Podcasts about clipper chip

  • 13PODCASTS
  • 13EPISODES
  • 45mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Jun 26, 2024LATEST

POPULARITY

20172018201920202021202220232024

Related Topics:

encryption internet

Latest podcast episodes about clipper chip

True Crime Cyber Geeks
Apple vs. The FBI and Your Right to Privacy

True Crime Cyber Geeks

Play Episode Listen Later Jun 26, 2024 13:58


In response to the San Bernardino shooting in 2015, the FBI demanded that Apple, Inc. create a "back door" to bypass the shooter's iPhone security, a back door that could also compromise any iPhone, anytime. Thankfully, Apple CEO Tim Cook wasn't playing. But this isn't the first time government and law enforcement has tried to stick their noses into our business without permission, and probably won't be the last. In this episode we also talk about government efforts to compromise consumer security, like the NSA's Clipper Chip of 1993, and why these efforts have always failed.Resources:Order Compelling Apple, Inc. to Assist Agents in SearchThe FBI Wanted a Back Door to the iPhone. Tim Cook Said NoA Message to our Customers (Apple CEO Tim Cook's response to FBI request)Apple Just Killed The 'GrayKey' iPhone Passcode HackElectronic Privacy Information Center: The Clipper ChipSupport the Show.Visit us on Patreon for bonus content and special offers! But only if you hate scams too.

Privacy International
The Cryptowars: A short history of encryption politics

Privacy International

Play Episode Listen Later Jun 14, 2024 54:48


Welcome to the last of our short series on encryption. This week we're just talking amongst ourselves, luckily Gus is an expert on encryption - having been working in and around the encryption debate since the '90s. Links - Read more about PI's work on encryption here: ⁠privacyinternational.org/learn/encryption⁠ - Matt Blaze and crypto.com: theverge.com/2018/7/6/17540818/crypto-com-domain-matt-blaze-monaco-mco-cryptology-sale; you can now find Matt at mattblaze.org - More about ITAR and the export of cryptography: en.wikipedia.org/wiki/Export_of_cryptography_from_the_United_States - More about France's ban on encryption ending in this 1999 article from the Register: theregister.com/1999/01/15/france_to_end_severe_encryption/ - More about the Data Encryption Standard: en.wikipedia.org/wiki/Data_Encryption_Standard - Find out more about the Clipper Chip: gizmodo.com/life-and-death-of-clipper-chip-encryption-backdoors-att-1850177832 - Or take a look at this NY Times article from 1994 (paywalled): nytimes.com/1994/06/12/magazine/battle-of-the-clipper-chip.html - Matt Blaze's flaw in the Clipper Chip: wired.com/1994/09/clipping-clipper-matt-blaze/ - NSA Data Center: wired.com/2012/03/ff-nsadatacenter/ - NSA holding data: nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html - An old website that helped you sign up to be an Arms Trafficker: http://online.offshore.com.ai/arms-trafficker/ - Here's some of the RSA illegal tattoos: http://www.geekytattoos.com/illegal-tattoos-rsa-tattoos/ - Phil Zimmerman's release of PGP: mit.edu/~prz/EN/essays/BookPreface.html - A documentary on this topic: reason.com/video/2020/10/21/cryptowars-gilmore-zimmermann-cryptography/ - The Reply All episode on Minitel: https://gimletmedia.com/shows/reply-all/8whoda

Capes and Lunatics
Chichester Chats Ep #25: Daredevil - Tree of Knowledge

Capes and Lunatics

Play Episode Listen Later Nov 1, 2023 71:17


Chichester Chats Ep #25: Daredevil - Tree of Knowledge Welcome back to the Chichester Chats! In each episode Phil and Lilith chat with writer D.G. Chichester about one of his comic book creations. This time the group discusses Daredevil: Tree of Knowledge from Daredevil #326-#332 (March-September 1994) in preparation for next month's NEW Daredevil: Black Armor miniseries. Tree of Knowledge features a story that Todd Krieger of Wired Magazine described as: "Tree of Knowledge" has everything from a maniacal villain at play in a citywide MUD to a down-on-her-luck actress trying to avoid a fledgling erotica outfit that is trading in cyberporn. It's worth the purchase price just for the spectacle of Captain America philosophizing about the Clipper Chip at an after hours wetware rave.    Tune in today and don't forget to review the show on Apple Podcasts, Spotify, YouTube, and anywhere else you can!     Chichester Chats Links  → Twitter https://www.twitter.com/ChichesterChats → Instagram https://www.instagram.com/capeslunatics/ → Facebook https://www.facebook.com/ChichesterChats → YouTube https://www.youtube.com/c/CapesandLunatics → Find a sneak peek of Axles Infernal at https://www.axlesinfernal.com   ==================  

Auf dem Weg zur Anwältin
#474 Spionagesoftware als Antwort auf Ende-zu-Ende-Verschlüsselung (Staatstrojaner, Art. 269ter StPO)?

Auf dem Weg zur Anwältin

Play Episode Listen Later Apr 4, 2023 31:25


Der Rechtsanwalt, Hacker und Legal Engineer Hans-Peter Oeri erzählt, wie die USA versucht hat, Verschlüsselung unter Kontrolle zu halten (Clipper-Chip, Backdoor) oder gar zu verbieten. Dennoch besitzt heute die ganze Welt Verschlüsselung. Wie ist es dazu gekommen? Wie reagieren die Staaten darauf? Was sind Staatstrojaner? Was ist das grosse Probleme mit diesen? Wie "findet" der Staat die Sicherheitslücken in den Programmen? Was ist von den Anbietern von Spyware wie Pegasus zu halten? Wie verbreitet sind Staatstrojaner in der Schweiz? Wie kommt der Trojaner aufs Gerät? Wie schützt man sich gegen Staatstrojaner? Und was ist der sicherste Weg für abhörsichere Kommunikation? Gregor Münch hat erneut viele spannende Fragen. Als Strafverteidiger erhält man Einblicke in die unglaublichsten Fälle und arbeitet eng mit sehr unterschiedlichen und spannenden Menschen zusammen. Im Podcast [Auf dem Weg als Anwält:in](https://www.duribonin.ch/podcast) versucht der Anwalt Duri Bonin gemeinsam mit seinen Gesprächspartnern (Beschuldigte, Verurteilte, Staatsanwälte, Strafverteidiger, Gutachter, Opfer, Unschuldigte, Schuldige …) zu ergründen, wie diese ticken, was sie antreibt und wie sie das Justizsystem erleben. Behandelt werden urmenschliche Themen. Bei genauerem Hinsehen findet man Antworten auf eigene Fragen des Lebens und der Gesellschaft. Links zu diesem Podcast: - [#473 "Lass uns auf WhatsApp wechseln" - ein Gespräch über abhörsichere Kommunikation](https://www.duribonin.ch/473-lass-uns-auf-whatsapp-wechseln-ein-gespraech-ueber-abhoersichere-kommunikation/) - [Clipper-Chip](http://www.rvs.uni-bielefeld.de/lecture/adieckma/Clipper/Technologie.html), [Backdoor](https://de.wikipedia.org/wiki/Backdoor), [Pegasus (Spyware)](https://de.wikipedia.org/wiki/Pegasus_(Spyware)), [EternalBlue](https://de.wikipedia.org/wiki/EternalBlue) - [Statistik zur Fernmeldeüberwachung: Erste GovWare-Einsätze ausgewiesen](https://www.rayonverbot.ch/ejpd/de/home/aktuell/mm.msg-id-79029.html) - [Statistik zur Überwachung Post- und Fernmeldeverkehr (Dienst ÜPF)](https://www.li.admin.ch/de/stats) - [StPO 269ter - Einsatz von besonderen Informatikprogrammen zur Überwachung des Fernmeldeverkehrs](https://www.fedlex.admin.ch/eli/cc/2010/267/de#a269ter) - Der Gast [Hans-Peter Oeri](https://www.linkedin.com/in/hoeri/), [@hpoeri](https://twitter.com/hpoeri?lang=de) - Anwaltskanzlei von [Gregor Münch](https://www.d32.ch/personen) - Anwaltskanzlei von [Duri Bonin](https://www.duribonin.ch) - Titelbild [bydanay](https://www.instagram.com/bydanay/) - [Lehrbücher für Anwaltsprüfung und Anwaltsmanagement](https://www.duribonin.ch/shop/) Die Podcasts "Auf dem Weg als Anwält:in" sind unter https://www.duribonin.ch/podcast/ oder auf allen üblichen Plattformen zu hören

Crypto Sapiens
Mini Series : Dejourno 3 by EurekaJohn| Combating Censorship in Journalism Using web3 with Pub DAO & Decrypt.co's Reza and JournoDAO's Spencer, Crystal Street and Keith Axline

Crypto Sapiens

Play Episode Listen Later Dec 19, 2022 56:22


Mini Series : Dejourno 3 by EurekaJohn In this episode, we explore various types of censorship and some of the web3 tools to deal with it. Censorship is most commonly thought of as almost a caricature of some prudish authority figure at the top burning books and punishing people for what they say. However, with the advancement of technology, censorship has taken on more subtle approaches such as agenda-setting theory, algorithmic exclusion, and shadow banning. The inner workings of these types of censorship are behind a veil controlled by centralized entities. Not all censorship is terrible; however, it should be a more democratic and transparent process. With web3, we hope to tear down this veil and let this process be transparent to all through decentralization using web3 tools.       This episode will focus specifically on censorship. Censorship is most commonly known by the obvious censorship attempts by the ‘Washington Wives,' a group that set out to increase censorship in music in 1985 and fought against by Dee Snider of Twisted Sister, Jon Denver, and Frank Zappa. Then again, in 1988, with NWA vs. the FBI with the song Fuck the Police, among other cases. In the 90s, famous censorship debates raged when censorship took the form of Joe Biden wanting to ban PGP encrypted e-mail (which was previously military-grade encryption) and wanted back door access into everyone's computers via the “Clipper Chip” in which the cypherpunks fought hard against and won.   As we progress and innovate in technology, new forms of censorship emerge. We are also being faced with protocol-level censorship.   Legit forms of censorship: Fact-checking, misinformation, pornography, anti-money laundering, anti-spam/scam. But who is in control of those tools?   Is the desire for ad revenue an inadvertent form of censorship? Are the agenda setting and topic of the content driven by the need for clicks and likes for revenue? Does this drown out the ability of journalists to focus on a topic like local news, investigative, and policy?   What are current tools to fight against censorship?   Will censorship be automated through AI? What does that look like?   Guests: Reza: @RezaJafery - Pub DAO / Decrypt.co Spencer - @clinamenic - JournoDAO Crystal Street - @crystaldstreet - JournoDAO Keith Axline - @kaxline - JournoDAO Crypto Sapiens is produced in partnership with Bankless DAO.   https://bankless.community    ---   Crypto Sapiens hosts lively discussions with innovative Web3 builders to help everyone learn about decentralized money systems, including Ethereum, Bitcoin and DeFi.     Website- https://www.cryptosapiens.xyz/ Twitter - https://twitter.com/CryptoSapiens  Youtube - https://www.youtube.com/channel/UC26aOc_4vSGiQATW1V4e9Tw Instagram - https://www.instagram.com/cryptosapiensofficial/ Facebook - https://www.facebook.com/CryptoSapiens-Podcast-107678875061018    Connect with Humpty Calderon - https://twitter.com/humptycalderon        ---   Not financial or tax advice. This channel is strictly educational and is not investment advice or a solicitation to buy or sell assets or make financial decisions.   Do your own research.

Outsmart Big Brother™
What is encryption and why do I need it?

Outsmart Big Brother™

Play Episode Listen Later Mar 13, 2021 11:30


Imagine you and your friends are planning a protest, but you fear that if the local authorities find out ahead of time, they might try to stop you. How do you prevent the authorities from discovering what your plans are? Your friends live too far away from each other for you to hold an in-person meeting, and the COVID-19 lockdowns also make such physical meetings illegal. You have to send messages to each other, but you suspect the police are monitoring your Internet connections and your phone conversations. How can you and your friends communicate privately so that your protest is successful? Find out how in this episode. Description: Link to GitHub for the encryption theme project https://github.com/Outsmart-Big-Brother/content-themes/blob/main/encryptionTheme.pyCredits Music by TimMoor from Pixabay - https://pixabay.com/music/ Intro video by Thomas Breher from Pixabay - https://pixabay.com/videos/security-data-security-data-backup-2176/WannaCry image- https://www.wired.it/internet/web/2019/05/13/wannacry-download-virus/?refresh_ce=Clipper Chip image - https://cryptomuseum.com/crypto/usa/img/301216/020/full.jpg For further study ProtonMail - https://protonmail.com/Tutanota - https://tutanota.com/LavaBit -https://www.eff.org/cases/lavabit, https://lavabit.com/Encrypted chat apps - https://protonmail.com/blog/whatsapp-alternatives/Clipper Chip government backdoor to encryption -https://cryptomuseum.com/crypto/usa/clipper.htm WannaCry ransomware - https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ Licence All original content by Outsmart Big Brother™ here is licenced under Creative Commons Attribution. All non-original content here is either copyright-free or fair-use-applicable. DISCLAIMER This content is for educational purposes only, and is NOT legal, financial, cybersecurity, or any other type of professional advice. Different individuals have different levels of risk tolerance. Not all privacy and censorship resistant technologies are appropriate for all situations. There also may be new tools, methods, and technologies which render portions of this content obsolete. Outsmart Big Brother and its agents make no warranty (whether express or implied) and shall bear no liability for bad stuff that happens as a result of attempting to use technologies, tools, websites, or other things mentioned in this content or any content (whether on outsmartbigbrother.com, social media sites, or elsewhere). Use your brain. Do your homework. Accept the risks that come with making your own choices in life. Be a responsible adult. --- Send in a voice message: https://anchor.fm/outsmart-big-brother/message

Cybercrimeology
Cybercrime History: Virtually Reflecting Reality, Part 6

Cybercrimeology

Play Episode Listen Later Nov 1, 2020 32:46


More about Our Guesthttps://faculty.nps.edu/dedennin/From this Episode:Morris Wilkes: https://en.wikipedia.org/wiki/Maurice_WilkesHis book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give Bill Burr a break. I learned about that line from a Dorothy Denning LectureA Declaration of the Independence of Cyberspace by John Perry Barlowhttps://www.eff.org/cyberspace-independencethe Cult of the Dead Cowhttps://cultdeadcow.com/https://en.wikipedia.org/wiki/Cult_of_the_Dead_CowCARNAVOREhttps://en.wikipedia.org/wiki/Carnivore_(software)https://computer.howstuffworks.com/carnivore.htmHoneypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)https://www.projecthoneypot.org/index.phphttps://www.honeynet.org/Napsterhttps://en.wikipedia.org/wiki/NapsterDid you know there were viral videos and memes before Facebook, YouTube and even Gmail?Money Good. Napster Badhttps://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad

Security Stories
3: Protecting democracy, and how to spot manipulation tactics online with Theresa Payton

Security Stories

Play Episode Play 30 sec Highlight Listen Later Apr 13, 2020 75:28


In the latest episode of Cisco's Security Stories, we have the incredible fortune to speak to Theresa Payton, who was named one of the top 25 Most Influential People in Security by Security Magazine and is one of the most respected authorities on security and intelligence operations. Theresa was the first female CIO of The White House, taking up the post in George W Bush’s second term. We chat about what life was really like working in the White House. She also starred in CBS’ ‘Hunted’ TV series which gives ordinary citizens to chance to try and evade police capture , running the intelligence operations side. Theresa is also very passionate about protecting people’s right to privacy, and has co-authored two books focused on helping others learn how to protect their privacy online. Her third book is called ‘Manipulated: Inside the cyberwar to hijack elections and distort the truth’ which is coming out on 22nd April, and we talk in quite a bit of detail about the topic of hijacking elections, and what people can do to protect their voting rights.Also in this episode, our ‘On this day’ feature takes us back to 1993 to discuss the announcement of the ‘Clipper chip’, which was designed to enhance the security of communications devices. It’s a really interesting story that addresses people’s right to privacy and the balance with survelliance, so stay tuned for that.And Ben chats to us about 'credential dumping', an increasingly popular technique whereby an attacker scours a compromised computer for credentials in order to move laterally and/or carry out further attacks. To learn more, visit https://blogs.cisco.com/security/stealing-passwords-with-credential-dumping

Marketing InSecurity
MiS006: Batsh-t Crazy - The First Crypto Wars, Stoner Bike Messengers, and the End of Cold Storage

Marketing InSecurity

Play Episode Listen Later Jun 6, 2019 35:32


A throwback to the early days of RSA all the way to the wild west of today’s Cryptocurrency craze with Brian Spector. Brian is the founder of Qredo, a disruptive and ambitious startup disrupting what he calls the “Batsh-t” crazy world of crypto-asset storage. (Disclaimer - I am on Qredo’s advisory board) Brian has been doing cryptography and security related jobs since the days of the first Crypto war between the NSA and RSA over the “Clipper Chip”.   Brian talks about everything from the 200 person RSA conference (#2, he missed #1) with Grandmaster Flash performing to the wild west of the exploding Crypto/Distributed economy and the value of experience in marketing in this new world. Along the way, you’ll learn about the strange world of Cold Storage of crypto-assets and what an asset custodian needs to do. Brian is always entertaining and never boring! Enjoy. Brian recommends Crossing the Chasm by Geoffrey Moore (by the way, who doesn’t?), and that if you are interested in cryptocurrency products and markets you listen to Laura Shin’s Unchained podcast. You can find Brian at @BSpector on Twitter and here on LinkedIn. Learn more about Qredo atQredo.com Learn more about your ad choices. Visit megaphone.fm/adchoices

Talkradio
Facebook als Amtsstube

Talkradio

Play Episode Listen Later Mar 12, 2019 70:20


Wer sind wir bloß und wenn ja, wie viele? An dieser harten Frage scheiterten bislang alle Regierungen. Haus- und Telefonnummern machten uns zur Person mit Rechten. Aber wehe, man war unterwegs. Die Lücke zwischen dem Passagier und seinem Papier ließ sich nie wirklich schließen. Das Smartphone macht es dann richtig kompliziert. 1993 sollte jedes technische Gerät einen "Clipper-Chip" erhalten, um seinen Nutzer erkennbar zu machen, doch das Volk lehnte ab. Seit 2011 gibt es die "National Strategy for Trusted Identities in Cyberspace" (Nstic), deren Anspruch noch niemand gerecht wurde. Doch jetzt, da der Staat es nicht mehr versucht und Public-Private-Partnerships angesagt sind, keimt wieder Hoffnung auf. Kann Facebook endlich liefern, was sich das Weiße Haus wünscht? Digitale Identitäten, und zwar für jeden nur eine - zum Steuern zahlen, Flüge buchen und Medikamente protokollieren? Mark Zuckerberg erfindet Facebook heute nicht neu, er erinnert sich. Die Deutschen sind dabei außen vor. Doch wenn das Experiment gelingt, wird Facebook in unseren Behörden so präsent sein wie Microsoft es heute schon ist. Die Rentnerrepublik braucht diese Innovation.

Pull Request
#39 ▶ Encryption Extended

Pull Request

Play Episode Listen Later Nov 12, 2017 89:46


Pull Request #39 - 12 Nov 2017 - Encryption Extended ▶ (Part 2 / 2) We discuss ENCRYPTION – things we missed last time, the Clipper Chip, and the FBI's quest to ruin it! PLUS - How much Apple sucks now (we're sorry)! BUT, ACTUALLY NOT - Theresa May murders the Internet!~ + Eric Newman, Tyler Dinner & Chris Grabowski

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
SC 84: Of Encryption and Backdoor Access - A Conversation with a CISO

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Play Episode Listen Later Jan 29, 2016 9:18


Encryption is fundamental to business today. But encryption also allows evildoers to plan nefarious criminal or terrorist acts.  Law enforcement, intelligence agencies and political interests have proposed "back doors" to enable them to do their jobs.  Shades of the cryptographic device, The Clipper Chip and the Skipjack algorithm!  Look it up! CISO's need to work with stakeholders to find the right balance between their responsibilities in protecting sensitive data and cooperation with law enforcement and Homeland Security.  We discuss these and other issues in this conversation between Security Current's Vic Wheatman and Greg Schaffer, FirstBank VP and Information Security Officer. 

Internet History Podcast
30. (Misc 2) The NSA And The 1990s Debate Over the Clipper Chip

Internet History Podcast

Play Episode Listen Later Sep 1, 2014 37:22


Summary:What the mid-1990's debate about the so-called "clipper chip" can teach us about our contemporary debates concerning NSA surveillance of the Internet and the Web.This episode was originally written as a piece on Medium, entitled The NSA Tried This Before, What The 90s Debate Over The Clipper Chip Can Teach Us About Digital Privacy See acast.com/privacy for privacy and opt-out information.