
The $1.5 billion Bybit exploit succeeded despite multisig and hardware wallets. One architectural weakness made it possible. Here’s what enterprise custody teams should learn from it.
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

Schnorr, But with Vectors – Lattice-based Signatures Explained

OP_CHECKSHRINCS: A Hash-Based Signature Opcode for Post-Quantum Bitcoin

Blockstream Jade Now Supports Full Two-Factor Authentication Backup

Liquid Network Roadmap: 0-Conf, Quantum Readiness and BitVM
Free AI-powered recaps of Blockstream and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.