✂ Fed’s first rate cut since 2020: Use our free Stock Screener to find new opportunities fastExplore for FREE

The Billion Dollar Crypto Heist: How Secure Are Your Mnemonic Keys?

Published 17/07/2023, 18:25
© Reuters.  The Billion Dollar Crypto Heist: How Secure Are Your Mnemonic Keys?

Benzinga - Mudit Gupta, the chief information security officer of Polygon (CRYPTO: MATIC), a layer-2 scaling solution, shared his insights on the challenges of practical security in the blockchain and cryptocurrency industry.

During his talk at the Ethereum Community Conference, he highlighted the gap between theoretical and practical security measures in the sector.

Gupta pointed out that while the industry is making rapid strides in theoretical security, it lags significantly in terms of practical security.

He used the example of mnemonic keys, which, despite their theoretical security advantages, pose real-world challenges.

"A mnemonic is just a one-time thing. You have it once. And if you ever make a mistake, if it ever gets leaked, you are done. So, keeping your mnemonic or private key safe is a much much harder problem," he said.

Gupta also revealed billions of dollars have been lost due to individuals misplacing their mnemonic keys.

He further warned that an even larger amount is at risk due to improper security measures.

"There are billions of dollars in the wallets of users that are incorrectly secured," Gupta said.

Also Read: Ethereum Sidechain Gnosis Launches Revolutionary Crypto Payment Network And Visa-Linked Debit Card

While theoretically, private keys offer complete security, Gupta acknowledged the practical issues that may arise. He questioned, "What if you die for some reason? How can your loved ones access your funds? So that's a tough problem to solve. Then, there is the key rotation problem. What if, for whatever reason your key is compromised?"

Gupta also touched upon the difficulties faced by defenders in the security world, stating that attackers have an easier task.

"As a defender, you have to cover every single point. If you leave any hole, someone will get in," he said. "As an attacker, it's easier. You just ignore the secure system. You find a way around. You just have to find one way to break in and that's it."

He emphasized the role of a defender is challenging as it involves covering all potential vulnerabilities.

Despite these hurdles, Gupta affirmed the necessity of defense, stating, "Someone has to defend."

Read Next: NAB Places Strict Restrictions On Crypto As Australia Cyber Scam Epidemic Escalates

Join Benzinga's Future of Crypto in New York City on Nov. 14, 2023, to stay updated on trends like AI, regulations, SEC actions and institutional adoption in the crypto space. Secure early bird discounted tickets now!

Photo: Shutterstock

© 2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

Read the original article on Benzinga

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.