Measuring the Use and Abuse of Brain Wallets

Measuring the Use and Abuse of Brain Wallets

BSidesLV via YouTube Direct link

Introduction - Marie Vasek

1 of 24

1 of 24

Introduction - Marie Vasek

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Measuring the Use and Abuse of Brain Wallets

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction - Marie Vasek
  2. 2 Introduction - Ryan Castellucci
  3. 3 Typical RSA Key Generation
  4. 4 Typical Eliptic Curve key generation
  5. 5 Password cracking input-XKCD Phrases
  6. 6 Password cracking input - Phrases
  7. 7 Password cracking input - Standard lists
  8. 8 Password cracking - Process
  9. 9 Password cracking - Job runner read queue
  10. 10 Password cracking - Job runner loop
  11. 11 Password cracking - Example jobs
  12. 12 Password cracking - Random lessons learned
  13. 13 Blockchain analysis
  14. 14 Password Corpora: 3.9 trilion Candidate Passwords
  15. 15 Brain Wallet Usage
  16. 16 New Brain Walet Usage by Month
  17. 17 Brain Drain Time
  18. 18 Brain Wallet Drains over Time
  19. 19 Draining complexity
  20. 20 Draining: Passphrases vs. Passwords
  21. 21 Beyond Brain Walets
  22. 22 Large Bitcoin Collider
  23. 23 Drains by Bitcoin Mining Pools
  24. 24 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.