Published Nov 16, 2023
Adversary Capability Model
Discover our new adversary model for cyber defense, focusing on one key aspect: adversary capability levels – from amateurs to government-backed APTs. It might be the only one you would ever need! Stay tuned for application examples.
Published Jun 15, 2018
Addressing user authentication challenges for cryptocurrency exchange
The threat model for cryptocurrency exchange is somewhat unique even for finance applications; two essential techniques that make anti-fraud efforts fruitful in traditional fintech, are KYC and the capability to dispute a suspicious operation. In the cryptocurrency exchange, these may turn totally non-reliable or even nonexistent since crypto currency operations are generally anonymous and non-reversible. Thus, we need more rigorous (and preventive) security as compared to traditional banks and payment systems1. The traditional instruments we typically have at hand are obviously insufficient. We do not discard KYC completely, and we try to work around non-reversibility wherever possible. However, the purpose of this paper is to explore ways to surpass the intrinsic limitations of traditional methods, because the opposite approach of making case by case improvements is already getting enough public attention. A mindless combination of different authentication and recovery methods may merge into a cascade of failuresI instead of increasing redundancy and reliability; thus we need a systemic approach.