Podcasts about decryption

Practice and study of secure communication techniques

  • 87PODCASTS
  • 121EPISODES
  • 41mAVG DURATION
  • ?INFREQUENT EPISODES
  • Nov 19, 2024LATEST
decryption

POPULARITY

20172018201920202021202220232024


Best podcasts about decryption

Latest podcast episodes about decryption

Zimmerman en Space
Een buitenaards bericht van aardse makelij

Zimmerman en Space

Play Episode Listen Later Nov 19, 2024 16:48


Op 24 mei vorig jaar werd een testbericht uitgezonden vanuit een baan rond de planeet Mars. Een en ander gebeurde ter voorbereiding op de dag dat we daadwerkelijk een buitenaards signaal ontvangen. Eerder dit jaar werd de boodschap eindelijk ontcijferd.Trace Gas Orbiter:https://exploration.esa.int/web/mars/-/46475-trace-gas-orbiterA Sign In Space:https://asignin.space/Can You Decode an Alien Message?https://www.scientificamerican.com/article/can-you-decode-an-alien-message/Decryption of Messages from Extraterrestrial Intelligence Using the Power of Social Media - The SETI Decrypt Challenge:https://arxiv.org/abs/1706.00653Testing SETI Message Designs:https://arxiv.org/pdf/0911.3976YouTube over het bericht van Daniela de Paulis:https://www.youtube.com/watch?v=gly2NoqRFi0SETI Live: A Sign in Space - Simulating First Contact:https://www.youtube.com/watch?v=zgQq36IR-LkDe originele boodschap van de Trace Gas Orbiter (binair):https://github.com/BatchDrake/ASignInSpace/blob/master/Candidates/artifacts/data17.binDe originele boodschap van de Trace Gas Orbiter (text):https://github.com/BatchDrake/ASignInSpace/blob/master/Candidates/artifacts/data17.txtDiscord van A Sign In Space:https://discord.com/invite/2upxzmZkqYArecibo message:https://en.wikipedia.org/wiki/Arecibo_messagePhase Shift Keying (PSK):https://en.wikipedia.org/wiki/Phase-shift_keyingPython script om de boodschap hoorbaar te maken op een enigszins wetenschappelijk verantwoorde wijze:# Sonification of the TGO message.# Hens Zimmerman, 18-11-2024.# There exist two equal length wav files:# 1.wav is a short beep# 0.wav is silentimport wave# Open and read original text version of the TGO message.# https://github.com/BatchDrake/ASignInSpace/blob/master/Candidates/artifacts/data17.txtwith open('data17.txt') as f:    msg = f.read()# The whole beepy sonification will be constructed here.data = []# Read the two sound files into buffers.w = wave.open('0.wav', 'rb')zero = [w.getparams(), w.readframes(w.getnframes())]w.close()w = wave.open('1.wav', 'rb')one = [w.getparams(), w.readframes(w.getnframes())]w.close()# Append a beep for every '1' and silence for every '0'.for c in list(msg):    if c == '1':        data.append(one)    elif c == '0':        data.append(zero)# Write the output file to disk.output = wave.open('sonification.wav', 'wb')output.setparams(data[0][0])for idx in range(len(data)):    output.writeframes(data[idx][1])output.close()De Zimmerman en Space podcast is gelicenseerd onder een Creative Commons CC0 1.0 licentie.http://creativecommons.org/publicdomain/zero/1.0

Hacking Humans
decryption (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 20, 2024 7:28


Enjoy this special encore of Word Notes. A process of converting encrypted data into something that a human or computer can understand.

Word Notes
decryption (noun)

Word Notes

Play Episode Listen Later Aug 20, 2024 7:28


Enjoy this special encore of Word Notes. A process of converting encrypted data into something that a human or computer can understand. Learn more about your ad choices. Visit megaphone.fm/adchoices

Learn True Health with Ashley James
523 Headache Decryption: Understanding Your Headache or Migraine Pain Location To Decode Root Cause Holistic Solutions, Dr. Scott Vrzal

Learn True Health with Ashley James

Play Episode Listen Later Jun 24, 2024 113:26


Check Out My Latest Book: Addicted To Wellness https://www.learntruehealth.com/addictedtowellness   Get The Minerals Your Body Needs: TakeYourSupplements.com https://takeyoursupplements.com   Dr. V's Website: www.HeadacheAdvantage.com

Today in Health IT
2 Minute Drill: LockBit Decryption Keys, Microsoft's Windows Recall, and GPT-4 Autonomous Hacking

Today in Health IT

Play Episode Listen Later Jun 11, 2024 3:44 Transcription Available


In today's episode of the 2-Minute Drill, Drex covers critical cybersecurity updates. Discover the latest on the FBI's release of over 7,000 decryption keys for victims of the LockBit ransomware. Learn about Microsoft's controversial Windows Recall feature, now set to off by default due to security risks. Finally, delve into groundbreaking research from Cornell University, where a team of GPT-4 bots autonomously hacked websites and networks, showcasing unprecedented efficiency in exploiting zero-day vulnerabilities. Stay informed and stay secure with these essential updates.Remember, Stay a little paranoid.Subscribe: https://www.thisweekhealth.com/subscribe/Linkedin: https://www.linkedin.com/company/ThisWeekHealthTwitter: https://twitter.com/thisweekhealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer - https://www.alexslemonade.org/mypage/3173454

The Deep Dive Radio Show and Nick's Nerd News
New Ransomware Decryption Keys Just Released!

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Jun 11, 2024 3:08


Cybercrime Magazine Podcast
Cybercrime News For Jun. 10, 2024. FBI Provides LockBit Decryption Keys. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 10, 2024 3:02


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

Let's Talk About (Secur)IT
Cybersecurity Threat Landscape - Decryption of Ransomware, Threat Actor Psychology and the Future of Cybersecurity with Brett Callow

Let's Talk About (Secur)IT

Play Episode Listen Later Mar 25, 2024 23:12


In the latest Secur(IT) podcast episode, Philip and Brett Callow (Threat Analyst @ Emsisoft) delve into the cybersecurity threat landscape, discussing the industry's current state, cyber attack trends, Emsisoft's contributions to ransomware decryption, the psychology of threat actors, and the future of cybersecurity. They highlight the criticality of fundamental security measures, the urgency to expand the cybersecurity workforce, the dynamic nature of cyber threats, and advanced defenses like biometrics and multi-factor authentication. Join them for an in-depth exploration of these topics.

DEFI TIMES - Bitcoin, DeFi & NFT News
Fairblock Network: The Modular Decryption Blockchain [Live at ETHDenver]

DEFI TIMES - Bitcoin, DeFi & NFT News

Play Episode Listen Later Mar 7, 2024 25:07


What is Fairblock Network? Fairblock Network is a modular blockchain that enables privacy decryption for appchains, protocols, smart contracts, and more from the get-go. Also, the network leverages the Cosmos-SDK and IBC. We sat down with Bowen from Fairblock Network at ETHDenver 2024 to talk about this novel approach and how this works in detail. - - - Catch up with FRENS VALIDATOR: 

Security Voices
Cultural Decryption: A Closer Look at Understanding the India/U.S. Relationship in Cyber

Security Voices

Play Episode Listen Later Nov 27, 2023 60:08


The ascendancy of India in Silicon Valley is undeniable. From top executives such as Satya Nadella (Microsoft) and Nikesh Arora (Palo Alto Networks) to leading investors, we've become well accustomed to working with and often for people who have immigrated from India. Given the wave of immigration from India started decades ago, our Indian coworkers, investors and leaders are such an established part of the tech industry that we often give little thought to the cultural differences that underlie our daily interactions. Nonetheless, the move to remote work strips away much of the high fidelity, in person interactions that make understanding each other easier, even if we were raised on different continents, speaking different languages, etc. In simple terms, while the stakes for understanding each other have never been higher, our actual means of communicating have gotten worse.This episode of Security Voices combines the perspectives of two experienced security leaders, Ashish Popli of Spotnana and Jason Loomis of Freshworks along with Jack and Dave. Ashish has been working in the U.S. since he completed his Masters at Stony Brook in ‘02 whereas Jason took the role of CISO for the Chennai-based Freshworks a little over a year ago. Their combined perspectives provide a 360 degree view of both what it takes for an Indian security leader to adapt and how a Los Angeles-based security leader has navigated the unique challenges of having a team based in India. Jack explains how B-Sides conferences in India also bear the clear imprint of the country's culture.Over our roughly 60 minute discussion, Ashish and Jason share their stories of what works, what doesn't, and perhaps most importantly, we explore the “why” behind those moments when something seems to be lost in translation. We hope you have a few “aha” moments like we did during the conversation and that this episode serves as a practical reminder that while much unites in the tech industry, we can go even further when we understand and respect our differences as well.

ASecuritySite Podcast
Cryptography Fundamentals 9: Commutative Encryption

ASecuritySite Podcast

Play Episode Listen Later Jul 30, 2023 16:28


Related blog post: https://billatnapier.medium.com/cryptography-fundamentals-commutative-encryption-19ba4c4c2173 Introduction What's at the core of cryptography? Well, the simple EX-OR holds a special place, as we can do not lose any information when we apply it. For a bitwise operation of 0 EXOR 0 gives 0, 0 EXOR 1 gives 1, 1 EXOR 0 gives 1, and 1 EXOR 1 gives 0.  And, so, cryptographers dream of the perfect cipher. And that cipher is a one-time pad. Basically, we generate a one-time use key for our plaintext, and then EX-OR them together, and then just EX-OR again with the same key and we will get our plaintext back. Unfortunately, we can only use it once and need to generate another one. So, let's see if we can generate something similar but just use the simple XOR method for our encryption and decryption. In the Tor (The Onion Router) network, data is encrypted with a key from each of the Tor routing nodes. Thus, if we have three nodes of A, B and C, with A as the entry node and C as the exit node. For this, the user will generate a separate key for each node to use and encrypt with the key of A, then the key of B, and then the key of C. The encrypted data is passed to A, and which will decrypt with its key, and pass the encrypted data onto B, and who will decrypt with its key. Finally, C will decrypt with its key, and the data will be decrypted. This protects the data as it is routed. But we have to remove the keys in the reverse order they were applied. One way to do this is with commutative encryption. Using a hasp When I worked as an electrical engineer, we had a hasp to isolate the electric power on a device we were working on: With this, each person who was working on the equipment, would put on their own padlock, and where we could not put the power back on, until all the padlocks had been taken off. The padlocks could be put on in any order, and taken off in any order, but there was no way to putting the power back on, until everyone had taken their padlock off. So how could we do this with data. Let's say that Bob, Alice and Carol want to apply their “data hasp”, so that the data cannot be revealed until they have all taken off their padlock. Well, with symmetric key block ciphers, such as AES, we cannot do this, as we must decrypt in the reverse order of they keys being applied: To encrypt: Bob → Alice → Carol … and then to decrypt: Carol → Alice →Bob There are ways to do it with RSA, such as with SRA [here], but these methods significantly reduce the security of the process. The solution is to use a stream cipher, as we basically just X-OR the data when we are encrypting, and then X-OR again with the same key when we decrypt. We can apply multiple keys to the data, and in any order and it will always decrypt properly once we have applied all the keys. What we need with commutative encryption is to have an encryption string which is the same length as the data string. To make the encryption string, we can use an XOF (eXtendable-Output Functions) and where we can create a hash value of a given size. For this, rather than the fixed hash of SHA-3, we can use the SHAKE. Or with With BLAKE2b we have an XOF of BLAKE2XB, and for BLAKE2s we have an XOF of BLAKE2XS. We can then basically have a secret passphrase, and which generates an output which matches the length of the plaintext. Another method we can use, is to generate an pseudo infinitely long encryption key which is the same length as the plaintext — in the same way that a stream cipher works. A simple application: Booking a ticket With the ever increasing number of breaches, we are moving to a world where companies should not hold any personally sensitive information, as it is just too risky. So how could we create a trustworthy system, where someone can show up with a ticket, and where we can trust it, without actually revealing any personal information about where the person has booked their seat? So how can we generate a receipt of the booking, but not give away your identity, or the details of the booking? Let's take an example of booking a seat in a theatre at the festival, and how your privacy can be respected, but where the theatre will trust the ticket. Let's say there are 100 seats in a theatre, and I want to book one of them, but I don't want the theatre company to know which seat I've booked, or my identity. I also want a receipt of purchase that they can verify my booking. One way would be to get a trusted agent to look after the bookings, but I don't trust them either. So how can we do this? Well it can be done with commutative encryption. The steps would be: Initially the theatre company generates 100 receipts for each of the seats, and then encrypts them with its public key. Next when I want to make a booking they send me the encrypted receipts that they have left, and I select one at random, and then encrypt it with my public key. I send them all back, including the one I've encrypted. The theatre checks to see which one has been changed, and then decrypts it with its private key, and sends it back to me. I decrypt with my private key, and I can now view the receipt for my booking, and the theater company cannot determine which seat I have, but I will have the receipt of my booking. So here is an example where the theatre encrypts all the seats with its key, the person then selects one, and encrypts with their key, and sends them all back again. Then the theater decrypts the one that has changed, and sends it back for the person to decrypt, and we have a booking. The theatre thus does not know who has booked the seat: Commutative encryption using ChaCha20 ChaCha20 is a stream cipher, and where we created pseudo infinitely long encryption key, and the just XOR it with the plain text. With commutative encryption, we can decrypt with the keys in any order. Normally we would encrypt with Bob's key and then encrypt with Alice's key, and then we must decrypt with Alice's key and then Bob's. In commutative encryption, we can decrypt in any order. With a stream cipher, we can automatically apply commutative as we basically just EX-OR with the key stream. In the following we use Go code, and where Bob encrypts, Alice encrypts, Bob decrypts, and then Alice decrypts [here]. And a sample run [here]: Input text: HelloBob passphrase: qwertyAlice passphrase: 123456Input text: HelloBob keygen: 65e84be33532fb784c48129675f9eff3a682b27168c0ea744b2cf58ee02337c5Alice keygen: 8d969eef6ecad3c29a3a629280e686cf0c3f5d5a86aff3ca12020c923adc6c92Cipher after Bob encrypt: d9eef8ecdcCipher after Alice encrypt: 7a5dcd0f43Cipher after Bob decrypt: ebd6598ff0Cipher after Alice decrypt: 48656c6c6fDecrypted text: Hello We can easily extend the method to Carol, Trent, and so on. In my simple example I have used the same nonce for Bob and Alice, but in real life they would use different values, and these would be random for every transaction. Commutative encryption using SHAKE-128 NIST chose Keccak as the standard for SHA-3. But, it's all a bit confusing, as there are two main versions of this: Keccak and SHA-3. Many systems, such as Ethereum have adopted Keccak, while others go for SHA-3. The only real difference between them is a difference in the padding of data. An eXtendable-Output Function (XOF) produces a bit string that can be of any length. In fact, we can create an infinitely long bit string, if required. The main methods are SHAKE128, SHAKE256, BLAKE2XB and BLAKE2XS. With the SHA-3 hashing method, we have four different cryptographic hashing methods (SHA3–224, SHA3–256, SHA3–384, and SHA3–512) and two XOF functions (SHAKE128 and SHAKE256).  With commutative encryption, we can decrypt with the keys in any order. Normally we would encrypt with Bob's key and then encrypt with Alice's key, and then we must decrypt with Alice's key and then Bob's. In commutative encryption, we can decrypt in any order. While our symmetric key block ciphers cannot be made commutative, we can use stream ciphers, as they perform an EX-OR function. In this example we will use the SHAKE128 or SHAKE256, and generate Bob and Alice's key. https://asecuritysite.com/commul/comm_stream Communicative encryption using SRA With maths, operators such as multiplication are commutative, such as: 3 x 5 x 4 = 4 x 5 x 3 In encryption, most operations are non-commutative, so we need to modify the methods. One way is to use RSA, but generate two keys which have shared p, q and N values. So we generate Bob and Alice's keys using the same two prime numbers (p and q), so that they share the same N value (modulus). So let's start with Bob: Let's select: P=7, Q=13 The calculation of n and PHI is: N = 7 x 13 = 91 PHI = (P-1)(Q-1) = 72 We need to make sure that our encryption key (e) does not share any factors with PHI (gcd(PHI,e)=1). We can select e as: e = 5 Next we can calculate d from: (d x 5) mod (72) = 1 The answer is 29 [Solve] d= 29, e=5, N=91Encryption key [91,5]Decryption key [91,29] Now for Alice. We have: N = 7 x 13 = 91PHI = (P-1)(Q-1) = 72 We can select e as (and should not share any factors with PHI): e = 7 Now we must solve: (7 x d) mod (72) = 1 For this we get 31 [Solve] Alice's keys are then: d= 31, e=7, N=91Encryption key [91,7]Decryption key [91,31] An example of this is here: https://asecuritysite.com/commul/comm2 Commutative encryption using Massey-Omura  As we have seen, commutative encryption allows us to decrypt in any order. For this we can use Massey–Omura Cryptosystem and generate encryption keys which share a prime number. One classic patent for commutative encryption was written by James Massey and Jim K. Omura created the Massey–Omura Cryptosystem in 1982 [1]. It took over three years to be assigned and was assigned to Omnet Associates [here]: It uses exponentiation in the Galois field GF(2^n) for both the encryption and decryption functions. In this, if we have a message of M, the encryption is: and This are operated on with the Galois field. For this we define e within: and we make sure that e does not share a factor with 2^n-1 using: The decryption exponent d is defined as: This works because the multiplicative group of the Galois field GF(2^n) has order 2^n−1, and where Lagrange's theorem defines that m^{de}=m for all the values of m in GF(2^n). The coding is here [link]: import libnumimport randomimport sysfrom Crypto.Util.number import getPrimefrom Crypto.Random import get_random_bytesdef chunkstring(string, length): return (string[0+i:length+i] for i in range(0, len(string), length)) def generate_keys(prime): while True: e = random.randint(0, prime-2) if libnum.gcd(e, prime-1) == 1 and e > 2: break d = libnum.invmod(e, prime-1) return e,ddef crypt(chunk, key,prime ): num = 0 for c in chunk: num *= 256 num += ord(c) res = pow(num, key, prime) vect = [] for i in range(0, len(chunk)): vect.append(chr(res%256)) res = res // 256 return "".join(reversed(vect))primebits=64msg = "HellHe"if (len(sys.argv)>1): primebits=int(sys.argv[1])if (len(sys.argv)>2): msg=(sys.argv[2])FRAGMENT_SIZE = primebits//8msg = msg + " "*((FRAGMENT_SIZE - (len(msg)%FRAGMENT_SIZE))%FRAGMENT_SIZE)res=chunkstring(msg,FRAGMENT_SIZE)PRIME = getPrime(primebits, randfunc=get_random_bytes)e,d = generate_keys(PRIME)vect=[]for elem in res: enc=str(crypt(elem, e,PRIME)) vect.append(enc)enc="".join(vect)dec=[]for elem in chunkstring(enc, FRAGMENT_SIZE): dec.append(crypt(elem, d,PRIME))print (f"Msg={msg}")print (f"e={e}, d={d}")print("Decrypted: " + "".join(dec)) A sample run is [link]: Msg=Hello e=16153579288865179167, d=10300837874192230633Decrypted: Hello One of the advantages of the Massey–Omura Cryptosystem is that we can apply commutative encryption. In this way, Bob may have keys of (e_b,d_b) and Alice has keys of (e_a,d_a). We can then apply the keys in any order, such as encrypting with e_a and then encrypting with e_b, and where we can then decrypt with d_a and then decrypt with d_b, or decrypt with d_b first and then decrypt with d_a (as we would normally do). To encrypt: Cipher=E(a_b,E(e_a,M))=E(e_a,E(e_b,M)) To decrypt: E(d_b,E(d_a,Cipher))=E(d_a,E(d_b,Cipher)) Here is an example: https://asecuritysite.com/commul/massey2 Conclusions Communative encryption is a great way of applying multiple keys to encryption data, and then for them to be removed in any order that is required. It is a little like how data is encrypted in the Tor network, but that requires the keys to be removed in the reverse order they were applied. In a future podcast, I will explain how the Tor network works.

The New World Order, Agenda 2030, Agenda 2050, The Great Reset and Rise of The 4IR
July 4th Orwellian News Flash and Decryption of the Global Matrix Programme and Narrative 2023

The New World Order, Agenda 2030, Agenda 2050, The Great Reset and Rise of The 4IR

Play Episode Listen Later Jul 4, 2023 26:06


Show Notes: July 4th Orwellian News Flash and Decryption of the Global Matrix Programme and Narrative 2023. Topics: CERN, Occult Law, Tech, Health, History , Current Affairs, Geopolitical Issues, Child Corruption, Possible Internet Outage for the Western World etc., Eschatology and Unadulterated Reality. Inconvenient Truths are also addressed in this debriefing. Please support this show by sending program donations and research support donations to : $aigner2019 (Cashapp) or Zelle(1-617-821-3168).

The Latest on the Law: Updates from the Boston Bar
Digital Forensics for Criminal Practitioners 2.0: Compelled Decryption & Biometrics

The Latest on the Law: Updates from the Boston Bar

Play Episode Listen Later Jun 12, 2023 64:10


This program will briefly review the historical origins of the compelled production of physical evidence from targets in criminal investigations to set the stage for applying this doctrine to compelled production of passcodes to digital devices and compelled use of biometrics to similarly facilitate access to digital devices.  The program will then explore the primary challenges courts have faced when applying compelled production principles in the digital space, highlighting the issues driving splits in authority nationally.  Finally, the presenters will discuss some practical considerations for employing these techniques in investigations and litigating the issues that arise as cases progress.   Questions? Inquiries about program materials? Contact Alan I. Johnson at ajohnson@bostonbar.org

ModChat
ModChat 103 - Deck HD for Steam Deck, PS5 Game Decryption Now Possible, XBHD for Original Xbox

ModChat

Play Episode Listen Later May 27, 2023 29:55


Coming back for a second episode of ModChat this month, talking about everything from a new Steam Deck hardware mod, to an odd PS4 prototype! First up is the Deck HD for the Steam Deck, a whole new screen upgrade and replacement packing a great looking punch for $99. The PS3 gets an update some people have been waiting for in the form of CCAPI compatibility working up to firmware 4.90. In a world of 60 FPS patches the PS4 gets a Force 30 FPS plugin, which we talk about the benefits of having. PS5 game decryption is now possible on firmware 4.03 consoles thanks to a new release we also discuss! The Original Xbox gets some love in the form of the upcoming XBHD device, but for who is this device exactly aimed at? Finally, we see a pretty wild looking PS4 prototype in the form of the SYRUP-11.

APOCALYPSE ROCK by Nate Budzinski
CHAPTER 51: Tiberius Talks

APOCALYPSE ROCK by Nate Budzinski

Play Episode Listen Later May 21, 2023 22:40


Doug — and seemingly the rest of the Sternum Island population — are cozy in the New Atlantis Sweat Lodge. Now who should show up but Tiberius Organ himself — new age guru and CEO of InnovoSol (among other things), and even though he's a busy man, he's got a lot to say… If you'd like to listen and/or read all the way to the conclusion of APOCALYPSE ROCK you can buy the audiobook through Audible (CA/UK/US) and the ebook on Kindle (CA/UK/US)

ITSPmagazine | Technology. Cybersecurity. Society
The Past of the Future: Pioneering Decryption with AI and Quantum Physics | A Their Story Conversation from RSA Conference 2023 | A SandboxAQ Story with Clément Jeanjean

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 20, 2023 49:26


In this Their Story podcast episode, Clément Jeanjean, Senior Director at SandboxAQ, joins Sean Martin and Marco Ciappelli to discuss the company's unique mission to combine quantum physics and artificial intelligence to address some of the world's most difficult problems in three main industries: simulation, cybersecurity, and quantum sensing. Jeanjean delves into how SandboxAQ can significantly reduce the time it takes to develop new drugs, improve cybersecurity with quantum-resistant cryptography management, and create innovative sensing capabilities in healthcare and terrestrial navigation.The conversation also covers the timeline and risks associated with the arrival of quantum computers, particularly regarding the current and future states of cryptography. Jeanjean emphasizes the growing consensus that fault-tolerant quantum computers may be available within 8 to 12 years, highlighting the challenges that major organizations face in migrating to post-quantum cryptography, which can take up to 10 years for mature organizations – possibly longer for less mature organizations.Jeanjean also describes the various industries that have started moving towards quantum-resistant cryptography, such as financial services, healthcare, telecommunications, and the public sector. He explains the need for companies to gain visibility and control over their cryptographic assets and how SandboxAQ is helping them build an inventory and prepare for the migration to post-quantum cryptography.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Clément Jeanjean, Senior Director, SandboxAQ [@SandboxAQ]On Linkedin | https://www.linkedin.com/in/clementjeanjean/On Twitter | https://twitter.com/clemjohnjohnResourcesLearn more about SandboxAQ and their offering: https://itspm.ag/sandboxaq-j2enTry SandboxAQ Security Suite: https://itspm.ag/sandbob3gyRead the Security Suite Press Release: https://itspm.ag/sandboxb3e744For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
The Past of the Future: Pioneering Decryption with AI and Quantum Physics | A Their Story Conversation from RSA Conference 2023 | A SandboxAQ Story with Clément Jeanjean

Redefining CyberSecurity

Play Episode Listen Later Apr 20, 2023 49:26


In this Their Story podcast episode, Clément Jeanjean, Senior Director at SandboxAQ, joins Sean Martin and Marco Ciappelli to discuss the company's unique mission to combine quantum physics and artificial intelligence to address some of the world's most difficult problems in three main industries: simulation, cybersecurity, and quantum sensing. Jeanjean delves into how SandboxAQ can significantly reduce the time it takes to develop new drugs, improve cybersecurity with quantum-resistant cryptography management, and create innovative sensing capabilities in healthcare and terrestrial navigation.The conversation also covers the timeline and risks associated with the arrival of quantum computers, particularly regarding the current and future states of cryptography. Jeanjean emphasizes the growing consensus that fault-tolerant quantum computers may be available within 8 to 12 years, highlighting the challenges that major organizations face in migrating to post-quantum cryptography, which can take up to 10 years for mature organizations – possibly longer for less mature organizations.Jeanjean also describes the various industries that have started moving towards quantum-resistant cryptography, such as financial services, healthcare, telecommunications, and the public sector. He explains the need for companies to gain visibility and control over their cryptographic assets and how SandboxAQ is helping them build an inventory and prepare for the migration to post-quantum cryptography.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Clément Jeanjean, Senior Director, SandboxAQ [@SandboxAQ]On Linkedin | https://www.linkedin.com/in/clementjeanjean/On Twitter | https://twitter.com/clemjohnjohnResourcesLearn more about SandboxAQ and their offering: https://itspm.ag/sandboxaq-j2enTry SandboxAQ Security Suite: https://itspm.ag/sandbob3gyRead the Security Suite Press Release: https://itspm.ag/sandboxb3e744For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Really Useful Podcast
Mobile Phone Is 50, Ransomware Decryption Explained, and ChatGPT Writes Our Podcast!

The Really Useful Podcast

Play Episode Listen Later Apr 5, 2023 46:44


Our weekly tech podcast for technophobes brings you the latest tech news that will affect you and some tips and tricks to help you get better results from your electronics. For this week's show, we asked ChatGPT to help out with outlining and even writing the show. Here's a bit more information on how we used ChatGPT to script the podcast.This week, we chat about the following tech news that matters: ChatGPT banned in Italy over privacy concerns Twitter's blue ticks disappear as Musk attacks NY Times Mobile phone inventor made first call 50 years agoThe Mother of All Demos We've got these explainers: Can All Ransomware Be Decrypted? How to Fix Games That Won't Work in Windows Reasons to Use Office Online/Microsoft 365 We finish the show with the following recommendations: RoomGPT Booom AI Quiz HelloTalk Christian Cawley hosts this week's podcast, and is joined by Ben Stegner. You can contact them on Twitter: @thegadgetmonkey and @stegnersaurus, with your suggestions for future topics.You can subscribe to the Really Useful Podcast on Apple Podcasts, Spotify, Google Podcasts, Amazon Music and Audible, Player FM, or copy the RSS feed into your podcast player. 

Progressive House UK
PHUK 4th Birthday - Danny Jarvis

Progressive House UK

Play Episode Listen Later Mar 28, 2023 111:34


Together - Hardcore Uproar - The Not Forgotten (News Report Dub) Framewerk - Popping Pills (Drugapella, Pt. 1 & 2) David Podhel - Decryption (Leichsen Remix) [Cigarette Music] Leichsen - Tenang (Original mix) [Lump Records] Kakura - Vermillion (Kamilo Sanclemente & Jossem Remix) [Manual Music]             Steve Slight - Return to Base (Anton MAKe Remix) Dowden - Hallstatt (Original Mix) [Meanwhile] Forty Cats - A Barrel of Tar (Rodrigo Lapena & Mayro Remix) Mango & Aman Anand - The Project (Subandrio Remix) [Mango Alley] Rauschhaus - Mindworm (Ruben Karapetyan Remix) [Mango Alley] Dowden & Ben Tauber - Pulsar (EMPHI Remix) [WARPP] Alto Astral & Nicholas Van Orton - Black Water (Original Mix) [Freegrant Music] Weird Sounding Dude - Fallen Poet [Movement Recordings] Amir Telem - Remain Strong (Ruben Karapetyan Remix) Da Luka & Aman Anand - Mythical Creatures (Golan Zocher & Kamilo Sanclemente Remix) [roku]  Golan Zocher & Greenage - Mind Control [Clubsonica Records]        Aman Anand & Praveen Achary - Fiasco [Juicebox Music]     Tony Wahl - Full Moon (Rodrigo AM Remix) [Rezongar Music]           Nichols - Mind Mirror [Manual Music] Andre Gazolla - Never Say Never (Aman Anand Remix) Rivellino, Kamilo Sanclemente - Evolution (Original Mix) [TALK005] Nichols - Cold Waves (Danny Jarvis Attenborough Edit) [Manual Music]

Data Protection Gumbo
185: Decrypting Ransomware: The Latest Techniques for Fighting Back - Nubeva

Data Protection Gumbo

Play Episode Listen Later Mar 7, 2023 25:15


Steve Perkins, Chief Marketing Officer at Nubeva explores how decryption is the fastest path to ransomware recovery, the steps to take when responding to a ransomware attack, and the average time and cost of a ransom.

InfosecTrain
What is Encryption and Decryption ? | Encryption & Decryption | InfosecTrain

InfosecTrain

Play Episode Listen Later Mar 1, 2023 8:12


Encryption and decryption are commonly used to protect sensitive data, such as personal or financial information, passwords, and intellectual property. They are also used to secure communications, such as emails, instant messages, and other forms of electronic communication, to ensure that only authorized recipients can read the message. #encryption #decryption #cryptographyandnetworksecurity #cryptography #encryptionanddecryption #infosectrain #networksecurity #privatekey #symmetrickkeycryptography #symmetrickencryption, #cybersecurity #asymmetricencryption Thank you for watching this video, For more details or free demo with out expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

Risky Business News
Risky Biz News: FBI hacked Hive ransomware infrastructure, stole decryption keys

Risky Business News

Play Episode Listen Later Jan 27, 2023


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast click here.

PANCastâ„¢
Should You Have SSL Decryption Enabled?

PANCastâ„¢

Play Episode Listen Later Jan 18, 2023 9:11


What is SSL decryption, when you should be decrypting traffic through your firewall, and some tips for configuring and troubleshooting SSL decryption.

Security In Five Podcast
Episode 1337 - Hackers Give SickKids Hospital Free Decryption Key And An Apology

Security In Five Podcast

Play Episode Listen Later Jan 9, 2023 6:37


This episode talks about a story out of Canada and a hacking attack against the Hospital for Sick Kids (SickKids). The interesting part is the hacking group issued an apology and gave the decrypter tool for free to them. Listen to find out why. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - https://www.patreon.com/SecurityInFive *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Mighty Mackenzie - https://www.facebook.com/mightymackie Where you can find Security In Five - https://linktr.ee/binaryblogger Email - bblogger@protonmail.com

Security Now (MP3)
SN 898: Wi-Peep - FBI purchased Pegasus, Passkey support directory, Quantum decryption deadline, Firefox 107

Security Now (MP3)

Play Episode Listen Later Nov 23, 2022 136:34


Picture of the Week. Firefox v107 was released last Tuesday. Google settles for a cool $391.5 million. Red Hat Signing its ZIP file Packages. The FBI purchased Pegasus for "research and development purposes". Greece bought Predator for €7 million. A passkeys support directory. Quantum decryption deadline. Attorneys General ask the FTC for online privacy regulation. Closing The Loop. SpinRite. Wi-Peep. Show Notes https://www.grc.com/sn/SN-898-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: tanium.com/twit barracuda.com/securitynow Secureworks.com/twit

Security Now (Video HI)
SN 898: Wi-Peep - FBI purchased Pegasus, Passkey support directory, Quantum decryption deadline, Firefox 107

Security Now (Video HI)

Play Episode Listen Later Nov 23, 2022 136:34


Picture of the Week. Firefox v107 was released last Tuesday. Google settles for a cool $391.5 million. Red Hat Signing its ZIP file Packages. The FBI purchased Pegasus for "research and development purposes". Greece bought Predator for €7 million. A passkeys support directory. Quantum decryption deadline. Attorneys General ask the FTC for online privacy regulation. Closing The Loop. SpinRite. Wi-Peep. Show Notes https://www.grc.com/sn/SN-898-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: tanium.com/twit barracuda.com/securitynow Secureworks.com/twit

Security Now (Video HD)
SN 898: Wi-Peep - FBI purchased Pegasus, Passkey support directory, Quantum decryption deadline, Firefox 107

Security Now (Video HD)

Play Episode Listen Later Nov 23, 2022 136:34


Picture of the Week. Firefox v107 was released last Tuesday. Google settles for a cool $391.5 million. Red Hat Signing its ZIP file Packages. The FBI purchased Pegasus for "research and development purposes". Greece bought Predator for €7 million. A passkeys support directory. Quantum decryption deadline. Attorneys General ask the FTC for online privacy regulation. Closing The Loop. SpinRite. Wi-Peep. Show Notes https://www.grc.com/sn/SN-898-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: tanium.com/twit barracuda.com/securitynow Secureworks.com/twit

Security Now (Video LO)
SN 898: Wi-Peep - FBI purchased Pegasus, Passkey support directory, Quantum decryption deadline, Firefox 107

Security Now (Video LO)

Play Episode Listen Later Nov 23, 2022 136:34


Picture of the Week. Firefox v107 was released last Tuesday. Google settles for a cool $391.5 million. Red Hat Signing its ZIP file Packages. The FBI purchased Pegasus for "research and development purposes". Greece bought Predator for €7 million. A passkeys support directory. Quantum decryption deadline. Attorneys General ask the FTC for online privacy regulation. Closing The Loop. SpinRite. Wi-Peep. Show Notes https://www.grc.com/sn/SN-898-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: tanium.com/twit barracuda.com/securitynow Secureworks.com/twit

From The Void Podcast
Steve Hodel "The Black Dahlia Avenger: The Early Murders" Part 2

From The Void Podcast

Play Episode Listen Later Nov 14, 2022 48:08


Guest Info/Bio: This week I welcome back retired detective, Steve Hodel. Steve is the author of multiple books based on his research into his own father and his connection to Elizabeth Short aka the Black Dahlia. We discuss his two new books, "The Early Years: The Further Serial Crimes of George Hill Hodel M.D. (Part I - The 1920s & Part II - The 1930s).Guest (select) Publications: Black Dahlia Avenger: A Genius for Murder: The True Story; Black Dahlia Avenger II: Presenting the Follow-Up Investigation and Further Evidence Linking Dr. George Hill Hodel to Los Angeles's Black Dahlia and other 1940's Lone Woman Murders; Most Evil: The Further Serial Murders of Dr. George Hodel; Black Dahlia III: Murder as a Fine Art: Presenting the Further Evidence Linking Dr. George Hill Hodel to the Black Dahlia and Other Lone Woman Murders; Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cypher in Which the San Francisco Serial Killer Reveals His True Identity. Guest Links: www.stevehodel.com Twitter: @stevehodelIBDA Check out the Root of Evil podcast for more on Steve and his family Stay on top of all the latest by following the show at:Instagram: @thefromthevoidpodastFacebook: @thefromthevoidpodcastTwitter: @thefromthevoidpodcast The From the Void Podcast is written, edited, mixed, and produced by John Williamson. Support this podcast at — https://redcircle.com/from-the-void-podcast/donations

From The Void Podcast
Steve Hodel "The Black Dahlia Avenger: The Early Murders" Part 1

From The Void Podcast

Play Episode Listen Later Nov 7, 2022 45:58


Guest Info/Bio: This week I welcome back retired detective, Steve Hodel. Steve is the author of multiple books based on his research into his own father and his connection to Elizabeth Short aka the Black Dahlia. We discuss his two new books, "The Early Years: The Further Serial Crimes of George Hill Hodel M.D. (Part I - The 1920s & Part II - The 1930s).Guest (select) Publications: Black Dahlia Avenger: A Genius for Murder: The True Story; Black Dahlia Avenger II: Presenting the Follow-Up Investigation and Further Evidence Linking Dr. George Hill Hodel to Los Angeles's Black Dahlia and other 1940's Lone Woman Murders; Most Evil: The Further Serial Murders of Dr. George Hodel; Black Dahlia III: Murder as a Fine Art: Presenting the Further Evidence Linking Dr. George Hill Hodel to the Black Dahlia and Other Lone Woman Murders; Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cypher in Which the San Francisco Serial Killer Reveals His True Identity. Guest Links: www.stevehodel.com Twitter: @stevehodelIBDA Check out the Root of Evil podcast for more on Steve and his family Stay on top of all the latest by following the show at:Instagram: @thefromthevoidpodastFacebook: @thefromthevoidpodcastTwitter: @thefromthevoidpodcast The From the Void Podcast is written, edited, mixed, and produced by John Williamson. Support this podcast at — https://redcircle.com/from-the-void-podcast/donations

Security In Five Podcast
Episode 1294 - Police Flip The Tables On Ransomware Group And Trick Them For The Decryption Keys

Security In Five Podcast

Play Episode Listen Later Oct 19, 2022 5:45


Ransomware is an ongoing battle. Like any piece of software the ransomware groups are not perfect. This episode talk about how one police department found a flaw and used it against a ransomware group. Be aware, be safe. Support the show and get access to behind the scenes content as a patron - https://www.patreon.com/SecurityInFive *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Mighty Mackenzie - https://www.facebook.com/mightymackie Where you can find Security In Five - https://linktr.ee/binaryblogger Email - bblogger@protonmail.com

[#Let'sTalk] The Mazars podcast about doing business in the time of Covid-19.
Let's talk sustainability - #EP05: Decryption of the Sixth IPCC climate report: no time left for half measures

[#Let'sTalk] The Mazars podcast about doing business in the time of Covid-19.

Play Episode Listen Later Apr 20, 2022 15:34


Explore our interview with Louis-Henri Devant, Sustainability Development Manager, who leads on Mazars' sustainable transformation services for businesses. The recently published second part of the Sixth Assessment Report of the Intergovernmental Panel on Climate Change (IPCC) expresses major concerns for the global climate situation, and challenges us on global warming, and the direct consequences on our lifestyles, populations and ecosystems. Louis-Henri highlights the key messages of this report, which urges businesses to take action.

David Bombal
#364: TLS Handshake Deep Dive and decryption with Wireshark // SSL Key Exchange Explained

David Bombal

Play Episode Listen Later Mar 31, 2022 65:39


Hacking the TLS Handshake and decryption with Wireshark // SSL Deep Dive 50,157 views Mar 25, 2022 Warning! We go deep in this video to explain how the TLS handshake is completed. Warning! This is a technical deep dive and covers a lot of detail including SSL decryption and discusses RSA, Public and Private Keys, symmetric key exchange and lots more. // Wireshark pcap // https://davidbombal.wiki/tlsedpcap // Ed's TLS course // https://davidbombal.wiki/edtls49 Use coupon code: "BombalTLS" to get for $49 // MENU // 00:00 ▶️ Introduction 02:11 ▶️ How SSL/TLS is shown in a browser 02:40 ▶️ Pre-Requisites 05:15 ▶️ Data Integrity/Hashing 06:27 ▶️ Potential Problems with Hashing/man in-the-middle attack 07:32 ▶️ Message Authentication Code 10:09 ▶️ Prerequisites continued 11:51 ▶️ Symmetric Encryption 12:45 ▶️ Asymmetric Encryption 17:00 ▶️ Private and Public Keys 20:05 ▶️ Signatures 21:55 ▶️ Protocols 22:50 ▶️ SSL/TLS Handshake, Client Hello and Server Hello 28:35 ▶️ Client Hello and Server Hello in Wireshark 34:09 ▶️ Certificate 35:12 ▶️ Server Done 35:35 ▶️ Server Hello, Certificate, Server Hello Done in Wireshark 36:51 ▶️ Client Key Exchange 50:26 ▶️ Client Key Exchange in Wireshark 51:39 ▶️ Client Change Cipher Spec and Finished/Encrypted Verification 54:08 ▶️ Server Change Cipher Spec and Finished/Encrypted 56:10 ▶️ SSL/TLS Handshake in Wireshark 57:44 ▶️ Decrypting a PreMaster Key with a Private Key in Wireshark 1:03:15 ▶️ Where to get in contact with Ed to learn more // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Ed's SOCIAL // Twitter: https://twitter.com/ed_pracnet YouTube: https://www.youtube.com/channel/UCKmU... // Ed's TLS course // https://davidbombal.wiki/edtls49 Use coupon code: "BombalTLS" to get for $49 // More detail on Ed's YouTube channel and website // Asymmetric Encryption explained from a Practical Perspective: https://www.practicalnetworking.net/p... RSA Algorithm: https://www.youtube.com/watch?v=Pq8gN... DH Algorithm: https://www.youtube.com/watch?v=KXq06... Practical TLS - Crypto & SSL/TLS foundation: https://www.youtube.com/playlist?list... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com tls tls decryption ssl crypto cryptography ssl decryption tls wireshark tls decryption wireshark tls tunnel tls handshake tlsp tls explained tls tunnel vpn tls protocol tls handshake explained tls 1.3 TLS Transport Layer Security Handshake TLS Handshake Crypto Cryptography security wireshark wireshark tutorial wireshark packet analysis tls decryption tls decryption wireshark tls 1.3 decryption tls decryption wireshark tls tunnel vpn free internet tls decryption palo alto Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #tls #ssl #wireshark

Hack Naked News (Video)
Crypto Megaheists, Sim Swaps, Maze Decryption, & Infected Win 11 Installers - Wrap Up - SWN #186

Hack Naked News (Video)

Play Episode Listen Later Feb 11, 2022 32:01


This week in the Security Weekly News: Dr. Doug talks Crypto and more crypto, Sim swapping, Maze resigns, Win 11 scam, Tesla, and all the Wrap-Ups on the Security Weekly News!   Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn186

Paul's Security Weekly
Maze Decryption, Sim Swaps, Crypto Megaheists, & Infected Win 11 Installers - Wrap Up - SWN #186

Paul's Security Weekly

Play Episode Listen Later Feb 11, 2022 31:57


This week in the Security Weekly News: Dr. Doug talks Crypto and more crypto, Sim swapping, Maze resigns, Win 11 scam, Tesla, and all the Wrap-Ups on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn186  

Hack Naked News (Audio)
Maze Decryption, Sim Swaps, Crypto Megaheists, & Infected Win 11 Installers - Wrap Up - SWN #186

Hack Naked News (Audio)

Play Episode Listen Later Feb 11, 2022 31:57


This week in the Security Weekly News: Dr. Doug talks Crypto and more crypto, Sim swapping, Maze resigns, Win 11 scam, Tesla, and all the Wrap-Ups on the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/swn186  

Being a pro
A beginner's intro to Encryption and Decryption in cryptography | Tharun Shiv

Being a pro

Play Episode Listen Later Jan 7, 2022 8:58


Encryption and it's types, decryption

David Bombal
#337: HTTPS Decryption With Wireshark | Website TLS Decryption

David Bombal

Play Episode Listen Later Nov 25, 2021 31:13


HTTPS Decryption with Wireshark // Website TLS Decryption NOTE: Jump to 24:17 if you are only interested in the Wireshark capture and SSL decryption technical explanation. You can also follow along by downloading the Wireshark pcap using the link below. Learn how to decrypt TLS / HTTPS traffic using Wireshark. // MENU // Is it important to learn Wireshark: 0:00 Will you get a better job? 2:19 Welcome Chris: 3:16 Defcon presentation: 3:40 Why TLS decryption: 5:44 Wireshark capture: 7:20 What is SSL and TLS: 8:26 How do you get the capture (Man in the middle): 9:44 Key exports for Wireshark: 11:03 Which keys are stored in the keylog: 13:56 Client and server key generation: 15:55 Process - keys and wireshark: 18:10 Wireshark capture explained: 21:00 TLS negotiation and Wireshark details: 24:17 How to import the keys into Wireshark: 29:04 // LINKS // PCAP file: https://davidbombal.wiki/ssldecryptio... How to Decrypt SSL with Wireshark – HTTPS Decryption Guide: https://davidbombal.wiki/sslwireshark Man in the middle Python script: https://youtu.be/O1jpck31Ask Chris TLS decryption: https://youtu.be/5qecyZHL-GU Intro to Wireshark: https://youtu.be/OU-A2EmVrKQ // MY STUFF // https://www.amazon.com/shop/davidbombal // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal //CHRIS GREER // LinkedIn: https://www.linkedin.com/in/cgreer/ YouTube: https://www.youtube.com/c/ChrisGreer Twitter: https://twitter.com/packetpioneer Pluralsight: TCP Analysis Course: https://davidbombal.wiki/tcpwireshark // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com wireshark tls ssl http https https decryption tls decryption wireshark tls wireshark ssl https wireshark tls wireshark ssl wireshark ccna cisco ccna Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #wireshark #tls #https

From The Void Podcast
Steve Hodel "George Hodel & The Black Dahlia pt. 2"

From The Void Podcast

Play Episode Listen Later Nov 15, 2021 44:29


Guest Info/Bio: This week I welcome retired detective, Steve Hodel. Steve is the author of multiple books based on his research into his own father and his connection to Elizabeth Short aka the Black Dahlia. We also discuss his father's potential connection other unsolved murders. Guest (select) Publications: Black Dahlia Avenger: A Genius for Murder: The True Story; Black Dahlia Avenger II: Presenting the Follow-Up Investigation and Further Evidence Linking Dr. George Hill Hodel to Los Angeles's Black Dahlia and other 1940's Lone Woman Murders; Most Evil: The Further Serial Murders of Dr. George Hodel; Black Dahlia III: Murder as a Fine Art: Presenting the Further Evidence Linking Dr. George Hill Hodel to the Black Dahlia and Other Lone Woman Murders; Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cypher in Which the San Francisco Serial Killer Reveals His True Identity. Guest Links: www.stevehodel.com Twitter: @stevehodelIBDA Check out the Root of Evil podcast for more on Steve and his family Stay on top of all the latest by following the show at:Instagram: @thefromthevoidpodastFacebook: @thefromthevoidpodcastTwitter: @thefromthevoidpodcast The From the Void Podcast is written, edited, mixed, and produced by John Williamson. 

From The Void Podcast
Steve Hodel "George Hodel & The Black Dahlia pt. 1"

From The Void Podcast

Play Episode Listen Later Nov 8, 2021 32:04


Guest Info/Bio: This week I welcome retired detective, Steve Hodel. Steve is the author of multiple books based on his research into his own father and his connection to Elizabeth Short aka the Black Dahlia. We also discuss his father's potential connection other unsolved murders. Guest (select) Publications: Black Dahlia Avenger: A Genius for Murder: The True Story; Black Dahlia Avenger II: Presenting the Follow-Up Investigation and Further Evidence Linking Dr. George Hill Hodel to Los Angeles's Black Dahlia and other 1940's Lone Woman Murders; Most Evil: The Further Serial Murders of Dr. George Hodel; Black Dahlia III: Murder as a Fine Art: Presenting the Further Evidence Linking Dr. George Hill Hodel to the Black Dahlia and Other Lone Woman Murders; Most Evil II: Presenting the Follow-Up Investigation and Decryption of the 1970 Zodiac Cypher in Which the San Francisco Serial Killer Reveals His True Identity. Guest Links: www.stevehodel.com Twitter: @stevehodelIBDA Check out the Root of Evil podcast for more on Steve and his family Stay on top of all the latest by following the show at:Instagram: @thefromthevoidpodastFacebook: @thefromthevoidpodcastTwitter: @thefromthevoidpodcast The From the Void Podcast is written, edited, mixed, and produced by John Williamson. 

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 11 - Ransomware Decryption Tools, Dark Escrow, Fake Job Scams, Glenn Meets an NBA Superstar

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Jun 7, 2021 39:40


Programming note: Since we released two episodes last week, both episodes may not have been downloaded due to your podcast app settings.  Please manually download the episode if you missed it! Welcome to this week's episode of the PEBCAK Podcast!  We've got three amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) PEBCAK - Acronym of “problem exists between chair and keyboard.”   Emsisoft develops a fast and reliable ransomware decryption tool https://www.bleepingcomputer.com/news/security/ransomware-gangs-slow-decryptors-prompt-victims-to-seek-alternatives/ https://www.computerworld.com/article/3619209/heres-what-you-can-do-about-ransomware.html   Dark Escrow is on the rise as ransomware crews turn to a Ransomware as a Service model https://www.digitalshadows.com/blog-and-research/escrow-systems-on-cybercriminal-forums/ https://www.bleepingcomputer.com/news/security/darkside-affiliates-claim-gangs-bitcoin-deposit-on-hacker-forum/   Fake job scams are on the rise due to the global pandemic and ways to spot one https://krebsonsecurity.com/2021/05/how-to-tell-a-job-offer-from-an-id-theft-trap/ https://krebsonsecurity.com/2020/03/coronavirus-widens-the-money-mule-pool/   The hosts meet famous people   Dad Joke of the Week (DJOW)   Remember, your chances of getting sunburned this summer went down by 20% now that you've listened to the podcast.  If you know anyone else who would like a 20% less chance of getting sunburn, please share this podcast with them!   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/

The Smart 7 Ireland Edition
Ep 53. Decryption tool offered as Govt refuses to pay HSE ransom, Ceasefire in Gaza after 11 days and Prince Williams condemns BBC after damning report...

The Smart 7 Ireland Edition

Play Episode Listen Later May 21, 2021 7:37


Today's episode includes the following:https://twitter.com/VirginMediaNews/status/1395431626293743618?s=20https://twitter.com/gavreilly/status/1395434272916443150?s=20https://twitter.com/rtenews/status/1395488450640551936?s=20https://twitter.com/Channel4News/status/1395458674349514758?s=20https://twitter.com/SkyNews/status/1395425535447248902?s=20https://twitter.com/KensingtonRoyal/status/1395484854272335875?s=20https://www.youtube.com/channel/UCjXIw1GlwaY1IzpW_jN9iCQhttps://www.itv.com/news/2021-05-20/i-owe-so-much-to-this-place-blurs-damon-albarn-prepares-to-play-for-glastonburys-cowshttps://twitter.com/PopCrave/status/1394669965618421761?s=20The Smart 7 Ireland Edition is a daily podcast that puts your brain into gear by telling you everything you need to know for the day in less than 7 minutes. It's a snapshot of the world, covering everything from politics to entertainment, via sport and current affairs.Please follow and spread the word!You need the Smarts? We've got the Smarts.Why not try The Sport 7 too?How about Science and Tech? Guess what - The Science 7!Contact us over at Twitter or visit www.thesmart7.comPresented by Paul ConnollyWritten, Produced and published by Daft Doris. See acast.com/privacy for privacy and opt-out information.

Packet Pushers - Full Podcast Feed
Network Break 272: Dell Technologies Sells RSA; Nubeva Cracks TLS 1.3 With Out-Of-Band Decryption

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Feb 24, 2020 61:57


The latest Network Break podcast analyzes Dell Technologies' sale of its RSA business unit; what sponsor cancellations at the RSA Conference might mean for large tech events going forward; Arista Networks' financial results; new capabilities in products from ExtraHop, Nubeva, and Spirent; and more tech news.

Packet Pushers - Network Break
Network Break 272: Dell Technologies Sells RSA; Nubeva Cracks TLS 1.3 With Out-Of-Band Decryption

Packet Pushers - Network Break

Play Episode Listen Later Feb 24, 2020 61:57


The latest Network Break podcast analyzes Dell Technologies' sale of its RSA business unit; what sponsor cancellations at the RSA Conference might mean for large tech events going forward; Arista Networks' financial results; new capabilities in products from ExtraHop, Nubeva, and Spirent; and more tech news.

Packet Pushers - Fat Pipe
Network Break 272: Dell Technologies Sells RSA; Nubeva Cracks TLS 1.3 With Out-Of-Band Decryption

Packet Pushers - Fat Pipe

Play Episode Listen Later Feb 24, 2020 61:57


The latest Network Break podcast analyzes Dell Technologies' sale of its RSA business unit; what sponsor cancellations at the RSA Conference might mean for large tech events going forward; Arista Networks' financial results; new capabilities in products from ExtraHop, Nubeva, and Spirent; and more tech news.

WP Builds
WP Builds Newsletter #83 – WordPress 5.3 Beta 2, WordCamp U.S. tickets and Facebook decryption

WP Builds

Play Episode Listen Later Oct 7, 2019 26:53


This weeks WordPress news - Covering The Week Commencing 30th September 2019

WP Builds
WP Builds Newsletter #83 – WordPress 5.3 Beta 2, WordCamp U.S. tickets and Facebook decryption

WP Builds

Play Episode Listen Later Oct 7, 2019 26:53


This weeks WordPress news - Covering The Week Commencing 30th September 2019

The Commercial Awareness Podcast
Episode 7: JPMorgan Chase, Huawei Criminal Indictment, Whatsapp Decryption Laws and more

The Commercial Awareness Podcast

Play Episode Listen Later Jan 18, 2019 5:41


Episode seven details stories concerning M&S closures, a JPMorgan Chase divisional merger, Ford and Volkswagen's partnership, Latham and Watkins, a potential German private lender merger, alleged foreign exchange market manipulation, Huawei's impending indictment, Hitachi abandoning a power plant development, and Whatsapp protesting decryption laws. Links for the stories M&S closure https://news.sky.com/story/more-than-1000-marks-spencer-jobs-at-risk-11607985 JPMorgan Chase Divisional Merger https://www.ft.com/content/57f340a2-1a7c-11e9-9e64-d150b3105d21 Ford and Volkswagen Partnership https://news.sky.com/story/vw-and-ford-agree-van-and-pick-up-partnership-11608151 New Look Restructuring https://www.thelawyer.com/new-look-restructuring-saga-continues-with-new-firm-line-up/ Potential German Private Lender Merger https://www.ft.com/content/7d145738-19b2-11e9-9e64-d150b3105d21 Quinn High Court Claim over FX Manipulation https://www.thelawyer.com/slaughters-and-ao-among-high-profile-cohort-battling-quinn-fx-claim/ Huawei US Indictment https://techcrunch.com/2019/01/16/huawei-doj-t-mobile-tappy/ Hitachi Abandons Nuclear Power Plant https://www.ft.com/content/059b81fe-1a39-11e9-9e64-d150b3105d21 Whatsapp Battles Decryption Laws https://www.ft.com/content/8adc2b8c-1a4a-11e9-9e64-d150b3105d21 Contact: commawarepod@gmail.com

iReadit
#55 - Apple's Decryption of San Bernadeener

iReadit

Play Episode Listen Later Feb 18, 2016 27:33


#10 - Ryan Reynolds and the marketing team for Deadpool   #9 - Illegal photo, off-limits shop in North Korea. I had 15 seconds to take this picture before my guide realised I wasn't around   #8 - Investigators from the U.S. Department of Labor discovered that a Kalamazoo restaurant was requiring wait staff to pay $2 an hour from tips to continue to work   #7 - meanwhile in alaska...   #6 - Faced with a cash shortage in its so-called caliphate, the Islamic State group has slashed salaries across the region, asked Raqqa residents to pay utility bills in black market American dollars, and is now releasing detainees for a price of $500 a person.   #5 - I... I didn't make that.   #4 - Thank you Apple: Battling The FBI for Consumer Rights   #3 - A Message to Our Customers   #2 - Google's CEO just sided with Apple in the encryption debate   #1 - Apple CEO Tim Cook directly responds to court order requiring decryption of San Bernardino shooter's iPhone     Outro Thanks Show contact E-mail: feedback.ireadit@gmail.com Twitter: @ireaditcast Phone: (508)-738-2278   Michael Schwahn: @schwahnmichael Nathan Wood: @bimmenstein "Music" Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/

BSD Now
44: Base ISO 100

BSD Now

Play Episode Listen Later Jul 2, 2014 105:04


This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD. This episode was brought to you by Headlines pfSense 2.1.4 released (https://blog.pfsense.org/?p=1377) The pfSense team (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) has released 2.1.4, shortly after 2.1.3 - it's mainly a security release Included within are eight security fixes, most of which are pfSense-specific OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so) It also includes a large number of various other bug fixes Update all your routers! *** DragonflyBSD's pf gets SMP (http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html) While we're on the topic of pf... Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas Stemming from a user's complaint (http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html), Matthew Dillon did his own work on pf to make it SMP-aware Altering your configuration (http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html)'s ruleset can also help speed things up, he found When will OpenBSD, the source of pf, finally do the same? *** ChaCha usage and deployment (http://ianix.com/pub/chacha-deployment.html) A while back, we talked to djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5 This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20 OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not Unfortunately, this article has one mistake: FreeBSD does not use it (https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html) - they still use the broken RC4 algorithm *** BSDMag June 2014 issue (http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue) The monthly online BSD magazine releases their newest issue This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities The free pdf file is available for download as always *** Interview - Craig Rodrigues - rodrigc@freebsd.org (mailto:rodrigc@freebsd.org) FreeBSD's continuous (https://wiki.freebsd.org/Jenkins) testing (https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p) infrastructure (https://jenkins.freebsd.org/jenkins/) Tutorial Creating pre-patched OpenBSD ISOs (http://www.bsdnow.tv/tutorials/stable-iso) News Roundup Preauthenticated decryption considered harmful (http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful) Responding to a post (https://www.imperialviolet.org/2014/06/27/streamingencryption.html) from Adam Langley, Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) talks a little more about how signify and pkg_add handle signatures In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns With signify, now everything is fully downloaded and verified before tar is even invoked The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post Be sure to also read the original post from Adam, lots of good information *** FreeBSD 9.3-RC2 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html) As the -RELEASE inches closer, release candidate 2 is out and ready for testing Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things The updated bsdconfig will use pkgng style packages now too A lesser known fact: there are also premade virtual machine images you can use too *** pkgsrcCon 2014 wrap-up (http://saveosx.org/pkgsrcCon/) In what may be the first real pkgsrcCon article we've ever had! Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event Unfortunately no recordings to be found... *** PostgreSQL FreeBSD performance and scalability (https://kib.kiev.ua/kib/pgsql_perf.pdf) FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings Lots of technical details if you're interested in getting the best performance out of your hardware It also includes specific kernel options he used and the rest of the configuration If you don't want to open the pdf file, you can use this link (https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf) too *** Feedback/Questions James writes in (http://slexy.org/view/s24pFjUPe4) Klemen writes in (http://slexy.org/view/s21OogIgTu) John writes in (http://slexy.org/view/s21rLcemNN) Brad writes in (http://slexy.org/view/s203Qsx6CZ) Adam writes in (http://slexy.org/view/s2eBj0FfSL) ***