00:00 Introduction
00:35 The Need for Layered Protection
01:32 Decentralization & Phishing
01:47 Irreversible Transactions
03:03 Stability Enforcement
04:10 Assuming Protection By Default
06:09 New Assault Surfaces
07:00 Federal government Hackers
08:33 Custodian vs Non-Custodian
09:34 World wide web2 vs Web3 Breach Severity