SlideShare a Scribd company logo
Dejiny Podvodov v
Bitcoinovom Svete
MtGox? GLBSE? BitFunder? Btct.co? Neo&Bee?
/Matej Nemček @yangwao
Who I'm
Co-Founder of Hackerspace Progressbar
Senior Editor at Bitcoiner.sk
Maintainer of Slovak Bitcoin Forum Coinunity.sk
Frequent irc troll
What's Scam?
US carnival slang. Possibly from scamp (“swindler,
cheater”)
The word "scam" became common use among the US
"drug culture" in early 1980 after Operation ABSCAM,
an FBI sting operation directed at public officials,
became public.
What's Scam?
To trick or cheat someone out of their
posession(s). A ripoff.
The Internet is littered with scams such as pop-
up ads or email spam ads with "Get Rich
Quick/High-Paying Job/You Are A Winner"
messages.
Bitcoin
BTC/FIAT
exchanges
MtGox
(Magic: The Gathering Online
Exchange)
launched in July 2010
founded by Jed McCaleb
6/3/2011 Transfered to Mark Karpeles
70% of the world's bitcoin trades by April 2013
MtGox
controlled implosion since 2012
frequently delayed/refused/stoped withdrawals
19/7/2011 Mt.Gox auditor's computer compromised
(~$8,5M)
7/2/2014 withdrawals halted due to transaction
malleability
MtGox
28/2/2014 filled for bankcruptcy protection ($64M)
7/3/2014 Block 289321 200k BTC split up in much
smaller chunks (50B)
20/3/2014 reported 'lost' of 850,000 Bitcoins (~$473M)
Coinfloor
owner James McCarthy aka
Nefario
door closed to US clients
WeExchange
closed, with no formal announcement
operator Jon Montroll aka Ukyo
owner Graeme Tee
owner dissapreared
lot of technical issues
Cryptocoin
Exchanges
Another master piece of unlimited
lulz
Vircurex
ROR vulnerability
10/5/2013 lost 1454 BTC/ 225263 TRC / 2340 LTC (vps
hack)
24/3/2014 freezes withdrawals, claims lack of reserves
Just hacked..
Coinex.pw, Freshmarket.co.in, Poloniex.com,
Coinmarket.io,..
Bitcoin stock
exchanges
Bitcoinica
contract-for-difference (CFD) market
against the Bitcoin to USD
(BTC/USD) exchange rate
owner Zhou Tong (17yr)
launched 8/9/2011
3/2012 hackers stole 43554 BTC (~87M)
10 days after, hackers stole 18547 BTC (~90M)
GLBSE
Global Bitcoin Stock Exchange
shutdown on October 2012
owner James McCarthy aka
Nefario
BTC-TC
(Btct.co)
great concentration of scam assests
DMS.{MINING, SELLING,
PURCHASE}, LABGARDEN
owner Ethan Burnside
Bitfunder
Launched in December 2012
Held around $16m in assests
owner Jon Montroll aka Ukyo
Bitfunder
8/10/2013 banned people in the US
“All current BitFunder users who are located in
the United States or are determined to be United
States persons or entities will not be able to enter
into any new positions on the BitFunder website,
and, as of November 1, 2013, such users will also
not be allowed to sell positions on the BitFunder
website.”
Bitcoin Savings
and Trust
(BTCST)
owner Trendon T. Shavers
raised 700000 BTC (~$60M)
Havelock
Investments
bad personal experience (IPO)
previous owner Topace
1/11/2013 acquired by The Panama Fund
NEOBEEQ, previously NEOBEE
LMB Holdings
Neo & Bee
Easycoin
Neo Xchange
Well written IPO prospectus
Neo & Bee (LMB)
28/3/2014
HLI has been formally informed by the Pass-
Through Fund Manager of NEOBEE that
the compliance officer of Neo and Bee Ltd
has stated that due to an increase of
abnormal activity on the LMB share
platform, there may be a high possibility of
questionable trading activity. While Neo
and Bee Ltd investigate the issue further
they have strongly recommended that we
halt trading and transfers. HLI has halted
the NEOBEE fund and is awaiting further
instructions from the issuer.
Neo & Bee
(LMB)
Danny Brewster steps down as CEO
Danny Brewster (ex-CEO?) - claims lost of coins
(1420BTC) in BitFunder/WeExchange
Neo & Bee (LMB)
4/4/2014
The Fund will now be designated as NEOBEEQ
to reflect the uncertainty of the future of LMB
Holdings – NEO BEE Ltd.
Neo & Bee (LMB)
Danny claims he left Cyprus w/o clients money and for
bussines
Ponzi Scheme
over Bitcoin (in
stocks)
Investor.gov issued warning
(23/7/2013)
Common Red Flags of Fraud
High investment returns with little or no risk
Overly consistent returns
Unregistered investments
Unlicensed sellers
Secretive and/or complex strategies and fee structures
It comes through someone with a shared affinity
Is there way how to evade
Ponzi?
Mastercoin
Colored Coins
Ethereum
Mastercoin
protocol layer: Bitcoin
user-defined currencies
decentralized exchange
smart property
savings wallets/addresses
Ethereum
Sub-currencies
Financial derivatives
Identity and Reputation Systems
Decentralized File Storage
Decentralized Autonomus Organizations
Savings wallets
Smart multisignature escrow
P2P gambling
On-chain stock markets
On-chain decentralized marketplaces
How to evade problems of
FIAT exchanges?
Multisig
or pickup one with 'audit' (solvency
report)
Bitstamp.net
Kraken.com
Bitcointalk.org warning
quote
Moderators do not remove likely scams. You
must use your own brain: caveat emptor. Watch
out for Ponzi schemes. Do not invest more than
you can afford to lose.
Thanks for your attendance
Thanks to Security Session
Orgs

More Related Content

What's hot

What is Bitcoin & Dark Markets History
What is Bitcoin & Dark Markets HistoryWhat is Bitcoin & Dark Markets History
What is Bitcoin & Dark Markets History
Alejandro De La Torre
 
Chernokozov ProfitFormula
Chernokozov ProfitFormulaChernokozov ProfitFormula
Chernokozov ProfitFormula
Chernokozov Inc
 
Hassans
HassansHassans
A Gentle introduction to Blockchain with Ethereum
A Gentle introduction to Blockchain with EthereumA Gentle introduction to Blockchain with Ethereum
A Gentle introduction to Blockchain with Ethereum
Johann Romefort
 
Market Risk Management Of Cryprocurrencies
Market Risk Management Of CryprocurrenciesMarket Risk Management Of Cryprocurrencies
Market Risk Management Of Cryprocurrencies
pjfitzpatrick
 
Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620
Blokcert
 
What is BTC?
What is BTC?What is BTC?
What is BTC?
MashaZhou
 
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
Steven Rhyner
 
CRYPTO CURRENCY
CRYPTO CURRENCY CRYPTO CURRENCY
CRYPTO CURRENCY
SergioCruz682281
 
Intotheblock: What Data Tell Us About Stablecoins
Intotheblock: What Data Tell Us About StablecoinsIntotheblock: What Data Tell Us About Stablecoins
Intotheblock: What Data Tell Us About Stablecoins
intotheblock
 
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
Crypto Currency Focus
 
Df sba bitcoin and other cryptocurrencies 13_june2014_v3
Df sba bitcoin and other cryptocurrencies 13_june2014_v3Df sba bitcoin and other cryptocurrencies 13_june2014_v3
Df sba bitcoin and other cryptocurrencies 13_june2014_v3
DiploFoundation
 
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SECCboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
Jeff Martinez
 
From Crypto Kitties to non fungible token to ERC721 standard
From Crypto Kitties to non fungible token to ERC721 standardFrom Crypto Kitties to non fungible token to ERC721 standard
From Crypto Kitties to non fungible token to ERC721 standard
maeste
 
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
Cristina Dolan
 

What's hot (15)

What is Bitcoin & Dark Markets History
What is Bitcoin & Dark Markets HistoryWhat is Bitcoin & Dark Markets History
What is Bitcoin & Dark Markets History
 
Chernokozov ProfitFormula
Chernokozov ProfitFormulaChernokozov ProfitFormula
Chernokozov ProfitFormula
 
Hassans
HassansHassans
Hassans
 
A Gentle introduction to Blockchain with Ethereum
A Gentle introduction to Blockchain with EthereumA Gentle introduction to Blockchain with Ethereum
A Gentle introduction to Blockchain with Ethereum
 
Market Risk Management Of Cryprocurrencies
Market Risk Management Of CryprocurrenciesMarket Risk Management Of Cryprocurrencies
Market Risk Management Of Cryprocurrencies
 
Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620Blockchain Tutorial and Facebook Libra Ver. 190620
Blockchain Tutorial and Facebook Libra Ver. 190620
 
What is BTC?
What is BTC?What is BTC?
What is BTC?
 
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
BITCOIN EXCHANGE TRENDS 2016: CHEAP DEPOSITS, INSTANT WITHDRAWALS AND MARGIN ...
 
CRYPTO CURRENCY
CRYPTO CURRENCY CRYPTO CURRENCY
CRYPTO CURRENCY
 
Intotheblock: What Data Tell Us About Stablecoins
Intotheblock: What Data Tell Us About StablecoinsIntotheblock: What Data Tell Us About Stablecoins
Intotheblock: What Data Tell Us About Stablecoins
 
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
3 Compelling Reasons Why Investing In Cryptocurrency Now Could Prove Wise
 
Df sba bitcoin and other cryptocurrencies 13_june2014_v3
Df sba bitcoin and other cryptocurrencies 13_june2014_v3Df sba bitcoin and other cryptocurrencies 13_june2014_v3
Df sba bitcoin and other cryptocurrencies 13_june2014_v3
 
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SECCboe BZX Exchange Cryptocurrency Fund Letter to SEC
Cboe BZX Exchange Cryptocurrency Fund Letter to SEC
 
From Crypto Kitties to non fungible token to ERC721 standard
From Crypto Kitties to non fungible token to ERC721 standardFrom Crypto Kitties to non fungible token to ERC721 standard
From Crypto Kitties to non fungible token to ERC721 standard
 
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
 

Similar to Dejiny podvodov v bitcoinovom svete

Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
PMILebanonChapter
 
Failed Cryptocurrencies
Failed CryptocurrenciesFailed Cryptocurrencies
Failed Cryptocurrencies
InvestingTips
 
How bitcoin Works.pptx
How bitcoin Works.pptxHow bitcoin Works.pptx
How bitcoin Works.pptx
urshari
 
Saske SXAS
Saske SXASSaske SXAS
Saske SXAS
Saske SXAS
 
Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)
Shantanu Singh
 
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdf
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdfTop 20 Cryptocurrencies Worth Checking Out In 2022.pdf
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdf
Charles Sylvester
 
Top 10 Ways To Make Money In Cryptocurrency.pdf
Top 10 Ways To Make Money In Cryptocurrency.pdfTop 10 Ways To Make Money In Cryptocurrency.pdf
Top 10 Ways To Make Money In Cryptocurrency.pdf
Digital Coin
 
What is bitcoin?
What is bitcoin?What is bitcoin?
What is bitcoin?
Sharesarkar
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
Case IQ
 
Crypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdfCrypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdf
Mukeshbhaskar8
 
BTCetc – ETC Group Physical Bitcoin (BTCE) Presentation
BTCetc – ETC Group  Physical Bitcoin (BTCE) PresentationBTCetc – ETC Group  Physical Bitcoin (BTCE) Presentation
BTCetc – ETC Group Physical Bitcoin (BTCE) Presentation
Peter Wises
 
Bitcoin - Cos'è e come si usa la moneta virtuale
Bitcoin - Cos'è e come si usa la moneta virtuale Bitcoin - Cos'è e come si usa la moneta virtuale
Bitcoin - Cos'è e come si usa la moneta virtuale
Alumni Mathematica
 
Bitcoin presentation
Bitcoin presentationBitcoin presentation
Bitcoin presentation
Mahendra Vishwkarma
 
Cryptocurrencies 101
Cryptocurrencies 101Cryptocurrencies 101
Cryptocurrencies 101
Brett Colbert
 
Forget about Bitcoins & invest in Ethereum. Now.
Forget about Bitcoins & invest in Ethereum. Now.Forget about Bitcoins & invest in Ethereum. Now.
Forget about Bitcoins & invest in Ethereum. Now.
Paul Moriou
 
Bitcoin at $600?
Bitcoin at $600?Bitcoin at $600?
Bitcoin at $600?
InvestingTips
 
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
Sahil Arya
 
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
Sahil Arya
 
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdfPrices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
Mohamed Aswad
 
Top 10 Cryptocurrency List 2023
Top 10 Cryptocurrency List 2023Top 10 Cryptocurrency List 2023
Top 10 Cryptocurrency List 2023
dyorcryptoworld
 

Similar to Dejiny podvodov v bitcoinovom svete (20)

Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
 
Failed Cryptocurrencies
Failed CryptocurrenciesFailed Cryptocurrencies
Failed Cryptocurrencies
 
How bitcoin Works.pptx
How bitcoin Works.pptxHow bitcoin Works.pptx
How bitcoin Works.pptx
 
Saske SXAS
Saske SXASSaske SXAS
Saske SXAS
 
Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)
 
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdf
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdfTop 20 Cryptocurrencies Worth Checking Out In 2022.pdf
Top 20 Cryptocurrencies Worth Checking Out In 2022.pdf
 
Top 10 Ways To Make Money In Cryptocurrency.pdf
Top 10 Ways To Make Money In Cryptocurrency.pdfTop 10 Ways To Make Money In Cryptocurrency.pdf
Top 10 Ways To Make Money In Cryptocurrency.pdf
 
What is bitcoin?
What is bitcoin?What is bitcoin?
What is bitcoin?
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
Crypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdfCrypto Quantum Leap (1).pdf
Crypto Quantum Leap (1).pdf
 
BTCetc – ETC Group Physical Bitcoin (BTCE) Presentation
BTCetc – ETC Group  Physical Bitcoin (BTCE) PresentationBTCetc – ETC Group  Physical Bitcoin (BTCE) Presentation
BTCetc – ETC Group Physical Bitcoin (BTCE) Presentation
 
Bitcoin - Cos'è e come si usa la moneta virtuale
Bitcoin - Cos'è e come si usa la moneta virtuale Bitcoin - Cos'è e come si usa la moneta virtuale
Bitcoin - Cos'è e come si usa la moneta virtuale
 
Bitcoin presentation
Bitcoin presentationBitcoin presentation
Bitcoin presentation
 
Cryptocurrencies 101
Cryptocurrencies 101Cryptocurrencies 101
Cryptocurrencies 101
 
Forget about Bitcoins & invest in Ethereum. Now.
Forget about Bitcoins & invest in Ethereum. Now.Forget about Bitcoins & invest in Ethereum. Now.
Forget about Bitcoins & invest in Ethereum. Now.
 
Bitcoin at $600?
Bitcoin at $600?Bitcoin at $600?
Bitcoin at $600?
 
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
CRYPTO-CURRENCY By Sahil (G.N.D.U College, Jalandhar)
 
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
CRYPTO-CURRENCY. Ppt by Sahil (G.N.D.U college, Jalandhar)
 
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdfPrices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
Prices of Top Cryptocurrency Bitcoin and Ethereum Look Stable.pdf
 
Top 10 Cryptocurrency List 2023
Top 10 Cryptocurrency List 2023Top 10 Cryptocurrency List 2023
Top 10 Cryptocurrency List 2023
 

More from Security Session

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Security Session
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Security Session
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Security Session
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Security Session
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Security Session
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Security Session
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Security Session
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
Security Session
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Security Session
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Security Session
 
OSINT and beyond
OSINT and beyondOSINT and beyond
OSINT and beyond
Security Session
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan Kopecký
Security Session
 
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin DrábKontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Security Session
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
Security Session
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Security Session
 
Turris - Robert Šefr
Turris - Robert ŠefrTurris - Robert Šefr
Turris - Robert Šefr
Security Session
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
Security Session
 
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - 	Pavel TáborskýJak odesílat zprávy, když někdo vypne Internet - 	Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Security Session
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal Ambrož
Security Session
 

More from Security Session (20)

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
 
Prezentace brno
Prezentace brnoPrezentace brno
Prezentace brno
 
OSINT and beyond
OSINT and beyondOSINT and beyond
OSINT and beyond
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan Kopecký
 
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin DrábKontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
 
Turris - Robert Šefr
Turris - Robert ŠefrTurris - Robert Šefr
Turris - Robert Šefr
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - 	Pavel TáborskýJak odesílat zprávy, když někdo vypne Internet - 	Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal Ambrož
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Dejiny podvodov v bitcoinovom svete