Podcast appearances and mentions of Andy Greenberg

  • 103PODCASTS
  • 174EPISODES
  • 46mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 20, 2025LATEST
Andy Greenberg

POPULARITY

20172018201920202021202220232024


Best podcasts about Andy Greenberg

Latest podcast episodes about Andy Greenberg

Gadget Lab: Weekly Tech News
Why 3D Printing an Untraceable ‘Ghost Gun' is Easier Than Ever

Gadget Lab: Weekly Tech News

Play Episode Listen Later May 20, 2025 18:32


WIRED's Senior Writer, Andy Greenberg, has been reporting on ghost guns for years. He first used a 3D printer to assemble a gun more than a decade ago, and says that today's process is not only faster, but cheaper. We talk to Andy about how he legally printed the same gun Luigi Mangione allegedly used in the alleged killing of the United Healthcare CEO last year, and whether US law is keeping up with the technology of 3D printed guns.Articles mentioned in this episode: We Made Luigi Mangione's 3D-Printed Gun—and Fired It  Bluesky Is Plotting a Total Takeover of the Social Internet The Delirious, Violent, Impossible True Story of the Zizians You can follow Zoë Schiffer on Bluesky @zoeschiffer Learn about your ad choices: dovetail.prx.org/ad-choices

Beyond the Code
E52: How Tigran Gambaryan Deciphered Bitcoin and Survived Nigerian Prison

Beyond the Code

Play Episode Listen Later Mar 24, 2025 84:01


Tigran Gambaryan⁠ spent 8 months in grueling conditions in a Nigerian prison. But that's not what made him famous.Episode 52 of Beyond the Code dives into Tigran's incredible journey. For those of you who don't know, Tigran started off as an IRS special agent, where he used a simple Excel spreadsheet to reverse engineer the Bitcoin blockchain and track major crypto criminals such as those responsible for the Mt. Gox hack, Welcome to Video, Alpha Bay and Silk Road —earning him the nickname, “the man who broke Bitcoin”. After a decade in Government law enforcement, Tigran took up a pivotal role at Binance leading their financial crimes unit and fostering global regulatory ties. Tigran's story is one of innovation and grit, as chronicled in Andy Greenberg's Tracers in the Dark. But things took a turn for the worse for Tigran when he made a trip to Nigeria last February and what was supposed to be a simple training session spiraled into detention, interrogation, and bribes and imprisonment, exposing systemic corruption. After 8 grueling months in Nigeria's Kuje prison, through media pressure and U.S. diplomatic efforts, Tigran's release was finally secured and thankfully he is now home with his family. Links to videos and articles:https://www.youtube.com/shorts/Caa4X7GqTkQ https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/https://fmino.gov.ng/disregard-falsehoods-being-peddled-by-tigran-gambaryan-against-nigerian-government-officials-fg/https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/https://www.cryptotimes.io/2025/02/14/nigeria-used-binance-as-scapegoat-wanted-150-million-bribe-tigran-gambaryan/ https://x.com/DC_Draino/status/1832182160918503643 For those interested, you can buy Andy Greenberg's book, Tracers in the Dark, on Amazon: https://a.co/d/3umNV17If you want to do it right (chronologically), start with Nick Bilton's book, American Kingpin (https://a.co/d/hTRVY2C), which tells the story of Ross Ulbricht and the Silk Road. These books are imperative to understanding how the space migrated from basically a hub for libertarians, Cypher punks and criminals, into what it is today.LinkedIn: https://www.linkedin.com/in/tigran-gambaryan-0852679a/ X: https://x.com/TigranGambaryan

Stuff That Interests Me
Why Hal Finney Is Not Satoshi Nakamoto

Stuff That Interests Me

Play Episode Listen Later Jan 12, 2025 18:18


ICYMI (there were problems with the site mid-week), check out my forecasts for 2025, always one of my more popular pieces of the year.He has invented an entirely new digital system of money with the potential to change the world as we know it. He has watched it grow to a market cap of over two trillion dollars, with as many as 100 million users worldwide, including actual nations, and the US President promising a strategic bitcoin reserve in his 2024 election campaign. He has half the internet nosing about and trying to figure out who he is. His own coins are worth about $100 billion, making him one of the richest people on earth.Yet he has managed to stay completely unknown and anonymous. It is almost unbelievable.Never mind Big Foot, the Mary Rose or the Loch Ness Monster, the mystery of ‘Who is Satoshi Nakamoto?' is perhaps the greatest mystery the world has ever known - or not known.There have been thousands of investigative attempts, articles, blog posts and discussion groups involving probably millions of man hours dedicated to pinning down this man, with names bandied about from Elon Musk to little known computer scientists. They have all failed. Satoshi's identity is as bulletproof as his code.For my 2014 book, Bitcoin: the Future of Money?, from which today's piece is taken, I ventured on the same doomed journey. I spent many months poring over the 80,000 words Satoshi wrote in the three years he was active online, looking for clues. What unusual words did he use? Does he make any spelling mistakes? Does he have any quirky grammatical habits? I analysed it in such detail I can tell you where he places brackets, how he uses hyphens, even how many spaces he uses after a full stop and how that changed – all in the hope of finding idiosyncrasies that appear in the writing of other Cypherpunks - clues which might lead me to him.Profiling a genius – some broad brushstrokes‘I've had the good fortune to know many brilliant people over the course of my life, so I recognize the signs.' Hal FinneySatoshi reached such high levels of expertise in so many different fields that many believe he can't possibly be one person. He is a polymath. It is not just the breadth and depth of his knowledge, but, more importantly, its specificity that makes him unique.In order to first conceive a new system of electronic cash, one would have to have thought extensively about the nature of money and its history. Money is a subject that has found more interest in the last few years with the emergence of bitcoin, the 2000s bull market in gold, the financial crisis and the growth of libertarianism, but, in 2007–8, when bitcoin was conceived and first introduced, books and academic papers on the subject were few and far between. The subject did not have broad appeal.How many of those who cared actually had the ability to design a system like this? It is one thing declaring what needs to be done; it is another putting it into practice.Satoshi must have had expertise in computer coding, mathematics, databases, accounting, peer-to-peer systems, digital ownership, law, smart contracts, cryptography and monetary history.He had to have had experience in academia. The act of submitting a white paper, its presentation, the impeccable referencing – it all denotes academia, even government.It's also easy to infer from the way bitcoin was launched that Satoshi had experience in open-source tech start-ups.The resilience of the code suggests he had computer hacking experience. Moreover, his ability to keep his identity hidden, despite the fact that half the internet is trying to figure out who he is, suggests significant practical experience in staying anonymous. It also means he has the trust of those who know him, if anyone did, to keep his secret.Then there's the matter of his prose. It is consistent and of such a high standard it seems he must have had experience as a writer – perhaps he was a blogger, an academic or an author. He was also quite humble and dismissive of his ability in this regard. ‘I'm better with code than with words', he said.It's clear from his posts that he had the awareness to see shortcomings in his system, and the patience not to try to do too much too quickly. He had the foresight to perceive problems before they arose and the meticulousness to prepare for them. He appears to have remained calm and measured in the face of difficulty, but also of his own success. He treated those two imposters just the same. Signs of arrogance are hard to find.Then there's the way that bitcoin was introduced to the world. PR, like economics, is not an exact science. Sometimes something gains traction, sometimes it doesn't – and there's no explaining why. Bitcoin has been a PR masterstroke. The coverage it has received has been enormous. It gets more publicity than gold, which is the oldest form of money there is. Satoshi cannot take all of the credit for this, but he has to take some of it. He understood when to make his ideas known, at what point to release his creation into the open-source world and he had the self-efacement to let go of it for others to develop. He promoted his idea with huge under-statement – but the scheduled creation of bitcoins meant there would be no shortage of bitcoin-holders to do the promoting for him.So we can add an understanding of both PR and psychology to his list of qualities. His knowledge of how people on the internet, in the open source world and in large institutions work, allowed him to progress his creation.Finally, he has a certain honesty. Despite Bitcoin's similarities to a pyramid or Ponzi scheme, he never pumped-and- dumped his creation. Tempting though it must have been, he never sold the bitcoins he mined. That also suggests he already had money.There are not many people like this.From mathematics to computer programming to economics and monetary history to politics to PR and psychology to cryptography to business acumen and vision to plain old written English – in all of these fields he excelled. To cap it all, he's probably good-looking too.It's early in history to be drawing this sort of comparison, I know, but there are many parallels between Satoshi and Isaac Newton. Newton was a brilliant scientist and mathematician, of course, and an alchemist. But he was also Master of the Royal Mint. He redesigned England's monetary system, putting us onto the gold standard on which Britain's colossal progress during the next 200 years was built.If you haven't already, take a look at my buddy Charlie Morris's monthly gold report, Atlas Pulse. It is, in my view, the best gold newsletter out there, and, best of all, it's free. Sign up here.First instinctMany believe that Satoshi was Hal Finney, the veteran programmer, who invented reusable proof of works, one of the models on which bitcoin was based. This was my first instinct. Often such “first instincts”, for reasons I cannot begin to explain, prove correct. When Satoshi first announced bitcoin on the cryptography mailing list, nobody replied. The message was ignored for two days. In the short-attention-span land of the web, two days is a long time to wait for some feedback on something you've spent 18 months working on. Two days is a long time to wait when you might have nailed something Cypherpunks had been dreaming about for 20 years.The first reply came from Finney. Was he replying to himself in order to generate some interest and discussion – to bump his thread? Replying to your own posts, known as ‘sock-puppeting', is not uncommon. Let us pursue this line of thinking a little further.Finney was born in 1956 – in that same two-year golden window as so many computer-scientist geniuses that would change the world (from Bill Gates to Tim Berners-Lee to Steve Jobs) were born – and spent his life working on cryptographic systems. He was number two to Phil Zimmerman, the pioneer in the field, for many years at the Pretty Good Privacy (PGP) Corporation, where they developed the most widely used email encryption software in the world.Such were his beliefs in privacy, freedom, and Cypherpunk, Finney was known to spend many nights writing and developing code for free, just because he believed in the work.In 1993, he published the paper, ‘Detecting Double-Spending'. Solving the double-spending problem (ensuring the same money cannot be used twice) was, of course, the key problem with digital cash. It was what Satoshi was so excited about when he proposed Bitcoin. In 2004, Finney developed the ‘reusable proof-of-work' (RPOW) system, which coders regarded as a brilliant step forward – but his system never saw any economic use until b itcoin.Finney is one of the few people to have the background and expertise to have developed bitcoin – but he is also an obvious person to take an immediate interest.In his very first reply to Satoshi's announcement, he wrote:“As an amusing thought experiment, imagine that Bitcoin is successful and becomes the dominant payment system in use throughout the world. Then the total value of the currency should be equal to the total value of all the wealth in the world. Current estimates of total worldwide household wealth that I have found range from $100 trillion to $300 trillion. With 20 million coins, that gives each coin a value of about $10 million.”The comment shows extraordinary insight. Many now see this “amusing thought experiment” as inevitable. But could it also be somebody trying to get others excited? Very possibly.(By the way, ‘thought experiment' is an expression Satoshi himself uses – though it is not uncommon in coding circles).Of the many names touted as Satoshi, Finney's writing style is one of the few that match. The major difference is Satoshi used British spelling and Finney does not. There is a similar calm, understated tone, similar use of language, similar punctuation habits: two spaces after a full stop. In stylometrics tests carried out by John Noecker Jr., chief scientific officer at text analysis experts Juola & Associates, Finney consistently scored high. (However, veteran cypherpunk blogger, Nick Szabo, scored higher). Then I noticed both Finney and Satoshi had ‘@gmx.com' email addresses. (GMX is a free email provider based in Germany. Many Germans use GMX, while Americans and British tend to gravitate towards Gmail, Hotmail, or Yahoo. Today they would probably gravitate towards P rotonmail). Was this just coincidence – or was it a clue?Why did Satoshi disappear?In December 2010, Satoshi made his final post and then disappeared from the internet.Why?Perhaps to protect his anonymity in the face of rising interest from the media and, more significantly, the authorities: to protect his own safety as the WikiLeaks panic began to erupt. (After Wikileaks was shut out of the financial system, many began sending it bitcoin. The effect, ironically, was thus to make it an extraordinarily wealthy organisation).But there is also the possibility that he disappeared because he was ill.In 2009, Finney was diagnosed with Lou Gehrig's disease – amyotrophic lateral sclerosis – the same disease from which Stephen Hawking suffered. It is, for the most part, fatal and claims its victims within two to five years. ‘My symptoms were mild at first,' he says, ‘and I continued to work, but fatigue and voice problems forced me to retire in early 2011. Since then the disease has continued its inexorable progression.' Finney, eventually died in August 2014.In March 2013 he said, ‘Today, I am essentially paralyzed. I am fed through a tube, and my breathing is assisted through another tube. I operate the computer using a commercial eye-tracker system. It also has a speech synthesizer, so this is my voice now. I spend all day in my power wheelchair. I worked up an interface using an Arduino so that I can adjust my wheelchair's position using my eyes. It has been an adjustment, but my life is not too bad. I can still read, listen to music, and watch TV and movies. I recently discovered that I can even write code. It's very slow, probably 50 times slower than I was before. But I still love programming and it gives me goals.'Could a terrible illness be the reason Satoshi withdrew?Finney was one of the first to mine bitcoins. What did he do with them?I mined several blocks over the next days. But I turned it off because it made my computer run hot, and the fan noise bothered me. In retrospect, I wish I had kept it up longer, but on the other hand, I was extraordinarily lucky to be there at the beginning. It's one of those glass half full, half empty things.The next I heard of Bitcoin was late 2010, when I was surprised to find that it was not only still going, bitcoins actually had monetary value. I dusted off my old wallet, and was relieved to discover that my bitcoins were still there. As the price climbed up to real money, I transferred the coins into an offline wallet, where hopefully they'll be worth something to my heirs. Those discussions about inheriting your bitcoins are of more than academic interest. My bitcoins are stored in our safe deposit box, and my son and daughter are tech-savvy. I think they're safe enough. I'm comfortable with my legacy.Finney sold many of his bitcoins in order to pay for medical care, many at around $100. Satoshi never moved his.If you are buying gold to protect yourself in these uncertain times, I recommend The Pure Gold Company. Pricing is competitive, quality of service is high. They deliver to the UK, the US, Canada and Europe or you can store your gold with them. More here.We are all SatoshiFinney was a key player in the development of Bitcoin, no doubt. He was one of the first to ask real questions. He managed to understand from the start the inner workings of the Bitcoin protocol and its potential. He explored the weaknesses in the Bitcoin code – one of them is even named 'the Finney Attack'. He had many exchanges with Satoshi on the Bitcoin forums as they progressed the code and developed new versions. He asked question after question. But these very exchanges show there were two people talking. On January 10th, 2009, for example, Finney publicly complained to Satoshi that Bitcoin had crashed when he tried to receive a transaction. If it was his own code, and he was transacting with himself, he would surely have quietly fixed it himself.Moreover, coders all agree that Finney's coding style – and the style of the comments written in the code – is different from Satoshi's. Also, Finney preferred to code in the language C, whereas Bitcoin is coded in C++. This is something Finney himself confirms: 'I've done some changes to the Bitcoin code, and my style is completely different from Satoshi's. I program in C, which is compatible with C++, but I don't understand the tricks that Satoshi used.'Shortly before the publication of this book, the Forbes journalist Andy Greenberg published an interview with Hal Finney. Finney was now too ill to even speak – he could only raise his eyebrows to say yes. His son showed Greenberg fifteen email exchanges between Satoshi and Finney from January 2009. They mainly focused on bugs Finney had found in the code, to which Satoshi replied with fixes - and notes of thanks. Greenberg was also shown Finney's bitcoin wallet – with the transfers between Satoshi and Finney made back in 2009. As Greenberg notes, the wallet evidence and the Gmail timestamps in the emails would have been hard to forge. To cap it all, there is the fact that in 2009, at precisely the same moment Satoshi sent time-stamped e-mails, Finney, a keen runner, was photographed in the middle of a ten-mile race. Nobody, not even Satoshi Nakamoto, can be in two places at once.Bitcoin could not have happened without the work of Finney.If Satoshi Nakamoto was several people, Finney might have been one of them. But if Satoshi is an individual, Hal Finney was not him. This is an extract from my 2014 book, Bitcoin: the Future of Money? I hear the audiobook's excellent. ;)If you missed them (there were problems with the site midweek), check out my forecasts for 2025. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.theflyingfrisby.com/subscribe

The Flying Frisby
Why Hal Finney Is Not Satoshi Nakamoto

The Flying Frisby

Play Episode Listen Later Jan 12, 2025 18:18


ICYMI (there were problems with the site mid-week), check out my forecasts for 2025, always one of my more popular pieces of the year.He has invented an entirely new digital system of money with the potential to change the world as we know it. He has watched it grow to a market cap of over two trillion dollars, with as many as 100 million users worldwide, including actual nations, and the US President promising a strategic bitcoin reserve in his 2024 election campaign. He has half the internet nosing about and trying to figure out who he is. His own coins are worth about $100 billion, making him one of the richest people on earth.Yet he has managed to stay completely unknown and anonymous. It is almost unbelievable.Never mind Big Foot, the Mary Rose or the Loch Ness Monster, the mystery of ‘Who is Satoshi Nakamoto?' is perhaps the greatest mystery the world has ever known - or not known.There have been thousands of investigative attempts, articles, blog posts and discussion groups involving probably millions of man hours dedicated to pinning down this man, with names bandied about from Elon Musk to little known computer scientists. They have all failed. Satoshi's identity is as bulletproof as his code.For my 2014 book, Bitcoin: the Future of Money?, from which today's piece is taken, I ventured on the same doomed journey. I spent many months poring over the 80,000 words Satoshi wrote in the three years he was active online, looking for clues. What unusual words did he use? Does he make any spelling mistakes? Does he have any quirky grammatical habits? I analysed it in such detail I can tell you where he places brackets, how he uses hyphens, even how many spaces he uses after a full stop and how that changed – all in the hope of finding idiosyncrasies that appear in the writing of other Cypherpunks - clues which might lead me to him.Profiling a genius – some broad brushstrokes‘I've had the good fortune to know many brilliant people over the course of my life, so I recognize the signs.' Hal FinneySatoshi reached such high levels of expertise in so many different fields that many believe he can't possibly be one person. He is a polymath. It is not just the breadth and depth of his knowledge, but, more importantly, its specificity that makes him unique.In order to first conceive a new system of electronic cash, one would have to have thought extensively about the nature of money and its history. Money is a subject that has found more interest in the last few years with the emergence of bitcoin, the 2000s bull market in gold, the financial crisis and the growth of libertarianism, but, in 2007–8, when bitcoin was conceived and first introduced, books and academic papers on the subject were few and far between. The subject did not have broad appeal.How many of those who cared actually had the ability to design a system like this? It is one thing declaring what needs to be done; it is another putting it into practice.Satoshi must have had expertise in computer coding, mathematics, databases, accounting, peer-to-peer systems, digital ownership, law, smart contracts, cryptography and monetary history.He had to have had experience in academia. The act of submitting a white paper, its presentation, the impeccable referencing – it all denotes academia, even government.It's also easy to infer from the way bitcoin was launched that Satoshi had experience in open-source tech start-ups.The resilience of the code suggests he had computer hacking experience. Moreover, his ability to keep his identity hidden, despite the fact that half the internet is trying to figure out who he is, suggests significant practical experience in staying anonymous. It also means he has the trust of those who know him, if anyone did, to keep his secret.Then there's the matter of his prose. It is consistent and of such a high standard it seems he must have had experience as a writer – perhaps he was a blogger, an academic or an author. He was also quite humble and dismissive of his ability in this regard. ‘I'm better with code than with words', he said.It's clear from his posts that he had the awareness to see shortcomings in his system, and the patience not to try to do too much too quickly. He had the foresight to perceive problems before they arose and the meticulousness to prepare for them. He appears to have remained calm and measured in the face of difficulty, but also of his own success. He treated those two imposters just the same. Signs of arrogance are hard to find.Then there's the way that bitcoin was introduced to the world. PR, like economics, is not an exact science. Sometimes something gains traction, sometimes it doesn't – and there's no explaining why. Bitcoin has been a PR masterstroke. The coverage it has received has been enormous. It gets more publicity than gold, which is the oldest form of money there is. Satoshi cannot take all of the credit for this, but he has to take some of it. He understood when to make his ideas known, at what point to release his creation into the open-source world and he had the self-efacement to let go of it for others to develop. He promoted his idea with huge under-statement – but the scheduled creation of bitcoins meant there would be no shortage of bitcoin-holders to do the promoting for him.So we can add an understanding of both PR and psychology to his list of qualities. His knowledge of how people on the internet, in the open source world and in large institutions work, allowed him to progress his creation.Finally, he has a certain honesty. Despite Bitcoin's similarities to a pyramid or Ponzi scheme, he never pumped-and- dumped his creation. Tempting though it must have been, he never sold the bitcoins he mined. That also suggests he already had money.There are not many people like this.From mathematics to computer programming to economics and monetary history to politics to PR and psychology to cryptography to business acumen and vision to plain old written English – in all of these fields he excelled. To cap it all, he's probably good-looking too.It's early in history to be drawing this sort of comparison, I know, but there are many parallels between Satoshi and Isaac Newton. Newton was a brilliant scientist and mathematician, of course, and an alchemist. But he was also Master of the Royal Mint. He redesigned England's monetary system, putting us onto the gold standard on which Britain's colossal progress during the next 200 years was built.If you haven't already, take a look at my buddy Charlie Morris's monthly gold report, Atlas Pulse. It is, in my view, the best gold newsletter out there, and, best of all, it's free. Sign up here.First instinctMany believe that Satoshi was Hal Finney, the veteran programmer, who invented reusable proof of works, one of the models on which bitcoin was based. This was my first instinct. Often such “first instincts”, for reasons I cannot begin to explain, prove correct. When Satoshi first announced bitcoin on the cryptography mailing list, nobody replied. The message was ignored for two days. In the short-attention-span land of the web, two days is a long time to wait for some feedback on something you've spent 18 months working on. Two days is a long time to wait when you might have nailed something Cypherpunks had been dreaming about for 20 years.The first reply came from Finney. Was he replying to himself in order to generate some interest and discussion – to bump his thread? Replying to your own posts, known as ‘sock-puppeting', is not uncommon. Let us pursue this line of thinking a little further.Finney was born in 1956 – in that same two-year golden window as so many computer-scientist geniuses that would change the world (from Bill Gates to Tim Berners-Lee to Steve Jobs) were born – and spent his life working on cryptographic systems. He was number two to Phil Zimmerman, the pioneer in the field, for many years at the Pretty Good Privacy (PGP) Corporation, where they developed the most widely used email encryption software in the world.Such were his beliefs in privacy, freedom, and Cypherpunk, Finney was known to spend many nights writing and developing code for free, just because he believed in the work.In 1993, he published the paper, ‘Detecting Double-Spending'. Solving the double-spending problem (ensuring the same money cannot be used twice) was, of course, the key problem with digital cash. It was what Satoshi was so excited about when he proposed Bitcoin. In 2004, Finney developed the ‘reusable proof-of-work' (RPOW) system, which coders regarded as a brilliant step forward – but his system never saw any economic use until b itcoin.Finney is one of the few people to have the background and expertise to have developed bitcoin – but he is also an obvious person to take an immediate interest.In his very first reply to Satoshi's announcement, he wrote:“As an amusing thought experiment, imagine that Bitcoin is successful and becomes the dominant payment system in use throughout the world. Then the total value of the currency should be equal to the total value of all the wealth in the world. Current estimates of total worldwide household wealth that I have found range from $100 trillion to $300 trillion. With 20 million coins, that gives each coin a value of about $10 million.”The comment shows extraordinary insight. Many now see this “amusing thought experiment” as inevitable. But could it also be somebody trying to get others excited? Very possibly.(By the way, ‘thought experiment' is an expression Satoshi himself uses – though it is not uncommon in coding circles).Of the many names touted as Satoshi, Finney's writing style is one of the few that match. The major difference is Satoshi used British spelling and Finney does not. There is a similar calm, understated tone, similar use of language, similar punctuation habits: two spaces after a full stop. In stylometrics tests carried out by John Noecker Jr., chief scientific officer at text analysis experts Juola & Associates, Finney consistently scored high. (However, veteran cypherpunk blogger, Nick Szabo, scored higher). Then I noticed both Finney and Satoshi had ‘@gmx.com' email addresses. (GMX is a free email provider based in Germany. Many Germans use GMX, while Americans and British tend to gravitate towards Gmail, Hotmail, or Yahoo. Today they would probably gravitate towards P rotonmail). Was this just coincidence – or was it a clue?Why did Satoshi disappear?In December 2010, Satoshi made his final post and then disappeared from the internet.Why?Perhaps to protect his anonymity in the face of rising interest from the media and, more significantly, the authorities: to protect his own safety as the WikiLeaks panic began to erupt. (After Wikileaks was shut out of the financial system, many began sending it bitcoin. The effect, ironically, was thus to make it an extraordinarily wealthy organisation).But there is also the possibility that he disappeared because he was ill.In 2009, Finney was diagnosed with Lou Gehrig's disease – amyotrophic lateral sclerosis – the same disease from which Stephen Hawking suffered. It is, for the most part, fatal and claims its victims within two to five years. ‘My symptoms were mild at first,' he says, ‘and I continued to work, but fatigue and voice problems forced me to retire in early 2011. Since then the disease has continued its inexorable progression.' Finney, eventually died in August 2014.In March 2013 he said, ‘Today, I am essentially paralyzed. I am fed through a tube, and my breathing is assisted through another tube. I operate the computer using a commercial eye-tracker system. It also has a speech synthesizer, so this is my voice now. I spend all day in my power wheelchair. I worked up an interface using an Arduino so that I can adjust my wheelchair's position using my eyes. It has been an adjustment, but my life is not too bad. I can still read, listen to music, and watch TV and movies. I recently discovered that I can even write code. It's very slow, probably 50 times slower than I was before. But I still love programming and it gives me goals.'Could a terrible illness be the reason Satoshi withdrew?Finney was one of the first to mine bitcoins. What did he do with them?I mined several blocks over the next days. But I turned it off because it made my computer run hot, and the fan noise bothered me. In retrospect, I wish I had kept it up longer, but on the other hand, I was extraordinarily lucky to be there at the beginning. It's one of those glass half full, half empty things.The next I heard of Bitcoin was late 2010, when I was surprised to find that it was not only still going, bitcoins actually had monetary value. I dusted off my old wallet, and was relieved to discover that my bitcoins were still there. As the price climbed up to real money, I transferred the coins into an offline wallet, where hopefully they'll be worth something to my heirs. Those discussions about inheriting your bitcoins are of more than academic interest. My bitcoins are stored in our safe deposit box, and my son and daughter are tech-savvy. I think they're safe enough. I'm comfortable with my legacy.Finney sold many of his bitcoins in order to pay for medical care, many at around $100. Satoshi never moved his.If you are buying gold to protect yourself in these uncertain times, I recommend The Pure Gold Company. Pricing is competitive, quality of service is high. They deliver to the UK, the US, Canada and Europe or you can store your gold with them. More here.We are all SatoshiFinney was a key player in the development of Bitcoin, no doubt. He was one of the first to ask real questions. He managed to understand from the start the inner workings of the Bitcoin protocol and its potential. He explored the weaknesses in the Bitcoin code – one of them is even named 'the Finney Attack'. He had many exchanges with Satoshi on the Bitcoin forums as they progressed the code and developed new versions. He asked question after question. But these very exchanges show there were two people talking. On January 10th, 2009, for example, Finney publicly complained to Satoshi that Bitcoin had crashed when he tried to receive a transaction. If it was his own code, and he was transacting with himself, he would surely have quietly fixed it himself.Moreover, coders all agree that Finney's coding style – and the style of the comments written in the code – is different from Satoshi's. Also, Finney preferred to code in the language C, whereas Bitcoin is coded in C++. This is something Finney himself confirms: 'I've done some changes to the Bitcoin code, and my style is completely different from Satoshi's. I program in C, which is compatible with C++, but I don't understand the tricks that Satoshi used.'Shortly before the publication of this book, the Forbes journalist Andy Greenberg published an interview with Hal Finney. Finney was now too ill to even speak – he could only raise his eyebrows to say yes. His son showed Greenberg fifteen email exchanges between Satoshi and Finney from January 2009. They mainly focused on bugs Finney had found in the code, to which Satoshi replied with fixes - and notes of thanks. Greenberg was also shown Finney's bitcoin wallet – with the transfers between Satoshi and Finney made back in 2009. As Greenberg notes, the wallet evidence and the Gmail timestamps in the emails would have been hard to forge. To cap it all, there is the fact that in 2009, at precisely the same moment Satoshi sent time-stamped e-mails, Finney, a keen runner, was photographed in the middle of a ten-mile race. Nobody, not even Satoshi Nakamoto, can be in two places at once.Bitcoin could not have happened without the work of Finney.If Satoshi Nakamoto was several people, Finney might have been one of them. But if Satoshi is an individual, Hal Finney was not him. This is an extract from my 2014 book, Bitcoin: the Future of Money? I hear the audiobook's excellent. ;)If you missed them (there were problems with the site midweek), check out my forecasts for 2025. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.theflyingfrisby.com/subscribe

You Can’t Make This Up
BONUS | American Criminal: Crypto Criminals

You Can’t Make This Up

Play Episode Listen Later Jan 1, 2025 35:03


In the documentary, The Biggest Heist Ever, we learned about Heather “Razzlekhan” Morgan and Ilya “Dutch” Lichtenstein, who were accused of conspiring to launder $4.5 billion in stolen bitcoin. But this is just a peek into the world of crytpto criminals and the people who track them. Today we're bringing you a recent episode from our friends at American Criminal, where each week host Jeremy Schwartz takes you inside the minds of some of America's most notorious felons and outlaws. In this episode from the Sam Bankman-Fried series, he sits down with Wired senior writer Andy Greenberg to talk about the day that FTX collapsed and the wild world of crypto crime detectives. You can read more in Andy's book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. Listen to all four episodes of the 'Sam Bankman-Fried' series on American Criminal, wherever you get your podcasts.

ThinkEnergy
Cybersecurity and the energy sector, with Hydro Ottawa's Jojo Maalouf

ThinkEnergy

Play Episode Listen Later Nov 11, 2024 19:18


Our daily lives are more and more connected online. This includes our utility grids. Jojo Maalouf, Hydro Ottawa's Director of Cybersecurity and IT Infrastructure, joins thinkenergy to discuss the role of cybersecurity in the energy sector. From cybersecurity threats, like cyber warfare and ransom-seeking hacktivists, to the measures required to defend our energy systems. Plus, how AI both helps and complicates matters. Listen in to learn what's driving change and the collaboration needed to protect the grid. Related links Ontario Cybersecurity Framework: https://www.oeb.ca/regulatory-rules-and-documents/rules-codes-and-requirements/ontario-cyber-security  Get Cyber Safe resources: https://www.getcybersafe.gc.ca/en  Jojo Maalouf on LinkedIn: https://www.linkedin.com/in/jojo-maalouf-cism-cissp-0546b03/  Trevor Freeman on LinkedIn: https://www.linkedin.com/in/trevor-freeman-p-eng-cem-leed-ap-8b612114/  Hydro Ottawa: https://hydroottawa.com/en  To subscribe using Apple Podcasts:  https://podcasts.apple.com/us/podcast/thinkenergy/id1465129405 To subscribe using Spotify: https://open.spotify.com/show/7wFz7rdR8Gq3f2WOafjxpl To subscribe on Libsyn: http://thinkenergy.libsyn.com/ Subscribe so you don't miss a video: https://www.youtube.com/user/hydroottawalimited Follow along on Instagram: https://www.instagram.com/hydroottawa Stay in the know on Facebook: https://www.facebook.com/HydroOttawa Keep up with the posts on X: https://twitter.com/thinkenergypod   Transcript:   Trevor Freeman  00:07   Welcome to think energy, a podcast that dives into the fast, changing world of energy through conversations with industry leaders, innovators and people on the front lines of the energy transition. Join me, Trevor Freeman, as I explore the traditional, unconventional and up and coming facets of the energy industry. If you have any thoughts, feedback or ideas for topics we should cover, please reach out to us at thinkenergy@hydrottawa.com Hi everyone, welcome back. It won't be a surprise to anyone listening that our energy systems, like much of the rest of our lives, are becoming more and more connected and more online than ever before. Let's just take a look at our own personal lives. We've got apps that can control multiple aspects of our homes. For example, for my phone, I can adjust temperature, set points and fan speed heating and cooling in my house, I can turn on or off lights, both inside and outside. I can look and see who just rang my doorbell, even if I'm in another city, and I can check and see where my vehicle is, whether it's charging or not. And I can even turn it on all from my phone. And I would consider myself like middle of the road in terms of how connected and online I am. There are even further examples of this in some of those ultra-connected homes. This is part of our fast paced and constant evolution towards invenience and using technology to find solutions to problems that we didn't always know existed, and maybe they didn't actually exist. We've all heard that term, the Internet of Things, referring to this ultra-connected world where it's not just people talking over the internet, but our devices and systems are talking as well. I was absolutely floored when I was doing some research on this podcast to find out that this term, the Internet of Things, was first used 25 years ago, in 1999 when I first wrote the text for this. I put a placeholder in to say, oh, it's been around for over 10 years. And then when I actually did my research, it's over 25 years. Think about how far we've come since that idea was thought of in 1999 how different life is today than 1999 our energy systems and our utility grids are undergoing a similar transition. I talked about this a little bit with Hydro Ottawa's Jenna Gillis in a previous episode about grid modernization. So go back and have a listen to that. If you haven't already, we are adding more and more data points to our grids, and that includes sensors, smart switches, fault detectors, smarter meters, etc., etc. Even for hydro Ottawa, a local distribution company with around 350,000 customers, we are talking about many times that number of smart devices in the coming years, all connected, all trading data between themselves and our central systems and the smart folks who run them now, there is a ton of upside to this transition, and that's why we're doing it. More data leads to better decision making, a better view of what's happening, whether that's during an outage or at times when the grid is heavily utilized. It lets us get more out of the equipment we have, react and adjust to the needs of our customers, and react and adjust to the needs of the grid. It will lead to faster restoration during outages, and sometimes that restoration will be automatic without having to roll a truck. It will allow us to better integrate distributed energy resources like small scale solar and storage and other things into our grid for the benefit of our customers and the grid. There is no question that this is a move in the right direction, and hydro Ottawa is leaning into this aspect of the energy transition to build a smarter grid for our customers. However, it does highlight something that has long been a priority for us, cyber security. With so many connected devices, with so much data out there, we need to be extremely vigilant and rigorous with our digital security. Cyber-attacks on utility infrastructure are not theoretical. In 2015 and 2016 attacks on the Ukrainian power grid resulted in large scale power outages in that country, as we increasingly rely on electricity for so many aspects of our lives, attacks like this, whether by nation states or bad actors seeking financial gain, can have devastating consequences. Luckily, this is something that has been a priority for us for many years, and as the threats become more sophisticated, so too do our strategies to protect our systems and our grid from those attacks. Joining me today to talk about this is Hydro Ottawa's director of cybersecurity and IT infrastructure. Jojo Maalouf, JoJo, welcome to the show.   Jojo Maalouf  04:46   Thanks for having me.   Trevor Freeman  04:47   All right, so Jojo, cyber security is a little bit of a buzzword that a lot of folks have probably heard in a bunch of different contexts. Help us unpack it a little bit. What do we actually mean when we talk about cybersecurity threats and cybersecurity prevention, I guess?   Jojo Maalouf  05:05   Very good question, right? So, I mean, let's kind of simplify things, so we obviously have these adversaries, right? And these adversaries are trying to get into organizations networks. We hear a lot of the sensitivity or the criticality of information, so they're trying to obtain that information. And, you know, can they look at potentially monetizing that? Really what we're kind of trying to do, or what cyber security is, is, if you think about it, we have these bad guys, these adversaries. They're trying to get into organizations they possess or introduce some sort of level of risk. What we are trying to do as people in cyber security is defend those organizations from those risks and those adversaries. So, in order for us to do that, we need to put together a program. We need to make sure we have the relevant controls in place, because, at the end of the day, what we're trying to do is mitigate that risk to an acceptable level where the business can run.   Trevor Freeman  06:07   Yeah, totally. And who are these threats coming from? Like, we hear a lot about state sponsored groups for profit, hackers. There's sort of that hacktivists, kind of ideologically driven group. Who are we worried about in the in the energy industry?   Jojo Maalouf  06:20   You know, it's very good question. I think, to be honest, you, I think we worry about all of them. I think from from our perspective, threats are threats. And obviously, depending on the magnitude of those threats and where they're coming from, they could potentially possess or introduce a different type of risk. But the reality is, they all introduce a level of risk. Yes, we are worried about state sponsored entities. You know, we've seen what's happened throughout the years. It started out in Stuxnet with Iran in 2010 we've seen what's happened with Ukraine in 2015 the end of day, what are we trying to protect? We're trying to ensure that a cyber-attack doesn't actually impact our ability to deliver power to our customers. What we are seeing now in the industry, obviously, is that adversaries are understanding that they can really monetize this, right? So, we're seeing the exponential growth of ransomware throughout the years. I remember back in 2016 when a major Canadian university was asked to pay a think approximately a $35,000 ransomware. Where we looked at that in comparison in 2024 where the average cost of a ransomware attack is just under $5 million. So, it's a billion dollar industry, right? And it's only growing. You know, I'd say the threats are coming everywhere, but you're definitely seeing the monetization aspect of it growing exponentially.   Trevor Freeman  07:51   Yeah. So, I guess from our perspective, it really doesn't matter what the motivation is. If someone's getting into our systems and sort of impacting our ability to do what we do doesn't matter what the motivation is. It's a problem for us, and we try and guard against it.   Jojo Maalouf  08:05   Correct. I think, I think people are very highly motivated now, whether it's for it's ransomware, whether it's state sponsored, I think entities, or I would say adversary, sorry, are definitely highly motivated. And it doesn't really change our approach. So, you know, the energy sector needs to make sure that they do what they can to protect the systems.   Trevor Freeman  08:23   Yeah, fair enough. So, we've talked in the past on the show, and in my intro, I talked about grid modernization, and this sort of evolution of our grid, and the technology on our grid to have more and more connected devices out in the field, and the amount of data that's flowing on our grid is increasing. Obviously, there are many benefits to this, but inherently that brings a degree of risk as well. Can you talk to us about the risk that their grid modernization brings, and sort of how we're thinking about that?   Jojo Maalouf  08:58   So, Trevor, I think you said it well when you said more and more devices are connected now. So really, what ends up happening every time we add a device that's connected, it increases the organization's risk profile. So ideally, what we want to be able to do is we want to manage exactly what that those entry points into potential organizations are. So, every time I add a device, I have to think that it increases that attack surface to a degree. So, I mean, you've talked about what grid modernization can do. There are many capabilities I think that's going to benefit organizations. But I think as this happens, we need to ensure that cybersecurity risks are managed to ensure that that risk profile is managed to an appropriate level.   Trevor Freeman  09:48   How prepared is the energy industry to respond to and to recover from a major cyber-attack, if one were to happen on the power grid?   Jojo Maalouf  09:57   Honestly, I think that the energy sector as well. Prepared as a critical infrastructure entity, the energy sector has the benefit of dealing a lot with government partners. So, I think what you want to do as an organization is you want to build that trust, that ecosystem of partners, whether it is through public and private relationships. But I'd say from a critical infrastructure perspective, there are very good relationships with the industry, very good relationships with government partners. I think testing organizations resiliency has been in play now for many, many years. But I think from a cyber perspective, I think it's something where organizations continue to be prepared, continue to do some of the appropriate testing, you know? And I'll be honest, I say it's, it's, you never want to be complacent, right? And I think what we've learned over the years is threats are evolving. Threats are changing. The industry is always going to be susceptible to attacks.   Trevor Freeman  11:00   Are we collaborating and working with other stakeholders? I mean, both at the sort of other utility level, you mentioned, governments and regulatory bodies, are we collaborating with those other entities? And sort of in line when it comes to cybersecurity?   Jojo Maalouf  11:15   There is a lot of collaboration that occurs within the industry, whether it's in Ontario, you'll see now that the regulator, the Ontario Energy Board, you know, there is the Ontario cybersecurity framework that has been in play now since around 2018 even at the national level there. Here are many different bodies where, you know cybersecurity, like critical infrastructure protection is paramount, as discussed regularly, and then obviously there's the government agency. So, there's a lot of collaboration that goes whether it's from the provincial, the National, and then the government side as well. And I mean, I think you need those relationships, right? You need those partnerships to help.   Trevor Freeman  12:02   Yeah, we're not we're not a lone utility kind of figuring out on our own. We're working with our partners and our peers to figure that out. The other kind of area of emerging technology that I want to talk about is, AI, artificial intelligence and sort of machine learning. Are we using those technologies? Or do you see us using those technologies in the future to sort of enhance the cyber security of our grid and our assets?   Jojo Maalouf  12:29   Yeah, I mean, I think obviously artificial intelligence, machine learning, seems to be the 2024 theme. The reality is, is a lot of technologies have already adopted, whether it's AI or machine learning, into their into their solutions. You know, I think the whole Gen AI aspect is growing, and it's something that I think is going to benefit everybody in the industry as well. The unfortunate thing is, is that I think adversaries are going to be able to use these technologies as well. You know, whether it's to paint a better picture of an organization, maybe to customize some attack patterns, but I think it's something where we have to embrace the technology. We have to use it in our, I would say, in our toolkit, but we're very much cognizant of the fact is that adversaries are going to be using these, these tool sets as well to potentially target organizations within the energy sector.   Trevor Freeman  13:33   And are there specific things that you know, speaking as the local distribution company, specific things that our customers can do or should be aware of? What's the role of our customer when it comes to cybersecurity?   Jojo Maalouf  13:46   It's a very good question. I mean, from a from a customer's perspective, I think customers need to realize the importance of their information. So, I mean, the reality now is a lot of adversaries are targeting people directly because they want their information. Their information. Their information is valuable. So, I think as a customer, what they want to make sure they do is that they do what they can to protect their information. So, some very simple steps that they can do make sure you have a complex password that only you know, that's not easily guessable. The other thing is, you don't want to use that password across multiple systems. So, what's the best way for you to be able to manage all your passwords? Invest in a password manager. There are free solutions out there. There are other really good solutions that are at a fraction of a cost as well as that password. What you want to make sure you do is you have multi factor authentication attached to it. What that really means is it's a second level of authentication that's going to challenge you to make sure you are who you say you are. It could just be an application that's installed on your phone. Think those are really some really good ways that you know a customer can use to protect themselves. I think even investing in credit monitoring is really good because. Is the last thing you want to do is an adversary to target you, steal your information, then all of a sudden, are starting to open up accounts in your name, right? So credit monitoring is another really important one. So, I mean, I think those are some really basic ones, but I think that they can go a long way to protecting a customer from threats. There are some really good online resources that they can use. Public Safety Canada has their get cyber safe website that provides a lot of information for, you know, everyday residential people or customers, sorry, steps that they can take to protect themselves.   Trevor Freeman  15:33   And for our listeners that kind of are thinking like, Oh, I feel like I've heard that before. I think you're right. You have it is those basic steps that really can protect us. And just so that everybody knows this is a focus of us internally as well, all employees of Hydro Ottawa also have a focus on what can we as employees do in order to make sure we're protecting our systems, we're protecting our data, and all the things that JoJo mentioned when it comes to password integrity, conscious of protecting our data. We're focused on that on a day-to-day basis as well. Jojo, thanks very much for taking the time to talk us through this. It's something that is maybe a bit adjacent to the energy transition, but so important as we increasingly digitize our grid, digitize our systems, as I mentioned, add more data points. We can't sort of leave cybersecurity behind. So, I really appreciate you taking the time to join us today, as our listeners know, and as you know, we always end our interviews with a series of questions to our guests. So I will jump right into those. Jojo, what's a book that you've read that you think everybody should read?   Jojo Maalouf 16:39   Yeah, good question. I'll give you two books, especially within the context of cybersecurity. You know, we did briefly mention Stuxnet. A really good book is by Kim Zetter. It's called Zero Day, and it basically depicts what happened with Stuxnet. Really informative. It's actually really good read. It's not necessarily technical, but just goes to show kind of how cyber warfare was actually built. Another really good one is from Andy Greenberg. It's called sandworm, a new era of cyber war in the hunt for the Kremlin's most dangerous hackers. Another really good read as well. So, I think those are two books, I would say, in the cybersecurity context, that I think are really good reads.   Trevor Freeman  17:29   Nice. Same question. But for a movie or a show, is there a movie or show that you think everyone should have a look at?   Jojo Maalouf  17:36   I'm actually really into Yellowstone these days, right? So, I'm gonna give that props.   Trevor Freeman  17:41   Nice. That's a good one. If someone offered you a free round-trip flight anywhere in the world, where would you go?   Jojo Maalouf  17:48   Good question, I think right now where I am, I'd probably go anywhere, either in the Alps or in the Dolomites, to ski.   Trevor Freeman  17:56   That's awesome. And our last question, what is something about the energy sector or its future that you are particularly excited about?   Jojo Maalouf  18:04   To be honest with you, I What really interests me and what I'm really excited about is, think the evolution in change into we are now a technology company, And I think what we're where the energy sector is grow is, is moving towards, is really exciting. You know, I think over the years, it's been a very siloed approach to the way services are driven or given where I find now, its very technology focused, right? And I think that's very exciting times.   Trevor Freeman  18:39   Very cool. Well, JoJo, I really appreciate your time today, and you sharing your insight with us, and thanks for coming on the show.   Jojo Maalouf  18:46   Thank you, Trevor, it's great being here.   Trevor Freeman  18:50   Thanks for tuning in to another episode of The think energy podcast. Don't forget to subscribe wherever you listen to podcasts, and it would be great if you could leave us a review. It really helps to spread the word. As always, we would love to hear from you, whether it's feedback comments or an idea for a show or a guest. You can always reach us at think energy@Hydroottawa.com.  

GOTO - Today, Tomorrow and the Future
Coding the Future: Inside GOTO Chicago 2024

GOTO - Today, Tomorrow and the Future

Play Episode Listen Later Oct 1, 2024 14:01 Transcription Available


GOTO Chicago, running from October 21st to 23rd at Convene Willis Tower, will host an exciting range of talks and workshops designed for developers, architects, and tech leaders. Highlights include Ryan Dahl on the future of JavaScript with Deno 2, Andy Greenberg exploring the dark side of cryptocurrency in "Tracers in the Dark," and Dave Taht sharing groundbreaking insights into reducing internet latency. The conference covers AI, cloud-native architectures, security, and much more, including lightning talks that provide quick, impactful insights across a variety of tech topics.This podcast is AI-generated as part of an experimental format, offering a fresh, innovative way to explore conference content.GOTO Chicago 2024:https://gotochgo.com/2024Speakers: https://gotochgo.com/2024/speakers Newsletter: https://blog.gotocon.com/newsletterTwitterInstagramLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!

Endless Thread
A Reasonable Expectation of Privacy

Endless Thread

Play Episode Listen Later Sep 13, 2024 33:47


When the founder of the messaging and social media app Telegram, Pavel Durov, was arrested in France, it exposed something: many of Telegram's millions of users believe the app is much more secure than it actually is. Some of those people use the app for crime; others to communicate about sensitive political topics in war zones. Media outlets (including, we must admit, Endless Thread) have often described Telegram as an encrypted app, but that's not quite right. Telegram, and who knows who else, can access most of what's said and shared on the platform. There are crucial differences between apps like Telegram, and other services known for encryption, including WhatsApp and Signal, and many people using the apps don't understand the differences. Do we need to? Wired's Andy Greenberg, Natalia Krapiva at Access Now, and  Matthew Green, a professor at Johns Hopkins, say absolutely. This week, we look at the anarchist, googler, and billionaire moguls behind the tech that millions of people around the world use for basic communication. And we imagine what it looks like when an app actually protects your conversations from prying eyes? We also ask: why should you care, even if you think you have nothing to hide? Show notes: "What is Telegram and why was its CEO arrested in Paris?" (The Associated Press) "Is Telegram really an encrypted messaging app?" (A Few Thoughts on Cryptography Engineering) "Signal is more than encrypted messaging. Under Meredith Whittaker, it's out to prove surveillance capitalism wrong." (Wired) "Eugene from Ukraine." (Endless Thread) Credits: This episode was produced by Grace Tatter. Mix and sound design by Emily Jankowski. It was written and hosted by Ben Brock Johnson.

Gadget Lab: Weekly Tech News
Seriously, Use Encrypted Messaging

Gadget Lab: Weekly Tech News

Play Episode Listen Later Sep 5, 2024 36:53


Encrypted messaging is a godsend for mobile communications, whether you're just sending standard texts to your friends that you want kept private, or engaging in interactions that are better kept secret for safety reasons. Apps like Signal and Telegram offer users the ability to trade messages that can be read by only the sender and the receiver. Of course, people can also use that privacy as a way to conduct unsavory dealings without having to worry about their communications getting exposed.Encrypted messaging has been in the news for the past couple weeks, largely because of the arrest of Telegram CEO Pavel Durov, who is being accused by the French government of failing to comply with law enforcements' demands to help catch some people who are using the app for criminal activity. Durov's arrest also casts a light on the rising profile of Signal, a fully encrypted messaging app that's always taken a stance against the collection of its users' data.This week on Gadget Lab, WIRED security writer Andy Greenberg joins us to talk about how encrypted messaging works, what can go wrong, and how while Telegram and Signal may seem similar, the ways they operate are different—and might affect what makes them liable for what users share on its platforms.Show Notes:Read Andy's interview with Signal president Meredith Whittaker. Read Lily Hay Newman and Morgan Meeker's reporting on the arrest of Telegram's founder and its broader criminal investigations. Follow all of WIRED's coverage of Signal and Telegram.Recommendations:Andy recommends the memoir My Glorious Defeats: Hacktivist, Narcissist, Anonymous by Barrett Brown. Mike recommends taking a ride in a Waymo, just to get an idea of the future of driverless cars that is coming. Lauren recommends The Ringer's story about the new baseball team, the Oakland Ballers.Andy Greenberg can be found on social media @agreenberg.bsky.social. Lauren Goode is @LaurenGoode. Michael Calore is @snackfight@heads.social. Bling the main hotline at @GadgetLab. The show is produced by Boone Ashworth (@booneashworth). Our theme music is by Solar Keys.

Deadhead Cannabis Show
The Dead Rock Madison, 1983. Larry and Harold go on tour.

Deadhead Cannabis Show

Play Episode Listen Later Jun 25, 2024 71:41


From Shakedown Street to Hackney Diamonds: Music Memories and NewsLarry Michigan reminisces about a Grateful Dead concert he attended on June 24, 1983, at the Dane County Coliseum in Madison, Wisconsin.  Larry describes the memorable experience of seeing the Grateful Dead open with "Shakedown Street" for the first time. He recounts his journey to the concert with friends, highlighting the traffic challenges and the camaraderie of the trip. The concert, his fifth Grateful Dead show, featured a mix of classic songs like "Candyman," "Brown Eyed Women," "Mama Tried," "Mexicali Blues," and a powerful rendition of "Deal."He discusses the significance of the venue and the special atmosphere of the show, emphasizing how it was a formative experience in his journey as a Deadhead. Larry also touches on the setlist, praising the band's performance and the vibrant energy of the concert.Transitioning to music news, Larry talks about the enduring legacy of the Rolling Stones. He mentions their recent album, "Hackney Diamonds," and shares highlights from their concert in Denver. The setlist included iconic songs such as "Start Me Up," "Gimme Shelter," and "Sympathy for the Devil." Larry admires the band's ability to continue performing at a high level and appreciates their collaboration with other music legends like Paul McCartney and Stevie Wonder.Larry also announces upcoming events, including Bob Weir's collaboration with String Cheese Incident at the Suwannee Hulaween festival and the new Jerry Garcia Band live album release, "Garcia Live Volume 21."  Grateful DeadJune 24, 1983Dane County ColiseumMadison, WIGrateful Dead Live at Dane County Coliseum on 1983-06-24 : Free Download, Borrow, and Streaming : Internet Archive My first time “on tour”.  Went with my good buddy H to this show, then on to St. Paul and then to Chicago for the final two shows of the tour at Poplar Creek Theater (RIP).  We were joined by a strong Ann Arbor based collection of friends and fellow Deadheads including Big Steve, not that Big Steve, our Big Steve from Ann Arbor by way of Hyde Park in Chicago and now a Boston guy, Andy Gaudin of blessed memory, Tommy Marks (younger brother of the Weasel) and many other “locals” we knew in each city. This show was a Friday night and many of us were driving to Madison from the Chicago area which meant battling heavy traffic getting out of Chicago, battling heavy traffic driving up  to Wisconsin with everyone else from Chicago headed to Wisconsin summer homes for the weekend, battling traffic driving through Milwaukee and making our way through Madison upon arrival without knowing exactly where we were going.  And by the way, no Waze to fall back on and no cell phone to call for directions.  Luckily, we were riding with Big Steve, perhaps one of the finest long distance drivers I have ever known.  When we hit Madison, we had to find our buddy Dr. Z (back then just known as Z because the doctorate thing happened latter ).  We arrive at his place to learn that he was in a bike accident, is all banged up, needed some quick med treatment and a bite to eat and then back to his place for whatever reason I do not remember.  The clock is ticking closer and closer to showtime and Z is assuring us we have nothing but time. This was to be my fifth show ever and I still was kind of just along for the ride with the more experienced veterans.  H was like me, new to the game but always looking for a chance to go on a party themed roadtrip.  But even I was starting to get nervous.  After what seemed line forever, we made our way to the show, dropped, there was no line to get in, showed our tickets and walked in to a half empty arena with the floor not even half filled.  And just as we walked in, the lights go out, the Dead the stage and this happened: INTRO:                                 Shakedown Street                                                Track #1                                                0:00 – 1:36  SHOW No. 1:                    Deal                                                Track #10                                                7:30 – 9:05  SHOW No. 2:                    Help On The Way                                                Track #12                                                0:00 – 1:41  SHOW No. 3:                    Lost Sailor  > St. of Circumstance                                                Track #15  7:15 – end  INTO                                                Track #16   0:00 – 0:57  SHOW No. 4:                    Truckin                                                Track #18                                                6:40 – 8:20  OUTRO:                               Morning Dew                                                Track #19                                                10:58 – 13:33 (I know, it's a very long clip, but it is an amazing Garcia solo supported by Brent.  Can't cut it!)  The Around and Around > Johnny B. Goode >Don't Ease Me In that followed was almost perfunctory.  The Dew and that jam was a true closer.  Stumbled out, bounced around town, wound up at a different buddy's house, played soccer out on the street until 3 or 4 a.m., tried to sleep (not happening), Z rousted us out of bed the next morning for breakfast at the legendary Cleveland Diner and then back in the car for the drive to the Twin Cities and a show that night (good friend Andy Greenberg's first show), followed by a day off to drive back to Chicago, pop up birthday Sunday night for H at his parents' house, and then have the two night run at Poplar Creek.  Four great shows in five nights.  Too much fun.  .Produced by PodConx Deadhead Cannabis Show - https://podconx.com/podcasts/deadhead-cannabis-showLarry Mishkin - https://podconx.com/guests/larry-mishkinRob Hunt - https://podconx.com/guests/rob-huntJay Blakesberg - https://podconx.com/guests/jay-blakesbergSound Designed by Jamie Humiston - https://www.linkedin.com/in/jamie-humiston-91718b1b3/Recorded on Squadcast

Undermine
Under the Scales: Runaway Gin (Re-Release)

Undermine

Play Episode Listen Later Jun 24, 2024 50:47


RJ and I talk to Andy Greenberg, guitarist for Phish cover-band Runaway Gin. Originally released in 2017. Please support our work by visiting OsirisPod.com/Premium.

Bitcoin Audible
Read_828 - Orange Pilling Has Stopped Working

Bitcoin Audible

Play Episode Listen Later Jun 10, 2024 52:46


"Educating the world about bitcoin has succeeded in building a community of knowledgeable, dedicated, enthusiastic people from the fields of tech, economics, politics, and finance, but orange pilling has taken us as far as it can. Like many strategies, the marginal gains of educating the world were remarkable in the early stages, but they’ve flattened... Orange pilling has stopped working." - Roy Sheinfeld Has Bitcoin's "orange-pilling" strategy reached its limits? Explore why traditional methods of educating the masses about Bitcoin are losing steam and discover the new approaches needed to drive adoption in a changing landscape. Join us as we delve into the future of Bitcoin adoption and the role of technology in creating real-world utility. Check out the original article at Orange Pilling Has Stopped Working. (Link: https://tinyurl.com/4wvr9j37) Links to check out Breez SDK (Link: https://breez.technology/sdk/) Arc Labs (Link: https://www.arclabs.co/) Host Links ⁠Guy on Nostr ⁠(Link: http://tinyurl.com/2xc96ney) ⁠Guy on X ⁠(Link: https://twitter.com/theguyswann) Guy on Instagram (Link: https://www.instagram.com/theguyswann) Guy on TikTok (Link: https://www.tiktok.com/@theguyswann) Guy on YouTube (Link: https://www.youtube.com/@theguyswann) ⁠Bitcoin Audible on X⁠ (Link: https://twitter.com/BitcoinAudible) The Guy Swann Network Broadcast Room on Keet (Link: https://tinyurl.com/3na6v839) Check out our awesome sponsors! Get ⁠10% off the COLDCARD⁠ with code BITCOINAUDIBLE ⁠⁠⁠⁠⁠⁠(Link: bitcoinaudible.com/coldcard⁠⁠⁠⁠⁠⁠) Swan⁠: The best way to buy, learn, and earn #Bitcoin (Link: https://swanbitcoin.com) “We don’t yet know the names of the architects who will build the next upgrade to the secret-killing machine. But we’ll know them by their work” -Andy Greenberg

The CyberWire
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]

The CyberWire

Play Episode Listen Later May 6, 2024 18:21


Rick Howard, N2K's CSO and The Cyberwire's Chief Analyst and Senior Fellow, interviews Andy Greenberg about his 2024 Cybersecurity Canon Hall of Fame book: “Tracers in the Dark.” References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Larry Pesce, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. Rick Howard, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. Ben Rothke, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. TheScriptVEVO, 2012. The Script - Hall of Fame (Official Video) ft. will.i.am [Music Video]. YouTube. Satoshi Nakamoto, 2008. Bitcoin: A Peer-to-Peer Electronic Cash System [Historic and Important Paper]. Bitcoin. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. RSA Presentation:  May. 9, 2024 | 9:40 AM - 10:30 AM PT Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference.

CSO Perspectives (public)
Bonus Episode: 2024 Cybersecurity Canon Hall of Fame Inductee: Tracers in the Dark by Andy Greenberg. [CSOP]

CSO Perspectives (public)

Play Episode Listen Later May 6, 2024 18:21


Rick Howard, N2K's CSO and The Cyberwire's Chief Analyst and Senior Fellow, interviews Andy Greenberg about his 2024 Cybersecurity Canon Hall of Fame book: “Tracers in the Dark.” References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Larry Pesce, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. Rick Howard, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. Ben Rothke, 2024. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book Review]. Cybersecurity Canon Project. TheScriptVEVO, 2012. The Script - Hall of Fame (Official Video) ft. will.i.am [Music Video]. YouTube. Satoshi Nakamoto, 2008. Bitcoin: A Peer-to-Peer Electronic Cash System [Historic and Important Paper]. Bitcoin. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. RSA Presentation:  May. 9, 2024 | 9:40 AM - 10:30 AM PT Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

Paul's Security Weekly

Play Episode Listen Later Apr 11, 2024 102:25


In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work? - I know the title makes this blog post sound rather basic, but it will get you up to speed on all the latest DDoS types, actors, and terminology pretty quickly! What is An Application-Layer DDoS Attack, and How Do I Defend Against Them? 2023 DDoS Statistics and Trends https://en.wikipedia.org/wiki/Killnet This week, Tyler and Adrian discuss Cyera's $300M Series C, which lands them a $1.4B valuation! But is that still a unicorn? Aileen Lee of Cowboy Ventures, who coined the term back in 2013, recently wrote a piece celebrating the 10th anniversary of the term, and revisiting what it means. We HIGHLY recommend checking it out: https://www.cowboy.vc/news/welcome-back-to-the-unicorn-club-10-years-later They discuss a few other companies that have raised funding or just come out of stealth, including Scrut Automation, Allure Security, TrojAI, Knostic, Prompt Armor. They discuss Eclipsium's binary analysis tooling, and what the future of fully automated security analysis could look like. Wiz acquired Gem, and Veracode acquired Longbow. Adrian LOVES Longbow's website, BTW. They discuss a number of essays, some of which are a must read: Daniel Miessler's Efficient Security Principle Subsalt's series on data privacy challenges Lucky vs Repeatable, a must-read from Morgan Housel AI has Flown the Coop, the latest from our absent co-host, Katie Teitler-Santullo Customer love by Ross Haleliuk and Rami McCarthy We briefly cover some other fun - reverse typosquatting, AI models with built-in RCE, and Microsoft having YET ANOTHER breach. We wrap up discussing Air Canada's short-lived AI-powered support chatbot. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-357

Enterprise Security Weekly (Audio)
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 11, 2024 102:25


In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work? - I know the title makes this blog post sound rather basic, but it will get you up to speed on all the latest DDoS types, actors, and terminology pretty quickly! What is An Application-Layer DDoS Attack, and How Do I Defend Against Them? 2023 DDoS Statistics and Trends https://en.wikipedia.org/wiki/Killnet This week, Tyler and Adrian discuss Cyera's $300M Series C, which lands them a $1.4B valuation! But is that still a unicorn? Aileen Lee of Cowboy Ventures, who coined the term back in 2013, recently wrote a piece celebrating the 10th anniversary of the term, and revisiting what it means. We HIGHLY recommend checking it out: https://www.cowboy.vc/news/welcome-back-to-the-unicorn-club-10-years-later They discuss a few other companies that have raised funding or just come out of stealth, including Scrut Automation, Allure Security, TrojAI, Knostic, Prompt Armor. They discuss Eclipsium's binary analysis tooling, and what the future of fully automated security analysis could look like. Wiz acquired Gem, and Veracode acquired Longbow. Adrian LOVES Longbow's website, BTW. They discuss a number of essays, some of which are a must read: Daniel Miessler's Efficient Security Principle Subsalt's series on data privacy challenges Lucky vs Repeatable, a must-read from Morgan Housel AI has Flown the Coop, the latest from our absent co-host, Katie Teitler-Santullo Customer love by Ross Haleliuk and Rami McCarthy We briefly cover some other fun - reverse typosquatting, AI models with built-in RCE, and Microsoft having YET ANOTHER breach. We wrap up discussing Air Canada's short-lived AI-powered support chatbot. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-357

Paul's Security Weekly TV
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

Paul's Security Weekly TV

Play Episode Listen Later Apr 11, 2024 36:15


In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work?

Enterprise Security Weekly (Video)
Understanding KillNet and Recent Waves of DDoS Attacks - Michael Smith - ESW #357

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 11, 2024 36:15


In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more common and varied tool of cybercriminals than ever. Today, Michael Smith is going to catch us up on the state of DDoS attacks in 2024, and we'll focus particularly on one cybercrime actor, KillNet. Segment Resources: Understanding DDoS Attacks: What is a DDoS Attack and How Does it Work?

Gadget Lab: Weekly Tech News
DOJ Calls Out Apple in the Group Chat

Gadget Lab: Weekly Tech News

Play Episode Listen Later Mar 28, 2024 29:14


Apple has gotten used to being a favorite target of rivals and government agencies. The company has been repeatedly scrutinized by regulators, and other tech companies have accused the company of anticompetitive practices. Apple's most recent legal challenge is a doozy: an antitrust lawsuit filed by the US Department of Justice and more than a dozen state attorneys general. The suit takes aim at the security and privacy features offered only on the iPhone, and accuses Apple of using that exclusivity to lock consumers into its ecosystem. At the center of the suit is the lack of true cross-platform encryption on Apple's messaging platform—the green bubble-blue bubble divide—which the government alleges harms consumers by leaving them more vulnerable to attacks.This week on Gadget Lab, we talk with WIRED senior security editor Andrew Couts about the encryption and privacy issues behind the DOJ's suit against Apple, and how the dreaded green bubbles on iMessage factor in.Show Notes:Read Andrew and Andy Greenberg's WIRED story about how the DOJ is targeting Apple's iMessage encryption. Read Lauren's story about how the antitrust case is all about the green bubbles, really.Recommendations:Andrew recommends profumo del chianti sea salt. Lauren recommends the book Tomorrow, and Tomorrow, and Tomorrow by Gabrielle Zevin. Mike recommends going to the Big Ears music festival next year.Andrew Couts can be found on social media @AndrewCouts. Lauren Goode is @LaurenGoode. Michael Calore is @snackfight. Bling the main hotline at @GadgetLab. The show is produced by Boone Ashworth (@booneashworth). Our theme music is by Solar Keys.

Web3 101
E38|加密精神溯源:聊聊信仰与密码朋克们的故事

Web3 101

Play Episode Listen Later Mar 20, 2024 74:51


密码学一直在为保护信息安全、确保通信隐私和完整性发挥着关键作用,区块链和加密货币正是基于密码学原理构建的,而在密码学诞生的背后,隐藏着一群名为Cypherpunk(密码朋克)极客群体。从上个世纪90年代开始,这些密码朋克们开始尝试构建一个数字乌托邦,他们的执着,不仅构建起了保卫通信安全的堡垒,也就此开启了整个加密货币故事的序章。 那么,加密精神究竟从何而来,它与近年来轰轰烈烈的Web3运动有何联系,密码朋克真正的精神内核又是什么?伴随着最近加密货币牛市的到来,本期节目,就让我们一起回到Web3的起源之处去一探究竟。 此次,我们邀请到了“原语里弄”发起人、资深密码学研究者姚翔和BODL Ventures合伙人、前链闻总编辑、前彭博商业周刊中文版主编刘锋,来一起深入聊聊那些关于密码学和密码朋克们的故事,探索密码朋克是如何起源、如何发展又是如何一步步改变加密世界的。 【主播】 Vicky,《Web3 101》播客主理人 【嘉宾】 刘锋, BODL Ventures合伙人、前链闻总编辑、前彭博商业周刊中文版主编 姚翔,“原语里弄”发起人、密码学研究者 【你将听到】 【跟加密货币的第一次接触】 03:18 加密货币背后不只有利益游戏,更有一段Cypherpunk(密码朋克)精神史 04:49 2010年看比特币相关论文,技术上能完全理解,但并没有深入理解技术背后想要解决的经济社会问题 09:06 早期很多人因为挖比特币挣了钱,所以出现要打破传统金融和老钱控制的潮流 10:57 加密世界是一个兔子洞,洞内洞外是完全不同的世界 【密码朋克的起源】 11:57 Jude Mihong首次提出了Cypherpunk,之后Tim May发布密码朋克宣言 14:43 密码朋克们从多种维度展开了研究:包括理论和算法程序 17:21 非对称加密的原型出现,并很快得到了发展 21:09 Zimmermann试图把软件代码写成一本书,用出版书的方式进行技术传播 24:18 开源运动的兴起和软件的商业化也推动着密码朋克运动成为一种新思潮 【关于“朋克”精神的解读】 28:07 朋克音乐和密码朋克的主线发展有很多重合之处 32:23 朋克是一种旗帜和文化现象,更是一种精神内核 34:59 加密朋克圈子里大家的意识形态也并不是完全统一的,甚至出现了非常激进的做法 37:22 在密码朋克们的努力下,加密技术打破了国界墙 40:02 硅谷的极客氛围让密码朋克圈中的很多人也都聚集于此 【“密码朋克”与加密货币关系】 41:36 密码朋克不是描述某个人,而更像是一面从密码学衍生出来的精神旗帜 45:13 密码朋克们对于密码学的经济效益不是很重视,Tim May把ICO浪潮视为“郁金香炒作” 48:41 使用比特币的人决定了它的属性是什么样的 51:09 对财富的追求是很多人进入加密社区的驱动力,但目前大家忽视了密码学真正要去解决的底层问题 【密码学中的精神内核】 54:04 Hal Finney:比特币先驱人物,后来因病去世后,选择冷冻自己的遗体 55:33 “志愿精神“也是密码朋克很重要的精神内核之一,所以密码学领域的论文作者署名都按姓氏首字母排序 61:02 密码朋克做的事情来自于人类本性中的爱 68:47 连线杂志记者Andy Greenberg数十年对比特币的报道也是加密精神的一种体现 70:38 Cypherpunk运动的真正核心是对乌托邦的向往 72:08 加密精神不能成为一种打压别人或者敛财的工具,而更需要回归真和善的初心 【信息拓展】 1. 节目中提到的相关主要人物: Jude Milhon:一位黑客兼密码学作家,1992年首次创造cypherpunk这个词将与密码学技术相关的cypher(密码)与punk(朋克)合成,意思是“密码学反叛者”。 Tim May:美国物理学家,英特尔前员工。密码朋克邮件列表的发起者之一。 Martin Hellman以及Whitfield Diffle:密码技术专家,在1976年提出了一种全新的非对称加密技术,共同撰写首部公开的公钥密码学著作《密码学的新方向》,在密码学发展史上有重要意义。 Phil Zimmermann:计算机科学家、发明家与企业家,为PGP(Pretty Good Privacy)邮件加密软件的开创者。PGP 于1991年免费发布。由于PGP在世界范围的传播违反了美国政府关于加密软件的出口限制,Zimmermann受到了为期三年刑事调查。 Eric Hughes:加利福尼亚大学伯克利分校数学家,Cypherpunks 发起人之一。 S.Goldwasser:MIT电子工程和计算机科学的教授,密码学专家,零知识证明理论的提出者和奠基人之一。1985 年与S.Micali 及C.Rackoff共同发布论文《互动证明系统的知识复杂性》提出“零知识证明”概念。 Hal Finney:比特币先驱人物。最早支持比特币,并与中本聪完成第一笔比特币链上转账的密码学专业人士,在比特币问世两年多以后不幸罹患渐冻症而去世。 Andy Greenberg:《连线》杂志的资深撰稿人,主要撰写内容涉及黑客、加密货币、网络安全和监控。 2.《Crypto Wars》:作者Craig Javis,该书描述了从20世纪70年代开始加密技术的发展历史和重要历史事件。 【补充阅读】 02:18 原语里弄网站 https://www.primitiveslane.org/ 02:56 寻找密码朋克(一):奥古斯特·柯克霍夫传 https://www.primitiveslane.org/post/augustekerckhoffs 06:43 Tim May 采访 https://www.coindesk.com/markets/2018/10/19/enough-with-the-ico-me-so-horny-get-rich-quick-lambo-crypto/ 12:43 The Cyphernomicon https://nakamotoinstitute.org/library/cyphernomicon 12:54 【更正:作者是 Eric Hughes】A Cypherpunk's Manifesto https://www.activism.net/cypherpunk/manifesto.html 13:41 提议的名字包括:Cryptographic Research Association, Cryptography Privacy 等,Tim May 还使用了一个更无趣的名字进一步解释—— Northern California Cryptography Hobbyists Association。 14:11 Wired 杂志对 Jude Milhon 的采访 https://www.wired.com/1995/02/st-jude/ 16:14 美国关于密码学出口的限制 https://en.wikipedia.org/wiki/ExportofcryptographyfromtheUnited_States 19:30 Hellman 和 NSA 的渊源 https://cryptome.org/hellman/hellman-nsa.htm 20:24 OpenPGP https://www.openpgp.org/about/ 21:18 Crypto Wars, Craig Jarvis https://www.routledge.com/Crypto-Wars-The-Fight-for-Privacy-in-the-Digital-Age-A-Political-History-of-Digital-Encryption/Jarvis/p/book/9780367642488 21:58 Philip Zimmermann 关于此书的介绍 https://philzimmermann.com/EN/essays/BookPreface.html 36:24 Phil Zimmermann 最近接受的采访 https://www.youtube.com/watch?v=dRFOtL0fbxg 40:30 Homebrew Computer Club 45:30 Tim May 采访 https://www.coindesk.com/markets/2018/10/19/enough-with-the-ico-me-so-horny-get-rich-quick-lambo-crypto/ 47:16 戴维生平 https://mp.weixin.qq.com/s?src=11×tamp=1710898050&ver=5149&signature=8eZ1LxNbb6LYkRwOCBZxGf6Siam6TObTa1uQDeeYAS7pPjM8l9sN1WfuT*qjmglhfuF8GCEMru1fueH108-K9kz-3vCK5KQ9goSqiTUfTw47ve3GvAlrZr6N8Mgqz7&new=1 54:26 Running Bitcoin https://x.com/halfin/status/1110302988?s=20 57:28 DES, Data Encryption Standard 58:10 DualECDRBG https://en.wikipedia.org/wiki/DualECDRBG 【后期】 AMEI 【BGM】 Mumbai — Ooyy 【Shownotes】 Juny 【在这里找到我们】 收听渠道:苹果|小宇宙 海外用户:Apple Podcast|Spotify|Google Podcast|Amazon Music 联系我们:podcast@sv101.net 本节目不构成任何投资建议,投资有风险,入市需谨慎

GOTO - Today, Tomorrow and the Future
Traceable Cryptocurrencies & Cryptojacking • Andy Greenberg & Scott Helme

GOTO - Today, Tomorrow and the Future

Play Episode Listen Later Mar 1, 2024 44:34 Transcription Available


This interview was recorded at GOTO Copenhagen for GOTO Unscripted.http://gotopia.techRead the full transcription of this interview hereAndy Greenberg -  Author of "Sandworm" & "Tracers in the Dark" and Award-winning Senior Writer for WIREDScott Helme - Security Researcher, Hacker and Founder of Report URI & Security HeadersRESOURCESAndyhttps://twitter.com/a_greenberghttps://linkedin.com/in/andygreenbergjournalisthttps://andygreenberg.nethttps://www.wired.com/author/andy-greenberghttps://infosec.exchange/@agreenberg@agreenberg.bksy.socialScotthttps://twitter.com/Scott_Helmehttps://linkedin.com/in/scotthelmehttps://scotthelme.co.ukhttps://github.com/ScottHelmeDESCRIPTIONAndy Greenberg and Scott Helme explore the ever-evolving landscape of cyber crimes, discussing the anonymity of cryptocurrencies, the transition from cryptojacking to ransomware, and the enduring impact of blockchains on the realm of cyber security. They expose some of the most famous crytpojacking attacks of all time and reason about the unlimited potential of crime organizations that leverage cryptocurrencies.RECOMMENDED BOOKSAndy Greenberg • Tracers in the DarkAndy Greenberg • SandwormAndy Greenberg • This Machine Kills SecretsThomas J. Holt, Adam M. Bossler & Kathryn C. Seigfried-Spellar • Cybercrime and Digital ForensicsTwitterInstagramLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!

The CGAI Podcast Network
Energy Security Cubed: Recovery from Critical Infrastructure Cyberattacks with Rob Sealock

The CGAI Podcast Network

Play Episode Listen Later Feb 29, 2024 45:43


On this episode of the Energy Security Cubed Podcast, Kelly Ogle and Joe Calnan interview Rob Sealock about the vulnerabilities of energy infrastructure to cyberattacks. For the intro session, Kelly and Joe Calnan discuss the unforeseen consequences of changes to the Investment Canada Act and the prospect of natural gas fired power generation in China. Guest Bio: - Rob Sealock is a member of Enbridge's cyber team and a Signals Officer in the Canadian Armed Forces Reserves. Host Bio: - Kelly Ogle is Managing Director of the Canadian Global Affairs Institute - Joe Calnan is a Fellow and Energy Security Forum Manager at the Canadian Global Affairs Institute Reading recommendations: - "Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers", by Andy Greenberg: https://www.amazon.ca/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405 - "Software Transparency: Supply Chain Security in an Era of a Software-Driven Society", by Chris Hughes and Tony Turner: https://www.amazon.ca/Software-Transparency-Security-Software-Driven-Society/dp/1394158483 - "Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, Scada, and Other Industrial Control Systems", by Eric D. Knapp: https://www.amazon.ca/Industrial-Network-Security-Securing-Infrastructure-dp-0443137374/dp/0443137374 Interview recording Date: February 28, 2023 Energy Security Cubed is part of the CGAI Podcast Network. Follow the Canadian Global Affairs Institute on Facebook, Twitter (@CAGlobalAffairs), or on LinkedIn. Head over to our website at www.cgai.ca for more commentary. Produced by Joe Calnan. Music credits to Drew Phillips.

Middle Market Musings
Episode 45 Andy Souder, RAF Equity

Middle Market Musings

Play Episode Listen Later Jan 18, 2024 40:24


Andy Souder grew up in a steel town and attended Notre Dame, but the similarities to “Rudy” end there.  Andy is vice president of acquisitions at RAF Equity, a family office turned private equity fund based in suburban Philadelphia.  Andy regales his old friends with stories of his own upbringing and early career  in commercial banking and law, then he and Andy Greenberg trade stories about Bob Fox, RAF's remarkable founder.  Discussion then turns to RAF Equity today – new leadership and focus on higher growth industries combined with traditional values and approach.  Charlie rises to the challenge of two Philadelphians by talking up the last days of the Belichick era in Boston. 

Rick Kleffel:Agony Column
2200: A 2023 Interview with Dalal Mawad

Rick Kleffel:Agony Column

Play Episode Listen Later Jan 18, 2024


Andy Greenberg discusses Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency.

TRM Talks
Tracers on the Blockchain with Andy Greenberg and Chris Janczewski

TRM Talks

Play Episode Listen Later Jan 17, 2024 37:05


Ari sits down with WIRED magazine's Andy Greenberg and TRM's Chris Janczewski, a former IRS-CI agent and the protagonist of Andy's book Tracer's in the Dark, to discuss how Chris and other investigators track and trace crypto to build investigations and hunt illicit actors on the blockchain. Today's Guests Andy Greenberg, Senior Writer, WIRED magazine Chris Janczewski, Head of Global Investigations, TRM Labs Host: Ari Rebord, Global Head of Policy, TRM Labs Resources TRM Insights: Tracers in the Dark: An Inside Look into Cracking Crypto's Biggest Cases TRM Insights: North Korean Hackers Stole $600 Million in Crypto in 2023 TRM Insights: Hack Hauls Halve From 2022 TRM Insights: CFTC's Technology Advisory Committee Releases Report On Opportunities and Risks In DeFi TRM Talks: Investigating and Prosecuting a Crypto Case CFTC Technology Advisory Committee - Report on Decentralized Finance About Chris Janczewski About Andy Greenberg Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency by Andy Greenberg

Rick Kleffel:Agony Column
2199: A 2023 Interview with Andy Greenberg

Rick Kleffel:Agony Column

Play Episode Listen Later Jan 16, 2024


Andy Greenberg discusses Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency.

Private Equity Podcast: Karma School of Business
What I Wish I Knew: Private Equity Leaders' Advice to Their Younger Selves

Private Equity Podcast: Karma School of Business

Play Episode Listen Later Jan 3, 2024 32:16


In this reflective episode of the Karma School of Business Podcast, we gather pearls of wisdom from seasoned private equity veterans and business builders as they share the advice they would give their 22-year-old selves. With insights that span from embracing resilience to the power of authenticity, this episode is a guidebook for both personal and professional growth. Join host Sean Mooney and the BluWave team as they delve into these transformative lessons that transcend time, providing guidance for the next generation of business leaders and anyone eager to refine their path to success. 1:49 - Andy Greenberg, GVC: "Just Say Yes" 4:43 - Ed Hine, Line 5 Capital: Get Comfortable Being Uncomfortable 7:45 - Matt Cole, SBJ Capital: Embrace the Journey 10:07 - Scott Phillips, Orix Capital Partners: Resilience in Tough Times 13:01 - Cici Zheng: Everything Will Be Okay 16:33 - John Huhn, Compass Group Equity Partners: Persistence Pays Off 19:20 - Brian Adams, Excelsior Capital: Own Assets Early 22:19 - Mohit Kansal, Clairvest: Skill Development Focus 23:35 - Marshall Phelps, MidOcean Partners: Invest in Relationships 26:09 - Devin Mathews, ParkerGale Capital: Be Authentically You For more information on BluWave and each of these episodes, go to www.bluwave.net/podcast.

Gadget Lab: Weekly Tech News
How Three Teens Broke the Internet

Gadget Lab: Weekly Tech News

Play Episode Listen Later Nov 16, 2023 41:02


In October 2016, a malware tool named Mirai took down some of the biggest sites and services on the web, including Netflix, Spotify, Twitter, PayPal, and Slack. The blackout affected most of the East Coast of the United States, and the size and scope of the outage alarmed the cybersecurity researchers and law enforcement agencies tasked with thwarting such attacks. The code that caused this meltdown was created by three individuals, all in their teens or early 20s. The trio had built a tool that took control of internet-connected smart home devices and used them—like a massive zombie army—to knock the internet's most vital servers offline. Now, years later, Mirai's three creators have told their story. This week, we talk to WIRED senior writer Andy Greenberg about Mirai's creation, how the code did its damage, and how the three hackers were eventually caught.  Show Notes: Read Andy's epic feature story titled “The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story.” The story also graces the cover of the next issue of WIRED magazine. Recommendations: Andy recommends the book Your Face Belongs to Us by Kashmir Hill. Mike recommends getting a wreath for Christmas instead of chopping down a tree. Lauren recommends Okinawan sweet potato haupia pie bars. Andy Greenberg can be found on X as @a_greenberg and @agreenberg elsewhere. Lauren Goode is @LaurenGoode. Michael Calore is @snackfight. Bling the main hotline at @GadgetLab. The show is produced by Boone Ashworth (@booneashworth). Our theme music is by Solar Keys. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Cyberlaw Podcast
Fancy Bear Goes Phishing

The Cyberlaw Podcast

Play Episode Listen Later Oct 31, 2023 59:30


I take advantage of Scott Shapiro's participation in this episode of the Cyberlaw Podcast to interview him about his book, Fancy Bear Goes Phishing – The Dark History of the Information Age, in Five Extraordinary Hacks. It's a remarkable tutorial on cybersecurity, told through stories that you'll probably think you already know until you see what Scott has found by digging into historical and legal records. We cover the Morris worm, the Paris Hilton hack, and the earliest Bulgarian virus writer's nemesis. Along the way, we share views about the refreshing emergence of a well-paid profession largely free of the credentialism that infects so much of the American economy. In keeping with the rest of the episode, I ask Bing Image Creator to generate alternative artwork for the book. In the news roundup, Michael Ellis walks us through the “sweeping”™ White House executive order on artificial intelligence. The tl;dr: the order may or may not actually have real impact on the field. The same can probably be said of the advice now being dispensed by AI's “godfathers.”™ -- the keepers of the flame for AI existential risk who have urged that AI companies devote a third of their R&D budgets to AI safety and security and accept liability for serious harm. Scott and I puzzle over how dangerous AI can be when even the most advanced engines can only do multiplication successfully 85% of the time. Along the way, we evaluate methods for poisoning training data and their utility for helping starving artists get paid when their work is repurposed by AI. Speaking of AI regulation, Nick Weaver offers a real-life example: the California DMV's immediate suspension of Cruise's robotaxi permit after a serious accident that the company handled poorly.  Michael tells us what's been happening in the Google antitrust trial, to the extent that anyone can tell, thanks to the heavy confidentiality restrictions imposed by Judge Mehta. One number that escaped -- $26 billion in payments to maintain Google as everyone's default search engine – draws plenty of commentary. Scott and I try to make sense of CISA's claim that its vulnerability list has produced cybersecurity dividends. We are inclined to agree that there's a pony in there somewhere. Nick explains why it's dangerous to try to spy on Kaspersky. The rewards my be big, but so is the risk that your intelligence service will be pantsed. Nick also notes that using Let's Encrypt as part of your man in the middle attack has risks as well – advice he probably should deliver auf Deutsch. Scott and I cover a great Andy Greenberg story about a team of hackers who discovered how to unlock a vast store of bitcoin on an IronKey but may not see a payoff soon. I reveal my connection to the story. Michael and I share thoughts about the effort to renew section 702 of FISA, which lost momentum during the long battle over choosing a Speaker of the House. I note that USTR has surrendered to reality in global digital trade and point out that last week's story about judicial interest in tort cases against social media turned out to be the first robin in what now looks like a remake of The Birds.  Download 479th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.  

The Cyberlaw Podcast
Fancy Bear Goes Phishing

The Cyberlaw Podcast

Play Episode Listen Later Oct 31, 2023 59:30


I take advantage of Scott Shapiro's participation in this episode of the Cyberlaw Podcast to interview him about his book, Fancy Bear Goes Phishing – The Dark History of the Information Age, in Five Extraordinary Hacks. It's a remarkable tutorial on cybersecurity, told through stories that you'll probably think you already know until you see what Scott has found by digging into historical and legal records. We cover the Morris worm, the Paris Hilton hack, and the earliest Bulgarian virus writer's nemesis. Along the way, we share views about the refreshing emergence of a well-paid profession largely free of the credentialism that infects so much of the American economy. In keeping with the rest of the episode, I ask Bing Image Creator to generate alternative artwork for the book. In the news roundup, Michael Ellis walks us through the “sweeping”™ White House executive order on artificial intelligence. The tl;dr: the order may or may not actually have real impact on the field. The same can probably be said of the advice now being dispensed by AI's “godfathers.”™ -- the keepers of the flame for AI existential risk who have urged that AI companies devote a third of their R&D budgets to AI safety and security and accept liability for serious harm. Scott and I puzzle over how dangerous AI can be when even the most advanced engines can only do multiplication successfully 85% of the time. Along the way, we evaluate methods for poisoning training data and their utility for helping starving artists get paid when their work is repurposed by AI. Speaking of AI regulation, Nick Weaver offers a real-life example: the California DMV's immediate suspension of Cruise's robotaxi permit after a serious accident that the company handled poorly.  Michael tells us what's been happening in the Google antitrust trial, to the extent that anyone can tell, thanks to the heavy confidentiality restrictions imposed by Judge Mehta. One number that escaped -- $26 billion in payments to maintain Google as everyone's default search engine – draws plenty of commentary. Scott and I try to make sense of CISA's claim that its vulnerability list has produced cybersecurity dividends. We are inclined to agree that there's a pony in there somewhere. Nick explains why it's dangerous to try to spy on Kaspersky. The rewards my be big, but so is the risk that your intelligence service will be pantsed. Nick also notes that using Let's Encrypt as part of your man in the middle attack has risks as well – advice he probably should deliver auf Deutsch. Scott and I cover a great Andy Greenberg story about a team of hackers who discovered how to unlock a vast store of bitcoin on an IronKey but may not see a payoff soon. I reveal my connection to the story. Michael and I share thoughts about the effort to renew section 702 of FISA, which lost momentum during the long battle over choosing a Speaker of the House. I note that USTR has surrendered to reality in global digital trade and point out that last week's story about judicial interest in tort cases against social media turned out to be the first robin in what now looks like a remake of The Birds.  Download 479th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.  

Private Equity Podcast: Karma School of Business
Andrew Greenberg, GVC | Evolution of the M&A Market: A Journey from Information Asymmetry to Al-Enhanced Efficiency

Private Equity Podcast: Karma School of Business

Play Episode Listen Later Oct 18, 2023 46:45


In this engaging episode, Sean and Andy Greenberg explore their career paths and the transformation of the M&A market. From Andy's shift from politics to investment banking, to the evolution of M&A from a manual process to a tech-driven one, they highlight the increasing need for specialization. Looking ahead, they predict a future where AI significantly enhances industry efficiency. 1:31 - Andy's origin story and his path to M&A 7:10 - What did M&A look like in the mid-90s 12:58 - How has the M&A business evolved to what it looks like today 22:14 - The era of industry expertise 29:44 - Where is the M&A market going 36:18 - Andy's advice to his younger self To learn more about Andy and Greenberg Variations Capital, go to www.greenbergvariations.com To listen to Middle Market Musings, go to www.middlemarketmusings.com To learn more about BluWave and this podcast, go to www.bluwave.net/podcast

National Security Law Today
Tracing Criminal Crypto with Andy Greenberg

National Security Law Today

Play Episode Listen Later Oct 17, 2023 33:48


Since its inception, cryptocurrency has fueled the growth of digital black markets, opening doors for criminal transactions while masking bad actor identities. But what if these currencies weren't so cryptic after all? This week host Elisa is joined by Andy Greenberg, senior writer for WIRED, to discuss his recent book, Tracers in the Dark, and his in-depth reporting on black market operations and their operators. Andy Greenberg is a senior writer for WIRED, covering hacking, cybersecurity and surveillance: https://www.wired.com/author/andy-greenberg/ References: Greenberg, Andy. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. Knopf Us, 2023: https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095 Greenberg, Andy. Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers. Doubleday, 2019: https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405 Greenberg, Andy. “Chinese Spies Infected Dozens of Networks with Thumb Drive Malware.” Wired, Conde Nast, 19 Sept. 2023: https://www.wired.com/story/china-usb-sogu-malware/ Greenberg, Andy. “China-Linked Hackers Breached a Power Grid-Again.” Wired, Conde Nast, 12 Sept. 2023: https://www.wired.com/story/china-redfly-power-grid-cyberattack-asia/ Greenberg, Andy. “The International Criminal Court Will Now Prosecute Cyberwar Crimes.” Wired, Conde Nast, 7 Sept. 2023: https://www.wired.com/story/icc-cyberwar-crimes/ Greenberg, Andy. “How China Demands Tech Firms Reveal Hackable Flaws in Their Products.” Wired, Conde Nast, 6 Sept. 2023: https://www.wired.com/story/china-vulnerability-disclosure-law/

The Cyberlaw Podcast
The FTC Doubles Down, Down, Down

The Cyberlaw Podcast

Play Episode Listen Later Jul 18, 2023 54:58


This episode of the Cyberlaw Podcast kicks off with a stinging defeat for the Federal Trade Commission (FTC), which could not persuade the courts to suspend the Microsoft-Activision Blizzard acquisition. Mark MacCarthy says that the FTC's loss will pave the way for a complete victory for Microsoft, as other jurisdictions trim their sails. We congratulate Brad Smith, Microsoft's President, whose policy smarts likely helped to construct this win. Meanwhile, the FTC is still doubling down on its determination to pursue aggressive legal theories. Maury Shenk explains the agency's investigation of OpenAI, which raises issues not usually associated with consumer protection. Mark and Maury argue that this is just a variation of the tactic that made the FTC the de facto privacy regulator in the U.S. I ask why policing ChatGPT's hallucinatory libel problem constitutes consumer protection, and they answer, plausibly, that libel is a kind of deception, which the FTC does have authority to police. Mark then helps us drill down on the Associated Press deal licensing its archives to OpenAI, a deal that may turn out to be good for both companies. Nick Weaver and I try to make sense of the district court ruling that Ripple's XRP is a regulated investment contract when provided to sophisticated buyers but not when sold to retail customers in the market. It is hard to say that it makes policy sense, since the securities laws are there to protect the retail customers more than sophisticated buyers. But it does seem to be at least temporary good news for the cryptocurrency exchanges, who now have a basis for offering what the SEC has been calling an unregistered security. And it's clearly bad news for the SEC, which may not be able to litigate its way to the Cryptopocalypse it has been pursuing. Andy Greenberg makes a guest appearance to discuss his WIRED story about the still mysterious mechanism by which Chinese cyberspies acquired the ability to forge Microsoft authentication tokens.  Maury tells us why Meta's Twitter-killer, Threads, won't be available soon in Europe. That leads me to reflect on just how disastrously Brussels has managed the EU's economy. Fifteen years ago, the U.S. and EU had roughly similar GDPs, at about $15 trillion each. Now the EU GDP has scarcely grown, while U.S. GCP is close to $25 trillion. It's hard to believe that EU tech policy hasn't contributed to this continental impoverishment, which Maury points out is even making Brexit look good.  Maury also explains the French police drive to get explicit authority to conduct surveillance through cell phones. Nick offers his take on FISA section 702 reform. Stories. And Maury evaluates Amazon's challenge to new EU content rules, which he thinks have more policy than legal appeal. Not content with his takedown of the Ripple decision, Nick reviews all the criminal cases in which cryptocurrency enthusiasts are embroiled. These include a Chinese bust of Multichain, the sentencing of Variety Jones for his role in the Silk Road crime market, and the arrest of Alex Mashinsky, CEO of the cryptocurrency exchange Celsius. Finally, in quick hits,  Mark and I duel over the lawsuit claiming that Texas's TikTok Ban on government phones will threaten academic freedom. I praise the surprisingly good National Cybersecurity-Strategy Implementation Plan and puzzle over the decision not to nominate the acting head of that office to head the office permanently. And I note that the Allow States and Victims to Fight Online Sex Trafficking Act, also known as FOSTA-SESTA, reviled by the left, has withstood a constitutional challenge in the DC Circuit. Download 468th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

The Cyberlaw Podcast
The FTC Doubles Down, Down, Down

The Cyberlaw Podcast

Play Episode Listen Later Jul 18, 2023 54:58


This episode of the Cyberlaw Podcast kicks off with a stinging defeat for the Federal Trade Commission (FTC), which could not persuade the courts to suspend the Microsoft-Activision Blizzard acquisition. Mark MacCarthy says that the FTC's loss will pave the way for a complete victory for Microsoft, as other jurisdictions trim their sails. We congratulate Brad Smith, Microsoft's President, whose policy smarts likely helped to construct this win. Meanwhile, the FTC is still doubling down on its determination to pursue aggressive legal theories. Maury Shenk explains the agency's investigation of OpenAI, which raises issues not usually associated with consumer protection. Mark and Maury argue that this is just a variation of the tactic that made the FTC the de facto privacy regulator in the U.S. I ask why policing ChatGPT's hallucinatory libel problem constitutes consumer protection, and they answer, plausibly, that libel is a kind of deception, which the FTC does have authority to police. Mark then helps us drill down on the Associated Press deal licensing its archives to OpenAI, a deal that may turn out to be good for both companies. Nick Weaver and I try to make sense of the district court ruling that Ripple's XRP is a regulated investment contract when provided to sophisticated buyers but not when sold to retail customers in the market. It is hard to say that it makes policy sense, since the securities laws are there to protect the retail customers more than sophisticated buyers. But it does seem to be at least temporary good news for the cryptocurrency exchanges, who now have a basis for offering what the SEC has been calling an unregistered security. And it's clearly bad news for the SEC, which may not be able to litigate its way to the Cryptopocalypse it has been pursuing. Andy Greenberg makes a guest appearance to discuss his WIRED story about the still mysterious mechanism by which Chinese cyberspies acquired the ability to forge Microsoft authentication tokens.  Maury tells us why Meta's Twitter-killer, Threads, won't be available soon in Europe. That leads me to reflect on just how disastrously Brussels has managed the EU's economy. Fifteen years ago, the U.S. and EU had roughly similar GDPs, at about $15 trillion each. Now the EU GDP has scarcely grown, while U.S. GCP is close to $25 trillion. It's hard to believe that EU tech policy hasn't contributed to this continental impoverishment, which Maury points out is even making Brexit look good.  Maury also explains the French police drive to get explicit authority to conduct surveillance through cell phones. Nick offers his take on FISA section 702 reform. Stories. And Maury evaluates Amazon's challenge to new EU content rules, which he thinks have more policy than legal appeal. Not content with his takedown of the Ripple decision, Nick reviews all the criminal cases in which cryptocurrency enthusiasts are embroiled. These include a Chinese bust of Multichain, the sentencing of Variety Jones for his role in the Silk Road crime market, and the arrest of Alex Mashinsky, CEO of the cryptocurrency exchange Celsius. Finally, in quick hits,  Mark and I duel over the lawsuit claiming that Texas's TikTok Ban on government phones will threaten academic freedom. I praise the surprisingly good National Cybersecurity-Strategy Implementation Plan and puzzle over the decision not to nominate the acting head of that office to head the office permanently. And I note that the Allow States and Victims to Fight Online Sex Trafficking Act, also known as FOSTA-SESTA, reviled by the left, has withstood a constitutional challenge in the DC Circuit. Download 468th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@gmail.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.

TRENDIFIER with Julian Dorey

Support Our Show on PATREON: https://www.patreon.com/JulianDorey Subscribe To Our Clips Channel: https://www.youtube.com/channel/UChs-BsSX71a_leuqUk7vtDg  (***TIMESTAMPS in description below) ~ Shawn Ryan is a former Navy SEAL, CIA GRS Spy, and current acclaimed podcast host. After 15 years in the SEALs and CIA, Shawn started the Shawn Ryan Show Podcast which is currently a Top-10 podcast in the country. Subscribe to Shawn Ryan Show: https://www.youtube.com/@ShawnRyanShowOfficial  ****TIMESTAMPS**** 0:00 - Rob O'Neill (Bin Laden Mission Navy SEAL); Shawn's backstory w/ the show 8:54 - Erik Prince & The Blackwater 4 (Nisour Square Mass@cre) 13:59 - How does Shawn feel about the gov?; Washington DC is messy 18:36 - The division problem; 80-20 rule in mass media 24:57 - The Eddie Gallagher Navy SEAL Case 31:07 - The Gaming Generation & Navy SEALS; Military “Social Influencers” 36:22 - What War looks like today; CIA Spy Andrew Bustamante 39:57 - China; The Chinese Spy Balloon; Power Grid Weakness; Lithium in Afghanistan 45:26 - The Media on China; Peter Zeihan; CCP in Africa 51:54 - China & our power grid; Andy Greenberg's hacker reporting; “Society is fragile” 59:23 - The advantages China has over US; Devaluation of US Dollar 1:03:30 - Mexican Cartels & CIA 1:09:01 - Julian tells story of last time he saw Biden 1:15:20 - US building energy field around country? 1:17:04 - How Shawn joined CIA 1:21:45 - Diff between Navy SEALs and CIA; Shawn's rotations for Agency 1:28:48 - CIA communication in field 1:32:13 - Shawn's CIA Training 1:36:10 - Shawn explains CIA Spy Tradecraft & Surveillance  1:44:01 - No diplomatic immunity in CIA; CIA Spy Covers 1:48:15 - When Shawn got made (and shot at) 1:50:56 - CIA Safe Houses 1:53:33 - Shawn's spy strategy in first 2 weeks of new location 2:01:15 - The culture at CIA 2:10:55 - The CIA's relationship with civilians 2:19:08 - Shawn's rise through the NAVY SEALs 2:26:10 - How SEALs Team numbers work; Navy SEALs Specialties 2:31:43 - Shawn's British MI6 Spy Training; Shawn goes to Afghanistan & Iraq 2:36:41 - Shawn gives opinion on Iraq War; US are world's police? 2:43:40 - Afghanistan War; Halliburton in Iraq 2:47:32 - The op tempo in Iraq; Shawn tells stories of missions in Iraq 2:53:47 - What would Shawn have done if he was in charge of Iraq War? 2:56:32 - Why Shawn left Navy SEALs; Anti-Piracy & Captain Phillips 3:00:35 - Why military guys “want” to be in warzones 3:04:07 - Shawn's experience with PT Ess after the war; Purpose Crisis 3:10:37 - The Veteran health crisis in America 3:12:40 - The vet epidemic going on right now; Shawn remembers lost friends 3:16:45 - Shawn reveals his personal struggle & tells story of his closest call 3:22:49 - Shawn's holy experience in Mexico; Its benefits for everybody 3:29:04 - Next steps for Shawn Ryan Show ~ Get $150 Off The Eight Sleep Pod Pro Mattress / Mattress Cover (USING CODE: “JULIANDOREY”): https://eight-sleep.ioym.net/trendifier Julian's Instagram: https://www.instagram.com/julianddorey ~ Music via Artlist.io ~ Julian Dorey Podcast Episode 148 - Shawn Ryan

Recorded Future - Inside Threat Intelligence for Cyber Security
63. Tracers on the stage: Andy Greenberg, Michael Gronager and Tigran Gambaryan talk cryptocurrency tracking

Recorded Future - Inside Threat Intelligence for Cyber Security

Play Episode Listen Later Apr 18, 2023 33:04


We go behind the scenes of the new book by WIRED's Andy Greenberg, "Tracers in the Dark." It explains how a handful of entrepreneurs and investigators demystified cryptocurrency tracking. Recently, we spoke with Andy and some crypto tracers onstage at the Links 2023 conference in New York City. Plus, North Korea's ingenious effort to launder its stolen crypto. 

Recorded Future - Inside Threat Intelligence for Cyber Security
62. How a mathematician and an entrepreneur helped law enforcement take a bite out of crypto crime

Recorded Future - Inside Threat Intelligence for Cyber Security

Play Episode Listen Later Apr 11, 2023 26:52


When cryptocurrency burst on the scene in 2008, it was touted as anonymous — a boon to cyber criminals all over the world. Then a few mathematicians and some federal agents proved otherwise, in a way so big it birthed an industry. With a tip of the hat to Andy Greenberg's new book “Tracers in the Dark,” we talk to them about how they did it.

Best of the Left - Leftist Perspectives on Progressive Politics, News, Culture, Economics and Democracy
#1480 The Cyberwar Did Not Begin with Cyber Pearl Harbor (Repost)

Best of the Left - Leftist Perspectives on Progressive Politics, News, Culture, Economics and Democracy

Play Episode Listen Later Apr 5, 2023 79:24


Original Air Date 4/2/2022 Today we take a look at the modern reality of cyber war. It's not the mass destruction of attacks that were imagined to look like a "Cyber Pearl Harbor" but the much more subtle cyber attacks that often fly under the radar and live in the grey area in attempts to inflict harm without provoking counterattack. Be part of the show! Leave us a message or text at 202-999-3991 or email Jay@BestOfTheLeft.com  Transcript BestOfTheLeft.com/Support (Get AD FREE Shows and Bonus Content) SHOW NOTES Ch. 1: Andy Greenberg - Longform - Air Date 12-11-19 Andy Greenberg is a senior writer for Wired. His new book is Sandworm. “I kind of knew I was never going to get access to Sandworm, which is the title of the book - so it was all about drawing a picture around this invisible monster.” Ch. 2: How America's gas got hacked - Today, Explained - Air Date 5-12-21 The largest-known ransomware attack on American energy infrastructure is driving up gas prices and creating shortages. Wired's Lily Hay Newman says Colonial Pipeline might be a turning point for cybersecurity. Ch. 3: Is Russia at War with the West? Part 1 - The Inquiry - Air Date 11-21-18 There are currently a number of serious allegations made in the West against Russia. They include the attempted murder of the former spy Sergei Skripal on British soil; interference in the 2016 US election; the hacking of the American electricity grid. Ch. 4: How prepared is the U.S. to fend off cyber warfare? Better at offense than defense, author says - PBS NewsHour - Air Date 8-6-18 Sanger joins Judy Woodruff to discuss the threats and realities, how the U.S. wages cyber warfare, and how prepared the U.S. is to stop attacks. Ch. 5: Is Russia at War with the West? Part 2 - The Inquiry - Air Date 11-21-18 Ch. 6: Russia Perfected Its Cyberwarfare In Ukraine — America Could Pay The Price - Think | NBC News - Air Date 11-23-19 Russia has been practicing cyberwar in a real-life test lab — Ukraine. Andy Greenberg, author of 'Sandworm', recounts how Russia went from repeatedly shutting down Ukraine's infrastructure to unleashing worms that caused billions of dollars in damage. Ch. 7: Is World War III Already Here? - Your Undivided Attention - Air Date 1-3-22 Warfare has changed so fundamentally, that we're currently in a war we don't even recognize. It's the war that Russia, China, and other hostile foreign actors are fighting against us — weaponizing social media to undermine our faith in each other MEMBERS-ONLY BONUS CLIP(S) Ch. 8: The Hackers Who Took Down the Colonial Pipeline - What Next: TBD | Tech, power, and the future - Air Date 5-21-21 Last week, a hacker group called DarkSide shut down the Colonial Pipeline, which supplies 45 percent of the fuel consumed on the East Coast. Gas prices skyrocketed, people started hoarding gas, and DarkSide walked away with over $4 million in Bitcoin. VOICEMAILS Ch. 9: Puberty blockers experimental? - Maria in Pennsylvania FINAL COMMENTS Ch. 10: Final comments on the deception and logical fallacies at the heart of critiques of gender affirming care MUSIC (Blue Dot Sessions): Opening Theme: Loving Acoustic Instrumental by John Douglas Orr  Voicemail Music: Low Key Lost Feeling Electro by Alex Stinnent Closing Music: Upbeat Laid Back Indie Rock by Alex Stinnent   Produced by Jay! Tomlinson Visit us at BestOfTheLeft.com Listen Anywhere! BestOfTheLeft.com/Listen Listen Anywhere! Follow at Twitter.com/BestOfTheLeft Like at Facebook.com/BestOfTheLeft Contact me directly at Jay@BestOfTheLeft.com

The CyberWire
That crane might know what you're shipping. Addressing the cybersecurity of water systems. Oakland's ransomware incident is now a breach. Hybrid war. Investment scams.

The CyberWire

Play Episode Listen Later Mar 6, 2023 29:33


Cranes as a security threat. EPA memo addresses cybersecurity risks to water systems. Oakland's ransomware incident becomes a data breach. Carding rises in the Russian underworld. Sandworm's record in Russia's war. Rick Howard sits down with Andy Greenberg from Wired to discuss how Ukraine suffered more data-wiping malware last year than anywhere, ever. Dave Bittner speaks with Kathleen Smith of ClearedJobs.Net to talk about hiring veterans and setting them (and yourself) up for success. And AI's latest misuse: bogus investment schemes. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/43 Selected reading. WSJ News Exclusive | Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools (Wall Street Journal) EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems (US EPA) EPA presses states to include cybersecurity in water safety reviews (SC Media)  EPA Calls on States to Improve Public Water Systems' Cybersecurity (Meritalk) EPA issues water cybersecurity mandates, concerning industry and experts (CyberScoop) City of Oakland Targeted by Ransomware Attack, Work Continues to… (City of Oakland). Ransomware gang leaks data stolen from City of Oakland (BleepingComputer) Ransomware hackers release some stolen Oakland data (CBS News) Oakland officials say ransomware group may release personal data on Saturday (The Record from Recorded Future News)  Cybercrime site shows off with a free leak of 2 million stolen card numbers (The Record from Recorded Future News) A year of wipers: How the Kremlin-backed Sandworm has attacked Ukraine during the war (The Record from Recorded Future News) Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors (Hot for Security)

Unchained
Have Crypto Detectives Killed the Cypherpunk Dream? - Ep. 461

Unchained

Play Episode Listen Later Feb 28, 2023 71:04


Andy Greenberg, senior writer for WIRED and author of “Tracers in the Dark,” takes us inside the world of crypto-tracing crimebusters and voices the ambivalence of Bitcoin – a cypherpunk creation – eroding financial privacy. Hear how the longtime crypto scribe got law enforcement and sleuthing firms like Chainalysis to open up about their major wins in taking down darknet kingpins. Show highlights: why Andy thought early on that Bitcoin would enable crypto anarchy how blockchain analytics started being used to tackle crime why the IRS Criminal Investigation unit was more open to discussing its techniques  how Andy learned many new things about already well-known stories when writing about them for the book the methods used to bring down the “biggest dark-web drug lord” in history did AlphaBay's Alexandre Cazes really kill himself in a Thai prison? how researcher Sarah Meiklejohn developed tools to deanonymize Bitcoin  why she's now uncomfortable that her techniques were adopted by Chainalysis and sold to law enforcement what Andy feels about the importance of privacy how Monero is harder to trace than Bitcoin but not untraceable what the impact of zero-knowledge technology will be for blockchain analytics firms whether the cypherpunk ethos is dead why the mystery of Satoshi Nakamoto's identity will never die Thank you to our sponsors! Crypto.com FTSE Halborn NYU Guest Andy Greenberg, senior writer for WIRED and author of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency” Twitter Writings for WIRED Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency Links: WIRED: The Hunt for the Kingpin Behind AlphaBay, Part 1: The Shadow The Hunt for the Kingpin Behind AlphaBay, Part 2: Pimp_alex_91 The Hunt for the Kingpin Behind AlphaBay, Part 3: Alpha Male  De-Anonymization in Bitcoin with Sarah Meiklejohn | a16z crypto research talks Wikipedia: Welcome to Video case Learn more about your ad choices. Visit megaphone.fm/adchoices

KONCRETE Podcast
#174 - The FBI's New Cyber Super-Weapon Is The Dark Web's Worst Nightmare | Andy Greenberg

KONCRETE Podcast

Play Episode Listen Later Feb 20, 2023 155:56


Andy Greenberg is an award-winning writer & journalist covering security, privacy, information freedom, and darknet hacker culture. He's the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. EPISODE LINKS Andy's new book: https://a.co/d/aIL02zf https://andygreenberg.net https://twitter.com/a_greenberg JOIN OUR KULT: https://bit.ly/koncretepatreon DANNY LINKS https://www.instagram.com/jonesdanny https://twitter.com/jonesdanny OUTLINE 0:00 - Introduction 6:13 - Hunting down Satoshi Nakamoto 14:00 - Interviewing Dread Pirate Roberts (Ross Ulbricht) 19:55 - Ross Ulbricht's trial 22:55 - The Silk Road 39:24 - Chainalysis: The super-weapon against bitcoin 42:41 - IRS special agent Tigran Gambaryan 45:39 - DEA Agent who faked a murder and stole bitcoin from Silk Road 52:21 - Cryptography expert who cracked Bitcoin 59:47 - Mt. Gox heist 1:07:37 - Hackers & scammers in Ukraine 1:10:21 - AlphaBay darknet market 1:20:50 - The Kingpin behind AlphaBay: Alexandre Cazes 1:28:34 - The DEA sting that hijacked the entire dark web drug market 1:38:49 - Mysterious death of Alpha02 in a Thai jail 1:52:28 - How Hansa was hijacked by Dutch police 1:56:30 - The current state of the dark web 2:05:20 - Andy's approach to journalism 2:14:15 - Interviewing Julian Assange 2:27:00 - State sponsored hacking & cyber war

Against the Rules with Michael Lewis: The Trial of Sam Bankman-Fried
On Background: Bad Actors on the Blockchain

Against the Rules with Michael Lewis: The Trial of Sam Bankman-Fried

Play Episode Listen Later Feb 14, 2023 36:09


For his next book, Michael Lewis wants to find out how investigators manage to trace the murky trail of illicit crypto. Cryptocurrency started with the dream of cash changing hands without a trace. But that dream has turned into a nightmare for many would-be criminals. A new field has emerged of data geeks and law-enforcement experts trying to find out who's behind transactions on the blockchain. Michael calls up Andy Greenberg, senior cybersecurity writer for WIRED and author of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency” to find out how investigators crack the code of crypto.    Questions for Michael? Submit them by visiting atrpodcast.com. See omnystudio.com/listener for privacy information.

The Cyberlaw Podcast
Tracers in the Dark by Andy Greenberg

The Cyberlaw Podcast

Play Episode Listen Later Jan 21, 2023 43:57


In this bonus episode of the Cyberlaw Podcast, I interview Andy Greenberg, long-time WIRED reporter, about his new book, “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency.” This is Andy's second author interview on the Cyberlaw Podcast. He also came on to discuss an earlier book, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers. They are both excellent cybersecurity stories. “Tracers in the Dark”, I suggest, is a kind of sequel to the Silk Road story, which ends with Ross Ulbricht, the Dread Pirate Roberts, pinioned in a San Francisco library with his laptop open to an administrator's page on the Silk Road digital black market. At that time, cryptocurrency backers believed that Ulbricht's arrest was a fluke, and that properly implemented, bitcoin was anonymous and untraceable. Greenberg's book explains, story by story, how that illusion was trashed by smart cops and techies (including our own Nick Weaver!) who showed that the blockchain's “forever” records make it almost impossible to avoid attribution over time. Among those who fall victim to the illusion of anonymity are two federal officers who helped pursue Ulbricht—and to rip him off; the administrator of AlphaBay, Silk Road's successor dark market, an alleged Russian hacker who made so much money hacking Mt. Gox that he had to create his own exchange to launder it all, and hundreds of child sex abuse consumers and producers.  It is a great story, and Andy brings it up to date in the interview as we dig into two massive, multi-billion seizures made possible by transaction tracing. In fact, for all the colorful characters in the book, the protagonist is really Chainalysis and its competitors, who have turned tracing into a kind of science. We close the talk by exploring Andy's deeply mixed feelings about both the world envisioned by cryptocurrency's evangelists and the way Chainalysis is saving us from that world.

The Cyberlaw Podcast
Episode 438: Tracers in the Dark by Andy Greenberg

The Cyberlaw Podcast

Play Episode Listen Later Jan 20, 2023 43:56


The CyberWire
Andy Greenberg Interview: Tracers in the Dark. [CSO Perspectives]

The CyberWire

Play Episode Listen Later Jan 16, 2023 37:41


Rick Howard, N2K's CSO and the CyberWire's Chief Analyst, and Senior Fellow, interviews Andy Greenberg, Senior Writer at WIRED, regarding his new book, “Tracers in the Dark.”

Darknet Diaries
131: Welcome to Video

Darknet Diaries

Play Episode Listen Later Dec 27, 2022 70:26 Very Popular


Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website. This story is part of Andy's new book “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. An affiliate link to the book on Amazon is here: https://amzn.to/3VkjSh7. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The CyberWire
BEC gets into bulk food theft. BlackCat ransomware update. Epic Games' settlement with FTC. InfraGard data taken down. More on the hybrid war. And Twitter asks for the voice of the people.

The CyberWire

Play Episode Listen Later Dec 19, 2022 32:10 Very Popular


BEC takes aim at physical goods (including food). BlackCat ransomware activity increases. Epic Games settles an FTC regulatory case. The InfraGard database was pulled from a dark web auction site. CISA releases forty-one ICS advisories. Rick Howard interviews author Andy Greenberg. Rob Boyce from Accenture examines holiday cyber threats. The growing value of open source intelligence. Twitter says vox populi, vox dei. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/241 Selected reading. FBI, FDA OCI, and USDA Release Joint Cybersecurity Advisory Regarding Business Email Compromise Schemes Used to Steal Food (CISA) Colombian energy supplier EPM hit by BlackCat ransomware attack (BleepingComputer) Events D.C. data published online in apparent ransomware attack (Washington Post)  Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges (Federal Trade Commission)  Hacker Halts Sale of FBI's High-Profile InfraGard Database (HackRead)  CISA Releases Forty-One Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency)  Russia's Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications (Carnegie Endowment for International Peace)  How open-source intelligence has shaped the Russia-Ukraine war (GOV.UK) Front-line video makes Ukrainian combat some of history's most watched (Washington Post)  Elon Musk Polls Twitter Users, Asking Whether He Should Step Down (Wall Street Journal) Musk asks: Should I stay as CEO? (Computing) Elon Musk's Twitter Poll Shows Users Want Him to Step Down (Wall Street Journal)  Elon Musk's Twitter poll: 10 million say he should step down (the Guardian)

Story of the Week with Joel Stein
Hunting the Crypto Drug Lords

Story of the Week with Joel Stein

Play Episode Listen Later Dec 15, 2022 29:21 Transcription Available


A group of DEA agents from Fresno, California figures out the real name of a Dark Web drug kingpin. But before they can make the arrest, they have to follow him to Thailand and into the on-line world of pick-up artists. Andy Greenberg's sprawling Wired article is so intense it made host Joel Stein want to take drugs.  You can read the whole 6-part series here: https://www.wired.com/story/alphabay-series-part-1-the-shadow/  The Wired series is excerpted from Andy's book which you can find here: https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095/  See omnystudio.com/listener for privacy information.

Best of the Left - Leftist Perspectives on Progressive Politics, News, Culture, Economics and Democracy

Air Date 4/2/2022 Today we take a look at the current iteration of the cynical culture wars being waged by conservative Republicans against LGBTQ kids for political gain. The current wave of anti-trans and anti-gay legislation sprouting across the country is not about protecting kids and is absolutely nothing new. Be part of the show! Leave us a message at 202-999-3991 or email Jay@BestOfTheLeft.com  Transcript Join our Discord community! (What's Discord?) BestOfTheLeft.com/Support (Get AD FREE Shows and Bonus Content) Check out Democracy Decoded where you get your podcasts! SHOW NOTES Ch. 1: Andy Greenberg - Longform - Air Date 12-11-19 Andy Greenberg is a senior writer for Wired. His new book is Sandworm. “I kind of knew I was never going to get access to Sandworm, which is the title of the book - so it was all about drawing a picture around this invisible monster.” Ch. 2: How America's gas got hacked - Today, Explained - Air Date 5-12-21 The largest-known ransomware attack on American energy infrastructure is driving up gas prices and creating shortages. Wired's Lily Hay Newman says Colonial Pipeline might be a turning point for cybersecurity. Ch. 3: Is Russia at War with the West? Part 1 - The Inquiry - Air Date 11-21-18 There are currently a number of serious allegations made in the West against Russia. They include the attempted murder of the former spy Sergei Skripal on British soil; interference in the 2016 US election; the hacking of the American electricity grid. Ch. 4: How prepared is the U.S. to fend off cyber warfare? Better at offense than defense, author says - PBS NewsHour - Air Date 8-6-18 Sanger joins Judy Woodruff to discuss the threats and realities, how the U.S. wages cyber warfare, and how prepared the U.S. is to stop attacks. Ch. 5: Is Russia at War with the West? Part 2 - The Inquiry - Air Date 11-21-18 Ch. 6: Russia Perfected Its Cyberwarfare In Ukraine — America Could Pay The Price - Think | NBC News - Air Date 11-23-19 Russia has been practicing cyberwar in a real-life test lab — Ukraine. Andy Greenberg, author of 'Sandworm', recounts how Russia went from repeatedly shutting down Ukraine's infrastructure to unleashing worms that caused billions of dollars in damage. Ch. 7: Is World War III Already Here? - Your Undivided Attention - Air Date 1-3-22 Warfare has changed so fundamentally, that we're currently in a war we don't even recognize. It's the war that Russia, China, and other hostile foreign actors are fighting against us — weaponizing social media to undermine our faith in each other MEMBERS-ONLY BONUS CLIP(S) Ch. 8: The Hackers Who Took Down the Colonial Pipeline - What Next: TBD | Tech, power, and the future - Air Date 5-21-21 Last week, a hacker group called DarkSide shut down the Colonial Pipeline, which supplies 45 percent of the fuel consumed on the East Coast. Gas prices skyrocketed, people started hoarding gas, and DarkSide walked away with over $4 million in Bitcoin. VOICEMAILS Ch. 9: Puberty blockers experimental? - Maria in Pennsylvania FINAL COMMENTS Ch. 10: Final comments on the deception and logical fallacies at the heart of critiques of gender affirming care MUSIC (Blue Dot Sessions): Opening Theme: Loving Acoustic Instrumental by John Douglas Orr  Voicemail Music: Low Key Lost Feeling Electro by Alex Stinnent Closing Music: Upbeat Laid Back Indie Rock by Alex Stinnent   Produced by Jay! Tomlinson Visit us at BestOfTheLeft.com Listen Anywhere! BestOfTheLeft.com/Listen Listen Anywhere! Follow at Twitter.com/BestOfTheLeft Like at Facebook.com/BestOfTheLeft Contact me directly at Jay@BestOfTheLeft.com