. 
34
Thank you
COPYRIGHT © 2014 BITGO, INC. 
35
https://www.bitgo.com	
  
will@bitgo.com	
  
@BitGoInc	
  

More Related Content

What's hot

Blockchain DeFi Platform Design & Development Webinar
Blockchain DeFi Platform Design & Development WebinarBlockchain DeFi Platform Design & Development Webinar
Blockchain DeFi Platform Design & Development WebinarAlex G. Lee, Ph.D. Esq. CLP
 
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.iFour Technolab Pvt. Ltd.
 
How will the finance industry benefited by blockchain technology in 2020
How will the finance industry benefited by blockchain technology in 2020How will the finance industry benefited by blockchain technology in 2020
How will the finance industry benefited by blockchain technology in 2020Blockchain Council
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspectiveSecunoid Systems Inc
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity gppcpa
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...Bomgar
 
Transaction speed
Transaction speedTransaction speed
Transaction speedOliviaJune1
 
How is blockchain technology making the supply chain smarter
How is blockchain technology making the supply chain smarter How is blockchain technology making the supply chain smarter
How is blockchain technology making the supply chain smarter Blockchain Council
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
7 major problems in blockchain
7 major problems in blockchain7 major problems in blockchain
7 major problems in blockchainCeline George
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSStylight
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessBomgar
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewPeter Waher
 
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Bomgar
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Challenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseChallenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseEugene Aseev
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Peter Waher
 
Blockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 BlockchainsBlockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 Blockchains101 Blockchains Academy
 

What's hot (20)

Blockchain DeFi Platform Design & Development Webinar
Blockchain DeFi Platform Design & Development WebinarBlockchain DeFi Platform Design & Development Webinar
Blockchain DeFi Platform Design & Development Webinar
 
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
 
How will the finance industry benefited by blockchain technology in 2020
How will the finance industry benefited by blockchain technology in 2020How will the finance industry benefited by blockchain technology in 2020
How will the finance industry benefited by blockchain technology in 2020
 
Blockchain security a different perspective
Blockchain security a different perspectiveBlockchain security a different perspective
Blockchain security a different perspective
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
 
Transaction speed
Transaction speedTransaction speed
Transaction speed
 
How is blockchain technology making the supply chain smarter
How is blockchain technology making the supply chain smarter How is blockchain technology making the supply chain smarter
How is blockchain technology making the supply chain smarter
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
7 major problems in blockchain
7 major problems in blockchain7 major problems in blockchain
7 major problems in blockchain
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJSSupply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
 
Protecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged AccessProtecting Sensitive and Critical Financial Data with Privileged Access
Protecting Sensitive and Critical Financial Data with Privileged Access
 
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & OverviewIEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
 
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend A...
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Challenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the EnterpriseChallenges of Blockchain Technology for the Enterprise
Challenges of Blockchain Technology for the Enterprise
 
Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99Globally Scalable Mobile Digital ID using IEEE P1451.99
Globally Scalable Mobile Digital ID using IEEE P1451.99
 
Blockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 BlockchainsBlockchain in Trade Finance - 101 Blockchains
Blockchain in Trade Finance - 101 Blockchains
 

Viewers also liked

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Grad's ! What’s next ?
Grad's ! What’s next ?Grad's ! What’s next ?
Grad's ! What’s next ?Nimish Joseph
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
Grads ! What's next?
Grads ! What's next?Grads ! What's next?
Grads ! What's next?Nimish Joseph
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofNimish Joseph
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshopBusinessVictoria
 
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...OurCrowd
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from SymantecArrow ECS UK
 
Evaluation and due diligence of business angel investments
Evaluation and due diligence of business angel investmentsEvaluation and due diligence of business angel investments
Evaluation and due diligence of business angel investmentsClaude Florin
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineAnatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineRobert McDermott
 
Product & Pricing Strategies
Product & Pricing StrategiesProduct & Pricing Strategies
Product & Pricing Strategiesguest082e19
 

Viewers also liked (17)

Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Grad's ! What’s next ?
Grad's ! What’s next ?Grad's ! What’s next ?
Grad's ! What’s next ?
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
BitFinex Hack Overview
BitFinex Hack OverviewBitFinex Hack Overview
BitFinex Hack Overview
 
Grads ! What's next?
Grads ! What's next?Grads ! What's next?
Grads ! What's next?
 
Elliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proofElliptic curve cryptography and zero knowledge proof
Elliptic curve cryptography and zero knowledge proof
 
Commercialising your New Idea workshop
Commercialising your New Idea workshopCommercialising your New Idea workshop
Commercialising your New Idea workshop
 
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
The Lifecycle of an OurCrowd Investment: Following a Company's Progress from ...
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Evaluation and due diligence of business angel investments
Evaluation and due diligence of business angel investmentsEvaluation and due diligence of business angel investments
Evaluation and due diligence of business angel investments
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) PipelineAnatomy of a Continuous Integration and Delivery (CICD) Pipeline
Anatomy of a Continuous Integration and Delivery (CICD) Pipeline
 
Product & Pricing Strategies
Product & Pricing StrategiesProduct & Pricing Strategies
Product & Pricing Strategies
 

Similar to BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC

It's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-SigIt's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-Sigwillbitgo
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impactOliviaJune1
 
Top crypto wallets best 7 bitcoin wallet apps in 2022
Top crypto wallets  best 7 bitcoin wallet apps in 2022Top crypto wallets  best 7 bitcoin wallet apps in 2022
Top crypto wallets best 7 bitcoin wallet apps in 2022Moon Technolabs Pvt. Ltd.
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for BusinessBente Larsen
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 

Similar to BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC (20)

It's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-SigIt's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
It's Time to End the Cold Storage Ice Age and Adopt Multi-Sig
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
The Coin Tree media kit deck
The Coin Tree   media kit deckThe Coin Tree   media kit deck
The Coin Tree media kit deck
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
Top crypto wallets best 7 bitcoin wallet apps in 2022
Top crypto wallets  best 7 bitcoin wallet apps in 2022Top crypto wallets  best 7 bitcoin wallet apps in 2022
Top crypto wallets best 7 bitcoin wallet apps in 2022
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Making Blockchain Real for Business
Making Blockchain Real for BusinessMaking Blockchain Real for Business
Making Blockchain Real for Business
 
5 ways
5 ways5 ways
5 ways
 
The coin tree summarized 10-15
The coin tree   summarized 10-15The coin tree   summarized 10-15
The coin tree summarized 10-15
 
09 cointree
09 cointree09 cointree
09 cointree
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC

  • 1. How to Stop Bitcoin Theft: 
 Multi-Sig Wallets Make Bitcoin Secure and Useful for New Industries
 Will O’Brien CEO & Co-Founder, BitGo will@bitgo.com April 8, 2014
  • 2. Today’s Talk •  Landscape of Bitcoin security •  Introduction to multi-sig •  Multi-sig for the enterprise •  Multi-sig for new industries COPYRIGHT © 2014 BITGO, INC. 2
  • 3. Who Am I? •  Will O’Brien •  CEO & Co-Founder of BitGo •  Computer Science, Harvard •  FinTech, trading platforms and capital markets •  MBA, MIT Sloan •  Startups and mid-size companies in consumer, payments, video games, and media •  Obsessed with Bitcoin since 2012 COPYRIGHT © 2014 BITGO, INC. 3
  • 4. BitGo: Multi-Sig Security-as-a-Services •  First  multi-­‐sig  wallet   •  Monitor  holdings  of  any   other  wallet  or  address   •  BitGo  Enterprise   •  BitGo  API   COPYRIGHT © 2014 BITGO, INC. 4
  • 5. Q: What is the biggest threat to Bitcoin adoption?
  • 6. Threats to Bitcoin Adoption COPYRIGHT © 2014 BITGO, INC. 6 Regulation   Price  volatility   Security   Liquidity  
  • 7. Security a Fundamental Threat “An  Australian  bitcoin  bank  has  been  hacked,  the  service’s  operator  only  known  as  ‘Tradefortress’   refused  to  give  his  name  to  the  press,  stressing  he  was  not  much  older  than  18.”   Over $40,000 has been stolen from Bitcoin wallet provider Coinbase. ”  “ The Bloomberg reporter opened up his paper wallet to show the private key, and, not too surprisingly, the funds were quickly stolen. “ ”   $1.2M hack shows why you should never store Bitcoins on the Internet COPYRIGHT © 2014 BITGO, INC. 7
  • 8. Market analog: IT security now a primary concern for CXOs and BoDs 22%   54%   2007   2012   %  of  Enterprises   Sources:  Cisco,  Forrester,  Gartner,  IDC,  IBM,  Ponemon  Institute,  analyst  reports,  Bain  analysis   SECURITY  ISSUES  FREQUENTLY  DISCUSSED   WITH  BOD  ON  QUARTERLY  BASIS   HIGHER  PROFILE  OF  SECURITY  IS  DUE  TO  FREQUENCY,   SCALE  &  IMPACT  OF  ATTACKS   •  Cost  of  cybercrimes  rose  to  a  median  $5.9M  per   organization  in  2011,  a  56%  increase     •  Security  vulnerability  disclosures  grew  to  ~9K  in   2012,  a  29%  increase     •  Symantec  blocked  more  than  5.5B  malware  attacks   in  2011,  an  81%  increase   •  Web  based  attacks  rose  to  4.5K  per  day  in  2011,  a   36%  increase   •  Mobile  malware  grew  by  400%,  with  Android   attacks  growing  by  2577%  in  2013   •  DDoS  attacks  increased  by  27%,  with  the  largest   attack  measuring  at  100.84  Gbps  and  lasting  20   minutes  in  2013   SIGNIFICANT  %  OF  CSOS  (SECURITY)  NOW   REPORT  TO  TOP  LEADERSHIP   •  54%  report  to  C-­‐level  execs  (including  CIOs)   •  30%  report  to  CEO,  BoD,  or  enterprise  risk   team   COPYRIGHT © 2014 BITGO, INC. 8
  • 9. Global IT security market growing to $92B with strong consolidation trend COPYRIGHT © 2014 BITGO, INC. 9 43   60   16   23   5   8   2012   2016F   Enterprise   SMB   Consumer   9%   10%   14%   CAGR   12-­‐16   Note:  Excludes  MPLS  VPN   Sources:  IDC,  Gartner,  analyst  reports,  Bain  analysis,  company  financials   25   35   $0B   $10B   $20B   $30B   $40B   $50B   $60B   $70B   $80B   $90B   $100B   2012   2016F   ROW   US   10%   9%   CAGR   12-­‐16   $64B   $92B   $64B   $92B   Global  IT  security     market   GLOBAL  IT  SECURITY  MARKET   Identity  theft  protection   $7.68B  (acquired  by  Intel  in  2010)   $14.5B  (NASDAQ:SYMC)   $1.29B  (acq.  by  Symantec  in  2010)   $1.97B  (NYSE:LOCK)   $17.5B  (LON:EXPN)   Private  ($130m  revenue)   Anti-­‐virus  and  corporate  security   Identity  and  authentication   LEADING  COMPANIES  AND  EXITS  
  • 10. Quick Primer: Bitcoin Keys COPYRIGHT © 2014 BITGO, INC. 10 SECRET!   SAFE  
  • 11. Bitcoin Storage: A Costly Trade-Off COPYRIGHT © 2014 BITGO, INC. 11 Security   Accessibility   low   low   high   high   If  all  systems  can  be   hacked,  where  do  you   store  your  private  key?  
  • 12. Private  key  storage   local  computer   Security  threats   malware   key  logging   hard  drive  failure   forgotten  password   Examples   Bitcoin Storage: Desktop Wallets COPYRIGHT © 2014 BITGO, INC. 12 Security   Accessibility   desktop   wallets   low   low   high   high   Bitcoin-­‐QT   Android   wallet   Note:  some  of  these  wallets  are  exploring  multi-­‐sig    
  • 13. Private  key  storage   online   Security  threats   server  hacking   denial  of  service   phishing   key  logging   insider  theft   Examples   Bitcoin Storage: Hosted Wallets COPYRIGHT © 2014 BITGO, INC. 13 Security   Accessibility   desktop   wallets   low   low   high   high   hosted  wallets   Note:  Blockchain  does  not  store  your  keys  
  • 14. Private  key  storage   online   Security  threats   server  hacking   denial  of  service   phishing   key  logging   insider  theft   regulatory  action   Examples   Bitcoin Storage: Exchanges COPYRIGHT © 2014 BITGO, INC. 14 Security   Accessibility   desktop   wallets   low   low   high   high   hosted  wallets   &  exchanges   Note:  for  illustration  purposes  only  
  • 15. Private  key  storage   offline   Security  threats   physical  loss   physical  theft   coercion   forgotten  password   Examples   Bitcoin Storage: Offline COPYRIGHT © 2014 BITGO, INC. 15 Security   Accessibility   desktop   wallets   low   low   high   high   hosted  wallets   &  exchanges   cold  storage  paper  wallets   cold   storage   paper   wallets   brain   wallets   physical   tokens   brain  wallets  
  • 16. Private  key  storage   (multi-­‐signature)   3  keys  distributed   -­‐  hosted  key   -­‐  user  key   -­‐  backup  (offline)   Security  threats   server  hacking   malware   key  logging   insider  theft   coercion   forgotten  password   Increased  security   measures   fraud  detection   spending  limits   corporate  treasury   cold  keys   Bitcoin Storage: Multi-Sig COPYRIGHT © 2014 BITGO, INC. 16 Security   Accessibility   desktop   wallets   low   low   high   high   hosted  wallets   &  exchanges   cold  storage  paper  wallets  brain  wallets  
  • 17. Comparing Bitcoin Wallet Architectures COPYRIGHT © 2014 BITGO, INC. 17
  • 18. With Multi-Sig You Hold Your Own Bitcoin, 100% on Blockchain COPYRIGHT © 2014 BITGO, INC. 18
  • 19. Multi-Sig for the Enterprise COPYRIGHT © 2014 BITGO, INC. 19
  • 20. Evolution of Bitcoin Corporate Adoption COPYRIGHT © 2014 BITGO, INC. 20 Lower  costs,   reduce  fraud   PR  and  sales   increase   Accept  Bitcoin   Asset   investment   Digital   currency   trading   Hold  Bitcoin   Supply  chain   Payroll   Promotions   Use  Bitcoin   -­‐  Big  Fish  Games   -­‐  Overstock.com   -­‐  Square   -­‐  TigerDirect   -­‐  Zynga   -­‐  30K+  merchants   -­‐  Bitcoin  Investment  Trust   -­‐  Fortress/  Pantera   -­‐  Sator  Square   -­‐  BitPay   -­‐  Gyft   -­‐  Lamassu  ATM  
  • 21. Company   Profile   Businesses  accepting  and   spending  Bitcoin   Family  office  investors  and   financial  institutions   Key  Needs   •  Accountant-­‐friendly  UI   •  Enterprise  security   •  Spending  limits  and   transaction  approvals  for   various  users  in  the  org   •  Regular  financial  reports   •  Trader-­‐friendly  UI   •  Enterprise  security  for  large   Bitcoin  holdings   •  Fund  administration  that   meets  corporate  governance   requirements   •  Robust  audit  trail  and   financial  reporting   Multi-­‐Sig   Setup   •  2-­‐of-­‐3  key  wallets   •  Access  by  multiple  users   with  different  rights   •  M-­‐of-­‐N  key  wallets   •  Secondary  approval  for  large   transactions   Organizational Needs for Multi-Sig BITGO, INC. CONFIDENTIAL 21
  • 22. How an Organization Uses Multi-Sig COPYRIGHT © 2014 BITGO, INC. 22 Person   Spending  limit   Creates  wallets   Approves  spending   Views  holdings   CEO   $100,000   ✓   ✓   ✓   CFO   $100,000   ✓   ✓   ✓   VP  finance   $50,000   ✓   ✓   Director  accounting   $25,000   ✓   Financial  analyst   $0   ✓   Auditor   n/a   ✓   Enterprise  security  features   •  Network  fraud  detection   •  Spending  and  velocity  limits   •  Approval  chains   •  Time-­‐delayed  transactions  
  • 23. Corporate Dashboard COPYRIGHT © 2014 BITGO, INC. 23
  • 24. Wallet-Based Security and Permissions COPYRIGHT © 2014 BITGO, INC. 24
  • 25. Spending Limits in Action COPYRIGHT © 2014 BITGO, INC. 25
  • 26. Security and Approval Flow COPYRIGHT © 2014 BITGO, INC. 26
  • 28. Multi-Sig Custodial Accounts •  Escrow •  Gifts •  Auctions •  Real estate COPYRIGHT © 2014 BITGO, INC. 28
  • 29. Exchanges: Preventing the Next MtGox COPYRIGHT © 2014 BITGO, INC. 29 Risks  of  “pooled  holdings”  exchange   •  Theft  or  loss  of  all  funds   •  Government  seizure  of  funds   •  Limited  independent  auditing   •  No  insurance   •  No  notification  of  account  breach   POOLED  EXCHANGE  MODEL  
  • 30. Exchange Powered by Multi-Sig COPYRIGHT © 2014 BITGO, INC. 30
  • 31. Five Parties Model COPYRIGHT © 2014 BITGO, INC. 31 http://www.systemics.com/docs/ricardo/issuer/faq_governance.html#5PM   http://bitcoinmagazine.com/10639/five-­‐parties-­‐model/  
  • 32. Get Started with Multi-Sig •  Individual: 
 Use a multi-sig secure wallet •  Merchant or financial institution: 
 Use a multi-sig, multi-signer wallet •  Bitcoin exchange or business:
 Bake multi-sig in to your transaction model using custodial accounts COPYRIGHT © 2014 BITGO, INC. 32 API  
  • 33. Build on the BitGo API •  Exchanges,  trading  platforms,  funds,  marketplaces,  escrow   services,  and  beyond  can  build  systems  on  the  BitGo  API   •  The  BitGo  API  enables  the  following  operations:   –  Creation  of  M-­‐of-­‐N  P2SH  (multi-­‐sig)  addresses   –  Hierarchical  Deterministic  Wallet  management  (BIP32)   –  Transaction  creation   –  Transaction  signing   –  Spending  limits   –  Multi-­‐signer  address  flow   COPYRIGHT © 2014 BITGO, INC. 33
  • 34. Industry Goals for Multi-Sig •  Secure the majority of Bitcoin holdings with multi-sig by the end of 2014 •  Embrace standards and industry best practices like BIP32 (HD wallets) •  Innovate on new models based on multi-sig Make 2014 the Year of Multi-Sig! COPYRIGHT © 2014 BITGO, INC. 34
  • 35. Thank you COPYRIGHT © 2014 BITGO, INC. 35 https://www.bitgo.com   will@bitgo.com   @BitGoInc