Podcasts about Cryptography

Practice and study of secure communication techniques

  • 740PODCASTS
  • 1,611EPISODES
  • 47mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 28, 2026LATEST
Cryptography

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Cryptography

Show all podcasts related to cryptography

Latest podcast episodes about Cryptography

Bitcoiners - Live From Bitcoin Beach
Adam Back: How Bukele Is TACTICALLY Making El Salvador Wealthier Than Germany (Bitcoin Treasury)

Bitcoiners - Live From Bitcoin Beach

Play Episode Listen Later Feb 28, 2026 27:14 Transcription Available


Why did the academic elite fail to see Bitcoin coming? Dr. Adam Back (@adam3us), the inventor of Hashcash, explains that professors were too obsessed with centralized bank models to conceive of a proof of work system that replaces central authority. While the ivory tower refined flawed systems, cypherpunks built a reality that does not require a middleman.Adam's journey started on the front lines of digital privacy, using his PhD as a license to hack. He laid the foundation for electronic cash by prioritizing sovereign rights. As the founder of Blockstream, he is an OG who never sold out, famously moving past shitcoin bribes to protect his ethical reputation.We tackle the reality of scaling. Adam argues that while Bitcoin is hard to change by design, the lightning network and sidechains allow for high-speed trade without risking the base layer. This modular approach lets Bitcoin evolve into a global financial layer while staying decentralized, proving the skeptics wrong one block at a time.In El Salvador, the government rejected shitcoin pitches to double down on Bitcoin. Adam notes this homegrown success could see the country rival major powers like Germany. It is a blueprint for using sound money to leapfrog the legacy financial system.Adam is now focused on filling innovation gaps from privacy to treasury reserves. The mission to replace fiat is just beginning. Subscribe and comment. Is El Salvador the next Singapore?—Bitcoin Beach TeamConnect and Learn more about Adam BackX: https://x.com/adam3usBlockstream X: https://x.com/BlockstreamHashcash Web: http://www.hashcash.org/Cypherspace Web: http://www.cypherspace.org/adam/Blockstream web: https://blockstream.com/Github: https://github.com/BlockstreamThe Liquid Network: https://liquid.net/Blockstream Jade: https://blockstream.com/jade/   Support and follow Bitcoin Beach:X: https://www.twitter.com/BitcoinBeach IG: https://www.instagram.com/bitcoinbeach_sv TikTok: https://www.tiktok.com/@livefrombitcoinbeach Web: https://www.bitcoinbeach.com Browse through this quick guide to learn more about the episode:00:00 Intro01:33 How Bitcoin achieves decentralized trust without banks. 04:49 Has institutional Bitcoin ruined the cypherpunk mission? 10:48 How Adam Back spotted and rejected shitcoin scams. 12:43 Is Tether (USDT) a systemic risk to the Bitcoin ecosystem? 15:44 Why El Salvador succeeded where other nations failed. 20:32 Scaling Bitcoin via Blockstream, sidechains, and Lightning. 25:50 Adam Back on the 100-year mission for sound money.Live From Bitcoin BeachLive From Bitcoin Beach

BTC Sessions
Kruse & McCormack: UK's Collapse, Deep State Archives, Secrets of Chromosome 2

BTC Sessions

Play Episode Listen Later Feb 24, 2026 74:37


Mentor Sessions Ep. 054: Peter McCormack & Dr. Jack Kruse Fabian Society Exposed: History, Money, Power, & HealthWhat if a centuries-old Fabian Society plot is secretly reclaiming absolute control over UK politics, money, and power—tying into Bitcoin's decentralized revolution, Epstein's hidden genome obsession, and the urgent need for true health, time optimization, and mass noncompliance? In this explosive interview, podcast powerhouse Peter McCormack and decentralized neurosurgeon Dr. Jack Kruse dive deep into the UK's dire political crisis, Fabian history from Queen Victoria to World War II, and how cryptography, Zionism, and elite bankers shaped modern money systems. They expose MKUltra's melanin destruction, the Human Genome Project's dark ties to Rockefeller medicine, and why Bitcoin's proof-of-work timestamping is the ultimate weapon against centralized power.Peter reveals his "I No Longer Consent" project to inspire UK citizens to reject oppressive systems through noncompliance, while Dr. Kruse warns of health sabotage via vaccines, fake food, and polarized light—urging Bitcoiners to prioritize time as the scarcest asset over fiat illusions. Discover how reconnecting with nature and embracing Bitcoin's ethos can counter Fabian control, economic theft, and societal decay. For orange-pilled truth-seekers questioning UK politics, history, money manipulation, power dynamics, health hacks, time mastery, noncompliance strategies, and political solutions in a fiat world, this episode is your wake-up call to sovereignty.About Peter McCormack:Host of The Peter McCormack Show and founder of the "I No Longer Consent" movement.X: https://x.com/PeterMcCormackAbout Dr. Jack Kruse:Neurosurgeon and decentralized health expert.X: https://x.com/DrJackKruseChapters:00:00:00 Teaser & Intro Clips00:01:46 State of UK Politics00:04:39 Understanding the Fabians00:05:04 The Role of Cryptography and History00:28:10 The Intersection of Genetics and Control00:41:56 The Value of Time vs. Bitcoin00:47:49 The Bully Pulpit and Responsibility00:53:09 The No Longer Consent Movement00:56:07 Challenging the State and Political Power00:59:32 Reconnecting with Nature and Ambition01:06:42 The Future of the UK and Bitcoin's Role ⚡ POWERED by Abundant Mines: Fully managed Bitcoin mining. Learn more at https://qrco.de/bgYKPB

Bankless
Ethereum's Last Big Upgrade: The zkEVM | Ansgar Dietrichs

Bankless

Play Episode Listen Later Feb 23, 2026 80:48


Ethereum's next big leap might not look like a single “flip the switch” moment—but it could change how the chain verifies everything. In this episode, Ansgar Dietrichs comes back to unpack the ZK EVM: why “re-executing every block” has been Ethereum's hidden scaling tax, how real-time proofs finally make a different verification model viable, and what it would take to transition safely without sacrificing the verifiability that keeps Ethereum credibly neutral. They explore the three true bottlenecks of blockchain scaling (compute, IO, bandwidth), the roadmap from optional proofs to mandatory proofs, and why client diversity could look radically different in a ZK-native future. ---

Crazy Wisdom
Episode #534: From COVID's Trust Bonfire to Decentralized Everything

Crazy Wisdom

Play Episode Listen Later Feb 23, 2026 54:53


In this episode of the Crazy Wisdom Podcast, host Stewart Alsop sits down with Jake Hamilton, founder of Groundwire and Nockbox, to explore zero-knowledge proofs, Bitcoin identity systems, and the intersection of privacy-preserving cryptography with AI and blockchain technology. They discuss how ZK proofs could offer an alternative to invasive identity verification systems being rolled out by governments worldwide, the potential for continual learning AI models to shift the balance between centralized and open-source development, and why building secure, auditable computing infrastructure on platforms like Urbit matters more than ever as we face an explosion of AI agents and automated systems. Jake also explains Nockchain's approach to creating a global repository of cryptographically verified facts that can power trustless programmable systems, and how these technologies might converge to solve problems around supply chain security, personal data sovereignty, and resistance to censorship.Timestamps00:00 Introduction to Groundwire and Knockbox02:48 Understanding Zero-Knowledge Proofs06:04 Government Adoption of ZK Proofs08:55 The Future of Identity Verification11:52 AI and ZK Proofs: A New Era14:54 The Role of Urbit in Technology18:03 The Impact of COVID on Trust20:51 The Evolution of AI and Data Privacy23:47 The Future of AI Models26:54 The Need for Local AI Solutions29:51 Interoperability of Knockchain and BitcoinKey Insights1. Zero-Knowledge Proofs Enable Privacy-Preserving Verification: Jake explains that ZK proofs allow you to prove computational outcomes without revealing the underlying data. For example, you could prove you're over 18 without exposing your full identity or driver's license information. The proof demonstrates that a specific program ran through certain steps and reached a particular conclusion, and validating this proof is fast and compact. This technology has profound implications for age verification, identity systems, and protecting privacy while maintaining necessary compliance, potentially offering a middle path between surveillance states and complete anonymity.2. Government Adoption of Privacy Technology Remains Uncertain: There are three competing motivations driving government identity verification systems: genuine surveillance desires, bureaucratic efficiency seeking, and legitimate child protection concerns. Jake believes these groups can be separated, with some officials potentially supporting ZK-based solutions if positioned correctly. He notes the EU is exploring ZK identity verification, and UK officials have shown interest. The key is framing privacy-preserving technology as protection against "the swamp" rather than just abstract privacy benefits, which could resonate with certain political constituencies.3. The COVID Era Destroyed Institutional Trust at Unprecedented Scale: The conversation identifies COVID as potentially the largest institutional trust-burning event in human history, with numerous institutions simultaneously losing credibility with large portions of the population. This represents a dramatic shift from the boomer generation's default trust in authority figures and mainstream media. This collapse is compounded by the incoming AI revolution, creating a perfect storm where established bureaucracies cannot adapt quickly enough to manage rapidly evolving technology, leaving society in fundamentally unmanageable territory.4. Centralized AI Models Create Dangerous Dependencies: Both speakers acknowledge growing dependence on centralized AI services like Claude, with some users spending thousands monthly on tokens. This dependency creates vulnerability to price increases and service disruptions. Jake advocates for local AI deployment using models like DeepSeek R1, running on personal hardware to maintain control and privacy. The shift toward continuous learning models will fundamentally change the AI landscape, making personal data harvesting even more valuable and raising urgent questions about compensation and consent for training data contribution.5. High-Quality Training Data Is Becoming the Primary AI Bottleneck: Stewart argues that AI development is now limited more by high-quality training data than by compute power. The industry has exhausted easily accessible internet data and body-shop-style data labeling. Companies are now using specialized boutique services with techniques like head-mounted cameras for live-streaming world model training. This scarcity is subtly driving price increases across AI services and will fundamentally reshape the economics of AI development, with implications for who controls these increasingly powerful systems.6. Urbit Offers a Foundation for Trustworthy Computing: Jake positions Urbit as essential infrastructure for the AI age because its 30,000-line codebase (versus Unix's three million lines) can be understood by individual humans. Its deterministic, purely functional, and strictly typed design aims for eventual ossification—software that doesn't require constant security patches. This "tiny and diamond perfect" approach addresses the fundamental insecurity of systems requiring monthly vulnerability patches. In an era of AI agents and potential prompt injection attacks, having verifiable, comprehensible computing infrastructure becomes existentially important rather than merely desirable.7. Nockchain Creates a Global Repository of Provable Truth: Jake's vision for Nockchain combines ZK proofs with blockchain technology to create a globally available "truth repository" where verified facts can be programmatically accessed together. This enables smart contracts or programs gated on combinations of proven facts—such as temperature readings from secure devices, supply chain events, and payment confirmations. By using Nock's abstract, simple design optimized for ZK proof generation, the system can validate complex real-world conditions without exposing underlying data, creating infrastructure for coordinating action based on verifiable private information at global scale.

The Effortless Podcast
Quantum, AI & Data: In Conversation with Dr. Abhishek Bhowmick - Episode 22: The Effortless Podcast

The Effortless Podcast

Play Episode Listen Later Feb 22, 2026 75:23


In this episode of The Effortless Podcast, Dheeraj Pandey speaks with Dr. Abhishek Bhowmick about how quantum mechanics reshaped our understanding of determinism and why that shift matters for AI today.  From the Einstein–Bohr debates to the idea that nature is fundamentally probabilistic, they explore how the collapse of “if-then” thinking began nearly a century ago. The discussion draws parallels between quantum superposition and modern LLM behavior. At its core, the episode reframes AI as a rediscovery of how reality computes. The conversation then moves from physics to computing architecture, tracing the evolution from scalar CPUs to GPUs, TPUs, tensors, and eventually quantum computing. They examine why probabilistic systems and vector math feel more natural than purely deterministic software. Hybrid computing models show that classical systems still matter. The episode also unpacks what quantum computers are truly good at, especially in cryptography and simulation. Ultimately, it reflects on whether the future of computing lies in embracing probability rather than resisting it. Key Topics & Timestamps 00:00 – Welcome, context, and how Dheeraj & Abhishek met 04:00 – Abhishek's journey: IIT, Princeton, Apple, Snowflake 08:00 – The 1927 Solvay Conference and physics at a crossroads 12:00 – Einstein vs. Bohr: determinism vs. probability 16:00 – Superposition and the collapse of the wave function 20:00 – Fields vs. particles: what is an electron really? 25:00 – Matter particles, force particles, and the Standard Model 30:00 – Transistors, voltage, and the rise of deterministic computing 35:00 – From scalar CPUs to vectors and matrices 40:00 – Tensors, linear algebra, and modern AI systems 45:00 – Principle of Least Action and gradient descent parallels 50:00 – Hallucinations, probability mass, and LLM behavior 55:00 – Vector databases, embeddings, and KNN search 59:00 – GPUs vs. TPUs: matrix vs. tensor architectures 1:05:00 – What quantum computers are actually good at 1:10:00 – Post-quantum cryptography and the future of computing Host -  Dheeraj Pandey Co-founder & CEO at DevRev. Former Co-founder & CEO of Nutanix. A systems thinker and product visionary focused on AI, software architecture, and the future of work. Guest -  Dr Abhishek Bhowmick                                                                                                                                                                                                                Co-Founder and CTO of Samooha, a secure data collaboration platform acquired by Snowflake. He previously worked at Apple as Head of ML Privacy and Cryptography, System Intelligence, and Machine Learning, and earlier at Goldman Sachs. He attended Princeton University and was awarded IIT Kanpur's Young Alumnus Award in 2024. Follow the Host and Guest - Dheeraj Pandey: LinkedIn - https://www.linkedin.com/in/dpandey Twitter - https://x.com/dheeraj Abhishek Bhowmik  LinkedIn –  https://www.linkedin.com/in/ab-abhishek-bhowmick Twitter/X – https://x.com/bhowmick_ab Share Your Thoughts Have questions, comments, or ideas for future episodes?

ASecuritySite Podcast
World-leaders in Cryptography: David Naccache

ASecuritySite Podcast

Play Episode Listen Later Feb 19, 2026 83:02


David is a cryptographer and a professor at the École normale supérieure. He was previously a professor at Panthéon-Assas University. David is well known for his work in public-key cryptography, especially around the cryptanalysis of digital signature schemes. He co-designed the Naccache-Stern cryptosystem and the  Naccache-Stern knapsack cryptosystem. David is also a visiting professor and researcher at the Information Security Group of Royal Holloway, University of London, and in 2020, was elected as a Fellow of the IACR.

The Post-Quantum World
Quantum Money and Self-Destructing Signatures — with NTT

The Post-Quantum World

Play Episode Listen Later Feb 18, 2026 28:44


A one-shot signature is a new quantum computing tool that lets people verify information publicly using a quantum signing key that destroys itself after use. This “proof of destruction” makes sure the key can only be used once, which could lead to cryptographic solutions that classical math could not achieve. Host Konstantinos Karagiannis talks with Omri Shmueli, a cryptographer and postdoctoral research fellow at NTT Research, about how one-shot signatures might change digital finance and secure communication. Shmueli shares how this technology could make decentralized cryptocurrency possible without a blockchain or help solve the big scalability problems of current blockchains by letting users create their own unique quantum money. The episode also looks at how unclonable quantum keys could give users proof that not only do they have a secret key, but they are the only person in the world who does.   For more information on the research NTT is doing, visit https://ntt-research.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Inspiring Design... with Rashan Senanayake
S04 : Ep. 11 : Post-Quantum Cryptography: Designing Cybersecurity Beyond Quantum Computing, Featuring Craig Costello

Inspiring Design... with Rashan Senanayake

Play Episode Listen Later Feb 16, 2026 65:38


In this episode, we go quantum! Our host Rashan Senanayake sits down with Professor Craig Costello, a leading cryptographer from Queensland University of Technology and former Microsoft Research scientist, to demystify how cryptography quietly secures our everyday digital lives, from emails, online banking, and messaging apps to the global systems we rely on, and why these foundations must evolve as quantum computing becomes a reality, exploring what post-quantum cryptography really means, how quantum computers threaten today's cybersecurity standards, how quantum-resistant global security frameworks are being developed, and why mathematics, education, and early exposure to STEM remain critical to shaping a secure digital future for education, technology, government, and business alike.

The 'X' Zone Radio Show
Rob McConnell Interviews - SCOTT MARLOWE - Cryptozoology and Cryptography

The 'X' Zone Radio Show

Play Episode Listen Later Feb 15, 2026 46:39 Transcription Available


Scott Marlowe is a researcher whose work connects the study of cryptozoology—the investigation of unknown or legendary creatures—with cryptography, the analysis of hidden codes and symbolic systems. Marlowe explores how folklore, eyewitness reports, historical documents, and encoded references may contain overlooked clues about mysterious creatures and unexplained phenomena. By blending pattern analysis, symbolic interpretation, and field research, his approach suggests that both biological mysteries and hidden information systems may require similar investigative methods rooted in decoding evidence and contextual meaning.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media

Root Causes: A PKI and Security Podcast
Root Causes 579: Make Cryptography Boring Again

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Feb 10, 2026 17:44


In this episode Jason declares that we must make cryptography boring again. We get into what that means and why it matters.

Quantum Revolution Now
Quantum's "Wright Brothers" Moment: The Race to Break the Unbreakable

Quantum Revolution Now

Play Episode Listen Later Feb 8, 2026 14:13


Dive into the high-stakes world of quantum cryptography in this gripping episode of the Qubit Value Podcast. Recorded on February 8, 2026, hosts explore the "theoretical key" to modern encryption: Shor's algorithm. From the stunning September 2025 breakthrough by Inflection using logical qubits to the revolutionary mathematical shortcuts proposed by NYU's Oded Regev, this discussion unpacks how the timeline for breaking RSA encryption has shifted from decades away to unpredictable. Whether it's the "IKEA flat-pack" approach to modular hardware or the surprising resilience of new algorithms against noise, this episode is a must-listen for anyone curious about the "Shor's moment" that could redefine digital security forever. Want to hear more? Send a message to Qubit Value

Security. Cryptography. Whatever.
Python Cryptography Breaks Up with OpenSSL with Paul Kehrer and Alex Gaynor

Security. Cryptography. Whatever.

Play Episode Listen Later Feb 2, 2026 72:38 Transcription Available


The Python cryptography module, pyca/cryptography, has mostly been a sane wrapper around a pile of C, so that users get performant cryptography on the many, many platforms Python targets. Therefore its maintainers, Alex Gaynor and Paul Kehrer, have become intimately familiar with OpenSSL. Recently, they declared that after many years of trying to make it work, they announced pyca/cryptography would be moving away from OpenSSL when supporting new functionality and exploring adding other backends instead. We invited them on to tell us about what has happened to OpenSSL, even after the investments and improvements following Heartbleed. No guests on this pod represent anyone besides themselves.Watch on YouTube: https://www.youtube.com/watch?v=dEKBHI3rodYTranscript: https://securitycryptographywhatever.com/2026/02/01/python-cryptography-breaks-up-with-opensslLinks:- https://cryptography.io/en/latest/statements/state-of-openssl/- Py Cryptography: https://cryptography.io- https://archive.openssl-conference.org/2025/presentations/Alex_Gaynor_Paul_Kehrer_The_Python_Cryptographic_Authoritys_OpenSSL_Experience.pdf- https://securitycryptographywhatever.com/2025/08/16/alex-gaynor/- https://packages.gentoo.org/packages/media-libs/libsdl- https://www.youtube.com/watch?v=RUIguklWwx0- https://datatracker.ietf.org/doc/rfc9180/- https://docs.openssl.org/3.3/man3/OSSL_PARAM/- https://openssl.foundation/- https://github.com/openssl/openssl/issues/17064- https://www.feistyduck.com/newsletter/issue_132_openssl_performance_still_under_scrutiny- https://github.com/topazproject/topaz- https://github.com/actions/runner/issues/1069- https://crystalhotsauce.com/- https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467- https://en.wikipedia.org/wiki/Ship_of_Theseus- https://boringssl.googlesource.com/boringssl/+/aa202db1d7091b88b80f0a58c630c5c1aefc817d- https://www.ibm.com/products/open-sdk-for-rust-aix- https://dadrian.io/blog/posts/corporate-support-xz/- https://peps.python.org/- https://cryptography.io/en/latest/hazmat/primitives/asymmetric/ed448/- https://go.dev/blog/fips140- https://dadrian.io/blog/posts/roll-your-own-crypto/"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

Cyber Security Headlines
Department of Know: CISA's cryptography categories, Gottumukkala's ChatGPT gotcha, NTLM says goodbye

Cyber Security Headlines

Play Episode Listen Later Feb 2, 2026 46:00


Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Steve Zalewski, co-host, Defense in Depth, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Devo/Strike 48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.  All links and the video of this episode can be found on CISO Series.com        

ai chatgpt defense depth gotcha cisa cryptography ntlm ciso series rich stroffolino
Bitcoin Takeover Podcast
S17 E5: Paul Sztorc on Bitcoin Derangements

Bitcoin Takeover Podcast

Play Episode Listen Later Jan 29, 2026 240:39


Over the last 6 months, Paul Sztorc has compiled an impressive list of inconsistencies and significant losses from the Bitcoin maximalist camp. He referred to them as ”derangements” and we cover most of them in this brutally honest wakeup call. Read Paul's article: https://www.truthcoin.info/blog/derangements/ Time stamps: 00:01:16 Introduction & Article Overview 00:02:41 Defining Derangements 00:05:31 Truth vs. Loyalty in Bitcoin Culture 00:09:55 Leadership Void & Bitcoin Core Stagnation 00:14:25 Consensus, Soft Forks, and Governance 00:17:46 Block Size Wars & Scaling Debates 00:19:11 Bitcoin Cash, Competition, and Signaling Theory 00:27:27 Bitcoin SV, Craig Wright, and Cultural Derangements 00:31:52 Lightning Network as a Sacred Cow 00:41:14 Treasury Companies & Michael Saylor 00:51:37 Layer Two Labs & Scaling Solutions 00:54:16 Drivechain, Quantum Resistance, and L2 Competition 01:07:24 Soft Forks, BIP Process, and Development Paralysis 01:11:41 Ordinals, NFTs, and Filtering Debates 01:22:36 Attacks on Developers & Community Toxicity 01:25:24 CTV, Jeremy Rubin, and Soft Fork Misunderstandings 01:41:24 Ethereum, Altcoins, and Market Competition 01:51:16 Mining, Miners' Apathy, and Industry Scaling 02:03:09 Libbitcoin vs. Bitcoin Core 02:17:46 Final Rotation & Store of Value vs. Medium of Exchange 02:35:08 Non-Mined L2s, Rollups, and Miner Incentives 02:52:05 Purity Tests & Cancel Culture in Bitcoin 03:08:35 SegWit Discount & Taproot Critique 03:26:23 Address Formats, BIP47, and UX Derangements 03:36:50 Silent Payments, BIP47 & Privacy Features 03:55:05 Bitcoin Maximalism, Post-Maximalism, and Ideology 03:57:47 Game Theory, Politics, and Drivechain Criticism 04:00:14 Conclusion & Final Thoughts

ASecuritySite Podcast
World-leaders in Cryptography: Paul van Oorschot

ASecuritySite Podcast

Play Episode Listen Later Jan 29, 2026 89:28


 Paul  is a cryptographer and computer security researcher, and is currently a professor of computer science at Carleton University in Ottawa, Ontario. He previously held a Canada Research Chair in authentication and computer security and is a  Fellow of the Royal Society of Canada (FRSC). Along with Alfred Menezes and Scott Vanstone, Paul was a co-author of the Handbook of Applied Cryptography, and the author of Computer Security and the Internet. In 2000, he was awarded  The J.W. Graham Medal in Computing Innovation, and a Fellow of the Association for Computing Machinery in 2016 for his "contributions to applied cryptography, authentication and computer security.

The Buzz with ACT-IAC
Playbook on Post-Quantum Cryptography: A Talk with an Associates Graduate from Accenture Federal Services

The Buzz with ACT-IAC

Play Episode Listen Later Jan 15, 2026 33:57 Transcription Available


We get to talk with Kathryn Wayman, an early career professional who shares her journey through the ACT-IAC Professional Development Associates (PDA) program. Kathryn highlights her background, experience in government and consulting, particularly at Accenture Federal Services, and her involvement in developing a playbook for federal readiness for quantum computing. They discuss Kathryn's passion for public service, the diverse opportunities provided by the PDA program, and the significance of quantum computing and cryptography in federal agencies. The episode wraps up with a fun acronym challenge, showcasing Kathryn's competitive spirit.Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)

ASecuritySite Podcast
World-leaders in Cryptography: Craig Costello

ASecuritySite Podcast

Play Episode Listen Later Jan 15, 2026 119:24


Craig is a Professor of Computer Science at Queensland University of Technology (QUT), who has a special focus on post-quantum cryptography and Zero Knowledge Proofs. He was previously a Principal Researcher at Microsoft Research at Redmond. Craig did his PhD at QUT from 2008 to 2012, and received a Fulbright Scholarship with UC Irvine from 2010 and 2011. In 2015, Craig published details of the FourQ elliptic curve, and which is one of the fastest curves around.  

ASecuritySite Podcast
World-leaders in Cryptography: Kenny Paterson

ASecuritySite Podcast

Play Episode Listen Later Jan 14, 2026 105:23


Kenny is a professor in the Department of Computer Science at ETH Zurich, where he leads the Applied Cryptography Group. He was previously a professor in the Information Security Group at Royal Holloway, University of London. He served as co-chair of the IRTF's research group on Cryptography, CFRG, from 2014 to 2019 and as the Editor-in-Chief for the Journal of Cryptography 2017 to 2020. He was elected as an IACR Fellow in 2017 and was the IACR Distinguished Lecturer in 2025. He obtained his PhD from Royal Holloway in 1993, and his Doctoral Supervisor was Fred Piper. Kenny has been awarded a number of awards for his research work, including the Applied Networking Research Prize from the IRTF in 2013 and the Award for Outstanding Research in Privacy Enhancing Technologies, for work with Mihir Bellare and Phil Rogaway on the Security of symmetric encryption against mass surveillance, a paper published at CRYPTO 2014.

Ash Said It® Daily
Episode 2150 - Ken Griggs on the Future of Digital Identity

Ash Said It® Daily

Play Episode Listen Later Dec 20, 2025 16:17 Transcription Available


When the world's leading voice in human-centered privacy joins forces with the high-octane energy of Ash Brown, the result is an eye-opening deep dive into the digital frontier. Ash Brown welcomes Ken Griggs, the Emmy award-winning technologist and CEO of Julia Social, for a timely conversation about the UK government's proposed nationwide digital ID system and its global implications. The Big Debate: Security vs. Surveillance Ken Griggs brings decades of expertise in blockchain technology and cryptography to dissect what a centralized digital ID truly means for the average citizen. While governments pitch these systems as a convenience for accessing public services, Ken sounds the alarm on the hidden costs to personal privacy and data autonomy. In this captivating episode, Ash and Ken explore: The Centralization Trap: Why storing the identity of an entire nation in a single database creates a high-risk honey pot for hackers and state actors. The Julia Social Vision: How Ken's work with Julia Social advocates for a decentralized identity approach, where individuals—not institutions—own and control their own data. The UK Digital ID Ripple Effect: Why the global community should watch these legislative moves closely, as they could set a groundbreaking or dangerous precedent for digital rights worldwide. Turning Tech Insight into Real-World Action Ash Brown's signature Authentic Optimism keeps the conversation grounded as Ken provides actionable insights on how listeners can protect their digital footprints today. From understanding the mechanics of Not.Bot to the security power of the Chia blockchain, this interview bridges the gap between complex tech and everyday life. Seeking a masterclass in the future of privacy? This episode of The Ash Said It Show is essential listening for anyone who values their digital freedom. Web: Not.Bot About this Founder: Ken Griggs is the visionary founder and CEO of Julia Social, a platform dedicated to human-centered privacy and decentralized social networking. With a career spanning decades at the intersection of technology and human interaction, Griggs has established himself as a premier authority on blockchain applications and digital security. A Legacy of Innovation from Speech Research to Blockchain Before launching Julia Social, Ken Griggs built a reputation as a pioneer in several cutting-edge fields. He spent years at the forefront of speech recognition research, laying the groundwork for how humans interact naturally with complex digital systems through voice technology. Following this, he transitioned into a leadership role as the Vice President of Customer Success at Chia Network Inc (CNI). During his tenure at CNI, he played a pivotal role in the growth of the eco-friendly Chia blockchain, specializing in the development of real-world applications focused on security, sustainability, and efficiency. The Shift to Julia Social and Digital Autonomy Driven by a deep passion for user-owned data and digital autonomy, Griggs eventually departed from his role at Chia Network to found Julia Social. His current mission is to reshape the digital landscape by moving away from centralized data silos toward a more secure, decentralized future. Today, Ken Griggs is frequently sought after for his insights on human-centered privacy, designing technology that prioritizes the user over the institution. He remains a leading voice in decentralized identity and blockchain strategy, influencing the global conversation on how digital identity and social connectivity should evolve in a Web3 world. Meet Ash Brown, the dynamic American powerhouse and motivational speaker dedicated to fueling every journey toward personal and professional success. Recognized as a trusted voice in personal development, Ash delivers uplifting energy and relatable wisdom across every platform she touches. Why Choose Ash Brown Ash Brown stands out as an influential media personality due to her Authentic Optimism and commitment to providing Actionable Strategies. She equips her audience with the tools necessary to create real change and rise above life challenges. For those seeking inspiration, Ash Brown serves as the ultimate guide to turning motivation into measurable action. The Ash Said It Show Top Ranked Podcast With over 2100 episodes and more than 700000 global listens, the Ash Said It Show features inspiring interviews, life lessons, and empowerment stories from changemakers across all industries. Each episode delivers practical tools and encouragement to help listeners thrive in their daily lives. Visit the official website at AshSaidit.com to explore more. Connect with Ash Brown Follow the journey and access exclusive content through these official channels Goli Gummy Discounts go.goli.com/1loveash5 Luxury Handbag Discounts theofficialathena.com ref ashsaidit Review the Podcast on iTunes itunes.apple.com/us/podcast/ash-said-it/id1144197789 Subscribe on YouTube youtube.com/c/AshSaidItSuwanee Instagram instagram.com/1loveash Facebook facebook.com/ashsaidit Official Blog ashsaidit.com/blog #atlanta #ashsaidit #theashsaiditshow #ashblogsit #motivationalspeaker #personaldevelopment #atlantapodcast #femaleentrepreneur #successmindset #inspiringwomen #contentcreator #selfimprovement #ashbrown #businessgrowth #atlantabloggerBecome a supporter of this podcast: https://www.spreaker.com/podcast/ash-said-it-show--1213325/support.

Bitcoin for Millennials
Bitcoin CRASH? The Original Thesis Has Only Accelerated | Erik Cason | BFM213

Bitcoin for Millennials

Play Episode Listen Later Dec 11, 2025 53:26


Erik Cason is Crypto-anarchist, cypherpunk, iconoclast, author, and co-founder of https://vora.io, the bitcoin fortress for sovereign individuals.› https://x.com/ErikcasonPARTNERS

The PowerShell Podcast
Cryptography, Cracking Codes, and Breaking CBC with Dr. Al Carlson

The PowerShell Podcast

Play Episode Listen Later Dec 8, 2025 80:51


In this episode of The PowerShell Podcast, host Andrew Pla welcomes Dr. Al Carlson, a cryptographer, mathematician, and engineer whose career spans more than four decades in military intelligence, embedded systems, and advanced encryption research. Dr. Carlson explains how set theory and mathematical patterns underpin all cryptography, breaking down complex systems like AES into understandable concepts. He discusses his groundbreaking work on isomorphic cipher reduction, polymorphic encryption, and how simplicity, not complexity, is often the key to true security.   Key Takeaways: All encryption is patterns – Dr. Carlsen explains how every cipher, including AES, can be viewed as a substitution cipher, allowing for new ways to analyze and strengthen encryption. Simplicity creates strength – Complexity doesn't guarantee security. By distilling systems to their fundamentals, cryptographers can identify weaknesses faster and design better ciphers. Quantum computing and cryptography's future – Quantum computing's potential to break current encryption standards highlights the need for polymorphic and post-quantum approaches to secure data. Guest Bio: Dr. Al Carlson is a cryptographer, mathematician, and educator with over forty years of experience in electronic warfare, military cryptography, and advanced encryption systems. His work in set theory-based cryptographic analysis and polymorphic encryption has influenced how researchers think about code-breaking and data protection. A longtime IEEE member and mentor, Dr. Carlson continues to publish papers on approaches to information security and encryption theory.Resource Links IEEE (Institute of Electrical and Electronics Engineers) – https://www.ieee.org Breaking CBC Def Con Talk by Dr. Carlson - https://www.youtube.com/watch?v=v0IsYNDMV7A Connect with Andrew - https://andrewpla.tech/links PowerShell Wednesdays – https://www.youtube.com/playlist?list=PL1mL90yFExsix-L0havb8SbZXoYRPol0B PDQ Discord – https://discord.gg/PDQ The PowerShell Podcast on YouTube: https://youtu.be/gWmlvKFduP8

Root Causes: A PKI and Security Podcast
Root Causes 553: Connecting Quantum Clocks to Cryptography

Root Causes: A PKI and Security Podcast

Play Episode Listen Later Dec 3, 2025 5:55


We discuss quantum clocks and their potential role in cryptography.

The Post-Quantum World
Whispering Quantum Keys … Is QKD Still Viable as PQC? — with Vanesa Diaz of LuxQuanta

The Post-Quantum World

Play Episode Listen Later Nov 26, 2025 34:33


We cover post-quantum cryptography (PQC) regularly on this show, focusing on the new math-based ciphers that will secure the Internet as quantum computing becomes more powerful. But what about physics-based encryption or quantum key distribution (QKD)? Is that still a thing? We examine how exploiting the laws of quantum physics can securely exchange encryption keys over a fiber and explore the benefits of the newer continuous-variable QKD. CVQKD leverages off-the-shelf telecom components for affordability, integrates with existing data networks, achieves higher key-generation rates, and reaches distances of up to 100 kilometers without requiring dark fibers. Real-world demos include securely linking hospitals in Madrid for remote consultations via Telefonica's network, and there could be a future where QKD devices are integrated into our home routers, democratizing quantum security. Join host Konstantinos Karagiannis for a wide-ranging chat with Vanesa Diaz from LuxQuanta.For more information on LuxQuanta, visit https://www.luxquanta.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Closed Network Privacy Podcast
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat

Closed Network Privacy Podcast

Play Episode Listen Later Nov 22, 2025 154:03


Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS

Resilient Cyber
Resilient Cyber w/ Jesus and John - Post-Quantum Cryptography for Engineers

Resilient Cyber

Play Episode Listen Later Nov 19, 2025 22:39


In this episode of Resilient Cyber, I'm joined by Jesus Alejandro Cardenes Cabre, SVP of Product Architecture and John Xiaremba, Software Engineer, both from the VIA Knowledge Hub team to dig into all things post-quantum cryptography (PQC). This includes PQC standards, as well as practical steps developers must take today to mitigate future risks.

c’t uplink
Post Quantum Cryptography | c't uplink

c’t uplink

Play Episode Listen Later Nov 15, 2025 46:28 Transcription Available


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

c't uplink (HD-Video)
Post Quantum Cryptography | c't uplink

c't uplink (HD-Video)

Play Episode Listen Later Nov 15, 2025


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

c't uplink (SD-Video)
Post Quantum Cryptography | c't uplink

c't uplink (SD-Video)

Play Episode Listen Later Nov 15, 2025


Noch gelten die meisten modernen Verschlüsselungsverfahren als ziemlich sicher. Doch manche der heute gängigen Algorithmen können durch hinreichend leistungsstarke Quantencomputer nicht nur geschwächt, sondern geradezu nutzlos werden, beispielsweise RSA. Denn Quantencomputer eignen sich hervorragend, um mathematische Probleme wie die Primfaktorzerlegung extrem effizient zu lösen. Dass es solche Rechner jemals geben wird, ist zwar noch nicht zu hundert Prozent ausgemacht. Nach aktuellem Forschungsstand ist aber davon auszugehen, dass der "Q-Day" keine Frage des "ob" mehr ist, sondern nur noch eine des "wann". Sowohl Banken und Versicherungskonzerne als auch Behörden und andere staatliche Institutionen tun also gut daran, sich auf dieses Szenario vorzubereiten. Sie müssen die Verschlüsselung ihrer Kommunikation auf Algorithmen umstellen, die nach heutigem Kenntnisstand auch von Quantencomputern nicht gebrochen werden können. "Post Quantum Cryptography" ist das Schlagwort dazu, kurz PQC. Das klingt nach Raketenwissenschaft (ist es auch irgendwie), doch es gibt auch eine gute Nachricht: PQC-Algorithmen existieren durchaus und werden in einigen Bereichen auch schon in der Breite eingesetzt. Im c't uplink sprechen wir über allerhand Fragen zu PQC und Quantencomputern. Vor welchen praktischen Herausforderungen stehen etwa Banken? Warum sind manche Algorithmen gefährdet und andere nicht? Wie rechnet ein Quantencomputer? Wie kann man sich Qubits vorstellen – und wie sieht die Hardware eines Quantencomputers eigentlich aus? ► Unseren Schwerpunkt zu Post-Quanten-Kryptographie lesen Sie bei heise+: https://www.heise.de/ratgeber/Wie-Quantencomputer-Banken-und-Versicherungen-bedrohen-10646496.html ► sowie in c't 23/2025: https://www.heise.de/select/ct/2025/23/2525815470955601129

Packet Pushers - Full Podcast Feed
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Packet Pushers - Network Break
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Network Break

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Packet Pushers - Fat Pipe
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone

Packet Pushers - Fat Pipe

Play Episode Listen Later Nov 10, 2025 28:59


Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »

Know, Grow and Scale with Laura Johns
From Cryptography to Cybersecurity Innovation: Gadalia O'Brien on Eliminating Passwords and Empowering MSPs

Know, Grow and Scale with Laura Johns

Play Episode Listen Later Nov 7, 2025 15:54


In this episode, Laura Johns sits down with Gadalia O'Brien, founder and CEO of Dapple Security, an early-stage cybersecurity startup reshaping how businesses log in securely. With a bold mission to eliminate passwords and a channel-first model that empowers MSPs, Gadalia is leading the charge toward more human-centered digital security. Laura and Gadalia explore her unique journey from mathematician and NSA cryptographer to tech founder, sharing insights on what it takes to innovate in cybersecurity, lead authentically, and build strong networks of mentors and peers. Gadalia also opens up about diversity in cybersecurity, how Dapple's biometric authentication model is changing the game, and why relationships—not products—fuel lasting business growth. Whether you're an MSP leader, startup founder, or cybersecurity enthusiast, this conversation offers practical wisdom and inspiration on scaling securely in a people-first way. To learn more about Dapple Security, visit: https://dapplesecurity.com. _________________________________________________________ Follow The Business Growers: https://www.instagram.com/thebizgrowers/ About The Business Growers: Many Managed Services Providers and IT companies struggle to grow because they are constantly putting out fires and don't have the bandwidth to focus on the marketing strategy and execution required to scale the business. At The Business Growers, we believe you shouldn't have to hire a full-time marketing team to compete in the marketplace. We work exclusively with MSPs and IT companies, serving as their tech marketing dream team and offering a proven framework for revenue growth. Visit us at https://thebusinessgrowers.com 

No Password Required
No Password Required Podcast Episode 65 — Steve Orrin

No Password Required

Play Episode Listen Later Nov 4, 2025 44:51


Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice  SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.  TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions.  TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security  Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you."  Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve

ai technology advice young innovation evolution startups artificial intelligence collaboration networking mentorship cybersecurity biology intel cto compliance organizations intersection required diverse governance machine learning nurturing misinformation iot surround homeland security poker autonomy lovecraft team building passwords deepfakes internet of things federal government community engagement critical thinking hellraiser blind spots body language collectibles phishing emerging technologies cloud computing hackathons hands on learning jim collins scalability encryption defcon call of cthulhu career journey data protection team dynamics good to great built to last social engineering leadership roles summaryin zero trust world series of poker ai ethics pinhead cryptography predictive analytics intelligence community experiential learning firmware veterans administration edge computing department of defense intel corporation learning from failure threat intelligence pattern recognition orrin startup culture bruce schneier creative collaboration ai security human psychology ethical hacking customer focus physical security performance optimization technology leadership applied ai innovation culture fedramp capture the flag behavioral analysis web security kali linux federal programs cybersecurity insights government technology pathfinding puzzle box continuous monitoring nurturing talent reliability engineering failure analysis buffer overflow poker tells quality of service
The Digital Executive
The Future of Digital Trust: Tim Callan on Certificates, Cryptography, and Identity | Ep 1138

The Digital Executive

Play Episode Listen Later Nov 2, 2025 12:57


In this episode of The Digital Executive, host Brian Thomas sits down with Tim Callan, Chief Experience Officer at Sectigo and one of the leading voices in SSL and PKI technology. With over 20 years shaping the standards of digital trust, Tim unpacks how the invisible infrastructure behind certificates and encryption keeps our digital world secure.Tim explores the coming shift toward shorter certificate lifespans, why automation is essential for enterprises, and how post-quantum cryptography (PQC) will reshape cybersecurity in the near future. He also dives into the evolution of digital identity—from enterprise systems to personal digital wallets—and how encryption can both empower privacy and resist misuse.Whether you're a tech leader, IT professional, or digital security enthusiast, this episode offers a rare look into the technologies protecting our connected future.If you liked what you heard today, please leave us a review - Apple or Spotify. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Post-Quantum World
From Quantum Economy to Simulation Theory – with Anders Indset

The Post-Quantum World

Play Episode Listen Later Oct 29, 2025 44:54


How are recent quantum computing breakthroughs reshaping business, competition, and society itself? What global challenges might quantum and AI either help with or introduce? We're trying something a little different and asking a futurist and bestselling author of The Quantum Economy to weigh in on how our increasing qubit counts might all play out in a few years. Join host Konstantinos Karagiannis for a wide-ranging, philosophical chat with Anders Indset, and get ready to hear about simulation theory towards the end.   For more information on Anders Indset and his books, visit https://andersindset.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

The International Risk Podcast
Episode 278: Post-Quantum Cryptography and Global Infrastructure Risk with Dr. Michele Mosca

The International Risk Podcast

Play Episode Listen Later Oct 27, 2025 31:12 Transcription Available


Today, Dominic Bowen hosts Dr. Michele Mosca on The International Risk Podcast to explore the global urgency surrounding post-quantum cryptography and the risks quantum computing poses to modern infrastructure. They discuss how the question is no longer if but when quantum computers will break today's encryption, the implications for global finance and critical systems, and what governments, businesses, and institutions must do now to prepare. Together they examine the pace of quantum innovation, the widening gap between technological capability and policy readiness, and the geopolitical competition shaping quantum research and security standards.Dominic and Dr. Mosca also delve into the technical, economic, and diplomatic stakes of the quantum transition, from the “harvest-now, decrypt-later” threat to the cost and complexity of retrofitting global encryption systems. They explore how coordinated international governance, investment in post-quantum standards, and stronger public-private partnerships can build digital resilience before vulnerabilities are exploited.Dr. Michele Mosca is Co-Founder and CEO of evolutionQ, a company providing quantum-safe cybersecurity solutions, and Co-Founder of the Institute for Quantum Computing at the University of Waterloo. He is also a founding member of the Cybersecurity and Privacy Institute and a leading authority on quantum-safe cryptography and risk management. His research and advisory work have helped shape international strategies for quantum readiness across finance, government, and global infrastructure sectors.Drawing on decades of research and policy engagement, Dr. Mosca explains why societies must act now to secure their data and systems, how the transition to post-quantum cryptography can be managed effectively, and why this emerging field will define the resilience and trust of the digital age.The International Risk Podcast brings you conversations with global experts, frontline practitioners, and senior decision-makers who are shaping how we understand and respond to international risk. From geopolitical volatility and organised crime, to cybersecurity threats and hybrid warfare, each episode explores the forces transforming our world and what smart leaders must do to navigate them. Whether you're a board member, policymaker, or risk professional, The International Risk Podcast delivers actionable insights, sharp analysis, and real-world stories that matter.Dominic Bowen is the host of The International Risk Podcast and Europe's leading expert on international risk and crisis management. As Head of Strategic Advisory and Partner at one of Europe's leading risk management consulting firms, Dominic advises CEOs, boards, and senior executives across the continent on how to prepare for uncertainty and act with intent. He has spent decades working in war zones, advising multinational companies, and supporting Europe's business leaders. Dominic is the go-to business advisor for leaders navigating risk, crisis, and strategy; trusted for his clarity, calmness under pressure, and ability to turn volatility into competitive advantage. Dominic equips today's business leaders with the insight and confidence to lead through disruption and deliver sustained strategic advantage.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Tell us what you liked!

Impact Quantum: A Podcast for Engineers
When AI Goes Quantum - The Next Frontier of Innovation

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Oct 20, 2025 54:29


On this episode of Impact Quantum, we dive into the visionary world of Sanjay Chittore, founder of Quantum AI Global and QLabs, who's on a mission to bring quantum theory out of the realm of science fiction and into real-world applications. Joined by host Frank La Vigne and the wonderfully quantum-curious Candice Gillhoolley, we unravel common myths about quantum computing—like whether you really need a quantum computer to build quantum products—and explore the massive impacts quantum technology is poised to have on everything from healthcare diagnostics to next-generation memory and sensing.Sanjay shares his journey from startup success through the pandemic to his self-driven deep dive into quantum and AI, revealing why he believes the future hinges on the synergy of quantum physics and electronics, rather than the traditional computing and electronics combination. Prepare to have your assumptions challenged as we discuss what makes quantum so secure, so fast, and so revolutionary—plus real-world examples like quantum memory, quantum sensors in healthcare, and the bold dreams that keep this field moving forward.Whether you're a scientist, entrepreneur, or just quantum-curious, this episode offers inspiring insights into how today's breakthroughs could transform industries and everyday life. Buckle up—things are about to get entangled!Time Stamps00:00 Quantum-AI Product Integration Company04:36 "AI Focus Led to Quantum"08:20 Quantum Discovery and Einstein's Doubts10:49 "Futuristic Startups: Embrace Risks"16:04 "Quantum Computers Lack Storage"19:15 "Quantum Sensors: Superior Precision"22:39 "Quantum Sensor for Cancer Detection"24:48 "Quantum Sensors and Cryptography"28:43 "Quantum: Infinite Between Ones, Zeros"31:50 "Unhackable Quantum Qubits Explained"34:52 "Solving Maze Navigation"38:38 "Quantum Efficiency Simplified"43:19 "Supporting PhDs in Industry"45:02 India's First Quantum Cryptography Product47:42 "Classical to Quantum Conversion"53:40 Quantum Revolution: Theory to Reality54:19 "Bailey's Quantum Farewell"

Bitcoin Takeover Podcast
S16 E51: Sean Bowe on Bitcoin, Zcash & Scaling Privacy with Tachyon

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 18, 2025 219:34


Sean Bowe is a cryptographer and engineer who is best known for revolutionizing Zcash. After cooperating to fix the inflation bug in the first version of the network, he built Halo to remove the trusted setup – basically obliterating the main reason why Bitcoin did not activate the Zerocash soft fork in 2013. More recently, Sean Bowe announced project Tachyon: an ambitious initiative to scale ZK SNARKs (the technology enabling shielded transactions) to billions of users. Time stamps: 00:01:19 - Sean Bowe's Work on Zcash and Hidden Inflation Bug Fix 00:01:36 - Introduction to Halo and Halo 2: Eliminating Trusted Setup 00:01:51 - Overview of Project Tachyon for Scaling ZK-SNARKs 00:02:43 - Zcash Price Pump and Dance Celebration 00:04:48 - Using Zcash for Encrypted Messages via Zashi Wallet 00:05:42 - Comparing Zcash Messaging to Signal 00:07:17 - Sean Bowe's Early Involvement in Zcash and Bitcoin 00:10:34 - Sean Bowe's Age and Start in Cryptography at 21 00:11:13 - Discovering Bitcoin in 2011 and Privacy Needs 00:13:42 - Contributing to BIP 39 with Slush and Trezor 00:14:19 - Realizing Bitcoin's Lack of Privacy 00:17:50 - Privacy vs. Deniability in Bitcoin and Banks 00:20:23 - Wasabi Wallet and CoinJoins Limitations 00:21:46 - Optional Privacy in Zcash and Wallet Defaults 00:23:16 - Viewer Question: Source of Sean Bowe's Smartness 00:24:47 - Viewer Question: Ideas from Scaling Bottlenecks 00:27:09 - Viewer Quote from Oscar Wilde on Privacy 00:28:07 - Viewer Question: Zcash Network State Meaning 00:30:00 - Viewer Question: Timeline for Tachyon Success 00:33:15 - Chronological Approach to Interview and Tachyon 00:37:33 - Differences Between Zerocoin (Firo) and Zerocash (Zcash) 00:39:55 - Greg Maxwell's CoinJoin and Zerocoin Views 00:42:57 - Moon Math and Cryptographic Assumptions 00:46:33 - Sponsor: Citrea ZK Rollup with BitVM 00:47:19 - Sponsor: Layer2 Labs ZSide Drive Chain 00:49:01 - Sponsor: Bitcoin.com News 00:50:16 - Zcash Leads Crypto Rally News 00:58:49 - Bitcoin's Constraints and Creativity like BitVM 01:05:00 - Zcash Contributors and Zebra Rust Node 01:14:00 - Friendly Forks in Zcash 01:31:00 - Monero Hater Comments and Zcash Anonymity 02:23:00 - Superhero Backstory Tease 02:26:14 - Bitcoin Talk Username and Early ASIC Mining 02:28:35 - Pessimism on Bitcoin Development Speed 02:50:41 - Shielded Zcash Dust Problem 02:52:11 - Quantum Resistance and Self-Transfers 02:53:00 - Long-Term Storage Pool for Quantum Safety 02:54:56 - Avalanche Pre-Consensus like eCash 02:55:04 - Tachyon and Oblivious Synchronization 02:58:56 - Scaling to Billions: Math and No Bottlenecks 03:02:12 - Solving Privacy-Scaling Trilemma 03:04:51 - Off-Chain Secrets and Payment Protocols 03:06:24 - Tachyon as New Privacy Pool 03:12:56 - Wallet Syncing with Tachyon Servers 03:14:50 - Shielded Aggregation in Tachyon 03:17:00 - Tachyon Team Size and Hiring Rust Engineers 03:18:41 - ETA for Tachyon: Next Year 03:23:15 - Greg Maxwell Paper Citation Story 03:25:11 - Explaining ZK-SNARKs to Polkadot Cryptographers 03:31:01 - Zcash Governance and No Benevolent Dictator 03:35:06 - Memos Bloating Blockchain and Anonymity Boost 03:38:06 - Zcash Compatibility with Bitcoin Privacy 03:39:01 - Following Sean Bowe: X Account and Blog

Impact Quantum: A Podcast for Engineers
Quantum Careers - Without the Sci-Fi Nonsense

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Oct 13, 2025 52:03 Transcription Available


On this milestone 30th episode of Impact Quantum Season 3, hosts Frank La Vigne and Candace Gillhoolley are joined by Vyom Patel, a master's student at the University of Waterloo—often described as the MIT of Canada. This episode dives into Vyom's journey from machine learning to the cutting-edge challenges of quantum algorithms and quantum error correction. Together, they unpack the common misconceptions around quantum computing, reveal the importance of strong mathematical foundations, and discuss the very real risks and rewards of working in a nascent, rapidly evolving field. Vyam shares how he filters through the hype, stays up-to-date with the latest research, and why mentorship (both giving and receiving) is crucial in this space. Whether you're just quantum-curious or already obsessed with superposition, this episode promises insights, laughter, and plenty of motivation to get quantumly curious yourself!Links Quantum Computing Since Democritus - https://www.amazon.com/dp/0521199565?tag=datadrivenm0e-20 Time Stamps00:00 "Exploring Quantum Computing's Interdisciplinary Appeal"04:10 Quantum Computing: Curiosity and Claims08:19 Trusting Academic Sources First11:44 Efficient Paper Skimming Techniques16:52 Quantum Computing for Differential Equations20:03 Quantum Matrix Encoding Challenges24:10 Foundations of Cryptography and Error Correction27:15 The Future of Quantum Education29:23 "Foundations Key to Tech Progress"34:04 Math Mentorship and Research Program37:13 "Demystifying Quantum Mechanics for Beginners"40:57 Quantum LDPC Codes Appeal43:17 "Evolution of Error Correction"46:26 Quantum Computing Race: Architecture's Future49:19 Future Plans: Technical Blog Creation

Bitcoin Takeover Podcast
S16 E48: Christopher Smith on Quantus, Bitcoin & Quantum Resistance

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 7, 2025 166:35


Christopher Smith (aka Yuvi Lightman, aka Ganesha 1024) is the founder of the Quantus network: an mbitious quantum-zk blockchain which he proudly built with his team in just 6 months, with a budget of $500k. In this episode we talk about the threat of quantum computing, how quantum resistant cryptography works, and how Bitcoin can be saved from a potential disaster. Time stamps: 00:01:31 - Introducing Christopher Smith (Yuvi Lightman), known on Soundcloud Music as Ganesha1024 00:02:22 - Quantis: Zero-Knowledge Quantum-Resistant Blockchain 00:02:39 - Christopher's Background, Early Bitcoin Involvement 00:03:41 - Current Views on Bitcoin, All-Time High at $125K 00:04:19 - Discovering Bitcoin in 2012, Contributions to BitcoinJ 00:04:36 - Founding BitMesh: Micropayments via Payment Channels 00:04:42 - Mike Hearn and Payment Channels 00:05:17 - Bitcoin Whitepaper Praise, Satoshi's Genius 00:05:55 - Essence of Money, Overcomplication Critique 00:06:49 - Bitcoin's Corporate Takeover, Cultural Ethos 00:08:38 - SegWit Changes, Big Block Debate 00:09:45 - Bitcoin Cash Sympathy, Shift to Ethereum 00:10:41 - Vitalik Buterin and Gavin Wood as Geniuses 00:10:53 - Lunar Startup: Blockchain Wikipedia with ICO 00:11:08 - Bitcoin Threats: Throughput, Privacy, Quantum Security 00:11:29 - Child Porn Blackmail Tactics in Debates 00:12:18 - Social Bottlenecks in Coordination 00:13:09 - BTC Token vs Network Separation via ETFs 00:14:06 - Proof of Keys Day by Trace Mayer 00:15:23 - No Trusted Third Parties Philosophy 00:16:04 - Cryptography as Military Tech 00:18:04 - Open Source Importance, ERC20 Simplicity 00:19:21 - BlackRock as Central Bank, Cult of Saturn Symbolism 00:20:17 - Bitcoin Threats: Throughput with Shai Reference 00:22:50 - Privacy and Zcash Praise 00:23:32 - Quantus as Bitcoin Fork with Falcon Signatures 00:24:50 - Solana as Big Blocker Inheritor 00:25:04 - Overton Window Constraints 00:26:41 - Quantus Timelines Skepticism, PsiQuantum Investment 00:28:14 - Ethereum Proof of Stake, Stablecoin Control 00:29:27 - Catholic Church Analogy, Satoshi's Time-Buying Quote 00:30:04 - Weaponized Schizophrenia Concept 00:31:09 - Schizophrenia as Catch-All, LSD Benefits 00:32:21 - False Positives/Negatives in Machine Learning 00:33:34 - Arbitrary Thresholds in Science/Medicine/Physics 00:34:46 - Autistic Definitions, Bitcoin Redefinition 00:36:25 - Douglas Hofstadter's Godel Escher Bach Inspiration 00:37:32 - Ads: Bitcoin.com News 00:38:39 - Citrea: ZK Rollup on Bitcoin 00:40:21 - BIP300 Drivechains by Paul Sztorc 00:41:53 - Hacker Ethos, L2 Complexity Critique 00:43:27 - Lightning Network Failures 00:44:22 - Open Source vs Closed Source Thought Experiment 00:47:00 - Check Phrase for Security 01:00:00 - Quantum Mechanics Wave Function Collapse 02:02:17 - Chris Doesn't Sound Like Typical Founder 02:02:50 - Quantus Features: Reversible Transactions 02:05:23 - Check Phrase Innovation 02:07:29 - HD Wallets for Lattice Cryptography, QIPs 02:08:46 - Pro-Social to Industry, Ethereum Ethos 02:09:00 - Ross Ulbricht on Blockchain Decentralization 02:10:00 - Bitcoin Maximalism Critique 02:10:34 - Satoshi on ZK Proofs Efficiency 02:11:01 - Grin Fair Launch, Kaspa DAG Innovation 02:12:16 - Zcash Innovations, ZK Snarks 02:13:25 - Libraries from Zcash, Fluffy Pony Dismissal 02:14:07 - Zcash Made ZK Practical 02:15:36 - Ethereum Net Positive Despite Mess 02:16:04 - Stablecoins as Freezable CBDCs 02:18:19 - Eye-Openers: Iran Banking Struggles, Argentina Tether Use 02:20:40 - COVID Psychology Lessons 02:22:27 - QE Money Printing Realization 02:23:33 - Legal vs Moral, COVID Non-Compliance 02:25:13 - Forgetting COVID Coercion 02:26:36 - Psychedelic Community Enforcement 02:27:47 - Nature's Cruelty 02:28:55 - Vaccine Divisions 02:30:02 - Each Vaccine Unique, Pavlov's Association 02:31:03 - Freedom License Concept 02:32:01 - Agency and Responsibility 02:34:05 - Frustrated Developers, Utility Missed 02:35:07 - User Adoption Challenges 02:36:01 - Funnel for Adoption, Co-Founder Complement 02:37:38 - Check Phrase for Wallets 02:39:04 - Plato on Politics 02:39:46 - Habeas Corpus History 02:40:40 - Optimism: Sunlight, World Complexity 02:41:36 - Manifesting Intentions 02:42:28 - Soundcloud Recommendation, Quantus Docs 02:43:02 - Music Like Pink Floyd's Great Gig in the Sky 02:44:47 - Amir Taaki 7-Hour Record 02:45:43 - Zooko's 6-Hour Interview 02:46:47 - WeaponizedSchizophrenia.com Blog 02:47:00 - Closing Words

Bitcoin Takeover Podcast
S16 E47: Max Hillebrand on White Noise & Private Messaging on Nostr

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 2, 2025 242:36


Max Hillebrand makes his 8th appearance on the Bitcoin Takeover Podcast in order to talk about his latest project: White Noise, a private messaging application for Nostr. We also talk about Core v30 vs Knots, Bitcoin layer 2s & other bull market topics. Time stamps: 00:01:07 - Max Hillebrand's Background 00:02:47 - Post-Wasabi Wallet Era and Privacy Challenges 00:04:28 - Nostr Protocol Overview 00:05:58 - Early Nostr Experiences and Key Loss 00:08:51 - Nostr Client Progress and Edge Cases 00:09:58 - Nostr's Relation to Bitcoin 00:13:53 - Hardware Wallets for Nostr Keys 00:18:06 - Nostr Key Backups and Security 00:21:53 - Nostr Search and Web of Trust 00:24:21 - Ads: Bitcoin.com News and NoOnes.com 00:26:12 - White Noise Protocol Introduction 00:27:52 - NIP 44 and Gift Wraps for Encryption 00:30:20 - Signal Protocol and MLS Evolution 00:32:16 - MLS Protocol Details 00:33:23 - Nostr Privacy Limitations 00:35:17 - Trusted Relays and Metadata 00:37:25 - Nostr as Data Delivery Layer 00:38:41 - Self-Authentication in MLS 00:40:02 - Group Creation and Key Packages 00:42:38 - MLS vs. Major League Soccer Joke 00:42:53 - Diffie-Hellman and Scaling to Millions 00:44:24 - MLS Key Tree Structure 00:46:59 - Scalability Benefits of MLS 01:18:00 - Marmot and Nostr Tools 01:25:30 - The Zcash Pump Dance 03:09:25 - Angor Protocol for Recurring Payments 03:14:02 - Bitcoin Script and Smart Contracts 03:15:32 - Great Script Restoration Proposal 03:21:03 - Builder Spirit in Bitcoin vs. Ethereum 03:25:19 - Bills of Exchange and Peer-to-Peer Credit 03:33:09 - Historical Finance and Farming 03:38:35 - Starting Bitcoin Meetups 03:41:43 - Localizing Bitcoin Content 03:44:17 - Recommended Podcasts 03:47:48 - Podcast Benefits and Guest Interactions 03:54:39 - Audience Quality and Impact 03:55:36 - White Noise Future and Building Freedom Tech 03:58:51 - AI Coding and Proof of Concepts 04:00:38 - Nym Mixnet Integration 04:01:54 - Closing Remarks and Future Sessions

Cybercrime Magazine Podcast
Quantum Minute. Research Breakthrough In Cryptography. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 26, 2025 2:02


Researchers have made a breakthrough in cryptography, building a new foundation for quantum cryptography that could make it more secure than classical encryption. The new approach, developed by Dakshita Khurana and Kabir Tomer, uses quantum building blocks called one-way puzzles to generate locks and keys. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Digital Transformation & Leadership with Danny Levy
Noise vs. Leadership, Quantum-Safe Cryptography, and Why the Right Conversation Changes Everything w/ Camilla Bullock

Digital Transformation & Leadership with Danny Levy

Play Episode Listen Later Sep 26, 2025 46:58


This week, Camilla Bullock, CEO of the Emerging Payments Association Asia (EPAA), joins Danny for a wide-ranging, no-BS conversation that cuts through the noise.The Emerging Payments Association Asia (EPAA) is the peak industry body representing and supporting the APAC payments ecosystem.Danny and Camilla get into:Why true leadership isn't about being a “thought leader” (and why Camilla refuses the label).The hidden superpower that drives change: spotting the right people and sparking the right discussions.Quantum-safe cryptography—why it's not just a “future problem” and why starting now could be the smartest move you'll ever make.The storytelling gap in cybersecurity—and how to make resilience resonate across an industry that usually drowns in jargon.Why recognising excellence through initiatives like the Money Awards creates real momentum.And much more...!If you care about the future of payments, fintech, or just want to know how the right idea at the right time can reshape an industry - this is your episode.It's 45 minutes packed with sharp insights, no fluff, and lessons you can actually use.Are you getting every episode of Digital Transformation & Leadership in your favourite podcast player? You can find us Apple Podcasts and Spotify to subscribe.

The Post-Quantum World
Running Shor's Algorithm on Logical Qubits - with Peter Noell of Infleqtion

The Post-Quantum World

Play Episode Listen Later Sep 17, 2025 36:14


For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Mind Over Murder
BONUS: The Zodiac Killer with Michael Butterfield (Part 1)

Mind Over Murder

Play Episode Listen Later Sep 4, 2025 42:39 Transcription Available


Michael Butterfield, author of "The Zodiac Killer: The Story of America's Most Elusive Murderer," joins "Mind Over Murder" cohosts Bill Thomas and Kristin Dilley to discuss his new book, his longtime research into the still unsolved Zodiac case, and his website, ZodiacKillerFacts.com. Will Zodiac ever be identified?  Will the remaining Zodiac ciphers be solved?  Are there really similarities between the Zodiac case and the Colonial Parkway Murders? This bonus episode is is Part 1 of 2 parts on the Zodiac with Michael Butterfield, and originally ran on May 12, 2025.CrimeCon:  We're going to CrimeCon again, folks! Join us in Denver for new merch, some MOM listener hangouts, and a lot of fun! Use the code MINDOVERMURDER to get 10% off your tickets between now and September! See you there!Amazon:  The Zodiac Killer: The Story of America's Most Elusive Murdererhttps://www.amazon.com/Zodiac-Killer-Americas-Elusive-Murderer/dp/1398851779?author-follow=B0F4RS214FZodiacKillerFacts.com website:https://zodiackillerfacts.com/about/Washingtonian: A Murder on the Rappahannock River:https://www.washingtonian.com/2019/06/27/murder-on-the-rappahannock-river-emerson-stevens-mary-harding-innocence-project/WTKR News 3: One year after development in Colonial Parkway Murders, where do things stand?https://www.wtkr.com/news/in-the-community/historic-triangle/one-year-after-development-in-colonial-parkway-murders-where-do-things-standWon't you help the Mind Over Murder podcast increase our visibility and shine the spotlight on the "Colonial Parkway Murders" and other unsolved cases? Contribute any amount you can here:https://www.gofundme.com/f/mind-over-murder-podcast-expenses?utm_campaign=p_lico+share-sheet&utm_medium=copy_link&utm_source=customerWTVR CBS News:  Colonial Parkway murders victims' families keep hope cases will be solved:https://www.wtvr.com/news/local-news/colonial-parkway-murders-update-april-19-2024WAVY TV 10 News:  New questions raised in Colonial Parkway murders:https://www.wavy.com/news/local-news/new-questions-raised-in-colonial-parkway-murders/Alan Wade Wilmer, Sr. has been named as the killer of Robin Edwards and David Knobling in the Colonial Parkway Murders in September 1987, as well as the murderer of Teresa Howell in June 1989. He has also been linked to the April 1988 disappearance and likely murder of Keith Call and Cassandra Hailey, another pair in the Colonial Parkway Murders.13News Now investigates: A serial killer's DNA will not be entered into CODIS database:https://www.13newsnow.com/video/news/local/13news-now-investigates/291-e82a9e0b-38e3-4f95-982a-40e960a71e49WAVY TV 10 on the Colonial Parkway Murders Announcement with photos:https://www.wavy.com/news/crime/deceased-man-identified-as-suspect-in-decades-old-homicides/WTKR News 3https://www.wtkr.com/news/is-man-linked-to-one-of-the-colonial-parkway-murders-connected-to-the-other-casesVirginian Pilot: Who was Alan Wade Wilmer Sr.? Man suspected in two ‘Colonial Parkway' murders died alone in 2017https://www.pilotonline.com/2024/01/14/who-was-alan-wade-wilmer-sr-man-suspected-in-colonial-parkway-murders-died-alone-in-2017/Colonial Parkway Murders Facebook page with more than 18,000 followers: https://www.facebook.com/ColonialParkwayCaseYou can also participate in an in-depth discussion of the Colonial Parkway Murders here:https://earonsgsk.proboards.com/board/50/colonial-parkway-murdersMind Over Murder is proud to be a Spreaker Prime Podcaster:https://www.spreaker.comJoin the discussion on our Mind Over MurderColonial Parkway Murders website: https://colonialparkwaymurders.com Mind Over Murder Podcast website: https://mindovermurderpodcast.comPlease subscribe and rate us at your favorite podcast sites. Ratings and reviews are very important. Please share and tell your friends!We launch a new episode of "Mind Over Murder" every Monday morning, and a bonus episode every Thursday morning.Sponsors: Othram and DNAsolves.comContribute Your DNA to help solve cases: https://dnasolves.com/user/registerFollow "Mind Over Murder" on Twitter: https://twitter.com/MurderOverFollow Bill Thomas on Twitter: https://twitter.com/BillThomas56Follow "Colonial Parkway Murders" on Facebook: https://www.facebook.com/ColonialParkwayCase/Follow us on InstaGram:: https://www.instagram.com/colonialparkwaymurders/Check out the entire Crawlspace Media network at http://crawlspace-media.com/All rights reserved. Mind Over Murder, Copyright Bill Thomas and Kristin Dilley, Another Dog Productions/Absolute Zero ProductionsBecome a supporter of this podcast: https://www.spreaker.com/podcast/mind-over-murder--4847179/support.

Quanta Science Podcast
A New Quantum Math of Cryptography

Quanta Science Podcast

Play Episode Listen Later Aug 26, 2025 27:12


We're living in the golden age of cryptography. Since the 1970s, we’ve had more confidence in encryption than ever before. But there’s a difference between confidence and absolute certainty. And computer scientists care a lot about that difference. The search is always on for better, more secure secrets. But is it possible for digital security to be truly, provably unbreakable? Maybe, with a little help from math and physics. On this week's episode, host Samir Patel talks with ???????????????????????? computer science staff writer Ben Brubaker about a developing frontier of digital security: quantum cryptography. This topic was covered in a recent story for Quanta Magazine. Each week on The Quanta Podcast, Quanta Magazine editor in chief Samir Patel speaks with the people behind the award-winning publication to navigate through some of the most important and mind-expanding questions in science and math. Audio Coda from the Bletchley Park Trust.

math quantum cryptography quanta magazine samir patel bletchley park trust
Security. Cryptography. Whatever.
Stop Using Encrypted Email with William Woodruff

Security. Cryptography. Whatever.

Play Episode Listen Later Aug 23, 2025 71:07 Transcription Available


There was a bug in an OpenPGP library which finally gave us an excuse to tear encrypted email via PGP to shreds. Our special guest William Woodruff joined us to help explain the vuln and indulge our gnashing of teeth on why email was never meant to be encrypted and how other modern tools do the job much, much better.Watch on YouTube: https://www.youtube.com/watch?v=IoL3LfIozJoTranscript: https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruffLinks:- William Woodruff: https://yossarian.net/- https://www.latacora.com/blog/2020/02/19/stop-using-encrypted/- https://www.rfc-editor.org/rfc/rfc4880- https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/- https://www.mailpile.is/blog/2014-10-07_Some_Thoughts_on_GnuPG.html- https://www.rfc-editor.org/rfc/rfc9580.html- https://www.tumblr.com/accidentallyquadratic- https://www.w3.org/TR/xmldsig-core/- https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP- https://www.rfc-editor.org/rfc/rfc9580.html#name-signature-packet-type-id-2- https://www.rfc-editor.org/rfc/rfc9580.html#name-key-derivation-function- https://en.wikipedia.org/wiki/S/MIME- https://delta.chat- https://signal.org/blog/the-ecosystem-is-moving/- https://phakeobj.netlify.app/posts/gigacage/- https://x.com/dakami-----BEGIN PGP MESSAGE-----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-----END PGP MESSAGE-----"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Lagrange: ZK-Proving AI Alignment - Ismael Hishon-Rezaizadeh

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later Aug 16, 2025 56:50


In an age when AI models are becoming exponentially more sophisticated and powerful, how does one ensure that proper results are being generated and that the AI model functions in desired parameters? This pressing concern of AI alignment could be solved through cryptographic verification, using zero knowledge proofs. ZKPs not only allow for verifying computation at scale, but they also confer data privacy. Lagrange's DeepProve zkML is the fastest in existence, making it easy to prove that AI inferences are correct, scaling verifiable computation as the demand for AI grows.Topics covered in this episode:Ismael's background and founding LagrangeAI x crypto convergenceZKML use casesAI inference verifiabilityAI safety regulationsRevenue accruing tokensPitching Lagrange to enterprise clientsAssembling a dedicated teamCryptography researchEpisode links:Ismael Hishon-Rezaizadeh on XLagrange on XSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Sebastien Couture.

Security Now (MP3)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (MP3)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com