S4 E7: Peter Todd on Hardware Wallets, Security & ProofMarshall

Published: Feb. 4, 2020, 7:27 a.m.

<p>4:02 \u2013 Intro</p>\n<p>\xa0</p>\n<p>5:24 \u2013 Hardware Wallet Physical Security</p>\n<p>\xa0</p>\n<p>6:10 \u2013 Buying hardware wallets on eBay?</p>\n<p>\xa0</p>\n<p>7:04 \u2013 Toothbrush analogy</p>\n<p>\xa0</p>\n<p>7:26 \u2013 Supply chain attacks</p>\n<p>\xa0</p>\n<p>7:40 \u2013 Fake seed cards<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>8:20 \u2013 Does Peter Todd use any hardware wallets?</p>\n<p>\xa0</p>\n<p>9:10 \u2013 Hardware wallets as part of the Bitcoin lifestyle<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>9:30 \u2013 Dealing with Bitcoin in the early days</p>\n<p>\xa0</p>\n<p>10:40 \u2013 Peter Todd running Qubes and multiple virtual machines</p>\n<p>\xa0</p>\n<p>11:29 \u2013 Advice for newbies</p>\n<p>\xa0</p>\n<p>13:00 \u2013 The economics of hardware wallets</p>\n<p>\xa0</p>\n<p>13:50 \u2013 Markets for Bitcoin transaction data<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>15:00 \u2013 Are Electrum servers ran by Chainalysis?</p>\n<p>\xa0</p>\n<p>16:30 \u2013 Chainalysis and Bitcoin exchanges</p>\n<p>\xa0</p>\n<p>17:00 \u2013 Shapeshift\u2019s KeepKey</p>\n<p>\xa0</p>\n<p>18:31 \u2013 Does Peter Todd use a Coldcard?</p>\n<p>\xa0</p>\n<p>20:22 \u2013 The issue of hardware wallet screens and checking addresses</p>\n<p>\xa0</p>\n<p>21:55 \u2013 Packaging to discourage supply chain attacks</p>\n<p>\xa0</p>\n<p>23:00 \u2013 Coldcard and PSBT</p>\n<p>\xa0</p>\n<p>25:25 \u2013 Auditing trusted setups</p>\n<p>\xa0</p>\n<p>26:10 \u2013 Which hardware wallet does Peter Todd recommend?</p>\n<p>\xa0</p>\n<p>29:15 \u2013 Is the YubiKey better than a hardware wallet?</p>\n<p>\xa0</p>\n<p>31:57 \u2013 Setting up a watch-only wallet for cold storage</p>\n<p>\xa0</p>\n<p>32:58 \u2013 Is just using Bitcoin Core secure enough?</p>\n<p>\xa0</p>\n<p>35:14 \u2013 The psychology of having a piece of hardware that makes you feel safe</p>\n<p>\xa0</p>\n<p>36:36 \u2013 Ballet Crypto and trusted printing</p>\n<p>\xa0</p>\n<p>37:45 \u2013 BitAddress dot org</p>\n<p>\xa0</p>\n<p>39:00 \u2013 Generating randomness with a dice<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>40:10 \u2013 Security is hard and complex</p>\n<p>\xa0</p>\n<p>41:00 \u2013 Security theatre<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>42:47 \u2013 Cryptography vs Applied Cryptography<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>44:30 \u2013 How can Trezor and Ledger steal funds from hardware wallet owners?</p>\n<p>\xa0</p>\n<p>46:41 \u2013 Liability for theft</p>\n<p>\xa0</p>\n<p>49:40 \u2013 Can hardware wallet manufacturers steal $1 from each user?</p>\n<p>\xa0</p>\n<p>51:00 \u2013 The perfect theft that hardware wallet manufacturers can coordinate</p>\n<p>\xa0</p>\n<p>52:10 \u2013 Bluetooth on hardware wallets?</p>\n<p>\xa0</p>\n<p>53:10 \u2013 RS 232<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>55:20 \u2013 Faraday cages</p>\n<p>\xa0</p>\n<p>57:20 \u2013 Practical advice for bitcoiners<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>59:00 \u2013 Tiger rocks, locks, and lock pickers<span class="Apple-converted-space">\xa0</span></p>\n<p>\xa0</p>\n<p>1:00:20 \u2013 Is multisig a good idea?</p>\n<p>\xa0</p>\n<p>1:01:23 \u2013 Is memorizing your private key a good idea?</p>\n<p>\xa0</p>\n<p>1:01:56 \u2013 Security from yourself</p>\n<p>\xa0</p>\n<p>1:03:30 \u2013 Physical vs digital data security</p>\n<p>\xa0</p>\n<p>1:05:20 \u2013 Does Peter Todd like weed?</p>\n<p>\xa0</p>\n<p>1:06:16 \u2013 Bitcoin and drug sales</p>\n<p>\xa0</p>\n<p>1:07:41 \u2013 Peter Todd\u2019s prediction for Bitcoin\u2019s success</p>\n<p>\xa0</p>\n<p>1:09:50 \u2013 One day, Bitcoin will go to 0</p>\n<p>\xa0</p>\n<p>1:10:00 \u2013 The US dollar will fail before Bitcoin</p>\n<p>\xa0</p>\n<p>\xa0</p>\n<p>\xa0</p>\n<p>\xa0</p>\n<p>\xa0</p>