Practice and study of secure communication techniques
POPULARITY
Categories
At RSAC 2025, the most urgent signals weren't necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it's clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.More Than a Job: Why Community MattersRob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It's not just about certifications—though Clyde notes that employers often value them more than degrees—it's also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It's your career,” he says. “Take back control.”Facing Burnout and Legal Risk Head-OnThe group also addresses a growing issue: burnout. ISACA's latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.The Silent Threat of QuantumWhile AI dominated RSAC's headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don't know when.”From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn't just a technology issue—it's a people issue. Listen to the full episode to hear what else we're missing.Learn more about ISACA: https://itspm.ag/isaca-96808⸻Guest: Rob Clyde, Board Director, Chair, Past Chair of the Board Directors at ISACA | https://www.linkedin.com/in/robclyde/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaStay tuned for an upcoming ITSPmagazine Webinar with ISACA: https://www.itspmagazine.com/webinarsISACA Quantum Pulse Poll 2025 and related resources: https://www.isaca.org/quantum-pulse-pollISACA State of Cybersecurity 2024 survey report: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).
Quantum Computing remains an area of research and development, but US officials are concerned adversaries could steal sensitive data now and decrypt it in the future. As quantum technology progresses, agencies are now exploring how to incorporate post quantum cryptographic standards into their technologies. Federal News Network's Justin Doubleday is here with the latest.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The UK's National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, providing secure alternatives for key establishment and digital signatures. System owners are advised to start planning for integration of PQC into their infrastructure, with the migration likely happening seamlessly through software updates for commodity IT – but requiring more effort for bespoke or enterprise IT systems. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
Vinod is a professor of computer science at MIT and a principal investigator in the IT Computer Science and AI Lab. He completed his Bachelor's degree from the Indian Institute of Technology Madras in 2003, and his PhD in 2009 from MIT. His main supervisor was Shafi Goldwasser. Vinod is seen as a world leader in the area of cryptography, especially within fully homomorphic encryption. He has co-authored many classic papers and which are seen as third generation of homomorphic encryption, including on "Trapdoors for hard lattices and new cryptographic constructions", and "Fully homomorphic encryption over integers". In 2022, he was a co-recipient of the Godel (Gurden) Prize. Vinod is also the co-founder and chief cryptographer at Duality Technologies.
with @danboneh @succinctJT @smc90This episode is all about quantum computing -- explaining what it is, how it works, what's hype vs. reality, and how to prepare for it/ what builders should do. Specifically, we cover: What quantum computing is and isn't, and what people are really talking about when they worry about a quantum computer that can break classic computing-based cryptography systems -- a cryptographically relevant post-quantum computer.When is it happening/ what are the "timelines" for quantum computing becoming a reality -- how many years away are we? -- and when are the U.S. government's deadlines/ NIST standards for post-quantum cryptography?How will different types of cryptography be affected, or not? What are different approaches and tradeoffs?Where does quantum computing and post-quantum crypto apply to blockchains -- which are not only more easily upgradable, but also by and large rely on signatures, not encryption, so may be more quantum-resistant in many ways (and not in others).As always, we tease apart the signal vs. the noise in recent "science-by-press release" corporate quantum-computing milestone announcements. We also help answer questions on when do builders need to plan their switch to a post-quantum crypto world, what pitfalls to avoid there (hint: bugs! software upgrades!). Finally, we briefly cover different approaches to post-quantum crypto; and also dig deeper on zero-knowledge/ succinct-proof systems and how they relate to post-quantum crypto. Our expert guests are: Dan Boneh, Stanford University professor and applied cryptography expert and pioneer; also Senior Research Advisor to a16z crypto;Justin Thaler, research partner at a16z, professor at Georgetown, and longtime expert and pioneer in interactive and ZK proof systems.SEE ALSO: Post-quantum blockchains by Valeria Nikolaenkomore resources + papers on topics mentioned:A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup [see also]Proofs, Arguments, and Zero-Knowledge by Justin ThalerLatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems by Dan Boneh and Binyi ChenNeo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments by Wilson Nguyen and Srinath Setty"Q-Day Clock" from Project Eleven -- public dashboard to visually track timeline for quantum computing to reach cryptographically relevant capabilities and break widely used encryption algorithmson hard forks for quantum emergenciesQuantum analysis of AES, Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam ChattopadhyayThe Google Willow Thing by Scott AaronsonFAQs on Microsoft's topological qubit thing by Scott AaronsonMicrosoft's claim of a topological qubit faces tough questions, American Physical SocietyAs a reminder, none of this is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to our investments.
Srini Devadas an Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT in the Computer Science and Artificial Intelligence Laboratory (CSAIL). His current research interests are in applied cryptography, computer security and computer architecture. Srini was awarded an a master's and a PhD degree in electrical engineering from the University of California at Berkeley - under the supervision of Arthur Richard Newton. He was an inventor of Physical Unclonable Functions (PUFs), and, In 2014, he received the IEEE Computer Society's Edward J. McCluskey Technical Achievement Award for the invention of PUFs and secure single-chip processor architectures. In 2018, Srini received the IEEE Circuits and Systems Society Charles A. Desoer Technical Achievement Award for the development of PUFs and enabling the deployment of secure circuits, processors and systems. In 2021, he received the IEEE Cybersecurity Award for Practice for the development of PUF, and the ACM SIGSAC Outstanding Innovation Award for fundamental contributions to secure microprocessors, circuits, and systems. In 2016, Srini won the Everett Moore Baker Memorial Award for Excellence in Undergraduate Teaching, Also, in 2016, he was named a MacVicar Faculty Fellow considered MIT's highest undergraduate teaching award.
Quantum computing and AI are no longer theoretical concepts for tomorrow—they're shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.Post-Quantum Migration and Cryptographic AgilityManzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It's not just about surviving the post-quantum era—it's about staying ready for whatever comes next.Taming the Complexity of AI Agents and Non-Human IdentitiesThe second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ's platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.Real Use Cases with Measurable ImpactManzano shares practical examples of how SandboxAQ's technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.Whether it's quantum cryptography, AI risk, or identity control—this isn't a vision for 2030. It's a call to action for today.Learn more about SandboxAQ: https://itspm.ag/sandboxaq-j2enNote: This story contains promotional content. Learn more.Guest: Marc Manzano, General Manager of Cybersecurity at SandboxAQ | https://www.linkedin.com/in/marcmanzano/ResourcesLearn more and catch more stories from SandboxAQ: https://www.itspmagazine.com/directory/sandboxaqLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
On this episode of Crazy Wisdom, I, Stewart Alsop, spoke with Neil Davies, creator of the Extelligencer project, about survival strategies in what he calls the “Dark Forest” of modern civilization — a world shaped by cryptographic trust, intelligence-immune system fusion, and the crumbling authority of legacy institutions. We explored how concepts like zero-knowledge proofs could defend against deepening informational warfare, the shift toward tribal "patchwork" societies, and the challenge of building a post-institutional framework for truth-seeking. Listeners can find Neil on Twitter as @sigilante and explore more about his work in the Extelligencer substack.Check out this GPT we trained on the conversation!Timestamps00:00 Introduction of Neil Davies and the Extelligencer project, setting the stage with Dark Forest theory and operational survival concepts.05:00 Expansion on Dark Forest as a metaphor for Internet-age exposure, with examples like scam evolution, parasites, and the vulnerability of modern systems.10:00 Discussion of immune-intelligence fusion, how organisms like anthills and the Portuguese Man o' War blend cognition and defense, leading into memetic immune systems online.15:00 Introduction of cryptographic solutions, the role of signed communications, and the growing importance of cryptographic attestation against sophisticated scams.20:00 Zero-knowledge proofs explained through real-world analogies like buying alcohol, emphasizing minimal information exposure and future-proofing identity verification.25:00 Transition into post-institutional society, collapse of legacy trust structures, exploration of patchwork tribes, DAOs, and portable digital organizations.30:00 Reflection on association vs. hierarchy, the persistence of oligarchies, and the shift from aristocratic governance to manipulated mass democracy.35:00 AI risks discussed, including trapdoored LLMs, epistemic hygiene challenges, and historical examples like gold fulminate booby-traps in alchemical texts.40:00 Controlled information flows, secular religion collapse, questioning sources of authority in a fragmented information landscape.45:00 Origins and evolution of universities, from medieval student-driven models to Humboldt's research-focused institutions, and the absorption by the nation-state.50:00 Financialization of universities, decay of independent scholarship, and imagining future knowledge structures outside corrupted legacy frameworks.Key InsightsThe "Dark Forest" is not just a cosmological metaphor, but a description of modern civilization's hidden dangers. Neil Davies explains that today's world operates like a Dark Forest where exposure — making oneself legible or visible — invites predation. This framework reshapes how individuals and groups must think about security, trust, and survival, particularly in an environment thick with scams, misinformation, and parasitic actors accelerated by the Internet.Immune function and intelligence function have fused in both biological and societal contexts. Davies draws a parallel between decentralized organisms like anthills and modern human society, suggesting that intelligence and immunity are inseparable functions in highly interconnected systems. This fusion means that detecting threats, maintaining identity, and deciding what to incorporate or reject is now an active, continuous cognitive and social process.Cryptographic tools are becoming essential for basic trust and survival. With the rise of scams that mimic legitimate authority figures and institutions, Davies highlights how cryptographic attestation — and eventually more sophisticated tools like zero-knowledge proofs — will become fundamental. Without cryptographically verifiable communication, distinguishing real demands from predatory scams may soon become impossible, especially as AI-generated deception grows more convincing.Institutions are hollowing out, but will not disappear entirely. Rather than a sudden collapse, Davies envisions a future where legacy institutions like universities, corporations, and governments persist as "zombie" entities — still exerting influence but increasingly irrelevant to new forms of social organization. Meanwhile, smaller, nimble "patchwork" tribes and digital-first associations will become more central to human coordination and identity.Modern universities have drifted far from their original purpose and structure. Tracing the history from medieval student guilds to Humboldt's 19th-century research universities, Davies notes that today's universities are heavily compromised by state agendas, mass democracy, and financialization. True inquiry and intellectual aloofness — once core to the ideal of the university — now require entirely new, post-institutional structures to be viable.Artificial intelligence amplifies both opportunity and epistemic risk. Davies warns that large language models (LLMs) mainly recombine existing information rather than generate truly novel insights. Moreover, they can be trapdoored or poisoned at the data level, introducing dangerous, invisible vulnerabilities. This creates a new kind of "Dark Forest" risk: users must assume that any received information may carry unseen threats or distortions.There is no longer a reliable central authority for epistemic trust. In a fragmented world where Wikipedia is compromised, traditional media is polarized, and even scientific institutions are politicized, Davies asserts that we must return to "epistemic hygiene." This means independently verifying knowledge where possible and treating all claims — even from AI — with skepticism. The burden of truth-validation increasingly falls on individuals and their trusted, cryptographically verifiable networks.
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
Jonathan was a professor in the Department of Computer Science at the University of Maryland. He is now a Senior Staff Research Scientist at Google, with a core focus on cryptography and cybersecurity. Jonathan received his BS degree in mathematics and chemistry from MIT in 1996, and, in 2002, completed a PhD in computer science from Columbia University. He wrote a classic textbook on cryptography, and which is in its 3rd edition. Jonathon also has an online course on Coursera and has given tutorials of various forms on different topics to multiple kinds of audiences.
Dan is joined by Michele Sartori – senior product manager at PQShield. Michele is a software engineer in Computer and Network Security, specializing in product management. He is a passionate tech team leader at the forefront of emerging technologies focused on achieving tangible results. In this highly informative discussion,… Read More
In der zweiten Folge zu Post-Quantum-Cryptography sprechen Calso und Chris mit Sebastian über die faszinierende Welt des Quantencomputings – und die potenzielle Bedrohung, die diese Technologie für Bitcoin darstellen könnte.Was genau ist ein Quantencomputer? Wie funktionieren Qubits, Superposition und logische Qubits? Und vor allem: Wie realistisch ist das Szenario, dass Bitcoin durch Quantenangriffe gefährdet wird?Wir werfen einen Blick auf den aktuellen Forschungsstand, diskutieren mögliche Angriffsziele wie Signaturen oder Mining, und besprechen Lösungsansätze wie BIP 360 und Post-Quantum-Kryptografie. Sollte man im Notfall Coins „beschlagnahmen“ – und wäre die Community überhaupt bereit, sich schnell genug anzupassen?Von und mit: [[Calso, Chris ]]Produziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattformen, wie Fountain, PodcastGuru, Castamatic, Breez oder Podverse hören und uns so eine kleine Aufmerksamkeit da lassen. Danke an alle, die die Bitcoin Community mit ihren Spenden unterstützen! Mit diesen Spenden wird unter anderem unser Bounty Programm verwirklicht, in dem ihr euch für die Mitarbeit an einem Projekt eine Belohnung sichern könnt.Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 893450@sebastianvstaa auf XNostr: npub1emsh676rdg2ahqlmsqewf5emkl88jgmunxe64hg6v79r070pfyeq22txmyHow Quantum Computers Break The Internet... Starting NowNachgehackt: Post-Quanten-KryptographieForschungsquartett | Post-Quanten-Kryptografie – Sicher im Zeitalter der Quantencomputer | detektor.fm – Das Podcast-RadioWILL QUANTUM BREAK BITCOIN? W/ Hunter Beasthttps://github.com/cryptoquick/bips/blob/p2qrh/bip-0360.mediawikiNovember 18, 2022 M-23-02 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: Shalanda D. Young Director SUBJEChttps://mailing-list.bitcoindevs.xyz/bitcoindev/CALkkCJY=dv6cZ_HoUNQybF4-byGOjME3Jt2DRr20yZqMmdJUnQ@mail.gmail.com/Timestamps:(00:00:22) Intro und Vorstellung Sebastian(00:07:14) Was sind nochmal Quanten Computer?(00:25:41) Quantenbedrohung für Bitcoin(00:32:11) Mining und andere Risiken(00:33:10) Lösungsansätze und BIP 360(00:45:32) Reaktionen der Core Entwickler und der Community(00:50:44) Philosophisches und Governance(00:57:13) Wie ist die Timeline?(01:01:22) Die Zusammenfassung(01:08:08) Verabschiedung
Maciej Zurawski is technology entrepreneur and blockchain specialist with over 25 years of experience in commercial software development, R&D and business leadership. He is currently the CEO at Redeem Technologies, and serves as the Executive Director of Blockchain Scotland - the principal industry association advancing commercial blockchain adoption across Scotland. His expertise spans enterprise software architecture, artificial intelligence and decentralised systems, complemented by a doctorate in AI. Maciej regularly advises government bodies and financial institutions on blockchain implementation and digital transformation strategy.
Greg McLardie has 30 years of executive experience in the USA, Australia, Japan, China and now the UK with the likes of Procter & Gamble and EY. He co-created Two Hands and has been operating for over 5 years in Australia and China, with Forbes Magazine publishing a three-page feature on its unique blockchain application in the food industry. With strong traction internationally, Two Hands has established a company and transferred global IP to the UK to attract investment to scale its impact into the UK, EU and beyond.
In this week's #TechTalk, Amit and Rinat dive into the intricate world of post-quantum cryptography. They discuss the basics of quantum computers, the principles of quantum mechanics, and the ground-breaking potential of quantum computing. The conversation then shifts to the importance of cryptographic algorithms in securing data, and how current methods could be rendered obsolete by future quantum computers. Amit explains the need for post-quantum cryptography, the new standards recently announced by NIST, and how organizations can future-proof their sensitive data. This podcast is an informative journey through the cutting edge of technology and its immense impact on the world.
In der heutigen Folge spricht Chris mit Hanna von Tuta über die Notwendigkeit, sich jetzt schon Gedanken über Post-Quantum-Cryptography zu machen. Mit dieser Folge starten wir eine kleine Serie zum Thema Post-Quanten-Kryptografie. Der Grund: Quantencomputer entwickeln sich rasant weiter und könnten schon bald klassische Verschlüsselung bedrohen – mit möglichen Folgen für unsere gesamte digitale Infrastruktur, inklusive Bitcoin. In dieser Reihe schauen wir uns an, wie real die Gefahr ist, was gerade in der Forschung passiert – und wie sich das auf die Zukunft von Kryptografie und Bitcoin auswirken könnte.Von und mit: [[Chris]]Produziert und geschnitten: ChrisHier könnt ihr uns eine Spende über Lightning da lassen: ⚡️nodesignal@getalby.comWenn euch unsere Arbeit gefällt, könnt ihr unsere Folgen auch auf Podcasting 2.0 Plattformen, wie Fountain, PodcastGuru, Castamatic, Breez oder Podverse hören und uns so eine kleine Aufmerksamkeit da lassen. Danke an alle, die die Bitcoin Community mit ihren Spenden unterstützen! Mit diesen Spenden wird unter anderem unser Bounty Programm verwirklicht, in dem ihr euch für die Mitarbeit an einem Projekt eine Belohnung sichern könnt.Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts. Folgt uns auch gerne bei Nostr:npub1n0devk3h2l3rx6vmt24a3lz4hsxp7j8rn3x44jkx6daj7j8jzc0q2u02cy und Twitter.Blockzeit: 892982https://tuta.com/dehttps://tuta.com/de/blog/world-quantum-dayMusik: Final Girl von Jeremy Blake (royalty free) Timestamps:(00:00) Intro(00:22) Intro PQC Serie(04:12) Vorestellung Hanna(07:30) Was ist Kryptografie?(11:57) Was sind Quanten-Computer?(16:32) Was ist Post-Quanten-Kryptografie?(18:56) Gibt es PQC Standards?(21:26) Welche Rolle spielt das NIST?(24:44) Worauf basiert PQC?(25:45) Was sind die Nachteile von PQC?(29:11) Warum jetzt schon PQC?(34:58) Was kommt bei Tuta im Hinblick auf PQC?(36:48) Ein Cheat Sheet für die Hörer(38:44) 2 Zusatzfragen(41:20) Verabschiedung(45:37) Focus on the Signal
Episode 13 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Dr. Sonika Johri, Founder and CEO of Coherent Computing, to dive deep into the revolutionary world of quantum computing. Dr. Johri, a physicist with a PhD in condensed matter physics from Princeton University, takes us on her journey from engineering physics at IIT Delhi to becoming a leading figure in the quantum industry, having worked at Intel and IonQ.Sonika explains the core concepts of quantum computing—superposition, entanglement, and the quantum state space—and how they fundamentally change how we approach complex problems in fields like chemistry, material science, and AI. She discusses the future potential of quantum technologies, including the exciting prospects for Quantum AI and the shift in programming paradigms as we move from low-level machine code to higher-level abstractions.They also cover: The evolution of quantum hardware: From small qubits to scaling quantum systemsWhat makes quantum computing different from classical computingThe intersection of quantum computing and artificial intelligence Sonika's mission to democratize quantum through Coherent ComputingThe current state of quantum software and the tools that will shape the futureThis episode offers insights into quantum computing, AI, and how these emerging technologies will reshape the future of computing. Whether you're a tech enthusiast, developer, or entrepreneur, this conversation is a must-listen for anyone curious about the next frontier in technology.Key Topics & Timestamps:[00:00] – Introduction to Dr. Sonika Johri & Her Journey into Quantum Tech[03:00] – Sonika's early influences: Einstein and IIT Delhi[06:30] – Understanding Condensed Matter Physics[12:00] – Quantum Computing vs Classical Computing[20:00] – How Quantum Can Solve Complex Problems (Chemistry, Optimization, AI)[28:00] – Quantum Hardware: The Role of Qubits and Their Physical Realization[35:00] – Programming Quantum Computers: From Low-Level Gates to High-Level Abstractions[43:00] – Building Quantum Applications: Real-World Use Cases from IonQ and Coherent Computing[52:00] – The Future of Quantum AI: Machine Learning and Quantum Reasoning[1:00:00] – Quantum's Impact on Cryptography and Data Security[1:05:00] – The Mission of Coherent Computing: Making Quantum Accessible[1:12:00] – Looking Ahead: Future Episodes on Quantum Computing and AI[1:20:00] – Wrap-Up and Final ThoughtsHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Dr. Sonika Johri: Founder and CEO of Coherent Computing, a quantum software startup aiming to make quantum models accessible through developer-friendly tools. Formerly at Intel and IonQ, Sonika brings her experience in building quantum software and applications for industries like finance, chemistry, and optimization.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XDr. Sonika Johri: LinkedIn | XHave questions or thoughts on quantum computing? Drop us a mail at EffortlessPodcastHQ@gmail.comDon't forget to like, comment, and subscribe for more deep dives into the future of technology, AI, and quantum computing!
Moti is a Security and Privacy Research Scientist with Google and an Adjunct Research Faculty member at the Computer Science Dep of Columbia University. He received his PhD from Columbia University in 1988. In 2010 he gave the IACR Distinguished Lecture and has also been the recipient of the 2014 ACM's SIGSAC Outstanding Innovation award, the 2014 ESORICS (European Symposium on Research in Computer Security) Outstanding Research award, an IBM Outstanding Innovation award, a Google OC award, and a Google founders' award. Moti has also received three test of time awards, including in 2024 for his 1998 paper On the Security of ElGamal Based Encryption, and in 2020 for his 1996 paper Cryptovirology: extortion-based security threats and countermeasures. In 2021, Moti received the Women of the ENIAC Computer Pioneer Award. Overall, his main research focus areas in Security, Privacy, and Cryptography.
video: https://youtu.be/ua-RPOtdcF8 Comment on the TWIL Forum (https://thisweekinlinux.com/forum) This week in Linux, App 3.0 drops, bringing big changes under the hood. Amiga OS, yes, that Amiga OS, is still alive and getting updates, apparently. Open SSL 3.5 and Open SSH 10.0 both rolled out new features this week with also some future-proofing involved. And Sony, yes, that Sony, has released The Last of Us Part II on PC and it's Steam Deck verified. All that and much more on This Week in Linux, the weekly news show that keeps you plugged into everything happening in the Linux and Open Source world. Now let's jump right into Your Source for Linux GNews. Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/c5514bc1-148c-43d2-a6eb-4d0fcbfd6966.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 00:39 APT 3.0 Released 02:48 Last of US Part 2 Verified for Steam Deck 05:47 MPV 0.40 Released 08:58 Sandfly Security [ad] 10:54 AmigaOS still exists and getting updates apparently 14:24 TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop 17:20 OpenSSL 3.5 Released 19:19 OpenSSH 10.0 Released 21:41 Support the show Links: APT 3.0 Released https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/ (https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/) https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface (https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface) https://www.phoronix.com/news/Debian-APT-3.0-Released (https://www.phoronix.com/news/Debian-APT-3.0-Released) Last of US Part 2 Verified for Steam Deck https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the (https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the) https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/ (https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/) MPV 0.40 Released https://mpv.io/ (https://mpv.io/) https://github.com/mpv-player/mpv/releases/tag/v0.40.0 (https://github.com/mpv-player/mpv/releases/tag/v0.40.0) https://www.phoronix.com/news/MPV-0.40-Released (https://www.phoronix.com/news/MPV-0.40-Released) https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux (https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux) Sandfly Security [ad] https://thisweekinlinux.com/sandfly (https://thisweekinlinux.com/sandfly) https://destinationlinux.net/409 (https://destinationlinux.net/409) discount code: destination50 (Home Edition) AmigaOS still exists and getting updates apparently https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download (https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download) https://www.theregister.com/2025/04/10/amigaos32_3/ (https://www.theregister.com/2025/04/10/amigaos_3_2_3/) TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo (https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo) https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite (https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite) https://www.linaro.org/ (https://www.linaro.org/) https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update (https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update) OpenSSL 3.5 Released https://openssl-library.org/ (https://openssl-library.org/) https://github.com/openssl/openssl/releases/tag/openssl-3.5.0 (https://github.com/openssl/openssl/releases/tag/openssl-3.5.0) https://lwn.net/Articles/1016851/ (https://lwn.net/Articles/1016851/) https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic (https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic) https://www.phoronix.com/news/OpenSSL-3.5-Released (https://www.phoronix.com/news/OpenSSL-3.5-Released) OpenSSH 10.0 Released https://www.openssh.com/ (https://www.openssh.com/) https://www.openssh.com/releasenotes.html#10.0p1 (https://www.openssh.com/releasenotes.html#10.0p1) https://www.phoronix.com/news/OpenSSH-10.0-Released (https://www.phoronix.com/news/OpenSSH-10.0-Released) https://lwn.net/Articles/1016924/ (https://lwn.net/Articles/1016924/) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)
KeywordsBitcoin, Satoshi Nakamoto Institute, UTXO, Austrian Economics, Cryptography, Bitcoin Education, Generational Knowledge, Bitcoin History, Bitcoin Development, Bitcoin FutureSummaryIn this conversation, the speaker discusses the importance of preserving and advancing Bitcoin knowledge through the Satoshi Nakamoto Institute. They explore the significance of UTXOs, the influence of the Austrian School of Economics on Bitcoin, the role of cryptography, and the historical context of Bitcoin's development. The speaker emphasizes the need for generational knowledge transfer and the importance of educational initiatives to ensure future generations understand Bitcoin's value and principles.
bitcoinplebdev and cmd are building FROSTR, a multi-signature aggregation scheme for nostr key management.
John Maytham speaks to Steven Boykey Sidley, Professor of practice at JBS at the University of Johannesburg, Daily Maverick columnist, and author of It’s Mine: How the Crypto Industry Is Redefining Ownership, about the buzz surrounding Microsoft’s recent announcement of a new quantum computing chip dubbed Majorana.See omnystudio.com/listener for privacy information.
In this conversation, Nanak Nihal Khalsa discusses his journey into the crypto space, focusing on decentralized identity, the concept of human keys, and the importance of entropy in cryptography. He explains how the Human Network aims to provide secure and private identity solutions while addressing compliance challenges. The discussion also touches on the vision of the Holonym Foundation and the broader implications of digital rights in developing countries.PODCAST INFO:
Fluent Fiction - Dutch: Treasure in Tulip Fields: A Tale of Mystery & Harmony Find the full episode transcript, vocabulary words, and more:fluentfiction.com/nl/episode/2025-03-21-22-34-00-nl Story Transcript:Nl: Een zacht briesje wiegde de tulpenvelden van Amsterdam.En: A soft breeze swayed the tulip fields of Amsterdam.Nl: Kleuren dansten onder de lentezon als een levend schilderij.En: Colors danced under the spring sun like a living painting.Nl: Sven, een nieuwsgierige botanicus, slenterde door de velden.En: Sven, a curious botanist, strolled through the fields.Nl: Hij hield van de tulpen.En: He loved the tulips.Nl: Maar vandaag zocht hij iets meer.En: But today, he was looking for something more.Nl: Naast hem liep Emma, een lokale gids met een passie voor verhalen.En: Next to him walked Emma, a local guide with a passion for stories.Nl: Ze vertelde over legendes en geschiedenis van de stad.En: She told tales about legends and the history of the city.Nl: "Sven, waarom zo stil?"En: "Sven, why so quiet?"Nl: vroeg ze met een glimlach.En: she asked with a smile.Nl: Sven keek om zich heen.En: Sven looked around.Nl: Hij dacht aan de geruchten over een vreemde figuur in de velden.En: He thought of the rumors about a strange figure in the fields.Nl: "Emma, ik heb iets gehoord.En: "Emma, I heard something.Nl: Er schijnt een verborgen schat te zijn hier.En: Apparently, there's a hidden treasure here.Nl: Vol aanwijzingen."En: Full of clues."Nl: Hij keek haar serieus aan.En: He looked at her seriously.Nl: Dit maakte Emma nieuwsgierig, maar ze bleef sceptisch.En: This made Emma curious, but she remained skeptical.Nl: "Een schat?En: "A treasure?Nl: In de tulpenvelden?En: In the tulip fields?Nl: Klinkt als een sprookje."En: Sounds like a fairy tale."Nl: Bij hen sloot zich Johan aan.En: They were joined by Johan.Nl: Hij was een cryptograaf op vakantie in Amsterdam.En: He was a cryptographer on vacation in Amsterdam.Nl: "Ik ben dol op mysteries," zei Johan.En: "I love mysteries," said Johan.Nl: "Misschien zit er een raadsel in die geruchten."En: "Maybe there's a puzzle in those rumors."Nl: Sven stelde voor om samen op onderzoek uit te gaan.En: Sven suggested they go on an investigation together.Nl: Johan's vaardigheden in cryptografie zouden handig kunnen zijn.En: Johan's skills in cryptography could be useful.Nl: Emma, hoewel aarzelend, besloot mee te gaan.En: Emma, though hesitant, decided to join in.Nl: Ze werden een team van ontdekkers.En: They became a team of explorers.Nl: De aanwijzingen waren cryptisch.En: The clues were cryptic.Nl: Sommige waren ingekerfd in houten paaltjes tussen de tulpen.En: Some were carved into wooden stakes among the tulips.Nl: Anderen waren oude papieren, half verborgen door bloemen.En: Others were old papers, half hidden by flowers.Nl: Johan werkte als een meester aan de puzzels.En: Johan worked like a master on the puzzles.Nl: "Deze cijfers en symbolen wijzen op kleuren en patronen," zei hij.En: "These numbers and symbols point to colors and patterns," he said.Nl: Naarmate de dagen vorderden, bracht elke aanwijzing hen dichter bij het doel.En: As the days passed, each clue brought them closer to the goal.Nl: Tot op een ochtend, toen ze naar het veld keken en de kleuren hun verhaal vertelden.En: Until one morning, when they looked at the field and the colors told their story.Nl: De patronen onthulden de locatie van de schat.En: The patterns revealed the location of the treasure.Nl: Vol spanning bereikten ze het uiteindelijke veld.En: With great excitement, they reached the final field.Nl: Maar de schat was niet wat ze dachten.En: But the treasure was not what they thought.Nl: Geen goud of juwelen lagen daar.En: No gold or jewels lay there.Nl: In plaats daarvan ontdekten ze een nieuwe soort tulp.En: Instead, they discovered a new type of tulip.Nl: Heldere bloembladen met een boodschap van harmonie.En: Bright petals with a message of harmony.Nl: "Een boodschap van vrede en vernieuwing," zei Sven ontroerd.En: "A message of peace and renewal," said Sven, moved.Nl: "Het echte schat is de boodschap."En: "The real treasure is the message."Nl: Emma glimlachte breed.En: Emma smiled broadly.Nl: "Wat een fantastisch verhaal om te vertellen.En: "What a fantastic story to tell.Nl: Dit zal de wereld veranderen."En: This will change the world."Nl: Johan, verrast door de uitkomst, moest lachen.En: Johan, surprised by the outcome, had to laugh.Nl: "Mijn avontuur is niet alleen in symbolen en cijfers.En: "My adventure is not just in symbols and numbers.Nl: Het is juist in betekenis vinden."En: It's in finding meaning."Nl: En zo kregen de tulpenvelden nieuw leven en schitteringen.En: And so the tulip fields gained new life and glimmers.Nl: Sven voelde zich zekerder van zijn intuïtie.En: Sven felt more confident in his intuition.Nl: Emma leerde het plezier van ontdekkingen te omarmen.En: Emma learned to embrace the joy of discovery.Nl: Johan vond nieuwe voldoening in zijn werk.En: Johan found new satisfaction in his work.Nl: Samen knoopten ze onder de heldere voorjaarshemel hun vriendschap stevig vast.En: Together, they firmly tied their friendship under the bright spring sky.Nl: De wereld hoorde van hun ontdekking, en er ontstond nieuwe bewondering voor de tulpenvelden.En: The world heard of their discovery, and new admiration for the tulip fields arose.Nl: Want soms is de schat die we vinden meer dan wat we ons hadden voorgesteld.En: For sometimes the treasure we find is more than we had imagined. Vocabulary Words:breeze: briesjeswayed: wiegdecurious: nieuwsgierigestrolled: slenterderumors: geruchtenhidden: verborgenskeptical: sceptischtales: verhalencryptographer: cryptograafrumors: geruchteninvestigation: onderzoekcryptic: cryptischcarved: ingekerfdwooden: houtenstakes: paaltjespatterns: patronenrevealed: onthuldentreasure: schatadventure: avontuurmeaning: betekenisembrace: omarmensatisfaction: voldoeningadmiration: bewonderingglimmers: schitteringenconfidence: zekerderharmony: harmoniefields: veldenbotanist: botanicuslocal: lokaleclues: aanwijzingen
Our podcast guest is the theoretical crypto-physicist Artur Ekert
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
Migrating to post-quantum cryptography across an organization will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From hospitals dodging ransomware to finance professionals sharing secrets in quantum-proof chats, customers are already using this tool. Join host Konstantinos Karagiannis for a chat with Anurag Lal from NetSfere. For more information on NetSfere, visit www.netsfere.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
Hugo Sconlik is regarded as one of the pioneers of Informatics in Argentina. In 1985 he created the Computer Science Department, of which he is currently Full Professor, at the School of Sciences of the University of Buenos Aires (UBA). Cryptography is Hugo's focal area of research, gaining him recognition as a leading figure in this field. He is the co-author of the Argentine Electronic Signature Law enacted in 2001. That said, his research interests are not limited to cryptography and comprise other areas such as numerical analysis, mathematical models and even robotics. Hugo has published about 50 scientific papers and two books. He was awarded the 2003 Konex Platinum prize for the best trajectory in Science and Technology in Argentina of the decade 1993-2003 and in 2005 the Sadosky prize for the best trajectory in Informatics. He was twice elected Vice President at Large of IFORS (International Federation for Operations Research Societies). Hugo has also been quite active besides academia, both in the private (corporate) sector and as consultant to multiple public and international organizations, and frequently appears in the media. He was a Founding Partner of two leading firms that develop products and solutions for SET and identity protection. Hugo holds a PhD in Mathematics from the University of Zurich and a PhD (Honoris Causa) from the University of Cuyo in Argentina.
In part two of this episode, Paulina Gomez, Ryan Lafler, Doug Schremp, and Paola Osorio delve into Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) algorithms. They discuss the principles of QKD, its challenges, and industry progress, as well as the development of PQC algorithms to deliver quantum-resistant encryption solutions. They also explore future milestones and the solutions that are available today to safeguard critical data and mitigate the quantum computing threat to enable quantum-secure communications.
Apple has pulled the availability of their opt-in iCloud end-to-end encryption feature, called Advanced Data Protection, in the UK. This doesn't only affect UK Apple users, however. To help us make sense of this surprising move from the fruit company, we got Matt Green, Associate Professor at Johns Hopkins, and Joe Hall, Distinguished Technologist at the Internet Society, on the horn. Recorded Saturday February 22nd, 2025.Transcript: https://securitycryptographywhatever.com/2025/02/24/apple-pulls-adp-in-uk/Watch episode on YouTube: https://youtu.be/LAn_yOGUkR0Links:- https://www.lawfaremedia.org/article/apples-cloud-key-vault-and-secure-law-enforcement-access- https://www.androidcentral.com/how-googles-backup-encryption-works-good-bad-and-ugly- https://gdpr.eu/right-to-be-forgotten/- https://www.legislation.gov.uk/id/ukpga/2024/9- https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html- https://en.wikipedia.org/wiki/Salt_Typhoon- Salt Typhoon: https://www.cisa.gov/news-events/news/strengthening-americas-resilience-against-prc-cyber-threats- https://www.bloomberg.com/news/articles/2025-02-21/apple-removes-end-to-end-encryption-feature-from-uk-after-backdoor-order- https://support.apple.com/en-us/102651"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
“Google's new quantum machine and OpenAI's new ‘Terminator Project'” is a speculative glimpse into the frontier of cutting-edge technology. While Google's quantum computing research aims to harness subatomic phenomena for massive computational power, OpenAI's rumored ‘Terminator Project' evokes images of advanced artificial intelligence with potentially autonomous decision-making capabilities. Although details are sparse, both initiatives highlight a future where breakthroughs in quantum mechanics and AI convergence could transform fields as diverse as cryptography, medicine, and robotics. The mere mention of these projects underscores the rapid pace of innovation and the profound ethical questions that accompany major technological leaps.
In this episode of CISO Tradecraft, host G Mark Hardy discusses Microsoft's groundbreaking announcement of their new quantum chip, the Majorana. The chip harnesses properties of a topological superconductor, making quantum computing promises more tangible. The episode delves into the technical aspects of quantum bits (qubits), cryptography, and the implications of topological quantum computing. With insights on competitor advancements by Google and potential challenges, this episode provides a comprehensive overview of quantum computing's future and its cyber security implications. Transcripts: https://docs.google.com/document/d/1O2XG47o2_6jHBtPKL2PcwGRKPe69wFvi Link: https://azure.microsoft.com/en-us/blog/quantum/2025/02/19/microsoft-unveils-majorana-1-the-worlds-first-quantum-processor-powered-by-topological-qubits/ Chapters 00:00 Introduction to CISO Tradecraft 00:26 Microsoft's Quantum Chip Announcement 01:51 Understanding Quantum Bits 03:23 Quantum Computing and Cryptography 06:00 Microsoft's Quantum Leap 09:41 The Physics Behind Quantum Computing 16:48 Majorana Particle and Its Significance 20:29 Applications and Future of Quantum Computing 25:01 Conclusion and Final Thoughts
Picture a world where your money isn't controlled by any government, but rather exists in the form of digital code. That's the idea behind Bitcoin and cryptocurrency, where freedom meets cryptography, and transactions are recorded transparently on a blockchain. But we get it–to those looking to add cryptocurrency to their portfolio, the subject of decentralized finance can be pretty intimidating. Our hosts, Stephanie McCullough and Kevin Gaines break it down with special guest Marianne Borneman, founder of Access Tax Solutions, the home of Real Clear Tax Advice. They look into how Bitcoin differs from traditional money, dissecting its digital nature and the security measures you need to protect your assets. From choosing reputable digital wallets to setting up complex passwords, they guide us through safeguarding your investments in this new financial frontier. Understanding the tax implications of your Bitcoin transactions is essential to avoid unwanted surprises. Our hosts and Marianne share practical scenarios illustrating the importance of documenting every purchase and sale, and how using Bitcoin as a gift or payment can impact your tax obligations. Whether you hold physical assets or prefer investing through ETFs, they explain how these choices affect your tax strategy and what to watch out for in terms of legal and security challenges. Ever wondered what it takes to mine Bitcoin or why it's often compared to gold? They dive into all that, including where it actually derives value from. They explore the concept of scarcity and how collective belief underpins currency value, drawing parallels between Bitcoin and precious metals like gold. In wrapping, they discuss the most common frauds and scams to watch out for as you navigate the world of crypto! Key Topics: “What the Heck is Bitcoin?” (0:25) How Safe is Crypto? (07:50) How to Use Cryptocurrency (11:21) Crypto and Taxes (18:35) Owning Physical Assets Versus ETFs (30:16) Common Crypto Scams (33:36) Bitcoin Mining (47:41) When Does a Crypto Transaction Qualify as a Taxable Event? (54:51) Where Does Bitcoin Derive Value From? (59:58) Resources: Learn more about Kathleen Marianne Borneman and her services here Take Back Retirement #83: Combatting Fraud and Protecting Your Financial Future with AARP's Kathy Stokes If you like what you've been hearing, we invite you to subscribe on your favorite platform and leave us a review. Tell us what you love about this episode! Or better yet, tell us what you want to hear more of in the future. stephanie@sofiafinancial.com You can find the transcript and more information about this episode at www.takebackretirement.com. Follow Stephanie on Twitter, Facebook, YouTube and LinkedIn. Follow Kevin on Twitter, Facebook, YouTube and LinkedIn.
Send us a textUnlock the future of digital security with us as we chat with Gerard Cervelló, CEO, and Jordi Puiggalí, CTO of Secrets Vault. These two innovative minds promise to transform how we think about cybersecurity by leveraging visual cryptography to protect the seed phrases of crypto wallets. Discover how their novel approach not only simplifies backup processes for Web3 users but also offers a robust alternative to traditional passwords by using images. The potential of this technology to revolutionize identity and access management is vast, and our conversation dives into its integration with existing security systems, providing a user-friendly and secure solution for managing digital credentials.As we explore practical use cases, you'll hear firsthand accounts from beta testers about how Secrets Vault is already safeguarding crypto wallet information, financial accounts, and sensitive documents. Beyond just the technical details, Gerard and Jordi also share invaluable insights on building trust within communities, emphasizing transparency and expert validation. They tackle cybersecurity myths and offer straightforward tips to enhance your digital safety. Plus, get a sneak peek into their exciting project, Secrets Vault, and why it could be the next big thing in digital protection. Join us for this insightful episode and learn how to stay ahead in the evolving landscape of cybersecurity.This episode was recorded through a Descript call on January 21, 2025. Read the blog article and show notes here: https://webdrie.net/how-secrets-vault-simplifies-security-with-images-for-crypto-and-beyond/Discover RYO: the Web3 payment solution making crypto simple and secure for everyone. Featuring an expansive ecosystem with LIFE Wallet, Global Mall, and Japan's first licensed Crypto ATM Network, RYO empowers your financial journey. Awarded 'Best Crypto Solution.'
Send us a textCybersecurity enthusiasts and curious minds alike are in for a treat with our conversation featuring the esteemed David Holtzman, a cybersecurity virtuoso whose journey will both inspire and educate. Discover why the real mastery in cybersecurity transcends formal certifications, as David shares his formative experiences from high school to the present. His story emphasizes the critical role of curiosity and problem-solving skills, offering valuable insights for those venturing into this ever-evolving field. You'll gain a fresh perspective on what it truly takes to be an expert in cybersecurity as David and I explore the foundational knowledge and mindset essential for success.Shift gears with us as we explore a captivating transition from the allure of traditional luxury sports cars to the groundbreaking innovation of Tesla vehicles. Our discourse navigates the shift in skills from mechanical to digital and unravels the challenges of maintaining vintage cars versus embracing new-age technology. Dive into the quirks of modern tech frustrations, such as dealing with printers, against a backdrop of fascinating anecdotes from my NSA experience. This segment paints a vivid picture of how technology has transformed both personal passions and professional landscapes over the decades.Rounding out our conversation, we tackle the future of AI-driven cybersecurity and the pressing concerns around AI security and privacy. As we weave through the complex tapestry of intelligence work from the past to the potential of decentralized systems, we consider the implications of centralization and the innovations of web3. Witness the exciting possibilities of blockchain in enhancing network security, and reflect on the importance of interdisciplinary skills that prepare professionals for the unknowns of the tech world. This episode promises to enlighten, challenge, and inspire those seeking to understand the nuanced world of cybersecurity and technology's future.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
In episode 118 of Cybersecurity Where You Are, Sean Atkinson is joined by Andy Smith, Security Architect for BP and Instructor at the SANS Institute. Together, they review the state of post-quantum cryptography as well as share recommendations for how organizations and individuals can prepare to move into the post-quantum era.Here are some highlights from our episode:02:55. What post-quantum cryptography is and why we need to pay attention04:11. The impact of a cryptographically relevant quantum computer on symmetric vs. asymmetric cryptography08:58. How media attention contributes to preparedness from an infrastructure perspective14:30. The importance of a cryptography bill of materials (CBOM)21:58. How organizations can prepare against quantum-enabled cyber attacks29:05. How individuals need to understand quantum infrastructure in order to protect it32:24. Optimism for the future of post-quantum cryptographyResourcesEpisode 48: 3 Trends to Watch in the Cybersecurity IndustryPost Quantum Cryptography by Attack Detect Defend (rot169)NIST Releases First 3 Finalized Post-Quantum Encryption StandardsEpisode 75: How GenAI Continues to Reshape CybersecurityInternet of Things: Embedded Security GuidanceIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
In this epic episode of The Charlie Shrem Show, I sit down with Ran Goldi, VP of Payments at Fireblocks, one of the most influential companies in the crypto and blockchain space. Ran's journey is as fascinating as the industry he's helped shape—from algorithmic trading to launching startups, to his time in Israeli intelligence, and ultimately building a cornerstone of the blockchain infrastructure.We dive deep into:Fireblocks' Revolutionary Impact: Powering 15-20% of the world's blockchain transactions and introducing game-changing security innovations like MPC (Multi-Party Computation).Hacking, North Korea, and Crypto Security: The wild world of hacks, how North Korea targets the crypto industry, and why collaboration in security is the key to staying safe.Crypto's Evolution in Israel: From the early days of Bitcoin to cryptographic breakthroughs, Ran explains why Israel became a global leader in blockchain technology.Lessons from Intelligence to Innovation: How Ran's time in the IDF shaped his career and inspired his drive to make the impossible possible.Building a Safer Crypto Industry: Tips for identifying scams, validating legitimate projects, and creating a better ecosystem for the future.This conversation is a masterclass in understanding the critical role infrastructure and security play in crypto's growth, as well as the unique mindset it takes to innovate in an industry that never sleeps.Whether you're a crypto newbie or a seasoned pro, this episode is packed with insights, stories, and practical advice to help you navigate the world of blockchain and beyond.Don't miss this!
Time stamps: Introducing Liam (00:00:25) Shielded Client-Side Validation (00:01:53) Challenges in Bitcoin Development (00:05:36) The Soft Fork Independence of Shielded CSV (00:06:31) Introduction to OP_CAT (00:06:31) Opinions on Bitcoin Covenant Proposals (00:07:06) Integer Arithmetic in Bitcoin (00:09:26) Alpen Labs and Their Projects (00:12:23) Optimistic vs. Optimistically Verified zk Rollups (00:15:05) Data Availability Issues in Rollups (00:16:02) Zcash and Mobile Wallets (00:21:03) Philosophical Debate on Bitcoin's Future (00:22:21) Comparing Lightning Network and Shielded CSV (00:25:40) Layer Two Labs andDrive Chain (00:28:52) Sidechains vs. Rollups (00:29:55) Citrea and DeFi Potential (00:31:14) Rollups' Data Handling (00:32:50) Advantages of Sidechains (00:33:56) Drivechains Overview (00:35:10) Citrea vs. Alpen Labs (00:37:13) Collaboration in Bitcoin L2 Space (00:38:43) Existential Question on Bitcoin Privacy (00:40:02) Political Capital and Bitcoin's Future (00:42:52) Universal Truths in Bitcoin Community (00:44:04) Resistance to Change in Bitcoin (00:45:29) Testing Timeframes for Bitcoin Changes (00:50:11) Risks of Unknown Unknowns (00:51:59) Risks Beyond Bitcoin Changes (00:56:34) Indistinguishable Obfuscation (00:57:37) Challenges of Indistinguishable Obfuscation (00:58:49) Incentives for Bitcoin Development (00:59:42) Collaboration in Crypto Communities (01:01:44) Views on Monero, Zcash, Litecoin (01:03:27) Litecoin's Scalability Features (01:04:49) Centralization in Rollups (01:06:25) Bulletproofs and Membership Proofs (01:10:31) Bulletproofs++ Overview (01:13:26) Scalability of Bulletproofs++ (01:22:08) Full Chain Membership Proofs in Monero (01:24:54) Nullifier Mechanism (01:27:55) Challenges of Implementing Privacy (01:29:32) Concerns About Hidden Inflation (01:32:19) Inflation Bugs in Cryptocurrencies (01:33:32) Bitcoin Block Size Increase Debate (01:36:50) Decentralization vs. Block Size (01:39:03) Proof of Stake in Bitcoin? (01:43:35) Long-term Sustainability of Mining (01:46:33) Concerns About Bitcoin's Supply Cap (01:47:36) Is The Future Multi-chain? (01:51:30) Stablecoins Aren't Stable (01:54:20) Future of Bitcoin (01:55:19) Market Dynamics and Government Influence (01:57:07) Privacy and Scalability Concerns (01:57:44) Activation Challenges (01:58:34) Centralization Issues (01:59:36) Community Dynamics (02:00:27) Closing Remarks (02:02:02) Keeping Up with Liam (02:02:38)
Time stamps: Introducing Mike Belshe (00:00:42) Mike Belshe's Background (00:01:58) Self-Custody vs. Institutional Custody (00:02:05) Multi-Signature Technology (00:03:56) Understanding Multi-Party Computation (00:04:51) Advancements in Cryptography (00:05:53) BitGo's Role in Tokenizing Bitcoin (00:08:26) Defining DeFi's Importance (00:09:09) Mike's Technology Background (00:12:12) Inspiration from Tim Berners-Lee (00:14:57) Bitcoin's Zero Click Payments (00:17:11) Bitcoin Custodianship Issues (00:17:36) Challenges of Bitcoin Payments (00:18:25) Scaling Bitcoin and Lightning Network (00:19:20) Bitcoin's Role in Digital Money (00:20:13) Layer Two Solutions and Drivechains (00:21:15) Scaling Discussions in Bitcoin's History (00:22:31) Sidechains and Their Limitations (00:23:16) Innovation vs. Immutability (00:24:29) Importance of Real Applications (00:25:32) Privacy and Fungibility in Bitcoin (00:28:42) Lessons from TCP/IP and Blockchain Privacy (00:30:51) Regulatory Concerns and Privacy Solutions (00:32:53) Understanding the Static of Security (00:34:01) SideShift (00:34:59) Bitcoin's Civil War: Block Size Wars (00:35:54) Human Decisions in Bitcoin (00:36:16) Historical Proposals and Interpretations (00:37:10) Challenges of Block Space and Fees (00:37:58) Bitcoin Consensus (00:38:48) SegWit and Its Implications (00:39:41) Gavin Andresen's Role in Bitcoin (00:42:00) Bitcoin's Resilience Against Adversaries (00:42:13) Need for Enhanced Security (00:43:05) Strategic Bitcoin Reserve in the USA (00:44:30) El Salvador's Currency Strategy (00:45:19) Self-Custody Concerns (00:49:13) Security Measures for Self-Custody (00:50:17) Privacy as a Solution (00:50:43) Self-Custody Options (00:51:14) Family Legacy and Custody Challenges (00:52:24) Public Key Cryptography Innovation (00:52:28) HODLING.ch (00:53:29) Protecting Against Government Confiscation (00:54:15) Multi-Custodial Model Explanation (00:54:21) Hardware Wallets Discussion (00:56:03) Safety Deposit Box Concerns (00:58:03) Trade-offs in Security Solutions (00:58:56) Onboarding New Users (01:00:09) Edge Wallet Features (01:01:01) BitGo's Wallet Recovery Wizard (01:03:02) BitGo vs. Casa (01:05:08) Multi-Signature Security (01:05:46) Early Adoption of Multi-Sig (01:09:10) Building a New Monetary System (01:11:54) Regulatory Changes in the US (01:13:49) Impact of MiCA in Europe (01:15:32) War on Cash (01:16:17) Global Financial Systems (01:18:03) Zero Knowledge Proofs (01:19:48) Zcash Discussion (01:20:04) Privacy Technologies in Bitcoin (01:21:18) Challenges of On-chain Traceability (01:22:26) Philosophy on Transaction Privacy (01:23:19) Concerns About Privacy Adoption (01:24:51) Historical Context of TCP/IP Security (01:25:34) Bitcoin as Digital Gold (01:27:24) Ethereum's Role in DeFi (01:29:01) Benefits of Smart Contracts (01:32:01) Reflections on Bitcoin's Journey (01:33:25) Future of Bitcoin (01:34:30) Lightning Network Fees (01:36:12) Trade-offs in Payment Systems (01:38:01) Adoption of Bitcoin and Early Adoption Costs (01:42:01) Long-term Viability of Bitcoin Mining (01:44:38) The Future of Bitcoin and Layer Solutions (01:47:17) Community Response to Bitcoin Vulnerabilities (01:49:01) Satoshi's Vision for Mining (01:51:11) Satoshi's Intentions (01:52:35) Empathy for Satoshi (01:54:16) 0 to 1 Concept (01:54:24) Bitcoin's Anniversary (01:55:53) Centralization in Crisis (01:56:33) Zero Knowledge Proof Bug (01:57:45) Following Mike Belshe's Work (01:58:45)
2024 was an eventful year for post quantum cryptography (PQC). This includes FIPS standards, the PQC onramp, and the dawn of widespread interest among IT professionals.
Today we will cover the spies that made the modern world. This crucial history is absolutely essential to understanding how we got to where we are and how the world really works. We will be analyzing the book by Gilles Munier, Black Gold Spies. The full analysis will be available to subscribers to JaysAnalysis below. Book is here: https://a.co/d/epSVb4D Next live event here: https://checkout.square.site/merchant/MLR5FN2CP7W57/checkout/2LK2ZBXTKO5QW5ND4IGMYVRI Send Superchats at any time here: https://streamlabs.com/jaydyer/tip Get started with Bitcoin here: https://www.swanbitcoin.com/jaydyer/ The New Philosophy Course is here: https://marketplace.autonomyagora.com/philosophy101 Set up recurring Choq subscription with the discount code JAY44LIFE for 44% off now https://choq.com Lore coffee is here: https://www.patristicfaith.com/coffee/ Orders for the Red Book are here: https://jaysanalysis.com/product/the-red-book-essays-on-theology-philosophy-new-jay-dyer-book/ Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyerBecome a supporter of this podcast: https://www.spreaker.com/podcast/jay-sanalysis--1423846/support.