7 episodes taggedApproximate match across all podcasts
Home/Tags/SECURE KEYS

SECURE KEYS

All podcast episode summaries matching SECURE KEYS β€” aggregated across every podcast we track.

7 episodes Β· Page 1/1

β€œThis enabled the user or the exploiter to add CVT as a new collateral asset on the Drift Protocol. So depositing it as collateral, they then continued to pump the price of that pool, because they also, as they could figure the market, could decide which oracle was being used.”

β€” Omer Goldberg
Macro Pods
APR 3, 2026Laura Shin
  • β€’

    The quantum threat timeline has moved to 2029 - A new Google white paper, co-authored by Ethereum's Justin Drake and Stanford's Dan Boneh, suggests that quantum computers could break elliptic curve cryptography within just three years.

    β€œthat deadline is now three years away, at least according to this Google paper. So that's 2029.”

    β€” Laura Shin
  • β€’

    New research lowers the qubit threshold by 50x - Oratomic has published research demonstrating that Shor’s algorithm can be executed with only 10,000 reconfigurable atomic qubits, a massive reduction from previous estimates of millions.

    β€œwe see that we can actually do things with as few as 10,000 qubits using novel approaches to the error correction... it's actually a factor of 50, even relative to this recent result.”

    β€” Dolev Bluvstein
  • β€’

    Quantum vulnerability extends across the entire crypto ecosystem - The threat is not limited to Bitcoin’s public keys; it explicitly affects stablecoins, zero-knowledge proof systems, and Layer 2 data availability solutions.

    β€œIn addition to Bitcoin... they talk about things like stable coins... even systems like zero-knowledge proof systems or data availability systems for layer 2s, all of those are covered and explicitly the vulnerabilities to a quantum computer are described.”

    β€” Alex Pruden
Macro Pods
APR 4, 2026Laura Shin
  • β€’

    The Drift exploit was a masterclass in methodical planning - The attacker spent over three weeks preparing the hack, timing the execution for April Fool's Day to create confusion while draining over half of the protocol's total value locked.

    β€œThis one was very technical, well thought out. And from what we know today, spend at least three weeks.”

    β€” Omer Goldberg
  • β€’

    Multi-sig security without time locks is a critical vulnerability - Drift migrated to a 2-of-5 multi-sig shortly before the attack, but the lack of an execution delay allowed the hacker to seize control immediately after compromising developer machines via a supply chain attack.

    β€œNotably, it had zero time lock on any of the functions it could execute.”

    β€” Omer Goldberg
  • β€’

    Oracle manipulation remains a potent DeFi death blow - The hacker created a fake token (CVT), whitelisted it as collateral using compromised admin keys, and manipulated its price via a custom oracle to borrow and drain the protocol's blue-chip assets.

    β€œThis enabled the user or the exploiter to add CVT as a new collateral asset on the Drift Protocol. So depositing it as collateral, they then continued to pump the price of that pool, because they also, as they could figure the market, could decide which oracle was being used.”

    β€” Omer Goldberg
Macro Pods
APR 4, 2026Laura Shin
  • β€’

    The Drift exploit was a masterclass in methodical planning - The attacker spent over three weeks preparing the hack, timing the execution for April Fool's Day to create confusion while draining over half of the protocol's total value locked.

    β€œThis one was very technical, well thought out. And from what we know today, spend at least three weeks.”

    β€” Omer Goldberg
  • β€’

    Multi-sig security without time locks is a critical vulnerability - Drift migrated to a 2-of-5 multi-sig shortly before the attack, but the lack of an execution delay allowed the hacker to seize control immediately after compromising developer machines via a supply chain attack.

    β€œNotably, it had zero time lock on any of the functions it could execute.”

    β€” Omer Goldberg
  • β€’

    Oracle manipulation remains a potent DeFi death blow - The hacker created a fake token (CVT), whitelisted it as collateral using compromised admin keys, and manipulated its price via a custom oracle to borrow and drain the protocol's blue-chip assets.

    β€œThis enabled the user or the exploiter to add CVT as a new collateral asset on the Drift Protocol. So depositing it as collateral, they then continued to pump the price of that pool, because they also, as they could figure the market, could decide which oracle was being used.”

    β€” Omer Goldberg
Daily Signal - Crypto Edition
APR 3, 2026Scott Melker
  • β€’

    Quantum threats are mitigated by simultaneous defensive evolution - as computing power grows, cryptographic defenses like post-quantum cryptography are updated in parallel, making an isolated breakthrough against a moving target unlikely.

    β€œIf quantum computers do come to a point to where they can hack networks, everything's done. It's all over, you know? It's not just crypto. That's the last of our concerns.”

    β€” Armando
  • β€’

    The primary risk is localized to dormant, unupgradable wallets - while the network can adapt through consensus-driven soft forks, legacy addresses that remain inactive may become vulnerable if they cannot migrate to new standards.

    β€œThere's always defenses developing alongside of it. People aren't going to, I mean, the big players, the banks, the billionaires that have crypto, they're not going to sit on the sidelines and just wait to be hacked.”

    β€” Armando
  • β€’

    Traditional finance is a much softer target for quantum attacks - hackers are more likely to prioritize the banking sector's outdated security infrastructure, such as SMS two-factor authentication, over the massive compute requirements needed to break Bitcoin.

    β€œThe concern is that Bitcoin devs are just not taking this seriously... they take it as religious criticism against the cult and religion, that there could ever be anything wrong with Bitcoin, and don't even address it because it's too emotionally difficult.”

    β€” Tom
Macro Pods
APR 3, 2026Laura Shin
  • β€’

    The quantum threat timeline has moved to 2029 - A new Google white paper, co-authored by Ethereum's Justin Drake and Stanford's Dan Boneh, suggests that quantum computers could break elliptic curve cryptography within just three years.

    β€œthat deadline is now three years away, at least according to this Google paper. So that's 2029.”

    β€” Laura Shin
  • β€’

    New research lowers the qubit threshold by 50x - Oratomic has published research demonstrating that Shor’s algorithm can be executed with only 10,000 reconfigurable atomic qubits, a massive reduction from previous estimates of millions.

    β€œwe see that we can actually do things with as few as 10,000 qubits using novel approaches to the error correction... it's actually a factor of 50, even relative to this recent result.”

    β€” Dolev Bluvstein
  • β€’

    Quantum vulnerability extends across the entire crypto ecosystem - The threat is not limited to Bitcoin’s public keys; it explicitly affects stablecoins, zero-knowledge proof systems, and Layer 2 data availability solutions.

    β€œIn addition to Bitcoin... they talk about things like stable coins... even systems like zero-knowledge proof systems or data availability systems for layer 2s, all of those are covered and explicitly the vulnerabilities to a quantum computer are described.”

    β€” Alex Pruden
Daily Signal - Crypto Edition
MAR 19, 2026HIT Network
  • β€’

    Correlated Market Dump - Bitcoin and Gold are experiencing a rare simultaneous price drop, signaling a broad 'everything dump' that breaks typical inverse correlations.

  • β€’

    Macro Environment Shift - This synchronized decline suggests a major structural change in global markets, likely driven by a liquidity crunch or shifting dollar dynamics.

  • β€’

    Prioritize Self-Custody - High volatility serves as a reminder to move assets off exchanges and into cold storage to mitigate platform risk during market uncertainty.

Daily Signal - Crypto Edition
MAR 16, 2026HIT Network
  • β€’

    Trump-favored altcoins are hitting key breakout zones - Solana, XRP, and Cardano are seeing significant price action as they test levels established during previous market cycles.

  • β€’

    Technical validation is confirming the trend - The analysis shows that key support and resistance levels from 2025 are holding up, providing high-signal entry points for traders.

  • β€’

    Self-custody remains the top priority - Even during bullish breakouts, the strategy emphasizes using cold storage and hardware wallets to mitigate exchange-related risks.

Stay in the Loop

Free summaries of top podcasts. More signal, less noise.