The document discusses various scams and vulnerabilities related to cryptocurrency and web3 technologies. It begins by introducing Zoltan Balazs and his work researching vulnerabilities. It then describes several types of scams, including rug pulls, giveaway scams, advance fee fraud, and hardware wallet scams. Best practices are suggested, such as being wary of unsolicited messages, verifying sources of apps/dapps, and using strong passwords and hardware wallets to protect funds. The overall message is that web3 and cryptocurrency technologies have enabled numerous scams that have impacted many users.
Mr. Donald Rumsfeld, former Defence Secretary of USA, stated in his book "Known and Unknown: A Memoir" that "There are known knowns, things we know that we know; and there are known unknowns, things that we know we don't know. But there are also unknown unknowns, things we do not know we don't know." And to know that unknowns of the unknown, my journey with the APNIC honeynet project started and I am going to share my experiences here in this talk.
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”Casey Ellis
Bugcrowd was founded at an inflection point in the history of the Internet and awareness of cybersecurity. A lot has changed since 2012 - to the cybersecurity industry, to the technology landscape, to the view of hackers as helpful and not just harmful, and - importantly - to the awareness of cybersecurity as "everyone's problem".
In 2023, we find ourselves at a similar inflection point for our space. This keynote unpacks the last 11 years as a predictor of what is next, and as an encouragement and roadmap for budding cybersecurity entrepreneurs and solutioneers.
Public facing web sites are constantly under attack and keeping websites protected is an arms race, yet security rarely gets a look-in at specification and budget allocation stages of delivering a web site - or at best is an afterthought. Yet everyone has an expectation of security and QOS that implies it is central to every project.
Security considerations should pervade all stages of a project from initial specification, throughout development and testing and on to ongoing hosting and maintenance.
In this session I will cover:
* Common threats to web security with real world case studies of compromised sites,
* Simple approaches to mitigating common threats/vulnerabilities,
* Defence in depth – an overview of the various components of web security,
* Drupal specific measures that standard penetration testing often does not account for.
* An overview of how to benefit from:
* Security monitoring and log analysis
* Intrusion Detection Systems & Firewalls
* Security headers and Content Security Policies (CSP).
Comments: https://joind.in/talk/8bbea
Mr. Donald Rumsfeld, former Defence Secretary of USA, stated in his book "Known and Unknown: A Memoir" that "There are known knowns, things we know that we know; and there are known unknowns, things that we know we don't know. But there are also unknown unknowns, things we do not know we don't know." And to know that unknowns of the unknown, my journey with the APNIC honeynet project started and I am going to share my experiences here in this talk.
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”Casey Ellis
Bugcrowd was founded at an inflection point in the history of the Internet and awareness of cybersecurity. A lot has changed since 2012 - to the cybersecurity industry, to the technology landscape, to the view of hackers as helpful and not just harmful, and - importantly - to the awareness of cybersecurity as "everyone's problem".
In 2023, we find ourselves at a similar inflection point for our space. This keynote unpacks the last 11 years as a predictor of what is next, and as an encouragement and roadmap for budding cybersecurity entrepreneurs and solutioneers.
Public facing web sites are constantly under attack and keeping websites protected is an arms race, yet security rarely gets a look-in at specification and budget allocation stages of delivering a web site - or at best is an afterthought. Yet everyone has an expectation of security and QOS that implies it is central to every project.
Security considerations should pervade all stages of a project from initial specification, throughout development and testing and on to ongoing hosting and maintenance.
In this session I will cover:
* Common threats to web security with real world case studies of compromised sites,
* Simple approaches to mitigating common threats/vulnerabilities,
* Defence in depth – an overview of the various components of web security,
* Drupal specific measures that standard penetration testing often does not account for.
* An overview of how to benefit from:
* Security monitoring and log analysis
* Intrusion Detection Systems & Firewalls
* Security headers and Content Security Policies (CSP).
Comments: https://joind.in/talk/8bbea
THE BEST AMONG CRYPTOCURRENCIES FARGO COIN
Now start registration! But in the beginning only the leaders!
JOIN - https://befargo.com/?ref=Naeemshah7866
The company has a MLM promotion and bonuses:
DIRECT bonus - up to 15%
BINARY bonus up to 15%
MATCHING bonus - 1/10%, 2/10%, 3/15%, 4/20%, 5/5%
CAREER REWARDS
MANING PROFIT - mining of coins in a large Pool
More information:
http://FRGC.online/ English
http://money.fargocointr.info/ Turkish
http://money.fargocoincn.info/ Chinese
http://FRGC.ru/ Russian
Main - https://fargocoin.org
Blockchain - https://fargochain.org
Faucet - https://fargofaucet.com/
Promo - https://fargopromo.org
Mining pool - https://befargo.com
Exchange - https://coinrate.net
US Exchange - https://fargobase.com
Github - https://github.com/fargocoin
join on telegram :
https://t.me/naeemshahFargocoin
Join on skype :
+923100961588
Join on facebook :
+923100961588
Fargocoin Presentation Part#1
https://www.youtube.com/watch?v=zmneXVdVjVc&t=1s
Part#2
https://www.youtube.com/watch?v=OZ1nnjtDNyw&t=1s
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
This is a Blockchain introduction to different funding mechanisms in tokenisation. The presentation covers ICO - IEO - DAICO - STO - ETO and is presented by Ruben Merre.
Initial coin offerings - initial exchange offerings - security token offerings
CryptoCurrency is one of the hottest ways to make money right now!
You cannot escape hearing about Bitcoin and all the other CryptoCurrencies and how people are making tons of money buying, holding, and selling CryptoCurrency.
Would you like to join an exclusive group of people in the know of the hottest new market almost nobody knows? You can, with this Cryptocurrency Secrets eBook.
Using Blockchain to Increase Supply Chain TransparencyHorea Porutiu
Slides used for a live webinar: Efficiency and transparency in a coffee bean supply chain. Showing how Hyperledger is different than other blockchain platforms, and what makes it a great product for the enterprise.
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsCase IQ
As Bitcoin and blockchains are coming into the mainstream, investigators, auditors and forensics and security professionals need to become familiar with how blockchain works and why it is so important to tomorrow’s digital security. It is important for anyone involved in forensics to understand the risk associated with Bitcoin, the most notable usage of blockchain and how applying forensics to those risks can have an impact.
Bitcoin has huge potential to revolutionize financial services, but with risk, as is implicit with any currency. We need to understand how forensic technology can reduce these risks or solve problems of financial loss should these risks materialize. Technology helps us follow flows of cryptocurrencies through wallets and the blockchain. This can be of particular use to regulators and police forces as well as investigators and auditors.
Join Simon Padgett and Sheldon Bennett of DMG Blockchain Solutions Inc. as they outline the basics of cryptocurrency transactions and their associated risks and solutions.
Presentation on topics beyond the conventional ethical hacking , discusses job factors and scope in the security field :) this was presented in LPU (Lovely Professional University) as a Seminar with attendees over 200. Meet m e at FB if u want it fb/nipun.jaswal
This is a made easy e-book on how to understand the basics of cryptos summarized in the most understandable way it can be so that layman and normal people who have no idea on cryptos can decide if they will invest or not.
Co Speaker: Cheryl Biswas
Talk Description:
How about this: a blue team talk given by red teamers. But here’s our rationale - your best defence right now is a strategic offence. The rules of the game have changed and we need to get defence up to speed.
We’ll show you what the key elements are in a good defence strategy; what you can and need to be using to full advantage. We’ll talk about the new “buzzwords” and how they apply: visibility; patterns; big data. There’s a whole lotta data to wrangle, and you aren’t seeing the whole picture if you aren’t doing things right. Threat intel is about getting the big picture as it applies to you. You’ll learn the importance of context and prioritization so that you can manipulate intel feeds to do your bidding. And then we’ll take things further and talk about hunting the adversary, using an update on proven methodologies.
We’ll show you how to understand your data, correlate threats and pin point attacks. Attendees will leave with a new understanding of the resources they have on hand, and how to leverage those into an Adaptive Proactive Defense Strategy.
How To Get Rich With Bitcoin Even If
You Have No Clue About Technology
The surprising wealth-building secret of a
globe-trotting vagabond
The incredible story of how I missed the boat on Bitcoin,
still got rich, and how you can do the same...
THE BEST AMONG CRYPTOCURRENCIES FARGO COIN
Now start registration! But in the beginning only the leaders!
JOIN - https://befargo.com/?ref=Naeemshah7866
The company has a MLM promotion and bonuses:
DIRECT bonus - up to 15%
BINARY bonus up to 15%
MATCHING bonus - 1/10%, 2/10%, 3/15%, 4/20%, 5/5%
CAREER REWARDS
MANING PROFIT - mining of coins in a large Pool
More information:
http://FRGC.online/ English
http://money.fargocointr.info/ Turkish
http://money.fargocoincn.info/ Chinese
http://FRGC.ru/ Russian
Main - https://fargocoin.org
Blockchain - https://fargochain.org
Faucet - https://fargofaucet.com/
Promo - https://fargopromo.org
Mining pool - https://befargo.com
Exchange - https://coinrate.net
US Exchange - https://fargobase.com
Github - https://github.com/fargocoin
join on telegram :
https://t.me/naeemshahFargocoin
Join on skype :
+923100961588
Join on facebook :
+923100961588
Fargocoin Presentation Part#1
https://www.youtube.com/watch?v=zmneXVdVjVc&t=1s
Part#2
https://www.youtube.com/watch?v=OZ1nnjtDNyw&t=1s
The Revolution of Crypto Funding - Building towards a Scamless FutureRuben Merre
This is a Blockchain introduction to different funding mechanisms in tokenisation. The presentation covers ICO - IEO - DAICO - STO - ETO and is presented by Ruben Merre.
Initial coin offerings - initial exchange offerings - security token offerings
CryptoCurrency is one of the hottest ways to make money right now!
You cannot escape hearing about Bitcoin and all the other CryptoCurrencies and how people are making tons of money buying, holding, and selling CryptoCurrency.
Would you like to join an exclusive group of people in the know of the hottest new market almost nobody knows? You can, with this Cryptocurrency Secrets eBook.
Using Blockchain to Increase Supply Chain TransparencyHorea Porutiu
Slides used for a live webinar: Efficiency and transparency in a coffee bean supply chain. Showing how Hyperledger is different than other blockchain platforms, and what makes it a great product for the enterprise.
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsCase IQ
As Bitcoin and blockchains are coming into the mainstream, investigators, auditors and forensics and security professionals need to become familiar with how blockchain works and why it is so important to tomorrow’s digital security. It is important for anyone involved in forensics to understand the risk associated with Bitcoin, the most notable usage of blockchain and how applying forensics to those risks can have an impact.
Bitcoin has huge potential to revolutionize financial services, but with risk, as is implicit with any currency. We need to understand how forensic technology can reduce these risks or solve problems of financial loss should these risks materialize. Technology helps us follow flows of cryptocurrencies through wallets and the blockchain. This can be of particular use to regulators and police forces as well as investigators and auditors.
Join Simon Padgett and Sheldon Bennett of DMG Blockchain Solutions Inc. as they outline the basics of cryptocurrency transactions and their associated risks and solutions.
Presentation on topics beyond the conventional ethical hacking , discusses job factors and scope in the security field :) this was presented in LPU (Lovely Professional University) as a Seminar with attendees over 200. Meet m e at FB if u want it fb/nipun.jaswal
This is a made easy e-book on how to understand the basics of cryptos summarized in the most understandable way it can be so that layman and normal people who have no idea on cryptos can decide if they will invest or not.
Co Speaker: Cheryl Biswas
Talk Description:
How about this: a blue team talk given by red teamers. But here’s our rationale - your best defence right now is a strategic offence. The rules of the game have changed and we need to get defence up to speed.
We’ll show you what the key elements are in a good defence strategy; what you can and need to be using to full advantage. We’ll talk about the new “buzzwords” and how they apply: visibility; patterns; big data. There’s a whole lotta data to wrangle, and you aren’t seeing the whole picture if you aren’t doing things right. Threat intel is about getting the big picture as it applies to you. You’ll learn the importance of context and prioritization so that you can manipulate intel feeds to do your bidding. And then we’ll take things further and talk about hunting the adversary, using an update on proven methodologies.
We’ll show you how to understand your data, correlate threats and pin point attacks. Attendees will leave with a new understanding of the resources they have on hand, and how to leverage those into an Adaptive Proactive Defense Strategy.
How To Get Rich With Bitcoin Even If
You Have No Clue About Technology
The surprising wealth-building secret of a
globe-trotting vagabond
The incredible story of how I missed the boat on Bitcoin,
still got rich, and how you can do the same...
In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a user’s workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g. 3389) is allowed through the hardware firewall. But you also need persistent interactive C&C communication (e.g. Netcat, Meterpreter, RAT) to this server through the user’s workstation.
I developed (and will publish) two tools that help you in these situations. The first tool can drop malware to the server through the screen while the user is logged in. The second tool can help you to circumvent the hardware firewall after we can execute code on the server with admin privileges (using a signed kernel driver). My tools are generic meaning that they work against Windows server 2012 and Windows 8, and they work with RDP or other remote desktops. The number of problems you can solve with them are endless, e.g., communicating with bind-shell on webserver behind restricted DMZ. Beware, live demo and fun included!
This presentation is a fun introduction to the tools used by script kiddies, namely the Remote Admin Tools (or Remote Access Trojans). These GUI based hacking tools include a lot of funny and scary features.
[ENG] IPv6 shipworm + My little Windows domain pwnieZoltan Balazs
Hacktivity 2011 presentation about IPv6 Teredo protocol, Windows pass-the-hash attack
Original video in Hungarian: http://vimeo.com/31359639
Translated version: http://vimeo.com/31360814
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
4. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
5. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP
https://github.com/Z6543/hwfwbypass
6. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP
https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool
https://github.com/Z6543/Sandbox_tester
7. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP
https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool
https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai
https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html
https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
8. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP
https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool
https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai
https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html
https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
Invented the idea of encrypted exploit delivery via Dif
fi
e-Hellman key exchange, to bypass exploit
detection appliances
https://www.mrg-ef
fi
tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/
9. Head of Vulnerability Research Lab @ CUJO AI
Zombie Browser Toolkit
https://github.com/Z6543/ZombieBrowserPack
HWFW Bypass tool Similar stuff was used in PacketRedirect in Danderspritz FlewAvenue by EQGRP
https://github.com/Z6543/hwfwbypass
Malware Analysis Sandbox Tester tool
https://github.com/Z6543/Sandbox_tester
Played with crappy IoT devices – my RCE exploit code running on ~600 000 IP cameras via Persirai
https://jumpespjump.blogspot.hu/2015/09/how-i-hacked-my-ip-camera-and-found.html
https://jumpespjump.blogspot.hu/2015/08/how-to-secure-your-home-against.html
Invented the idea of encrypted exploit delivery via Dif
fi
e-Hellman key exchange, to bypass exploit
detection appliances
https://www.mrg-ef
fi
tas.com/generic-bypass-of-next-gen-intrusion-threat-breach-detection-systems/
Co-organizer of the Hackersuli meetup
Programme committee member of the Hacktivity conference
Volunteer at IoTVillage
16. What and why
This is a 2 hour presentation compressed into 25 minutes
17. What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
18. What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
I love playing with new technologies
19. What and why
This is a 2 hour presentation compressed into 25 minutes
Fasten your seatbelts
I love playing with new technologies
I
fi
nd blockchain + Web3 fascinating
22. This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
23. This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
24. This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
Crypto exchange hacks - see six/David's presentation
25. This presentation is NOT about/for
WHOLE CRYPTO WORLD IS A SCAM!!!!
Smart contract developers
Financial advise on which shitcoin to invest in
Crypto exchange hacks - see six/David's presentation
Cryptocurrency is used as a form of payment, e.g. ransomware
27. How did we get here?
Lot of people got rich from cryptocurrencies
28. How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
29. How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
30. How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
31. How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
New complex technology with crappy UI
32. How did we get here?
Lot of people got rich from cryptocurrencies
Lot of people want to get rich from cryptocurrencies
Total market capitalisation is around 2 1 trillion USD
2 1,000,000,000,000
New complex technology with crappy UI
What could possibly go wrong?
33.
34.
35. What is Bitcoin anyway?
Let’s hear it from a trusted,
3 Grammy award winner Blockchain expert!
36. What is Bitcoin anyway?
Let’s hear it from a trusted,
3 Grammy award winner Blockchain expert!
37. What is Bitcoin anyway?
https://youtu.be/5AN5veSPfY4
Let’s hear it from a trusted,
3 Grammy award winner Blockchain expert!
42. Step 1: Buy a lot from something what is
cheap and has low volume
43. Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
44. Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
45. Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
46. Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
Optional Step 5: Short on top
47. Step 1: Buy a lot from something what is
cheap and has low volume
Step 2: Advertise as the NEXT BIG THING
Step 3: Sell on top
Step 4: PROFIT
Optional Step 5: Short on top
50. Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
51. Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
52. Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
53. Rug pull
Similar to pump and
dump
But you are the owner/
developer of the
cryptocurrency/token/
whatever
Even Conti ransomware
group knew about
SQUID
65. What is an NFT anyway?
https://twitter.com/zh4ck/nft
https://etherscan.io/nft/0x06012c8cf97bead5deae237070f9587f8e7a266d/634517
https://etherscan.io/tx/
0xfe21bd24d7748890c4deb2453bcd22ab451349fdacb5e812422e16772a664723#eventlog
https://etherscan.io/address/0xb77feddb7e627a78140a2a32cac65a49ed1dba8e#code
71. The “magical” world of NFTs …
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
72. The “magical” world of NFTs …
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
73. The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
74. The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
75. The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Eminem - 123.45 ETH
Paris Hilton BAYC - 119 ETH
1 ETH = 1700 USD
76. The “magical” world of NFTs …
Snoop Dog - 2500 ETH
Justin Bieber - 500 ETH
Eminem - 123.45 ETH
Paris Hilton BAYC - 119 ETH
https://etherscan.io/token/0xbc4ca0eda7647a8ab7c2061c2e118a18a936f13d#readContract
https://ipfs.io/ipfs/QmeSjSinHpPnmXmspMjwiXyN6zS4E9zccariGR3jxcaWtq/9055
https://cid.ipfs.io/#QmTHcV6mGxHGeeXCnYtV129eRiR8Exni4sT8dDikBWBgzY
1 ETH = 1700 USD
122. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
123. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
124. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
125. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
126. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
127. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
128. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
129. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
130. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
take time, don’t rush
131. Best practices
don’t trust random people (or celebrities) on social media
check source of the app/dapp
don’t send funds to someone you don't trust, or verify via phone
block people/email sharing login, password, private key, seed phrase, backup phrase
extra careful to interact with KNOWN and unknown smart contracts
use password manager
enable 2fa, don’t use SMS based
use HW wallet if you have a lot to protect
keep PC free of malware
cold wallet for valuables - like you don’t store your life savings in your pocket wallet
take time, don’t rush
install security extensions like "Wallet Guard" or "Sunrise: NFT scam protector"
133. Hack the planet
One computer at a time
zoltan.balazs@cujo.com
https://hu.linkedin.com/in/zbalazs
Twitter – @zh4ck
www.slideshare.net/bz98
JumpESPJump.blogspot.com