Photo

Transaction security for crypto currency services: why and how?

Dmitry Golubev

from Stasis (Limassol)

About speaker

An IT professional with more than 25 years of experience in software development. MBA diploma. 17 years worked in telecommunications domain with Nortel, Avaya, Ericsson, NEC/Netcracker.

About speakers company

STASIS issues EURS, the sound Internet money for the EU and beyond. This is the most transparent European-based and operated stablecoin. Backed 1:1 by the liquid financial instruments, this blockchain-based digital asset reinforces investors’ trust with 4 verification streams. STASIS infrastructure allows to on-/off-ramp fiat on 6 most popular blockchains — such as Ethereum, Polygon, XDC, XRP, Algorand and Stellar — “bridge” assets to shortcut financial efficiencies, get the best rates for your targeted crypto, and leverage extensive arbitrage opportunities across the Web3 sector.

Abstracts

specific

Blockchain technology and cryptocurrencies are a new rising trend in finance. Since the appearance of the first crypto-currency applications, there have been attempts to hack these applications by attackers. Since more and more fintech companies start using crypto operations, the security of crypto operations becomes very important.
In this talk we will cover the following topics:
- Typical scheme of using crypto wallets for cryptocurrency applications.
- Why security of crypto-transactions is important for companies using crypto operations.
- Comparison of hardware and software methods for protecting private keys of crypto wallets.
- An implementation of a software architecture that protects the private keys of hot wallets and ensures the security of crypto transactions.

The talk was accepted to the conference program

other talks of this topic

Photo
Sandboxing in Linux with zero lines of code

Ignat Korchagin

Cloudflare, Linux Guru

specific
Photo
GitOPS: View from a security perspective

Aleksandr Sungurov

Exness

broad
Photo
Container and Kubernetes: modern attacks and mitigations

Artem Bachevsky

Independent Researcher

broad
Photo
Offensive Azure Security

Sergey Chubarov

Independent consultant

broad