FailSafe: Advanced Security for Digital Assets
  • Introduction to FailSafe
  • Whitepaper
    • Introduction
      • Defense-in-Depth
      • Forward Security
    • Web3 Threats to Your Crypto
      • The Human Factor: Design with Operator Error in Mind
    • Defense-in-Depth & the Lifecycle of a Transaction
      • Defense 1: de-risk Web3 Asset Positions
      • Defense 2: FailSafe Blockchain Reconnaissance
      • Defense 3: FailSafe Interceptor Service
      • Discussion
    • FailSafe Architecture
      • Forward Security in FailSafe
        • Quantum Threats to EVM-based Blockchains
          • On ECDSA Key Re-use
          • On New Quantum-resilient Alternatives
          • Account Abstraction as a Path to Sunseting ECDSA on Ethereum?
        • Introducing the Quantum Migration Tool (qMig)
          • Assumptions and Goals
          • How Does qMig work?
          • Discussion
          • FailSafe+qMig
    • Conclusion
    • Further Reading
  • How FailSafe helps your Organisation
    • Reduce Attack Surface Area
    • Radar for Security Risks
    • React to Malicious Threats
    • Forward Security against Looming Quantum Computing Threats
  • FailSafe as a tool for Enterprise Risk Management
Powered by GitBook
On this page
  1. Whitepaper
  2. Defense-in-Depth & the Lifecycle of a Transaction

Defense 2: FailSafe Blockchain Reconnaissance

First contact with the attacker. As noted earlier, the attacker’s goal at this point is either to directly learn the user’s private key, or convince the user to sign a transaction of the attacker's choice. A myriad of tried and tested social engineering attacks are available, and just as in the Web2 world, even if rejected by 99% of users, the 1% success rate can make the endeavour highly profitable.

At this stage, a FailSafe user is protected by several countermeasures. When the user encounters the attacker’s dApp, if the user is using a client that is directly integrated with FailSafe Blockchain Reconnaissance (FBR) service (e.g., like FailSafe chrome plugin or a proxy RPC URL), the attacker’s request is likely to be rejected outright. The FBR maintains an up to date database of black listed addresses; this includes sanctioned addresses, fraudulent/rugpool contracts. Risk profiles are also constructed based on historical as well real time transaction driven behaviour anomalies/patterns. For unintegrated clients, the FBR companion is available to the end user via direct address entry/lookup.

Last updated 2 years ago