Podcasts about Cryptography

Practice and study of secure communication techniques

  • 721PODCASTS
  • 1,562EPISODES
  • 47mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 13, 2025LATEST
Cryptography

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Cryptography

Show all podcasts related to cryptography

Latest podcast episodes about Cryptography

Impact Quantum: A Podcast for Engineers
Quantum Careers - Without the Sci-Fi Nonsense

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Oct 13, 2025 52:03 Transcription Available


On this milestone 30th episode of Impact Quantum Season 3, hosts Frank La Vigne and Candace Gillhoolley are joined by Vyom Patel, a master's student at the University of Waterloo—often described as the MIT of Canada. This episode dives into Vyom's journey from machine learning to the cutting-edge challenges of quantum algorithms and quantum error correction. Together, they unpack the common misconceptions around quantum computing, reveal the importance of strong mathematical foundations, and discuss the very real risks and rewards of working in a nascent, rapidly evolving field. Vyam shares how he filters through the hype, stays up-to-date with the latest research, and why mentorship (both giving and receiving) is crucial in this space. Whether you're just quantum-curious or already obsessed with superposition, this episode promises insights, laughter, and plenty of motivation to get quantumly curious yourself!Links Quantum Computing Since Democritus - https://www.amazon.com/dp/0521199565?tag=datadrivenm0e-20 Time Stamps00:00 "Exploring Quantum Computing's Interdisciplinary Appeal"04:10 Quantum Computing: Curiosity and Claims08:19 Trusting Academic Sources First11:44 Efficient Paper Skimming Techniques16:52 Quantum Computing for Differential Equations20:03 Quantum Matrix Encoding Challenges24:10 Foundations of Cryptography and Error Correction27:15 The Future of Quantum Education29:23 "Foundations Key to Tech Progress"34:04 Math Mentorship and Research Program37:13 "Demystifying Quantum Mechanics for Beginners"40:57 Quantum LDPC Codes Appeal43:17 "Evolution of Error Correction"46:26 Quantum Computing Race: Architecture's Future49:19 Future Plans: Technical Blog Creation

Bitcoin Takeover Podcast
S16 E48: Christopher Smith on Quantus, Bitcoin & Quantum Resistance

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 7, 2025 166:35


Christopher Smith (aka Yuvi Lightman, aka Ganesha 1024) is the founder of the Quantus network: an mbitious quantum-zk blockchain which he proudly built with his team in just 6 months, with a budget of $500k. In this episode we talk about the threat of quantum computing, how quantum resistant cryptography works, and how Bitcoin can be saved from a potential disaster. Time stamps: 00:01:31 - Introducing Christopher Smith (Yuvi Lightman), known on Soundcloud Music as Ganesha1024 00:02:22 - Quantis: Zero-Knowledge Quantum-Resistant Blockchain 00:02:39 - Christopher's Background, Early Bitcoin Involvement 00:03:41 - Current Views on Bitcoin, All-Time High at $125K 00:04:19 - Discovering Bitcoin in 2012, Contributions to BitcoinJ 00:04:36 - Founding BitMesh: Micropayments via Payment Channels 00:04:42 - Mike Hearn and Payment Channels 00:05:17 - Bitcoin Whitepaper Praise, Satoshi's Genius 00:05:55 - Essence of Money, Overcomplication Critique 00:06:49 - Bitcoin's Corporate Takeover, Cultural Ethos 00:08:38 - SegWit Changes, Big Block Debate 00:09:45 - Bitcoin Cash Sympathy, Shift to Ethereum 00:10:41 - Vitalik Buterin and Gavin Wood as Geniuses 00:10:53 - Lunar Startup: Blockchain Wikipedia with ICO 00:11:08 - Bitcoin Threats: Throughput, Privacy, Quantum Security 00:11:29 - Child Porn Blackmail Tactics in Debates 00:12:18 - Social Bottlenecks in Coordination 00:13:09 - BTC Token vs Network Separation via ETFs 00:14:06 - Proof of Keys Day by Trace Mayer 00:15:23 - No Trusted Third Parties Philosophy 00:16:04 - Cryptography as Military Tech 00:18:04 - Open Source Importance, ERC20 Simplicity 00:19:21 - BlackRock as Central Bank, Cult of Saturn Symbolism 00:20:17 - Bitcoin Threats: Throughput with Shai Reference 00:22:50 - Privacy and Zcash Praise 00:23:32 - Quantus as Bitcoin Fork with Falcon Signatures 00:24:50 - Solana as Big Blocker Inheritor 00:25:04 - Overton Window Constraints 00:26:41 - Quantus Timelines Skepticism, PsiQuantum Investment 00:28:14 - Ethereum Proof of Stake, Stablecoin Control 00:29:27 - Catholic Church Analogy, Satoshi's Time-Buying Quote 00:30:04 - Weaponized Schizophrenia Concept 00:31:09 - Schizophrenia as Catch-All, LSD Benefits 00:32:21 - False Positives/Negatives in Machine Learning 00:33:34 - Arbitrary Thresholds in Science/Medicine/Physics 00:34:46 - Autistic Definitions, Bitcoin Redefinition 00:36:25 - Douglas Hofstadter's Godel Escher Bach Inspiration 00:37:32 - Ads: Bitcoin.com News 00:38:39 - Citrea: ZK Rollup on Bitcoin 00:40:21 - BIP300 Drivechains by Paul Sztorc 00:41:53 - Hacker Ethos, L2 Complexity Critique 00:43:27 - Lightning Network Failures 00:44:22 - Open Source vs Closed Source Thought Experiment 00:47:00 - Check Phrase for Security 01:00:00 - Quantum Mechanics Wave Function Collapse 02:02:17 - Chris Doesn't Sound Like Typical Founder 02:02:50 - Quantus Features: Reversible Transactions 02:05:23 - Check Phrase Innovation 02:07:29 - HD Wallets for Lattice Cryptography, QIPs 02:08:46 - Pro-Social to Industry, Ethereum Ethos 02:09:00 - Ross Ulbricht on Blockchain Decentralization 02:10:00 - Bitcoin Maximalism Critique 02:10:34 - Satoshi on ZK Proofs Efficiency 02:11:01 - Grin Fair Launch, Kaspa DAG Innovation 02:12:16 - Zcash Innovations, ZK Snarks 02:13:25 - Libraries from Zcash, Fluffy Pony Dismissal 02:14:07 - Zcash Made ZK Practical 02:15:36 - Ethereum Net Positive Despite Mess 02:16:04 - Stablecoins as Freezable CBDCs 02:18:19 - Eye-Openers: Iran Banking Struggles, Argentina Tether Use 02:20:40 - COVID Psychology Lessons 02:22:27 - QE Money Printing Realization 02:23:33 - Legal vs Moral, COVID Non-Compliance 02:25:13 - Forgetting COVID Coercion 02:26:36 - Psychedelic Community Enforcement 02:27:47 - Nature's Cruelty 02:28:55 - Vaccine Divisions 02:30:02 - Each Vaccine Unique, Pavlov's Association 02:31:03 - Freedom License Concept 02:32:01 - Agency and Responsibility 02:34:05 - Frustrated Developers, Utility Missed 02:35:07 - User Adoption Challenges 02:36:01 - Funnel for Adoption, Co-Founder Complement 02:37:38 - Check Phrase for Wallets 02:39:04 - Plato on Politics 02:39:46 - Habeas Corpus History 02:40:40 - Optimism: Sunlight, World Complexity 02:41:36 - Manifesting Intentions 02:42:28 - Soundcloud Recommendation, Quantus Docs 02:43:02 - Music Like Pink Floyd's Great Gig in the Sky 02:44:47 - Amir Taaki 7-Hour Record 02:45:43 - Zooko's 6-Hour Interview 02:46:47 - WeaponizedSchizophrenia.com Blog 02:47:00 - Closing Words

Bitcoin Takeover Podcast
S16 E47: Max Hillebrand on White Noise & Private Messaging on Nostr

Bitcoin Takeover Podcast

Play Episode Listen Later Oct 2, 2025 242:36


Max Hillebrand makes his 8th appearance on the Bitcoin Takeover Podcast in order to talk about his latest project: White Noise, a private messaging application for Nostr. We also talk about Core v30 vs Knots, Bitcoin layer 2s & other bull market topics. Time stamps: 00:01:07 - Max Hillebrand's Background 00:02:47 - Post-Wasabi Wallet Era and Privacy Challenges 00:04:28 - Nostr Protocol Overview 00:05:58 - Early Nostr Experiences and Key Loss 00:08:51 - Nostr Client Progress and Edge Cases 00:09:58 - Nostr's Relation to Bitcoin 00:13:53 - Hardware Wallets for Nostr Keys 00:18:06 - Nostr Key Backups and Security 00:21:53 - Nostr Search and Web of Trust 00:24:21 - Ads: Bitcoin.com News and NoOnes.com 00:26:12 - White Noise Protocol Introduction 00:27:52 - NIP 44 and Gift Wraps for Encryption 00:30:20 - Signal Protocol and MLS Evolution 00:32:16 - MLS Protocol Details 00:33:23 - Nostr Privacy Limitations 00:35:17 - Trusted Relays and Metadata 00:37:25 - Nostr as Data Delivery Layer 00:38:41 - Self-Authentication in MLS 00:40:02 - Group Creation and Key Packages 00:42:38 - MLS vs. Major League Soccer Joke 00:42:53 - Diffie-Hellman and Scaling to Millions 00:44:24 - MLS Key Tree Structure 00:46:59 - Scalability Benefits of MLS 01:18:00 - Marmot and Nostr Tools 01:25:30 - The Zcash Pump Dance 03:09:25 - Angor Protocol for Recurring Payments 03:14:02 - Bitcoin Script and Smart Contracts 03:15:32 - Great Script Restoration Proposal 03:21:03 - Builder Spirit in Bitcoin vs. Ethereum 03:25:19 - Bills of Exchange and Peer-to-Peer Credit 03:33:09 - Historical Finance and Farming 03:38:35 - Starting Bitcoin Meetups 03:41:43 - Localizing Bitcoin Content 03:44:17 - Recommended Podcasts 03:47:48 - Podcast Benefits and Guest Interactions 03:54:39 - Audience Quality and Impact 03:55:36 - White Noise Future and Building Freedom Tech 03:58:51 - AI Coding and Proof of Concepts 04:00:38 - Nym Mixnet Integration 04:01:54 - Closing Remarks and Future Sessions

My Precious Data
Cryptography, cyber threats & the future with Prof. Dr. Bart Preneel (KU Leuven).

My Precious Data

Play Episode Listen Later Sep 29, 2025 53:08


In this English-language episode of the My Precious Data Podcast, cybersecurity expert Eddy Willems sits down with longtime colleague (LSEC) and internationally renowned cryptographer Prof. Dr. Bart Preneel (KU Leuven). Together, they explore the past, present, and future of cybersecurity — from the foundations of cryptography to the political and societal challenges of digital trust today.Topics discussed:The evolution of cryptography and its real-world applicationsThe balance between privacy, security, and surveillanceQuantum computing: a threat or a promise?Europe's role in shaping global cybersecurity standardsWhat needs to change in the next decade?Quotes from the episode:“In the end, trust is not built by technology alone. It's about governance, transparency, and respect for users.” — Prof. Dr. Bart Preneel“People often think cybersecurity is just about hackers and firewalls. But it's deeply tied to our rights, our freedom, and the way societies function.” — Eddy Willems“We are now entering an era where cryptography will face its biggest challenge: quantum resistance.” — Prof. Dr. Bart PreneelThis is not just a technical conversation — it's a thought-provoking dialogue between two world-leading experts who have been part of the cybersecurity evolution for decades.

Cybercrime Magazine Podcast
Quantum Minute. Research Breakthrough In Cryptography. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 26, 2025 2:02


Researchers have made a breakthrough in cryptography, building a new foundation for quantum cryptography that could make it more secure than classical encryption. The new approach, developed by Dakshita Khurana and Kabir Tomer, uses quantum building blocks called one-way puzzles to generate locks and keys. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Digital Transformation & Leadership with Danny Levy
Noise vs. Leadership, Quantum-Safe Cryptography, and Why the Right Conversation Changes Everything w/ Camilla Bullock

Digital Transformation & Leadership with Danny Levy

Play Episode Listen Later Sep 26, 2025 46:58


This week, Camilla Bullock, CEO of the Emerging Payments Association Asia (EPAA), joins Danny for a wide-ranging, no-BS conversation that cuts through the noise.The Emerging Payments Association Asia (EPAA) is the peak industry body representing and supporting the APAC payments ecosystem.Danny and Camilla get into:Why true leadership isn't about being a “thought leader” (and why Camilla refuses the label).The hidden superpower that drives change: spotting the right people and sparking the right discussions.Quantum-safe cryptography—why it's not just a “future problem” and why starting now could be the smartest move you'll ever make.The storytelling gap in cybersecurity—and how to make resilience resonate across an industry that usually drowns in jargon.Why recognising excellence through initiatives like the Money Awards creates real momentum.And much more...!If you care about the future of payments, fintech, or just want to know how the right idea at the right time can reshape an industry - this is your episode.It's 45 minutes packed with sharp insights, no fluff, and lessons you can actually use.Are you getting every episode of Digital Transformation & Leadership in your favourite podcast player? You can find us Apple Podcasts and Spotify to subscribe.

ASecuritySite Podcast
Post Quantum Cryptography and Other Crypto with Daniel J Bernstein

ASecuritySite Podcast

Play Episode Listen Later Sep 24, 2025 57:59


A chat in the International Conference on PQC and AI. Daniel is a world-renowned computer scientist, one of the most influential figures in modern cryptography and a pioneer in post-quantum security.https://luma.com/9lxiupu6https://luma.com/9lxiupu6https://luma.com/9lxiupu6

InfosecTrain
Public Key Cryptography Simplified Encryption, Decryption & DigiNotar Hack (Superhero Edition)

InfosecTrain

Play Episode Listen Later Sep 21, 2025 48:51


The Azure Security Podcast
Episode 118 - Quantum Cryptography and Quantum Computing with Mark Russinovich

The Azure Security Podcast

Play Episode Listen Later Sep 19, 2025 33:31 Transcription Available


In this episode Michael and Mark talk with guest Mark Russinovich, Technical Fellow, Deputy CISO and Chief Technology Officer of Microsoft Azure about quantum cryptography and quantum computing and its implications for security and the future. NOTE: There's a portion where Mark and Michael talk about a quote made by Richard Feynman about understanding technical topics, but this is actually attributed to Albert Einstein. However, there is no definitive record of Einstein writing or saying this exact phrase in his published works or speeches.We decided to not cover any Azure Security news in this episode.

Embedded Insiders
Designing for Harsh Environments & Quantum Cryptography

Embedded Insiders

Play Episode Listen Later Sep 18, 2025 33:30


Send us a textIn this episode of Embedded Insiders, Rich and Jeff Baldwin, Director of Engineering at Sealevel Systems, discuss the process of designing systems for harsh environments and how Sealevel's expertise helps customers get started with safe and reliable solutions.Our next segment is sponsored by Infineon Technologies. Rich Nass is joined by Erik Wood, Infineon's Senior Director of Microcontroller Cryptography and Product Security, and the two discuss quantum computing and how the experts at Infineon are working to keep systems secure.But first, Ken and I engage in some rapid-fire questions regarding a recent story on Embedded Computing Design about robotic telesurgery, featuring Stéphane Lavallé, a serial entrepreneur of startups and pioneer in surgical robotics, and Jim Hirsch, VP of the North American and EMEA general embedded market at QNX. Read the story here: https://embeddedcomputing.com/application/healthcare/telehealth-healthcare-iot/the-good-invasion-of-robotsFor more information, visit embeddedcomputing.com

The Post-Quantum World
Running Shor's Algorithm on Logical Qubits - with Peter Noell of Infleqtion

The Post-Quantum World

Play Episode Listen Later Sep 17, 2025 36:14


For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

David Bombal
#512: All Encryption Hacked in 3 Years?

David Bombal

Play Episode Listen Later Sep 15, 2025 38:17


Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Quantum computing isn't a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that's enough to break today's asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor's algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states' “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

Mind Over Murder
BONUS: The Zodiac Killer with Michael Butterfield (Part 1)

Mind Over Murder

Play Episode Listen Later Sep 4, 2025 42:39 Transcription Available


Michael Butterfield, author of "The Zodiac Killer: The Story of America's Most Elusive Murderer," joins "Mind Over Murder" cohosts Bill Thomas and Kristin Dilley to discuss his new book, his longtime research into the still unsolved Zodiac case, and his website, ZodiacKillerFacts.com. Will Zodiac ever be identified?  Will the remaining Zodiac ciphers be solved?  Are there really similarities between the Zodiac case and the Colonial Parkway Murders? This bonus episode is is Part 1 of 2 parts on the Zodiac with Michael Butterfield, and originally ran on May 12, 2025.CrimeCon:  We're going to CrimeCon again, folks! Join us in Denver for new merch, some MOM listener hangouts, and a lot of fun! Use the code MINDOVERMURDER to get 10% off your tickets between now and September! See you there!Amazon:  The Zodiac Killer: The Story of America's Most Elusive Murdererhttps://www.amazon.com/Zodiac-Killer-Americas-Elusive-Murderer/dp/1398851779?author-follow=B0F4RS214FZodiacKillerFacts.com website:https://zodiackillerfacts.com/about/Washingtonian: A Murder on the Rappahannock River:https://www.washingtonian.com/2019/06/27/murder-on-the-rappahannock-river-emerson-stevens-mary-harding-innocence-project/WTKR News 3: One year after development in Colonial Parkway Murders, where do things stand?https://www.wtkr.com/news/in-the-community/historic-triangle/one-year-after-development-in-colonial-parkway-murders-where-do-things-standWon't you help the Mind Over Murder podcast increase our visibility and shine the spotlight on the "Colonial Parkway Murders" and other unsolved cases? Contribute any amount you can here:https://www.gofundme.com/f/mind-over-murder-podcast-expenses?utm_campaign=p_lico+share-sheet&utm_medium=copy_link&utm_source=customerWTVR CBS News:  Colonial Parkway murders victims' families keep hope cases will be solved:https://www.wtvr.com/news/local-news/colonial-parkway-murders-update-april-19-2024WAVY TV 10 News:  New questions raised in Colonial Parkway murders:https://www.wavy.com/news/local-news/new-questions-raised-in-colonial-parkway-murders/Alan Wade Wilmer, Sr. has been named as the killer of Robin Edwards and David Knobling in the Colonial Parkway Murders in September 1987, as well as the murderer of Teresa Howell in June 1989. He has also been linked to the April 1988 disappearance and likely murder of Keith Call and Cassandra Hailey, another pair in the Colonial Parkway Murders.13News Now investigates: A serial killer's DNA will not be entered into CODIS database:https://www.13newsnow.com/video/news/local/13news-now-investigates/291-e82a9e0b-38e3-4f95-982a-40e960a71e49WAVY TV 10 on the Colonial Parkway Murders Announcement with photos:https://www.wavy.com/news/crime/deceased-man-identified-as-suspect-in-decades-old-homicides/WTKR News 3https://www.wtkr.com/news/is-man-linked-to-one-of-the-colonial-parkway-murders-connected-to-the-other-casesVirginian Pilot: Who was Alan Wade Wilmer Sr.? Man suspected in two ‘Colonial Parkway' murders died alone in 2017https://www.pilotonline.com/2024/01/14/who-was-alan-wade-wilmer-sr-man-suspected-in-colonial-parkway-murders-died-alone-in-2017/Colonial Parkway Murders Facebook page with more than 18,000 followers: https://www.facebook.com/ColonialParkwayCaseYou can also participate in an in-depth discussion of the Colonial Parkway Murders here:https://earonsgsk.proboards.com/board/50/colonial-parkway-murdersMind Over Murder is proud to be a Spreaker Prime Podcaster:https://www.spreaker.comJoin the discussion on our Mind Over MurderColonial Parkway Murders website: https://colonialparkwaymurders.com Mind Over Murder Podcast website: https://mindovermurderpodcast.comPlease subscribe and rate us at your favorite podcast sites. Ratings and reviews are very important. Please share and tell your friends!We launch a new episode of "Mind Over Murder" every Monday morning, and a bonus episode every Thursday morning.Sponsors: Othram and DNAsolves.comContribute Your DNA to help solve cases: https://dnasolves.com/user/registerFollow "Mind Over Murder" on Twitter: https://twitter.com/MurderOverFollow Bill Thomas on Twitter: https://twitter.com/BillThomas56Follow "Colonial Parkway Murders" on Facebook: https://www.facebook.com/ColonialParkwayCase/Follow us on InstaGram:: https://www.instagram.com/colonialparkwaymurders/Check out the entire Crawlspace Media network at http://crawlspace-media.com/All rights reserved. Mind Over Murder, Copyright Bill Thomas and Kristin Dilley, Another Dog Productions/Absolute Zero ProductionsBecome a supporter of this podcast: https://www.spreaker.com/podcast/mind-over-murder--4847179/support.

GOTO - Today, Tomorrow and the Future
Beyond the Cloud: The Local-First Software Revolution • Brooklyn Zelenka & Julian Wood

GOTO - Today, Tomorrow and the Future

Play Episode Listen Later Sep 2, 2025 31:24 Transcription Available


This interview was recorded for GOTO Unscripted.https://gotopia.techRead the full transcription of this interview hereBrooklyn Zelenka - Author of Numerous Libraries Including Witchcraft & Founded the Vancouver Functional Programming MeetupJulian Wood - Serverless Developer Advocate at AWSRESOURCESBrooklynhttps://bsky.app/profile/expede.wtfhttps://octodon.social/@expede@types.plhttps://github.com/expedehttps://www.linkedin.com/in/brooklynzelenkahttps://notes.brooklynzelenka.comJulianhttps://bsky.app/profile/julianwood.comhttps://twitter.com/julian_woodhttp://www.wooditwork.comhttps://www.linkedin.com/in/julianrwoodLinkshttps://automerge.orghttps://discord.com/invite/zKGe4DCfgRhttps://www.robinsloan.com/notes/home-cooked-apphttps://github.com/ipvm-wghttps://www.localfirst.fmhttps://localfirstweb.devDESCRIPTIONDistributed systems researcher Brooklyn Zelenka unpacks the paradigm shift of local-first computing, where applications primarily run on users' devices and synchronize seamlessly without central servers.In a conversation with Julian Wood, she explains how this approach reduces latency, enables offline functionality, improves privacy through encryption, and democratizes app development—all while using sophisticated data structures. Perfect for collaborative tools and "cozy web" applications serving smaller communities, local-first software represents a fundamental rethinking of how we've built software for the past 30 years.RECOMMENDED BOOKSFord, Parsons, Kua & Sadalage • Building Evolutionary Architectures 2nd EditionFord, Richards, Sadalage & Dehghani • Software Architecture: The Hard PartsMark Richards & Neal Ford • Fundamentals of Software ArchitectureFord, Parsons & Kua • Building Evolutionary ArchitecturesNeal Ford • Functional ThinkingMichael Feathers • Working Effectively with Legacy CodeBlueskyTwitterInstagramLinkedInFacebookCHANNEL MEMBERSHIP BONUSJoin this channel to get early access to videos & other perks:https://www.youtube.com/channel/UCs_tLP3AiwYKwdUHpltJPuA/joinLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!

Cybercrime Magazine Podcast
Quantum Minute. Lattice Problems Weighed For Post-Quantum Cryptography. Sponsored by Applied Quantum

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 29, 2025 1:38


Cryptography experts are racing to develop algorithms that can protect data from powerful quantum computers, which have been demonstrably capable of breaking current encryption systems since the development of Shor's algorithm in 1994. Lattice problems, a type of mathematical model that involves calculating vectors in a mathematical structure, are being considered as a potential foundation for post-quantum cryptography. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

HPE Tech Talk
Can we build technology today to defend against the threats of tomorrow?

HPE Tech Talk

Play Episode Listen Later Aug 28, 2025 22:44


Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

Embedded Executive
Embedded Executive: Quantum Cryptography Must Be Part of Your Vocabulary | Infineon

Embedded Executive

Play Episode Listen Later Aug 27, 2025 11:49


We're in the era of quantum computing. That brings with it a lot of great things. But at the same time, it brings some not so good things. Once again, we're in a race to stay ahead of the bad guys to keep our systems secure. Folks like the experts at Infineon are doing what they can to do just that. And the best part is that they are trying to insulate their customers from having to deal with all the different measures that must be put in place. Hear from Eric Wood, Infineon's Senior Director of Microcontroller Cryptography and Product Security, to see if this sounds like a fit for your design. Check out this week's Embedded Executives podcast to learn more.

Quanta Science Podcast
A New Quantum Math of Cryptography

Quanta Science Podcast

Play Episode Listen Later Aug 26, 2025 27:12


We're living in the golden age of cryptography. Since the 1970s, we’ve had more confidence in encryption than ever before. But there’s a difference between confidence and absolute certainty. And computer scientists care a lot about that difference. The search is always on for better, more secure secrets. But is it possible for digital security to be truly, provably unbreakable? Maybe, with a little help from math and physics. On this week's episode, host Samir Patel talks with ???????????????????????? computer science staff writer Ben Brubaker about a developing frontier of digital security: quantum cryptography. This topic was covered in a recent story for Quanta Magazine. Each week on The Quanta Podcast, Quanta Magazine editor in chief Samir Patel speaks with the people behind the award-winning publication to navigate through some of the most important and mind-expanding questions in science and math. Audio Coda from the Bletchley Park Trust.

Security. Cryptography. Whatever.
Stop Using Encrypted Email with William Woodruff

Security. Cryptography. Whatever.

Play Episode Listen Later Aug 23, 2025 71:07 Transcription Available


There was a bug in an OpenPGP library which finally gave us an excuse to tear encrypted email via PGP to shreds. Our special guest William Woodruff joined us to help explain the vuln and indulge our gnashing of teeth on why email was never meant to be encrypted and how other modern tools do the job much, much better.Watch on YouTube: https://www.youtube.com/watch?v=IoL3LfIozJoTranscript: https://securitycryptographywhatever.com/2025/08/22/stop-using-encrypted-email-with-william-woodruffLinks:- William Woodruff: https://yossarian.net/- https://www.latacora.com/blog/2020/02/19/stop-using-encrypted/- https://www.rfc-editor.org/rfc/rfc4880- https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/- https://www.mailpile.is/blog/2014-10-07_Some_Thoughts_on_GnuPG.html- https://www.rfc-editor.org/rfc/rfc9580.html- https://www.tumblr.com/accidentallyquadratic- https://www.w3.org/TR/xmldsig-core/- https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP- https://www.rfc-editor.org/rfc/rfc9580.html#name-signature-packet-type-id-2- https://www.rfc-editor.org/rfc/rfc9580.html#name-key-derivation-function- https://en.wikipedia.org/wiki/S/MIME- https://delta.chat- https://signal.org/blog/the-ecosystem-is-moving/- https://phakeobj.netlify.app/posts/gigacage/- https://x.com/dakami-----BEGIN PGP MESSAGE-----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-----END PGP MESSAGE-----"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

HPE Tech Talk
How are governments reacting to the threat of quantum computers?

HPE Tech Talk

Play Episode Listen Later Aug 21, 2025 20:31


Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/

The Post-Quantum World
One PQC Playbook – with Kevin Hilscher of DigiCert

The Post-Quantum World

Play Episode Listen Later Aug 20, 2025 32:58


DigiCert is widely recognized for its expertise in PKI and as a TLS certificate authority. As you can imagine, they have a significant perspective on the quantum computing threat to encryption and the migration to post-quantum cryptography (PQC). We cover everything from the challenges of upgrading IoT devices to ML-DSA signature sizes, as well as the new DigiCert One platform the company offers to help manage the migration process. In the middle of this episode, you'll even get a clear summary of what a successful rollout to PQC looks like. Join host Konstantinos Karagiannis for a wide-ranging chat on actionable PQC steps you can take with Kevin Hilscher from DigiCert. There's even a Quantum Safe Playground to experiment with!For more information on DigiCert, visit www.digicert.com/.   Visit the Quantum Safe Playground at https://labs.digicert.com/quantum-safe.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Lagrange: ZK-Proving AI Alignment - Ismael Hishon-Rezaizadeh

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later Aug 16, 2025 56:50


In an age when AI models are becoming exponentially more sophisticated and powerful, how does one ensure that proper results are being generated and that the AI model functions in desired parameters? This pressing concern of AI alignment could be solved through cryptographic verification, using zero knowledge proofs. ZKPs not only allow for verifying computation at scale, but they also confer data privacy. Lagrange's DeepProve zkML is the fastest in existence, making it easy to prove that AI inferences are correct, scaling verifiable computation as the demand for AI grows.Topics covered in this episode:Ismael's background and founding LagrangeAI x crypto convergenceZKML use casesAI inference verifiabilityAI safety regulationsRevenue accruing tokensPitching Lagrange to enterprise clientsAssembling a dedicated teamCryptography researchEpisode links:Ismael Hishon-Rezaizadeh on XLagrange on XSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Sebastien Couture.

The Defiant
Intention, Privacy, and Trust: Adrian Brink's Vision for Resilient Communities

The Defiant

Play Episode Listen Later Aug 15, 2025 49:39


In this episode of The Defiant Podcast, we sit down with Adrian Brink, Co-Founder of Anoma and Namada, to explore the intersection of privacy, sovereignty, and resilience in Web3. Adrian shares his journey from the early days of building Cosmos to building intent-based systems that empower communities and protect dignity at scale.We dive into the challenges of designing for a fragmented world, the promise of cryptography, and the importance of local-first infrastructure. Adrian also discusses the Tornado Cash case, the role of intent-based systems in addressing regulatory concerns, and how cryptography can help communities defend against external threats.From the evolution of Web3 to the future of AI-driven coordination, this conversation is packed with insights on building networks that bend toward freedom without breaking under the weight of reality.Chapters00:00: Setting the stage: intention, privacy, and protecting dignity in a digital world03:39: Sovereign infrastructure: community defense and resilience against external threats05:23: Reimagining privacy: moving beyond Band-Aid solutions to foundational change07:24: The state of Web3: challenges, stagnation, and the need for meaningful innovation10:02: Intent-based systems: reshaping privacy and sovereignty for individuals and communities12:03: Flexibility and security: building adaptable systems for diverse global needs15:13: Tornado Cash and regulatory challenges: intent systems as a potential solution20:13: Navigating high-risk environments: sanctions, blackouts, and global regulations25:20: The next 100 million users: making crypto accessible and practical for everyday life30:05: Financial literacy and coordination: unlocking new possibilities for global commerce35:00: Cryptography and trust: scaling trust systems for local and global communities40:00: Societal transformation: blockchain's role in reshaping politics, economics, and governance45:00: AI and intents: the future of coordination in the age of artificial intelligence48:12: Staying grounded: Adrian's advice for navigating innovation and building for the right reasons49:19: Closing thoughts: where to find Adrian and what's next for Namada

Cybercrime Magazine Podcast
Quantum Minute. AWS Boosts TLS Security with Post-Quantum Cryptography. Sponsored by Applied Quantum

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 8, 2025 1:43


Cloud computing giant Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to secure TLS connections from potential quantum threats. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

Quantum Computing Now
PQC & Math Culture with Krystal A. Maughan [UVM], [RQS - QSim]

Quantum Computing Now

Play Episode Listen Later Aug 7, 2025 47:44


Before you listen! Helpful Acronyms to deal with the jargon: - PQC = Post Quantum Cryptography, area within quantum computing & cryptography where researchers are developing quantum-safe protocols resilient against quantum cryptography attacks. - LDPC Codes = Low Density Parity Check, a type of error correction method - Block Encoding = a technique used in quantum computing (see youtube link below!)In this episode: Quantum Simulation program, Cryptography, & passionate community!A conversation with the brilliant Krystal Maughan, PhD researcher at the University of Vermont doing innovative work on her research area of Post-Quantum Cryptography while we were attending the 3-day QSim RQS Summer School 2025! We talk on a range of topics observed in the quantum industry & research field and she provides a mathematician's perspective at Madison Square Park on a beautiful summer day right before her flight. Enjoy this refreshing & insightful discussion! Referenced Links from the talk: - Her recent paper on "Cycles & cuts in supersingular I-isogeny graphs": https://arxiv.org/pdf/2502.00638- Her Website: ⁠https://kammitama5.github.io/about/ ⁠- Krystal Maughan's Research Work: https://scholar.google.com/citations?user=dhxYKqAAAAAJ&hl=en- Bit Player documentary trailer: https://vimeo.com/323615460- Nathan Weibe, University of Toronto Youtube Lectures: https://www.youtube.com/watch?v=UpZLyXsdJnA- QSim 2025 Speakers: https://qsimconference.org/summer-school/

The Post-Quantum World
Cracking Encryption by 2030? – with Dean Kassmann of IonQ

The Post-Quantum World

Play Episode Listen Later Aug 6, 2025 38:49


IonQ is poised to redefine the quantum computing landscape, projecting a staggering 80,000 logical qubits by 2030—potentially unlocking the power to crack encryption. NIST has us on a timeline to upgrade to post-quantum cryptography (PQC) by 2035, so this 5-year gap may spell doom for cybersecurity. Of course, these machines will also revolutionize industries from finance to drug discovery to AI. How is IonQ boosting their roadmap by orders of magnitude? Learn about their cutting-edge acquisitions and bold vision for scalable, error-corrected systems in this wide-ranging chat between host Konstantinos Karagiannis and IonQ SVP Dean Kassmann.For more information on IonQ, visit https://ionq.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.  Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

The Dynamist
Racing China to the Quantum Future w/Dr. Peter Shadbolt

The Dynamist

Play Episode Listen Later Jul 30, 2025 65:39


Quantum computing has been "five years away" for decades, but when NVIDIA's Jensen Huang says we've hit an inflection point, Congress listens and stocks soar. The reality? We're still building very expensive proof-of-concepts. Today's quantum computers run on 100 qubits—impressive to physicists, useless to you. Commercial viability needs a million qubits, a 10,000x leap that's not incremental progress but a complete reinvention.Unlike the familiar tech story where room-sized computers became pocket devices, quantum is binary: it either works at massive scale or it's an elaborate academic exercise. There's no quantum equivalent of early PCs that could at least balance your checkbook—no useful middle ground between 100 qubits and a million.China wants quantum for cryptography: the master key to any lock. America's lead exists mostly on paper—in research publications and VC rounds, not deployed systems. Dr. Peter Shadbolt from PsiQuantum, fresh from congressional testimony, argues America must commit now or risk losing a race that could redefine pharmaceutical research and financial security. The real question: can a democracy sustain long-term investment in technologies that offer zero immediate gratification?

On Cloud
The coming quantum revolution: What tech leaders should know

On Cloud

Play Episode Listen Later Jul 29, 2025 30:30


Quantum computing is moving from theory to reality, and it's reshaping technology, AI, and cybersecurity. Technology strategies must move with it.

The Cyber Security Transformation Podcast
Series 6 - "The Challenges of Post-Quantum Cryptography" - Episode 10 - with guest Mark Jacob

The Cyber Security Transformation Podcast

Play Episode Listen Later Jul 17, 2025 18:31


JC Gaillard and guest Mark Jacob from Cyrista revisit the challenges of post-quantum cryptography, and highlight why it is essential to take it seriously and start acting now

Security Now (MP3)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (MP3)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1034: Introduction to Zero-Knowledge Proofs

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Security Now (Video HD)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (Video HD)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Security Now (Video HI)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (Video HI)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Radio Leo (Audio)
Security Now 1034: Introduction to Zero-Knowledge Proofs

Radio Leo (Audio)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Security Now (Video LO)
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization

Security Now (Video LO)

Play Episode Listen Later Jul 16, 2025 175:37


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

All TWiT.tv Shows (Video LO)
Security Now 1034: Introduction to Zero-Knowledge Proofs

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jul 16, 2025 175:37 Transcription Available


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Radio Leo (Video HD)
Security Now 1034: Introduction to Zero-Knowledge Proofs

Radio Leo (Video HD)

Play Episode Listen Later Jul 16, 2025 175:37 Transcription Available


A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction to zero-knowledge proofs Show Notes - https://www.grc.com/sn/SN-1034-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT bigid.com/securitynow threatlocker.com for Security Now uscloud.com

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Vitalik Buterin: Ethereum, The [LAST] Steward of Decentralisation

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later Jul 9, 2025 39:19


The tradition of Epicenter x Vitalik Buterin continued this year as well at EthCC[8], where we got the chance of picking his brain about recent research, interests and Ethereum Foundation's direction going forward. Join us for a fascinating discussion on biotech and how Vitalik's Shiba ended up funding it, the utility of blockchains in nowadays society and Vitalik's view on the Ethereum ecosystem and the Foundation's response to community requests.Topics covered in this episode:Vitalik's current interestsHow Shiba Inu funded biotech researchThe Merge and its impactVitalik's motivation and view on blockchain utilityEthereum Foundation's changesIs supporting ETH price important for EF?Are L2s incentively aligned with Ethereum L1?Native L2sThe risk of quantum computersEpisode links:Vitalik Buterin on XEthereum on XEthereum Foundation on XEthCC on XSponsors:Gnosis: Gnosis builds decentralized infrastructure for the Ethereum ecosystem, since 2015. This year marks the launch of Gnosis Pay— the world's first Decentralized Payment Network. Get started today at - gnosis.ioChorus One: one of the largest node operators worldwide, trusted by 175,000+ accounts across more than 60 networks, Chorus One combines institutional-grade security with the highest yields at - chorus.oneThis episode is hosted by Brian Fabian Crain & Sebastien Couture.

All Things Internal Audit
Quantum Is Coming for Your Encryption. Now What?

All Things Internal Audit

Play Episode Listen Later Jul 9, 2025 38:33 Transcription Available


The Institute of Internal Auditors Presents: All Things Internal Audit Tech Quantum computing might sound futuristic, but internal auditors need to prepare now. Bill Truett catches up with Nick Reese to talk about what's changed in the quantum space — including new cryptography standards — real-world risks, and what internal auditors can do today to get ready.   HOST:Bill Truett, CIA, CISA Senior Manager, Standards & Guidance, IT, The IIA GUEST:Nick Reese Co-founder and Chief Operating Officer, Frontier Foundry Adjunct Professor, New York University KEY POINTS: Introduction and What's New in Quantum [00:00-01:34] What is Quantum Computing? [00:01:34-05:57] Milestones in Quantum Development [00:05:58-07:50] Quantum + AI? Not Yet [00:08:12-09:58] What Auditors Should Know About NIST Standards [00:10:00-11:54] Immediate Steps for Internal Audit [00:13:15-17:38] Legislation and Regulatory Outlook [00:20:28-22:19] Global Threats and Historical Analogies [00:22:20-26:11] Key Terms Auditors Should Learn [00:26:17-28:34] Training Resources [00:28:35-31:00] Opportunities Beyond Risk Management [00:31:00-34:11] The Five-Year Vision [00:34:16-37:21] THE IIA RELATED CONTENT:  Interested in this topic? Visit the links below for more resources: 2025 Governance, Risk & Controls Conference All Things Internal Audit: Quantum Computing GTAG: Assessing Cybersecurity Risk Cyber Resource Center Post-Quantum Cryptography Roadmap – DHS.gov NIST's Post-Quantum Cryptography Project Visit The IIA's website or YouTube channel for related topics and more. Follow All Things Internal Audit: Apple PodcastsSpotify LibsynDeezer

Bitcoin for Millennials
Astrophysicist: “Here's The Math for Bitcoin To Hit $1M” | Stephen Perrenod | BFM166

Bitcoin for Millennials

Play Episode Listen Later Jun 30, 2025 102:06


Stephen Perrenod is an astrophysicist and technology consultant with over 30 years of experience in high performance computing. He's the author of two books on cosmology and has been writing and speaking about Bitcoin for a decade.› https://twitter.com/moneyordebt› http://stephenperrenod.substack.comPARTNERS

The Post-Quantum World
ML-KEM Cocreator Unlocks Lattice-Based Cryptography — with Joppe Bos of NXP

The Post-Quantum World

Play Episode Listen Later Jun 25, 2025 43:46


When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we're beginning to migrate and trust our data to lattice-based cryptography, it's a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask than one of the coauthors of the PQC standard? Join host Konstantinos Karagiannis for a wide-ranging chat with Joppe Bos from NXP, where they discuss the past and future of ML-KEM.  For more information on NXP, visit www.nxp.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

Breaking Math Podcast
What is Cryptography?

Breaking Math Podcast

Play Episode Listen Later Jun 24, 2025 40:56


This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems. All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.Takeaways Quantum computers harness principles of quantum physics for computation. Shor's algorithm can efficiently factor large numbers, threatening RSA encryption. Post-quantum cryptography aims to develop algorithms resistant to quantum attacks. NIST is leading the effort to standardize post-quantum cryptographic algorithms. Lattice-based algorithms are promising for post-quantum cryptography due to their efficiency. Businesses must be proactive in transitioning to post-quantum cryptography. The Harvest Now, Decrypt Later threat highlights the urgency of transitioning. Quantum key distribution offers theoretically perfect security. Different cryptographic algorithms are needed for various applications and devices. The future of cryptography will rely on new mathematical challenges to ensure security.Keywordsquantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threatsSubscribe to Breaking Math wherever you get your podcasts. Become a patron of Breaking Math for as little as a buck a monthFollow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTokFollow Autumn on Twitter and InstagramBecome a guest hereemail: breakingmathpodcast@gmail.com

MacVoices Audio
MacVoices #25173: Road to Macstock - Kirschen Seah

MacVoices Audio

Play Episode Listen Later Jun 19, 2025 20:07


In this Road to Macstock Conference and Expo conversation we welcome longtime speaker Kirschen Seah to discuss her upcoming session, Passkeys Demystified. Kirschen explains the promise of passkeys as a more secure, user-friendly alternative to passwords, and why adoption has been slower than expected. She shares insights into how passkeys work using public key cryptography, addresses common concerns about biometric data, and outlines how password managers like Apple Keychain and 1Password integrate with the system. With real-world scenarios and practical examples, Kirschen aims to help attendees confidently adopt passkeys and understand the evolving standards behind them.  Show Notes: Chapters: 00:08 Introduction to MacVoices 00:45 Kirschen Seah Joins the Conversation 02:20 Passkeys Demystified 08:44 Managing Multiple Accounts 10:32 The Role of Password Managers 13:15 Preparing for the Session 15:55 Macstock Conference Details 17:51 The Value of Curiosity at Macstock Links: Macstock Conference and Expo Save $50 with the Kirschen's discount code: freerangecoder Save $50 with Chuck's discount code: macvoices50 Guests: Kirschen Seah's background is Computer Sciences with interests in Software Engineering, User Experience, and Mac OS X / iPhone OS development. She started programming with BASIC in 1978 on an Apple ][ and have over 30 years of experience in the field. Kirschen worked on OPENSTEP (precursor to Mac OS X Cocoa) graphical prototyping applications initially when she joined Rockwell Collins (now Collins Aerospace) in 1999, and was a Senior Principal Systems Engineer in the Flight Management Systems department focussed on the user interface for pilot interaction. Prior to joining Rockwell Collins Kirschen worked at Acuity (formerly ichat) developing interactive user interfaces for live chat customer service agents. Now retired, there's now more time to share technical insights on her blog, develop useful scripts (Python, shell), and write Shortcuts. Kirschen is really motivated to share her experience to help fellow software practitioners develop better skills – be that in good design, implementation, or computer science fundamentals. As much as she can, Kirschen tries to share the delight in discovering how iOS and macOS applications for productivity and creativity have helped her do better in her personal and (former) work life. Connect with her on her web site, FreeRangeCoder Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Hacker Public Radio
HPR4399: gpg-gen-key

Hacker Public Radio

Play Episode Listen Later Jun 12, 2025


This show has been flagged as Explicit by the host. More than ten years ago I studied the lecture recordings of "Introduction to Cryptography" Introduction to Cryptography by Christof Paar - Invidious by Professor Paar Christof Paar - Wikipedia, which are absolutely amazing! These lectures will learn you how the most popular encryption algorithms work. The scripts I mentioned in their current versions are: tool/gpg-gen-key at main - oxo/tool - Codeberg.org tool/gpg-bu-key at main - oxo/tool - Codeberg.org tool/gpg-pass-vfy at main - oxo/tool - Codeberg.org Search the history for commit 95408d31c2 (gpg-gen-key) and dd608f9bd6 (gpg-bukey and gpg-pass-vfy) for the versions at the moment of recording.Provide feedback on this episode.

Impact Quantum: A Podcast for Engineers
Quantum Computing Heats Up: Unicorns, Deals, & Security Risks

Impact Quantum: A Podcast for Engineers

Play Episode Listen Later Jun 11, 2025 33:19 Transcription Available


Welcome back to Impact Quantum, the podcast for the Quantum Curious! In this special recap episode, hosts Frank La Vigne and Candice Gillhoolley return from a brief, doctor-approved hiatus to take stock of the whirlwind developments in the quantum computing universe. From billion-dollar buyouts—like IONQ's acquisition of Oxford Ionics—to IBM's bold promise of a large-scale, fault-tolerant quantum computer by 2029, the quantum ecosystem has never been more electrifying.Frank and Candice reflect on just how much the show—and the quantum landscape—has evolved, touching on everything from the international race for quantum supremacy and the looming threat to RSA encryption, to the latest breakthroughs in quantum error correction and the rise of “quantum tweezers.” With Canadian pride, global perspectives, and a healthy dose of friendly banter, they remind listeners why quantum is no longer a far-off dream—it's knocking at our door.If you think quantum computing is decades away, this episode will convince you it's time to update your calendar (and maybe your encryption protocols). Tune in for insights, laughs, and a sneak peek at what's coming next from the #1 rated quantum computing podcast. Stay curious, stay entangled, and enjoy the ride!Show Notes00:00 Quantum Insights: Diverse Perspectives05:06 Cryptography's Urgent Career Relevance09:53 Exploring Quantum Computing Curiosity12:39 Quantum Computing: Early Stages Discussion13:59 Early Days of Quantum Computing17:54 "Quantum Tech Secret Timeline"20:34 "Quantum Season Preview"25:34 Canada's Quantum Ambitions27:55 Global Medicine Supply Chain Dependence32:33 "Stay Curious, Stay Entangled"33:17 "Bailey Signing Off"

HPE Tech Talk
How do you create quantum resistant encryption?

HPE Tech Talk

Play Episode Listen Later Jun 5, 2025 24:35


How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. Dr Sarah McCarthy tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it. About Dr Sarah McCarthy: https://www.linkedin.com/in/sarahmccarthyphd/?originalSubdomain=ca SourcesQuantum computing chip: https://blog.google/technology/research/google-willow-quantum-chip/https://www.bbc.co.uk/news/articles/c791ng0zvl3oNIST Post Quantum Standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsMartian aurora: https://science.nasa.gov/solar-system/planets/mars/nasa-observes-first-visible-light-auroras-at-mars/Rutherford's Lecture: https://web.lemoyne.edu/giunta/ruth1920.htmlJames Chadwick: https://www.nobelprize.org/prizes/physics/1935/chadwick/biographical/

The Defiant
Zero Knowledge Proofs: The Game-Changer for Digital Privacy You Need to Know, Featuring Rob Viglione

The Defiant

Play Episode Listen Later Jun 4, 2025 49:21


This week, we spoke with Rob Viglione, Co-founder and CEO of Horizen Labs, to explore the groundbreaking potential of Zero Knowledge Proofs (ZKP) in safeguarding digital privacy, bridging TradFi and DeFi, and creating income streams for consumers that empower them through the ownership of their own digital data. From balancing transparency and onchain privacy to the intersection of AI and Web3, Rob dives into the critical role cryptography will play in reshaping how we share and protect data. Learn how ZKPs can combat data misuse, empower individuals to monetize their information, and reimagine compliance as we step into a world where privacy is a fundamental human right. Key Highlights:1. How ZKPs protect medical records and financial history2. Will banks adapt, or become irrelevant?3. The role of cryptography in privacy-centric AI systemsDon't miss this thought-provoking discussion packed with insights on the future of data, privacy, and decentralized innovation. Chapters:00:00 Defiant Intro00:07 Podcast Teaser00:52 Hero Quote00:59 Introduction to Rob Viglione01:34 The beauty of ZKPs02:40 How to balance transparency and privacy onchain04:00 Why it's so easy to overshare data04:50 Living in an age of constant data leaks06:34 The concept of wealth is fundamentally different now07:33 Google adopts ZKP to verify age09:00 A world of a trillion proofs09:30 How can Web3 handle growing volumes of proofs?10:09 Will Web2 relinquish their chokehold on our data?11:52 Monetizing data as an incentive to online privacy12:45 New opportunities for earning a living by monetizing your data14:14 The intersection of crypto and AI16:17 ZKPs and data protection18:00 ZKPs and AI in medical records and financial history20:18 How can ZKPs act as a safeguard against misuse in AI22:15 Hackers and scammers are a certainty; how do we fight them?22:36 Cryptography, ZKPs, and privacy-centric AI systems?25:13 Why is privacy a human right?26:25 Institutions, privacy, and Web326:45 Institutions coming onchain28:30 Better communicating privacy as a human right in the context of Web330:30 Will ZKPs change the way people interact with the internet?32:11 Marketing in the age of AI33:24 ZKPs and KYC35:40 Why ZKPs are bad for bad actors37:38 Government regulation vs. Web3 companies regulating the industry themselves39:00 It doesn't make sense for politicians to be anti-crypto anymore41:53 Can ZKPs redefine compliance and how it's enforced?43:13 How can ZKP tech support institutional privacy and consumer data?44:45 TradFi onchain as a stepping stone to DeFi46:39 Lightning round! Favorite existing use case for ZKP46:54 Lightning round! Favorite potential use case for ZKP48:04 Lightning round! Best advice for keeping your data safe online48:49 Closing statements and where to follow Rob

ITSPmagazine | Technology. Cybersecurity. Society
Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 21, 2025 23:41


At RSAC 2025, the most urgent signals weren't necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it's clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.More Than a Job: Why Community MattersRob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It's not just about certifications—though Clyde notes that employers often value them more than degrees—it's also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It's your career,” he says. “Take back control.”Facing Burnout and Legal Risk Head-OnThe group also addresses a growing issue: burnout. ISACA's latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.The Silent Threat of QuantumWhile AI dominated RSAC's headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don't know when.”From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn't just a technology issue—it's a people issue. Listen to the full episode to hear what else we're missing.Learn more about ISACA: https://itspm.ag/isaca-96808⸻Guest: Rob Clyde, Board Director, Chair, Past Chair of the Board Directors at ISACA | https://www.linkedin.com/in/robclyde/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaStay tuned for an upcoming ITSPmagazine Webinar with ISACA: https://www.itspmagazine.com/webinarsISACA Quantum Pulse Poll 2025 and related resources: https://www.isaca.org/quantum-pulse-pollISACA State of Cybersecurity 2024 survey report: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Security Now (MP3)
SN 1017: Is YOUR System Vulnerable to RowHammer? - Telegram's Crypto, Twitter Outage, FBI Warning

Security Now (MP3)

Play Episode Listen Later Mar 19, 2025 173:50 Transcription Available


An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com