Podcasts about Cryptography

Practice and study of secure communication techniques

  • 733PODCASTS
  • 1,590EPISODES
  • 47mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 11, 2025LATEST
Cryptography

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Cryptography

Show all podcasts related to cryptography

Latest podcast episodes about Cryptography

Bitcoin for Millennials
Bitcoin CRASH? The Original Thesis Has Only Accelerated | Erik Cason | BFM213

Bitcoin for Millennials

Play Episode Listen Later Dec 11, 2025 53:26


Erik Cason is Crypto-anarchist, cypherpunk, iconoclast, author, and co-founder of https://vora.io, the bitcoin fortress for sovereign individuals.› https://x.com/ErikcasonPARTNERS

ASecuritySite Podcast
World-leaders in Cryptography: Joos Vandewalle

ASecuritySite Podcast

Play Episode Listen Later Dec 11, 2025 117:17


Joos is a Professor Emeritus with the Department of Electrical Engineering at the Catholic University of Leuven, Belgium. He is one of the most impactful researchers in Computer Science in the World, including in areas of cryptography, secure data communications, data mining and complex systems. His work has led to many areas of impact, including supervising the creators of the Advanced Encryption Standard. He has also worked to simplify the computational complexity of support vector machines, and which involved using a least-squares approach for learning-based classifiers. He has also enhanced the theory behind singular-value decomposition by extending it to multilinear dimensions, which has addressed complex data-mining challenges. Joos is also an IEEE Life Fellow and served as the President of the Royal Flemish Academy of Belgium KVAB. He also co-wrote the book defining "The Invisible Power of Mathematics".

The PowerShell Podcast
Cryptography, Cracking Codes, and Breaking CBC with Dr. Al Carlson

The PowerShell Podcast

Play Episode Listen Later Dec 8, 2025 80:51


In this episode of The PowerShell Podcast, host Andrew Pla welcomes Dr. Al Carlson, a cryptographer, mathematician, and engineer whose career spans more than four decades in military intelligence, embedded systems, and advanced encryption research. Dr. Carlson explains how set theory and mathematical patterns underpin all cryptography, breaking down complex systems like AES into understandable concepts. He discusses his groundbreaking work on isomorphic cipher reduction, polymorphic encryption, and how simplicity, not complexity, is often the key to true security.   Key Takeaways: All encryption is patterns – Dr. Carlsen explains how every cipher, including AES, can be viewed as a substitution cipher, allowing for new ways to analyze and strengthen encryption. Simplicity creates strength – Complexity doesn't guarantee security. By distilling systems to their fundamentals, cryptographers can identify weaknesses faster and design better ciphers. Quantum computing and cryptography's future – Quantum computing's potential to break current encryption standards highlights the need for polymorphic and post-quantum approaches to secure data. Guest Bio: Dr. Al Carlson is a cryptographer, mathematician, and educator with over forty years of experience in electronic warfare, military cryptography, and advanced encryption systems. His work in set theory-based cryptographic analysis and polymorphic encryption has influenced how researchers think about code-breaking and data protection. A longtime IEEE member and mentor, Dr. Carlson continues to publish papers on approaches to information security and encryption theory.Resource Links IEEE (Institute of Electrical and Electronics Engineers) – https://www.ieee.org Breaking CBC Def Con Talk by Dr. Carlson - https://www.youtube.com/watch?v=v0IsYNDMV7A Connect with Andrew - https://andrewpla.tech/links PowerShell Wednesdays – https://www.youtube.com/playlist?list=PL1mL90yFExsix-L0havb8SbZXoYRPol0B PDQ Discord – https://discord.gg/PDQ The PowerShell Podcast on YouTube: https://youtu.be/gWmlvKFduP8

Root Causes: A PKI and Security Podcast
Root Causes 553: Connecting Quantum Clocks to Cryptography

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 3, 2025 5:55


We discuss quantum clocks and their potential role in cryptography.

ASecuritySite Podcast
World-leaders in Cryptography: Jens Groth

ASecuritySite Podcast

Play Episode Listen Later Nov 29, 2025 122:14


Jens is a Chief Scientist at Nexus, and works in many areas of cryptography including in pairing-based cryptography and Zero-knowledge Proofs (ZKPs). He was previously a Professor of Cryptology at University College, London, and as the Director of Research at DFINITY. In 2016, he published a classic paper of "On the size of pairing-based non-interactive arguments", and which defines a Zero Knowledge Proof based on pairing-based cryptography. This is now known as Groth16, and is used in many applications, including with Zcash and Tornado Cash. In 2021, he won an IACR Test of Time award for the "Simulation-sound NIZK proofs for a practical language and constant size group signature".  Then, in 2023, he won the IACR Test of Time Award with Amit Sahai for the 2018 paper on "Efficient Non-Interactive Proof Systems for Bilinear Groups".   The YouTube version is here: https://www.youtube.com/watch?v=ooOYmDzoQj Medium article: https://billatnapier.medium.com/groth16-and-proving-your-know-the-answer-to-x%C2%B2-2x-15-029f6db184d0 

The Post-Quantum World
Whispering Quantum Keys … Is QKD Still Viable as PQC? — with Vanesa Diaz of LuxQuanta

The Post-Quantum World

Play Episode Listen Later Nov 26, 2025 34:33


We cover post-quantum cryptography (PQC) regularly on this show, focusing on the new math-based ciphers that will secure the Internet as quantum computing becomes more powerful. But what about physics-based encryption or quantum key distribution (QKD)? Is that still a thing? We examine how exploiting the laws of quantum physics can securely exchange encryption keys over a fiber and explore the benefits of the newer continuous-variable QKD. CVQKD leverages off-the-shelf telecom components for affordability, integrates with existing data networks, achieves higher key-generation rates, and reaches distances of up to 100 kilometers without requiring dark fibers. Real-world demos include securely linking hospitals in Madrid for remote consultations via Telefonica's network, and there could be a future where QKD devices are integrated into our home routers, democratizing quantum security. Join host Konstantinos Karagiannis for a wide-ranging chat with Vanesa Diaz from LuxQuanta.For more information on LuxQuanta, visit https://www.luxquanta.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Closed Network Privacy Podcast
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat

Closed Network Privacy Podcast

Play Episode Listen Later Nov 22, 2025 154:03


Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS

ASecuritySite Podcast
World-leaders in Cryptography: Daniele Micciancio

ASecuritySite Podcast

Play Episode Listen Later Nov 21, 2025 98:15


Daniele is a professor in the Computer Science and Engineering department at the University of California, San Diego and, in 2019, he was elected as a Fellow of the IACR. His main focus is on the foundations of lattice-based cryptography and its advanced applications, including fully homomorphic encryption.  Overall, he has published many classic papers that relate to lattice methods, including working with Chris Peikert on "Trapdoors for lattices", and with Oded Regev on the "Worst-case to average-case reductions based on Gaussian methods".  Daniele has also contributed greatly to the advancement of bootstrapping methods, including defining the DM/FHEW method - along with Leo Ducas.    He published a book on the "Complexity of Lattice Problems - A cryptographic perspective" with Shafi Goldwasser, and his paper on "Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions" was given a FOCS 20 years test of time award in 2022. This paper led to the theoretical foundation of efficient lattice based cryptography. His paper with Regev also received the FOCS ToT award in 2024.  

Resilient Cyber
Resilient Cyber w/ Jesus and John - Post-Quantum Cryptography for Engineers

Resilient Cyber

Play Episode Listen Later Nov 19, 2025 22:39


In this episode of Resilient Cyber, I'm joined by Jesus Alejandro Cardenes Cabre, SVP of Product Architecture and John Xiaremba, Software Engineer, both from the VIA Knowledge Hub team to dig into all things post-quantum cryptography (PQC). This includes PQC standards, as well as practical steps developers must take today to mitigate future risks.

c't uplink (HD-Video)
Post Quantum Cryptography | c't uplink

c't uplink (HD-Video)

Play Episode Listen Later Nov 15, 2025


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

c’t uplink
Post Quantum Cryptography | c't uplink

c’t uplink

Play Episode Listen Later Nov 15, 2025 46:28 Transcription Available


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

c't uplink (SD-Video)
Post Quantum Cryptography | c't uplink

c't uplink (SD-Video)

Play Episode Listen Later Nov 15, 2025


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

ASecuritySite Podcast
World-leaders in Cryptography: Gene Tsudik

ASecuritySite Podcast

Play Episode Listen Later Nov 14, 2025 83:30


Gene is a Distinguished and ICS Alumni Professor of Computer Science at the University of California, Irvine (UCI) where he has been since 2000.  His research covers areas of security, privacy, and cryptography. From 1991 to 1996, he was a researcher at the IBM Zurich Research Laboratory and then at the Information Science Institute until 2000. He is a Fulbright scholar and a Fellow of the ACM, IEEE, AAAS, and IFIP. From 2009 to 2015, he was the editor-in-chief of the ACM Transactions on Privacy and Security (TOPS). Over the years, Gene has received a number of awards, including the ACM SIGSAC Outstanding Contribution Award,  the 2020 IFIP Jean-Claude Laprie Award, the 2023 ACM SIGSAC Outstanding Innovation Award, and a 2025 Guggenheim Fellowship. Google Scholar: https://scholar.google.co.uk/citations?user=WLvuu74AAAAJ&hl=en&oi=ao   

Packet Pushers - Full Podcast Feed
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Packet Pushers - Network Break
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Network Break

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Packet Pushers - Fat Pipe
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Fat Pipe

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Know, Grow and Scale with Laura Johns
From Cryptography to Cybersecurity Innovation: Gadalia O'Brien on Eliminating Passwords and Empowering MSPs

Know, Grow and Scale with Laura Johns

Play Episode Listen Later Nov 7, 2025 15:54


In this episode, Laura Johns sits down with Gadalia O'Brien, founder and CEO of Dapple Security, an early-stage cybersecurity startup reshaping how businesses log in securely. With a bold mission to eliminate passwords and a channel-first model that empowers MSPs, Gadalia is leading the charge toward more human-centered digital security. Laura and Gadalia explore her unique journey from mathematician and NSA cryptographer to tech founder, sharing insights on what it takes to innovate in cybersecurity, lead authentically, and build strong networks of mentors and peers. Gadalia also opens up about diversity in cybersecurity, how Dapple's biometric authentication model is changing the game, and why relationships—not products—fuel lasting business growth. Whether you're an MSP leader, startup founder, or cybersecurity enthusiast, this conversation offers practical wisdom and inspiration on scaling securely in a people-first way. To learn more about Dapple Security, visit: https://dapplesecurity.com. _________________________________________________________ Follow The Business Growers: https://www.instagram.com/thebizgrowers/ About The Business Growers: Many Managed Services Providers and IT companies struggle to grow because they are constantly putting out fires and don't have the bandwidth to focus on the marketing strategy and execution required to scale the business. At The Business Growers, we believe you shouldn't have to hire a full-time marketing team to compete in the marketplace. We work exclusively with MSPs and IT companies, serving as their tech marketing dream team and offering a proven framework for revenue growth. Visit us at https://thebusinessgrowers.com 

No Password Required
No Password Required Podcast Episode 65 — Steve Orrin

No Password Required

Play Episode Listen Later Nov 4, 2025 44:51


Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice  SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.  TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions.  TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security  Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you."  Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve

ai technology advice young innovation evolution startups artificial intelligence collaboration networking mentorship cybersecurity biology intel cto organizations compliance intersection required diverse governance machine learning nurturing misinformation iot surround homeland security poker lovecraft autonomy team building passwords internet of things deepfakes federal government community engagement critical thinking hellraiser blind spots body language collectibles phishing emerging technologies cloud computing hackathons jim collins hands on learning scalability encryption defcon call of cthulhu career journey data protection good to great team dynamics social engineering built to last leadership roles world series of poker zero trust summaryin ai ethics pinhead cryptography predictive analytics intelligence community experiential learning firmware veterans administration edge computing department of defense intel corporation learning from failure threat intelligence pattern recognition orrin startup culture bruce schneier creative collaboration human psychology ethical hacking ai security customer focus physical security performance optimization technology leadership applied ai innovation culture fedramp capture the flag behavioral analysis web security kali linux federal programs cybersecurity insights government technology puzzle box pathfinding continuous monitoring nurturing talent reliability engineering failure analysis buffer overflow poker tells quality of service
The Digital Executive
The Future of Digital Trust: Tim Callan on Certificates, Cryptography, and Identity | Ep 1138

The Digital Executive

Play Episode Listen Later Nov 2, 2025 12:57


In this episode of The Digital Executive, host Brian Thomas sits down with Tim Callan, Chief Experience Officer at Sectigo and one of the leading voices in SSL and PKI technology. With over 20 years shaping the standards of digital trust, Tim unpacks how the invisible infrastructure behind certificates and encryption keeps our digital world secure.Tim explores the coming shift toward shorter certificate lifespans, why automation is essential for enterprises, and how post-quantum cryptography (PQC) will reshape cybersecurity in the near future. He also dives into the evolution of digital identity—from enterprise systems to personal digital wallets—and how encryption can both empower privacy and resist misuse.Whether you're a tech leader, IT professional, or digital security enthusiast, this episode offers a rare look into the technologies protecting our connected future.If you liked what you heard today, please leave us a review - Apple or Spotify. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Post-Quantum World
From Quantum Economy to Simulation Theory – with Anders Indset

The Post-Quantum World

Play Episode Listen Later Oct 29, 2025 44:54


How are recent quantum computing breakthroughs reshaping business, competition, and society itself? What global challenges might quantum and AI either help with or introduce? We're trying something a little different and asking a futurist and bestselling author of The Quantum Economy to weigh in on how our increasing qubit counts might all play out in a few years. Join host Konstantinos Karagiannis for a wide-ranging, philosophical chat with Anders Indset, and get ready to hear about simulation theory towards the end.   For more information on Anders Indset and his books, visit https://andersindset.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

The International Risk Podcast
Episode 278: Post-Quantum Cryptography and Global Infrastructure Risk with Dr. Michele Mosca

The International Risk Podcast

Play Episode Listen Later Oct 27, 2025 31:12 Transcription Available


Today, Dominic Bowen hosts Dr. Michele Mosca on The International Risk Podcast to explore the global urgency surrounding post-quantum cryptography and the risks quantum computing poses to modern infrastructure. They discuss how the question is no longer if but when quantum computers will break today's encryption, the implications for global finance and critical systems, and what governments, businesses, and institutions must do now to prepare. Together they examine the pace of quantum innovation, the widening gap between technological capability and policy readiness, and the geopolitical competition shaping quantum research and security standards.Dominic and Dr. Mosca also delve into the technical, economic, and diplomatic stakes of the quantum transition, from the “harvest-now, decrypt-later” threat to the cost and complexity of retrofitting global encryption systems. They explore how coordinated international governance, investment in post-quantum standards, and stronger public-private partnerships can build digital resilience before vulnerabilities are exploited.Dr. Michele Mosca is Co-Founder and CEO of evolutionQ, a company providing quantum-safe cybersecurity solutions, and Co-Founder of the Institute for Quantum Computing at the University of Waterloo. He is also a founding member of the Cybersecurity and Privacy Institute and a leading authority on quantum-safe cryptography and risk management. His research and advisory work have helped shape international strategies for quantum readiness across finance, government, and global infrastructure sectors.Drawing on decades of research and policy engagement, Dr. Mosca explains why societies must act now to secure their data and systems, how the transition to post-quantum cryptography can be managed effectively, and why this emerging field will define the resilience and trust of the digital age.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime, to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Tell us what you liked!

Impact Quantum: A Podcast for Engineers
When AI Goes Quantum - The Next Frontier of Innovation

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Oct 20, 2025 54:29


On this episode of Impact Quantum, we dive into the visionary world of Sanjay Chittore, founder of Quantum AI Global and QLabs, who's on a mission to bring quantum theory out of the realm of science fiction and into real-world applications. Joined by host Frank La Vigne and the wonderfully quantum-curious Candice Gillhoolley, we unravel common myths about quantum computing—like whether you really need a quantum computer to build quantum products—and explore the massive impacts quantum technology is poised to have on everything from healthcare diagnostics to next-generation memory and sensing.Sanjay shares his journey from startup success through the pandemic to his self-driven deep dive into quantum and AI, revealing why he believes the future hinges on the synergy of quantum physics and electronics, rather than the traditional computing and electronics combination. Prepare to have your assumptions challenged as we discuss what makes quantum so secure, so fast, and so revolutionary—plus real-world examples like quantum memory, quantum sensors in healthcare, and the bold dreams that keep this field moving forward.Whether you're a scientist, entrepreneur, or just quantum-curious, this episode offers inspiring insights into how today's breakthroughs could transform industries and everyday life. Buckle up—things are about to get entangled!Time Stamps00:00 Quantum-AI Product Integration Company04:36 "AI Focus Led to Quantum"08:20 Quantum Discovery and Einstein's Doubts10:49 "Futuristic Startups: Embrace Risks"16:04 "Quantum Computers Lack Storage"19:15 "Quantum Sensors: Superior Precision"22:39 "Quantum Sensor for Cancer Detection"24:48 "Quantum Sensors and Cryptography"28:43 "Quantum: Infinite Between Ones, Zeros"31:50 "Unhackable Quantum Qubits Explained"34:52 "Solving Maze Navigation"38:38 "Quantum Efficiency Simplified"43:19 "Supporting PhDs in Industry"45:02 India's First Quantum Cryptography Product47:42 "Classical to Quantum Conversion"53:40 Quantum Revolution: Theory to Reality54:19 "Bailey's Quantum Farewell"

Bitcoin Takeover Podcast
S16 E51: Sean Bowe on Bitcoin, Zcash & Scaling Privacy with Tachyon

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 18, 2025 219:34


Sean Bowe is a cryptographer and engineer who is best known for revolutionizing Zcash. After cooperating to fix the inflation bug in the first version of the network, he built Halo to remove the trusted setup – basically obliterating the main reason why Bitcoin did not activate the Zerocash soft fork in 2013. More recently, Sean Bowe announced project Tachyon: an ambitious initiative to scale ZK SNARKs (the technology enabling shielded transactions) to billions of users. Time stamps: 00:01:19 - Sean Bowe's Work on Zcash and Hidden Inflation Bug Fix 00:01:36 - Introduction to Halo and Halo 2: Eliminating Trusted Setup 00:01:51 - Overview of Project Tachyon for Scaling ZK-SNARKs 00:02:43 - Zcash Price Pump and Dance Celebration 00:04:48 - Using Zcash for Encrypted Messages via Zashi Wallet 00:05:42 - Comparing Zcash Messaging to Signal 00:07:17 - Sean Bowe's Early Involvement in Zcash and Bitcoin 00:10:34 - Sean Bowe's Age and Start in Cryptography at 21 00:11:13 - Discovering Bitcoin in 2011 and Privacy Needs 00:13:42 - Contributing to BIP 39 with Slush and Trezor 00:14:19 - Realizing Bitcoin's Lack of Privacy 00:17:50 - Privacy vs. Deniability in Bitcoin and Banks 00:20:23 - Wasabi Wallet and CoinJoins Limitations 00:21:46 - Optional Privacy in Zcash and Wallet Defaults 00:23:16 - Viewer Question: Source of Sean Bowe's Smartness 00:24:47 - Viewer Question: Ideas from Scaling Bottlenecks 00:27:09 - Viewer Quote from Oscar Wilde on Privacy 00:28:07 - Viewer Question: Zcash Network State Meaning 00:30:00 - Viewer Question: Timeline for Tachyon Success 00:33:15 - Chronological Approach to Interview and Tachyon 00:37:33 - Differences Between Zerocoin (Firo) and Zerocash (Zcash) 00:39:55 - Greg Maxwell's CoinJoin and Zerocoin Views 00:42:57 - Moon Math and Cryptographic Assumptions 00:46:33 - Sponsor: Citrea ZK Rollup with BitVM 00:47:19 - Sponsor: Layer2 Labs ZSide Drive Chain 00:49:01 - Sponsor: Bitcoin.com News 00:50:16 - Zcash Leads Crypto Rally News 00:58:49 - Bitcoin's Constraints and Creativity like BitVM 01:05:00 - Zcash Contributors and Zebra Rust Node 01:14:00 - Friendly Forks in Zcash 01:31:00 - Monero Hater Comments and Zcash Anonymity 02:23:00 - Superhero Backstory Tease 02:26:14 - Bitcoin Talk Username and Early ASIC Mining 02:28:35 - Pessimism on Bitcoin Development Speed 02:50:41 - Shielded Zcash Dust Problem 02:52:11 - Quantum Resistance and Self-Transfers 02:53:00 - Long-Term Storage Pool for Quantum Safety 02:54:56 - Avalanche Pre-Consensus like eCash 02:55:04 - Tachyon and Oblivious Synchronization 02:58:56 - Scaling to Billions: Math and No Bottlenecks 03:02:12 - Solving Privacy-Scaling Trilemma 03:04:51 - Off-Chain Secrets and Payment Protocols 03:06:24 - Tachyon as New Privacy Pool 03:12:56 - Wallet Syncing with Tachyon Servers 03:14:50 - Shielded Aggregation in Tachyon 03:17:00 - Tachyon Team Size and Hiring Rust Engineers 03:18:41 - ETA for Tachyon: Next Year 03:23:15 - Greg Maxwell Paper Citation Story 03:25:11 - Explaining ZK-SNARKs to Polkadot Cryptographers 03:31:01 - Zcash Governance and No Benevolent Dictator 03:35:06 - Memos Bloating Blockchain and Anonymity Boost 03:38:06 - Zcash Compatibility with Bitcoin Privacy 03:39:01 - Following Sean Bowe: X Account and Blog

Impact Quantum: A Podcast for Engineers
Quantum Careers - Without the Sci-Fi Nonsense

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Oct 13, 2025 52:03 Transcription Available


On this milestone 30th episode of Impact Quantum Season 3, hosts Frank La Vigne and Candace Gillhoolley are joined by Vyom Patel, a master's student at the University of Waterloo—often described as the MIT of Canada. This episode dives into Vyom's journey from machine learning to the cutting-edge challenges of quantum algorithms and quantum error correction. Together, they unpack the common misconceptions around quantum computing, reveal the importance of strong mathematical foundations, and discuss the very real risks and rewards of working in a nascent, rapidly evolving field. Vyam shares how he filters through the hype, stays up-to-date with the latest research, and why mentorship (both giving and receiving) is crucial in this space. Whether you're just quantum-curious or already obsessed with superposition, this episode promises insights, laughter, and plenty of motivation to get quantumly curious yourself!Links Quantum Computing Since Democritus - https://www.amazon.com/dp/0521199565?tag=datadrivenm0e-20 Time Stamps00:00 "Exploring Quantum Computing's Interdisciplinary Appeal"04:10 Quantum Computing: Curiosity and Claims08:19 Trusting Academic Sources First11:44 Efficient Paper Skimming Techniques16:52 Quantum Computing for Differential Equations20:03 Quantum Matrix Encoding Challenges24:10 Foundations of Cryptography and Error Correction27:15 The Future of Quantum Education29:23 "Foundations Key to Tech Progress"34:04 Math Mentorship and Research Program37:13 "Demystifying Quantum Mechanics for Beginners"40:57 Quantum LDPC Codes Appeal43:17 "Evolution of Error Correction"46:26 Quantum Computing Race: Architecture's Future49:19 Future Plans: Technical Blog Creation

Bitcoin Takeover Podcast
S16 E48: Christopher Smith on Quantus, Bitcoin & Quantum Resistance

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 7, 2025 166:35


Christopher Smith (aka Yuvi Lightman, aka Ganesha 1024) is the founder of the Quantus network: an mbitious quantum-zk blockchain which he proudly built with his team in just 6 months, with a budget of $500k. In this episode we talk about the threat of quantum computing, how quantum resistant cryptography works, and how Bitcoin can be saved from a potential disaster. Time stamps: 00:01:31 - Introducing Christopher Smith (Yuvi Lightman), known on Soundcloud Music as Ganesha1024 00:02:22 - Quantis: Zero-Knowledge Quantum-Resistant Blockchain 00:02:39 - Christopher's Background, Early Bitcoin Involvement 00:03:41 - Current Views on Bitcoin, All-Time High at $125K 00:04:19 - Discovering Bitcoin in 2012, Contributions to BitcoinJ 00:04:36 - Founding BitMesh: Micropayments via Payment Channels 00:04:42 - Mike Hearn and Payment Channels 00:05:17 - Bitcoin Whitepaper Praise, Satoshi's Genius 00:05:55 - Essence of Money, Overcomplication Critique 00:06:49 - Bitcoin's Corporate Takeover, Cultural Ethos 00:08:38 - SegWit Changes, Big Block Debate 00:09:45 - Bitcoin Cash Sympathy, Shift to Ethereum 00:10:41 - Vitalik Buterin and Gavin Wood as Geniuses 00:10:53 - Lunar Startup: Blockchain Wikipedia with ICO 00:11:08 - Bitcoin Threats: Throughput, Privacy, Quantum Security 00:11:29 - Child Porn Blackmail Tactics in Debates 00:12:18 - Social Bottlenecks in Coordination 00:13:09 - BTC Token vs Network Separation via ETFs 00:14:06 - Proof of Keys Day by Trace Mayer 00:15:23 - No Trusted Third Parties Philosophy 00:16:04 - Cryptography as Military Tech 00:18:04 - Open Source Importance, ERC20 Simplicity 00:19:21 - BlackRock as Central Bank, Cult of Saturn Symbolism 00:20:17 - Bitcoin Threats: Throughput with Shai Reference 00:22:50 - Privacy and Zcash Praise 00:23:32 - Quantus as Bitcoin Fork with Falcon Signatures 00:24:50 - Solana as Big Blocker Inheritor 00:25:04 - Overton Window Constraints 00:26:41 - Quantus Timelines Skepticism, PsiQuantum Investment 00:28:14 - Ethereum Proof of Stake, Stablecoin Control 00:29:27 - Catholic Church Analogy, Satoshi's Time-Buying Quote 00:30:04 - Weaponized Schizophrenia Concept 00:31:09 - Schizophrenia as Catch-All, LSD Benefits 00:32:21 - False Positives/Negatives in Machine Learning 00:33:34 - Arbitrary Thresholds in Science/Medicine/Physics 00:34:46 - Autistic Definitions, Bitcoin Redefinition 00:36:25 - Douglas Hofstadter's Godel Escher Bach Inspiration 00:37:32 - Ads: Bitcoin.com News 00:38:39 - Citrea: ZK Rollup on Bitcoin 00:40:21 - BIP300 Drivechains by Paul Sztorc 00:41:53 - Hacker Ethos, L2 Complexity Critique 00:43:27 - Lightning Network Failures 00:44:22 - Open Source vs Closed Source Thought Experiment 00:47:00 - Check Phrase for Security 01:00:00 - Quantum Mechanics Wave Function Collapse 02:02:17 - Chris Doesn't Sound Like Typical Founder 02:02:50 - Quantus Features: Reversible Transactions 02:05:23 - Check Phrase Innovation 02:07:29 - HD Wallets for Lattice Cryptography, QIPs 02:08:46 - Pro-Social to Industry, Ethereum Ethos 02:09:00 - Ross Ulbricht on Blockchain Decentralization 02:10:00 - Bitcoin Maximalism Critique 02:10:34 - Satoshi on ZK Proofs Efficiency 02:11:01 - Grin Fair Launch, Kaspa DAG Innovation 02:12:16 - Zcash Innovations, ZK Snarks 02:13:25 - Libraries from Zcash, Fluffy Pony Dismissal 02:14:07 - Zcash Made ZK Practical 02:15:36 - Ethereum Net Positive Despite Mess 02:16:04 - Stablecoins as Freezable CBDCs 02:18:19 - Eye-Openers: Iran Banking Struggles, Argentina Tether Use 02:20:40 - COVID Psychology Lessons 02:22:27 - QE Money Printing Realization 02:23:33 - Legal vs Moral, COVID Non-Compliance 02:25:13 - Forgetting COVID Coercion 02:26:36 - Psychedelic Community Enforcement 02:27:47 - Nature's Cruelty 02:28:55 - Vaccine Divisions 02:30:02 - Each Vaccine Unique, Pavlov's Association 02:31:03 - Freedom License Concept 02:32:01 - Agency and Responsibility 02:34:05 - Frustrated Developers, Utility Missed 02:35:07 - User Adoption Challenges 02:36:01 - Funnel for Adoption, Co-Founder Complement 02:37:38 - Check Phrase for Wallets 02:39:04 - Plato on Politics 02:39:46 - Habeas Corpus History 02:40:40 - Optimism: Sunlight, World Complexity 02:41:36 - Manifesting Intentions 02:42:28 - Soundcloud Recommendation, Quantus Docs 02:43:02 - Music Like Pink Floyd's Great Gig in the Sky 02:44:47 - Amir Taaki 7-Hour Record 02:45:43 - Zooko's 6-Hour Interview 02:46:47 - WeaponizedSchizophrenia.com Blog 02:47:00 - Closing Words

Bitcoin Takeover Podcast
S16 E47: Max Hillebrand on White Noise & Private Messaging on Nostr

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 2, 2025 242:36


Max Hillebrand makes his 8th appearance on the Bitcoin Takeover Podcast in order to talk about his latest project: White Noise, a private messaging application for Nostr. We also talk about Core v30 vs Knots, Bitcoin layer 2s & other bull market topics. Time stamps: 00:01:07 - Max Hillebrand's Background 00:02:47 - Post-Wasabi Wallet Era and Privacy Challenges 00:04:28 - Nostr Protocol Overview 00:05:58 - Early Nostr Experiences and Key Loss 00:08:51 - Nostr Client Progress and Edge Cases 00:09:58 - Nostr's Relation to Bitcoin 00:13:53 - Hardware Wallets for Nostr Keys 00:18:06 - Nostr Key Backups and Security 00:21:53 - Nostr Search and Web of Trust 00:24:21 - Ads: Bitcoin.com News and NoOnes.com 00:26:12 - White Noise Protocol Introduction 00:27:52 - NIP 44 and Gift Wraps for Encryption 00:30:20 - Signal Protocol and MLS Evolution 00:32:16 - MLS Protocol Details 00:33:23 - Nostr Privacy Limitations 00:35:17 - Trusted Relays and Metadata 00:37:25 - Nostr as Data Delivery Layer 00:38:41 - Self-Authentication in MLS 00:40:02 - Group Creation and Key Packages 00:42:38 - MLS vs. Major League Soccer Joke 00:42:53 - Diffie-Hellman and Scaling to Millions 00:44:24 - MLS Key Tree Structure 00:46:59 - Scalability Benefits of MLS 01:18:00 - Marmot and Nostr Tools 01:25:30 - The Zcash Pump Dance 03:09:25 - Angor Protocol for Recurring Payments 03:14:02 - Bitcoin Script and Smart Contracts 03:15:32 - Great Script Restoration Proposal 03:21:03 - Builder Spirit in Bitcoin vs. Ethereum 03:25:19 - Bills of Exchange and Peer-to-Peer Credit 03:33:09 - Historical Finance and Farming 03:38:35 - Starting Bitcoin Meetups 03:41:43 - Localizing Bitcoin Content 03:44:17 - Recommended Podcasts 03:47:48 - Podcast Benefits and Guest Interactions 03:54:39 - Audience Quality and Impact 03:55:36 - White Noise Future and Building Freedom Tech 03:58:51 - AI Coding and Proof of Concepts 04:00:38 - Nym Mixnet Integration 04:01:54 - Closing Remarks and Future Sessions

Cybercrime Magazine Podcast
Quantum Minute. Research Breakthrough In Cryptography. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 26, 2025 2:02


Researchers have made a breakthrough in cryptography, building a new foundation for quantum cryptography that could make it more secure than classical encryption. The new approach, developed by Dakshita Khurana and Kabir Tomer, uses quantum building blocks called one-way puzzles to generate locks and keys. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Digital Transformation & Leadership with Danny Levy
Noise vs. Leadership, Quantum-Safe Cryptography, and Why the Right Conversation Changes Everything w/ Camilla Bullock

Digital Transformation & Leadership with Danny Levy

Play Episode Listen Later Sep 26, 2025 46:58


This week, Camilla Bullock, CEO of the Emerging Payments Association Asia (EPAA), joins Danny for a wide-ranging, no-BS conversation that cuts through the noise.The Emerging Payments Association Asia (EPAA) is the peak industry body representing and supporting the APAC payments ecosystem.Danny and Camilla get into:Why true leadership isn't about being a “thought leader” (and why Camilla refuses the label).The hidden superpower that drives change: spotting the right people and sparking the right discussions.Quantum-safe cryptography—why it's not just a “future problem” and why starting now could be the smartest move you'll ever make.The storytelling gap in cybersecurity—and how to make resilience resonate across an industry that usually drowns in jargon.Why recognising excellence through initiatives like the Money Awards creates real momentum.And much more...!If you care about the future of payments, fintech, or just want to know how the right idea at the right time can reshape an industry - this is your episode.It's 45 minutes packed with sharp insights, no fluff, and lessons you can actually use.Are you getting every episode of Digital Transformation & Leadership in your favourite podcast player? You can find us Apple Podcasts and Spotify to subscribe.

The Azure Security Podcast
Episode 118 - Quantum Cryptography and Quantum Computing with Mark Russinovich

The Azure Security Podcast

Play Episode Listen Later Sep 19, 2025 33:31 Transcription Available


In this episode Michael and Mark talk with guest Mark Russinovich, Technical Fellow, Deputy CISO and Chief Technology Officer of Microsoft Azure about quantum cryptography and quantum computing and its implications for security and the future. NOTE: There's a portion where Mark and Michael talk about a quote made by Richard Feynman about understanding technical topics, but this is actually attributed to Albert Einstein. However, there is no definitive record of Einstein writing or saying this exact phrase in his published works or speeches.We decided to not cover any Azure Security news in this episode.

Embedded Insiders
Designing for Harsh Environments & Quantum Cryptography

Embedded Insiders

Play Episode Listen Later Sep 18, 2025 33:30


Send us a textIn this episode of Embedded Insiders, Rich and Jeff Baldwin, Director of Engineering at Sealevel Systems, discuss the process of designing systems for harsh environments and how Sealevel's expertise helps customers get started with safe and reliable solutions.Our next segment is sponsored by Infineon Technologies. Rich Nass is joined by Erik Wood, Infineon's Senior Director of Microcontroller Cryptography and Product Security, and the two discuss quantum computing and how the experts at Infineon are working to keep systems secure.But first, Ken and I engage in some rapid-fire questions regarding a recent story on Embedded Computing Design about robotic telesurgery, featuring Stéphane Lavallé, a serial entrepreneur of startups and pioneer in surgical robotics, and Jim Hirsch, VP of the North American and EMEA general embedded market at QNX. Read the story here: https://embeddedcomputing.com/application/healthcare/telehealth-healthcare-iot/the-good-invasion-of-robotsFor more information, visit embeddedcomputing.com

The Post-Quantum World
Running Shor's Algorithm on Logical Qubits - with Peter Noell of Infleqtion

The Post-Quantum World

Play Episode Listen Later Sep 17, 2025 36:14


For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

David Bombal
#512: All Encryption Hacked in 3 Years?

David Bombal

Play Episode Listen Later Sep 15, 2025 38:17


Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Quantum computing isn't a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that's enough to break today's asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor's algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states' “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Mind Over Murder
BONUS: The Zodiac Killer with Michael Butterfield (Part 1)

Mind Over Murder

Play Episode Listen Later Sep 4, 2025 42:39 Transcription Available


Michael Butterfield, author of "The Zodiac Killer: The Story of America's Most Elusive Murderer," joins "Mind Over Murder" cohosts Bill Thomas and Kristin Dilley to discuss his new book, his longtime research into the still unsolved Zodiac case, and his website, ZodiacKillerFacts.com. Will Zodiac ever be identified?  Will the remaining Zodiac ciphers be solved?  Are there really similarities between the Zodiac case and the Colonial Parkway Murders? This bonus episode is is Part 1 of 2 parts on the Zodiac with Michael Butterfield, and originally ran on May 12, 2025.CrimeCon:  We're going to CrimeCon again, folks! Join us in Denver for new merch, some MOM listener hangouts, and a lot of fun! Use the code MINDOVERMURDER to get 10% off your tickets between now and September! See you there!Amazon:  The Zodiac Killer: The Story of America's Most Elusive Murdererhttps://www.amazon.com/Zodiac-Killer-Americas-Elusive-Murderer/dp/1398851779?author-follow=B0F4RS214FZodiacKillerFacts.com website:https://zodiackillerfacts.com/about/Washingtonian: A Murder on the Rappahannock River:https://www.washingtonian.com/2019/06/27/murder-on-the-rappahannock-river-emerson-stevens-mary-harding-innocence-project/WTKR News 3: One year after development in Colonial Parkway Murders, where do things stand?https://www.wtkr.com/news/in-the-community/historic-triangle/one-year-after-development-in-colonial-parkway-murders-where-do-things-standWon't you help the Mind Over Murder podcast increase our visibility and shine the spotlight on the "Colonial Parkway Murders" and other unsolved cases? Contribute any amount you can here:https://www.gofundme.com/f/mind-over-murder-podcast-expenses?utm_campaign=p_lico+share-sheet&utm_medium=copy_link&utm_source=customerWTVR CBS News:  Colonial Parkway murders victims' families keep hope cases will be solved:https://www.wtvr.com/news/local-news/colonial-parkway-murders-update-april-19-2024WAVY TV 10 News:  New questions raised in Colonial Parkway murders:https://www.wavy.com/news/local-news/new-questions-raised-in-colonial-parkway-murders/Alan Wade Wilmer, Sr. has been named as the killer of Robin Edwards and David Knobling in the Colonial Parkway Murders in September 1987, as well as the murderer of Teresa Howell in June 1989. He has also been linked to the April 1988 disappearance and likely murder of Keith Call and Cassandra Hailey, another pair in the Colonial Parkway Murders.13News Now investigates: A serial killer's DNA will not be entered into CODIS database:https://www.13newsnow.com/video/news/local/13news-now-investigates/291-e82a9e0b-38e3-4f95-982a-40e960a71e49WAVY TV 10 on the Colonial Parkway Murders Announcement with photos:https://www.wavy.com/news/crime/deceased-man-identified-as-suspect-in-decades-old-homicides/WTKR News 3https://www.wtkr.com/news/is-man-linked-to-one-of-the-colonial-parkway-murders-connected-to-the-other-casesVirginian Pilot: Who was Alan Wade Wilmer Sr.? Man suspected in two ‘Colonial Parkway' murders died alone in 2017https://www.pilotonline.com/2024/01/14/who-was-alan-wade-wilmer-sr-man-suspected-in-colonial-parkway-murders-died-alone-in-2017/Colonial Parkway Murders Facebook page with more than 18,000 followers: https://www.facebook.com/ColonialParkwayCaseYou can also participate in an in-depth discussion of the Colonial Parkway Murders here:https://earonsgsk.proboards.com/board/50/colonial-parkway-murdersMind Over Murder is proud to be a Spreaker Prime Podcaster:https://www.spreaker.comJoin the discussion on our Mind Over MurderColonial Parkway Murders website: https://colonialparkwaymurders.com Mind Over Murder Podcast website: https://mindovermurderpodcast.comPlease subscribe and rate us at your favorite podcast sites. Ratings and reviews are very important. Please share and tell your friends!We launch a new episode of "Mind Over Murder" every Monday morning, and a bonus episode every Thursday morning.Sponsors: Othram and DNAsolves.comContribute Your DNA to help solve cases: https://dnasolves.com/user/registerFollow "Mind Over Murder" on Twitter: https://twitter.com/MurderOverFollow Bill Thomas on Twitter: https://twitter.com/BillThomas56Follow "Colonial Parkway Murders" on Facebook: https://www.facebook.com/ColonialParkwayCase/Follow us on InstaGram:: https://www.instagram.com/colonialparkwaymurders/Check out the entire Crawlspace Media network at http://crawlspace-media.com/All rights reserved. Mind Over Murder, Copyright Bill Thomas and Kristin Dilley, Another Dog Productions/Absolute Zero ProductionsBecome a supporter of this podcast: https://www.spreaker.com/podcast/mind-over-murder--4847179/support.

Cybercrime Magazine Podcast
Quantum Minute. Lattice Problems Weighed For Post-Quantum Cryptography. Sponsored by Applied Quantum

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 29, 2025 1:38


Cryptography experts are racing to develop algorithms that can protect data from powerful quantum computers, which have been demonstrably capable of breaking current encryption systems since the development of Shor's algorithm in 1994. Lattice problems, a type of mathematical model that involves calculating vectors in a mathematical structure, are being considered as a potential foundation for post-quantum cryptography. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

HPE Tech Talk
Can we build technology today to defend against the threats of tomorrow?

HPE Tech Talk

Play Episode Listen Later Aug 28, 2025 22:44


Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

Quanta Science Podcast
A New Quantum Math of Cryptography

Quanta Science Podcast

Play Episode Listen Later Aug 26, 2025 27:12


We're living in the golden age of cryptography. Since the 1970s, we’ve had more confidence in encryption than ever before. But there’s a difference between confidence and absolute certainty. And computer scientists care a lot about that difference. The search is always on for better, more secure secrets. But is it possible for digital security to be truly, provably unbreakable? Maybe, with a little help from math and physics. On this week's episode, host Samir Patel talks with ???????????????????????? computer science staff writer Ben Brubaker about a developing frontier of digital security: quantum cryptography. This topic was covered in a recent story for Quanta Magazine. Each week on The Quanta Podcast, Quanta Magazine editor in chief Samir Patel speaks with the people behind the award-winning publication to navigate through some of the most important and mind-expanding questions in science and math. Audio Coda from the Bletchley Park Trust.

Security. Cryptography. Whatever.
Stop Using Encrypted Email with William Woodruff

Security. Cryptography. Whatever.

Play Episode Listen Later Aug 23, 2025 71:07 Transcription Available


There was a bug in an OpenPGP library which finally gave us an excuse to tear encrypted email via PGP to shreds. Our special guest William Woodruff joined us to help explain the vuln and indulge our gnashing of teeth on why email was never meant to be encrypted and how other modern tools do the job much, much better.Watch on YouTube: https://www.youtube.com/watch?v=IoL3LfIozJoTranscript: https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruffLinks:- William Woodruff: https://yossarian.net/- https://www.latacora.com/blog/2020/02/19/stop-using-encrypted/- https://www.rfc-editor.org/rfc/rfc4880- https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/- https://www.mailpile.is/blog/2014-10-07_Some_Thoughts_on_GnuPG.html- https://www.rfc-editor.org/rfc/rfc9580.html- https://www.tumblr.com/accidentallyquadratic- https://www.w3.org/TR/xmldsig-core/- https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP- https://www.rfc-editor.org/rfc/rfc9580.html#name-signature-packet-type-id-2- https://www.rfc-editor.org/rfc/rfc9580.html#name-key-derivation-function- https://en.wikipedia.org/wiki/S/MIME- https://delta.chat- https://signal.org/blog/the-ecosystem-is-moving/- https://phakeobj.netlify.app/posts/gigacage/- https://x.com/dakami-----BEGIN PGP MESSAGE-----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-----END PGP MESSAGE-----"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

HPE Tech Talk
How are governments reacting to the threat of quantum computers?

HPE Tech Talk

Play Episode Listen Later Aug 21, 2025 20:31


Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/

The Post-Quantum World
One PQC Playbook – with Kevin Hilscher of DigiCert

The Post-Quantum World

Play Episode Listen Later Aug 20, 2025 32:58


DigiCert is widely recognized for its expertise in PKI and as a TLS certificate authority. As you can imagine, they have a significant perspective on the quantum computing threat to encryption and the migration to post-quantum cryptography (PQC). We cover everything from the challenges of upgrading IoT devices to ML-DSA signature sizes, as well as the new DigiCert One platform the company offers to help manage the migration process. In the middle of this episode, you'll even get a clear summary of what a successful rollout to PQC looks like. Join host Konstantinos Karagiannis for a wide-ranging chat on actionable PQC steps you can take with Kevin Hilscher from DigiCert. There's even a Quantum Safe Playground to experiment with!For more information on DigiCert, visit www.digicert.com/.   Visit the Quantum Safe Playground at https://labs.digicert.com/quantum-safe.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Lagrange: ZK-Proving AI Alignment - Ismael Hishon-Rezaizadeh

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later Aug 16, 2025 56:50


In an age when AI models are becoming exponentially more sophisticated and powerful, how does one ensure that proper results are being generated and that the AI model functions in desired parameters? This pressing concern of AI alignment could be solved through cryptographic verification, using zero knowledge proofs. ZKPs not only allow for verifying computation at scale, but they also confer data privacy. Lagrange's DeepProve zkML is the fastest in existence, making it easy to prove that AI inferences are correct, scaling verifiable computation as the demand for AI grows.Topics covered in this episode:Ismael's background and founding LagrangeAI x crypto convergenceZKML use casesAI inference verifiabilityAI safety regulationsRevenue accruing tokensPitching Lagrange to enterprise clientsAssembling a dedicated teamCryptography researchEpisode links:Ismael Hishon-Rezaizadeh on XLagrange on XSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Sebastien Couture.

The Defiant
Intention, Privacy, and Trust: Adrian Brink's Vision for Resilient Communities

The Defiant

Play Episode Listen Later Aug 15, 2025 49:39


In this episode of The Defiant Podcast, we sit down with Adrian Brink, Co-Founder of Anoma and Namada, to explore the intersection of privacy, sovereignty, and resilience in Web3. Adrian shares his journey from the early days of building Cosmos to building intent-based systems that empower communities and protect dignity at scale.We dive into the challenges of designing for a fragmented world, the promise of cryptography, and the importance of local-first infrastructure. Adrian also discusses the Tornado Cash case, the role of intent-based systems in addressing regulatory concerns, and how cryptography can help communities defend against external threats.From the evolution of Web3 to the future of AI-driven coordination, this conversation is packed with insights on building networks that bend toward freedom without breaking under the weight of reality.Chapters00:00: Setting the stage: intention, privacy, and protecting dignity in a digital world03:39: Sovereign infrastructure: community defense and resilience against external threats05:23: Reimagining privacy: moving beyond Band-Aid solutions to foundational change07:24: The state of Web3: challenges, stagnation, and the need for meaningful innovation10:02: Intent-based systems: reshaping privacy and sovereignty for individuals and communities12:03: Flexibility and security: building adaptable systems for diverse global needs15:13: Tornado Cash and regulatory challenges: intent systems as a potential solution20:13: Navigating high-risk environments: sanctions, blackouts, and global regulations25:20: The next 100 million users: making crypto accessible and practical for everyday life30:05: Financial literacy and coordination: unlocking new possibilities for global commerce35:00: Cryptography and trust: scaling trust systems for local and global communities40:00: Societal transformation: blockchain's role in reshaping politics, economics, and governance45:00: AI and intents: the future of coordination in the age of artificial intelligence48:12: Staying grounded: Adrian's advice for navigating innovation and building for the right reasons49:19: Closing thoughts: where to find Adrian and what's next for Namada

Cybercrime Magazine Podcast
Quantum Minute. AWS Boosts TLS Security with Post-Quantum Cryptography. Sponsored by Applied Quantum

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 8, 2025 1:43


Cloud computing giant Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to secure TLS connections from potential quantum threats. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Quantum Computing Now
PQC & Math Culture with Krystal A. Maughan [UVM], [RQS - QSim]

Quantum Computing Now

Play Episode Listen Later Aug 7, 2025 47:44


Before you listen! Helpful Acronyms to deal with the jargon: - PQC = Post Quantum Cryptography, area within quantum computing & cryptography where researchers are developing quantum-safe protocols resilient against quantum cryptography attacks. - LDPC Codes = Low Density Parity Check, a type of error correction method - Block Encoding = a technique used in quantum computing (see youtube link below!)In this episode: Quantum Simulation program, Cryptography, & passionate community!A conversation with the brilliant Krystal Maughan, PhD researcher at the University of Vermont doing innovative work on her research area of Post-Quantum Cryptography while we were attending the 3-day QSim RQS Summer School 2025! We talk on a range of topics observed in the quantum industry & research field and she provides a mathematician's perspective at Madison Square Park on a beautiful summer day right before her flight. Enjoy this refreshing & insightful discussion! Referenced Links from the talk: - Her recent paper on "Cycles & cuts in supersingular I-isogeny graphs": https://arxiv.org/pdf/2502.00638- Her Website: ⁠https://kammitama5.github.io/about/ ⁠- Krystal Maughan's Research Work: https://scholar.google.com/citations?user=dhxYKqAAAAAJ&hl=en- Bit Player documentary trailer: https://vimeo.com/323615460- Nathan Weibe, University of Toronto Youtube Lectures: https://www.youtube.com/watch?v=UpZLyXsdJnA- QSim 2025 Speakers: https://qsimconference.org/summer-school/

The Post-Quantum World
Cracking Encryption by 2030? – with Dean Kassmann of IonQ

The Post-Quantum World

Play Episode Listen Later Aug 6, 2025 38:49


IonQ is poised to redefine the quantum computing landscape, projecting a staggering 80,000 logical qubits by 2030—potentially unlocking the power to crack encryption. NIST has us on a timeline to upgrade to post-quantum cryptography (PQC) by 2035, so this 5-year gap may spell doom for cybersecurity. Of course, these machines will also revolutionize industries from finance to drug discovery to AI. How is IonQ boosting their roadmap by orders of magnitude? Learn about their cutting-edge acquisitions and bold vision for scalable, error-corrected systems in this wide-ranging chat between host Konstantinos Karagiannis and IonQ SVP Dean Kassmann.For more information on IonQ, visit https://ionq.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.  Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Security Now (MP3)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (MP3)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1034: Introduction to Zero-Knowledge Proofs

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Security Now (Video HD)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (Video HD)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Security Now (Video HI)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (Video HI)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Radio Leo (Audio)
Security Now 1034: Introduction to Zero-Knowledge Proofs

Radio Leo (Audio)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com