Convince Me

Convince Me
Podcast Description
The crypto market is at an inflection point. Pure speculation cannot be the primary driver of the asset class. We are pragmatically exploring what is actually useful in the technology and industry.
Podcast Insights
Content Themes
Key content themes include regulatory challenges in the crypto space, security measures in cryptocurrency audits, and the exploration of practical use cases for digital assets. Episodes cover the operational roadmap for crypto institutions, security standards like the CCSS, and discussions with leaders from innovative projects such as EQ Exchange and Tungsten Custody Solutions, emphasizing the balance between growth and regulatory compliance.

The crypto market is at an inflection point. Pure speculation cannot be the primary driver of the asset class. We are pragmatically exploring what is actually useful in the technology and industry.
To learn more about Hypernative, check out their profile on Counterparty Catalogue:
https://counterpartycatalogue.com/service_providers/hypernative
Phill Moran, and co-host Dalton sit down with Gal Sagie—co-founder and CEO of Hypernative—to unpack how real-time threat intelligence is reshaping crypto security. From North-Korean bridge hacks to stable-coin fraud, we explore why legacy cybersecurity controls fall short and what institutions need before moving serious capital on-chain.
TIMESTAMPS
00:00 Intro – why blockchains are not automatically secure
01:40 Wallets, MPC, and access-control basics
05:25 The 1.5 B USD Bybit cloud breach autopsy
08:30 Detecting exploits before they fire (99 percent hit-rate)
12:45 “Safe-room” withdrawals and automated incident response
14:40 Bridges, lending protocols, and the riskiest DeFi rails
18:30 Founder-laptop hacks and the human weak link
22:55 Investor due diligence: security as a must-have
28:05 Stable-coin fraud and compliance gaps
34:00 Bitcoin treasuries, tokenization, and AI-agent payments
38:45 How Hypernative will deploy its 40 M USD Series A
47:50 Regulation, innovation, and why it’s a great time to build
KEY TAKEAWAYS
Different tech stack, different threats — endpoint AV won’t protect a multi-sig.
Seconds matter — Hypernative flags 99 percent of attacks minutes ahead of the exploit.
Operational risk now outweighs code risk — cloud misconfigs and compromised laptops topple well-audited protocols.
Fraud is the next frontier — stable-coin issuers need proactive actor-classification, not just compliance blacklists.
Institutional bar is rising — real-time monitoring and automated policy enforcement are becoming investor requirements.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.