У нас вы можете посмотреть бесплатно 0xriptide: How to Find Million-Dollar Bugs in Web3 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode our host Alex sits down with Riptide, the hacker who uncovered a critical vulnerability in Arbitrum’s smart contract upgrade, preventing a multi-million dollar exploit. 📌 Don’t forget to like, comment, and subscribe for more cybersecurity insights and join our Discord community / discord Alex https://x.com/d0rsky Riptide https://x.com/0xriptide Bountyhunt3rz podcast: https://x.com/bountyhunt3rz ⏱ Timestamps: 00:00 Intro: Welcome to the HackenProof Podcast 01:04 Hackathon in Denver 2025 02:47 Meet Riptide: The Hacker Who Found a 400ETH Arbitrum Bug 03:50 How Guys Randomly Met in Bangkok (Strange Story!) 05:15 Riptide’s Background: From Wall Street to Web3 Security 07:45 Breaking Into Bug Bounties: How Riptide Got Started 10:05 The Arbitrum Vulnerability: How Riptide Discovered It 12:35 Getting Paid in Bug Bounties: The Struggles & Delays 16:15 How Long Does It Take to Find a Bug? (Riptide’s Process) 19:30 CTFs vs. Live Bug Bounties: Which One Pays More? 21:50 Worst Payout Experience: The Dark Side of Bug Bounties 24:15 How Riptide Chooses Smart Contract Targets to Hack 28:00 AI & LLMs in Security: Can AI Find Smart Contract Bugs? 32:25 Biggest Web3 Security Mistakes That Devs Still Make 35:45 Launching a DeFi Protocol vs. Hunting Bugs: What’s Better? 38:55 Avoiding Burnout as a Bug Bounty Hunter (Pro Tips) 42:10 Why Are There So Few Women in Web3 Security? 44:55 How to Get Paid for Medium & Low Severity Bugs 46:45 Best Advice for Aspiring Bug Bounty Hunters 48:05 Where to Meet Us Next: Upcoming Crypto Conferences 49:45 Outro: Subscribe for More Web3 Security Insights!