Practice and study of secure communication techniques
POPULARITY
Quantum computing and AI are no longer theoretical concepts for tomorrow—they're shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.Post-Quantum Migration and Cryptographic AgilityManzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It's not just about surviving the post-quantum era—it's about staying ready for whatever comes next.Taming the Complexity of AI Agents and Non-Human IdentitiesThe second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ's platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.Real Use Cases with Measurable ImpactManzano shares practical examples of how SandboxAQ's technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.Whether it's quantum cryptography, AI risk, or identity control—this isn't a vision for 2030. It's a call to action for today.Learn more about SandboxAQ: https://itspm.ag/sandboxaq-j2enNote: This story contains promotional content. Learn more.Guest: Marc Manzano, General Manager of Cybersecurity at SandboxAQ | https://www.linkedin.com/in/marcmanzano/ResourcesLearn more and catch more stories from SandboxAQ: https://www.itspmagazine.com/directory/sandboxaqLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
On this episode of Crazy Wisdom, I, Stewart Alsop, spoke with Neil Davies, creator of the Extelligencer project, about survival strategies in what he calls the “Dark Forest” of modern civilization — a world shaped by cryptographic trust, intelligence-immune system fusion, and the crumbling authority of legacy institutions. We explored how concepts like zero-knowledge proofs could defend against deepening informational warfare, the shift toward tribal "patchwork" societies, and the challenge of building a post-institutional framework for truth-seeking. Listeners can find Neil on Twitter as @sigilante and explore more about his work in the Extelligencer substack.Check out this GPT we trained on the conversation!Timestamps00:00 Introduction of Neil Davies and the Extelligencer project, setting the stage with Dark Forest theory and operational survival concepts.05:00 Expansion on Dark Forest as a metaphor for Internet-age exposure, with examples like scam evolution, parasites, and the vulnerability of modern systems.10:00 Discussion of immune-intelligence fusion, how organisms like anthills and the Portuguese Man o' War blend cognition and defense, leading into memetic immune systems online.15:00 Introduction of cryptographic solutions, the role of signed communications, and the growing importance of cryptographic attestation against sophisticated scams.20:00 Zero-knowledge proofs explained through real-world analogies like buying alcohol, emphasizing minimal information exposure and future-proofing identity verification.25:00 Transition into post-institutional society, collapse of legacy trust structures, exploration of patchwork tribes, DAOs, and portable digital organizations.30:00 Reflection on association vs. hierarchy, the persistence of oligarchies, and the shift from aristocratic governance to manipulated mass democracy.35:00 AI risks discussed, including trapdoored LLMs, epistemic hygiene challenges, and historical examples like gold fulminate booby-traps in alchemical texts.40:00 Controlled information flows, secular religion collapse, questioning sources of authority in a fragmented information landscape.45:00 Origins and evolution of universities, from medieval student-driven models to Humboldt's research-focused institutions, and the absorption by the nation-state.50:00 Financialization of universities, decay of independent scholarship, and imagining future knowledge structures outside corrupted legacy frameworks.Key InsightsThe "Dark Forest" is not just a cosmological metaphor, but a description of modern civilization's hidden dangers. Neil Davies explains that today's world operates like a Dark Forest where exposure — making oneself legible or visible — invites predation. This framework reshapes how individuals and groups must think about security, trust, and survival, particularly in an environment thick with scams, misinformation, and parasitic actors accelerated by the Internet.Immune function and intelligence function have fused in both biological and societal contexts. Davies draws a parallel between decentralized organisms like anthills and modern human society, suggesting that intelligence and immunity are inseparable functions in highly interconnected systems. This fusion means that detecting threats, maintaining identity, and deciding what to incorporate or reject is now an active, continuous cognitive and social process.Cryptographic tools are becoming essential for basic trust and survival. With the rise of scams that mimic legitimate authority figures and institutions, Davies highlights how cryptographic attestation — and eventually more sophisticated tools like zero-knowledge proofs — will become fundamental. Without cryptographically verifiable communication, distinguishing real demands from predatory scams may soon become impossible, especially as AI-generated deception grows more convincing.Institutions are hollowing out, but will not disappear entirely. Rather than a sudden collapse, Davies envisions a future where legacy institutions like universities, corporations, and governments persist as "zombie" entities — still exerting influence but increasingly irrelevant to new forms of social organization. Meanwhile, smaller, nimble "patchwork" tribes and digital-first associations will become more central to human coordination and identity.Modern universities have drifted far from their original purpose and structure. Tracing the history from medieval student guilds to Humboldt's 19th-century research universities, Davies notes that today's universities are heavily compromised by state agendas, mass democracy, and financialization. True inquiry and intellectual aloofness — once core to the ideal of the university — now require entirely new, post-institutional structures to be viable.Artificial intelligence amplifies both opportunity and epistemic risk. Davies warns that large language models (LLMs) mainly recombine existing information rather than generate truly novel insights. Moreover, they can be trapdoored or poisoned at the data level, introducing dangerous, invisible vulnerabilities. This creates a new kind of "Dark Forest" risk: users must assume that any received information may carry unseen threats or distortions.There is no longer a reliable central authority for epistemic trust. In a fragmented world where Wikipedia is compromised, traditional media is polarized, and even scientific institutions are politicized, Davies asserts that we must return to "epistemic hygiene." This means independently verifying knowledge where possible and treating all claims — even from AI — with skepticism. The burden of truth-validation increasingly falls on individuals and their trusted, cryptographically verifiable networks.
Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.
Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Lords: * Andi * Casey Topics: * Lifehacks as communion with the divine * I decided to fire my computer * Winston is starting to forget things Microtopics: * A Star Trek watchalong podcast that doesn't exist yet. * Positing that what you said is no longer an NDA violation by the time this episode comes out. * Plugging a fake game that you worked on. * Astrobot. * Horror movie clinky noises that you can't hear over the PS4 fan noises. * Caffeine-infused mints with Tux the Penguin branding on Think Geek dot com. * The pre-eminent source for Life Hacks. * Using a hotel shower cap to bake bread. * Anime girls that are happy to see you. * That one time Film Crit Hulk broke character. * The joy of moving efficiently through the world. * More efficient ways to set the microwave timer. * Hotel rooms that you can bake bread in. * Whether bread should contain hair. * Tricking yourself into not being bored while doing something you have to do. * Reading 50 life hacks and applying none of them because. * Viral Life Hack that's killed 33 people. * A life hack that already had a body count in the double digits before someone made a TikTok about it. * Getting really fed up with computers. * Cryptographic signing processes that you can't participate in. * The HDCP certification board taking steps to ensure nobody can take a screen shot of their Crunchy Roll anime. * The analog hole. * Open source web browsers that can't see DRM content. * Microsoft-authenticated Linux installations. * Designing a circuit that solves a math problem. * Stamping a circuit onto your circuit clay. * An independent circuit re-implementation of video game hardware. * Should you use FPGA to do a thing? * Ridiculous multi-level memory caching systems. * Bootstrapping an FPGA design tool that runs on an FPGA device. * Every single circuit doing something on every single cycle. * Voltages going high and/or low. * Making a bunch of CPUs and testing them afterwards to see how many GHz they have. * Why the PS3 Cell processor had 7 SPUs * The industrial uses of the Cell processor. * A GLSL compiler that outputs FPGA circuits. * Mr. MiSTer. * Open-hardware laptops. * Inventing an open-source GPU. * Multics or Minix. * Writing a Breakout clone in Rust targeting the weird CPU your friend just invented. * Making a terrible first effort that is the right kind of good enough. * A laptop that has a FPGA where the CPU/GPU usually goes. * 1970s-era TV games. * The Epoch Cassette Vision. * A game console with interchangeable cartridges where the CPU is on the cartridge. * The Glasgow Interface Explorer. * Describing your FPGA circuit in Python. * Manufacturing homebrew Cassette Vision Homebrew cartridges for the audience of zero Cassette Vision owners. * Making art just for you, in the most overly elaborate and overly complicated way possible. * The programmer equivalent of going to swim with the dolphins. * Diagonal pixels. * Childhood amnesia. * Remembering your memories. * Using 10% of your brain. (And also the other 90%.) * Knowing things about stuff. * When one brother dies, the other brother gets their memories. * Memories that are formed before vs. after you learn to talk. * Being persecuted for being friends with a girl. * Rules of heteronormativity being enforced by three year olds. * Getting off of Wordpress.
This is my conversation with Jim Posen, the Cofounder and CTO at Irreducible.Timestamps:- (00:00:00) intro- (00:01:12) getting deeper into cryptography- (00:07:06) revisiting binary fields- (00:15:50) building the verifiable internet- (00:26:14) sponsor: Splits- (00:26:57) revival of binary fields- (00:38:55) Binius- (00:42:46) bringing Binius to production- (00:48:27) creating new hardware- (00:53:57) getting to v1- (01:02:03) Ethereum stateless proofs and zkVMs- (01:13:21) outroLinks:- Jim on X: https://x.com/jimpo_potamus- Jim on Github: https://github.com/jimpo- Irreducible: https://www.irreducible.com/- Binius: a Hardware-Optimized SNARK: https://www.irreducible.com/posts/binius-hardware-optimized-snark- Binary Tower Fields are the Future of Verifiable Computing: https://www.irreducible.com/posts/binary-tower-fields-are-the-future-of-verifiable-computingThank you to our sponsor for making this podcast possible:- Splits: https://splits.orgInto the Bytecode:- Sina Habibian on X: https://twitter.com/sinahab- Sina Habibian on Farcaster - https://warpcast.com/sinahab- Into the Bytecode: https://intothebytecode.comDisclaimer: this podcast is for informational purposes only. It is not financial advice nor a recommendation to buy or sell securities. The host and guests may hold positions in the projects discussed.
Brandon Karpf sits down with Mike Silverman, Chief Strategy and Innovation Officer at FS-ISAC, to discuss the white paper Building Cryptographic Agility in the Financial Sector. Authored by experts from FS-ISAC's Post-Quantum Cryptography Working Group, the paper addresses the vulnerabilities posed by quantum computing to current cryptographic algorithms. It provides financial institutions with strategies to safeguard sensitive data and maintain trust as these emerging threats evolve. Discover the challenges and actionable steps to build cryptographic agility in this insightful conversation. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join host James Maude as he talks all things cryptography with Sophie Schmieg, a Staff Information Security Engineer at Google. In this episode, Sophie shares her journey from pure mathematics to applied cryptography, revealing how her background in algebraic geometry provides a distinctive approach to modern security challenges. From discovering major vulnerabilities in AWS to creating solutions that will last until the year 909,000, Sophie breaks down complex cryptographic concepts with clarity and humor. She offers invaluable insights into post-quantum cryptography, the real-world implications of quantum computing, and why you probably don't need that quantum random number generator.
"The server owns your data, owns your account, and owns the cryptographic keys used to secure it. That last bit is obscure, but important. Cryptographic keys are how we enforce security, privacy, ownership, and control in software. Not your keys, not your data."— Gordon Brander What is the key to achieving true freedom and autonomy in our digital lives? We have tried so many times and continue to learn lessons as the natural progression of networks reconsolidates around a central entity or oligopoly that soon turns from providing a service, to exerting its power. Why does this happen and how do we prevent it? Is it inevitable, or are we watching the slow evolution and failing to simply see the clear path it is leading us toward? Today we dive into a fantastic article by Gordon Brander on the evolution of networks, and the emergence of Nostr. **Check out the original article at Nature's many attempts to evolve a Nostr. (Link: https://tinyurl.com/42xa4t4h)Host Links Guy on Nostr (Link: http://tinyurl.com/2xc96ney) Guy on X (Link: https://twitter.com/theguyswann) Guy on Instagram (Link: https://www.instagram.com/theguyswann) Guy on TikTok (Link: https://www.tiktok.com/@theguyswann) Guy on YouTube (Link: https://www.youtube.com/@theguyswann) Bitcoin Audible on X (Link: https://twitter.com/BitcoinAudible) The Guy Swann Network Broadcast Room on Keet (Link: https://tinyurl.com/3na6v839) Check out our awesome sponsors! Get 5% off the COLDCARD with code BITCOINAUDIBLE (Link: https://bitcoinaudible.com/coldcard) Trying to BUY BITCOIN? River, secure, trusted, bitcoin only, lightning enabled, simple. (Link: https://bitcoinaudible.com/river) Swan: The best way to buy, learn, and earn #Bitcoin (Link: https://swanbitcoin.com) Bitcoin Games! Get 10% off the best Bitcoin board game in the world, HODLUP! Or any of the other great games from the Free Market Kids! Use code GUY10 at checkout for 10% off your cart! (Link: https://www.freemarketkids.com/collections/games-1) Bitcoin Custodial Multisig Want to get into Bitcoin but not ready for self custody? Use custodial multisig for the best way to distribute trust across multiple institutions and even jurisdictions! Check out OnRamp. (Link: BitcoinAudible.com/onramp) Education & HomeSchooling Get the lesson in real economics that you never got in school, and teach your kids the truth, not the statist insanity that is Keynesianism. Liberty Classroom is the invaluable resource you are looking for! (Link: BitcoinAudible...
Dr. Jerome Corsi, a Harvard trained political scientist, reporter for World Net Daily and a New York Times best-selling author, who is also a co-founder of God's Five Stones Topic: are there Cryptographic algorithms designed to steal the 2024 election Website: TheTruthCentral.com Book: https://www.amazon.com/Assassination-President-John-Kennedy-Headshots/dp/B0CXLN1PX1 Social Media: https://twitter.com/corsijerome1?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor https://www.facebook.com/drjeromecorsi/ https://www.instagram.com/jerome_corsi/?hl=en Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we discuss Julian Assange's book "Freedom and the Future of the Internet", which details Assange's case for how nature favors encryption, we are living under Marshall law wrt our communication, and how the outlook is grim but not hopeless. We have an email and would love to hear from you, if you're so compelled: plausibledeniabilityamx@gmail.com Disclaimer: All opinions are our own, respectively, and don't represent any institution we may or may not be a part of, respectively.
Dr. Jerome Corsi, Harvard educated PhD is an expert in data analytics and explains how crypotographic algorithms have been discovered in official voter registration databases in NY, OH, WI and possibly NJ, PA, HI and TX. Secretaries of State are unwilling to address or acknowledge the issue even though hese algorithms violate state and federal laws.You can fight the steal by having county election supervisors refuse to certify their county elections, because of these findings.You can find more of the research and reports at: https://GodsFiveStones.com---------------------------------SPONSORS FOR THIS VIDEO❤️ Cardio Miracle - Boost your energy, help support your immune system, and improve your mental clarity-plus use promo code GRIT and save 10% on your order https://cardiomiracle.myshopify.com/discount/GRIT
Dr. Jerome Corsi is a co-founder of God's Five Stones (https://godsfivestones.com/). Having received his Ph.D. from Harvard University's Department of Government in 1972, Jerome R. Corsihas published over thirty books on economics, history, and politics, including six New York Times bestsellers, two at number one. Jerome Corsi, Ph.D WARNS Cryptographic algorithms designed to steal the 2024 election!
While Dr. Jerome Corsi and Andrew Paquette continue to investigate and find corrupt algorithms in more states' voter rolls, officials are not taking them seriously to the detriment of election integrity. Dr. Corsi goes in-depth on what's happening, the latest with the probe and thoughts about these state officials' attitudes toward the dangerous algorithms on The Truth CentralIf you would like to donate to help Dr. Corsi's and Andrew Paquette's efforts to seek out and expose corrupt algorithms in states' voter databases, visit https://www.godsfivestones.comIf you like what we are doing, please support our Sponsors:Get RX Meds Now: https://www.getrxmedsnow.comMyVitalC https://www.thetruthcentral.com/myvitalc-ess60-in-organic-olive-oil/Swiss America: https://www.swissamerica.com/offer/CorsiRMP.phpGet Dr. Corsi's new book, The Assassination of President John F. Kennedy: The Final Analysis: Forensic Analysis of the JFK Autopsy X-Rays Proves Two Headshots from the Right Front and One from the Rear, here: https://www.amazon.com/Assassination-President-John-Kennedy-Headshots/dp/B0CXLN1PX1/ref=sr_1_1?crid=20W8UDU55IGJJ&dib=eyJ2IjoiMSJ9.ymVX8y9V--_ztRoswluApKEN-WlqxoqrowcQP34CE3HdXRudvQJnTLmYKMMfv0gMYwaTTk_Ne3ssid8YroEAFg.e8i1TLonh9QRzDTIJSmDqJHrmMTVKBhCL7iTARroSzQ&dib_tag=se&keywords=jerome+r.+corsi+%2B+jfk&qid=1710126183&sprefix=%2Caps%2C275&sr=8-1Join Dr. Jerome Corsi on Substack: https://jeromecorsiphd.substack.com/Visit The Truth Central website: https://www.thetruthcentral.comGet your FREE copy of Dr. Corsi's new book with Swiss America CEO Dean Heskin, How the Coming Global Crash Will Create a Historic Gold Rush by calling: 800-519-6268Follow Dr. Jerome Corsi on X: @corsijerome1Become a supporter of this podcast: https://www.spreaker.com/podcast/the-truth-central-with-dr-jerome-corsi--5810661/support.
Spotify link... https://open.spotify.com/show/2nq6d35q9nFAFlanaJc2Do iTunes link... https://podcasts.apple.com/us/podcast/on-life-being-human/id1360368906 Continue reading Ep 337 – The Fourth Era Of Truth Spoken Measured Computed Cryptographic at Dr. Kathryn Colleen, PhD RMT.
An official report has been filed in Ohio as a cryptographic algorithm was found in the Ohio State Board of Elections' voter rolls. Dr. Corsi focuses in on this finding, the state's investigation, his probe and Andrew Paquette's findings within Ohio's official voter database code in this episode of The Truth CentralIf you like what we are doing, please support our Sponsors:Get RX Meds Now: https://www.getrxmedsnow.comMyVitalC https://www.thetruthcentral.com/myvitalc-ess60-in-organic-olive-oil/Swiss America: https://www.swissamerica.com/offer/CorsiRMP.phpGet Dr. Corsi's new book, The Assassination of President John F. Kennedy: The Final Analysis: Forensic Analysis of the JFK Autopsy X-Rays Proves Two Headshots from the Right Front and One from the Rear, here: https://www.amazon.com/Assassination-President-John-Kennedy-Headshots/dp/B0CXLN1PX1/ref=sr_1_1?crid=20W8UDU55IGJJ&dib=eyJ2IjoiMSJ9.ymVX8y9V--_ztRoswluApKEN-WlqxoqrowcQP34CE3HdXRudvQJnTLmYKMMfv0gMYwaTTk_Ne3ssid8YroEAFg.e8i1TLonh9QRzDTIJSmDqJHrmMTVKBhCL7iTARroSzQ&dib_tag=se&keywords=jerome+r.+corsi+%2B+jfk&qid=1710126183&sprefix=%2Caps%2C275&sr=8-1Join Dr. Jerome Corsi on Substack: https://jeromecorsiphd.substack.com/Visit The Truth Central website: https://www.thetruthcentral.comGet your FREE copy of Dr. Corsi's new book with Swiss America CEO Dean Heskin, How the Coming Global Crash Will Create a Historic Gold Rush by calling: 800-519-6268Follow Dr. Jerome Corsi on X: @corsijeromeOur link to where to get the Marco Polo 650-Page Book on the Hunter Biden laptop & Biden family crimes free online:https://www.thetruthcentral.com/marco-polo-publishes-650-page-book-on-hunter-biden-laptop-biden-family-crimes-available-free-online/Become a supporter of this podcast: https://www.spreaker.com/podcast/the-truth-central-with-dr-jerome-corsi--5810661/support.
Guests: Dr. Jerome Corsi - National Renowned Author and Political Science expert, including the recent book God's Five Stones Jaime Brennan, Candidate for Frederick County Board of Education Dr. Corsi shares how his associate Dr. Paquette has identified a cryptographic methodology that explains the thousands of excessive last minute ballots through mail in ballots have overcome our elections.See omnystudio.com/listener for privacy information.
One seldom discussed consequence of quantum computers and PQC is the move from cryptographic homogeneity to cryptographic heterogeneity, with multiple KEMs and DSAs eventually expected as ongoing standards. We examine the consequences of this change.
Episode 129I spoke with Kristin Lauter about:* Elliptic curve cryptography and homomorphic encryption* Standardizing cryptographic protocols* Machine Learning on encrypted data* Attacking post-quantum cryptography with AIEnjoy—and let me know what you think!Kristin is Senior Director of FAIR Labs North America (2022—present), based in Seattle. Her current research areas are AI4Crypto and Private AI. She joined FAIR (Facebook AI Research) in 2021, after 22 years at Microsoft Research (MSR). At MSR she was Partner Research Manager on the senior leadership team of MSR Redmond. Before joining Microsoft in 1999, she was Hildebrandt Assistant Professor of Mathematics at the University of Michigan (1996-1999). She is an Affiliate Professor of Mathematics at the University of Washington (2008—present). She received all her advanced degrees from the University of Chicago, BA (1990), MS (1991), PhD (1996) in Mathematics. She is best known for her work on Elliptic Curve Cryptography, Supersingular Isogeny Graphs in Cryptography, Homomorphic Encryption (SEALcrypto.org), Private AI, and AI4Crypto. She served as President of the Association for Women in Mathematics from 2015-2017 and on the Council of the American Mathematical Society from 2014-2017.Find me on Twitter for updates on new episodes, and reach me at editor@thegradient.pub for feedback, ideas, guest suggestions. I spend a lot of time on this podcast—if you like my work, you can support me on Patreon :) You can also support upkeep for the full Gradient team/project through a paid subscription on Substack!Subscribe to The Gradient Podcast: Apple Podcasts | Spotify | Pocket Casts | RSSFollow The Gradient on TwitterOutline:* (00:00) Intro* (01:10) Llama 3 and encrypted data — where do we want to be?* (04:20) Tradeoffs: individual privacy vs. aggregated value in e.g. social media forums* (07:48) Kristin's shift in views on privacy* (09:40) Earlier work on elliptic curve cryptography — applications and theory* (10:50) Inspirations from algebra, number theory, and algebraic geometry* (15:40) On algebra vs. analysis and on clear thinking* (18:38) Elliptic curve cryptography and security, algorithms and concrete running time* (21:31) Cryptographic protocols and setting standards* (26:36) Supersingular isogeny graphs (and higher-dimensional supersingular isogeny graphs)* (32:26) Hard problems for cryptography and finding new problems* (36:42) Guaranteeing security for cryptographic protocols and mathematical foundations* (40:15) Private AI: Crypto-Nets / running neural nets on homomorphically encrypted data* (42:10) Polynomial approximations, activation functions, and expressivity* (44:32) Scaling up, Llama 2 inference on encrypted data* (46:10) Transitioning between MSR and FAIR, industry research* (52:45) An efficient algorithm for integer lattice reduction (AI4Crypto)* (56:23) Local minima, convergence and limit guarantees, scaling* (58:27) SALSA: Attacking Lattice Cryptography with Transformers* (58:38) Learning With Errors (LWE) vs. standard ML assumptions* (1:02:25) Powers of small primes and faster learning* (1:04:35) LWE and linear regression on a torus* (1:07:30) Secret recovery algorithms and transformer accuracy* (1:09:10) Interpretability / encoding information about secrets* (1:09:45) Future work / scaling up* (1:12:08) Reflections on working as a mathematician among technologistsLinks:* Kristin's Meta, Wikipedia, Google Scholar, and Twitter pages* Papers and sources mentioned/referenced:* The Advantages of Elliptic Curve Cryptography for Wireless Security (2004)* Cryptographic Hash Functions from Expander Graphs (2007, introducing Supersingular Isogeny Graphs)* Families of Ramanujan Graphs and Quaternion Algebras (2008 — the higher-dimensional analogues of Supersingular Isogeny Graphs)* Cryptographic Cloud Storage (2010)* Can homomorphic encryption be practical? (2011)* ML Confidential: Machine Learning on Encrypted Data (2012)* CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy (2016)* A community effort to protect genomic data sharing, collaboration and outsourcing (2017)* The Homomorphic Encryption Standard (2022)* Private AI: Machine Learning on Encrypted Data (2022)* SALSA: Attacking Lattice Cryptography with Transformers (2022)* SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets* SALSA VERDE: a machine learning attack on LWE with sparse small secrets* Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors* The cool and the cruel: separating hard parts of LWE secrets* An efficient algorithm for integer lattice reduction (2023) Get full access to The Gradient at thegradientpub.substack.com/subscribe
Summary In this week's episode Anna (https://x.com/AnnaRRose) and Nico (https://x.com/nico_mnbl) chat with Alessandro Chiesa (https://ic-people.epfl.ch/~achiesa/), Associate Professor at EPFL and Eylon Yogev (https://eylonyogev.com/), Professor at Bar-Ilan University. They discuss their recent publication; Building Cryptographic Proofs from Hash Functions (https://snargsbook.org/), which provides a comprehensive and rigorous treatment of cryptographic proofs and goes on to analyze notable constructions of SNARGs based on ideal hash functions. Here's some additional links for this episode: Building Cryptographic Proofs from Hash Functions by Chiesa and Yogev (https://snargsbook.org/) Episode 200: SNARK Research & Pedagogy with Alessandro Chiesa (https://zeroknowledge.fm/episode-200-snark-research-pedagogy-with-alessandro-chiesa/) Barriers for Succinct Arguments in the Random Oracle Model by Chiesa and Eylon Yogev (https://eprint.iacr.org/2020/1427.pdf) STIR: Reed–Solomon Proximity Testing with Fewer Queries by Arnon, Chiesa, Fenzi and Eylon Yogev (https://eprint.iacr.org/2024/390.pdf) ZK Podcast Episode 321: STIR with Gal Arnon & Giacomo Fenzi (https://zeroknowledge.fm/321-2/) Computationally Sound Proofs by Micali (https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Proof%20Systems/Computationally_Sound_Proofs.pdf) Tight Security Bounds for Micali's SNARGs by Chiesa and Yogev (https://eprint.iacr.org/2021/188.pdf) Interactive Oracle Proofs by Ben-Sasson, Chiesa, and Spooner (https://eprint.iacr.org/2016/116.pdf) Summer School on Probabilistic Proofs: Foundations and Frontiers of Probabilistic Proofs in Zürich, Switzerland (https://www.slmath.org/summer-schools/1037) Proofs, Arguments, and Zero-Knowledge by Thaler (https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.pdf) ZK HACK Discord and Justin Thaler Study Club (https://discord.gg/Nw7PKJ7e) Justin Thaler Study Club by ZK HACK on YouTube (https://www.youtube.com/playlist?list=PLj80z0cJm8QEmZkGgSOLpr_8B08SCWVQ7) Subquadratic SNARGs in the Random Oracle Model by Chiesa and Yogev (https://eprint.iacr.org/2021/281.pdf) ZK Learning Course (https://zk-learning.org/) ZK Hack Montreal has been announced for Aug 9 - 11! Apply to join the hackathon here (https://zk-hack-montreal.devfolio.co/). Episode Sponsors Launching soon, Namada (https://namada.net/) is a proof-of-stake L1 blockchain focused on multichain, asset-agnostic privacy, via a unified shielded set. Namada is natively interoperable with fast-finality chains via IBC, and with Ethereum using a trust-minimized bridge. Follow Namada on Twitter @namada (https://twitter.com/namada) for more information and join the community on Discord (http://discord.gg/namada). Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. As Aleo is gearing up for their mainnet launch in Q1, this is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at http://aleo.org/ (http://aleo.org/). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuM_g)
The fast-evolving quantum computing phenomenon represents a paradigm shift in how computers process data. Due to its ability to process vast amounts of data and solve complex problems at an unprecedented speed, quantum computing holds great promise for new material discovery through the simulation of physical systems, portfolio optimization in finance, and more. It also poses a significant threat to cybersecurity, requiring a change in how we encrypt our data. Even though quantum computers don't technically have the power to break most of the current forms of encryption yet, we need to stay ahead of the threat and come up with quantum-proof solutions now. If we wait until those powerful quantum computers start breaking our encryption, it will be too late. I had the pleasure of discussing the quantum computing phenomenon and its cybersecurity implications with Duncan Jones, Head of Cybersecurity, at Quantinuum. We discussed the potential threats and opportunities of quantum computing for cybersecurity, as well as its potential to revolutionize various industries. We recognized the need for new algorithms resistant to quantum computing, staying ahead of technological innovations, investing in cybersecurity measures, and prioritizing the migration of sensitive data to quantum-resistant algorithms. Action ItemsAssess organizational risk exposure from quantum computing threats like "store now decrypt later" attacks.Prioritize migration of sensitive long-term data to quantum-safe encryption.Speak to vendors about their roadmaps for quantum-safe migration.Explore available quantum random number generators and other quantum cybersecurity technologies through pilot programs and starter kits.Choose credible service providers who are partnering with reputed organizations and prove their claims.Raise awareness of quantum computing implications among leadership and get buy-in for piloting relevant quantum cybersecurity technologies.Time Stamps00:02 -- Introduction01:59 -- Guest's Professional Highlights06:19 -- Overview of Quantum Computing08:19 -- Commercially Leveraging Quantum Computing 10:51 -- Evolution of Quantum Computing and Cyber Attacks12:55 -- Recommendations on Leveraging Quantum Computing Benefits and Securing Data from Quantum Computing Enabled Cyber Attacks17:49 -- Roadmap for Proactive Safeguards23:34 -- Can quantum computing enabled encryption ensure that even if a human is a victim of a phishing attack, it will be hard to get into systems? Is that a fair aspiration? 26:38 -- What recommendations would you make for organizations who are trying to explore and adopt quantum computing?29:19 -- Cybersecurity Challenges and Hurdles32:52 -- Challenges of Quantum-Safe Migration34:09 -- Cryptographic debt37:32 -- Final ThoughtsMemorable Duncan Jones Quotes/Statements"I think of my career as a series of very fortunate accidents, rather than some very carefully planned out thing.""Quantum computing as a different form of computation, as opposed to necessarily always a better form of computation.""Leading companies are now starting to engage with quantum computing because they know they have to build the skill sets, they have to develop the intellectual property that will begin to deliver value in the not too distant future.""Quantum computers are becoming more and more powerful every year.""We'll actually see Quantum as a as a big benefit for cybersecurity, but we've got some headaches to get through...
The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President's desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden's liquor stores bare. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guests Learning Layer On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K's comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes: Cryptographic life cycle Cryptographic method Public key infrastructure (PKI). Industry Voices On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness. Selected Reading Rewards Up to $10 Million for Information on Iranian Hackers (GB Hackers) Congress passes bill that could ban TikTok after years of false starts (Washington Post) Russian hackers claim cyberattack on Indiana water plant (The Record) Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users (SOCRadar® Cyber Intelligence Inc.) Global attacker median dwell time continues to fall (Help Net Security) New Password Cracking Analysis Targets Bcrypt (SecurityWeek) North Korean Hackers Target Dozens of Defense Companies (Infosecurity Magazine) Hackers hijack antivirus updates to drop GuptiMiner malware (Bleeping Computer) Sweden's liquor shelves to run empty this week due to ransomware attack (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Max Ammann is a cybersecurity researcher at Trail of Bits, where he's recently been working on extending his Master's thesis work on fuzzing cryptographic protocols into an industrial-grade fuzzing tool. That work resulted in an S&P publication which is what he joined us to present today. This was a really good talk but also a great discussion, in large part because of the highly engaged audience (with representation from Galois, TwoSix, and academia!).
Today, we dusciss the Unsaflok hack by Ian Carroll and Lennert Wouters, exposing vulnerabilities in millions of hotel keycard locks. Then, switch gears to an unpatchable flaw in Apple's M-series chips that's left the tech world buzzing. We'll also touch on a cautionary tale from KDE, highlighting the risks lurking in the themes and extensions we often take for granted. Keywords: Unsaflok, Ian Carroll, Lennert Wouters, Saflok, Dormakaba, Apple M-series chips, encryption keys, KDE, cybersecurity Original Articles: https://www.wired.com/story/saflok-hotel-lock-unsaflok-hack-technique/ https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/ https://www.bleepingcomputer.com/news/linux/kde-advises-extreme-caution-after-theme-wipes-linux-users-files/ https://blog.davidedmundson.co.uk/blog/kde-store-content/ Engage with us as we dissect these groundbreaking discoveries, offering insights and practical advice on navigating the ever-evolving landscape of digital security. Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for This Episode: cybersecurity, hotel lock hack, Unsaflok, Apple M-series vulnerability, encryption keys, KDE theme incident, digital security, tech vulnerabilities, Ian Carroll, Lennert Wouters, Saflok, Dormakaba, Apple chip flaw, Linux security, KDE, RFID hacking, mobile security, password managers Search Phrases That Should Lead to This Episode: How to hack hotel keycard locks Unsaflok vulnerability details Apple M-series chip security flaw Encryption key vulnerabilities in tech KDE theme wipes user files incident Latest cybersecurity threats and hacks Saflok door lock hacking technique Ian Carroll and Lennert Wouters research Impact of Apple chip vulnerability on encryption Preventing KDE theme-related data loss Digital security insights and tips Exploring RFID keycard vulnerabilities Securing Apple devices against chip flaws Understanding Linux theme security risks Cybersecurity updates from Wired and Ars Technica Transcript: Mar 22 [00:00:00] offsetkeyz: Security researchers while partying in Las Vegas have cracked the code to unlock millions of hotel rooms. revealing a vulnerability in the widely used SAFLOCK keycards. I tell you what, that sounds like my kind of party. And now I know how to get into their hotel room. What does this mean for your next trip to Las Vegas? Other security researchers have just discovered a vulnerability in the Apple M Series chips that allows attackers to extract secret encryption keys. What can MacBook users do to reduce their risk? And a Linux user had his data wiped after installing a KDE theme for his personal computer. What is KDE doing to prevent this from happening again? So as reported by Wired Magazine, security researchers have revealed a hacking technique they're calling UnsafeLock that exposes an RFID [00:01:00] vulnerability in millions of SafeLock keycard locks. which allows the door to be unlocked within seconds. Now, I know you guys have seen the TikToks and the Instagram reels or YouTube shorts of Flipper Zero's unlocking hotel doors. Now, I hate to spoil it for you, but most of those are pre staged. They likely scanned their own hotel keycard. into their Flipper Zero and then just opened it, claiming they were hacking it. But this attack is real. It involves two key cards, which you can find laying around most Vegas hotels. In fact, the one I just stayed at lets you create your own hotel key in the lobby, and they just have them sitting around. So grab one of those, you can program it. It takes two. One rewrites a little bit of code in the lock, and then the second one unlocks it. The maker of these locks is working on fixes, but as of right now, only 36 percent of these vulnerable door locks have been fixed, which leaves a lot of [00:02:00] doors open. This exploit is publicly available online. So if you are staying in a Las Vegas hotel or any hotel that uses this type of locking mechanism, you can use an app called NFC Tag Info to check if your door is vulnerable. If it is, I recommend locking up. any valuables in the safes provided. And when you're in the room, use the deadbolt, or if you can, use that app to check if the hotel you're about to stay in is vulnerable, and try to find another hotel that doesn't use these safe lock locks. [00:02:33] Transition: Do do do do do do do. [00:02:38] offsetkeyz: A different group of security researchers just recently discovered a vulnerability in Apple's M series chips, or the Silicon series chips that have widely replaced their use of Intel chips, that allows attackers to extract certain encryption keys used in specific Cryptographic operations and the major bummer about this is that this [00:03:00] vulnerability is inherent to the chip and cannot be patched It's a hardware vulnerability. Those are the worst kind I'm learning this alongside you, and I'm recording onto a MacBook Pro with an M series chip, so I'm going to be doing my research on this one. Any mitigations to this would require changing the cryptographic software on the MacBook, which would seriously slow down the cryptographic processes. Specifically on the M1 and M2 models. I'm not sure what's going on with M3, but this article from Ars Technica, linked in the show notes below, calls out M1 and M2. The article by Ars Technica that reported this vulnerability doesn't specify what specific keys this is in reference to, but it does specify that this is applicable to all encryption methods on your M series Mac, to include those hardened for the anticipation of quantum computing. So we're thinking iMessage, end-to-end encryption, iCloud, and even the Apple Password [00:04:00] Manager. Sticking to the Las Vegas theme, this exploit does require a bit of luck. It requires an app to be installed and it to be running on the same cluster as the encryption. There's no evidence of this being exploited in the wild. Like I said, this was just security research, but hopefully Apple takes precautions to keep apps that might exploit this vulnerability off their app store. And you as the user be really careful when downloading apps that aren't from the Apple app store. And even if they are, do some research, don't jump into an app. And if you do have unused apps, on your Mac, it's probably best to remove them just as good practice. [00:04:38] Transition: Uh, uh, uh, uh, uh, uh, uh. [00:04:50] offsetkeyz: And finally, there was a recent incident on the KDE store, which is a Linux product of a user who downloaded a theme for their Linux [00:05:00] machine. When we're saying theme, we're literally talking like cute colors and new behaviors, but when you download these themes, and all operating systems are the same, code is run to set them up. Like, a script will go in and change the colors, or change the background, or do all these things on your computer. It just so happened that the theme this user downloaded wiped all of his data. This was originally reported by Bleeping Computer, but one of the developers on the KDE store also published to their blog saying they're going to work on ways to prevent this, but he warns this is going to take a lot of resources that they don't have at the moment, so he cautions to be extra careful when downloading these themes, or any themes, off the internet. I'm gonna take it one step further and caution you to not download themes off the internet. I definitely recognize the appeal, especially as Linux users, the themes tend to be pretty bland, but the risk [00:06:00] just doesn't quite add up to the reward of having a cool theme. And that's all we've got for you today. Happy Friday. Hope you have a great weekend and we will talk to you some more next week!
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Planning to build a cryptographic box with perfect secrecy, published by Lysandre Terrisse on January 1, 2024 on LessWrong. Summary Since September 2023, I started learning a lot of math and programming skills in order to develop the safest cryptographic box in the world (and yes, I am aiming high). In these four months, I learned important things you may want to know: Fully Homomorphic Encryption (FHE) schemes with perfect secrecy do exist. These FHE schemes do not need any computational assumption. These FHE schemes are tractable (in the worst case, encrypting a program before running it makes it three times slower). We can therefore run infinitely dangerous programs without obtaining any information about them or their outputs. This may be useful in order to run a superintelligence without destroying the world. However, these schemes work only on quantum computers. In this post, I will firstly talk about how I learned about this FHE scheme, then I will explain my plan for making this cryptographic box, and finally, I will mention some ethical concerns about this cryptographic box. Before reading this post, I recommend you to read this post by Paul Christiano, and the comments that go with it. These are very informative, and they sharpened my views for this project. Paul Christiano presents a way to extract a friendly AI from an unfriendly one. This being only one example of what can be done with a cryptographic box, I will mostly consider cryptographic boxes as a solution to a problem that I call the malign computation problem. Introduction In August 2022, I started reading AGI Safety Literature Review. At one point, the authors tell this: One way to box an AGI is to homomorphically encrypt it. Trask (2017) shows how to train homomorphically encrypted neural networks. By homomorphically encrypting an AGI, its predictions and actions also come out encrypted. A human operator with the secret key can choose to decrypt them only when he wants to. When I have read this for the first time, I told myself that I should check this work because it seemed important. And then I completely forgot about it. Then, in April 2023, during a PHP lesson, I realized that the problem of processing a request made by a malevolent user is similar to the problem of boxing a superintelligence. After the lesson, I asked the teacher how to prevent code injections, and he gave me two answers: Do not show your code to the public. This answer didn't convince me, because even current hackers know how to go around this precaution. Encrypt the request before processing it. This is the moment I remembered the quote from AGI Safety Literature Review. After looking back at every note that I made about AI Safety, I managed to find back the work made by Trask. Trask's work Trask's post shows how to build an encrypted AI using the Efficient Integer Vector Homomorphic Encryption. However, since this scheme (along with every other FHE scheme I know about on classical computers) relies on computational assumptions, we have some problems: The scheme may not be safe. A computational assumption consists of stating "There is no efficient way to solve this problem". However, we do not know how to prove any such statement, as this would solve the PNP problem. Most FHE schemes (including this one) depend on the Learning With Errors (LWE) problem. Although LWE is quite secure for the moment, I won't bet the existence of all life on Earth on it. Similarly, I won't bet the safety of a superintelligence on it. This scheme takes too long to compute. In practice, the first superintelligence will probably have more than a hundred billion weights and biases, making this scheme very expensive or even unusable. This scheme isn't fully homomorphic. Basically, a cryptographic scheme is said to be homomorphic when we can run s...
In this week's episode, Anna (https://twitter.com/annarrose) and Nico (https://twitter.com/nico_mnbl) interview Or Sattath (https://twitter.com/or_sattath), Assistant Professor at the Ben-Gurion (https://cris.bgu.ac.il/en/persons/or-sattath) University in the Computer Science department. This is the 2nd episode with Or on this show, continuing the conversation around Quantum Cryptography. This time, he describes how we can transition from a pre-quantum to a post-quantum environment, looking at existing systems like Bitcoin and Ethereum. He covers why the methods used in the transition will be important, techniques on how this could be executed and the challenges in designing these techniques and the complications that can arise. Finally, they go on to discuss Quantum Money and recent works in this area. Here's some additional links for this episode: Part 1 - Episode 288: Quantum Cryptography with Or Sattath (https://zeroknowledge.fm/288-2/) Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer by Shor (https://arxiv.org/abs/quant-ph/9508027) Shor's Algorithm (https://quantum-computing.ibm.com/composer/docs/iqx/guide/shors-algorithm) Grover's Algorithm (https://quantum-computing.ibm.com/composer/docs/iqx/guide/grovers-algorithm) A fast quantum mechanical algorithm for database search by Grover (https://arxiv.org/abs/quant-ph/9605043) Fawkescoin: A cryptocurrency without public-key cryptography by Bonneau and Miller (https://jbonneau.com/doc/BM14-SPW-fawkescoin.pdf) Bitcoin is not quantum-safe, and how we can fix it when needed by Buterin (https://bitcoinmagazine.com/technical/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150) Cryptographic canaries and backups by Justin Drake (https://ethresear.ch/t/cryptographic-canaries-and-backups/1235) Notes and recommended links by Or Sattath: NIST post-quantum standardization (https://csrc.nist.gov/Projects/post-quantum-cryptography) for post-quantum digital signatures and public-key encryption (or, more precisely, Key Encapsulation Mechanism, KEM). These are classical schemes that, unlike almost all the existing schemes that are used in practice, are secure against quantum adversaries. Signature Lifting (arXiv link) (https://arxiv.org/abs/2303.06754) is discussed as a technique to migrate to post-quantum signatures, especially for those who didn't prepare in advance. Here's a recommended Twitter thread (https://twitter.com/DesheShai/status/1635599973269098499) summarizing the results by Shai Wyborski, Or's co-author. An approach to upgrade Bitcoin to quantum money is available here (https://arxiv.org/abs/2002.11998). This uses a cryptographic primitive which is called quantum lightning, which was introduced here (https://eprint.iacr.org/2017/1080.pdf). Some smart contacts capabilities can be supported (https://arxiv.org/abs/2204.12806) as well. This construction is based on one-shot signatures (https://eprint.iacr.org/2020/107), which isdiscussed in some detail during the interview. The bottom line of this work is that we can have the most important utility that Bitcoin provides, without the need for a blockchain, or any other consensus mechanism. Uncloneable cryptography (https://arxiv.org/abs/2210.14265) was discussed during the interview. Quantum encryption with certified deletion (https://arxiv.org/abs/1910.03551) was discussed as an interesting example of a property that can be achieved only in quantum cryptography. Applications are now open to attend zkHack Istanbul - Nov 10-12! Apply here: https://www.zkistanbul.com/ (https://www.zkistanbul.com/) Aleo (http://aleo.org/) is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. As Aleo is gearing up for their mainnet launch in Q4, this is an invitation to be part of a transformational ZK journey. Dive deeper and discover more about Aleo at aleo.org (http://aleo.org/) If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on YouTube (https://zeroknowledge.fm/)
I'm joined by guests James O'Beirne & Rijndael to discuss CTV. Discussion Topics 00:01:23 Guest intros 00:01:58 Recap 00:03:10 Technical overview of covenants 00:14:41 Watchtowers 00:16:16 Use cases for vaulting & scripts 00:21:53 Use cases for vaulting & scripts 00:26:10 Covenants as a solution to third party 00:27:42 Covenants and censorship risks 00:33:24 Covenants and censorship risks 00:34:07 Risks of major Bitcoin changes 00:39:39 Cryptographic improvements of CTV 00:40:14 Quantifying the scale of change in code 00:46:52 TX hash 00:49:04 Simplicity of CTV 00:50:19 The consensus deadlock 00:55:34 Social coordination and activation 01:05:55 Speedy trial - good or bad for Bitcoin? 01:16:00 Problems with Bitcoin core defaults 01:18:18 The politics of changing Bitcoin 01:23:36 Testing for consensus 01:28:37 State sabotage 01:31:56 Moving forward with activation 01:36:48 State of development and economic 01:53:04 Bitcoin.Review going late night call 01:54:04 Next steps 01:59:58 Bitcoin politics closing summary 02:01:38 Closing thoughts Links & Contacts Website: https://bitcoin.review/Podcast Twitter: https://twitter.com/bitcoinreviewhq NVK Twitter: https://twitter.com/nvk Telegram: https://t.me/BitcoinReviewPod Email: producer@coinkite.com Nostr & LN:⚡nvk@nvk.org (not an email!) Full show notes: https://bitcoin.review/podcast/episode-52
In this episode, Nathan sits down with Daniel Kang, Assistant Professor of Computer Science at the University of Illinois. Kang has done pioneering work bringing zero knowledge cryptographic proofs to AI. In this episode, they chat about the cryptographic theory behind Daniel's work, how cryptography allows us to balance the tradeoff between privacy and authenticity, and how cryptography usage is needed in a world where LLMs are increasingly embedded into our daily lives. If you're looking for an ERP platform, check out our sponsor, NetSuite: http://netsuite.com/cognitive RECOMMENDED PODCAST: Founding a business is just the tip of the iceberg; the real complexity comes with scaling it. On 1 to 1000, hosts Jack Altman and Erik Torenberg dig deep into the inevitable twists and turns operators encounter along the journey of turning an idea into a business. Hear all about the tactical challenges of scaling from the people that built up the world's leading companies like Stripe, Ramp, and Lattice. Our first episode with Eric Glyman of Ramp is out now: https://link.chtbl.com/1to1000 CALL FOR FEEDBACK: To borrow from a meme… we're in the podcast arena trying stuff. Some will work. Some won't. But we're always learning. http://bit.ly/TCRFeedback Fill out the above form to let us know how we can continue delivering great content to you or sending the feedback on your mind to tcr@turpentine.co. TIMESTAMPS: (00:00) Episode Preview (00:01:04) Nathan's Introduction (00:07:06) Motivation for bringing zero-knowledge proofs to AI (00:07:53) Verifying humanness without revealing personal information (00:10:27) Verifying model execution without revealing model details (00:12:42) Verifying medical AI services haven't been tampered with (00:13:51) Overview of zero-knowledge proof protocol (00:15:09) Sponsors: Netsuite | Omneky (00:18:54) Cryptographic hashes for commitments (00:22:42) Assumptions underlying cryptographic hashes (00:24:17) Hash collisions (00:25:20) Adding entropy through salting (00:26:24) Z case snarks and the proving process (00:31:00) Using lookup tables for nonlinearities (00:33:35) Floating point vs fixed point calculations (00:34:08) Quantizing models for efficiency (00:35:55) Using polynomials to represent arbitrary computations (00:37:26) What are finite fields? (00:41:23) Toxic waste for cryptographic secrecy (00:45:51) Computational costs (00:47:39) The experience of using a cryptography application to verify model output (00:49:05) Verification key doesn't reveal model weights (00:56:36) What using crypto infrastructure in AI enables and challenges to its implementation (01:01:26) Potential for 10-100x cost reductions (01:04:51) Authenticating images with attested cameras (01:11:56) How cryptography in AI could impact daily life (01:14:25) On-device credential verification (01:15:50) Potential for regulation of hardware authentication (01:18:52) Upcoming work to reduce proof costs LINKS: Daniel's website X/TWITTER: @daniel_d_kang (Daniel) @labenz (Nathan) @eriktorenberg @CogRev_Podcast SPONSORS: NetSuite | Omneky NetSuite has 25 years of providing financial software for all your business needs. More than 36,000 businesses have already upgraded to NetSuite by Oracle, gaining visibility and control over their financials, inventory, HR, eCommerce, and more. If you're looking for an ERP platform ✅ head to NetSuite: http://netsuite.com/cognitive and download your own customized KPI checklist. Omneky is an omnichannel creative generation platform that lets you launch hundreds of thousands of ad iterations that actually work customized across all platforms, with a click of a button. Omneky combines generative AI and real-time advertising data. Mention "Cog Rev" for 10% off. Music Credit: GoogleLM
In this Brand Story podcast episode, host Sean Martin is joined by guest Marc Manzano from SandboxAQ. They explore the importance of future-proofing cryptography and the emerging field of quantum-resistant cryptography.The conversation revolves around the challenges of migrating to new cryptographic algorithms and the unknowns surrounding this process. They discuss how NIST is leading the way in defining new standards and the need for organizations to prepare for the upcoming changes. Marc introduces Sandwich, a meta library developed by SandboxAQ, which provides cryptographic agility and an easy-to-use API for secure application development with cryptography capabilities built-in. Marc explains how developers can download and build Sandwich, customize it with specific ingredients or features, and integrate it into their application development environment.In addition to Sandwich, the Security Suite by SandboxAQ is highlighted as a tool to help organizations modernize cryptography management. It provides visibility into where and how cryptography is used, along with modules for observability, compliance, and remediation. The Security Suite also offers optimization of cryptographic operations to reduce resource consumption and improve performance.Sean and Marc also touch on the challenges organizations face in understanding and implementing encryption and the collaboration between developers and security teams in managing encryption within the broader engineering and security operating environment. They discuss how Sandwich can help overcome hurdles and elevate security posture, allowing developers to focus on application development while the framework takes care of security.Overall, this episode provides insights into the evolving field of quantum-resistant cryptography, the importance of secure application development with cryptography at its core, and the role of tools like Sandwich and the Security Suite in enhancing cybersecurity practices, all aiming to educate listeners on the challenges and solutions in cryptography management.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Marc Manzano, Senior Director - Quantum Security, SandboxAQ [@SandboxAQ]On Linkedin | https://www.linkedin.com/in/marcmanzano/On Twitter | https://twitter.com/marcmanzanoResourcesLearn more about SandboxAQ and their offering: https://itspm.ag/sandboxaq-j2enRead the Sandwich Press Release: https://itspm.ag/sandbonpdaSandwich on Github: https://itspm.ag/sandbo3zq1Learn more about Sandwich: https://itspm.ag/sandboqao6Try SandboxAQ Security Suite: https://itspm.ag/sandbob3gyRead the Security Suite Press Release: https://itspm.ag/sandboxb3e744For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this Brand Story podcast episode, host Sean Martin is joined by guest Marc Manzano from SandboxAQ. They explore the importance of future-proofing cryptography and the emerging field of quantum-resistant cryptography.The conversation revolves around the challenges of migrating to new cryptographic algorithms and the unknowns surrounding this process. They discuss how NIST is leading the way in defining new standards and the need for organizations to prepare for the upcoming changes. Marc introduces Sandwich, a meta library developed by SandboxAQ, which provides cryptographic agility and an easy-to-use API for secure application development with cryptography capabilities built-in. Marc explains how developers can download and build Sandwich, customize it with specific ingredients or features, and integrate it into their application development environment.In addition to Sandwich, the Security Suite by SandboxAQ is highlighted as a tool to help organizations modernize cryptography management. It provides visibility into where and how cryptography is used, along with modules for observability, compliance, and remediation. The Security Suite also offers optimization of cryptographic operations to reduce resource consumption and improve performance.Sean and Marc also touch on the challenges organizations face in understanding and implementing encryption and the collaboration between developers and security teams in managing encryption within the broader engineering and security operating environment. They discuss how Sandwich can help overcome hurdles and elevate security posture, allowing developers to focus on application development while the framework takes care of security.Overall, this episode provides insights into the evolving field of quantum-resistant cryptography, the importance of secure application development with cryptography at its core, and the role of tools like Sandwich and the Security Suite in enhancing cybersecurity practices, all aiming to educate listeners on the challenges and solutions in cryptography management.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Marc Manzano, Senior Director - Quantum Security, SandboxAQ [@SandboxAQ]On Linkedin | https://www.linkedin.com/in/marcmanzano/On Twitter | https://twitter.com/marcmanzanoResourcesLearn more about SandboxAQ and their offering: https://itspm.ag/sandboxaq-j2enRead the Sandwich Press Release: https://itspm.ag/sandbonpdaSandwich on Github: https://itspm.ag/sandbo3zq1Learn more about Sandwich: https://itspm.ag/sandboqao6Try SandboxAQ Security Suite: https://itspm.ag/sandbob3gyRead the Security Suite Press Release: https://itspm.ag/sandboxb3e744For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
If you start to dig into the origin story of cryptocurrency, don't be surprised if you find the ideas and values of the American Libertarian movement all over it. Finn Brunton teaches science and technology studies at UC Davis and is fascinated by the historical narratives and subcultures behind modern technology. His books include Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency and Spam: A Shadow History of the Internet (Infrastructures). Finn and Greg discuss how spammers and scammers were actually some of the earliest adopters of cryptocurrency, the American Libertarian roots in the movement, and the dark future cryptocurrency pioneers worried about. *unSILOed Podcast is produced by University FM.*Episode Quotes:Cryptographic algorithms as a weapons of war39:50: Cryptographic algorithms were classified as munitions, as weapons of war. Like you needed a foreign export license for them in the same way you would if you were selling tanks or something. So, as people were figuring out these sort of cryptographic primitives and fundamental algorithms and things like that, they started doing stuff like getting them printed on t-shirts because then you could be like, if I wear this t-shirt on an overseas flight, I am doing the equivalent of selling crates of AK-47s. And most famously, people got this extremely laconic version of this algorithm in a programming language called “perl” tattooed on themselves. And then you could say, my body is classified as a deadly weapon. You know, it's like this military device. So that tension, I think, is a really good tension for us to bear in mind as we look at how cryptocurrencies developed because part of their heritage was this awareness that strong civilian cryptography was seen as posing a genuine threat to the safety and security of the state.American libertarianism as an ideological strain of the history of cryptocurrency09:08: All of these different agendas for what technology should do represent different threads in libertarian, ideological ideas about what money should be and how society should operate. So that's part of what makes it so fascinating—that it's this new technology.What crypto as a whole shows10:01: To get certain kinds of technologies off the ground ,you can't just build the tech. You have to tell people about the future in which the tech is going to do something of value for them. And that kind of storytelling that media work is for me, where the rubber meets the road of these new technological ideas. And I saw both of them in crypto.On the value of science and technology studies01:01:05: What STS (Science and Technology Studies) provided was a space where all of these different areas, which are all adjacent, could have like a common center in the Venn diagram to meet up and hang out there, and part of what I love is that it gives you a passport to go and meet and learn from really interesting people in all kinds of different zones.Show Links:Recommended Resources:Gadsden FlagBitcoin: A Peer-to-Peer Electronic Cash System by Satoshi NakamotoThe Handmaid's Tale by Margaret AtwoodThis Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information by Andy GreenbergEnigma MachineExtropianismGuest Profile:Faculty Profile at UC DavisHis Work:Spam: A Shadow History of the Internet (Infrastructures)Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency
Cracking RSA in web traffic is primarily what people think of when they hear about the quantum threat to cryptography. But there are lots of protocols in peril, especially in a typical corporate environment. Join host Konstantinos Karagiannis for a chat with Suvi Lampila from SSH to find out how the security giant is working on securing data flows you may not have considered. For more on SSH communications security, visit www.ssh.com/. Visit Protiviti at www.protiviti.com/postquantum to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on Twitter and Instagram: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
A show that unpacks and dives deep into the latest trends, drama and news with some of the biggest names in crypto breaking things down block by block for the crypto curious. For this week's episode, Jacquelyn interviewed Sergey Nazarov, co-founder of Chainlink, a protocol that provides an oracle network to power smart contracts. Chainlink is also known as a web3 services platform that connects people, businesses and data with the world of web3. And for good reason - it has enabled over $7 trillion in transaction volume across DeFi, gaming, NFTs and other major industries. Prior to co-founding Chainlink, Nazarov co-founded four other businesses, most recently SmartContract - which focused on smart contracts. We discussed a number of things surrounding smart contracts, technological guarantees, cross-chain interoperability, and Nazarov's long-term vision for Chainlink.We also dove into: Unexpected smart contract use casesCryptographic guaranteesHow traditional companies can tokenize assets AI and blockchain technology CCIP updates Chain Reaction comes out every other Thursday at 12:00 p.m. PT, so be sure to subscribe to us on Apple Podcasts, Spotify or your favorite pod platform to keep up with the action.
In this episode we talk to Erik Cason: Bitcoin philosopher, Crypto-anarchist, cypherpunk and author of numerous essays on the ramifications of bitcoin. We discuss so many topics: from philosophy, history and politics, to praxeology and religion; and thanks to Erik we'll explore them through the lens of cryptography. This is a packed episode! Connect with Erik on Twitter: https://twitter.com/Erikcason Erik's website: http://cryptosovereignty.org/ 00:02:10 - Welcoming Erik Cason 00:08:29 - Anger Solved by Bitcoin 00:16:05 - Erik's Latest Rabbit Hole - What Cryptography Really Means 00:19:07 - Knut's Rabbit Hole - You Are Your Bitcoin 00:25:57 - Psychedelics and Bitcoin 00:28:19 - Is Bitcoin the Messiah Instead of Jesus? 00:29:14 - Rule of Law not Ruler of Law 00:34:20 - What is the Biggest Threat to Bitcoin? 00:37:58 - The Craziness of Taxes 00:41:11 - Opting Out of the Fiat System with Bitcoin 00:50:03 - Anger at the Fiat System 00:52:18 - The Insincerity of Greenpeace 00:55:22 - Bitcoin Fixing Misaligned Incentives 00:59:51 - The Difference Between Revenge and Justice 01:06:39 - Introduction to Erik Cason 01:10:46 - How Bitcoin Fixes the Power of the State 01:19:02 - You Are Your Bitcoin 01:20:52 - Dissecting the Word "Truth" 01:26:17 - Religion and Atheism 01:31:32 - Mathematics and Truth 01:34:21 - Heideggerian Philosophy 01:37:50 - Bitcoin as Revelatory Knowledge 01:41:55 - The Question Concerning Bitcoin 01:44:13 - The Timechain as a Perfect Clock 01:48:10 - Was Fiat Necessary for Bitcoin to Emerge? 01:54:18 - Wrapping Up - Where to Find Erik The Freedom Footprint Show is hosted by Knut Svanholm and BTCPseudoFinn. We are concerned about your Freedom Footprint! Join us as we talk to #bitcoin philosophers about how #bitcoin can expand your Freedom Footprint and much more! The show is sponsored by Orange Pill App, the social network for bitcoiners aiming to increase hyperbitcoinization in your local area. Download the Orange Pill App today! See https://www.theorangepillapp.com/ for details and connect with them on Twitter https://twitter.com/orangepillapp The show is sponsored by Wasabi Wallet, the privacy-focused desktop wallet with Tor and coinjoin built in. The coins you send to the wallet are coinjoined through Tor, so when you take the coins out they are private. Visit https://wasabiwallet.io/ and download Wasabi Wallet! The Freedom Footprint Show is produced by Konsensus Network, the first #bitcoin only publishing house. Check out Konsensus.Network for Bitcoin books in more than a dozen languages, both original and in translation. Follow us on Twitter: https://twitter.com/FootprintShow https://twitter.com/knutsvanholm https://twitter.com/BtcPseudoFinn https://twitter.com/KonsensusN Visit our websites for more info: https://konsensus.network/ https://bitcoinbook.shop/ https://www.knutsvanholm.com/
NLW is joined by Chainlink co-founder Sergey Nazarov for the first in “The Breakdown”'s "Paradigm Shift" interview series. Sergey discusses why society's trust model has broken down, how cryptographic truth serves as an alternative, and why this alternative method of understanding truth will become even more important as a countermeasure to artificial intelligence. - “The Breakdown” is written, produced and narrated by Nathaniel Whittemore aka NLW, with editing by Michele Musso and research by Scott Hill. Jared Schwartz is our executive producer and our theme music is “Countdown” by Neon Beach. Music behind our sponsor today is “Foothill Blvd” by Sam Barsh. Join the discussion at discord.gg/VrKRrfKCz8.
The Chainlink co-founder discusses an important societal paradigm shift. NLW is joined by Chainlink co-founder Sergey Nazarov for the first in “The Breakdown”'s "Paradigm Shift" interview series. Sergey discusses why society's trust model has broken down, how cryptographic truth serves as an alternative, and why this alternative method of understanding truth will become even more important as a countermeasure to artificial intelligence. -“The Breakdown” is written, produced and narrated by Nathaniel Whittemore aka NLW, with editing by Michele Musso and research by Scott Hill. Jared Schwartz is our executive producer and our theme music is “Countdown” by Neon Beach. Music behind our sponsor today is “Foothill Blvd” by Sam Barsh. Image credit: by CoinDesk. Join the discussion at discord.gg/VrKRrfKCz8.Join the most important conversation in crypto and Web3 at Consensus 2023, happening April 26-28 in Austin, Texas. Come and immerse yourself in all that Web3, crypto, blockchain and the metaverse have to offer. Use code BREAKDOWN to get 15% off your pass. Visit consensus.coindesk.com.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode we dig into an emerging idea, which is the cryptographic center of excellence. We discuss how such a center of excellence would work and the benefits it can bring to an enterprise.
This week, The Buzz presents a recorded session from our 2023 Shared Services Summit, which took place on March 21st. National Security Memoradum (NSM)-10, released last year, outlines the Administration's plans to remain ahead of cybersecurity threats posed by quantum computing systems. Federal agencies must begin to inventory their cryptographic systems and develop cost estimates for transitioning to quantum platforms. The scale of compliance activities is expected to be comparable to the Y2K compliance effort at the turn of the century, and the cost to be well beyond the capacity of most individual agencies to pay.To address how shared services can help assist agencies to meet this challenge, summit Industry Chair Jylinda Johnson hosted a discussion with Dylan Presman, Director for Budget and Assessment at the Office of the National Cyber Director. Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on Twitter @ACTIAC or visit http://www.actiac.org.
In this episode, we dive into how and why The Bitcoin Blockchain Can Record Non-Bitcoin Events, in other words how the technology works to record things like photographs, and documents, and why that would be useful for us to have as an immutable recording of the historical events of an Economy and Society. And Ultimately how Cryptohistory is Cryptographically Verifiable Macrohistory We cover: How we can use Bitcoin's blockchain to provide a cryptographically verifiable record of any historical event for the cost of a single transaction.: like who did something, who received something, what happened, when did it happen, where did it happen, and potentially even why it happened How the proof-of-existence mechanism can log arbitrary data to the Bitcoin blockchain, including data from other blockchains, to make copies of them How tools like Elliptic and Chainalysis can deanonymize many transactions on Bitcoin. How Other technologies, like Zero-knowledge proofs, Smart contract chains, and Decentralized social networks, can extend the capability of what can be hidden or recorded on-chain. How Naming and Incorporation systems like ENS allow us to hold individuals and corporations accountable for their actions. How Cryptocredentials, Non-Fungible Tokens (NFTs), Non-Transferable Fungibles (NTFs), and Soulbounds can speed up hiring and recruitment processes to increase social mobility around the world What blockspace is and why our advancements in blockspace will allow for the same kind of advancements we've seen with computer processing power, things like having a smartphone that is more powerful than old computers that used to take up an entire room How we can use this technology to protect ourselves from deepfakes, misinformation, and government censorship And finally, how having a global or national ledger of record would have helped us save thousands of lives during the Covid-19 pandemic, and trillions of dollars by curbing global inflation rates We covered so much in both technical and layman's terms so that anyone could understand these concepts. Since we're just starting out and could really use your support, if you like this episode, please tantalize that like button into a roaring frenzy, share this episode, comment, sign up for our newsletter, and retweet our episodes to @Balajis so we can get his attention and get him on the Podcast! I promise we'll make it all worth it for you. --- Send in a voice message: https://podcasters.spotify.com/pod/show/better-societies/message
Allison Duettmann, Foresight InstituteAlison Duettmann is the president and CEO of Foresight Institute. She directs the Intelligent Cooperation, Molecular Machines, Biotech & Health Extension, Neurotech, and Space Groups, Fellowships, Prizes, and Tech Trees. She shares Foresight's work with the public, for instance at the Wall Street Journal, SXSW, O'Reilly AI, WEF, The Partnership on AI, Effective Altruism Global, and TEDx. She founded Existentialhope.com, co-edited Superintelligence: Coordination & Strategy, co-authored Gaming the Future, and co-initiated The Longevity Prize…Allison gave opening remarks about the potential for cryptocommerce. Although opportunities for bright futures enabled by bio, nano, and AI technologies are now within our reach, their proliferation also comes with risks and authoritarian attempts at control. Cryptographic tools can help us navigate the traps because they enable decentralized, secure cooperation, thereby unlocking a path of high technology, security, and freedom.Allison Duettmann, Foresight InstituteThe Long-term Potential of CryptocommerceThis was recorded at the Foresight Crypto, Security & AI Workshop, October 4-5 @50 Years in San Francisco.Session summary: Allison Duettmann, Foresight Institute | The Long term Potential of Cryptocommerce - Foresight InstituteThe Foresight Institute is a research organization and non-profit that supports the beneficial development of high-impact technologies. Since our founding in 1987 on a vision of guiding powerful technologies, we have continued to evolve into a many-armed organization that focuses on several fields of science and technology that are too ambitious for legacy institutions to support.Allison Duettmann is the president and CEO of Foresight Institute. She directs the Intelligent Cooperation, Molecular Machines, Biotech & Health Extension, Neurotech, and Space Programs, Fellowships, Prizes, and Tech Trees, and shares this work with the public. She founded Existentialhope.com, co-edited Superintelligence: Coordination & Strategy, co-authored Gaming the Future, and co-initiated The Longevity Prize. Apply to Foresight's virtual salons and in person workshops here!We are entirely funded by your donations. If you enjoy what we do please consider donating through our donation page.Visit our website for more content, or join us here:TwitterFacebookLinkedInEvery word ever spoken on this podcast is now AI-searchable us Hosted on Acast. See acast.com/privacy for more information.
In this week's episode, Anna (https://twitter.com/annarrose) speaks with Awa Sun Yin (https://awasunyin.com/), co-founder of Anoma (https://anoma.net/) & Namada (https://namada.net/). They discuss her background in crypto analytics, her shift to working on infrastructure and privacy tech, and how the Anoma project came to be. Awa introduces us to the soon to launch Namada network and then describes the various cryptographic pieces that the Anoma team has been developing. They discuss how these fit into Namada and into the future of the Anoma Protocol. Here are some additional links for this episode: * Episode 115: Cosmos, IBC and ZKPs with Chris Goes (https://zeroknowledge.fm/115-2/) * Episode 184: Anoma's Adrian Brink on Validity Predicates, Ferveo DKG & More (https://zeroknowledge.fm/184-2/) * Episode 32: Zero Knowledge at Zcon0! (https://zeroknowledge.fm/32-2/) * Sign up link for zkMesh newsletter (https://zkmesh.substack.com/) * ZK7: VampIR: universal representation for arithmetic circuits - Joshua Fitzgerald - Anoma (https://www.youtube.com/watch?v=aU2ICVrST10) * ZK8: Namada: asset-agnostic interchain privacy - Chris Goes - Anoma (https://www.youtube.com/watch?v=5K6YxmZPFkE&list=PLj80z0cJm8QFnY6VLVa84nr-21DNvjWH7&index=5) * Ferveo: Threshold Decryption for Mempool Privacy in BFT networks by Bebel and Ojha, 2022 (https://eprint.iacr.org/2022/898) * Metastate Website (https://metastate.dev/) * Cryptium Labs Website (https://cryptium.ch/) * Heliax Website (https://heliax.dev/) * Juvix Website (https://juvix.org/) * Ferveo Cryptography Overview (https://anoma.net/blog/ferveo-cryptography-overview/) Check out the sub0 Polkadot Developer Conference in Lisbon here (https://sub0.polkadot.network/) Join the ZK HACK III - kick off event here (https://hopin.com/events/zk-hack3-1-d5d6ce6b-9a79-496f-9a82-be39ebd22e84) Join the ZK HACK Discord (https://discord.com/invite/tHXyEbEqVN) Today's episode is sponsored by Aleo (https://www.aleo.org) Aleo is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup. If you're interested in building private applications then check out Aleo's programming language called Leo. Visit leo-lang.org (https://leo-lang.org/) to start building. You can also join Aleo's incentivized testnet3 by downloading and running a snarkOS node. No sign-up is necessary to participate. For questions, join their Discord at aleo.org/discord (https://www.aleo.org/discord). If you like what we do: * Find all our links here! @ZeroKnowledge | Linktree (https://linktr.ee/zeroknowledge) * Subscribe to our podcast newsletter (https://zeroknowledge.substack.com) * Follow us on Twitter @zeroknowledgefm (https://twitter.com/zeroknowledgefm) * Join us on Telegram (https://zeroknowledge.fm/telegram) * Catch us on Youtube (https://zeroknowledge.fm/) * Head to the ZK Community Forum (https://community.zeroknowledge.fm/) * Support our Gitcoin Grant (https://zeroknowledge.fm/gitcoin-grant-329-zkp-2)
The "Quantum Minute" is brought to you by ARQIT, providers of transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens. Arqit supplies a unique quantum encryption Platform-as-a-Service which makes the communications links of any networked device secure against current and future forms of attack – even from a quantum computer. To learn more, visit https://arqit.uk.
Markus Levin co-founded XYO Network in 2018, establishing it as the first people-powered decentralized project to connect data from the real physical world directly with blockchain smart contracts and other digital realities. Markus is a blockchain pioneer and an industry visionary regarded for his integral role in shaping the entrance and growth of oracle blockchain technology. He is also the Head of Operations of XY Labs. Markus has over 15 years of experience in building, managing, and scaling companies. After dropping out of his Ph.D. studies at Bocconi University, he began working with and leading companies in hyper-growth industries around the globe, including cutting-edge technology ventures such as Novacore, “sterkly”, Hive Media, and Koiyo. Markus mined his first Bitcoin in 2013 and has been captivated by blockchain technologies ever since.In this conversation, we discuss:- Geospatial data and trustless oracles- XYO network being a trustless oracle- Using 5 million nodes to verify information- Cryptographic handshakes- GPS spoofing apps like VPNs- Augmented reality MetaVerses- University and education being cheaper due to the metaverse and AR/VR technology- Apple entering the metaverse- XYO 2.0 ecosystem, a developer for many- Hot take; metaverse will be more than the internet… It will be our next lives.XYO NetworkWebsite: xyo.networkTwitter: @OfficialXYOLinkedIn: XYOTelegram: t.me/xyonetworkMarkus Levin LinkedIn: Markus Levin --------------------------------------------------------------------------------- This episode is brought to you by PrimeXBT. PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50
On Security Now, Steve Gibson and Leo Laporte discuss how NIST has settled upon the first four of eight post-quantum crypto algorithms. For more check out Security Now: https://twit.tv/sn/879 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte discuss how NIST has settled upon the first four of eight post-quantum crypto algorithms. For more check out Security Now: https://twit.tv/sn/879 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
On Security Now, Steve Gibson and Leo Laporte discuss how NIST has settled upon the first four of eight post-quantum crypto algorithms. For more check out Security Now: https://twit.tv/sn/879 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
Sergey Nazarov is the Co-founder of Chainlink, the industry-standard oracle network for connecting smart contracts to real-world data and off-chain computation. Why you should listen In this podcast Sergey lays out his current thinking on how teams and protocols such as Chainlink are building a world powered by cryptographic truth. Sergey explains how smart contracts are becoming an increasingly important part of the global economy, and he talks about the importance of the Chainlink community as the crypto ecosystem continues to mature. Supporting links Chainlink Andy on Twitter Brave New Coin on Twitter Brave New Coin If you enjoyed the show please subscribe to the Crypto Conversation and give us a 5-star rating and a positive review in whatever podcast app you are using.
In episode 15, we're featuring two more talks from MobileCoin's Crypto Renaissance Conference. Up first is Alexander Rose, the executive director of The Long Now Foundation, an organization devoted to long-term thinking that is best known for building the ten-thousand-year clock. Alexander explains the roots of cryptography and how ledger systems have evolved over the last 5,000 years. Then we feature a talk from isis agora lovecruft, cryptographer and research consultant at MobileCoin. isis agora lovecruft joins to speak about Ristretto, the cryptographic technology that MobileCoin uses to preserve the privacy of its users.
Security code flushes out security bugs. Recursion: see recursion. Phishing (and lots of it). And the Windows desktop that got so big it imploded. With Paul Ducklin and Doug Aamoth. Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.com Twitter @NakedSecurity Instagram @NakedSecurity