Disaster Recovery Drills in Web 3.0

I spent several hours tracking down a small notebook earlier this week. The reason? I wrote down my seed phrases in this tiny notebook, which I carelessly tracked. Why am I telling you this? This management strategy is a horrible practice. Had I not performed a disaster recovery drill for my digital assets, I might’ve continued storing my seed phrase insecurely. Disaster recovery drills are foundational for security in web 3.0 and enable continued access to blockchain assets.

Read more · 7 min read

Maximizing the Benefit and Utility of Minting NFTs

NFTs have been a hot trend in tech but face criticism regarding their lack of obvious utility. I started this off as a vent post for my frustration regarding the current discourse around NFTs. Still, I decided about midway through that energy might be better spent trying to help answer the pertinent questions: What are the benefits of minting NFTs, and how can we maximize the utility of NFTs?

Read more · 9 min read

Pastejacking Smart Contracts: Replacing Wallet Addresses to Steal Data

The last several years have brought incredible gains in the number of cyberattacks waged. These attacks entail a variety of exploits, with some using methods as simple as social engineering. Human behavior is often the weakest link, and a particular javascript exploit takes advantage of trust in a computer’s copy-and-paste functionality. This form of attack, commonly referred to as pastejacking, can fit into many different cyberattack campaigns. This attack takes advantage of one of the most common user interactions with a computer.

Read more · 6 min read