Unchained - Famed White Hat Hacker Samczsun on How to Improve Crypto Security - Ep. 613

Episode Date: February 27, 2024

Listen to the episode on Apple Podcasts, Spotify, Fountain, Overcast, Podcast Addict, Pocket Casts, Pandora, Castbox, Google Podcasts, Amazon Music, or on your favorite podcast platform. Well-known wh...ite hat hacker and head of security at Paradigm samczsun recently took the wraps off a new security organization called the Security Alliance (SEAL) that offers a 911 hotline for immediate response to security threats, runs war games to simulate potential security incidents, and provides a safe harbor agreement to protect white hat hackers from legal liabilities. He joined Unchained to discuss why he and his fellow white hat hackers decided to start the Security Alliance and how it operates, how the safe harbor agreement works, the measures he takes to maintain his anonymity and why, the top security measures people in crypto should take to protect themselves, and what attack areas in crypto Sam still considers “scary.”    Show highlights: How samczsun got into white hat hacking The most memorable saves and rescues sam was able to perform  Whether there's a reason why sam is so good at noticing bugs in crypto The origin of his samczsun handle What the Security Alliance is and why it was formed How SEAL would approach a bug or a hack Whether black hat hackers are trying to exploit open groups Why the work in the group is volunteered, not paid, and whether that's sustainable How the SEAL War Games help in training on how to respond to an incident in Web3 What the Safe Harbor Agreement is and what it aims to accomplish for white hat hackers How sam protects his identity and whether his coworkers know what he looks like The top security measures people working in crypto should take How projects should approach the audit for their smart contracts given it's an expensive endeavor  What attack vectors still scare sam What is ‘White Hat Hacking’? White hat hacking, often referred to as ethical hacking, is a cybersecurity practice where skilled computer experts use their knowledge for good, employing the same methods as malicious hackers (black hat hackers) but with a significant difference: they do so with permission and for a constructive purpose. These ethical hackers identify vulnerabilities in computer systems, networks, or applications before malicious attackers can exploit them. By detecting and resolving these security weaknesses, white hat hackers help organizations strengthen their defenses against cyber threats.  Thank you to our sponsors! Popcorn Network Polkadot Guest: Samczsun, CEO of Security Alliance (SEAL) and Head of Security at Paradigm Previous appearances on Unchained: The Chopping Block: Top White Hat Hacker Samczsun Discusses the State of Crypto Security Links Introducing the Security Alliance Bloomberg: Paradigm’s Famed ‘White-Hat’ Hacker Unites Peers Against Crypto Attacks,  White Hat Safe Harbor [Github] Chainalysis: Funds Stolen from Crypto Platforms Fall More Than 50% in 2023, but Hacking Remains a Significant Threat as Number of Incidents Rises sam’s tweet on security practices  Halborn: Explained: The Nomad Hack (August 2022) Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 But I also knew that this effort would be, you know, a massive undertaking. This isn't, we're not talking about let's write a single block post and sort of do a call to action and then be done with it. This is like, you know, a massive change in the way that we think about how to do instant response. Hi, everyone. Welcome to Unchained. You're no hype resource for all things crypto. I'm your host, Laura Shin, author of The Cryptopians. I started coming Cryptoians. eight years ago and as a senior editor at Forbes was the first MainTree Meteorporter took over cryptocurrency full-time. This is the February 27th, 2024 episode of Unchained. Pocodot is a leading Layer Zero blockchain with over 2,000 developers, and the Pocodot 2.0 upgrade
Starting point is 00:00:46 will be a massive accelerator for the ecosystem, making faster, more secure, and adaptable. Perfect for GameFi and Defy to build, grow, and scale. Join the community at Pocodot.network slash ecosystem slash community. Streamline your defy with ValtCraft, the ultimate on-chain toolkit for deploying custom automated DFI products on any EVM chain. Join Valkraft's referral program,
Starting point is 00:01:11 unite with the community, and supercharge your crypto. Details on Valkraft.io. Local news is in decline across Canada, and this is bad news for all of us. With less local news, noise, rumors, and misinformation fill the void. And it gets harder to separate
Starting point is 00:01:28 truth from fiction. That's why CBC News is putting more journalists in more places across Canada, reporting on the ground from where you live, telling the stories that matter to all of us, because local news is big news. Choose news, not noise. CBC News. When McDonald's partnered with Frank's Redhot, they said they could put that shit on everything. So that's exactly what McDonald's did. They put it on your McChrispy. They put it in your hot honey McNuggets dip. They even put it in the creamy garlic sauce on your McMuffin. The McDonald's Franks-Rad menu. They put that shit on everything. Breakfast available until 11 a.m. at participating Canadian restaurants for a limited time. Franks Redhot is a registered trademark of the French's food company LLC.
Starting point is 00:02:16 Today's guest is Sam CZ Sun, CEO of Security Alliance, aka Seal, and Head of Security of Paradigm. Welcome, Sam. Hi. Let's start with your history and cryptic. You are a famed white hat hacker. And now, you know, as we mentioned, you have launched this new organization. But tell us your origin story. Yeah. So I got into crypto. It feels like quite a few years ago.
Starting point is 00:02:44 The long and short of it is basically a friend knew that I was into security and had been nagging me about what we now know are the parody motisic hacks. At the time, of course, I didn't know anything about it. And I sort of just brushed them off. for months on end, I was like, I've got better things to do than this cryptocurrency nonsense. You know, thanks for letting me know, but I'm going to just keep doing my thing. And eventually one day, you know, as we all do, I was just sitting there watching YouTube. I wish I could tell you specifically what Vyato I was watching, but that, you know,
Starting point is 00:03:15 will be lost forever to the sense of time and the YouTube employees for watching my account. But I was watching YouTube and I was like, I'm being so unproductive right now. I'm like, slosh in my tear. There's got to be something better I could be doing. And then I thought, well, hey, let's just look into this cryptocurrency thing. In the worst case, you know, we spend a few hours and wait, we waste some time. But in the best case, we might learn something new. And it turns out that, you know, over the past couple years, I've learned so many new things in the space.
Starting point is 00:03:43 And it's been such a wonderful journey. And so before that, you say that you were interested in security. But why in particular have you taken the path of white hat hacking? That's a really good question. I think it's probably largely how I was raised. specifically how I'm not quite sure but ever since how it's young this idea is
Starting point is 00:04:05 you know doing the right thing and sort of I wouldn't go so far as to call it justice because I think in the real world we're not living in some sort of superhero film but I've always had a very stubborn you know sense of right and wrong
Starting point is 00:04:21 sometimes the frustration of people I work with and so I think it was pretty natural to translate that to sort of trying to do my best for one I think is right for crypto in crypto security. And so how did you come to be known for the rescues that you have been doing? And then how did that translate into a job at Paradigm? Well, I think what happened there was basically I had started with finding these critical bugs. And of course, when you first start, no one knows who you are.
Starting point is 00:04:53 And so you have to sort of convince them that you're not just done of the spamber. reporting fake bikes. And then once you build some reputation, then people want to work with you and they want to share your advice and they want to make sure that they're doing the right thing when they're faced in these critical bites. And so slowly you just get lived into more and more of these rescue situations where, I mean, it sort of is that it's a slyweil effect that all of us nature capitalists love to talk about. And eventually, I guess, you know, I landed on paradigm's radar. Yeah, I'm not, I'm not sure what specifically must have caught their retention, but something did. And then they reached out, I think around the same time,
Starting point is 00:05:31 at the higher Georgia's, and it was all just a paradigm from there. And so of those early saves and rescues that you did, like what are some of the more memorable ones? I mean, I have to talk about the Dark Forest one. That one's a two-potter, right? The first part was when Dan Robinson, the head of research and Georgiaos again, CTO paradigm, when they reached out about this very small amount by today's standards. I think it was less than 50K. But there was some of the other tokens that were stuck in a Utisop B2 pool where anyone could burn the tokens and redeemed the Adelaing collateral.
Starting point is 00:06:13 And I remember telling them that I had seen these generic flatliners, as we now call them, lurching the men pool. And so that should really be careful. And I think under time pressure and other circumstances, you know, obviously the rescue didn't work out. But that sort of set the stage for the famous Ethereum's the Dark Forest Post, which I think, you know, in hindsight, it was worth it. And then a few months later, I followed up with that, with escaping the dark forest. And that was, you know, by far, one of the most stressful rescue situation I'd been in. I think if I refer correctly, it was a combination of the team being anonymous.
Starting point is 00:06:56 So it was very hard for us to confirm who we should even disclose to in the first place. The bug being so wide open in the sense that there really weren't many requirements necessary. You didn't need to have a lot of collateral. You didn't need to have any sort of special insights. It was just sort of sitting right there in the open. And also the amount being, you know, I think it was around $10 billion, which is at the time, again, a very very important. high, a very high number, right? It's all of these things together just made that one of the most numberable warms for me, I think. And so at that time when you were like less well known,
Starting point is 00:07:32 when you would reach out to people in that kind of situation, like, did they take you seriously? What was it like trying to do this when you were not well known? I think before my CROX bud, I definitely had some trouble connecting with people. and in Web 2, it's so much more different because the bug bounty space is just so competitive and also so filled with low quality reports that it is now hard to reach certain companies at times. But, you know, I'm not going to pretend that I've had it, you know, as rough as a lot of other people in the space because I did sort of, you know, start off with just this very high-severity bug in Xerox.
Starting point is 00:08:17 And so, you know, right off the bat, I think my public debut was one where people were like, this guy knows what he's doing. And, you know, if he DMs us, we should have a listen. So how do you monitor for vulnerabilities? I heard you say on another podcast that you have alerts set up. Like, are there particular websites where you set that up? Or like, how are you running nodes? Or how do you do that monitoring? That was a while ago. The landscape has really changed over time. I remember back a few years ago when I could feasibly sort of monitor the entire space for myself. I could sort of watch all the new deployments, watch all the new contracts being verified, and have a really good grasp of what was happening across the entire ecosystem.
Starting point is 00:09:02 Nowadays, that's very much not the case. Today, just the fact that there's multiple L1s and alternatives today is a major departure from previously where it is mainly just a theorem activity. And so if you answer your question, I actually don't. do much monitoring myself anymore, I leave it to the companies that I was spun up specifically for that purpose and, you know, the countless amounts of in-now requests that I actually, maybe a good tanton or a good redirect, but, you know, previously I used to get all these DMs from people, you know, asked me for help about their smart contracts getting hacked or their wallet's
Starting point is 00:09:42 getting trained or some other security question. And, you know, I knew that a lot of my friends, could also answer these questions or help if I wasn't available. But it's hard getting the word out that, you know, hey, instead of Sam, here's the list of 30 other people you should try if he doesn't respond. That's not very good. It's not very ergonotic. And so that was one of the motivations behind C091-1, which actually today now does handle quite a lot of these cases that normally would have landed
Starting point is 00:10:10 in my DMs. And of course, I still jump in help, but it's been a great way to low balance, you know, the delusion of incidents across all these people who are. are equally capable. Okay, yeah, we'll talk about that in a moment. I do want to ask you a little bit more about how you work. One thing that I was wondering is why you, why do you think that you're so good at recognizing vulnerabilities?
Starting point is 00:10:33 Like, is there something about your personality that you think allows you to see things that others can't see or think of things other people haven't thought of? I mean, I think part of it must be intrinsic. because I'm not quite sure and I've asked myself this numerous times I'm not quite sure how I would teach someone to find security vulnerabilities
Starting point is 00:11:00 beyond walking them through a list of things to check for so I think there is something intrinsic about being able to reason through these complex scenarios and to come up with these scenarios right to figure out what potential attack factors are At the same time, I do think it's necessary to essentially credit luck of it in this.
Starting point is 00:11:24 I think way too many times people try to pass off, you know, being lucky in the right place of the right time, and happening to read over the right file in the right function and noticing a bug with, you know, skill. And I think it is necessary to disclaim that, you know, part of it is being able to reason through. these issues. The part of it is also being early at the cloud base or kidding upon the right file or other circumstances like that.
Starting point is 00:11:55 And before you were hired at Paradigm, how were you making money from these exploits? Or, sorry, catching the exploits. I was going to say, I don't exploit things here. I'm good. Yeah, before I joined Paradigm, I was working at Trail Athletes and so I was both getting paid there.
Starting point is 00:12:14 and also, you know, much more active in the buck bounty scene. And so, you know, if he found a critical bug, he would get 50, 100K or so. And so, you know, to be clear, like, very good money for both at the time and also for like the average person, right? So no conflates. All right. So I asked on X, formerly known as Twitter, what I should ask you. And some people told me to ask you if you were going to change your handle. Because Sam, meaning Sam Pinkmanfried and CZ are no longer a big part of crypto.
Starting point is 00:12:49 Actually, we'll put a question mark on the CZ bit. So that made me think, oh, do I not know that his name is based on some mashup of Sam Pinkman-Fried's name and CZ's name? And then, you know, I would assume the son is like Justin's son. But I actually don't know that that is the origin of your name. So is that the origin of your handle or does it have nothing to do with those three people? Well, you know, the magic does become dispelled if I reveal its origins. That's what I was told by the wizard who granted me these powers.
Starting point is 00:13:26 And so I don't think I can say, but if anyone has suggestions for what I should change my handle to, I guess, Dian may? I was going to say, like, to be clear, my handle wasn't necessarily... based on men. But I do think it is funny how things turned out. And I mean, hey, if I somehow discovered, you know, like the crypto equivalent of death note, well, one, Lawrence is going to be very upset that he didn't, you know, somehow discover it first. But, yeah, I mean, whatever it takes to, you know, do good, I guess. Uh-oh, I've just become an enemy protagonist. That's not good. Okay, okay. Because, yeah, all three of those were sort of like main characters in crypto at different points. So yeah, it's just interesting that it could be seen as a reference to them. All right. So now
Starting point is 00:14:21 let's talk about your recent big news. You just launched the Security Alliance. Tell us what it is. Yeah. So we launched the Security Alliance a few, or I guess, you know, a week ago or so. And it's been in the works for over a year now. The origin story is basically Well, it really started with the nomad hack. And as I mentioned in my thread, it was, yeah, at the time, one of the even more stressful worms, mostly because it was very painful sitting there watching these funds get trained and not being able to do anything. And remind us why it was that people couldn't do anything?
Starting point is 00:15:07 Yes. So the main reason is basically, you know, for the, for the ones, Whitehats, we want to do things by the book. We want to do things correctly. And so, usually what that entails is getting permission and making sure that, you know, you've done all your due diligence and making sure that you're well-prepared for the exploit or for, you know, performing the exploit, but obviously with their intention to return funds. But in the case of the Nomad incident, not only was the war room just super stressful and to be completely honest, I think,
Starting point is 00:15:43 the idea was even asking for fruition just totally slipped my mind. It was so chaotic by the time that, you know, we really understood the bag, but these people had been copy-pacing the payload themselves, that we were sort of already focused on trying to, you know, prevent the bug. externally, outside of the war room,
Starting point is 00:16:06 a lot of people didn't even have the ability to contact nomad team. And so for them, there was no way they could have gotten permission in the first place. And so put together, it just sort of fed back into this idea for Whitehats that, like, if there's an incident that's happening,
Starting point is 00:16:23 it's probably not in your best interest to get involved, whether it's because, as before, you won't get permission from the team, or you can't get permission from the team, or, what happens if you try to perform the rescue, but it's your off day or you hit into too soon or you make some sort of mistake, right? And then now where does the liability fall, right? Is it, like, is it your responsibility because now you're directly involved in losing access to all those funds or, you know, is it a check between you at the team or, like,
Starting point is 00:16:55 what happens there, right? And so it's just always been extremely ambitious for White Hatts to the point where I generally don't really consider getting involved directly at all, I almost always prefer to advise the team, right? I'll tell the team, here's what the bug is, here's what you need to do next, but I'm not going to hit that button for you. And after the nomad hack, my thought process was basically, is there any way we can change us? Because it's been years since I started thinking that way, and it feels like, you know, the ecosystem has moved on. And if we're going to prevent these sorts of hacks in the future, if we ever arrive at one of these incidents again, we need more tools to empower the people that know what they're doing and can help save the day.
Starting point is 00:17:42 But I also knew that this effort would be a massive undertaking. This is in, we're not talking about let's write a single block post and sort of do a call to action and then be done with it. This is like, you know, a massive change in the way that we think about how to do incident. response. And, you know, I wanted to make sure that we were doing it right. And I want to make sure that people were on board with what we were trying to do. And so from there, I've realized that there's actually a lot of stuff that I wanted to do in this regard where it seems like a really good idea. And if executed, it would probably do, you know, a huge amount of gate for the security
Starting point is 00:18:22 ecosystem, but also required just a lot of collaboration, a lot of sign-on from different parties. And I realized there was no structure in place to do that. And so from there, you know, which way is the Security Alliance, which is, yeah, the solution to all those problems that I just described. So let's say that the Security Alliance gets pinged for a vulnerability that's been identified. I guess there's probably two scenarios we could discuss. One would be that there's a hack that's in action. I don't know whatever reason, but for some reason, maybe they couldn't take all the funds right away,
Starting point is 00:19:01 but people can see that this is out there. Maybe other people are copying and stealing extra funds. So how would you handle that? And then the other scenario would be you've identified something. Nobody seems to know about it yet. You need to move the funds safely. So walk us through how seal would approach both of those scenarios. Yeah. So in the former scenario where someone has identified or is exporting a bug, You know, in the previous world before SEAL, that that news would have made it around to a handful of people. It would have slowly circulated around the security community over time as people remembered other people would reach out to you. You know, I myself, during incidents, over the course of hours, we'll be like, ah, wait, here's another person that we should reach out to. And now all these people are in one room, right?
Starting point is 00:19:48 And so before, that news would have slowly circulated as more and more people were brought into the loop, we would have identified other protocols that might have been at risk. which, you know, again, is a very slow process. And we would have resolved incident. It just would have been much slower than we would for saying. Today, when someone reports a critical bug, either one that they discovered or one that's being exploited through C0911, all the people on the C11 team see it immediately. If we remove that delay,
Starting point is 00:20:20 Frantable slowly bringing all the input into a loop. And one of our first priorities is to identify which forks of that protocol might be affected. And, you know, as we slowly resolve more and more incidents, we refine this workflow so that over time, you know, we've evolved from actually not prioritizing forks to now, you know, prioritizing forks to pay heavily, making sure that everyone understands the roles of disclosure
Starting point is 00:20:46 and that we should keep everything under wraps until we've resolved the incident, you know, refining our incident response playback, really just making this process much more optimized. And that's something that we just didn't have before C1NM1. And then as for the case where we find a bug entirely, well, again, before if I find something critical, my choices are to go to the protocol if I knew who they are,
Starting point is 00:21:12 or if I didn't, you know, DM a handful of people that I trust and hope that they did. And again, it's this sort of web connections that sort of spins out. And today, I know that everyone in C1N, I don't know what I can trust. And actually, that everyone at the security lines I can trust. And so I can just drop a message in those group chats and ask, hey, does anyone know this protocol?
Starting point is 00:21:34 Here's some details. Really just be much more open than I could in other security communities. We have the mute security telegram, for example, which is where people used to go to drop these sorts of questions. But that telegram group has, you know, 2,000 and 3,000 he's going by now. And it's almost a guarantee that if you drop a message in there, say, hey, does anyone have a contact at some protocol? That's just the giant strove light for hackers to tell and look at that protocol really quickly before the bug gets fixed. Oh, interesting.
Starting point is 00:22:07 So Black Hat hackers are monitoring those groups in order to figure out where they can exploit a vulnerability and get at it before the white hackers remove the funds. Is that what you're saying? Yeah, the group is public and public access by design because we want to facilitate you know, people interested in security in having conversations with the other, in discussing, you know, research, discussing latest news, whatever. But as a
Starting point is 00:22:34 side effect, it does mean that the group is so big now that it really isn't safe for disclosing or even hinting at potential vulnerabilities and protocols because it's almost guaranteed that there's at least one black hat hacker in there who's just watching and waiting to see if someone is going to make
Starting point is 00:22:50 that mistake. And if they do, that's a really clear side for where they should go. to find their next block, right? And so we want to avoid that. Okay. So you mentioned the CL 911 hotline. So basically, that's this telegram group. So let's say that I work at some project, and I'm realizing that there's a vulnerability and funds need to be moved or whatever needs to happen in order to prevent that from being exploited. So I contact the 911, CL 911, which is this telegram group. I imagine it pings, you know, some number of people, How many people are in that group?
Starting point is 00:23:26 How is it structured? Is it just whoever's up, starts working on it? And then how do you even vet the members of that? Yeah. So let me try to answer as many of those as I remember. One, how does it be in the group? The sooner one bot is what meet up people communicate with. And that bot sends messages into a group chat that we're all in.
Starting point is 00:23:50 The structure is very flat. In other words, everyone is in the same group chat. We all see all the tickets. And it is a first come for service basis. And again, keep in mind that everyone hears of all the tears with full-time jobs at their own. And so sometimes it does take, you know, anywhere from a few minutes to a few hours for someone to respond. But depending on what you come in with, like if you come in with a critical bite that's being exploited, people will see that and people will respond pretty quickly. As far as how to vet people.
Starting point is 00:24:20 Oh, sorry. I guess first, who's in it? We have a public list of the members on GitHub. The bot actually links you to it when you are about to open a ticket. Because one of the things that we really value is transparency and, you know, establishing that higher amount of trust in the system. And so we want to make sure that people know exactly who is going to be seeing their reports. And if any of them are people that they're not comfortable sharing with, they know ahead of time. And as far as betting from new livers, that's a pretty informal process.
Starting point is 00:24:56 It's basically people that I or someone else in the group trust. And then I haven't had to yet, but I've reserved the right to veto someone is. I think that they're just really interested with the, which hasn't happened yet. But, you know, but. And how many members are there total that get hit for the Seal 911 hotline? We're about 40 people or so currently. Okay. And then I'm sure there's, well, so you've been live for just, I guess, a really short period. Has anybody called it yet? We've actually been live since August of last year. Like I said, CO has been operating in stealth for over a year now. And so, you know, we've launched 3011 and we've launched SEAL War Games, but we didn't launch the org itself until, you know, a week ago or so.
Starting point is 00:25:46 over the last couple of months when no one has been active, we've gotten quite a few tickets. We've managed to save but maybe not necessarily safe, but at least help protocols dissolve. You know, there is it from the moment they noticed that they were hacked to they sort of wrapped with things in whether or not they got the funds back. And of course, we've helped a lot of individual people
Starting point is 00:26:11 who were scammed or had their role restrained. I think that's actually something that's really underappreciated is stressed. For a lot of these people, they get scammed or they get trained. And they feel very helpless, right? They don't know where to go or what to do. They're just sort of stuck in their little, you know, they're just very isolated. And even if we can't get the funds back, I think there's something about being able to talk to another human being about what they just went through and hearing that, you know, at the very least, it wasn't just them, right? It's a very common thing that happens.
Starting point is 00:26:46 And, you know, someone is on the other line, on the other end of the line listening, I think that's still really valuable. Of course, since Seal Lodge, our volume of tickets is just, you know, gone up by an order of magnitude. And so we're still sort of sorting through those new ones and trying to figure out how to improve our workflow
Starting point is 00:27:05 to adjust for the newfound attention. And for the hacks that you were able to disrupt your intercept in the last six months, are like what number was there in that time period? Like I'm curious how frequent it is that these kinds of vulnerabilities are caught. Yeah. So a lot of the stuff we find are again observed by these monitoring companies whose job it is to detect these hacks in flight and or after they're executed. But understandably, these monitoring companies are not in the business of intercepting these hacks, right? They might observe it happening. But, you know, as legal entities,
Starting point is 00:27:44 with even more responsibility than the anonymous white hack, they really can't just go and front run a hack without any sort of, again, permission, right? And so the answer to your question is, currently we frontrun maybe a handful of hacks, a very small amount, usually from the mess searchers in our group. But my hope is that with this white hat safe harbor agreement that we've worked on for the past year, it does empower one of these MF searchers and maybe even other individuals who have the capability to inges off these hacks to actually go and do it, provided that they have sufficient confidence in their system that they can actually intercept and not make something worse.
Starting point is 00:28:30 Yeah. Honestly, it reminds me of in my book when I wrote about the Dow hack and the White Hack group trying to figure out how to rescue the funds in the Dow that remained vulnerable, there was this one meeting where, like, some of them chickened out because they were like, well, if we're trying to rescue this money, we will also basically do the same exact hack as the hacker did. And so they waited until they noticed other people trying the same exploit. And once they noticed that, then they were like, okay, so now we have a clear reason to rescue these funds. But, yeah, they had this, like, long debate initially because they just really didn't know what would happen. legally to them. One other thing I was curious about is, you know, you mentioned that all the people
Starting point is 00:29:16 on the CL 911 group have other jobs. So do these workers get paid at all? Or, you know, yeah, I don't know how, is it all volunteer or how does compensation work? Yeah, it's all volunteer basis right now. If we get a bounty from someone that we've helped, we split it between all the people that participated. There's no, CIL doesn't, you know, take a cut of that or anything. But other than that, it is all volunteer. I think it was working very well when the volume of tickets was low. If the volume of tickets continues to be at this new increased rate now that we've gone live, we might have to either explore where bringing more people on the team.
Starting point is 00:29:58 Because I think there are also a lot of people who are genuinely interested in voluntary and providing the time to helping other people. It's just the number of tickets might be too high for that. And so we can either bring more people into the loop, or we can explore some way of, you know, maybe hiring a few-foot-hunt triosures. But we haven't gotten that far yet, so only time can tell. All right. So in a moment, we're going to talk more about skill war games and the safe harbor agreement, but first we'll record from the sponsors to make this show possible. Pocod is the largest layer zero blockchain with over 2,000 developers.
Starting point is 00:30:33 And the anticipated Pocodot 2.0 upgrade will be a massive accelerator for the ecosystem. Upgrading the infrastructure with 8 times higher transaction throughput and twice as fast block times, perfectly tailored core time for the needs of every protocol, trustless bridges internally and into Ethereum, Cosmos, Near, and Binance Smart Chain, revised tokenomics and the implementation of a token burn to reduce inflation. Perfect for GameFi and Defi to build, grow, and scale with one of the most active crypto communities in the space. Pocodot recently announced a partnership with mythical games, bringing top games like NFT rivals with over 650,000 players and 43 million transactions to pave the way for GameFi and the PogoDOT ecosystem.
Starting point is 00:31:16 Get your Web3 ideas to market fast with economics that work for you. Think big, builds bigger with Pocod. Join the community at Pocodot.network slash ecosystem slash community. Defy just got way easier with Faultcraft, a blockchain infrastructure for building, deploying and monetizing non-custodial yield strategies in a few clicks. Forget spending months of R&D, capital, and human resources when you can now instantly launch your crypto fund with Valkraft on any EVM chain. From wallets and institutional service providers to an non-defi-D gens, Volcraft supercharges your crypto assets by enabling instant cross-chain yield strategies that you can
Starting point is 00:31:58 deploy in one minute. Now anyone can supercharge their crypto portfolio with custom tailored defy strategies. Join Valkcraft's referral program, unite with the community, and supercharge your crypto. Details on Valkraft.io. The scorebed app here with trusted stats in real-time sports news.
Starting point is 00:32:18 Yeah, hey, who should I take in the Boston game? Well, statistically speaking. Nah, no more statistically speaking. I want hot takes. I want knee-jerk reactions. That's not really what I do. Is that because you don't have any knees? Or...
Starting point is 00:32:31 The score bet. Trusted sports content, seamless sports betting. Download today. 19 plus, Ontario only. If you have questions or concerns about your gambling or the gambling of someone close to you, please go to conicsonterio.ca. With Amex Platinum, $400 in annual credits for travel and dining means you not only satisfy your travel bug, but your taste buds too.
Starting point is 00:32:53 That's the powerful backing of Amex. Conditions apply. Back to my conversation with Sam. So you've alluded to it earlier in the conversation, but you talked about how the Security Alliance also has the SEAL War Games. Tell us what that is. Yeah. So like the name suggests, SEAL War Games is designed around the idea of war games,
Starting point is 00:33:15 which is from the Web 2 security world. And it's basically the practice of doing incident response treating, right? It's simulating what might happen in an incident and running to those war. case scenarios and making sure that the people responding know exactly what they're doing have gone to the motions are prepared to the real thing. Right. And that's something that were left really missing in Web 3. Because for a lot of these protocols, not only do they not have the security engineers on hand to do this in the first place, but even if they do, they might not have the resources to
Starting point is 00:33:56 dedicate to running one of these things, right? It also is very complicated. Isaac has spent so much time building out the infrastructure for running war games, which I'm evidently grateful for it. But it just goes to show how complicated running one of these things is. Of course, that is the benefit of CO operating it is because if an individual protocol runs one of these, they build all those wheeling, they run the exercise, and they're sort of done with it. Whereas we can run many of these war games, one after the other, and each time we do it, between refiner processes open source actually.
Starting point is 00:34:32 We use most of the infrastructure that we built, and it's just much more efficient. And do projects hire you for that? So like all things that COs clearly done and likely we'll do in the future, war games is free, and so there's no, you know, there's no fee that process to pay, there's no expectation of payment.
Starting point is 00:34:50 A few of them have talked about making a donation after the fact, but, you know, we stress that it's not obligated at all, right? The goal of seal war games, like with CIO in general is to, you know, improve the overall security posture of the community and to do it in a way that doesn't, like we, you know, we don't charge a membership fee and we don't want to charge for any of the things that we do. Okay. And are there certain types of situations that you test out? So currently, we mainly specialize in SWI contract advice just because
Starting point is 00:35:23 that's the most prevalent. And so, well, you know, when we write a war game, we do it in terms two parts. And so the first part is sitting down with the protocol and doing what's known as a tabletop exercise. That's where you can basically imagine it as like a security role-playing game, right, where we would say, hey, let's see hypothetically we do this, what would you do? And the protocol responds, well, we would do X, Y, C, and we say, okay, you just did Y, now we follow up with A, what do you do, right? And we sort of explore on paper how the protocol might respond to various sorts of incidents. From there, we can take that information and design an actual scenario for them, one that we think would test the things that the pro-cauls we kind or needs practice in.
Starting point is 00:36:08 And then we run one hands-on simulation for one scenario, right? And so that's sort of the life cycle of a war game. Well, so now let's talk about the White Hat Safe Harbor. This, you know, as you mentioned is a way to give the white hat hackers who participate in these rescues a way to know that they're legally covered. And I saw, and you know, maybe this isn't how it would work for all of them, but I saw like a diagram discussing how this would work. And the first step is that the White Hat Safe Harbor begins with the Dow creating the legal proposal and then voting to adopt it. And I wondered for kind of a potentially fast-moving situation like a hack, is there even time for that? Because some of these DAOs have long voting periods, et cetera.
Starting point is 00:37:03 So I didn't know if that's like set in stone or how you deal with those kinds of situations. Yeah. So before we get too deep into anything about the safe harbor agreement, I will just disclaim. I think it's obvious that I'm not a lawyer. And so there are questions which I will just opt out of entirely because I can't speak off to the U-Side of the thing. But on this question, particularly, the answer is that's actually, you're right,
Starting point is 00:37:30 that a lot of these now have flown voting processes and time to adopt proposals. And so, you know, if the intent was to have a doubt, grant permission on the spot, then this would be the wrong way to do it. But part of the goal of the Safe Harbor agreement is to encourage these protocols to stop leaving so the last minute, right?
Starting point is 00:37:52 we want to encourage them to adopt the safe harbor agreement beforehand, before they're innocent. Not only does that mean that their granted permission, you know, not last minute, but also I hope is the first step towards solving one of the big issues in security today, which is to say protocols get hacked, the hacker takes all the money, and now the protocol is negotiating for 90% of the funds back, with the quote-unquote white hat, right? And they'll call the 10% a bounty,
Starting point is 00:38:27 or they call it over-award or whatever. But, you know, I think most people looking at that situation can becky-ta is that it's not quite legitimate. And I think most security people, if you ask them whether or not they sort of are happy with what's going on, they're going to tell you they're not very happy with that state of phase, right? So the hope is with the safe harbor agreement,
Starting point is 00:38:50 we remove that need to negotiate in the moment at all because the protocol will outline ahead of time exactly what they're willing to pay for the interception of a hack that is ongoing or about to proceed, about to start. And then if the hack does proceed, while the terms are there, right? And so if you do return the funds, great.
Starting point is 00:39:14 If you don't return the funds, the protocol, ideally doesn't bother negotiating with the hacker at all. And so can you describe a little bit kind of the basic tenets of the safe harbor, like for White Hats that want to participate in this kind of rescue? Like what can they be assured of? Yeah. So the agreement basically is designed to protect both the protocol and the White Hat against civil liabilities between each other. Right.
Starting point is 00:39:44 In other words, those who adopts the agreement agreed that if the. if the white hat has taken proper precautions, has done their due diligence, I don't remember what the legal term is, but basically represents themselves as a competent white hat who is able to perform these rescues, then the protocol agrees to give them safe Harvard, right?
Starting point is 00:40:08 Because, you know, at the end of the day, we're off-human. And so, in the grand scheme of things, across, you know, hundreds of thousands of these rescues, someone is about to make a mistake at some point and we don't want to discourage white hats from doing anything just because that one isn't might cost them their entire like savings. Apart from that, it also dictates the terms that the protocol, you know, has outlined for the rewards payout. And so, you know, that means that ahead of time, before the white hat even engages in anything, they know exactly whether or not the protocol is willing to pay, for example, 10% up to a million dollars, or, you know, 5% of to $2 million.
Starting point is 00:40:53 Or maybe the protocol is saying, we actually don't want to pay anything up front. We want anyone who is interested in participating in this agreement to return all the funds to us first. We'll conduct an investigation. Yeah, we'll perform the instant response. We need to do QIC because we're based in the U.S. and then after all that, we'll send you you ever wide. But regardless of what it is, the protocol sets out very clearly what the streams are. And so the white hat knows head of time.
Starting point is 00:41:22 And I guess the other thing is just the white hat is required to, or, you know, not required, but, you know, ideally would notify the protocol before they present any rescue. And this is just to make sure the protocol can differentiate between who is a white hat under the agreement and who is just sort of out there causing chaos, right? And I think to be clear, the entire legal document is very long. It's like 45 pages. And so I've definitely only summarized the very high level points here for more information. Listeners should definitely, if possible, review the whole thing, or at least a human readable summary.
Starting point is 00:41:59 But that is sort of the gist of it, right? It is to provide safe harbor to these white hats. And so for this safe harbor, I wondered, is this something that has some, some analog in Web 2, or are the problems that White Hat hackers in Web 3 face? Are they sort of unique to Web 3 in some respect? There is an analog in Web 2. It is also called Safe Harbor, and it applies in Buck Bounty programs. And so what almost every major company in Web 2 that is adopted to Buck Bounty program has said,
Starting point is 00:42:32 is if you access our systems, quote unquote, illegally, but you don't cause destructive damage and you report the bike to us without disclosing to anyone else, then we will offer you safe harbor by agreeing not to, you know, try to see you for illegally access to your systems, right? And that's sort of necessary these days because the anti-abase laws in various countries are so strict against illegal access that theoretically any company that you so much as like blink towards in the wrong way has a right to see you. And so this just makes a very clear that these companies will not see you if you're doing security research provided you also report it to them. Obviously, in WIF3, these are a little different because the impact
Starting point is 00:43:19 of a security vulnerability is so obvious, right? In WIP2, you can get hacked and the public might not know for months or years. But in Web 3, you get halved, and the public might know before you do. And so we've had to, you know, adjust the terms of the C-Phyber idea a little that to accommodate for our industry. And I think that's something that we'll find a lot more in the future is that as we try to adopt these sort of best practices that Web2 has already, you know, long been using, the fact that our industry is so unique in some ways means that we have to make a few changes here and there to make sense basically. And in December on the chopping block, you said that most reasonable people in crypto have moved on from the notion that code is
Starting point is 00:44:03 law. I still see it, though. And I wondered, what made you think people moved on from that or why it is that you think that that's probably not something that either should be the case or is the case? It's possible that only within my close friend, close group of friends, you know, we sort of moved on from it. But I do think most of the time on Twitter, when I look at people trying to promote that idea, most of them I look up to you or, you know, acknowledge or respect. so we're dissing me with it. And I think the reason is because at this point,
Starting point is 00:44:39 you know, we, the idea behind Cota's law is essentially trying to almost disclaim responsibility, right? It's sort of a way to say, well, it's not my fault. You know, I can't be held accountable
Starting point is 00:44:54 for the consequences of my actions because really it's code's fault, right? It's the developer's fault. They should have known better when they started engaging with a platform like the blockchain, like smart contracts, right? How dare they not, you know, be perfect human beings and output perfect code, even though no one to go up to us managed to do that.
Starting point is 00:45:16 And I think at this point, we have to acknowledge that humans are not perfect. And told us lie, as I'm familiar with it, is primarily being used as a way for people to strike out responsibility for their actions, right? Most of the time, those actions being ones that cause damage to either of the protocol were users. I think it is true that there are parts of the community that are much more sort of align much more with the original crypto ethos of like, you know, very cipherpong, very decentralized. But I think for the sake of adoption, for the sake of making sure that crypto is actually
Starting point is 00:45:54 usable for people beyond the most technically sophisticated, we can't do cortisol anymore. That just this worked. So, you know, here we are chatting on this podcast and you're using your avatar. You even have a voice, an automizer on. And I wondered generally what all the things are that you do to keep your identity safe. Yeah, I mean, a lot of it is just good privacy practices in general. You know, don't reuse passwords.
Starting point is 00:46:24 Don't upload pictures on the internet that you don't have to. Because, again, those pictures, like the internet never forgets, right? And in some of it is a little more out there. I have a few virtual mailing addresses that I use that I've bought from different companies. And so I give those out in lieu of my actual address. Way possible, I use thank names or things, although it has gotten me banned from a handful of services, which think that I'm being a fraudster, which is fair. I've told people, especially close friends or founders, that if they want
Starting point is 00:47:00 advice on how to do sort of like good obsec, I'm happy to give it to them. But it really is, I think, a case-by-case situation because once he moved beyond the basics, right, which again, use a password manager, you know, make sure that you're using,
Starting point is 00:47:17 you're not using SMS2. If they don't even, you know, call anything, you know, make sure you're, make sure instead of two FAA in general, those kind of things. Once you move on from that, it really is specific to you. your situation. And so, yeah, I mean, there's a lot of things I do. And some of them, I guess, I also am that comfortable sharing. And out of curiosity, do your coworkers at Paradigm know your
Starting point is 00:47:42 real identity? Like, can they recognize you in a crowd? Yeah, yeah, they can. I thought it would be too awkward to wear a helmet every day. And so I didn't meet them the person. Although, I don't know. I think it's interesting because anonymity is like a ratchet, right? It only spins one way. And so, you know, there are times where I wonder, you know, what would I feel like if I had done even more anonymous than I am today? But for now, this is why not, right?
Starting point is 00:48:17 Where if something why I've been in a person, I do meet people, IRO at times when I know I can trust them. And then other times, especially when it comes to things that will be sort of stored forever on the internet. I try very hard to make sure that I have anonymized it in some way. And why is that? Like, is it because you feel that you've offended or, you know, pissed off so many Black Hat hackers that they will try to go after you in some fashion? Well, part of it is just precautionary. Because, yeah, like, even if I don't upset anyone today, I might upset someone two years into the future. And I would be very disappointed on
Starting point is 00:48:56 myself if someone two years in the future can pull up, you know, some very personal information about me from today that I hadn't taken the, you know, the efforts to anonymize in some way. Part of that is also, you know, years ago, when I stopped posting pictures and stopped posting Dracortis of myself with things like that, part of my fear was essentially, you know, that one day it would be possible to take samples of someone's likeness, and then through some algorithm, you know, generate copies of that. And here we are in 2024, and AI models can do just that, right? You can feed them a bunch of pictures and they can generate more pictures of that person. They can feed them a bunch of voice clips and they can generate more voices of that person.
Starting point is 00:49:45 And so in a way, that is one scenario where, you know, like my quote-unquote war spheres having realized, you know, am I saying that I'm important enough to justify someone taking all that effort to clothe my voice and make me say some really bad things? I don't think so. But if ever someone does feel that urge, I feel a little better knowing that the number of clips of me out there, you know, without a voice danger is low enough that I think it should be fairly difficult. Of course, now that I've invited everyone to try it. And so I can only expect that, you know, there will be clubs with me saying the dumbest things a week from now. So, you know, given how carefully you are with your security and your reputation for finding exploits, you know, it's pretty understandable that maybe sometimes you would get a little bit annoyed that other people don't take the same precautions as you. And so I did see that in December you tweeted, getting pretty fucking.
Starting point is 00:50:48 sick of seeing friends burn out after dedicating all their time to protecting people instead of getting rich. And then half the people on this fucking site can't, which is Twitter, can't even be bothered to remove their phone number so they don't end up spreading the next drainer. And by the way, this again reminds me of the Dow where
Starting point is 00:51:04 the White Hats spent most of their waking hours for months and then made no money because nobody ever donated to thank them for their help. But anyway, so I was curious is, you know, if you were to call out certain kind of low-hanging fruit security practices that you think aren't being enough, but aren't being practiced enough in crypto, what would
Starting point is 00:51:26 those be? I mean, that tweet right there is like the number one low-hanging fruit. So many Twitter accounts getting hacked, spreading these traders, those are real people being affected, right? and if these projects just take the time to go into the Twitter account, just make sure that they don't have SMS2VA on, that immediately removes any risk of sent-stopping affecting them. These days, we're also seeing a large volume of these fake-calidly hacks,
Starting point is 00:51:59 which is where someone pretending to be a journalist reaches out to you, and after sort of setting you up with a bait, sends you what seems to be like to calumably, but instead of walking in, it says, authorized with Twitter. And that authorization involves grant the ISIS the app between posts on behalf and do all sorts of other things. And so there's just a lot of these basic security best practices
Starting point is 00:52:25 from the fake calendar to like the fake discord verification to like the JavaScript book, Michael it. These are things that are pretty well understood in what to. that we're just out doing. And once we sort of get rid of all this little hanging fruit, hopefully it'll be much harder for these hackers to sue people's funds. Of course, they'll keep intimating, what's deep intimating in response,
Starting point is 00:52:51 but it does sort of feel like right now we're letting some of these very bare basics just sort of go untouched. So instead of SMS to a FAA, like a text message being sent to your phone for security, would you then recommend something more like either a Ubiki or Google Authenticator, just like something that's not related to your phone? Yeah, I think anyone in crypto should not be using SMS2FA for anything. Just by being in this industry, you are already at higher risk than the average person. Let's face it, there's hundreds of billions of people out there.
Starting point is 00:53:27 Scammers need to figure out who is the highest value people to target. Just because you're in crypto, you automatically get sorted into that high. high-value give-with-people. So, yeah, no one should be using SMS2FA. Google Authentator is good. Just make sure to turn off setting that syncs your backup codes to the cloud. Because, and again, this is a case by case basis,
Starting point is 00:53:46 but you can imagine hypothetically someone might have the backup sync enabled and their Google account is their weak in security, right? And so now someone can get used to their Google account and then retrieve those backup codes or those authenticateers seeds and suddenly get access to the other accounts again. UBTs are also good, but I actually wouldn't recommend those for the average person, just because it is a bit of a pain to manage.
Starting point is 00:54:13 You know, you have to make sure you have your primary in UBC and your backup UBC in case the primary you would dies, and then you have to store your backup one in a safe place, except you also need to register with any new sites that you go to you, but it's other rights to not to get backup. So it is just a bit of a hassle. I think that based on authenticators are good enough for most people. So because auditing smart contracts is expensive, what recommendations would you have for projects that care about security but also are on a budget and maybe can't afford to have an audit very regularly? That's a really good question. I mean, I think part of the problem here is basically there are many good resources for developers who want to either do the right thing to prepare themselves, prepare the code base before an audit.
Starting point is 00:55:00 or even independent of the audit or to level up and learn more about security, right? And that's one of the things that I want to try and solve in the future what seal is to provide those resources so that we can reduce the load bearing factor on auditing as the primary way to make sure that your code base is secure. I think the other thing is there are also audit contests, right? And so those are, I think, typically a little cheaper
Starting point is 00:55:24 than traditional audits. And so that might be a good way for a project who wants to get an audit, has someone out of money to spend an audit, but maybe not enough for like a tier one auditor, they can consider trying a contest instead. So, you know, blockchain technology is continuing to develop in so many different ways with all these layer two's happening. Now layer three is. We're even seeing layer two's on Bitcoin. Like there's, it's really, you know, we're seeing smart contracts come to Bitcoin. Like, it's kind of all over the map. And so I wondered what development is.
Starting point is 00:55:58 what developments in crypto are making you worried about kind of the potential surface attack area that they create for hackers? I think bridges are always scary. I think anything that involves an offshade or two component is scary. And anything that requires proving or, you know, I think that that, I guess that is an offshade or inching component, right? It's like trying to prove something happened in one place to another place. because that usually involves a very complex code. You need to parse the proof. You need to parse the data. You need to validate the proof.
Starting point is 00:56:33 And then that proof probably gates some very critical action, right? Like unlocking a bunch of funds. And so I think at the end of the day, I still just basically ended up discovering bridges in other bridge-like things. I think those will get to be really scary for me. So I imagine that the Security Alliance is just, you know, one of the initial steps toward a more secure world in crypto. But I wondered, you know, where you thought this could go, like in 10 or 20 years, what other kind of institutions or standards or, you know, whatever do you think might be implemented that would make crypto even more secure?
Starting point is 00:57:10 I mean, 10 to 20 years out, it's like multiple lifetimes in crypto. I really don't know if I can take that far ahead. I think, yeah, on a short of time horizon, part of the reasoning behind the security alliance, like I said earlier, is that a lot of people, you know, myself included, know, what needs to happen whether it's a safe harbor or the war gains or anything else, these are things that people in WAP2
Starting point is 00:57:39 have sort of developed over the past decades, right? They have so many more years of experience on us and as just like a like a tasty off wine, I think we should just start adopting as many of those best practices as we can
Starting point is 00:57:55 right? And so what I really want to focus on what the security lines right now is just let's bring the bar up right we have so many good things we can take inspiration or straight a poppy from in web two that we just haven't done and mostly because it takes a lot of effort to organize adopting those things it takes a lot of effort to get the ball rolling and I'm hopeful that the security lines is the way to get that to get that process started all right sam well this has been a fascinating discussion is there anything i have not asked you that you think listeners should know no you really hit, he really hit all the, all the topics.
Starting point is 00:58:31 All right. Well, thank you so much. Where can people learn more about you and the Security Alliance? Yeah. To learn more about the Security Alliance, we have a website, security alliance.org, where we have some information about the initiatives that we've released. If you have any other questions beyond that, I'm always available on Telegram at Sam Sussi Sun. Perfect. Well, it's been a pleasure having you on Unchained. Thank you. Thanks so much for joining us today to learn more about Sam and the Security Alliance, check out the show notes for this episode. Unchained is produced by me, Laura Shin,
Starting point is 00:59:02 with help from Nelson Wong, Matt Pilchard, Juan Navanavich, Megan Gavis, Shashonk, and Market Curia. Thanks for listening. Unchained is now a part of the Coin Desk Podcast Network. For the latest in digital assets, check out markets daily five days a week with host Noel Atchison. Follow the CoinDesk Podcast Network for some of the best shows in crypto.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.