Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/2b/fc/d5/2bfcd5f3-fcea-9a2d-0eac-60839ae0941a/mza_8624882748190331131.png/600x600bb.jpg
The Web3 Security Podcast
TheWeb3SecurityPodcast
9 episodes
1 day ago
Show more...
Technology
RSS
All content for The Web3 Security Podcast is the property of TheWeb3SecurityPodcast and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog21209950/W3S-Pod-Episode-Cover_Template.png
Ethereum Foundation's 10-year bug bounty program: Security lessons | Fredrik Svantes
The Web3 Security Podcast
1 hour 2 minutes
2 months ago
Ethereum Foundation's 10-year bug bounty program: Security lessons | Fredrik Svantes
Fredrik Svantes evolved from hunting World of Warcraft gold farmers to securing Ethereum’s trillion-dollar ecosystem as the foundation’s Security Research Lead. Running the world’s oldest blockchain bug bounty program while spearheading initiatives to make Ethereum safe for both billion-user adoption and institutional trillion-dollar deployments, he offers rare insights into the security challenges of protecting critical infrastructure at unprecedented scale. His contrarian stance on replacing reactive blacklists with protocol-level whitelists, combined with hard-won lessons from coordinating the merge and subsequent upgrades, reveals how Ethereum balances decentralization with protection. From managing AI spam in bug reports to designing crowdsourced audit competitions, Fredrik’s approach shows how to secure systems when traditional methods simply don’t scale. Topics discussed: - $2 million audit competitions mobilizing hundreds of researchers across 10+ client implementations in different programming languages. - Filtering AI-generated vulnerability spam in bug bounty programs using staking requirements and pattern recognition techniques. - Trillion-dollar security initiative metrics: billion people holding $1,000 safely vs institutions deploying trillion-dollar smart contracts. - Hard fork security procedures with assigned team roles following the Holesly testnet configuration incident. - Protocol-level whitelists replacing reactive blacklists to eliminate entire vulnerability categories proactively. - Reducing Ethereum Foundation dependencies through ecosystem-sponsored security programs across multiple entities. - UX as Web3’s critical weakness requiring iOS-level polish with guardrails that maintain decentralization principles.
The Web3 Security Podcast