POPULARITY
In the season 7 finale of 'Adulting Decrypted', we embarked on a journey of games, discussions, and introspection on adulting. With a special guest. From revisiting past episodes through a quiz, this episode was a blend of entertainment and profound insights on growth and learning as we navigate the complexities of adulthood. Personal stories shared, leaving us with valuable lessons on resilience and personal development. Support the Show.
Link to blog post This week's Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Trina Ford, CISO, iHeartMedia Thanks to our show sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and security programs is increasingly challenging. Vanta is the leading Trust Management Platform that helps you centralize your efforts to establish trust and enable growth across your organization. Over 6,000 companies partner with Vanta to automate compliance, strengthen security posture, streamline security reviews, and reduce third-party risk. To learn more, go to vanta.com/ciso and watch their 3-minute product demo. All links and the video of this episode can be found on CISO Series.com
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast click here.
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast click here.
Related blog post: https://billatnapier.medium.com/cryptography-fundamentals-commutative-encryption-19ba4c4c2173 Introduction What's at the core of cryptography? Well, the simple EX-OR holds a special place, as we can do not lose any information when we apply it. For a bitwise operation of 0 EXOR 0 gives 0, 0 EXOR 1 gives 1, 1 EXOR 0 gives 1, and 1 EXOR 1 gives 0. And, so, cryptographers dream of the perfect cipher. And that cipher is a one-time pad. Basically, we generate a one-time use key for our plaintext, and then EX-OR them together, and then just EX-OR again with the same key and we will get our plaintext back. Unfortunately, we can only use it once and need to generate another one. So, let's see if we can generate something similar but just use the simple XOR method for our encryption and decryption. In the Tor (The Onion Router) network, data is encrypted with a key from each of the Tor routing nodes. Thus, if we have three nodes of A, B and C, with A as the entry node and C as the exit node. For this, the user will generate a separate key for each node to use and encrypt with the key of A, then the key of B, and then the key of C. The encrypted data is passed to A, and which will decrypt with its key, and pass the encrypted data onto B, and who will decrypt with its key. Finally, C will decrypt with its key, and the data will be decrypted. This protects the data as it is routed. But we have to remove the keys in the reverse order they were applied. One way to do this is with commutative encryption. Using a hasp When I worked as an electrical engineer, we had a hasp to isolate the electric power on a device we were working on: With this, each person who was working on the equipment, would put on their own padlock, and where we could not put the power back on, until all the padlocks had been taken off. The padlocks could be put on in any order, and taken off in any order, but there was no way to putting the power back on, until everyone had taken their padlock off. So how could we do this with data. Let's say that Bob, Alice and Carol want to apply their “data hasp”, so that the data cannot be revealed until they have all taken off their padlock. Well, with symmetric key block ciphers, such as AES, we cannot do this, as we must decrypt in the reverse order of they keys being applied: To encrypt: Bob → Alice → Carol … and then to decrypt: Carol → Alice →Bob There are ways to do it with RSA, such as with SRA [here], but these methods significantly reduce the security of the process. The solution is to use a stream cipher, as we basically just X-OR the data when we are encrypting, and then X-OR again with the same key when we decrypt. We can apply multiple keys to the data, and in any order and it will always decrypt properly once we have applied all the keys. What we need with commutative encryption is to have an encryption string which is the same length as the data string. To make the encryption string, we can use an XOF (eXtendable-Output Functions) and where we can create a hash value of a given size. For this, rather than the fixed hash of SHA-3, we can use the SHAKE. Or with With BLAKE2b we have an XOF of BLAKE2XB, and for BLAKE2s we have an XOF of BLAKE2XS. We can then basically have a secret passphrase, and which generates an output which matches the length of the plaintext. Another method we can use, is to generate an pseudo infinitely long encryption key which is the same length as the plaintext — in the same way that a stream cipher works. A simple application: Booking a ticket With the ever increasing number of breaches, we are moving to a world where companies should not hold any personally sensitive information, as it is just too risky. So how could we create a trustworthy system, where someone can show up with a ticket, and where we can trust it, without actually revealing any personal information about where the person has booked their seat? So how can we generate a receipt of the booking, but not give away your identity, or the details of the booking? Let's take an example of booking a seat in a theatre at the festival, and how your privacy can be respected, but where the theatre will trust the ticket. Let's say there are 100 seats in a theatre, and I want to book one of them, but I don't want the theatre company to know which seat I've booked, or my identity. I also want a receipt of purchase that they can verify my booking. One way would be to get a trusted agent to look after the bookings, but I don't trust them either. So how can we do this? Well it can be done with commutative encryption. The steps would be: Initially the theatre company generates 100 receipts for each of the seats, and then encrypts them with its public key. Next when I want to make a booking they send me the encrypted receipts that they have left, and I select one at random, and then encrypt it with my public key. I send them all back, including the one I've encrypted. The theatre checks to see which one has been changed, and then decrypts it with its private key, and sends it back to me. I decrypt with my private key, and I can now view the receipt for my booking, and the theater company cannot determine which seat I have, but I will have the receipt of my booking. So here is an example where the theatre encrypts all the seats with its key, the person then selects one, and encrypts with their key, and sends them all back again. Then the theater decrypts the one that has changed, and sends it back for the person to decrypt, and we have a booking. The theatre thus does not know who has booked the seat: Commutative encryption using ChaCha20 ChaCha20 is a stream cipher, and where we created pseudo infinitely long encryption key, and the just XOR it with the plain text. With commutative encryption, we can decrypt with the keys in any order. Normally we would encrypt with Bob's key and then encrypt with Alice's key, and then we must decrypt with Alice's key and then Bob's. In commutative encryption, we can decrypt in any order. With a stream cipher, we can automatically apply commutative as we basically just EX-OR with the key stream. In the following we use Go code, and where Bob encrypts, Alice encrypts, Bob decrypts, and then Alice decrypts [here]. And a sample run [here]: Input text: HelloBob passphrase: qwertyAlice passphrase: 123456Input text: HelloBob keygen: 65e84be33532fb784c48129675f9eff3a682b27168c0ea744b2cf58ee02337c5Alice keygen: 8d969eef6ecad3c29a3a629280e686cf0c3f5d5a86aff3ca12020c923adc6c92Cipher after Bob encrypt: d9eef8ecdcCipher after Alice encrypt: 7a5dcd0f43Cipher after Bob decrypt: ebd6598ff0Cipher after Alice decrypt: 48656c6c6fDecrypted text: Hello We can easily extend the method to Carol, Trent, and so on. In my simple example I have used the same nonce for Bob and Alice, but in real life they would use different values, and these would be random for every transaction. Commutative encryption using SHAKE-128 NIST chose Keccak as the standard for SHA-3. But, it's all a bit confusing, as there are two main versions of this: Keccak and SHA-3. Many systems, such as Ethereum have adopted Keccak, while others go for SHA-3. The only real difference between them is a difference in the padding of data. An eXtendable-Output Function (XOF) produces a bit string that can be of any length. In fact, we can create an infinitely long bit string, if required. The main methods are SHAKE128, SHAKE256, BLAKE2XB and BLAKE2XS. With the SHA-3 hashing method, we have four different cryptographic hashing methods (SHA3–224, SHA3–256, SHA3–384, and SHA3–512) and two XOF functions (SHAKE128 and SHAKE256). With commutative encryption, we can decrypt with the keys in any order. Normally we would encrypt with Bob's key and then encrypt with Alice's key, and then we must decrypt with Alice's key and then Bob's. In commutative encryption, we can decrypt in any order. While our symmetric key block ciphers cannot be made commutative, we can use stream ciphers, as they perform an EX-OR function. In this example we will use the SHAKE128 or SHAKE256, and generate Bob and Alice's key. https://asecuritysite.com/commul/comm_stream Communicative encryption using SRA With maths, operators such as multiplication are commutative, such as: 3 x 5 x 4 = 4 x 5 x 3 In encryption, most operations are non-commutative, so we need to modify the methods. One way is to use RSA, but generate two keys which have shared p, q and N values. So we generate Bob and Alice's keys using the same two prime numbers (p and q), so that they share the same N value (modulus). So let's start with Bob: Let's select: P=7, Q=13 The calculation of n and PHI is: N = 7 x 13 = 91 PHI = (P-1)(Q-1) = 72 We need to make sure that our encryption key (e) does not share any factors with PHI (gcd(PHI,e)=1). We can select e as: e = 5 Next we can calculate d from: (d x 5) mod (72) = 1 The answer is 29 [Solve] d= 29, e=5, N=91Encryption key [91,5]Decryption key [91,29] Now for Alice. We have: N = 7 x 13 = 91PHI = (P-1)(Q-1) = 72 We can select e as (and should not share any factors with PHI): e = 7 Now we must solve: (7 x d) mod (72) = 1 For this we get 31 [Solve] Alice's keys are then: d= 31, e=7, N=91Encryption key [91,7]Decryption key [91,31] An example of this is here: https://asecuritysite.com/commul/comm2 Commutative encryption using Massey-Omura As we have seen, commutative encryption allows us to decrypt in any order. For this we can use Massey–Omura Cryptosystem and generate encryption keys which share a prime number. One classic patent for commutative encryption was written by James Massey and Jim K. Omura created the Massey–Omura Cryptosystem in 1982 [1]. It took over three years to be assigned and was assigned to Omnet Associates [here]: It uses exponentiation in the Galois field GF(2^n) for both the encryption and decryption functions. In this, if we have a message of M, the encryption is: and This are operated on with the Galois field. For this we define e within: and we make sure that e does not share a factor with 2^n-1 using: The decryption exponent d is defined as: This works because the multiplicative group of the Galois field GF(2^n) has order 2^n−1, and where Lagrange's theorem defines that m^{de}=m for all the values of m in GF(2^n). The coding is here [link]: import libnumimport randomimport sysfrom Crypto.Util.number import getPrimefrom Crypto.Random import get_random_bytesdef chunkstring(string, length): return (string[0+i:length+i] for i in range(0, len(string), length)) def generate_keys(prime): while True: e = random.randint(0, prime-2) if libnum.gcd(e, prime-1) == 1 and e > 2: break d = libnum.invmod(e, prime-1) return e,ddef crypt(chunk, key,prime ): num = 0 for c in chunk: num *= 256 num += ord(c) res = pow(num, key, prime) vect = [] for i in range(0, len(chunk)): vect.append(chr(res%256)) res = res // 256 return "".join(reversed(vect))primebits=64msg = "HellHe"if (len(sys.argv)>1): primebits=int(sys.argv[1])if (len(sys.argv)>2): msg=(sys.argv[2])FRAGMENT_SIZE = primebits//8msg = msg + " "*((FRAGMENT_SIZE - (len(msg)%FRAGMENT_SIZE))%FRAGMENT_SIZE)res=chunkstring(msg,FRAGMENT_SIZE)PRIME = getPrime(primebits, randfunc=get_random_bytes)e,d = generate_keys(PRIME)vect=[]for elem in res: enc=str(crypt(elem, e,PRIME)) vect.append(enc)enc="".join(vect)dec=[]for elem in chunkstring(enc, FRAGMENT_SIZE): dec.append(crypt(elem, d,PRIME))print (f"Msg={msg}")print (f"e={e}, d={d}")print("Decrypted: " + "".join(dec)) A sample run is [link]: Msg=Hello e=16153579288865179167, d=10300837874192230633Decrypted: Hello One of the advantages of the Massey–Omura Cryptosystem is that we can apply commutative encryption. In this way, Bob may have keys of (e_b,d_b) and Alice has keys of (e_a,d_a). We can then apply the keys in any order, such as encrypting with e_a and then encrypting with e_b, and where we can then decrypt with d_a and then decrypt with d_b, or decrypt with d_b first and then decrypt with d_a (as we would normally do). To encrypt: Cipher=E(a_b,E(e_a,M))=E(e_a,E(e_b,M)) To decrypt: E(d_b,E(d_a,Cipher))=E(d_a,E(d_b,Cipher)) Here is an example: https://asecuritysite.com/commul/massey2 Conclusions Communative encryption is a great way of applying multiple keys to encryption data, and then for them to be removed in any order that is required. It is a little like how data is encrypted in the Tor network, but that requires the keys to be removed in the reverse order they were applied. In a future podcast, I will explain how the Tor network works.
James Diorio is the CEO & Jake Ryan is the CIO of Tradecraft Capital - they are also the Authors of the book Crypto Decrypted. Buy the book - https://www.amazon.com/Crypto-Decrypted-Understanding-Breakthroughs-Foundations/dp/1394178522
BIO: Gisela Hausmann graduated with a master's degree in film & mass media from the University of Vienna. She's one of a dying breed of adventurers – she digs in and researches topics of interest from the ground up, then tells things as she sees them.STORY: Gisela joins the podcast again, discussing her new book Winning @ Amazon. Today she shares advice on how employees can allocate their creativity in a way that's appreciated. She also talks about why employees need to start thinking outside the box and focus on problem-solving and innovation instead of feeling sorry for themselves and staying stuck where they're not appreciated.LEARNING: Encourage and appreciate your employees' creativity. “Appreciated creativity creates more creativity.”Gisela Hausmann Guest profileGisela Hausmann graduated with a master's degree in film & mass media from the University of Vienna, the oldest university in the German-speaking world.She is one of a dying breed of adventurers – she digs in and researches topics of interest from the ground up, then tells things as she sees them.An author of two dozen books, her work has been featured in regional, national, and international publications, including GeekWire, Inc, Success (print magazine), Entrepreneur, and Bloomberg's podcast ‘Decrypted.' She is also the winner of the 2016 Sparky Award “Best Subject Line.”Born to be an adventurer, she hiked in the Himalayas and the Gobi Desert, crossed Russia on the Trans-Siberian Railway twice, and meditated in the Dalai Lama's private room at the Potala Palace in Lhasa, Tibet.Her motto is: “Don't wait. The time will never be just right.” – Napoleon HillEncourage employee creativityGisela Hausmann first appeared on the podcast in episode 539, where she narrated how Amazon implemented suggestions she'd made in her book Inside Amazon: My Story. Gisela is back with a new book Winning @ Amazon. Today she shares advice on how employees can allocate their creativity in a way that's appreciated. She also talks about why employees need to start thinking outside the box and focus on problem-solving and innovation instead of feeling sorry for themselves and staying stuck where they're not appreciated.According to Gisela, companies consistently ignore the input from clever, hardworking, dedicated people and—seemingly—perceive them as “irrelevant little cogwheels in a big machine.” Senior management is often threatened by subordinates who seem more innovative than them, and it's no wonder they ignore their creative suggestions. This has led to employees choosing to keep suggestions to themselves, and this is killing most organizations, especially the big ones.Gisela advises organizations that want to encourage employee creativity to make a written plan. Define how employees who come up with ideas implemented in the company will be rewarded. Ensure that your rewards are something better than an in-house product. It should be something special that makes the employee feel appreciated. Gisela insists on the written plan because if you don't encourage creativity in black and white, it won't happen.You create positive energy in your business by acknowledging that you need creative ideas from your...
We explore the world of startup funding and venture capital. Nareg shares insights on the use of safe notes, valuation caps, and discounts in pre-seed rounds. We discuss the importance of having a product or service with positive revenue when seeking institutional investment and the challenges faced by first-time founders in securing funding. We also dive into how the investor market has changed over the last few years and give advice to anyone looking to raise money from investors. About Nareg EssaghoolianNareg Essaghoolian is the co-founder of Decrypted Legal & Consulting. He represents startups from day one at formation through their venture capital financings and exit. Prior to Decrypted, he spent several years at Cooley in Palo Alto, CA, one of the most prominent firms in the industry.He is now back in Los Angeles where he is born and raised working on disrupting the legal industry by being more transparent with pricing and services.EPISODE LINKSNareg Essaghoolian on LinkedInhttps://www.linkedin.com/in/nareg-essaghoolian/Decrypted Legal and Consultinghttps://www.instagram.com/decryptedlawEPISODE TIME STAMPS[00:00:47] - Startup legal expertise from UCLA[00:02:20] - VCs don't do follow-on investments?[00:03:20] - Smart decision, reduced risk, 10x return.[00:03:46] - "Investors don't follow: Crazy thought."[00:04:29] - Sequoia loses trust, no follow-on investment.[00:05:16] - "Ten times return on investment"[00:05:55] - Y Combinator: Accelerate, Invest, Return.[00:06:47] - Angel investors not investing in Series B, C.[00:07:44] - Tech, web three, down rounds.[00:08:35] - "Protective terms more prevalent than pay-to-play."[00:09:31] - "Understand cap table terms: Liquidation Preference"[00:10:06] - Investors get preferential treatment.[00:11:01] - Double-dipping liquidation preference.[00:11:34] - Negotiating Leverage for Investors[00:12:25] - Investor gets 20% upside.[00:12:58] - Participating Preferred: 18M Shared[00:13:47] - "Accumulating dividends of 6% annually."[00:14:30] - Investors leveraging market, waiting.[00:15:23] - "Maximize returns in v CONNECT WITH US Claim Your Weekly EDGE Newsletter. It's FREE.Written by Brandon with insights giving you an edge to win in your business and your life. Over 24,200 listeners and counting!-> https://edge.ck.page/bea5b3fda6 OTHER GREAT PODCASTS ON THE THE BEST PODCASTS NETWORK Danielle & Brandon Show All about owning a businesshttps://OnBusinessPodcast.com MARKETING PodcastMarketing science revealing successful marketing. https://PodcastOnMarketing.com 401k Plans PodcastSet up and run your company's 401k retirement savings plans correctly.https://401kplanspodcast.com Car Accident Lawyer PodcastBest lawyer advice.https://caraccidentlawyerpodcast.com PRODUCTIVITYTips.https://productivitypodcast.buzzsprout.com podcast for entrepreneurs...
On today's episode of Tech Talks Daily, I'm thrilled to welcome Kunal Agarwal, the rising under-30 CEO of Dope Security, who's on a mission to disrupt the multi-billion dollar SWG (Secure Web Gateway) market. Kunal shares the story behind Dope, his perspective on entrepreneurship, and the opportunity he sees in the underserved SWG market. Having recently announced a $16M Series A funding round (bringing their total funding to $20M), Dope Security is making waves in the industry. Before founding Dope, Kunal led product management teams at SWG giants Symantec and Forcepoint. There, he recognized an inevitable flaw in legacy technology - the reliance on stopover data centers for security checks, a method designed before the advent of cloud computing and remote work. With today's distributed workforces, the traditional approach to SWG no longer works efficiently, leading to data center congestion, performance issues, and privacy concerns. Dope Security addresses these problems by performing security checks on the endpoint, a more efficient and scalable solution. Decrypted data never leaves the endpoint, ensuring reliability and privacy. Join me as Kunal delves into the founding of Dope Security, his approach to building the company, and the innovative technology they've developed. Don't miss this insightful conversation with one of the brightest young minds in the world of cybersecurity. Tune in now to learn how Dope Security is revolutionizing the SWG market and redefining the future of cybersecurity.
Squiz Kids is an award-winning, free daily news podcast just for kids. Give us ten minutes, and we'll give you the world. A short podcast that gives kids the lowdown on the big news stories of the day, delivered without opinion, and with positivity and humour. ‘Kid-friendly news that keeps them up to date without all the nasties' (A Squiz Parent) This Australian podcast for kids easily fits into the daily routine - helping curious kids stay informed about the world around them. Fun. Free. Fresh. LINKS Kids + Media Survey: Are you a parent, guardian or teacher of primary school kids? Then help us paint a picture of Aussie kids and their media habits by filling out this quick, two minute survey. Thank you in advance! https://www.surveymonkey.com/r/ZBTHR35 Today's Quick Links: New Zealand storm photos: https://www.nzherald.co.nz/hawkes-bay-today/news/cyclone-gabrielle-floods-rescue-operation-underway-in-puketapu-napier-new-hawkes-bay-evacuations/RMMVL7IR6ZBITE4RODSM2PXQAI/ Bolivian wolf in sheep's clothing: https://nypost.com/2023/02/14/inmate-disguises-himself-as-a-sheep-to-escape-prison/ Titanic footage - one minute version: https://apnews.com/article/titanic-rare-footage-released-c429fad5ff9eae14f7dc110881bf0697 Mary, Queen of Scots - news story with sample letter and cipher: https://www.nytimes.com/2023/02/08/world/europe/mary-queen-of-scots-letters.html Dig Deeper: Titanic footage - 80 minute version: https://www.youtube.com/watch?v=kmfjjsRbKCY Mary, Queen of Scots - Figures from academic paper, including ciphers: https://www.tandfonline.com/doi/figure/10.1080/01611194.2022.2160677 Mary, Queen of Scots - Full academic paper, including historical background: https://www.tandfonline.com/doi/full/10.1080/01611194.2022.2160677?src= # Sponsored Search For The Ultimate $5 Lunchbox Rosie's Recipes: Healthier Apricot Cereal Balls https://www.woolworths.com.au/shop/recipes/healthier-apricot-cereal-balls Classroom Companion Teachers! Want to access free, curriculum-aligned classroom resources tied to the daily podcast? Sign up to be a Squiz Kids Classroom and download the Classroom Companion each day. Made by teachers for teachers, differentiated to suit all primary school ability levels. And did we mention it's free? Newshounds Get started on our free media literacy resource for classrooms www.squizkids.com.au/newshounds Stay up to date with us on our Squiz Kids Instagram! Got a birthday coming up and you want a shout-out? Complete the form on our Squiz Kids website. Link: SHOUT OUTS or / send us an email at squizkids@thesquiz.com.au
Guest: Dr George Lasry How could a computer scientist, a pianist and a physicist walk into an archive…and stumble upon over 50,000 words of encrypted letters, written by Mary, Queen of Scots, more than 400 years ago? Dr George Lasry is a computer scientist and Member of the DECRYPT Project and he joins John from Tel Aviv to explain exactly how they did just that.See omnystudio.com/listener for privacy information.
Happy Thanksgiving!Let us know what you want to talk about in Season 6 by emailing us at: adultingdecrypted@gmail.comSupport the show
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Rest is God's Will”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Rest is God's Will”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Blessing is God's Will”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Blessing is God's Will”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
This Sunday, Joey Ridgle will continue our series, Decrypted with a message on “It's God's Will that We Fish”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive
This Sunday, Joey Ridgle will continue our series, Decrypted with a message on “It's God's Will that We Fish”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Shepherds”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Love is God's Will”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Love is God's Will”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Shepherds”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Restoring Freedom”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will continue our series, Decrypted with a message on “Restoring Freedom”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
This Sunday, Pastor Nathan will begin our new series, Decrypted with a message on “God's Will For You”.To learn more about Thrive and to see all our upcoming events visit our website:https://www.livewithpurpose.church/SOCIALS:ThriveCCAthensFacebook: https://www.facebook.com/ThriveCCAthens/Instagram: https://www.instagram.com/thriveccathens/GIVING:Giving Online: https://www.livewithpurpose.church/giveGiving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751You were made to thrive.
This Sunday, Pastor Nathan will begin our new series, Decrypted with a message on “God's Will For You”. To learn more about Thrive and to see all our upcoming events visit our website: https://www.livewithpurpose.church/ SOCIALS: ThriveCCAthens Facebook: https://www.facebook.com/ThriveCCAthens/ Instagram: https://www.instagram.com/thriveccathens/ GIVING: Giving Online: https://www.livewithpurpose.church/give Giving By Mail: 610 ½ Old Tyler Highway Athens, Texas 75751 You were made to thrive.
Ransomware is a nasty piece of malware that attempts to encrypt all your files and hold them ransom to get them back. The key to the success is the encryption process remains secret. Recently a common ransomware has been reverse engineered and a decrypted has been released. This episode talks about how the decrypter was built. Source - https://decoded.avast.io/threatresearch/decrypted-tarrak-ransomware/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,
BIO: Gisela Hausmann is one of a dying breed of adventurers – she digs in and researches topics of interest from the ground up, then tells things as she sees them. STORY: Gisela published a book about her time working at Amazon. In the book, she suggested what Amazon should do to improve working conditions. Amazon implemented these suggestions. LEARNING: Know who your friend is and who is not. Look at criticism as an opportunity. “If you just get going and try to do your thing, you're probably gonna get it.”Gisela Hausmann Guest profilehttps://www.linkedin.com/in/gisela-hausmann-03404913/ (Gisela Hausmann) graduated with a master's degree in film & mass media from the University of Vienna, the oldest university in the German-speaking world. She is one of a dying breed of adventurers – she digs in and researches topics of interest from the ground up, then tells things as she sees them. An author of two dozen books, her work has been featured in regional, national, and international publications, including GeekWire, Inc, Success (print magazine), Entrepreneur, and Bloomberg's podcast ‘Decrypted.' She is also the winner of the 2016 Sparky Award “Best Subject Line.” Born to be an adventurer, she hiked in the Himalayas and the Gobi Desert, crossed Russia on the Trans-Siberian Railway twice, and meditated in the Dalai Lama's private room at the Potala Palace in Lhasa, Tibet. Her motto is: “Don't wait. The time will never be just right.” – Napoleon Hill Worst investment everGisela has written very many books throughout her career as an author. Her books have won various recognitions, including Kindle book review awards, and have been featured on Success Magazine and Bloomberg podcast. At some point in Gisela's career, many of the cheaters came in and made her life miserable on Amazon. So she decided to have a downtime phase and went to work in Amazon's logistics department. While working at Amazon, Gisela found out that all the many principles that the company preaches did not happen there. She even wanted to quit at some point because she was miserable there. Then came COVID, and Gisela was now stuck where she didn't want to be. Gisela then came up with a great idea to write a book about her experience at Amazon and published the book. She thought the journalists who constantly investigated everything about Amazon would be thrilled to finally hear from a logistics professional about what needed to be done. But they were not interested in her book. When Gisela submitted her book on Amazon, it took 104 hours for it to be put online. In most cases, it takes a maximum of 72 hours for a book to be approved. Gisela would soon learn why her book took so long to be published on Amazon. Amazon's legal department forked over this book in every little detail. Then they literally went ahead and took many of the changes Gisela suggested in her book and implemented them. Amazon is now doing what Gisela wrote. Lessons learnedThink through in a creative way who is your friend and who is not worth anything. Andrew's takeawaysLook at criticism as an opportunity. Actionable adviceIf you're an author and want to contact reviewers, read one of Gisela's audiobooks. If you run a business and sell on Amazon, read Gisela's book https://amzn.to/3vI96Xg (Naked Truth About Getting Book Reviews), and you'll find seven tips to boost sales. Another great book everyone should read is https://amzn.to/3EDYo81 (Naked Determination, 41 Stories About Overcoming Fear). No.1 goal for the next 12 monthsGisela Hausmann's goal for the next 12 months is to refocus and do more for the environment. She wants to write a serial fable in the style of Animal Farm, a standard book that can be read by everybody. Parting words “Do it. You don't know if the opportunities are gonna be there tomorrow. So focus on it; it can be done.”Gisela Hausmann [spp-transcript] Connect with Gisela...
On this episode of Financially Naked: Stories from The Financial Gym, two of our Certified Financial Trainers, Hector and Garrett, are talking all about Cryptocurrency! In June of 2021, Hector and Garrett did an episode all about Bitcoin, and since then, it has only become more mainstream and part of the personal finance conversation. Listen to Cryptocurrency Decrypted Part 1 here! Podcast Notes Cryptocurrency is not new and is not going away any time soon. Even though it's been around and is gaining more popularity, there is still apprehension around it. There are two ways to look at it; either as a currency, or as an investment. If you are using it to make purchases, that's a currency. If you are planning on buying it and holding on to it, that's an investment. Cryptocurrency is much more volatile than traditional investments. It trades 24/7 and is going up and down constantly. One person's tweet can massively swing where this can go. If people are making money on it, it will be in the news. When you are looking to invest, know what you are investing in. Don't get caught up in FOMO and always do your research, or talk to a professional! Think about crypto as a long-term investment. Put the money away, and be comfortable knowing it will go up and down. Only invest money you are comfortable losing. More big players in the game are beginning to accept cryptocurrency, Starbucks, Tesla, AirBnB, Stripe, and other payment processing platforms. Coinbase is a great place to get started. It covers all of the major players for buying and selling crypto. Before getting started in crypto, make sure your personal finance foundation is solid: Ensure any high-interest debt is paid off Have an emergency fund in place Make sure retirement contributions are taken care of Sit down with a pen and paper and determine what amount is right for you. How much can you afford to invest and are you comfortable with that level of risk? The 5% rule is a good rule of thumb. Keep your crypto investments to 5% or less of your investment portfolio, to ensure diversity among investments. Gary Gensler is a major voice in the crypto space. His YouTube video is a great place to get started if you want to learn more: Watch Gary Gensler's Introduction to Crypto Listen to Cryptocurrency Decrypted Part 1 Meet The TrainersMeet Level 2 Certified Financial Trainer, Garrett Faulconer Meet Level 2 Certified Financial Trainer, Hector Lopez
LIVE RECORDING March 8, 2022.CHAT WITH SOPHIA and TEAMTARDIS LIVE!6 pm EST / 3 pm PST / 11 pm UKThe Legend of the Traveling TARDIS is honored to have actress Sophia Myles, Madame de Pompadour from the Doctor WHO episode "The Girl in the Fireplace" and Lady Penelope Creighton-Ward in "Thunderbirds" movie.SUBCSCRIBE - LIKE - COMMENT - SHAREFollow The Legend of the Traveling TARDIS on Social Media:► FACEBOOK - Facebook.com/TheTravelingTARDIS► YOUTUBE - YouTube.com/TheLegendOfTheTravelingTARDIS► WEBSITE - TheLegendOfTheTravelingTARDIS.com► INSTAGRAM - Instagram.com/legendtravelingtardis► IHEARTRADIO - iheart.com/podcast/966-the-legend-of-the-travelin-30296020The Legend of the Traveling TARDIS covers the latest news, gives the most diverse reviews and fun interviews about the the Doctor WHO WHOniverse.► THE LEGEND OF THE TRAVELING TARDIS FAMILY OF SPONSORS:► Doctor WHO: Worlds Apart Virtual Card Game: doctorwho-worldsapart.com► FameTek / Speakers and Chargers: fametek.com► Author Cindy Koepp: ckoepp.comAnd many more
This week, John and Ashton are diving into the documentary, Sasquatch, available to stream on Hulu. Drawn in by the promise of actual sasquatch research, this series may not have been what it seemed... Want to buy some merch? Check out MacAshton.com/Merch. Make sure to follow us on every social platform so we can finally reach the height of ego we deserve: https://linktr.ee/cryptidsdecrypted More information on Ashton and his writing can be found on his website: https://macashton.com/ You can also follow him on Twitter (@RealMacAshton). To purchase books, check out these links: https://linktr.ee/MacAshton Credit for our excellent outro music goes to: Song: Strange Indeed Variation A Composer: Felipe Adorno Vassao (ABRAMUS) Content Provider: LynneMusic --- Support this podcast: https://anchor.fm/cryptids-decrypted/support
After seven plus years of hard work, a former news reporter, Dale Julin, has cracked some of the Zodiac Killer's numerous ciphers and anagrams. In this episode, AMU criminal justice and forensic science professor, Jen Bucholtz, who also has a background in counterterrorism and private investigations, shares how the ciphers were decrypted using the suspect's full name. She also discusses the mounting evidence pointing towards Gary Francis Poste including matching physical scars that had been identified by multiple witnesses, military training on a specific type of cipher and decrypting methodology used in the Zodiac letters, geographical location during the times of the murder, and more. Learn why she has partnered with The Case Breakers, an investigation group of more than 40 former law enforcement and experts, to bring this evidence to police in hopes they'll take this information seriously and find resolution to one of the country's most notorious unsolved serial killing cases. See acast.com/privacy for privacy and opt-out information.
It's a man's man's world but (lol James Brown knows) it would be nothing without women! Sophie Wyne (Co-Founder and CEO of ariglad), Luna Ito-Fisher, and Ambika Miglani (Co-founders of Decrypted By Us) join Amy on the podcast this week to chat about their entrepreneurship journey
In this conversation, Dominique and David talk with cybersecurity expert Vinu Nair who works for one of the world's largest cyber insurers. Vinu discusses not only the trends for preventing cyberattacks, but also what companies can do today to prevent future damage to their brand and value. The conversation covers the importance of cyber for corporate leaders in the C-suite and the boardroom, as well as recent ransomware attacks on critical targets like Colonial Pipeline, healthcare systems, and food supply. There is also a robust discussion regarding the role governments can/will play in the fight against ransomware and cybercrimes that are threatening societal structures.
In this conversation, Dominique and David talk with cybersecurity expert Vinu Nair who works for one of the world's largest cyber insurers. Vinu discusses not only the trends for preventing cyberattacks, but also what companies can do today to prevent future damage to their brand and value. The conversation covers the importance of cyber for corporate leaders in the C-suite and the boardroom, as well as recent ransomware attacks on critical targets like Colonial Pipeline, healthcare systems, and food supply. There is also a robust discussion regarding the role governments can/will play in the fight against ransomware and cybercrimes that are threatening societal structures.
Digital Library of The Christ Consciousness. Support The Kingdom of God: www.patreon.com/CarbonNation CashApp: $ChiefMessiah Connect with The Messiah: Babaji's Instagram: www.instagram.com/avatar.natureboy Babaji's Facebook: www.facebook.com/eligio.bishop.92 Facebook: Connect with The Christ: CarbonNationTV: www.instagram.com/carbonnationtv/ Diet Page: www.instagram.com/the.eat.clean.cuisine/ Music: @carbonnationproductions Art: www.instagram.com/carbonnationart Business Inquiries: CarbonNationProductions@gmail.com #Babaji #MelanatedMystic #Messiah
On this episode of Financially Naked: Stories from The Financial Gym, our host is Hector Lopez, L.A.-based Financial Trainer, and he is joined by his coworker, Garrett Faulconer, to discuss Bitcoin. Podcast Notes Around 2017, when Bitcoin was starting to get hot and was around $10,000, Garrett opened a Coinbase account and invested in it. After that, the value of Bitcoin fell dramatically. He still has that investment to remind himself to research things more thoroughly. Hector bought into Ethereum first, which is a type of cryptocurrency. There is a lot of talk about cryptocurrency and it is easy to get swept up in it without fully understanding. Hector currently has .0003% of a Bitcoin. Recently, Bitcoin went past $61,000 per coin and it has already come down from that threshold. In a day it can drop thousands. Know what you are getting into and think long-term about it, if you are in a place to get invested in it. Tesla bought a significant amount crypto, and PayPay started experimenting with accepting Bitcoin as a payment. The Dallas Mavericks are allowing people to buy merchandise and tickets with Dogecoin. More and more financial companies and retailers are allowing cryptocurrency as payment. If you can't sum up the core of cryptocurrency in a few sentences, you shouldn't buy it. When you are looking to invest, know what you are investing in. Don't get caught up in FOMO. Bitcoin: A digital currency that can be used to buy goods and services, but uses an online ledger with strong cryptography to secure online transactions. Crypto currencies work using block chain technology, which is a decentralized technology spread across many computers that manages and records transactions. Part of the appeal is that it is secure. There are more than 6,700 different types of cryptocurrencies available. There are only 21 million Bitcoins available. If you are purchasing Bitcoin, you are purchasing part of a collection. The intrinsic value is based on everyone else's perception and valuation of that item. The more exclusive something is the more valuable it is. If you put $100 into Bitcoin, you get a percentage of it. If more people want it, the price will rise. It is getting a lot of traction, because big finance players are talking about it and buying it. Bitcoin is qualified as property for tax purposes, which carries a 28% tax. If nobody is interested in buying Bitcoin, the value is going to drop. If you are interested in buying Bitcoin, or other cryptocurrency, talk to your trainer and do some research. In order to track Bitcoin transactions, there is a digital ledger that is held by everyone. Everything is transparent and trust is a big part of it. This is how block chain works. Other popular cryptocurrency is Ethereum, which uses smart contracts. In the future, you may be able to buy a house with Bitcoin, but you write the mortgage contract with Ethereum. Dogecoin started off as a joke and is very approachable. An NFT means non fungible token. The main application is being a unique copy of digital art. It's related to crypto currencies but it is different, but it uses block chain technology. Where can I buy crypto currency? Coinbase is the popular, mainstream exchange. Gemini is another platform that is getting more traction right now. When you are purchasing, understand what you are buying. When you purchase from Robinhood, you are purchasing a promise, because they are a third party seller. What are the tax implications? Crypto currencies are taxed as a property. If you buy Bitcoin for $10,000 and sell it for $13,000, your capital gains will be $3,000 and you will be taxed on those gains. If you sell it for $7,000, you will owe nothing and you are able to use the $3,000 loss to offset other gains. There is also a difference if you hold it for longer than a year versus less than a year. Is Bitcoin being used? Tesla, Square, and Visa bought into it. Adoption of it is becoming more and more apparent. Treat it as a serious thing. Cons of crypto currency? Price volatility. Recently it was at $61,000 and two days later, it was at $55,000. One person's tweet can massively swing where this can go. If people are making money on it, it will be in the news, so beware. Are there hacking concerns? Something is safe, until it is not. Always be skeptical and have a backup, emergency plan. Have a healthy level of skepticism. There are online wallets that are more encrypted where you can store your crypto. It isn't secured by SIPC, which insures brokerage accounts up to $500,000. When it comes to crypto currency and single stocks, only allocate a small amount of your investments to it, like 5%. Meet The Trainers Hector Lopez Garrett Faulconer
Whatsapp and Facebook have filed a petition against the Union Government challenging the traceability requirements in the Intermediary Guidelines and Digital Media Ethics Code notified on February 25, 2021. Suchir Kalra and Atish Padhy join Prateek Waghre to discuss the possible outcomes and their consequences on the market.Link to the document: (https://takshashila.org.in/economic-implications-of-whatsapps-lawsuit-against-the-government-of-india/)Follow Prateek on Twitter: (https://twitter.com/prateekwaghre)Follow Atish on Twitter: (https://twitter.com/socratishh)Follow Suchir on Twitter: (https://twitter.com/PixelatedSuchir)You can listen to this show and other awesome shows on the IVM Podcasts app on Android: https://ivm.today/android or iOS: https://ivm.today/ios, or any other podcast app
Monetize Your Mindset - Create Finacial Security Monetize what You Already Know
This was a fun and very different episode, I got four different opinions from four different age groups. We talk about opportunity, awareness, entrepreneurship and if they thought school was giving them the tools that they might need to be an entrepreneur or even a side hustler. Roscoe shared how he is helping prepare his sons to take advantage of a world with so many opportunities all around them it they just are aware and take action. So many ways to make money doing what you like to do.This is one for all ages. Enjoy!
Meet the digital phenomenon that's worth in the trillions of dollars, that uses more power than the nation of Sweden, but that very few people - including those involved - even understand. Cryptocurrencies are notoriously complicated, the best way to understand how they work is to understand where they came from. In this programme: the history, the technology, the economics, and the psychology. Plus, latest news from the crypto-world: NFTs and multi-million art sales, 'stablecoins' and financial misconduct, and finally - will the whole thing come crashing down? Like this podcast? Please help us by supporting the Naked Scientists
Meet the digital phenomenon that's worth in the trillions of dollars, that uses more power than the nation of Sweden, but that very few people - including those involved - even understand. Cryptocurrencies are notoriously complicated, the best way to understand how they work is to understand where they came from. In this programme: the history, the technology, the economics, and the psychology. Plus, latest news from the crypto-world: NFTs and multi-million art sales, 'stablecoins' and financial misconduct, and finally - will the whole thing come crashing down? Like this podcast? Please help us by supporting the Naked Scientists
Psychic Debbie will talk about seeing these beautiful and powerful Angel numbers. what they mean and when you see these numbers how the angels are helping you. psychic Debbie Griggs will also tell you the angel connected to these numbers and crystals. If you enjoyed this video and would like to make a donation, please use the following link. Thank You. https://psychicdebbie.com/donations/ Debbie has 2 powerful videos, opening your third eye and the other is opening your Chakras and third eye and also seeing Auras. please go to her website. https://www.psychicdebbie.com and go to course, email= photopsychicdebbie@gmail.com https://www.instagram.com/psychicdebbiegriggs https://www.facebook.com/psychicdebbiegriggs https://psychicdebbie.com/donations/ https://www.psychicdebbie.com https://www.youtube.com/channel/UC4BB5YycMAl0OCQsZqLvb4Q?view_as=subscriber
This week, John and Ashton are joined by special guest, Jason Peters, host of the podcast, Esoterica Cinema! Together, they break down the cult classic, Tremors, and its relation to the myth of the Mongolian Death Worm. Want more Cryptids? We have an Instagram now, so be sure to check that out: https://www.instagram.com/cryptidsdecrypted/ Looking for merch? https://www.redbubble.com/shop/ap/55094247 More information on Ashton and his writing can be found on his website: https://macashton.com/ You can also follow him on twitter (@RealMacAshton). To purchase books, you can check out his Amazon Page. Credit for our excellent outro music goes to: Song: Strange Indeed Variation A Composer: Felipe Adorno Vassao (ABRAMUS Content Provider: LynneMusic --- Support this podcast: https://anchor.fm/cryptids-decrypted/support
First time in quite a while where this many major stories were happening. In today's episode, we discuss the decryption of the 340 character cipher that was sent to the SF chronicle by the zodiac killer over 50 years ago. As if freedom online was already questionable enough, politicians now want to feloniously charge individuals over breaking DMCA copyright laws. Well if we go to jail, at least iCarly will be back on the tube (we prefer drake and josh though). But we do know one person who will be going to jail, and that's Lil Wayne, who is being federally charged...
Data is the new gold. In the era of COVID-19, companies that have mastered the digital landscape will lead the way to reopening economies across the globe. In Decrypted Unscripted, we examine the privacy landscape, from regulatory developments to litigation trends. Hosted by Perkins Coie partners Dominique Shelton Leipzig and David Biderman, we explore strategies for compliance with evolving privacy laws through unscripted conversations with C-suite execs, regulators, and leading privacy and data security professionals. These timely discussions are essential listening for anyone managing data as a pre-tangible asset and preparing vigorous defenses against the next wave of privacy and data security class actions.
The party regroups at Madame Tuvari's to work on unlocking the meaning of the Baron's encoded messages. A night recuperating with the ancient fortuneteller serves as a precursor for a fateful homecoming.Dungeon Patrol is a D&D 5e actual play podcast built by Dungeons and Dragons and tabletop gaming enthusiasts.The PlayersJerry as the Dungeon MasterDon as Kragar the Bugbear RogueRachelle as Tris the Tiefling FighterTed as Élar the Half-Elf BardThad as Brokkos the Shifter DruidLearn more at DungeonPatrol.com
The title of this episode really says it all. Today we talk about what we have learned through starting the Adulting Decrypted Podcast and also some of our earliest adulting moments. If you ever wanted to know what struck us the most this season and why, as well as why we find what we talk about so valuable please join us for this episode! Enjoy this weeks addition and be prepared for next season starting September 2nd!
In this episode, John and Ashton break down Chupacabra Territory, a found footage horror film about a group of 20-somethings that go out in search of the legendary chupacabra. If you want to give this movie a watch (not recommended), it is available for free if you have an Amazon Prime membership here: https://www.amazon.com/Chupacabra-Territory-Sarah-Nicklin/dp/B07HFKLLD3/ If you want to buy signed copies of Ashton's books, please reach out at CryptidsDecrypted@Gmail.com, or message him on twitter(@RealMacAshton). If you want non-signed or e-copies, you can find all of his work on Amazon or anywhere else books are sold. https://www.amazon.com/Ashton-Macaulay/e/B07C1J3V8P Credit for our excellent intro music goes to: Song: Strange Indeed Variation A Composer: Felipe Adorno Vassao (ABRAMUS) Content Provider: LynneMusic Publisher: Lynne Publishing (PRS) for the 'thinking music' during Truth or Cryptid, we thank Neo Spica: https://freesound.org/people/NeoSpica/ for the '80's Riff' that serves as the Truth or Cryptid theme, we thank Modulation Station: https://freesound.org/people/ModulationStation/ --- Support this podcast: https://anchor.fm/cryptids-decrypted/support
Decrypted returns on March 6th with a brand new season. Here's a sneak peek of what's in store. We'll be releasing new episodes every Tuesday starting next week. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Tamara Leigh Trend On Independent Film making with owner of Mark Madness Productions and The Art Institute of Wisconsin's student, Mark Winter. Mark fulfilled multiple roles during the production of The Art Institute of Wisconsin's original web series “Decrypted”. Mark is currently working towards his BA in Digital Film making to add to his list of creative credentials in Producing, Directing, Cinematography, Sound Design as well as his accomplishments in Script writing for both commercial copy and short films. Independent Film making is flourishing with the available technology and rises of Film Festivals for artists to showcase their work. Mark also graduated from U.S. Army Intelligence School as an Intelligence Analyst.