Practice and study of secure communication techniques
POPULARITY
Categories
In this Road to Macstock Conference and Expo conversation we welcome longtime speaker Kirschen Seah to discuss her upcoming session, Passkeys Demystified. Kirschen explains the promise of passkeys as a more secure, user-friendly alternative to passwords, and why adoption has been slower than expected. She shares insights into how passkeys work using public key cryptography, addresses common concerns about biometric data, and outlines how password managers like Apple Keychain and 1Password integrate with the system. With real-world scenarios and practical examples, Kirschen aims to help attendees confidently adopt passkeys and understand the evolving standards behind them. Show Notes: Chapters: 00:08 Introduction to MacVoices 00:45 Kirschen Seah Joins the Conversation 02:20 Passkeys Demystified 08:44 Managing Multiple Accounts 10:32 The Role of Password Managers 13:15 Preparing for the Session 15:55 Macstock Conference Details 17:51 The Value of Curiosity at Macstock Links: Macstock Conference and Expo Save $50 with the Kirschen's discount code: freerangecoder Save $50 with Chuck's discount code: macvoices50 Guests: Kirschen Seah's background is Computer Sciences with interests in Software Engineering, User Experience, and Mac OS X / iPhone OS development. She started programming with BASIC in 1978 on an Apple ][ and have over 30 years of experience in the field. Kirschen worked on OPENSTEP (precursor to Mac OS X Cocoa) graphical prototyping applications initially when she joined Rockwell Collins (now Collins Aerospace) in 1999, and was a Senior Principal Systems Engineer in the Flight Management Systems department focussed on the user interface for pilot interaction. Prior to joining Rockwell Collins Kirschen worked at Acuity (formerly ichat) developing interactive user interfaces for live chat customer service agents. Now retired, there's now more time to share technical insights on her blog, develop useful scripts (Python, shell), and write Shortcuts. Kirschen is really motivated to share her experience to help fellow software practitioners develop better skills – be that in good design, implementation, or computer science fundamentals. As much as she can, Kirschen tries to share the delight in discovering how iOS and macOS applications for productivity and creativity have helped her do better in her personal and (former) work life. Connect with her on her web site, FreeRangeCoder Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Rosario Gennaro is a Professor of Computer Science at City University of New York (CUNY) and a Director for the Center for Algorithms and Interactive Scientific Software (CAISS). 1996, he received his PhD from MIT and was a researcher at the IBM T.J.Watson Research Center until 2012. Rosario's most recent work includes privacy and anonymity in electronic communication, along with proactive security to minimise the effects of system break-ins. He has received over 24,500 citations on his work and has an h-index of 72, and has published classic papers of “Non-interactive verifiable computing: Outsourcing computation to untrusted workers” and “Quadratic span programs and succinct NIZKs without PCPs”.
Ralph is a co-inventor of public-key cryptography, the inventor of cryptographic hashing, created Merkle's Puzzles, the co-inventor of the Merkle–Hellman knapsack cryptosystem, and invented Merkle trees. He received his B.S. in computer science in 1974 from UC Berkeley and a PhD. in electrical engineering from Stanford University in 1979. More recently, he is a researcher and speaker on cryonics. Ralph was a research scientist at the famous Xerox PARC (Palo Alto Research Center), and a nanotechnology theorist at Zyvex. He has also been a Distinguished Professor at Georgia Tech, a senior research fellow at IMM, a faculty member at Singularity University, and a board member at Alcor Life Extension Foundation. In 1998, he was a co-recipient of the Feynman Prize for Nanotechnology for Theory. In 2010, he received the IEEE Richard W. Hamming Medal for the invention of public key cryptography, and in 2011, he was inducted into the National Cyber Security Hall of Fame. In 2020, he received the Levchin Prize for “fundamental contributions to the development of public key cryptography, hash algorithms, Merkle trees, and digital signatures.
This show has been flagged as Explicit by the host. More than ten years ago I studied the lecture recordings of "Introduction to Cryptography" Introduction to Cryptography by Christof Paar - Invidious by Professor Paar Christof Paar - Wikipedia, which are absolutely amazing! These lectures will learn you how the most popular encryption algorithms work. The scripts I mentioned in their current versions are: tool/gpg-gen-key at main - oxo/tool - Codeberg.org tool/gpg-bu-key at main - oxo/tool - Codeberg.org tool/gpg-pass-vfy at main - oxo/tool - Codeberg.org Search the history for commit 95408d31c2 (gpg-gen-key) and dd608f9bd6 (gpg-bukey and gpg-pass-vfy) for the versions at the moment of recording.Provide feedback on this episode.
Welcome back to Impact Quantum, the podcast for the Quantum Curious! In this special recap episode, hosts Frank La Vigne and Candice Gillhoolley return from a brief, doctor-approved hiatus to take stock of the whirlwind developments in the quantum computing universe. From billion-dollar buyouts—like IONQ's acquisition of Oxford Ionics—to IBM's bold promise of a large-scale, fault-tolerant quantum computer by 2029, the quantum ecosystem has never been more electrifying.Frank and Candice reflect on just how much the show—and the quantum landscape—has evolved, touching on everything from the international race for quantum supremacy and the looming threat to RSA encryption, to the latest breakthroughs in quantum error correction and the rise of “quantum tweezers.” With Canadian pride, global perspectives, and a healthy dose of friendly banter, they remind listeners why quantum is no longer a far-off dream—it's knocking at our door.If you think quantum computing is decades away, this episode will convince you it's time to update your calendar (and maybe your encryption protocols). Tune in for insights, laughs, and a sneak peek at what's coming next from the #1 rated quantum computing podcast. Stay curious, stay entangled, and enjoy the ride!Show Notes00:00 Quantum Insights: Diverse Perspectives05:06 Cryptography's Urgent Career Relevance09:53 Exploring Quantum Computing Curiosity12:39 Quantum Computing: Early Stages Discussion13:59 Early Days of Quantum Computing17:54 "Quantum Tech Secret Timeline"20:34 "Quantum Season Preview"25:34 Canada's Quantum Ambitions27:55 Global Medicine Supply Chain Dependence32:33 "Stay Curious, Stay Entangled"33:17 "Bailey Signing Off"
Tal is a Professor of Computer and Information Science at the University of Pennsylvania and a Manager at AWS. Previously, she was the head of research at the Algorand Foundation and head of the cryptography research at IBM's Thomas J Watson Research Centre. In 2014, she was defined as one of the 22 most powerful women engineers by Business Insider, and a Woman of Vision for innovation by the Anita Borg Institute. In 2018, she was defined by Forbes as one of the World's Top 50 women in Tech, and in 2019, she was awarded the RSA Award for Excellence in Mathematics. In 2023, she was awarded the Dijkstra Prize for her work on secure multiparty computation. Tal's works in areas of secure multiparty computation, threshold cryptography, blockchain systems and proactive security.
How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. Dr Sarah McCarthy tells us more. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it. About Dr Sarah McCarthy: https://www.linkedin.com/in/sarahmccarthyphd/?originalSubdomain=ca SourcesQuantum computing chip: https://blog.google/technology/research/google-willow-quantum-chip/https://www.bbc.co.uk/news/articles/c791ng0zvl3oNIST Post Quantum Standards: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsMartian aurora: https://science.nasa.gov/solar-system/planets/mars/nasa-observes-first-visible-light-auroras-at-mars/Rutherford's Lecture: https://web.lemoyne.edu/giunta/ruth1920.htmlJames Chadwick: https://www.nobelprize.org/prizes/physics/1935/chadwick/biographical/
This week, we spoke with Rob Viglione, Co-founder and CEO of Horizen Labs, to explore the groundbreaking potential of Zero Knowledge Proofs (ZKP) in safeguarding digital privacy, bridging TradFi and DeFi, and creating income streams for consumers that empower them through the ownership of their own digital data. From balancing transparency and onchain privacy to the intersection of AI and Web3, Rob dives into the critical role cryptography will play in reshaping how we share and protect data. Learn how ZKPs can combat data misuse, empower individuals to monetize their information, and reimagine compliance as we step into a world where privacy is a fundamental human right. Key Highlights:1. How ZKPs protect medical records and financial history2. Will banks adapt, or become irrelevant?3. The role of cryptography in privacy-centric AI systemsDon't miss this thought-provoking discussion packed with insights on the future of data, privacy, and decentralized innovation. Chapters:00:00 Defiant Intro00:07 Podcast Teaser00:52 Hero Quote00:59 Introduction to Rob Viglione01:34 The beauty of ZKPs02:40 How to balance transparency and privacy onchain04:00 Why it's so easy to overshare data04:50 Living in an age of constant data leaks06:34 The concept of wealth is fundamentally different now07:33 Google adopts ZKP to verify age09:00 A world of a trillion proofs09:30 How can Web3 handle growing volumes of proofs?10:09 Will Web2 relinquish their chokehold on our data?11:52 Monetizing data as an incentive to online privacy12:45 New opportunities for earning a living by monetizing your data14:14 The intersection of crypto and AI16:17 ZKPs and data protection18:00 ZKPs and AI in medical records and financial history20:18 How can ZKPs act as a safeguard against misuse in AI22:15 Hackers and scammers are a certainty; how do we fight them?22:36 Cryptography, ZKPs, and privacy-centric AI systems?25:13 Why is privacy a human right?26:25 Institutions, privacy, and Web326:45 Institutions coming onchain28:30 Better communicating privacy as a human right in the context of Web330:30 Will ZKPs change the way people interact with the internet?32:11 Marketing in the age of AI33:24 ZKPs and KYC35:40 Why ZKPs are bad for bad actors37:38 Government regulation vs. Web3 companies regulating the industry themselves39:00 It doesn't make sense for politicians to be anti-crypto anymore41:53 Can ZKPs redefine compliance and how it's enforced?43:13 How can ZKP tech support institutional privacy and consumer data?44:45 TradFi onchain as a stepping stone to DeFi46:39 Lightning round! Favorite existing use case for ZKP46:54 Lightning round! Favorite potential use case for ZKP48:04 Lightning round! Best advice for keeping your data safe online48:49 Closing statements and where to follow Rob
Most founders think you have to choose between security and usability. Riad Wahby disagrees—and built Cubist to prove it. In this episode, he breaks down how startups can achieve secure key management without sacrificing speed or flexibility. Riad: www.linkedin.com/in/kwantam Cubist: www.cubist.dev Jon: www.linkedin.com/in/jon-mclachlan Sasha: www.linkedin.com/in/aliaksandr-sinkevich YSecurity: www.ysecurity.io
At RSAC 2025, the most urgent signals weren't necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it's clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.More Than a Job: Why Community MattersRob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It's not just about certifications—though Clyde notes that employers often value them more than degrees—it's also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It's your career,” he says. “Take back control.”Facing Burnout and Legal Risk Head-OnThe group also addresses a growing issue: burnout. ISACA's latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.The Silent Threat of QuantumWhile AI dominated RSAC's headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don't know when.”From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn't just a technology issue—it's a people issue. Listen to the full episode to hear what else we're missing.Learn more about ISACA: https://itspm.ag/isaca-96808⸻Guest: Rob Clyde, Board Director, Chair, Past Chair of the Board Directors at ISACA | https://www.linkedin.com/in/robclyde/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaStay tuned for an upcoming ITSPmagazine Webinar with ISACA: https://www.itspmagazine.com/webinarsISACA Quantum Pulse Poll 2025 and related resources: https://www.isaca.org/quantum-pulse-pollISACA State of Cybersecurity 2024 survey report: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
In this episode, hosts Frank La Vigne and Candice Gillhoolley are joined by Andy Schwaderer and Dr. Christopher Leach from Quantum Knight. As the podcast celebrates its recent top ranking on Feedspot, the conversation dives deep into the urgent realities of post-quantum encryption, highlighting the evolving threats facing our digital lives—far beyond the stereotypical “hackers in hoodies.”Andy and Dr. Leach unpack why “being quantum ready isn't optional, it's essential,” sharing practical insights on defending against sophisticated adversaries, from nation-state actors to criminal gangs exploiting the cracks in legacy infrastructure. From the infamous Sony hack to modern ransomware attacks on hospitals and public utilities, the episode explores how Quantum Knight's innovative cryptosystem aims to protect data across everything from IoT devices to critical medical systems.Tune in for a compelling discussion on why security can no longer be an afterthought, how agile cryptography is enabling a future-proof approach, and why the responsibility—and power—to keep data safe now rests firmly in the hands of every individual and organization. If you've ever wondered how quantum computing and cybersecurity overlap, or how to safeguard your most vital assets in the quantum era, this episode is for you.Timestamps00:00 Streamlined Quantum-Enhanced Data Security08:26 "Data Control is King"14:48 "Understanding Advanced Persistent Threats"17:43 Quantum Computing's Impact on Cybersecurity22:42 "IoT's Security Oversight"32:15 "Admitting Issues, Seeking Solutions"36:02 Cryptography's Limits and Access Control39:31 Affordable Ransomware Protection Solution48:55 Switching Accountants Mid-Service51:35 Data Threat: Public Infrastructure Vulnerability56:45 Versatile Cryptography Support System01:02:19 AI Code Reliability Challenges01:06:53 "Concerns About Health and Security"
We build on our Trust Models discussion to explore how organizations can structure their PKI for the transition to post quantum cryptography (PQC).
Quantum Computing remains an area of research and development, but US officials are concerned adversaries could steal sensitive data now and decrypt it in the future. As quantum technology progresses, agencies are now exploring how to incorporate post quantum cryptographic standards into their technologies. Federal News Network's Justin Doubleday is here with the latest.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardized NIST PQC cipher: ML-KEM. Did you know there are potential gotchas with trying hybrids of classical and PQC instead? Find out the technical and philosophical reasons why the developers chose to skip offering a hybrid option. Join host Konstantinos Karagiannis for a wide-ranging chat with Kevin Kane and Andrew McElroy from American Binary. For more information on American Binary, visit https://www.ambit.inc/. Visit Protiviti at https://www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
The UK's National Cyber Security Centre (NCSC) has provided formal guidance to system and risk owners in various industry sectors about how to prepare for the migration to post-quantum cryptography. While symmetric cryptography is not significantly impacted by quantum technology, the NCSC said PQC will eventually replace vulnerable PKC algorithms, providing secure alternatives for key establishment and digital signatures. System owners are advised to start planning for integration of PQC into their infrastructure, with the migration likely happening seamlessly through software updates for commodity IT – but requiring more effort for bespoke or enterprise IT systems. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
Vinod is a professor of computer science at MIT and a principal investigator in the IT Computer Science and AI Lab. He completed his Bachelor's degree from the Indian Institute of Technology Madras in 2003, and his PhD in 2009 from MIT. His main supervisor was Shafi Goldwasser. Vinod is seen as a world leader in the area of cryptography, especially within fully homomorphic encryption. He has co-authored many classic papers and which are seen as third generation of homomorphic encryption, including on "Trapdoors for hard lattices and new cryptographic constructions", and "Fully homomorphic encryption over integers". In 2022, he was a co-recipient of the Godel (Gurden) Prize. Vinod is also the co-founder and chief cryptographer at Duality Technologies.
with @danboneh @succinctJT @smc90This episode is all about quantum computing -- explaining what it is, how it works, what's hype vs. reality, and how to prepare for it/ what builders should do. Specifically, we cover: What quantum computing is and isn't, and what people are really talking about when they worry about a quantum computer that can break classic computing-based cryptography systems -- a cryptographically relevant post-quantum computer.When is it happening/ what are the "timelines" for quantum computing becoming a reality -- how many years away are we? -- and when are the U.S. government's deadlines/ NIST standards for post-quantum cryptography?How will different types of cryptography be affected, or not? What are different approaches and tradeoffs?Where does quantum computing and post-quantum crypto apply to blockchains -- which are not only more easily upgradable, but also by and large rely on signatures, not encryption, so may be more quantum-resistant in many ways (and not in others).As always, we tease apart the signal vs. the noise in recent "science-by-press release" corporate quantum-computing milestone announcements. We also help answer questions on when do builders need to plan their switch to a post-quantum crypto world, what pitfalls to avoid there (hint: bugs! software upgrades!). Finally, we briefly cover different approaches to post-quantum crypto; and also dig deeper on zero-knowledge/ succinct-proof systems and how they relate to post-quantum crypto. Our expert guests are: Dan Boneh, Stanford University professor and applied cryptography expert and pioneer; also Senior Research Advisor to a16z crypto;Justin Thaler, research partner at a16z, professor at Georgetown, and longtime expert and pioneer in interactive and ZK proof systems.SEE ALSO: Post-quantum blockchains by Valeria Nikolaenkomore resources + papers on topics mentioned:A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup [see also]Proofs, Arguments, and Zero-Knowledge by Justin ThalerLatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems by Dan Boneh and Binyi ChenNeo: Lattice-based folding scheme for CCS over small fields and pay-per-bit commitments by Wilson Nguyen and Srinath Setty"Q-Day Clock" from Project Eleven -- public dashboard to visually track timeline for quantum computing to reach cryptographically relevant capabilities and break widely used encryption algorithmson hard forks for quantum emergenciesQuantum analysis of AES, Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam ChattopadhyayThe Google Willow Thing by Scott AaronsonFAQs on Microsoft's topological qubit thing by Scott AaronsonMicrosoft's claim of a topological qubit faces tough questions, American Physical SocietyAs a reminder, none of this is investment, business, legal, or tax advice; please see a16z.com/disclosures for more important information including a link to our investments.
Srini Devadas an Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT in the Computer Science and Artificial Intelligence Laboratory (CSAIL). His current research interests are in applied cryptography, computer security and computer architecture. Srini was awarded an a master's and a PhD degree in electrical engineering from the University of California at Berkeley - under the supervision of Arthur Richard Newton. He was an inventor of Physical Unclonable Functions (PUFs), and, In 2014, he received the IEEE Computer Society's Edward J. McCluskey Technical Achievement Award for the invention of PUFs and secure single-chip processor architectures. In 2018, Srini received the IEEE Circuits and Systems Society Charles A. Desoer Technical Achievement Award for the development of PUFs and enabling the deployment of secure circuits, processors and systems. In 2021, he received the IEEE Cybersecurity Award for Practice for the development of PUF, and the ACM SIGSAC Outstanding Innovation Award for fundamental contributions to secure microprocessors, circuits, and systems. In 2016, Srini won the Everett Moore Baker Memorial Award for Excellence in Undergraduate Teaching, Also, in 2016, he was named a MacVicar Faculty Fellow considered MIT's highest undergraduate teaching award.
Quantum computing and AI are no longer theoretical concepts for tomorrow—they're shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.Post-Quantum Migration and Cryptographic AgilityManzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It's not just about surviving the post-quantum era—it's about staying ready for whatever comes next.Taming the Complexity of AI Agents and Non-Human IdentitiesThe second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ's platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.Real Use Cases with Measurable ImpactManzano shares practical examples of how SandboxAQ's technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.Whether it's quantum cryptography, AI risk, or identity control—this isn't a vision for 2030. It's a call to action for today.Learn more about SandboxAQ: https://itspm.ag/sandboxaq-j2enNote: This story contains promotional content. Learn more.Guest: Marc Manzano, General Manager of Cybersecurity at SandboxAQ | https://www.linkedin.com/in/marcmanzano/ResourcesLearn more and catch more stories from SandboxAQ: https://www.itspmagazine.com/directory/sandboxaqLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
On this episode of Crazy Wisdom, I, Stewart Alsop, spoke with Neil Davies, creator of the Extelligencer project, about survival strategies in what he calls the “Dark Forest” of modern civilization — a world shaped by cryptographic trust, intelligence-immune system fusion, and the crumbling authority of legacy institutions. We explored how concepts like zero-knowledge proofs could defend against deepening informational warfare, the shift toward tribal "patchwork" societies, and the challenge of building a post-institutional framework for truth-seeking. Listeners can find Neil on Twitter as @sigilante and explore more about his work in the Extelligencer substack.Check out this GPT we trained on the conversation!Timestamps00:00 Introduction of Neil Davies and the Extelligencer project, setting the stage with Dark Forest theory and operational survival concepts.05:00 Expansion on Dark Forest as a metaphor for Internet-age exposure, with examples like scam evolution, parasites, and the vulnerability of modern systems.10:00 Discussion of immune-intelligence fusion, how organisms like anthills and the Portuguese Man o' War blend cognition and defense, leading into memetic immune systems online.15:00 Introduction of cryptographic solutions, the role of signed communications, and the growing importance of cryptographic attestation against sophisticated scams.20:00 Zero-knowledge proofs explained through real-world analogies like buying alcohol, emphasizing minimal information exposure and future-proofing identity verification.25:00 Transition into post-institutional society, collapse of legacy trust structures, exploration of patchwork tribes, DAOs, and portable digital organizations.30:00 Reflection on association vs. hierarchy, the persistence of oligarchies, and the shift from aristocratic governance to manipulated mass democracy.35:00 AI risks discussed, including trapdoored LLMs, epistemic hygiene challenges, and historical examples like gold fulminate booby-traps in alchemical texts.40:00 Controlled information flows, secular religion collapse, questioning sources of authority in a fragmented information landscape.45:00 Origins and evolution of universities, from medieval student-driven models to Humboldt's research-focused institutions, and the absorption by the nation-state.50:00 Financialization of universities, decay of independent scholarship, and imagining future knowledge structures outside corrupted legacy frameworks.Key InsightsThe "Dark Forest" is not just a cosmological metaphor, but a description of modern civilization's hidden dangers. Neil Davies explains that today's world operates like a Dark Forest where exposure — making oneself legible or visible — invites predation. This framework reshapes how individuals and groups must think about security, trust, and survival, particularly in an environment thick with scams, misinformation, and parasitic actors accelerated by the Internet.Immune function and intelligence function have fused in both biological and societal contexts. Davies draws a parallel between decentralized organisms like anthills and modern human society, suggesting that intelligence and immunity are inseparable functions in highly interconnected systems. This fusion means that detecting threats, maintaining identity, and deciding what to incorporate or reject is now an active, continuous cognitive and social process.Cryptographic tools are becoming essential for basic trust and survival. With the rise of scams that mimic legitimate authority figures and institutions, Davies highlights how cryptographic attestation — and eventually more sophisticated tools like zero-knowledge proofs — will become fundamental. Without cryptographically verifiable communication, distinguishing real demands from predatory scams may soon become impossible, especially as AI-generated deception grows more convincing.Institutions are hollowing out, but will not disappear entirely. Rather than a sudden collapse, Davies envisions a future where legacy institutions like universities, corporations, and governments persist as "zombie" entities — still exerting influence but increasingly irrelevant to new forms of social organization. Meanwhile, smaller, nimble "patchwork" tribes and digital-first associations will become more central to human coordination and identity.Modern universities have drifted far from their original purpose and structure. Tracing the history from medieval student guilds to Humboldt's 19th-century research universities, Davies notes that today's universities are heavily compromised by state agendas, mass democracy, and financialization. True inquiry and intellectual aloofness — once core to the ideal of the university — now require entirely new, post-institutional structures to be viable.Artificial intelligence amplifies both opportunity and epistemic risk. Davies warns that large language models (LLMs) mainly recombine existing information rather than generate truly novel insights. Moreover, they can be trapdoored or poisoned at the data level, introducing dangerous, invisible vulnerabilities. This creates a new kind of "Dark Forest" risk: users must assume that any received information may carry unseen threats or distortions.There is no longer a reliable central authority for epistemic trust. In a fragmented world where Wikipedia is compromised, traditional media is polarized, and even scientific institutions are politicized, Davies asserts that we must return to "epistemic hygiene." This means independently verifying knowledge where possible and treating all claims — even from AI — with skepticism. The burden of truth-validation increasingly falls on individuals and their trusted, cryptographically verifiable networks.
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
This episode of Chit Chat Across the Pond is going to be a bit different. On the NosillaCast #1042 for April 27th, Bart Busschots and I recorded his usual segment on Security Bits, but the majority of it was a deep dive. The subject was whether cryptography as we know it is doomed because of quantum computing. His explanation was so good that I wanted to be able to point people directly to the audio instead of referencing the chapter mark or a time stamp so we decided to make it a standalone Chit Chat Across the Pond. If you want to listen to the rest of the original recording of Security Bits, be sure to subscribe to the NosillaCast and look for episode #1042. You can find Bart's shownotes for the episode of Security Bits at Security Bits — 27 April 2025 — Deep Dive into Quantum Computing. [audio mp3="https://media.blubrry.com/nosillacast/traffic.libsyn.com/nosillacast/CCATP_2025_04_29.mp3"] mp3 download Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_04_29 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-time donation Podfeet Podcasts Mugs at Zazzle NosillaCast 20th Anniversary Shirts Referral Links: Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
Dan is joined by Michele Sartori – senior product manager at PQShield. Michele is a software engineer in Computer and Network Security, specializing in product management. He is a passionate tech team leader at the forefront of emerging technologies focused on achieving tangible results. In this highly informative discussion,… Read More
Episode 13 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Dr. Sonika Johri, Founder and CEO of Coherent Computing, to dive deep into the revolutionary world of quantum computing. Dr. Johri, a physicist with a PhD in condensed matter physics from Princeton University, takes us on her journey from engineering physics at IIT Delhi to becoming a leading figure in the quantum industry, having worked at Intel and IonQ.Sonika explains the core concepts of quantum computing—superposition, entanglement, and the quantum state space—and how they fundamentally change how we approach complex problems in fields like chemistry, material science, and AI. She discusses the future potential of quantum technologies, including the exciting prospects for Quantum AI and the shift in programming paradigms as we move from low-level machine code to higher-level abstractions.They also cover: The evolution of quantum hardware: From small qubits to scaling quantum systemsWhat makes quantum computing different from classical computingThe intersection of quantum computing and artificial intelligence Sonika's mission to democratize quantum through Coherent ComputingThe current state of quantum software and the tools that will shape the futureThis episode offers insights into quantum computing, AI, and how these emerging technologies will reshape the future of computing. Whether you're a tech enthusiast, developer, or entrepreneur, this conversation is a must-listen for anyone curious about the next frontier in technology.Key Topics & Timestamps:[00:00] – Introduction to Dr. Sonika Johri & Her Journey into Quantum Tech[03:00] – Sonika's early influences: Einstein and IIT Delhi[06:30] – Understanding Condensed Matter Physics[12:00] – Quantum Computing vs Classical Computing[20:00] – How Quantum Can Solve Complex Problems (Chemistry, Optimization, AI)[28:00] – Quantum Hardware: The Role of Qubits and Their Physical Realization[35:00] – Programming Quantum Computers: From Low-Level Gates to High-Level Abstractions[43:00] – Building Quantum Applications: Real-World Use Cases from IonQ and Coherent Computing[52:00] – The Future of Quantum AI: Machine Learning and Quantum Reasoning[1:00:00] – Quantum's Impact on Cryptography and Data Security[1:05:00] – The Mission of Coherent Computing: Making Quantum Accessible[1:12:00] – Looking Ahead: Future Episodes on Quantum Computing and AI[1:20:00] – Wrap-Up and Final ThoughtsHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Dr. Sonika Johri: Founder and CEO of Coherent Computing, a quantum software startup aiming to make quantum models accessible through developer-friendly tools. Formerly at Intel and IonQ, Sonika brings her experience in building quantum software and applications for industries like finance, chemistry, and optimization.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XDr. Sonika Johri: LinkedIn | XHave questions or thoughts on quantum computing? Drop us a mail at EffortlessPodcastHQ@gmail.comDon't forget to like, comment, and subscribe for more deep dives into the future of technology, AI, and quantum computing!
video: https://youtu.be/ua-RPOtdcF8 Comment on the TWIL Forum (https://thisweekinlinux.com/forum) This week in Linux, App 3.0 drops, bringing big changes under the hood. Amiga OS, yes, that Amiga OS, is still alive and getting updates, apparently. Open SSL 3.5 and Open SSH 10.0 both rolled out new features this week with also some future-proofing involved. And Sony, yes, that Sony, has released The Last of Us Part II on PC and it's Steam Deck verified. All that and much more on This Week in Linux, the weekly news show that keeps you plugged into everything happening in the Linux and Open Source world. Now let's jump right into Your Source for Linux GNews. Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/c5514bc1-148c-43d2-a6eb-4d0fcbfd6966.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 00:39 APT 3.0 Released 02:48 Last of US Part 2 Verified for Steam Deck 05:47 MPV 0.40 Released 08:58 Sandfly Security [ad] 10:54 AmigaOS still exists and getting updates apparently 14:24 TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop 17:20 OpenSSL 3.5 Released 19:19 OpenSSH 10.0 Released 21:41 Support the show Links: APT 3.0 Released https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/ (https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/) https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface (https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface) https://www.phoronix.com/news/Debian-APT-3.0-Released (https://www.phoronix.com/news/Debian-APT-3.0-Released) Last of US Part 2 Verified for Steam Deck https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the (https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the) https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/ (https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/) MPV 0.40 Released https://mpv.io/ (https://mpv.io/) https://github.com/mpv-player/mpv/releases/tag/v0.40.0 (https://github.com/mpv-player/mpv/releases/tag/v0.40.0) https://www.phoronix.com/news/MPV-0.40-Released (https://www.phoronix.com/news/MPV-0.40-Released) https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux (https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux) Sandfly Security [ad] https://thisweekinlinux.com/sandfly (https://thisweekinlinux.com/sandfly) https://destinationlinux.net/409 (https://destinationlinux.net/409) discount code: destination50 (Home Edition) AmigaOS still exists and getting updates apparently https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download (https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download) https://www.theregister.com/2025/04/10/amigaos32_3/ (https://www.theregister.com/2025/04/10/amigaos_3_2_3/) TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo (https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo) https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite (https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite) https://www.linaro.org/ (https://www.linaro.org/) https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update (https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update) OpenSSL 3.5 Released https://openssl-library.org/ (https://openssl-library.org/) https://github.com/openssl/openssl/releases/tag/openssl-3.5.0 (https://github.com/openssl/openssl/releases/tag/openssl-3.5.0) https://lwn.net/Articles/1016851/ (https://lwn.net/Articles/1016851/) https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic (https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic) https://www.phoronix.com/news/OpenSSL-3.5-Released (https://www.phoronix.com/news/OpenSSL-3.5-Released) OpenSSH 10.0 Released https://www.openssh.com/ (https://www.openssh.com/) https://www.openssh.com/releasenotes.html#10.0p1 (https://www.openssh.com/releasenotes.html#10.0p1) https://www.phoronix.com/news/OpenSSH-10.0-Released (https://www.phoronix.com/news/OpenSSH-10.0-Released) https://lwn.net/Articles/1016924/ (https://lwn.net/Articles/1016924/) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)
KeywordsBitcoin, Satoshi Nakamoto Institute, UTXO, Austrian Economics, Cryptography, Bitcoin Education, Generational Knowledge, Bitcoin History, Bitcoin Development, Bitcoin FutureSummaryIn this conversation, the speaker discusses the importance of preserving and advancing Bitcoin knowledge through the Satoshi Nakamoto Institute. They explore the significance of UTXOs, the influence of the Austrian School of Economics on Bitcoin, the role of cryptography, and the historical context of Bitcoin's development. The speaker emphasizes the need for generational knowledge transfer and the importance of educational initiatives to ensure future generations understand Bitcoin's value and principles.
bitcoinplebdev and cmd are building FROSTR, a multi-signature aggregation scheme for nostr key management.
John Maytham speaks to Steven Boykey Sidley, Professor of practice at JBS at the University of Johannesburg, Daily Maverick columnist, and author of It’s Mine: How the Crypto Industry Is Redefining Ownership, about the buzz surrounding Microsoft’s recent announcement of a new quantum computing chip dubbed Majorana.See omnystudio.com/listener for privacy information.
In this conversation, Nanak Nihal Khalsa discusses his journey into the crypto space, focusing on decentralized identity, the concept of human keys, and the importance of entropy in cryptography. He explains how the Human Network aims to provide secure and private identity solutions while addressing compliance challenges. The discussion also touches on the vision of the Holonym Foundation and the broader implications of digital rights in developing countries.PODCAST INFO:
Fluent Fiction - Dutch: Treasure in Tulip Fields: A Tale of Mystery & Harmony Find the full episode transcript, vocabulary words, and more:fluentfiction.com/nl/episode/2025-03-21-22-34-00-nl Story Transcript:Nl: Een zacht briesje wiegde de tulpenvelden van Amsterdam.En: A soft breeze swayed the tulip fields of Amsterdam.Nl: Kleuren dansten onder de lentezon als een levend schilderij.En: Colors danced under the spring sun like a living painting.Nl: Sven, een nieuwsgierige botanicus, slenterde door de velden.En: Sven, a curious botanist, strolled through the fields.Nl: Hij hield van de tulpen.En: He loved the tulips.Nl: Maar vandaag zocht hij iets meer.En: But today, he was looking for something more.Nl: Naast hem liep Emma, een lokale gids met een passie voor verhalen.En: Next to him walked Emma, a local guide with a passion for stories.Nl: Ze vertelde over legendes en geschiedenis van de stad.En: She told tales about legends and the history of the city.Nl: "Sven, waarom zo stil?"En: "Sven, why so quiet?"Nl: vroeg ze met een glimlach.En: she asked with a smile.Nl: Sven keek om zich heen.En: Sven looked around.Nl: Hij dacht aan de geruchten over een vreemde figuur in de velden.En: He thought of the rumors about a strange figure in the fields.Nl: "Emma, ik heb iets gehoord.En: "Emma, I heard something.Nl: Er schijnt een verborgen schat te zijn hier.En: Apparently, there's a hidden treasure here.Nl: Vol aanwijzingen."En: Full of clues."Nl: Hij keek haar serieus aan.En: He looked at her seriously.Nl: Dit maakte Emma nieuwsgierig, maar ze bleef sceptisch.En: This made Emma curious, but she remained skeptical.Nl: "Een schat?En: "A treasure?Nl: In de tulpenvelden?En: In the tulip fields?Nl: Klinkt als een sprookje."En: Sounds like a fairy tale."Nl: Bij hen sloot zich Johan aan.En: They were joined by Johan.Nl: Hij was een cryptograaf op vakantie in Amsterdam.En: He was a cryptographer on vacation in Amsterdam.Nl: "Ik ben dol op mysteries," zei Johan.En: "I love mysteries," said Johan.Nl: "Misschien zit er een raadsel in die geruchten."En: "Maybe there's a puzzle in those rumors."Nl: Sven stelde voor om samen op onderzoek uit te gaan.En: Sven suggested they go on an investigation together.Nl: Johan's vaardigheden in cryptografie zouden handig kunnen zijn.En: Johan's skills in cryptography could be useful.Nl: Emma, hoewel aarzelend, besloot mee te gaan.En: Emma, though hesitant, decided to join in.Nl: Ze werden een team van ontdekkers.En: They became a team of explorers.Nl: De aanwijzingen waren cryptisch.En: The clues were cryptic.Nl: Sommige waren ingekerfd in houten paaltjes tussen de tulpen.En: Some were carved into wooden stakes among the tulips.Nl: Anderen waren oude papieren, half verborgen door bloemen.En: Others were old papers, half hidden by flowers.Nl: Johan werkte als een meester aan de puzzels.En: Johan worked like a master on the puzzles.Nl: "Deze cijfers en symbolen wijzen op kleuren en patronen," zei hij.En: "These numbers and symbols point to colors and patterns," he said.Nl: Naarmate de dagen vorderden, bracht elke aanwijzing hen dichter bij het doel.En: As the days passed, each clue brought them closer to the goal.Nl: Tot op een ochtend, toen ze naar het veld keken en de kleuren hun verhaal vertelden.En: Until one morning, when they looked at the field and the colors told their story.Nl: De patronen onthulden de locatie van de schat.En: The patterns revealed the location of the treasure.Nl: Vol spanning bereikten ze het uiteindelijke veld.En: With great excitement, they reached the final field.Nl: Maar de schat was niet wat ze dachten.En: But the treasure was not what they thought.Nl: Geen goud of juwelen lagen daar.En: No gold or jewels lay there.Nl: In plaats daarvan ontdekten ze een nieuwe soort tulp.En: Instead, they discovered a new type of tulip.Nl: Heldere bloembladen met een boodschap van harmonie.En: Bright petals with a message of harmony.Nl: "Een boodschap van vrede en vernieuwing," zei Sven ontroerd.En: "A message of peace and renewal," said Sven, moved.Nl: "Het echte schat is de boodschap."En: "The real treasure is the message."Nl: Emma glimlachte breed.En: Emma smiled broadly.Nl: "Wat een fantastisch verhaal om te vertellen.En: "What a fantastic story to tell.Nl: Dit zal de wereld veranderen."En: This will change the world."Nl: Johan, verrast door de uitkomst, moest lachen.En: Johan, surprised by the outcome, had to laugh.Nl: "Mijn avontuur is niet alleen in symbolen en cijfers.En: "My adventure is not just in symbols and numbers.Nl: Het is juist in betekenis vinden."En: It's in finding meaning."Nl: En zo kregen de tulpenvelden nieuw leven en schitteringen.En: And so the tulip fields gained new life and glimmers.Nl: Sven voelde zich zekerder van zijn intuïtie.En: Sven felt more confident in his intuition.Nl: Emma leerde het plezier van ontdekkingen te omarmen.En: Emma learned to embrace the joy of discovery.Nl: Johan vond nieuwe voldoening in zijn werk.En: Johan found new satisfaction in his work.Nl: Samen knoopten ze onder de heldere voorjaarshemel hun vriendschap stevig vast.En: Together, they firmly tied their friendship under the bright spring sky.Nl: De wereld hoorde van hun ontdekking, en er ontstond nieuwe bewondering voor de tulpenvelden.En: The world heard of their discovery, and new admiration for the tulip fields arose.Nl: Want soms is de schat die we vinden meer dan wat we ons hadden voorgesteld.En: For sometimes the treasure we find is more than we had imagined. Vocabulary Words:breeze: briesjeswayed: wiegdecurious: nieuwsgierigestrolled: slenterderumors: geruchtenhidden: verborgenskeptical: sceptischtales: verhalencryptographer: cryptograafrumors: geruchteninvestigation: onderzoekcryptic: cryptischcarved: ingekerfdwooden: houtenstakes: paaltjespatterns: patronenrevealed: onthuldentreasure: schatadventure: avontuurmeaning: betekenisembrace: omarmensatisfaction: voldoeningadmiration: bewonderingglimmers: schitteringenconfidence: zekerderharmony: harmoniefields: veldenbotanist: botanicuslocal: lokaleclues: aanwijzingen
Our podcast guest is the theoretical crypto-physicist Artur Ekert
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
Migrating to post-quantum cryptography across an organization will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From hospitals dodging ransomware to finance professionals sharing secrets in quantum-proof chats, customers are already using this tool. Join host Konstantinos Karagiannis for a chat with Anurag Lal from NetSfere. For more information on NetSfere, visit www.netsfere.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
An analysis of Telegram Messenger's crypto. A beautiful statement of the goal of modern crypto design. Who was behind Twitter's recent outage trouble? An embedded Firefox root certificate expired. Who was surprised? AI-generated Github repos, voice cloning, Patch Tuesday and an Apple 0-day. The FBI warns of another novel attack vector that's seeing a lot of action. Google weighs in on the Age Verification controversy. In a vacuum, Kazakhstan comes up with their own solution. Was Google also served an order from the UK? Can they say? A serious PHP vulnerability you need to know you don't have. A bunch of great listener feedback, some Sci-Fi content reviews and... A new tool allows YOU to test YOUR PCs for their RowHammer susceptibility Show Notes - https://www.grc.com/sn/SN-1017-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: vanta.com/SECURITYNOW bitwarden.com/twit threatlocker.com for Security Now veeam.com
In part two of this episode, Paulina Gomez, Ryan Lafler, Doug Schremp, and Paola Osorio delve into Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) algorithms. They discuss the principles of QKD, its challenges, and industry progress, as well as the development of PQC algorithms to deliver quantum-resistant encryption solutions. They also explore future milestones and the solutions that are available today to safeguard critical data and mitigate the quantum computing threat to enable quantum-secure communications.
Apple has pulled the availability of their opt-in iCloud end-to-end encryption feature, called Advanced Data Protection, in the UK. This doesn't only affect UK Apple users, however. To help us make sense of this surprising move from the fruit company, we got Matt Green, Associate Professor at Johns Hopkins, and Joe Hall, Distinguished Technologist at the Internet Society, on the horn. Recorded Saturday February 22nd, 2025.Transcript: https://securitycryptographywhatever.com/2025/02/24/apple-pulls-adp-in-uk/Watch episode on YouTube: https://youtu.be/LAn_yOGUkR0Links:- https://www.lawfaremedia.org/article/apples-cloud-key-vault-and-secure-law-enforcement-access- https://www.androidcentral.com/how-googles-backup-encryption-works-good-bad-and-ugly- https://gdpr.eu/right-to-be-forgotten/- https://www.legislation.gov.uk/id/ukpga/2024/9- https://www.nytimes.com/2021/05/17/technology/apple-china-censorship-data.html- https://en.wikipedia.org/wiki/Salt_Typhoon- Salt Typhoon: https://www.cisa.gov/news-events/news/strengthening-americas-resilience-against-prc-cyber-threats- https://www.bloomberg.com/news/articles/2025-02-21/apple-removes-end-to-end-encryption-feature-from-uk-after-backdoor-order- https://support.apple.com/en-us/102651"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)
“Google's new quantum machine and OpenAI's new ‘Terminator Project'” is a speculative glimpse into the frontier of cutting-edge technology. While Google's quantum computing research aims to harness subatomic phenomena for massive computational power, OpenAI's rumored ‘Terminator Project' evokes images of advanced artificial intelligence with potentially autonomous decision-making capabilities. Although details are sparse, both initiatives highlight a future where breakthroughs in quantum mechanics and AI convergence could transform fields as diverse as cryptography, medicine, and robotics. The mere mention of these projects underscores the rapid pace of innovation and the profound ethical questions that accompany major technological leaps.
In this episode of CISO Tradecraft, host G Mark Hardy discusses Microsoft's groundbreaking announcement of their new quantum chip, the Majorana. The chip harnesses properties of a topological superconductor, making quantum computing promises more tangible. The episode delves into the technical aspects of quantum bits (qubits), cryptography, and the implications of topological quantum computing. With insights on competitor advancements by Google and potential challenges, this episode provides a comprehensive overview of quantum computing's future and its cyber security implications. Transcripts: https://docs.google.com/document/d/1O2XG47o2_6jHBtPKL2PcwGRKPe69wFvi Link: https://azure.microsoft.com/en-us/blog/quantum/2025/02/19/microsoft-unveils-majorana-1-the-worlds-first-quantum-processor-powered-by-topological-qubits/ Chapters 00:00 Introduction to CISO Tradecraft 00:26 Microsoft's Quantum Chip Announcement 01:51 Understanding Quantum Bits 03:23 Quantum Computing and Cryptography 06:00 Microsoft's Quantum Leap 09:41 The Physics Behind Quantum Computing 16:48 Majorana Particle and Its Significance 20:29 Applications and Future of Quantum Computing 25:01 Conclusion and Final Thoughts
Picture a world where your money isn't controlled by any government, but rather exists in the form of digital code. That's the idea behind Bitcoin and cryptocurrency, where freedom meets cryptography, and transactions are recorded transparently on a blockchain. But we get it–to those looking to add cryptocurrency to their portfolio, the subject of decentralized finance can be pretty intimidating. Our hosts, Stephanie McCullough and Kevin Gaines break it down with special guest Marianne Borneman, founder of Access Tax Solutions, the home of Real Clear Tax Advice. They look into how Bitcoin differs from traditional money, dissecting its digital nature and the security measures you need to protect your assets. From choosing reputable digital wallets to setting up complex passwords, they guide us through safeguarding your investments in this new financial frontier. Understanding the tax implications of your Bitcoin transactions is essential to avoid unwanted surprises. Our hosts and Marianne share practical scenarios illustrating the importance of documenting every purchase and sale, and how using Bitcoin as a gift or payment can impact your tax obligations. Whether you hold physical assets or prefer investing through ETFs, they explain how these choices affect your tax strategy and what to watch out for in terms of legal and security challenges. Ever wondered what it takes to mine Bitcoin or why it's often compared to gold? They dive into all that, including where it actually derives value from. They explore the concept of scarcity and how collective belief underpins currency value, drawing parallels between Bitcoin and precious metals like gold. In wrapping, they discuss the most common frauds and scams to watch out for as you navigate the world of crypto! Key Topics: “What the Heck is Bitcoin?” (0:25) How Safe is Crypto? (07:50) How to Use Cryptocurrency (11:21) Crypto and Taxes (18:35) Owning Physical Assets Versus ETFs (30:16) Common Crypto Scams (33:36) Bitcoin Mining (47:41) When Does a Crypto Transaction Qualify as a Taxable Event? (54:51) Where Does Bitcoin Derive Value From? (59:58) Resources: Learn more about Kathleen Marianne Borneman and her services here Take Back Retirement #83: Combatting Fraud and Protecting Your Financial Future with AARP's Kathy Stokes If you like what you've been hearing, we invite you to subscribe on your favorite platform and leave us a review. Tell us what you love about this episode! Or better yet, tell us what you want to hear more of in the future. stephanie@sofiafinancial.com You can find the transcript and more information about this episode at www.takebackretirement.com. Follow Stephanie on Twitter, Facebook, YouTube and LinkedIn. Follow Kevin on Twitter, Facebook, YouTube and LinkedIn.
Send us a textUnlock the future of digital security with us as we chat with Gerard Cervelló, CEO, and Jordi Puiggalí, CTO of Secrets Vault. These two innovative minds promise to transform how we think about cybersecurity by leveraging visual cryptography to protect the seed phrases of crypto wallets. Discover how their novel approach not only simplifies backup processes for Web3 users but also offers a robust alternative to traditional passwords by using images. The potential of this technology to revolutionize identity and access management is vast, and our conversation dives into its integration with existing security systems, providing a user-friendly and secure solution for managing digital credentials.As we explore practical use cases, you'll hear firsthand accounts from beta testers about how Secrets Vault is already safeguarding crypto wallet information, financial accounts, and sensitive documents. Beyond just the technical details, Gerard and Jordi also share invaluable insights on building trust within communities, emphasizing transparency and expert validation. They tackle cybersecurity myths and offer straightforward tips to enhance your digital safety. Plus, get a sneak peek into their exciting project, Secrets Vault, and why it could be the next big thing in digital protection. Join us for this insightful episode and learn how to stay ahead in the evolving landscape of cybersecurity.This episode was recorded through a Descript call on January 21, 2025. Read the blog article and show notes here: https://webdrie.net/how-secrets-vault-simplifies-security-with-images-for-crypto-and-beyond/Discover RYO: the Web3 payment solution making crypto simple and secure for everyone. Featuring an expansive ecosystem with LIFE Wallet, Global Mall, and Japan's first licensed Crypto ATM Network, RYO empowers your financial journey. Awarded 'Best Crypto Solution.'
In this epic episode of The Charlie Shrem Show, I sit down with Ran Goldi, VP of Payments at Fireblocks, one of the most influential companies in the crypto and blockchain space. Ran's journey is as fascinating as the industry he's helped shape—from algorithmic trading to launching startups, to his time in Israeli intelligence, and ultimately building a cornerstone of the blockchain infrastructure.We dive deep into:Fireblocks' Revolutionary Impact: Powering 15-20% of the world's blockchain transactions and introducing game-changing security innovations like MPC (Multi-Party Computation).Hacking, North Korea, and Crypto Security: The wild world of hacks, how North Korea targets the crypto industry, and why collaboration in security is the key to staying safe.Crypto's Evolution in Israel: From the early days of Bitcoin to cryptographic breakthroughs, Ran explains why Israel became a global leader in blockchain technology.Lessons from Intelligence to Innovation: How Ran's time in the IDF shaped his career and inspired his drive to make the impossible possible.Building a Safer Crypto Industry: Tips for identifying scams, validating legitimate projects, and creating a better ecosystem for the future.This conversation is a masterclass in understanding the critical role infrastructure and security play in crypto's growth, as well as the unique mindset it takes to innovate in an industry that never sleeps.Whether you're a crypto newbie or a seasoned pro, this episode is packed with insights, stories, and practical advice to help you navigate the world of blockchain and beyond.Don't miss this!
Time stamps: Introducing Liam (00:00:25) Shielded Client-Side Validation (00:01:53) Challenges in Bitcoin Development (00:05:36) The Soft Fork Independence of Shielded CSV (00:06:31) Introduction to OP_CAT (00:06:31) Opinions on Bitcoin Covenant Proposals (00:07:06) Integer Arithmetic in Bitcoin (00:09:26) Alpen Labs and Their Projects (00:12:23) Optimistic vs. Optimistically Verified zk Rollups (00:15:05) Data Availability Issues in Rollups (00:16:02) Zcash and Mobile Wallets (00:21:03) Philosophical Debate on Bitcoin's Future (00:22:21) Comparing Lightning Network and Shielded CSV (00:25:40) Layer Two Labs andDrive Chain (00:28:52) Sidechains vs. Rollups (00:29:55) Citrea and DeFi Potential (00:31:14) Rollups' Data Handling (00:32:50) Advantages of Sidechains (00:33:56) Drivechains Overview (00:35:10) Citrea vs. Alpen Labs (00:37:13) Collaboration in Bitcoin L2 Space (00:38:43) Existential Question on Bitcoin Privacy (00:40:02) Political Capital and Bitcoin's Future (00:42:52) Universal Truths in Bitcoin Community (00:44:04) Resistance to Change in Bitcoin (00:45:29) Testing Timeframes for Bitcoin Changes (00:50:11) Risks of Unknown Unknowns (00:51:59) Risks Beyond Bitcoin Changes (00:56:34) Indistinguishable Obfuscation (00:57:37) Challenges of Indistinguishable Obfuscation (00:58:49) Incentives for Bitcoin Development (00:59:42) Collaboration in Crypto Communities (01:01:44) Views on Monero, Zcash, Litecoin (01:03:27) Litecoin's Scalability Features (01:04:49) Centralization in Rollups (01:06:25) Bulletproofs and Membership Proofs (01:10:31) Bulletproofs++ Overview (01:13:26) Scalability of Bulletproofs++ (01:22:08) Full Chain Membership Proofs in Monero (01:24:54) Nullifier Mechanism (01:27:55) Challenges of Implementing Privacy (01:29:32) Concerns About Hidden Inflation (01:32:19) Inflation Bugs in Cryptocurrencies (01:33:32) Bitcoin Block Size Increase Debate (01:36:50) Decentralization vs. Block Size (01:39:03) Proof of Stake in Bitcoin? (01:43:35) Long-term Sustainability of Mining (01:46:33) Concerns About Bitcoin's Supply Cap (01:47:36) Is The Future Multi-chain? (01:51:30) Stablecoins Aren't Stable (01:54:20) Future of Bitcoin (01:55:19) Market Dynamics and Government Influence (01:57:07) Privacy and Scalability Concerns (01:57:44) Activation Challenges (01:58:34) Centralization Issues (01:59:36) Community Dynamics (02:00:27) Closing Remarks (02:02:02) Keeping Up with Liam (02:02:38)
Today we will cover the spies that made the modern world. This crucial history is absolutely essential to understanding how we got to where we are and how the world really works. We will be analyzing the book by Gilles Munier, Black Gold Spies. The full analysis will be available to subscribers to JaysAnalysis below. Book is here: https://a.co/d/epSVb4D Next live event here: https://checkout.square.site/merchant/MLR5FN2CP7W57/checkout/2LK2ZBXTKO5QW5ND4IGMYVRI Send Superchats at any time here: https://streamlabs.com/jaydyer/tip Get started with Bitcoin here: https://www.swanbitcoin.com/jaydyer/ The New Philosophy Course is here: https://marketplace.autonomyagora.com/philosophy101 Set up recurring Choq subscription with the discount code JAY44LIFE for 44% off now https://choq.com Lore coffee is here: https://www.patristicfaith.com/coffee/ Orders for the Red Book are here: https://jaysanalysis.com/product/the-red-book-essays-on-theology-philosophy-new-jay-dyer-book/ Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyerBecome a supporter of this podcast: https://www.spreaker.com/podcast/jay-sanalysis--1423846/support.