Practice and study of secure communication techniques
POPULARITY
Categories
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com
Victor is a Senior Research Scientist at Nexus Laboratories. He received his PhD in Mathematics from Harvard University in 1975, and was an assistant professor at the University of Massachusetts Boston from 1973 to 1978. Victor has since worked for the IBM Research Center, The Institute for Defence Analyses in Princeton, Meta Platforms and SRI International. For his research, Victor has focused on areas of computational number theory, data compression and cryptography. Along with Neal Koblitz, he was the co-creator of Elliptic Curve Cryptography, the inventor of Miller's algorithm and was a co-inventor of the LZW data compression method. For the LZW invention, he was awarded the IEEE Millennium medal, and for his work on elliptic curve cryptography, he received the RSA Award for Excellence in Mathematics the Levchin Prize, and the Eduard Rhein Foundation Technology Award, along with being a member of the Information Systems Security Association Hall of Fame.
Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
The tradition of Epicenter x Vitalik Buterin continued this year as well at EthCC[8], where we got the chance of picking his brain about recent research, interests and Ethereum Foundation's direction going forward. Join us for a fascinating discussion on biotech and how Vitalik's Shiba ended up funding it, the utility of blockchains in nowadays society and Vitalik's view on the Ethereum ecosystem and the Foundation's response to community requests.Topics covered in this episode:Vitalik's current interestsHow Shiba Inu funded biotech researchThe Merge and its impactVitalik's motivation and view on blockchain utilityEthereum Foundation's changesIs supporting ETH price important for EF?Are L2s incentively aligned with Ethereum L1?Native L2sThe risk of quantum computersEpisode links:Vitalik Buterin on XEthereum on XEthereum Foundation on XEthCC on XSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Brian Fabian Crain & Sebastien Couture.
The Institute of Internal Auditors Presents: All Things Internal Audit Tech Quantum computing might sound futuristic, but internal auditors need to prepare now. Bill Truett catches up with Nick Reese to talk about what's changed in the quantum space — including new cryptography standards — real-world risks, and what internal auditors can do today to get ready. HOST:Bill Truett, CIA, CISA Senior Manager, Standards & Guidance, IT, The IIA GUEST:Nick Reese Co-founder and Chief Operating Officer, Frontier Foundry Adjunct Professor, New York University KEY POINTS: Introduction and What's New in Quantum [00:00-01:34] What is Quantum Computing? [00:01:34-05:57] Milestones in Quantum Development [00:05:58-07:50] Quantum + AI? Not Yet [00:08:12-09:58] What Auditors Should Know About NIST Standards [00:10:00-11:54] Immediate Steps for Internal Audit [00:13:15-17:38] Legislation and Regulatory Outlook [00:20:28-22:19] Global Threats and Historical Analogies [00:22:20-26:11] Key Terms Auditors Should Learn [00:26:17-28:34] Training Resources [00:28:35-31:00] Opportunities Beyond Risk Management [00:31:00-34:11] The Five-Year Vision [00:34:16-37:21] THE IIA RELATED CONTENT: Interested in this topic? Visit the links below for more resources: 2025 Governance, Risk & Controls Conference All Things Internal Audit: Quantum Computing GTAG: Assessing Cybersecurity Risk Cyber Resource Center Post-Quantum Cryptography Roadmap – DHS.gov NIST's Post-Quantum Cryptography Project Visit The IIA's website or YouTube channel for related topics and more. Follow All Things Internal Audit: Apple PodcastsSpotify LibsynDeezer
Stephen Perrenod is an astrophysicist and technology consultant with over 30 years of experience in high performance computing. He's the author of two books on cosmology and has been writing and speaking about Bitcoin for a decade.› https://twitter.com/moneyordebt› http://stephenperrenod.substack.comPARTNERS
When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we're beginning to migrate and trust our data to lattice-based cryptography, it's a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask than one of the coauthors of the PQC standard? Join host Konstantinos Karagiannis for a wide-ranging chat with Joppe Bos from NXP, where they discuss the past and future of ML-KEM. For more information on NXP, visit www.nxp.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Date: 24 June 2025 Chair: Peter Ferry, CEO, TRUST Centre of Excellence. Martin Doherty Hughes: Former MP, Chair of All Party Parliamentary Group on Blockchain. Martin Trotter: Regtech leader, BRS Grant Thornton Martin Halford: CTO SICCAR and Tech Steering Committee Accord Project Chris Tate: CEO Condatis.
This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems. All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.Takeaways Quantum computers harness principles of quantum physics for computation. Shor's algorithm can efficiently factor large numbers, threatening RSA encryption. Post-quantum cryptography aims to develop algorithms resistant to quantum attacks. NIST is leading the effort to standardize post-quantum cryptographic algorithms. Lattice-based algorithms are promising for post-quantum cryptography due to their efficiency. Businesses must be proactive in transitioning to post-quantum cryptography. The Harvest Now, Decrypt Later threat highlights the urgency of transitioning. Quantum key distribution offers theoretically perfect security. Different cryptographic algorithms are needed for various applications and devices. The future of cryptography will rely on new mathematical challenges to ensure security.Keywordsquantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threatsSubscribe to Breaking Math wherever you get your podcasts. Become a patron of Breaking Math for as little as a buck a monthFollow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTokFollow Autumn on Twitter and InstagramBecome a guest hereemail: breakingmathpodcast@gmail.com
Cryptography is the foundation of secure communication in the digital era. In this beginner-friendly session, we break down the core concepts of cryptography and explain how it protects sensitive data across networks and systems. From encryption and decryption to symmetric and asymmetric algorithms, this session will help you understand how cryptographic systems work and why they're crucial in today's cybersecurity landscape. Designed for students, IT professionals, and cybersecurity enthusiasts, this guide offers a clear and practical introduction to the fundamentals of cryptography—no prior experience required.
In this Road to Macstock Conference and Expo conversation we welcome longtime speaker Kirschen Seah to discuss her upcoming session, Passkeys Demystified. Kirschen explains the promise of passkeys as a more secure, user-friendly alternative to passwords, and why adoption has been slower than expected. She shares insights into how passkeys work using public key cryptography, addresses common concerns about biometric data, and outlines how password managers like Apple Keychain and 1Password integrate with the system. With real-world scenarios and practical examples, Kirschen aims to help attendees confidently adopt passkeys and understand the evolving standards behind them. Show Notes: Chapters: 00:08 Introduction to MacVoices 00:45 Kirschen Seah Joins the Conversation 02:20 Passkeys Demystified 08:44 Managing Multiple Accounts 10:32 The Role of Password Managers 13:15 Preparing for the Session 15:55 Macstock Conference Details 17:51 The Value of Curiosity at Macstock Links: Macstock Conference and Expo Save $50 with the Kirschen's discount code: freerangecoder Save $50 with Chuck's discount code: macvoices50 Guests: Kirschen Seah's background is Computer Sciences with interests in Software Engineering, User Experience, and Mac OS X / iPhone OS development. She started programming with BASIC in 1978 on an Apple ][ and have over 30 years of experience in the field. Kirschen worked on OPENSTEP (precursor to Mac OS X Cocoa) graphical prototyping applications initially when she joined Rockwell Collins (now Collins Aerospace) in 1999, and was a Senior Principal Systems Engineer in the Flight Management Systems department focussed on the user interface for pilot interaction. Prior to joining Rockwell Collins Kirschen worked at Acuity (formerly ichat) developing interactive user interfaces for live chat customer service agents. Now retired, there's now more time to share technical insights on her blog, develop useful scripts (Python, shell), and write Shortcuts. Kirschen is really motivated to share her experience to help fellow software practitioners develop better skills – be that in good design, implementation, or computer science fundamentals. As much as she can, Kirschen tries to share the delight in discovering how iOS and macOS applications for productivity and creativity have helped her do better in her personal and (former) work life. Connect with her on her web site, FreeRangeCoder Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Rosario Gennaro is a Professor of Computer Science at City University of New York (CUNY) and a Director for the Center for Algorithms and Interactive Scientific Software (CAISS). 1996, he received his PhD from MIT and was a researcher at the IBM T.J.Watson Research Center until 2012. Rosario's most recent work includes privacy and anonymity in electronic communication, along with proactive security to minimise the effects of system break-ins. He has received over 24,500 citations on his work and has an h-index of 72, and has published classic papers of “Non-interactive verifiable computing: Outsourcing computation to untrusted workers” and “Quadratic span programs and succinct NIZKs without PCPs”.
Ralph is a co-inventor of public-key cryptography, the inventor of cryptographic hashing, created Merkle's Puzzles, the co-inventor of the Merkle–Hellman knapsack cryptosystem, and invented Merkle trees. He received his B.S. in computer science in 1974 from UC Berkeley and a PhD. in electrical engineering from Stanford University in 1979. More recently, he is a researcher and speaker on cryonics. Ralph was a research scientist at the famous Xerox PARC (Palo Alto Research Center), and a nanotechnology theorist at Zyvex. He has also been a Distinguished Professor at Georgia Tech, a senior research fellow at IMM, a faculty member at Singularity University, and a board member at Alcor Life Extension Foundation. In 1998, he was a co-recipient of the Feynman Prize for Nanotechnology for Theory. In 2010, he received the IEEE Richard W. Hamming Medal for the invention of public key cryptography, and in 2011, he was inducted into the National Cyber Security Hall of Fame. In 2020, he received the Levchin Prize for “fundamental contributions to the development of public key cryptography, hash algorithms, Merkle trees, and digital signatures.
This show has been flagged as Explicit by the host. More than ten years ago I studied the lecture recordings of "Introduction to Cryptography" Introduction to Cryptography by Christof Paar - Invidious by Professor Paar Christof Paar - Wikipedia, which are absolutely amazing! These lectures will learn you how the most popular encryption algorithms work. The scripts I mentioned in their current versions are: tool/gpg-gen-key at main - oxo/tool - Codeberg.org tool/gpg-bu-key at main - oxo/tool - Codeberg.org tool/gpg-pass-vfy at main - oxo/tool - Codeberg.org Search the history for commit 95408d31c2 (gpg-gen-key) and dd608f9bd6 (gpg-bukey and gpg-pass-vfy) for the versions at the moment of recording.Provide feedback on this episode.
Welcome back to Impact Quantum, the podcast for the Quantum Curious! In this special recap episode, hosts Frank La Vigne and Candice Gillhoolley return from a brief, doctor-approved hiatus to take stock of the whirlwind developments in the quantum computing universe. From billion-dollar buyouts—like IONQ's acquisition of Oxford Ionics—to IBM's bold promise of a large-scale, fault-tolerant quantum computer by 2029, the quantum ecosystem has never been more electrifying.Frank and Candice reflect on just how much the show—and the quantum landscape—has evolved, touching on everything from the international race for quantum supremacy and the looming threat to RSA encryption, to the latest breakthroughs in quantum error correction and the rise of “quantum tweezers.” With Canadian pride, global perspectives, and a healthy dose of friendly banter, they remind listeners why quantum is no longer a far-off dream—it's knocking at our door.If you think quantum computing is decades away, this episode will convince you it's time to update your calendar (and maybe your encryption protocols). Tune in for insights, laughs, and a sneak peek at what's coming next from the #1 rated quantum computing podcast. Stay curious, stay entangled, and enjoy the ride!Show Notes00:00 Quantum Insights: Diverse Perspectives05:06 Cryptography's Urgent Career Relevance09:53 Exploring Quantum Computing Curiosity12:39 Quantum Computing: Early Stages Discussion13:59 Early Days of Quantum Computing17:54 "Quantum Tech Secret Timeline"20:34 "Quantum Season Preview"25:34 Canada's Quantum Ambitions27:55 Global Medicine Supply Chain Dependence32:33 "Stay Curious, Stay Entangled"33:17 "Bailey Signing Off"
Tal is a Professor of Computer and Information Science at the University of Pennsylvania and a Manager at AWS. Previously, she was the head of research at the Algorand Foundation and head of the cryptography research at IBM's Thomas J Watson Research Centre. In 2014, she was defined as one of the 22 most powerful women engineers by Business Insider, and a Woman of Vision for innovation by the Anita Borg Institute. In 2018, she was defined by Forbes as one of the World's Top 50 women in Tech, and in 2019, she was awarded the RSA Award for Excellence in Mathematics. In 2023, she was awarded the Dijkstra Prize for her work on secure multiparty computation. Tal's works in areas of secure multiparty computation, threshold cryptography, blockchain systems and proactive security.
How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. Dr Sarah McCarthy tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it. About Dr Sarah McCarthy: https://www.linkedin.com/in/sarahmccarthyphd/?originalSubdomain=ca SourcesQuantum computing chip: https://blog.google/technology/research/google-willow-quantum-chip/https://www.bbc.co.uk/news/articles/c791ng0zvl3oNIST Post Quantum Standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsMartian aurora: https://science.nasa.gov/solar-system/planets/mars/nasa-observes-first-visible-light-auroras-at-mars/Rutherford's Lecture: https://web.lemoyne.edu/giunta/ruth1920.htmlJames Chadwick: https://www.nobelprize.org/prizes/physics/1935/chadwick/biographical/
This week, we spoke with Rob Viglione, Co-founder and CEO of Horizen Labs, to explore the groundbreaking potential of Zero Knowledge Proofs (ZKP) in safeguarding digital privacy, bridging TradFi and DeFi, and creating income streams for consumers that empower them through the ownership of their own digital data. From balancing transparency and onchain privacy to the intersection of AI and Web3, Rob dives into the critical role cryptography will play in reshaping how we share and protect data. Learn how ZKPs can combat data misuse, empower individuals to monetize their information, and reimagine compliance as we step into a world where privacy is a fundamental human right. Key Highlights:1. How ZKPs protect medical records and financial history2. Will banks adapt, or become irrelevant?3. The role of cryptography in privacy-centric AI systemsDon't miss this thought-provoking discussion packed with insights on the future of data, privacy, and decentralized innovation. Chapters:00:00 Defiant Intro00:07 Podcast Teaser00:52 Hero Quote00:59 Introduction to Rob Viglione01:34 The beauty of ZKPs02:40 How to balance transparency and privacy onchain04:00 Why it's so easy to overshare data04:50 Living in an age of constant data leaks06:34 The concept of wealth is fundamentally different now07:33 Google adopts ZKP to verify age09:00 A world of a trillion proofs09:30 How can Web3 handle growing volumes of proofs?10:09 Will Web2 relinquish their chokehold on our data?11:52 Monetizing data as an incentive to online privacy12:45 New opportunities for earning a living by monetizing your data14:14 The intersection of crypto and AI16:17 ZKPs and data protection18:00 ZKPs and AI in medical records and financial history20:18 How can ZKPs act as a safeguard against misuse in AI22:15 Hackers and scammers are a certainty; how do we fight them?22:36 Cryptography, ZKPs, and privacy-centric AI systems?25:13 Why is privacy a human right?26:25 Institutions, privacy, and Web326:45 Institutions coming onchain28:30 Better communicating privacy as a human right in the context of Web330:30 Will ZKPs change the way people interact with the internet?32:11 Marketing in the age of AI33:24 ZKPs and KYC35:40 Why ZKPs are bad for bad actors37:38 Government regulation vs. Web3 companies regulating the industry themselves39:00 It doesn't make sense for politicians to be anti-crypto anymore41:53 Can ZKPs redefine compliance and how it's enforced?43:13 How can ZKP tech support institutional privacy and consumer data?44:45 TradFi onchain as a stepping stone to DeFi46:39 Lightning round! Favorite existing use case for ZKP46:54 Lightning round! Favorite potential use case for ZKP48:04 Lightning round! Best advice for keeping your data safe online48:49 Closing statements and where to follow Rob
Most founders think you have to choose between security and usability. Riad Wahby disagrees—and built Cubist to prove it. In this episode, he breaks down how startups can achieve secure key management without sacrificing speed or flexibility. Riad: www.linkedin.com/in/kwantam Cubist: www.cubist.dev Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io
At RSAC 2025, the most urgent signals weren't necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it's clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.More Than a Job: Why Community MattersRob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It's not just about certifications—though Clyde notes that employers often value them more than degrees—it's also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It's your career,” he says. “Take back control.”Facing Burnout and Legal Risk Head-OnThe group also addresses a growing issue: burnout. ISACA's latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.The Silent Threat of QuantumWhile AI dominated RSAC's headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don't know when.”From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn't just a technology issue—it's a people issue. Listen to the full episode to hear what else we're missing.Learn more about ISACA: https://itspm.ag/isaca-96808⸻Guest: Rob Clyde, Board Director, Chair, Past Chair of the Board Directors at ISACA | https://www.linkedin.com/in/robclyde/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaStay tuned for an upcoming ITSPmagazine Webinar with ISACA: https://www.itspmagazine.com/webinarsISACA Quantum Pulse Poll 2025 and related resources: https://www.isaca.org/quantum-pulse-pollISACA State of Cybersecurity 2024 survey report: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
In this episode, hosts Frank La Vigne and Candice Gillhoolley are joined by Andy Schwaderer and Dr. Christopher Leach from Quantum Knight. As the podcast celebrates its recent top ranking on Feedspot, the conversation dives deep into the urgent realities of post-quantum encryption, highlighting the evolving threats facing our digital lives—far beyond the stereotypical “hackers in hoodies.”Andy and Dr. Leach unpack why “being quantum ready isn't optional, it's essential,” sharing practical insights on defending against sophisticated adversaries, from nation-state actors to criminal gangs exploiting the cracks in legacy infrastructure. From the infamous Sony hack to modern ransomware attacks on hospitals and public utilities, the episode explores how Quantum Knight's innovative cryptosystem aims to protect data across everything from IoT devices to critical medical systems.Tune in for a compelling discussion on why security can no longer be an afterthought, how agile cryptography is enabling a future-proof approach, and why the responsibility—and power—to keep data safe now rests firmly in the hands of every individual and organization. If you've ever wondered how quantum computing and cybersecurity overlap, or how to safeguard your most vital assets in the quantum era, this episode is for you.Timestamps00:00 Streamlined Quantum-Enhanced Data Security08:26 "Data Control is King"14:48 "Understanding Advanced Persistent Threats"17:43 Quantum Computing's Impact on Cybersecurity22:42 "IoT's Security Oversight"32:15 "Admitting Issues, Seeking Solutions"36:02 Cryptography's Limits and Access Control39:31 Affordable Ransomware Protection Solution48:55 Switching Accountants Mid-Service51:35 Data Threat: Public Infrastructure Vulnerability56:45 Versatile Cryptography Support System01:02:19 AI Code Reliability Challenges01:06:53 "Concerns About Health and Security"
We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).
Quantum Computing remains an area of research and development, but US officials are concerned adversaries could steal sensitive data now and decrypt it in the future. As quantum technology progresses, agencies are now exploring how to incorporate post quantum cryptographic standards into their technologies. Federal News Network's Justin Doubleday is here with the latest.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardized NIST PQC cipher: ML-KEM. Did you know there are potential gotchas with trying hybrids of classical and PQC instead? Find out the technical and philosophical reasons why the developers chose to skip offering a hybrid option. Join host Konstantinos Karagiannis for a wide-ranging chat with Kevin Kane and Andrew McElroy from American Binary. For more information on American Binary, visit https://www.ambit.inc/. Visit Protiviti at https://www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
The UK's National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, providing secure alternatives for key establishment and digital signatures. System owners are advised to start planning for integration of PQC into their infrastructure, with the migration likely happening seamlessly through software updates for commodity IT – but requiring more effort for bespoke or enterprise IT systems. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
with @danboneh @succinctJT @smc90This episode is all about quantum computing -- explaining what it is, how it works, what's hype vs. reality, and how to prepare for it/ what builders should do. Specifically, we cover: What quantum computing is and isn't, and what people are really talking about when they worry about a quantum computer that can break classic computing-based cryptography systems -- a cryptographically relevant post-quantum computer.When is it happening/ what are the "timelines" for quantum computing becoming a reality -- how many years away are we? -- and when are the U.S. government's deadlines/ NIST standards for post-quantum cryptography?How will different types of cryptography be affected, or not? What are different approaches and tradeoffs?Where does quantum computing and post-quantum crypto apply to blockchains -- which are not only more easily upgradable, but also by and large rely on signatures, not encryption, so may be more quantum-resistant in many ways (and not in others).As always, we tease apart the signal vs. the noise in recent "science-by-press release" corporate quantum-computing milestone announcements. We also help answer questions on when do builders need to plan their switch to a post-quantum crypto world, what pitfalls to avoid there (hint: bugs! software upgrades!). Finally, we briefly cover different approaches to post-quantum crypto; and also dig deeper on zero-knowledge/ succinct-proof systems and how they relate to post-quantum crypto. Our expert guests are: Dan Boneh, Stanford University professor and applied cryptography expert and pioneer; also Senior Research Advisor to a16z crypto;Justin Thaler, research partner at a16z, professor at Georgetown, and longtime expert and pioneer in interactive and ZK proof systems.SEE ALSO: Post-quantum blockchains by Valeria Nikolaenkomore resources + papers on topics mentioned:A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup [see also]Proofs, Arguments, and Zero-Knowledge by Justin ThalerLatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems by Dan Boneh and Binyi ChenNeo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments by Wilson Nguyen and Srinath Setty"Q-Day Clock" from Project Eleven -- public dashboard to visually track timeline for quantum computing to reach cryptographically relevant capabilities and break widely used encryption algorithmson hard forks for quantum emergenciesQuantum analysis of AES, Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam ChattopadhyayThe Google Willow Thing by Scott AaronsonFAQs on Microsoft's topological qubit thing by Scott AaronsonMicrosoft's claim of a topological qubit faces tough questions, American Physical SocietyAs a reminder, none of this is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to our investments.
Quantum computing and AI are no longer theoretical concepts for tomorrow—they're shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.Post-Quantum Migration and Cryptographic AgilityManzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It's not just about surviving the post-quantum era—it's about staying ready for whatever comes next.Taming the Complexity of AI Agents and Non-Human IdentitiesThe second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ's platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.Real Use Cases with Measurable ImpactManzano shares practical examples of how SandboxAQ's technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.Whether it's quantum cryptography, AI risk, or identity control—this isn't a vision for 2030. It's a call to action for today.Learn more about SandboxAQ: https://itspm.ag/sandboxaq-j2enNote: This story contains promotional content. Learn more.Guest: Marc Manzano, General Manager of Cybersecurity at SandboxAQ | https://www.linkedin.com/in/marcmanzano/ResourcesLearn more and catch more stories from SandboxAQ: https://www.itspmagazine.com/directory/sandboxaqLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
On this episode of Crazy Wisdom, I, Stewart Alsop, spoke with Neil Davies, creator of the Extelligencer project, about survival strategies in what he calls the “Dark Forest” of modern civilization — a world shaped by cryptographic trust, intelligence-immune system fusion, and the crumbling authority of legacy institutions. We explored how concepts like zero-knowledge proofs could defend against deepening informational warfare, the shift toward tribal "patchwork" societies, and the challenge of building a post-institutional framework for truth-seeking. Listeners can find Neil on Twitter as @sigilante and explore more about his work in the Extelligencer substack.Check out this GPT we trained on the conversation!Timestamps00:00 Introduction of Neil Davies and the Extelligencer project, setting the stage with Dark Forest theory and operational survival concepts.05:00 Expansion on Dark Forest as a metaphor for Internet-age exposure, with examples like scam evolution, parasites, and the vulnerability of modern systems.10:00 Discussion of immune-intelligence fusion, how organisms like anthills and the Portuguese Man o' War blend cognition and defense, leading into memetic immune systems online.15:00 Introduction of cryptographic solutions, the role of signed communications, and the growing importance of cryptographic attestation against sophisticated scams.20:00 Zero-knowledge proofs explained through real-world analogies like buying alcohol, emphasizing minimal information exposure and future-proofing identity verification.25:00 Transition into post-institutional society, collapse of legacy trust structures, exploration of patchwork tribes, DAOs, and portable digital organizations.30:00 Reflection on association vs. hierarchy, the persistence of oligarchies, and the shift from aristocratic governance to manipulated mass democracy.35:00 AI risks discussed, including trapdoored LLMs, epistemic hygiene challenges, and historical examples like gold fulminate booby-traps in alchemical texts.40:00 Controlled information flows, secular religion collapse, questioning sources of authority in a fragmented information landscape.45:00 Origins and evolution of universities, from medieval student-driven models to Humboldt's research-focused institutions, and the absorption by the nation-state.50:00 Financialization of universities, decay of independent scholarship, and imagining future knowledge structures outside corrupted legacy frameworks.Key InsightsThe "Dark Forest" is not just a cosmological metaphor, but a description of modern civilization's hidden dangers. Neil Davies explains that today's world operates like a Dark Forest where exposure — making oneself legible or visible — invites predation. This framework reshapes how individuals and groups must think about security, trust, and survival, particularly in an environment thick with scams, misinformation, and parasitic actors accelerated by the Internet.Immune function and intelligence function have fused in both biological and societal contexts. Davies draws a parallel between decentralized organisms like anthills and modern human society, suggesting that intelligence and immunity are inseparable functions in highly interconnected systems. This fusion means that detecting threats, maintaining identity, and deciding what to incorporate or reject is now an active, continuous cognitive and social process.Cryptographic tools are becoming essential for basic trust and survival. With the rise of scams that mimic legitimate authority figures and institutions, Davies highlights how cryptographic attestation — and eventually more sophisticated tools like zero-knowledge proofs — will become fundamental. Without cryptographically verifiable communication, distinguishing real demands from predatory scams may soon become impossible, especially as AI-generated deception grows more convincing.Institutions are hollowing out, but will not disappear entirely. Rather than a sudden collapse, Davies envisions a future where legacy institutions like universities, corporations, and governments persist as "zombie" entities — still exerting influence but increasingly irrelevant to new forms of social organization. Meanwhile, smaller, nimble "patchwork" tribes and digital-first associations will become more central to human coordination and identity.Modern universities have drifted far from their original purpose and structure. Tracing the history from medieval student guilds to Humboldt's 19th-century research universities, Davies notes that today's universities are heavily compromised by state agendas, mass democracy, and financialization. True inquiry and intellectual aloofness — once core to the ideal of the university — now require entirely new, post-institutional structures to be viable.Artificial intelligence amplifies both opportunity and epistemic risk. Davies warns that large language models (LLMs) mainly recombine existing information rather than generate truly novel insights. Moreover, they can be trapdoored or poisoned at the data level, introducing dangerous, invisible vulnerabilities. This creates a new kind of "Dark Forest" risk: users must assume that any received information may carry unseen threats or distortions.There is no longer a reliable central authority for epistemic trust. In a fragmented world where Wikipedia is compromised, traditional media is polarized, and even scientific institutions are politicized, Davies asserts that we must return to "epistemic hygiene." This means independently verifying knowledge where possible and treating all claims — even from AI — with skepticism. The burden of truth-validation increasingly falls on individuals and their trusted, cryptographically verifiable networks.
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
Dan is joined by Michele Sartori – senior product manager at PQShield. Michele is a software engineer in Computer and Network Security, specializing in product management. He is a passionate tech team leader at the forefront of emerging technologies focused on achieving tangible results. In this highly informative discussion,… Read More
Episode 13 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Dr. Sonika Johri, Founder and CEO of Coherent Computing, to dive deep into the revolutionary world of quantum computing. Dr. Johri, a physicist with a PhD in condensed matter physics from Princeton University, takes us on her journey from engineering physics at IIT Delhi to becoming a leading figure in the quantum industry, having worked at Intel and IonQ.Sonika explains the core concepts of quantum computing—superposition, entanglement, and the quantum state space—and how they fundamentally change how we approach complex problems in fields like chemistry, material science, and AI. She discusses the future potential of quantum technologies, including the exciting prospects for Quantum AI and the shift in programming paradigms as we move from low-level machine code to higher-level abstractions.They also cover: The evolution of quantum hardware: From small qubits to scaling quantum systemsWhat makes quantum computing different from classical computingThe intersection of quantum computing and artificial intelligence Sonika's mission to democratize quantum through Coherent ComputingThe current state of quantum software and the tools that will shape the futureThis episode offers insights into quantum computing, AI, and how these emerging technologies will reshape the future of computing. Whether you're a tech enthusiast, developer, or entrepreneur, this conversation is a must-listen for anyone curious about the next frontier in technology.Key Topics & Timestamps:[00:00] – Introduction to Dr. Sonika Johri & Her Journey into Quantum Tech[03:00] – Sonika's early influences: Einstein and IIT Delhi[06:30] – Understanding Condensed Matter Physics[12:00] – Quantum Computing vs Classical Computing[20:00] – How Quantum Can Solve Complex Problems (Chemistry, Optimization, AI)[28:00] – Quantum Hardware: The Role of Qubits and Their Physical Realization[35:00] – Programming Quantum Computers: From Low-Level Gates to High-Level Abstractions[43:00] – Building Quantum Applications: Real-World Use Cases from IonQ and Coherent Computing[52:00] – The Future of Quantum AI: Machine Learning and Quantum Reasoning[1:00:00] – Quantum's Impact on Cryptography and Data Security[1:05:00] – The Mission of Coherent Computing: Making Quantum Accessible[1:12:00] – Looking Ahead: Future Episodes on Quantum Computing and AI[1:20:00] – Wrap-Up and Final ThoughtsHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Dr. Sonika Johri: Founder and CEO of Coherent Computing, a quantum software startup aiming to make quantum models accessible through developer-friendly tools. Formerly at Intel and IonQ, Sonika brings her experience in building quantum software and applications for industries like finance, chemistry, and optimization.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XDr. Sonika Johri: LinkedIn | XHave questions or thoughts on quantum computing? Drop us a mail at EffortlessPodcastHQ@gmail.comDon't forget to like, comment, and subscribe for more deep dives into the future of technology, AI, and quantum computing!
video: https://youtu.be/ua-RPOtdcF8 Comment on the TWIL Forum (https://thisweekinlinux.com/forum) This week in Linux, App 3.0 drops, bringing big changes under the hood. Amiga OS, yes, that Amiga OS, is still alive and getting updates, apparently. Open SSL 3.5 and Open SSH 10.0 both rolled out new features this week with also some future-proofing involved. And Sony, yes, that Sony, has released The Last of Us Part II on PC and it's Steam Deck verified. All that and much more on This Week in Linux, the weekly news show that keeps you plugged into everything happening in the Linux and Open Source world. Now let's jump right into Your Source for Linux GNews. Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/c5514bc1-148c-43d2-a6eb-4d0fcbfd6966.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 00:39 APT 3.0 Released 02:48 Last of US Part 2 Verified for Steam Deck 05:47 MPV 0.40 Released 08:58 Sandfly Security [ad] 10:54 AmigaOS still exists and getting updates apparently 14:24 TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop 17:20 OpenSSL 3.5 Released 19:19 OpenSSH 10.0 Released 21:41 Support the show Links: APT 3.0 Released https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/ (https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/) https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface (https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface) https://www.phoronix.com/news/Debian-APT-3.0-Released (https://www.phoronix.com/news/Debian-APT-3.0-Released) Last of US Part 2 Verified for Steam Deck https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the (https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the) https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/ (https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/) MPV 0.40 Released https://mpv.io/ (https://mpv.io/) https://github.com/mpv-player/mpv/releases/tag/v0.40.0 (https://github.com/mpv-player/mpv/releases/tag/v0.40.0) https://www.phoronix.com/news/MPV-0.40-Released (https://www.phoronix.com/news/MPV-0.40-Released) https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux (https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux) Sandfly Security [ad] https://thisweekinlinux.com/sandfly (https://thisweekinlinux.com/sandfly) https://destinationlinux.net/409 (https://destinationlinux.net/409) discount code: destination50 (Home Edition) AmigaOS still exists and getting updates apparently https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download (https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download) https://www.theregister.com/2025/04/10/amigaos32_3/ (https://www.theregister.com/2025/04/10/amigaos_3_2_3/) TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo (https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo) https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite (https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite) https://www.linaro.org/ (https://www.linaro.org/) https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update (https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update) OpenSSL 3.5 Released https://openssl-library.org/ (https://openssl-library.org/) https://github.com/openssl/openssl/releases/tag/openssl-3.5.0 (https://github.com/openssl/openssl/releases/tag/openssl-3.5.0) https://lwn.net/Articles/1016851/ (https://lwn.net/Articles/1016851/) https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic (https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic) https://www.phoronix.com/news/OpenSSL-3.5-Released (https://www.phoronix.com/news/OpenSSL-3.5-Released) OpenSSH 10.0 Released https://www.openssh.com/ (https://www.openssh.com/) https://www.openssh.com/releasenotes.html#10.0p1 (https://www.openssh.com/releasenotes.html#10.0p1) https://www.phoronix.com/news/OpenSSH-10.0-Released (https://www.phoronix.com/news/OpenSSH-10.0-Released) https://lwn.net/Articles/1016924/ (https://lwn.net/Articles/1016924/) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)
KeywordsBitcoin, Satoshi Nakamoto Institute, UTXO, Austrian Economics, Cryptography, Bitcoin Education, Generational Knowledge, Bitcoin History, Bitcoin Development, Bitcoin FutureSummaryIn this conversation, the speaker discusses the importance of preserving and advancing Bitcoin knowledge through the Satoshi Nakamoto Institute. They explore the significance of UTXOs, the influence of the Austrian School of Economics on Bitcoin, the role of cryptography, and the historical context of Bitcoin's development. The speaker emphasizes the need for generational knowledge transfer and the importance of educational initiatives to ensure future generations understand Bitcoin's value and principles.
bitcoinplebdev and cmd are building FROSTR, a multi-signature aggregation scheme for nostr key management.
John Maytham speaks to Steven Boykey Sidley, Professor of practice at JBS at the University of Johannesburg, Daily Maverick columnist, and author of It’s Mine: How the Crypto Industry Is Redefining Ownership, about the buzz surrounding Microsoft’s recent announcement of a new quantum computing chip dubbed Majorana.See omnystudio.com/listener for privacy information.
In this conversation, Nanak Nihal Khalsa discusses his journey into the crypto space, focusing on decentralized identity, the concept of human keys, and the importance of entropy in cryptography. He explains how the Human Network aims to provide secure and private identity solutions while addressing compliance challenges. The discussion also touches on the vision of the Holonym Foundation and the broader implications of digital rights in developing countries.PODCAST INFO:
Fluent Fiction - Dutch: Treasure in Tulip Fields: A Tale of Mystery & Harmony Find the full episode transcript, vocabulary words, and more:fluentfiction.com/nl/episode/2025-03-21-22-34-00-nl Story Transcript:Nl: Een zacht briesje wiegde de tulpenvelden van Amsterdam.En: A soft breeze swayed the tulip fields of Amsterdam.Nl: Kleuren dansten onder de lentezon als een levend schilderij.En: Colors danced under the spring sun like a living painting.Nl: Sven, een nieuwsgierige botanicus, slenterde door de velden.En: Sven, a curious botanist, strolled through the fields.Nl: Hij hield van de tulpen.En: He loved the tulips.Nl: Maar vandaag zocht hij iets meer.En: But today, he was looking for something more.Nl: Naast hem liep Emma, een lokale gids met een passie voor verhalen.En: Next to him walked Emma, a local guide with a passion for stories.Nl: Ze vertelde over legendes en geschiedenis van de stad.En: She told tales about legends and the history of the city.Nl: "Sven, waarom zo stil?"En: "Sven, why so quiet?"Nl: vroeg ze met een glimlach.En: she asked with a smile.Nl: Sven keek om zich heen.En: Sven looked around.Nl: Hij dacht aan de geruchten over een vreemde figuur in de velden.En: He thought of the rumors about a strange figure in the fields.Nl: "Emma, ik heb iets gehoord.En: "Emma, I heard something.Nl: Er schijnt een verborgen schat te zijn hier.En: Apparently, there's a hidden treasure here.Nl: Vol aanwijzingen."En: Full of clues."Nl: Hij keek haar serieus aan.En: He looked at her seriously.Nl: Dit maakte Emma nieuwsgierig, maar ze bleef sceptisch.En: This made Emma curious, but she remained skeptical.Nl: "Een schat?En: "A treasure?Nl: In de tulpenvelden?En: In the tulip fields?Nl: Klinkt als een sprookje."En: Sounds like a fairy tale."Nl: Bij hen sloot zich Johan aan.En: They were joined by Johan.Nl: Hij was een cryptograaf op vakantie in Amsterdam.En: He was a cryptographer on vacation in Amsterdam.Nl: "Ik ben dol op mysteries," zei Johan.En: "I love mysteries," said Johan.Nl: "Misschien zit er een raadsel in die geruchten."En: "Maybe there's a puzzle in those rumors."Nl: Sven stelde voor om samen op onderzoek uit te gaan.En: Sven suggested they go on an investigation together.Nl: Johan's vaardigheden in cryptografie zouden handig kunnen zijn.En: Johan's skills in cryptography could be useful.Nl: Emma, hoewel aarzelend, besloot mee te gaan.En: Emma, though hesitant, decided to join in.Nl: Ze werden een team van ontdekkers.En: They became a team of explorers.Nl: De aanwijzingen waren cryptisch.En: The clues were cryptic.Nl: Sommige waren ingekerfd in houten paaltjes tussen de tulpen.En: Some were carved into wooden stakes among the tulips.Nl: Anderen waren oude papieren, half verborgen door bloemen.En: Others were old papers, half hidden by flowers.Nl: Johan werkte als een meester aan de puzzels.En: Johan worked like a master on the puzzles.Nl: "Deze cijfers en symbolen wijzen op kleuren en patronen," zei hij.En: "These numbers and symbols point to colors and patterns," he said.Nl: Naarmate de dagen vorderden, bracht elke aanwijzing hen dichter bij het doel.En: As the days passed, each clue brought them closer to the goal.Nl: Tot op een ochtend, toen ze naar het veld keken en de kleuren hun verhaal vertelden.En: Until one morning, when they looked at the field and the colors told their story.Nl: De patronen onthulden de locatie van de schat.En: The patterns revealed the location of the treasure.Nl: Vol spanning bereikten ze het uiteindelijke veld.En: With great excitement, they reached the final field.Nl: Maar de schat was niet wat ze dachten.En: But the treasure was not what they thought.Nl: Geen goud of juwelen lagen daar.En: No gold or jewels lay there.Nl: In plaats daarvan ontdekten ze een nieuwe soort tulp.En: Instead, they discovered a new type of tulip.Nl: Heldere bloembladen met een boodschap van harmonie.En: Bright petals with a message of harmony.Nl: "Een boodschap van vrede en vernieuwing," zei Sven ontroerd.En: "A message of peace and renewal," said Sven, moved.Nl: "Het echte schat is de boodschap."En: "The real treasure is the message."Nl: Emma glimlachte breed.En: Emma smiled broadly.Nl: "Wat een fantastisch verhaal om te vertellen.En: "What a fantastic story to tell.Nl: Dit zal de wereld veranderen."En: This will change the world."Nl: Johan, verrast door de uitkomst, moest lachen.En: Johan, surprised by the outcome, had to laugh.Nl: "Mijn avontuur is niet alleen in symbolen en cijfers.En: "My adventure is not just in symbols and numbers.Nl: Het is juist in betekenis vinden."En: It's in finding meaning."Nl: En zo kregen de tulpenvelden nieuw leven en schitteringen.En: And so the tulip fields gained new life and glimmers.Nl: Sven voelde zich zekerder van zijn intuïtie.En: Sven felt more confident in his intuition.Nl: Emma leerde het plezier van ontdekkingen te omarmen.En: Emma learned to embrace the joy of discovery.Nl: Johan vond nieuwe voldoening in zijn werk.En: Johan found new satisfaction in his work.Nl: Samen knoopten ze onder de heldere voorjaarshemel hun vriendschap stevig vast.En: Together, they firmly tied their friendship under the bright spring sky.Nl: De wereld hoorde van hun ontdekking, en er ontstond nieuwe bewondering voor de tulpenvelden.En: The world heard of their discovery, and new admiration for the tulip fields arose.Nl: Want soms is de schat die we vinden meer dan wat we ons hadden voorgesteld.En: For sometimes the treasure we find is more than we had imagined. Vocabulary Words:breeze: briesjeswayed: wiegdecurious: nieuwsgierigestrolled: slenterderumors: geruchtenhidden: verborgenskeptical: sceptischtales: verhalencryptographer: cryptograafrumors: geruchteninvestigation: onderzoekcryptic: cryptischcarved: ingekerfdwooden: houtenstakes: paaltjespatterns: patronenrevealed: onthuldentreasure: schatadventure: avontuurmeaning: betekenisembrace: omarmensatisfaction: voldoeningadmiration: bewonderingglimmers: schitteringenconfidence: zekerderharmony: harmoniefields: veldenbotanist: botanicuslocal: lokaleclues: aanwijzingen
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
Migrating to post-quantum cryptography across an organization will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From hospitals dodging ransomware to finance professionals sharing secrets in quantum-proof chats, customers are already using this tool. Join host Konstantinos Karagiannis for a chat with Anurag Lal from NetSfere. For more information on NetSfere, visit www.netsfere.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.