Subscribe
Share
Share
Embed
This week we'll do our usual weekly review of crypto security-related topics. We're going to dig into the issue of conference OPSEC, or operational security, as we're less than a week out from Ethereum's flagship developer conference, and rumors swirl about security concerns in Bogota.
Transit Swap has lost $21M to a vulnerability which allowed an unknown attacker to drain the wallets of users who had approved the protocol’s swap contracts.
Our Nation continues to face a significant shortfall in cyber talent, with estimates of approximately 700,000 open positions.
U.S. Senator James Lankford (R-OK) announced Thursday that he has introduced a bill titled “No Digital Dollar Act to prohibit the U.S. Treasury and the Federal Reserve from interfering with Americans using paper currency if a digital currency is adopted and makes certain individuals can maintain privacy over their transactions using cash and coins.”
Kim Kardashian was fined $1.26 million Monday for touting crypto schemes — even as much more high-profile pitches from the likes of Matt Damon and Larry David have gone unpunished. The seeming double standard is a function of a subtle yet crucial distinction in securities law.
Where Kardashian crossed the line was when she endorsed a crypto asset security.
How it works: If you’re endorsing a company, the only rules that apply are the relatively lax ones from the FTC.
If you’re shilling a security, then disclosing that you were paid — as Kardashian did with an #AD hashtag — is not enough; you also need to disclose how much you were paid.
The bottom line: If you’re going to tout crypto, tout a crypto company, not a coin.


Before we continue, you should understand that everyone’s security needs are not the same.
- Maintaining custody of your devices is a sound defense from parties that would seek to make modifications to your equipment or outright steal your hardware. This means of security only requires you to make sure you know where your stuff is, and whose handling your stuff.
- Before bringing a notebook or phone, consider what could be on those devices, and what might happen if they were to be compromised.
- Run your updates.
- Data Storage Encryption
Some devices will retain a history of SSIDs that they have connected to. If your device is set to connect to an access point automatically, it may send multiple probe requests containing an SSID that you have previously connected to. This can be used to set up a rouge AP, and force your device to connect to it.Unless you are using a access point, it is recommended that you leave your wi-fi feature disabled. When connecting to new access points, ensure that you will not be connecting to them automatically.
- Kill Unnecessary Wi-Fi Transmissions
- Use a VPN
- Use E2E apps ZW: Use end-to-end encrypted apps for chatting, like Signal
Leave all tech at home RFID shields

The seven companies have two weeks to address the agency’s concerns. Otherwise, compliant carriers will have to block their incoming traffic.
Welcome! I, Degen is a podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we cut through the misinformation and hype in search of a signal in the noise. Our weekly round-up will keep you updated on the latest in crypto hacks and security. With our open-source audio audits, we interview founders and hackers to surface relevant info about how to stay safe in crypto land.