Blockspace: AI & Bitcoin
Episode: CULTURE – How to Protect Yourself from a Crypto Kidnapping
Date: March 6, 2026
Guests: Chris Cedor (Founder, CDOR and Bitsurance)
Hosts: Charlie Spears & Colin Harper
Episode Overview
This Blockspace episode dives deep into the persistent and evolving threat of crypto-related physical attacks—ranging from phishing to home invasions and kidnappings—linked predominately to Bitcoin self-custody. Hosts Charlie Spears and Colin Harper welcome Chris Cedor, meme-maker and founder of CDOR and Bitsurance, to unpack best practices in personal and operational security, advances in wallet technology, the risks (and mitigations) of self-custody, and the profound security implications posed by AI-powered scams. The conversation balances sobering statistics and chilling anecdotes with practical solutions anyone can implement to drastically reduce their risk surface in the “Wild West” of digital asset sovereignty.
Key Discussion Points & Insights
The Rise in Violent Physical Attacks on Bitcoin Holders
-
A Record Year for Attacks (00:00):
- 2025 was “the most violent year on record for crypto and Bitcoin-related physical attacks,” including home invasions and kidnappings. Over 74 documented cases, a 70% jump from 2024. “Half of those involved violence and torture.” (A, 00:00; B, 00:50)
-
Attackers Evolve:
- No longer amateurs; organized crime networks and sophisticated hackers have entered the space:
“Now you’ve got like actual criminal enterprise... executing these attacks.” (B, 13:52)
- No longer amateurs; organized crime networks and sophisticated hackers have entered the space:
-
Correlation with Bitcoin Price and Publicity:
- "There’s a direct correlation with the bitcoin price. Everyone vocal about bitcoin with a public persona becomes a lucrative target." (A, 11:33)
- Even bragging about holdings on social media can draw unwanted attention.
The Self-Custody Landscape & Common Pitfalls
-
Custody Models Explained (05:21):
- Exchange custody is vulnerable to external risks (“Sam Bankman-Fried can run off with it... Coinbase can close your account.”).
- Self-custody gives the user full responsibility for securing private keys—no customer support or hotline in case of error.
-
Hardware Wallets vs. Metal Backups (05:51):
- Hardware wallets: Dedicated, minimally-functional devices that keep keys air-gapped and minimize digital attack vectors.
- Metal backups: Fire/flood-proof, physical record of the wallet seed (private key) for disaster recovery.
-
The “Petty Cash” Principle (08:25):
- Use hot wallets for small amounts (“don’t have more than €500 worth of bitcoin on a hot wallet”), migrate larger holdings to more secure cold or hardware wallets.
- Simplicity and regular testing (“wipe the wallet again and just recover from the backup... if you do this from time to time, then you can go into multisig”). (A, 08:25)
-
Overcomplication Is a Trap:
- Many make mistakes by overcomplicating self-custody (complex “crypto” schemes, seed obfuscation, etc.).
“Keep it simple, you’re not special.” (A, 08:25)
- Many make mistakes by overcomplicating self-custody (complex “crypto” schemes, seed obfuscation, etc.).
Expanding Risk: Social Engineering, Phishing, and AI
-
Physical Threats Meet Digital Deception:
- Not all risk is physical; phishing (especially via sophisticated AI-generated lures) is on the rise.
- Real-life examples:
- “He was basically one shotted by North Koreans. Sent a fake zoom link ... there was a video of another person... tricked him into giving access.” (A, 17:33)
- Deepfakes, AI voice/video fraud, and elaborate fake conferences lowering the bar for scammers (19:27, 20:51).
-
AI Shifts the Security Asymmetry:
- “The asymmetry to use Internet safely is gone with AI.” (B, 18:43)
- Attackers’ capabilities now match—and often exceed—users’ defenses:
“Any script kitty can now create a fake website and ... really scarily good video and forgeries.” (A, 19:27)
Operational Security & Social Practices
-
Reduce Your “Risk Surface” (16:21):
- Avoid publicizing holdings; don’t brag about your bitcoin (“don’t be as stupid as Charlie and I and talk about it and be public about it”). (A, 16:21)
- Street smarts: “Don’t go bragging ... on Instagram ... people have been targeted... even just lying about holdings.” (A, 16:21)
-
Beware of Social Engineering:
- “I am constantly fending these things off ... still regularly catch myself.” (B, 17:11)
Advanced Custody Models and Modern Wallet Design
-
Spectrum of Security:
- Self-custody is binary (you have the keys or not), but security is a spectrum—multi-sig, time delays, and geographic key sharding can dramatically reduce risk.
“If you are able to spend your bitcoin quickly then you already have a security problem.” (A, 21:46)
- Self-custody is binary (you have the keys or not), but security is a spectrum—multi-sig, time delays, and geographic key sharding can dramatically reduce risk.
-
Blended Self-Custody, Insurance, and Miniscript:
- Insurance is a final backstop, but technical solutions offer the most robust security.
- Miniscript wallets allow extremely granular control over keys (“time decaying or time expanding setups,” “amount of redundancy and levels of security that no custodian can provide to you”). Can be built with ~$400 of consumer hardware for anyone. (A, 21:46)
-
What is Miniscript? (24:09):
- Subset of Bitcoin’s script language enabling easy, safer custom multisig and conditional spend policies.
-
“Bowling with bumpers”—can build custom wallet logic (“inheritance,” multi-stage approvals, delays after loss/theft) without risking self-lockout.
-
Bitcoin vs. Other Chains:
- Attacks like the 2025 Bybit/Gnosis Safe hack possible on Ethereum (due to lack of native multisig, requiring “blind signing”), much harder with bitcoin’s native features. (A, 26:31)
Future of Bitcoin Self-Custody: Soft Forks & OpCodes
- Covenant Proposals:
- New opcodes (checktemplateverify, templatehash, etc.) could enable “reactive security”—outflows only to whitelisted addresses, velocity/magnitude controls, transaction “punish” buttons for active defense.
“Currently, proactive security... If something goes wrong, you’re fucked. ... With a covenant, you could have... something like reactive security.” (A, 29:22)
- New opcodes (checktemplateverify, templatehash, etc.) could enable “reactive security”—outflows only to whitelisted addresses, velocity/magnitude controls, transaction “punish” buttons for active defense.
- What’s at Stake:
- Widespread adoption of new security models could massively decentralize custody and drain major exchanges—improving overall ecosystem risk.
- Pushback from those “afraid of spam,” but “spammers will always find a way” and blockers often misunderstand the enormous security upside. (A, 32:48)
- “There are two people, ones that want covenants and those that do not know what covenants are, I believe.” (A, 34:55)
Notable Quotes & Memorable Moments
- “You can do this with like $400 of consumer grade hardware and a miniscript wallet that requires you to have a lot of co-signers. With miniscript you can have these time properties and they’re not enforced by a company.” (A, 00:00; repeated at 21:46)
- “There were over 74 documented physical attacks against bitcoin owners last year. This is up 70% from 2024. Yes, the criminals are stopping at nothing, not even kidnapping, cutting off fingers, and in some cases even death. They want your bitcoin.” (B, 00:50)
- “I always say keep it simple, you’re not special. And from time to time, it’s worthwhile to revisit a backup...99% of people should be fine with a single-sig signer.” (A, 08:25)
- “If you are able to spend your bitcoin quickly then you already have a security problem. ... Your imagination, there is no bound to that.” (A, 21:46, 24:09)
- “Every time you send a UTXO...if something goes wrong, like you’re fucked...” (A, 29:22)
- “There are two people, ones that want covenants and those that do not know what covenants are, I believe.” (A, 34:55)
Key Timestamps for Important Segments
| Timestamp | Topic/Quote | |-----------|------------------------------------------------------------------| | 00:00 | Statistics on violent crypto attacks, advanced wallet overview | | 00:50 | 2025 attack stats: 74 incidents, 70% jump, real physical violence| | 05:21 | Hardware wallet basics and risk of relying on exchanges | | 08:25 | Self-custody pitfalls and “petty cash” approach | | 11:33 | Increasing criminal sophistication and attack data | | 13:52 | Organized crime and targeting public figures in Bitcoin | | 15:51 | Case study: French IRS leak, targeted attacks in France | | 16:21 | Public persona risks and the importance of discretion | | 17:33 | Phishing, Zoom hacks, and personal anecdote about a North Korean attack| | 18:43 | AI lowers attacker barriers for social engineering | | 19:27 | Fake conference scams, live video deepfakes | | 21:46 | Multi-sig, insurance, and spectrum of self-custody | | 24:09 | Miniscript: what it is and how it helps | | 26:31 | Other blockchains’ failures with multisig security flaws | | 28:43 | Bitcoin script, vaults, and soft fork improvements | | 32:48 | Spam, covenants, and debate over protocol upgrades | | 34:55 | “There are two people...” quote; final thoughts |
Closing & Where to Find Chris
- Chris Cedor’s projects: cdor.io, bitsurance.io, Twitter/X: @Coinjoint (35:13)
- Next appearance: Las Vegas conference (35:13)
Summary Takeaway
Self-custody is at once liberating and dangerous: it gives holders unprecedented control but also unparalleled exposure to innovative, sometimes brutal, forms of attack. As both physical and digital threats rise—fueled now by AI—Chris Cedor and the hosts urge users to balance simplicity and technological sophistication. Concrete steps—hardware wallets, robust backups, multisig, and the next generation enabled by Bitcoin protocol upgrades—offer powerful defense, but operational discipline and discretion remain critical. The next evolution in custody, powered by the Bitcoin protocol itself, is coming—and with it a substantial leap forward in user security.
