All content for The Web3 Security Podcast is the property of TheWeb3SecurityPodcast and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Eigen Labs' 3-person team securing $23B in crypto: Restaking security at scale | Anto Joseph
The Web3 Security Podcast
1 hour 10 minutes
1 month ago
Eigen Labs' 3-person team securing $23B in crypto: Restaking security at scale | Anto Joseph
When you discover someone who found a way to decrypt every WhatsApp message through symmetric key reuse, then later designed Coinbase's ETH staking architecture that has never experienced a slashing event, you're looking at a rare breed of security engineer who bridges the exploit and defense mindsets perfectly.
Anto Joseph, Principal Security Engineer at Eigen Labs, walks through his unconventional path from exploiting Need for Speed CD keys in fourth grade to architecting some of crypto's most critical infrastructure. His work spans Intel's hardware security for retinal laser displays, Tinder's location privacy systems handling millions of users, and the 14-page security design document he authored for Coinbase's ETH staking as his first crypto project.
Now at Eigen Layer, Anto's three-person security team protects $23 billion in assets while pioneering cryptographic verification systems that could fundamentally change how bug bounties work. His approach to using AI agents for security research, including getting Devin to solve real exploit scenarios in 8 hours, offers a glimpse into how automated security testing will evolve in Web3.
Topics discussed:
WhatsApp vulnerability: symmetric key reuse across all installations
Tinder's 1-mile grid snapping preventing triangulation attacks
Coinbase ETH staking architecture achieving zero slashing events
Month-long fuzzing campaign on AWS for Base launch
Economic security through programmable slashing and redistribution logic
zKTLS proofs eliminating human verification in bug bounties
Risk Zero proof system for atomic testnet-to-mainnet bounty claims
Reinforcement learning approaches for Web3 vulnerability discovery