>1.2K subscribers
From Crypto-Native to Crypto-Enabled
I’m not one to make big annual predictions, but one thing that seems likely to me is that 2024 will mark the emergence of mainstream apps powered by ...

Bitcoin as Battery
One of my favorite things about crypto is that, every so often, your conception of what it is changes.Bitcoin at first was "weird internet money...

The Internet's Next Business Model: A Conversation with Cloudflare's Matthew Prince
I just released a new episode of The Slow Hunch with Matthew Prince, CEO and co-founder of Cloudflare. Since we invested in their Series C back in 2013, I've watched Matthew and his team build one of the most critical pieces of internet infrastructure—protecting and accelerating vast portions of global web traffic. Our conversation traces Matthew's journey from his early "slow hunch" that the internet was fundamentally broken and needed fixing. We start with his law school days in 2000, when ...
From Crypto-Native to Crypto-Enabled
I’m not one to make big annual predictions, but one thing that seems likely to me is that 2024 will mark the emergence of mainstream apps powered by ...

Bitcoin as Battery
One of my favorite things about crypto is that, every so often, your conception of what it is changes.Bitcoin at first was "weird internet money...

The Internet's Next Business Model: A Conversation with Cloudflare's Matthew Prince
I just released a new episode of The Slow Hunch with Matthew Prince, CEO and co-founder of Cloudflare. Since we invested in their Series C back in 2013, I've watched Matthew and his team build one of the most critical pieces of internet infrastructure—protecting and accelerating vast portions of global web traffic. Our conversation traces Matthew's journey from his early "slow hunch" that the internet was fundamentally broken and needed fixing. We start with his law school days in 2000, when ...
Share Dialog
Share Dialog
We have spent a fair bit of time over the past year working on security at USV and across the USV portfolio. Anyone who has spent time working on personal or corporate security -- and in particular information security, knows that there are a million ways in, and you're never "finished". Fred wrote a bit about his experience last year, and we had an issue yesterday with Albert's phone:
Thanks to everyone who has been helping me recover from a Twitter account takeover based on an unauthorized SIM switch on my phone
— Albert Wenger (@albertwenger) January 11, 2018
The way we have been thinking about it is in terms of "the weakest link". It is critical to have your most important accounts (primary email, banking, crypto, etc) secured well, but it's also important to work your way down the line to other accounts and entry points. The lesson being that attackers will seek the weakest point and work from there. One of weakest points in personal security is the phone -- cell carriers are notoriously bad at security, and attacks like phone porting and SIM swapping are common. For that reason, it's important to move away from using SMS as a second factor backup wherever possible, and instead moving to apps like Google Authenticator, or to hardware-based 2FA using Yubikeys or similar. Another weak point is personal email, or old email accounts. It's easy to forget about old accounts that you used back in the day, but those can be problematic, especially if they are linked to other accounts, and if 2fA is non-existent or tied to SMS. So, by all means, start with the most important accounts. But don't stop there -- keep sussing out weakest link. For more resources on personal information security, see this excellent guide by EFF (written in the context of surveillance, but applicable to all attack vectors).
We have spent a fair bit of time over the past year working on security at USV and across the USV portfolio. Anyone who has spent time working on personal or corporate security -- and in particular information security, knows that there are a million ways in, and you're never "finished". Fred wrote a bit about his experience last year, and we had an issue yesterday with Albert's phone:
Thanks to everyone who has been helping me recover from a Twitter account takeover based on an unauthorized SIM switch on my phone
— Albert Wenger (@albertwenger) January 11, 2018
The way we have been thinking about it is in terms of "the weakest link". It is critical to have your most important accounts (primary email, banking, crypto, etc) secured well, but it's also important to work your way down the line to other accounts and entry points. The lesson being that attackers will seek the weakest point and work from there. One of weakest points in personal security is the phone -- cell carriers are notoriously bad at security, and attacks like phone porting and SIM swapping are common. For that reason, it's important to move away from using SMS as a second factor backup wherever possible, and instead moving to apps like Google Authenticator, or to hardware-based 2FA using Yubikeys or similar. Another weak point is personal email, or old email accounts. It's easy to forget about old accounts that you used back in the day, but those can be problematic, especially if they are linked to other accounts, and if 2fA is non-existent or tied to SMS. So, by all means, start with the most important accounts. But don't stop there -- keep sussing out weakest link. For more resources on personal information security, see this excellent guide by EFF (written in the context of surveillance, but applicable to all attack vectors).
No comments yet