S4 E7: Peter Todd on Hardware Wallets, Security & ProofMarshall

Published: Feb. 4, 2020, 7:27 a.m.

b'

4:02 \\u2013 Intro

\\xa0

5:24 \\u2013 Hardware Wallet Physical Security

\\xa0

6:10 \\u2013 Buying hardware wallets on eBay?

\\xa0

7:04 \\u2013 Toothbrush analogy

\\xa0

7:26 \\u2013 Supply chain attacks

\\xa0

7:40 \\u2013 Fake seed cards\\xa0

\\xa0

8:20 \\u2013 Does Peter Todd use any hardware wallets?

\\xa0

9:10 \\u2013 Hardware wallets as part of the Bitcoin lifestyle\\xa0

\\xa0

9:30 \\u2013 Dealing with Bitcoin in the early days

\\xa0

10:40 \\u2013 Peter Todd running Qubes and multiple virtual machines

\\xa0

11:29 \\u2013 Advice for newbies

\\xa0

13:00 \\u2013 The economics of hardware wallets

\\xa0

13:50 \\u2013 Markets for Bitcoin transaction data\\xa0

\\xa0

15:00 \\u2013 Are Electrum servers ran by Chainalysis?

\\xa0

16:30 \\u2013 Chainalysis and Bitcoin exchanges

\\xa0

17:00 \\u2013 Shapeshift\\u2019s KeepKey

\\xa0

18:31 \\u2013 Does Peter Todd use a Coldcard?

\\xa0

20:22 \\u2013 The issue of hardware wallet screens and checking addresses

\\xa0

21:55 \\u2013 Packaging to discourage supply chain attacks

\\xa0

23:00 \\u2013 Coldcard and PSBT

\\xa0

25:25 \\u2013 Auditing trusted setups

\\xa0

26:10 \\u2013 Which hardware wallet does Peter Todd recommend?

\\xa0

29:15 \\u2013 Is the YubiKey better than a hardware wallet?

\\xa0

31:57 \\u2013 Setting up a watch-only wallet for cold storage

\\xa0

32:58 \\u2013 Is just using Bitcoin Core secure enough?

\\xa0

35:14 \\u2013 The psychology of having a piece of hardware that makes you feel safe

\\xa0

36:36 \\u2013 Ballet Crypto and trusted printing

\\xa0

37:45 \\u2013 BitAddress dot org

\\xa0

39:00 \\u2013 Generating randomness with a dice\\xa0

\\xa0

40:10 \\u2013 Security is hard and complex

\\xa0

41:00 \\u2013 Security theatre\\xa0

\\xa0

42:47 \\u2013 Cryptography vs Applied Cryptography\\xa0

\\xa0

44:30 \\u2013 How can Trezor and Ledger steal funds from hardware wallet owners?

\\xa0

46:41 \\u2013 Liability for theft

\\xa0

49:40 \\u2013 Can hardware wallet manufacturers steal $1 from each user?

\\xa0

51:00 \\u2013 The perfect theft that hardware wallet manufacturers can coordinate

\\xa0

52:10 \\u2013 Bluetooth on hardware wallets?

\\xa0

53:10 \\u2013 RS 232\\xa0

\\xa0

55:20 \\u2013 Faraday cages

\\xa0

57:20 \\u2013 Practical advice for bitcoiners\\xa0

\\xa0

59:00 \\u2013 Tiger rocks, locks, and lock pickers\\xa0

\\xa0

1:00:20 \\u2013 Is multisig a good idea?

\\xa0

1:01:23 \\u2013 Is memorizing your private key a good idea?

\\xa0

1:01:56 \\u2013 Security from yourself

\\xa0

1:03:30 \\u2013 Physical vs digital data security

\\xa0

1:05:20 \\u2013 Does Peter Todd like weed?

\\xa0

1:06:16 \\u2013 Bitcoin and drug sales

\\xa0

1:07:41 \\u2013 Peter Todd\\u2019s prediction for Bitcoin\\u2019s success

\\xa0

1:09:50 \\u2013 One day, Bitcoin will go to 0

\\xa0

1:10:00 \\u2013 The US dollar will fail before Bitcoin

\\xa0

\\xa0

\\xa0

\\xa0

\\xa0

'