Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Measuring the Use and Abuse of Brain Wallets

BSidesLV via YouTube

Overview

Explore the security vulnerabilities of brain wallets in cryptocurrency through this BSidesLV conference talk. Delve into the methods used to measure and analyze brain wallet usage and abuse, including password cracking techniques, blockchain analysis, and draining patterns. Learn about typical key generation processes, various password cracking inputs, and the complexities involved in draining brain wallets. Examine the usage trends of brain wallets over time and compare the effectiveness of passphrases versus passwords. Gain insights into related topics such as the Large Bitcoin Collider and drains performed by Bitcoin mining pools. Presented by Ryan Castellucci and Marie Vasek, this comprehensive talk provides valuable information for cybersecurity professionals and cryptocurrency enthusiasts alike.

Syllabus

Introduction - Marie Vasek
Introduction - Ryan Castellucci
Typical RSA Key Generation
Typical Eliptic Curve key generation
Password cracking input-XKCD Phrases
Password cracking input - Phrases
Password cracking input - Standard lists
Password cracking - Process
Password cracking - Job runner read queue
Password cracking - Job runner loop
Password cracking - Example jobs
Password cracking - Random lessons learned
Blockchain analysis
Password Corpora: 3.9 trilion Candidate Passwords
Brain Wallet Usage
New Brain Walet Usage by Month
Brain Drain Time
Brain Wallet Drains over Time
Draining complexity
Draining: Passphrases vs. Passwords
Beyond Brain Walets
Large Bitcoin Collider
Drains by Bitcoin Mining Pools
Questions?

Taught by

BSidesLV

Reviews

Start your review of Measuring the Use and Abuse of Brain Wallets

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.