Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/2b/fc/d5/2bfcd5f3-fcea-9a2d-0eac-60839ae0941a/mza_8624882748190331131.png/600x600bb.jpg
The Web3 Security Podcast
TheWeb3SecurityPodcast
9 episodes
15 hours ago
Show more...
Technology
RSS
All content for The Web3 Security Podcast is the property of TheWeb3SecurityPodcast and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog21209950/W3S-Pod-Episode-Cover_Sebastian_B_rgelbsl6r.png
Gnosis validator sniping attacks: How to harvest MEV through IP mapping | Sebastian Bürgel
The Web3 Security Podcast
1 hour 7 minutes
1 month ago
Gnosis validator sniping attacks: How to harvest MEV through IP mapping | Sebastian Bürgel
Sebastian Bürgel’s modified Lighthouse client can map any Ethereum validator’s public key to their IP address by collecting attestation signatures and tracking their network origin points. Once mapped, attackers can launch precisely-timed DDoS attacks during that validator’s block production slot, forcing them offline and redirecting their MEV opportunities to the next validator in sequence. This network-layer exploit operates entirely outside the smart contract security model that most teams focus on, yet threatens the economic assumptions underlying Ethereum’s consensus mechanism. As VP of Technology at Gnosis and founder of HOPR’s privacy infrastructure, Sebastian demonstrates how current validator security practices leave billions in staking rewards vulnerable to sophisticated attackers who understand beacon chain networking patterns. Topics discussed: - Beacon chain attestation harvesting methodology for linking validator pubkeys to IP addresses - Economic incentives for validator sniping attacks during high-value MEV block production windows - Modified Lighthouse client architecture for systematic data collection across validator networks - Network-layer security gaps that smart contract audits cannot identify or prevent - Browser-native ENS resolution bypassing centralized DNS infrastructure for DApp frontends - Multi-signature deployment verification preventing single-developer compromise of production applications - Full-stack security evaluation expanding beyond smart contracts to deployment infrastructure - Incentivized mixnet packet transformation architecture versus Tor’s basic relay routing
The Web3 Security Podcast