Podcasts about encrypted

Process of converting plaintext to ciphertext

  • 441PODCASTS
  • 733EPISODES
  • 38mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 21, 2025LATEST
encrypted

POPULARITY

20172018201920202021202220232024


Best podcasts about encrypted

Latest podcast episodes about encrypted

Encrypted
#EP107:"Celestia Unpacked: Mustafa Al-Bassam On Modular Blockchains, and What's Next for Scaling.”

Encrypted

Play Episode Listen Later May 21, 2025 40:35


Roberta Glass True Crime Report
What Are They Hiding?! Karen Read's ARCCA Defense Witnesses Talked to Defense on Encrypted App!

Roberta Glass True Crime Report

Play Episode Listen Later Apr 28, 2025 92:32


Karen Read's trial got lit on Monday, when Karen Read's accident reconstructionist, Daniel Wolfe took the stand in yet another voire dire in which he came empty handed. Wolfe testified unbelievably that he couldn't retrieve his text messages exchanges with the defense. He said he switched carriers, talked on the encrypted app Signal (Karen Read's preferred method of communication with her defense atorneys and Aidan Kearney). Signal has a feature that auto-deletes their texts. Wolfe was also struck with sudden onset amnesia at other times, answering “I don't recall” to a majority of Mr Brennan's questions. Also, Ian Whiffen from Cellebrite took the stand. Testifying that Jen McCabe's “Hos long to die in the cold” took place at 6:23 & 6:24 am. Whiffen also testified that John O'Keefe's body never left the flag pole area and his phone was unlocked for the last time after he looked at a text message from Jen McCabe shortly before being struck by Karen Read's vehicle.Get access to exclusive content & support the podcast by becoming a Patron today! https://patreon.com/robertaglasstruecrimereport Throw a tip in the tip jar! https://buymeacoffee.com/robertaglassSupport Roberta by sending a donation via Venmo. https://venmo.com/robertaglassShow Notes: Roberta Glass True Crime Report "Karen Read Retrial Day 5" https://www.youtube.com/live/Z1AsLbfxJMs?si=Fgf0Y8dvu3wdXPE_Thank you Patrons! Hannna, Christy, Jen Buell, Elle Solari, Carol Cardella, Jennifer Harmon, DoxieMama65, Carol Holderman, Joan Mahon, Marcie Denton, Rosanne Aponte, Johnny Jay, Jude Barnes, JenTheRN, Victoria Devenish, Jeri Falk, Kimberly Lovelace, Penni Miller, Jil, Janet Gardner, Jayne Wallace (JaynesWhirled), Pat Brooks, Jennifer Klearman, Judy Brown, Linda Lazzaro, Suzanne Kniffin, Susan Hicks, Jeff Meadors, D Samlam, Pat Brooks, Cythnia, Bonnie Schoeneman-Dilley, Diane Larsen, Mary, Kimberly Philipson, Cat Stewart, Cindy Pochesci, Kevin Crecy, Renee Chavez, Melba Pourteau, Julie K Thomas, Mia Wallace, Stark Stuff, Kayce Taylor, Alice, Dean, GiGi5, Jennifer Crum, Dana Natale, Bewildered Beauty, Pepper, Joan Chakonas, Blythe, Pat Dell, Lorraine Reid, T.B., Melissa, Victoria Gray Bross, Toni Woodland, Danbrit, Kenny Haines and Toni Natalie

HeroicStories
How Do I Know If My Hard Disk Is BitLocker-Encrypted?

HeroicStories

Play Episode Listen Later Apr 24, 2025 6:46


Your hard disk could be BitLocker encrypted without your knowledge.

The Tara Show
Assassins, Encrypted Messages, and Ukraine The Shadow War Against Trump

The Tara Show

Play Episode Listen Later Apr 22, 2025 8:20


A newly unsealed FBI affidavit reveals chilling details: a Wisconsin teen who killed his parents and plotted to assassinate Donald Trump was communicating with a Ukrainian contact over Telegram. This marks the second Trump-related assassination attempt linked to Ukraine—raising disturbing questions. Why are multiple suspects tied to the same foreign players? With connections to encrypted networks, foreign operatives, and even the Azov Battalion, the thread winds through cartels, Iran, and Ukraine. As the FBI stonewalls Congress, refusing to release 33,000 pages, this exposé uncovers a dark web of geopolitical hostility targeting a former U.S. president.

Adam and Jordana
Sheriff Witt says encrypted police comminutions are needed

Adam and Jordana

Play Episode Listen Later Apr 15, 2025 26:09


Hennepin County Sheriff Dawanna Witt joins Adam and Jordana in studio.

Time to Lean...And Here's a Song!
99: Tales of the Encrypted

Time to Lean...And Here's a Song!

Play Episode Listen Later Apr 13, 2025 78:52


The ramp-up to our hundredth episode continues! John is drinking Larceny Barrel Proof We say adieu to Skype. A brief chat about early music videos and 80s HBO. We remember the voice actor, George Lowe from Space Ghost Coast to Coast Part 2 of Phil's award-winning segment:  “Things I Didn't Know”! John does another “Old Tech” segment about the golden age of cable television, aka “Cable TV”.  BONUS: A bit of 80s KWGN Denver talk. John talks about “Severance”, “The Righteous Gemstones”, and rewatching the Lord of the Rings trilogy.   Song Title: “Tool of Choice”

The Watchman Privacy Podcast
173 - NanoGPT: Overlord Intermediary

The Watchman Privacy Podcast

Play Episode Listen Later Apr 13, 2025 55:27


Gabriel Custodiet speaks with Milan Dereede of NanoGPT. The website allows you to access hundreds of popular AI services without creating an account, with an affordable pay-per-prompt service, and with some privacy benefits. Milan explains the details of the service as well as giving some reflections on practical AI use from a hardcore user.   GUEST → https://nano-gpt.com/   → https://x.com/milan_dereede   WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy  → https://escapethetechnocracy.com/  CRYPTO DONATIONS →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy (Monero) →https://btcpay0.voltageapp.io/apps/3JDQDSj2rp56KDffH5sSZL19J1Lh/pos (BTC) TIMELINE 00:00 – Introduction 2:45 – Origins of NanoGPT 4:50 – Benefits of NanoGPT 8:42 – Pay-per-prompt system 11:30 – Are the expensive models that great? 13:30 – Any models you don't have? 15:00 – Ownership while using NanoGPT 16:40 – NanoGPT privacy policy 19:15 – Account vs non-account 21:30 – Missing features of AI services in NanoGPT 25:05 – Overall privacy abuses by AI companies 26:55 – Needle in a haystack privacy  29:00 – Best coding model 31:30 – Cultural differences in AI models 33:50 – AI censorship 38:00 – Favorite text and image models 40:30 – API abuse  42:35 – Video model issues 44:45 – Encrypted sync (in the works) 46:00 – Thoughts on private accounts 49:00 – Nano cryptocurrency 50:55 – Models offline by default 52:40 – Final thoughts Music by Karl Casey @ White Bat Audio

HeroicStories
I Use BitLocker. Are My Backups Encrypted?

HeroicStories

Play Episode Listen Later Apr 11, 2025 12:03


It's important to understand when backups of encrypted drives are encrypted and when they're not.

The Tech Blog Writer Podcast
3234: Arcium and the Rise of Encrypted Supercomputing

The Tech Blog Writer Podcast

Play Episode Listen Later Apr 7, 2025 35:02


What if the internet could run fully encrypted computations without sacrificing performance or control? In this episode of Tech Talks Daily, I sit down with Yannik Schrade, CEO and Co-Founder of Arcium, to explore how confidential computing is reshaping the future of digital infrastructure. Arcium is building what Yannik describes as an encrypted supercomputer, a decentralized network that allows data to stay encrypted even during processing. This approach gives developers and organizations a way to build privacy-first applications across sectors like healthcare, finance, artificial intelligence, and government services. We talk through how Arcium leverages secure multi-party computation to make this possible and why that matters in a world where sensitive data is often a liability. Yannik explains how Arcium enables companies to collaborate without revealing proprietary data, and how it allows for mathematically provable trust in digital processes. From private order books in financial systems to AI models that train on encrypted health data, the scope of this technology is already expanding into real-world use cases. We also explore the importance of decentralization, not just as a technical feature, but as a way to reframe the conversation around digital sovereignty, compliance, and individual freedom. Yannik reflects on his own journey from app developer to cryptography leader, and how his background in computer science, mathematics, and law helped shape his vision for Arcium. If you're navigating challenges around data privacy, regulation, or AI ethics, or if you're curious about what confidential computing can unlock, this is a conversation that brings clarity to an area often clouded by hype. What would your organization build if privacy was no longer a limitation but a default capability? Let me know after you've listened.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday Apr 3rd: Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 3, 2025 9:23


Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t128%22%20Default%20User/31824 Vulnerable Verizon API Allowed for Access to Call Logs An API Verizon offered to users of its call filtering application suffered from an authentication bypass vulnerability allowing users to access any Verizon user s call history. While using a JWT to authenticate the user, the phone number used to retrieve the call history logs was passed in a not-authenticated header. https://evanconnelly.github.io/post/hacking-call-records/ Google Offering End-to-End Encryption to G-Mail Business Users Google will add an end-to-end encryption feature to commercial GMail users. However, for non GMail users to read the emails they first must click on a link and log in to Google. https://workspace.google.com/blog/identity-and-security/gmail-easy-end-to-end-encryption-all-businesses

Dark Side of Wikipedia | True Crime & Dark History
What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In

Dark Side of Wikipedia | True Crime & Dark History

Play Episode Listen Later Apr 2, 2025 13:25


What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In Was Karen Read seeking justice—or just someone to keep telling her she's right? When a Boston police officer, John O'Keefe, turns up dead and Karen Read is charged with his alleged murder, things spiral into more than just a courtroom drama. Encrypted messages, endless hours of contact with a controversial blogger (who might have a bit of a crush), and a defense that screams “cover-up” more than “clear-cut”—this case is a messy mix of emotion, obsession, and chaos. Psychotherapist and author Shavaun Scott joins Tony Brueski to break down the psychological whirlwind behind Read's actions: from potentially manipulative behavior, to an almost teenage-like hunger for validation, to whether this entire saga is driven by guilt or just a need to win—at any cost. With a former juror now bizarrely on her legal team and behavior that looks more like a reality show than a murder trial, one question lingers... Will Karen Read be convicted based on her personality instead of the evidence? #KarenRead #JohnOKeefe #TrueCrimePodcast #HiddenKillers #LegalDrama #PsychologicalAnalysis #TonyBrueski Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Hidden Killers With Tony Brueski | True Crime News & Commentary
What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Apr 2, 2025 13:25


What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In Was Karen Read seeking justice—or just someone to keep telling her she's right? When a Boston police officer, John O'Keefe, turns up dead and Karen Read is charged with his alleged murder, things spiral into more than just a courtroom drama. Encrypted messages, endless hours of contact with a controversial blogger (who might have a bit of a crush), and a defense that screams “cover-up” more than “clear-cut”—this case is a messy mix of emotion, obsession, and chaos. Psychotherapist and author Shavaun Scott joins Tony Brueski to break down the psychological whirlwind behind Read's actions: from potentially manipulative behavior, to an almost teenage-like hunger for validation, to whether this entire saga is driven by guilt or just a need to win—at any cost. With a former juror now bizarrely on her legal team and behavior that looks more like a reality show than a murder trial, one question lingers... Will Karen Read be convicted based on her personality instead of the evidence? #KarenRead #JohnOKeefe #TrueCrimePodcast #HiddenKillers #LegalDrama #PsychologicalAnalysis #TonyBrueski Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

The Trial Of Karen Read | Justice For John O'Keefe
What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In

The Trial Of Karen Read | Justice For John O'Keefe

Play Episode Listen Later Apr 2, 2025 13:25


What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In Was Karen Read seeking justice—or just someone to keep telling her she's right? When a Boston police officer, John O'Keefe, turns up dead and Karen Read is charged with his alleged murder, things spiral into more than just a courtroom drama. Encrypted messages, endless hours of contact with a controversial blogger (who might have a bit of a crush), and a defense that screams “cover-up” more than “clear-cut”—this case is a messy mix of emotion, obsession, and chaos. Psychotherapist and author Shavaun Scott joins Tony Brueski to break down the psychological whirlwind behind Read's actions: from potentially manipulative behavior, to an almost teenage-like hunger for validation, to whether this entire saga is driven by guilt or just a need to win—at any cost. With a former juror now bizarrely on her legal team and behavior that looks more like a reality show than a murder trial, one question lingers... Will Karen Read be convicted based on her personality instead of the evidence? #KarenRead #JohnOKeefe #TrueCrimePodcast #HiddenKillers #LegalDrama #PsychologicalAnalysis #TonyBrueski Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Mind Behind The Crime | The Psychology Of Killers
What Was Karen Read Thinking When Digging Her Hole Deeper, Psychotherapist Shavaun Scott Weighs In

Mind Behind The Crime | The Psychology Of Killers

Play Episode Listen Later Apr 2, 2025 13:25


Was Karen Read seeking justice—or just someone to keep telling her she's right? When a Boston police officer, John O'Keefe, turns up dead and Karen Read is charged with his alleged murder, things spiral into more than just a courtroom drama. Encrypted messages, endless hours of contact with a controversial blogger (who might have a bit of a crush), and a defense that screams “cover-up” more than “clear-cut”—this case is a messy mix of emotion, obsession, and chaos. Psychotherapist and author Shavaun Scott joins Tony Brueski to break down the psychological whirlwind behind Read's actions: from potentially manipulative behavior, to an almost teenage-like hunger for validation, to whether this entire saga is driven by guilt or just a need to win—at any cost. With a former juror now bizarrely on her legal team and behavior that looks more like a reality show than a murder trial, one question lingers... Will Karen Read be convicted based on her personality instead of the evidence? #KarenRead #JohnOKeefe #TrueCrimePodcast #HiddenKillers #LegalDrama #PsychologicalAnalysis #TonyBrueski Want to listen to ALL of our podcasts AD-FREE? Subscribe through APPLE PODCASTS, and try it for three days free: https://tinyurl.com/ycw626tj Follow Our Other Cases: https://www.truecrimetodaypod.com The latest on The Downfall of Diddy, The Trial of Karen Read, The Murder Of Maddie Soto, Catching the Long Island Serial Killer, Awaiting Admission: BTK's Unconfessed Crimes, Delphi Murders: Inside the Crime, Chad & Lori Daybell, The Murder of Ana Walshe, Alex Murdaugh, Bryan Kohberger, Lucy Letby, Kouri Richins, Malevolent Mormon Mommys, The Menendez Brothers: Quest For Justice, The Murder of Stephen Smith, The Murder of Madeline Kingsbury, The Murder Of Sandra Birchmore, and much more! Listen at https://www.truecrimetodaypod.com

Nurse Converse, presented by Nurse.org
This Encrypted Platform Is Quietly Revolutionizing How Nurses Can Support Sexual Assault Survivors (With Leah Helmbrecht and Tracy DeTomasi)

Nurse Converse, presented by Nurse.org

Play Episode Listen Later Apr 1, 2025 30:08


Disclaimer: This podcast episode contains a discussion on sexual assault and may be triggering to some listeners. Discretion is advised.In this episode of Nurse Converse, Leah Helmbrecht interviews Tracy DeTomasi, licensed social worker and CEO of Callisto, a nonprofit organization focused on empowering survivors of sexual violence. They dive into how Callisto's encrypted platform is transforming the way survivors find support and seek justice through privacy-first tools like the Matching System and Incident Log. The conversation explores the statistics behind campus sexual assault, the importance and challenges of reporting, and the role of Title IX. Tracy also sheds light on perpetrator behavior, the barriers organizations like Callisto face, and how nurses and communities can play a critical role in education, prevention, and survivor advocacy. >>How Callisto Platform Supports Sexual Assault Survivors on College CampusesJump Ahead to Listen:[01:41] Callisto: Empowering survivors of violence.[06:02] Sexual violence statistics in the U.S.[07:38] Serial perpetrators on campuses.[11:40] Effects of sexual assault responses.[15:33] Barriers to addressing sexual assault.[19:48] Collective action for sexual assault.[22:11] Cycle of violence in offenders.[26:51] Treatment and accountability for offenders.[29:47] Nurse career and education tips.Connect with Leah on social media: Instagram: offtheclocknurseTikTok: offtheclocknurse Facebook: Off The Clock Nurse Travels Connect with Callisto on LinkedIn and social media:Website: www.projectcallisto.orgInstagram: @callistoFacebook: CallistoFor more information, full transcript and videos visit Nurse.org/podcastJoin our newsletter at nurse.org/joinInstagram: @nurse_orgTikTok: @nurse.orgFacebook: @nurse.orgYouTube: Nurse.org

Insights Into Things
Insights Into Technology: Episode 24 "Signed, Sealed, Encrypted...and Still Screwed" (VIDEO)

Insights Into Things

Play Episode Listen Later Mar 30, 2025 50:01 Transcription Available


In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

Insights Into Things
Insights Into Technology: Episode 24 "Signed, Sealed, Encrypted...and Still Screwed" (AUDIO)

Insights Into Things

Play Episode Listen Later Mar 30, 2025 50:01


In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

Encrypted
#Ep.105: “Crystall Intelligence: The Future of Compliance and Financial Crime Prevention” (feat. Navin Gupta).

Encrypted

Play Episode Listen Later Mar 28, 2025 37:46


Group Practice Tech
Episode 511: How Secure is Secure Messaging?

Group Practice Tech

Play Episode Listen Later Mar 28, 2025 19:31


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we dive into what group practice owners need to know about encrypted messaging apps.  We discuss: Encrypted messaging apps in the news What end to end encryption means What to look for in an encrypted messaging service Why a Business Associate Agreement is necessary The difference in risk landscape for mental health therapists and government officials Safeguards, like device security measures, to take when using secure messaging apps Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources CE course: Smooth and Secure Use of Phone, Text, Email, and Video to Meet Modern Clients Where They Are: Legal-Ethical and Real-World Considerations Article: Even Though They Have a Right Under HIPAA To Unencrypted Emails: A Case For Only Using Secure Email and Texting With Clients Article: Texting and HIPAA Compliant Practice Article: How Do You Document Emails and Text Messages Received From Clients? HIPAA-Appropriateness Review of Signal HIPAA-Appropriateness Reviews of Secure Messaging platforms Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more

The Guy Gordon Show
Journalist Added to Encrypted Group Chat with National Security Leaders

The Guy Gordon Show

Play Episode Listen Later Mar 26, 2025 10:32


March 26, 2025 ~ The editor in chief of The Atlantic, Jeffrey Goldberg, had been inadvertently added to a group chat on the messaging app Signal, featuring some of the most senior members of the United States government, to discuss a then-imminent U.S. attack on Houthi targets in Yemen earlier this month. Former Congressman Dave Trott joins Guy, Lloyd, and Jamie to discuss the raised questions about the administration's handling of national security.

Prosecuting Donald Trump
Lawyers, State Secrets, and Signal Chats

Prosecuting Donald Trump

Play Episode Listen Later Mar 25, 2025 55:58


On this week's episode, Andrew and Mary start with the major capitulation of the Paul, Wiess law firm to Trump's demands late last week, in exchange for rescinding an EO targeting the firm. This is the chilling effect they've been talking about in action. Then: what are the consequences of the Trump administration defying court orders from US District Chief Judge James Boasberg? The deportation of Venezuelan migrants without due process seems to be careening into that constitutional question, so Andrew and Mary break down the latest on that case, as the government invokes the “state secrets privilege”. And lastly, they detail the legal issues surrounding the now-infamous Signal chat reported by The Atlantic- an extraordinary demonstration of gross negligence when it comes to national defense information. Further reading: Here is Mary's piece on Just Security: Dissecting the Trump Administration's Strategy for Defying Court OrdersAnd here is Andrew's piece, also from Just Security: The New “Blacklists” Work When Law Firms Stay SilentAnd here is the criminal code Andrew and Mary referenced: 18 U.S. Code § 793 - Gathering, transmitting or losing defense informationWant to listen to this show without ads? Sign up for MSNBC Premium on Apple Podcasts.

KFI Featured Segments
@BillHandelShow – ‘Tech Tuesday' with Rich DeMuro

KFI Featured Segments

Play Episode Listen Later Mar 25, 2025 15:04 Transcription Available


Chris Merrill fills in for Bill this week. KTLA & KFI tech reporter Rich DeMuro joins the show for ‘Tech Tuesday.' Today, Rich talks about why it's time to spring clean your PC, ______.

9to5Mac Happy Hour
Live translation on AirPods, encrypted RCS, EU enforces interoperability for iOS 19

9to5Mac Happy Hour

Play Episode Listen Later Mar 20, 2025 64:29


Benjamin and Chance react to the biggest stories of the week, including Apple's commitment to support encrypted RCS, the rumored launch of a new live translation feature for AirPods, and the ongoing fallout of the Siri feature delays. Apple is also forced to add a variety of APIs to let third-party devices access iOS notifications and other system features, thanks to the latest EU decree. And in Happy Hour Plus, Chance rocks out to Metallica in the Vision Pro, and Apple finally announces Ted Lasso season four. Subscribe at 9to5mac.com/join. Sponsored by Shopify: Grow your business no matter what stage you're in. Sign up for a $1 per month trial at shopify.com/happyhour. Sponsored by Stash: With Stash, there's no more confusing, frustrating gatekeeping to keep you from investing. Go to get.stash.com/HAPPYHOUR to see how you can receive $25 towards your first stock purchase and to view important disclosures. Sponsored by Incogni: Take your personal data back with Incogni! Use code MACHAPPYHOUR at the link below and get 60% off an annual plan: http://incogni.com/machappyhour. Hosts Chance Miller @chancemiller.me on Bluesky @chancehmiller@mastodon.social @ChanceHMiller on Instagram @ChanceHMiller on Threads Benjamin Mayo @bzamayo on Twitter @bzamayo@mastodon.social @bzamayo on Threads Subscribe, Rate, and Review Apple Podcasts Overcast Spotify 9to5Mac Happy Hour Plus Subscribe to 9to5Mac Happy Hour Plus! Support Benjamin and Chance directly with Happy Hour Plus! 9to5Mac Happy Hour Plus includes:  Ad-free versions of every episode  Pre- and post-show content Bonus episodes Join for $5 per month or $50 a year at 9to5mac.com/join.  Feedback Submit #Ask9to5Mac questions on Twitter, Mastodon, or Threads Email us feedback and questions to happyhour@9to5mac.com Links End-to-end encrypted RCS messaging on iPhone coming in future software update Apple will introduce a number of texting upgrades in iOS 19, here's what's coming Apple says EU interoperability requirements enable unfettered access to the iPhone, risks customer security and privacy EU orders Apple to open up access to iOS notifications, allow alternatives to AirDrop and AirPlay on the iPhone Apple working on live translation feature for AirPods with iOS 19 Apple exec slams ‘ugly and embarrassing' Siri delays in all-hands meeting Apple announces new immersive concert experience for Apple Vision Pro Report: Apple considered removing USB-C port from iPhone 17 Air, more EU confirms Apple can make a portless iPhone without USB-C Apple officially announces Ted Lasso season 4 Poll: Do you want a thinner iPhone 7 at the expense of the 3.5mm headphone jack?

TechCrunch
iPhone and Android users will soon be able to send encrypted RCS messages to each other

TechCrunch

Play Episode Listen Later Mar 15, 2025 5:57


Plus - Kerry Washington invests in wedding marketplace Cheersy; US lawmakers urge UK spy court to hold Apple ‘backdoor' secret hearing in public Learn more about your ad choices. Visit podcastchoices.com/adchoices

Daily Tech Headlines
Apple Will Soon Support Encrypted RCS Messaging With Android Users – DTH

Daily Tech Headlines

Play Episode Listen Later Mar 14, 2025


Apple will soon support encrypted RCS messaging with Android users, China has joined the EU and US in the fight against disinformation, and the UK faces legal challenges on its request and iCloud backdoor. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none ofContinue reading "Apple Will Soon Support Encrypted RCS Messaging With Android Users – DTH"

All TWiT.tv Shows (MP3)
Hands-On Mac 173: Archive Utility

All TWiT.tv Shows (MP3)

Play Episode Listen Later Mar 13, 2025 21:32


Mikah Sargent dives deep into Archive Utility on macOS, a powerful but often overlooked tool that works behind the scenes to compress and expand files on your Mac. From creating basic zip archives to encrypted files, this episode reveals all the hidden features of this versatile utility. -How compression works - Compression algorithms look for repeating patterns in data to make files smaller, though already compressed files like JPEGs may not benefit much. -Quick compression with right-click - The fastest way to compress files is selecting them, right-clicking, and choosing "Compress," which always creates a standard zip file. -Opening Archive Utility - Access it directly by using Command+Space and typing "archive" to explore its full capabilities beyond the right-click option. -Archive Utility settings - Configure where expanded files are saved, what happens to archives after expansion, and whether to automatically expand nested archives. -Expansion options - Choose to keep, trash, or delete archives after expanding them, or move them to a specific location. -Compression options - Similar settings exist for what happens to original files after creating an archive. -Archive formats explained - Despite setting preferences in Archive Utility, the right-click "Compress" option always creates zip files regardless of settings. -Creating CPGZ archives - These compressed archives must be created by selecting a folder through the File menu, not through right-click compression. -Regular archives (CPIO) - Simple "briefcase" archives without compression, useful for bundling files without reducing size. -Apple Archive (AAR) - A Mac-specific format that uses multi-threaded compression to efficiently compact files. -Encrypted archives (AER) - Secure, password-protected archives that can be unlocked with Touch ID if saved to your keychain. -Why ZIP remains the standard - ZIP format is used for the right-click compression option because of its universal compatibility across different operating systems. Zip and unzip files and folders on Mac - https://support.apple.com/guide/mac-help/zip-and-unzip-files-and-folders-on-mac-mchlp2528/mac Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Mac (Video)
HOM 173: Archive Utility

Hands-On Mac (Video)

Play Episode Listen Later Mar 13, 2025 21:32


Mikah Sargent dives deep into Archive Utility on macOS, a powerful but often overlooked tool that works behind the scenes to compress and expand files on your Mac. From creating basic zip archives to encrypted files, this episode reveals all the hidden features of this versatile utility. How compression works - Compression algorithms look for repeating patterns in data to make files smaller, though already compressed files like JPEGs may not benefit much. Quick compression with right-click - The fastest way to compress files is selecting them, right-clicking, and choosing "Compress," which always creates a standard zip file. Opening Archive Utility - Access it directly by using Command+Space and typing "archive" to explore its full capabilities beyond the right-click option. Archive Utility settings - Configure where expanded files are saved, what happens to archives after expansion, and whether to automatically expand nested archives. Expansion options - Choose to keep, trash, or delete archives after expanding them, or move them to a specific location. Compression options - Similar settings exist for what happens to original files after creating an archive. Archive formats explained - Despite setting preferences in Archive Utility, the right-click "Compress" option always creates zip files regardless of settings. Creating CPGZ archives - These compressed archives must be created by selecting a folder through the File menu, not through right-click compression. Regular archives (CPIO) - Simple "briefcase" archives without compression, useful for bundling files without reducing size. Apple Archive (AAR) - A Mac-specific format that uses multi-threaded compression to efficiently compact files. Encrypted archives (AER) - Secure, password-protected archives that can be unlocked with Touch ID if saved to your keychain. Why ZIP remains the standard - ZIP format is used for the right-click compression option because of its universal compatibility across different operating systems. Zip and unzip files and folders on Mac - https://support.apple.com/guide/mac-help/zip-and-unzip-files-and-folders-on-mac-mchlp2528/mac Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

ABA Banking Journal Podcast
How mail theft fuels the check-fraud boom

ABA Banking Journal Podcast

Play Episode Listen Later Mar 13, 2025 30:03 Transcription Available


The big story of check fraud is not only its vast cost to the country and to individual victims, but simply the remarkable rate at which it is increasing. On this episode of the ABA Banking Journal Podcast — presented by nCino — we bring you a conversation from the ABA Fraudcast with ABA's Paul Benda and Caitlin Piasecki of the United States Postal Inspection Service the enormous scale and challenge of addressing mail theft, a common venue for criminals to access paper checks. Piasecki describes how the internet serves as a perfect sharing and recruiting platform for criminals aiming to get their hands on as many paper checks as possible. Encrypted platforms are where criminal organizations in New Jersey can easily connect with those operating in Los Angeles, she notes. “We have seen a huge influx in the complex nature these investigations have taken, where previously it was a local group in a local area,” she says.

Total Mikah (Audio)
Hands-On Mac 173: Archive Utility

Total Mikah (Audio)

Play Episode Listen Later Mar 13, 2025 21:32 Transcription Available


Mikah Sargent dives deep into Archive Utility on macOS, a powerful but often overlooked tool that works behind the scenes to compress and expand files on your Mac. From creating basic zip archives to encrypted files, this episode reveals all the hidden features of this versatile utility. How compression works - Compression algorithms look for repeating patterns in data to make files smaller, though already compressed files like JPEGs may not benefit much. Quick compression with right-click - The fastest way to compress files is selecting them, right-clicking, and choosing "Compress," which always creates a standard zip file. Opening Archive Utility - Access it directly by using Command+Space and typing "archive" to explore its full capabilities beyond the right-click option. Archive Utility settings - Configure where expanded files are saved, what happens to archives after expansion, and whether to automatically expand nested archives. Expansion options - Choose to keep, trash, or delete archives after expanding them, or move them to a specific location. Compression options - Similar settings exist for what happens to original files after creating an archive. Archive formats explained - Despite setting preferences in Archive Utility, the right-click "Compress" option always creates zip files regardless of settings. Creating CPGZ archives - These compressed archives must be created by selecting a folder through the File menu, not through right-click compression. Regular archives (CPIO) - Simple "briefcase" archives without compression, useful for bundling files without reducing size. Apple Archive (AAR) - A Mac-specific format that uses multi-threaded compression to efficiently compact files. Encrypted archives (AER) - Secure, password-protected archives that can be unlocked with Touch ID if saved to your keychain. Why ZIP remains the standard - ZIP format is used for the right-click compression option because of its universal compatibility across different operating systems. Zip and unzip files and folders on Mac - https://support.apple.com/guide/mac-help/zip-and-unzip-files-and-folders-on-mac-mchlp2528/mac Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Points of Articulation
POA 018 — Encrypted

Points of Articulation

Play Episode Listen Later Feb 17, 2025 23:32


Chapter 32. You choose Nara. Nara makes a choice. This is only the beginning. Content warnings: Weapons (knives, guns), peril, tension, hostages, mild violence. Vote, for free, on our Patreon. If you'd like to financially support the project, you can also do so on our Patreon. Wanna chat? Join our Discord server or Email us.Show transcripts can be found in this Dropbox. Points of Articulation is… Written by Hannah SemmelhackProduced by Hannah Semmelhack and Fiona Clare, in collaboration with Three Fates.With sound design and dialogue editing by Hannah SemmelhackOriginal music by Rheanne KlineAnd original artwork by Hibah HassanThis episode featuredCheyenne Barton as The Narrator (and the characters in their story)Hannah Semmelhack as the Hive MindCredit for all SFX can be found at the end of the transcript. Hosted on Acast. See acast.com/privacy for more information.

The Final Straw Radio
Surveillance Self Defense, Encrypted Chat Apps and Securing Devices with Thorin Klosowski

The Final Straw Radio

Play Episode Listen Later Feb 16, 2025 83:37


This week, a conversation with Thorin Klosowski of the Electronic Frontier Foundation about some basic tools and ideas for keeping our information a little safer online and the Surveillance Self-Defense site, ssd.eff.org . We discuss device encryption, tor-browser, vpns, encrypted messaging apps like WhatsApp, Signal and Telegram as well as password vaults. I'm hoping this'll be the first of a few interviews to try to make digital security concepts a little more accessible. SSD.EFF.org Consumer Reports Digital Security and Privacy site (including personal planning app): https://www.consumerreports.org/digital-security-privacy/ https://www.404media.co/ https://www.theverge.com/ https://techcrunch.com/

Business Casual
Americans Have Bad Vibes on Economy & UK Demands Apple's Encrypted Data

Business Casual

Play Episode Listen Later Feb 10, 2025 30:13


Episode 515: Neal and Toby dive into the latest report that shows American consumer sentiment being at a low-point with the news of tariffs. Then, the British government orders Apple to let it spy on users' encrypted data. Also, the National Institutes of Health cuts billions of dollars for indirect costs and universities say it could jeopardize their research. Meanwhile, the winners of the weekend. Finally, what you need to know for the week ahead.  00:00 - Why is the Super Bowl on a Sunday? 3:00 - Consumer sentiment is down on the economy 7:30 - UK wants Apple's encrypted data 11:30 - NIH cuts billions of dollars 18:00 - The best Super Bowl commercials 24:30 - Week Ahead Subscribe to Morning Brew Daily for more of the news you need to start your day. Share the show with a friend, and leave us a review on your favorite podcast app. Check out https://wise.com/business for more! Listen to Morning Brew Daily Here: https://link.chtbl.com/MBD Watch Morning Brew Daily Here: https://www.youtube.com/@MorningBrewDailyShow Learn more about your ad choices. Visit megaphone.fm/adchoices

The MadTech Podcast
MadTech Daily: Amazon's Ad Business Earns $17bn in Q4; UK Orders Access to Apple Users' Encrypted Accounts

The MadTech Podcast

Play Episode Listen Later Feb 10, 2025 2:13


On today's MadTech Daily: Amazon's Ad Business Earns $17bn in Q4; UK Orders Access to Apple Users' Encrypted Accounts; Netflix Hikes UK Subscription Prices 

Daily Tech Headlines
The UK Government Told Apple To Create A Backdoor For Encrypted iCloud Backups – DTH

Daily Tech Headlines

Play Episode Listen Later Feb 7, 2025


The UK government has reportedly ordered Apple to create a backdoor for encrypted iCloud backup access, newly unsealed emails provide “the most damning evidence yet against Meta in a copyright infringement case with authors, and Apple is set to unveil the iPhone SE. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. AContinue reading "The UK Government Told Apple To Create A Backdoor For Encrypted iCloud Backups – DTH"

Six O'Clock News
07/02/2025 Government demands right to access Apple users' encrypted data

Six O'Clock News

Play Episode Listen Later Feb 7, 2025 30:39


The Government has demanded the right to access encrypted data stored by Apple users. And, it's been confirmed that Grenfell Tower will be demolished.

The Agenda Podcast: Decoding Crypto
Why encrypted supercomputing is key to ethical AI and humanity's future (feat. Arcium)

The Agenda Podcast: Decoding Crypto

Play Episode Listen Later Jan 22, 2025 46:28


Yannik Schrade, co-founder and CEO of Arcium, sits down to share his views on why blockchain developers, corporations, the medical industry and the average internet user need encrypted supercomputing to ensure data privacy and data authenticity. (00:00) Introduction to The Agenda podcast and this week's episode(01:50) What is Arcium, and why does everyone need encrypted supercomputing? (03:00) How encrypted, decentralized supercomputing works(04:59) Blockchains are transparent by design, so why should some transactions be encrypted?(11:25) How to ensure data authenticity in AI16:34) Yannik's thoughts on DePIN and network scalability(20:32) Why DeFi, AI agents and blockchain devs need encrypted decentralized networks(30:11) Why data privacy matters in 2025(33:55) Encrypted decentralization normalizes trust and eradicates distrust(37:58) How do users know that their encrypted data is not monetized or used for personal gain?The Agenda is brought to you by Cointelegraph and hosted/produced by Ray Salmond and Jonathan DeYoung, with post-production by Elena Volkova (Hatch Up). Follow Cointelegraph on X (Twitter) at @Cointelegraph, Jonathan at @maddopemadic and Ray at @HorusHughes. Jonathan is also on Instagram at @maddopemadic, and he made the music for the podcast — hear more at madic.art.Follow Yannik Schrade on X at @yrschradeCheck out Cointelegraph at cointelegraph.com.If you like what you heard, rate us and leave a review!The views, thoughts and opinions expressed in this podcast are its participants' alone and do not necessarily reflect or represent the views and opinions of Cointelegraph. This podcast (and any related content) is for entertainment purposes only and does not constitute financial advice, nor should it be taken as such. Everyone must do their own research and make their own decisions. The podcast's participants may or may not own any of the assets mentioned.

Arjun Khemani Podcast
Zooko, Nate Wilcox, and Sean Bowe: Zcash

Arjun Khemani Podcast

Play Episode Listen Later Jan 22, 2025 200:38


My conversation with Zooko, Nate Wilcox, and Sean Bowe about the Zcash protocol.Zooko is a cypherpunk who co-founded Zcash along with his brother, Nate Wilcox, and others. Sean Bowe is a cryptographer and engineer who has played a crucial role in the development of Zcash and has made significant contributions to advancements in zero-knowledge proofs, particularly zk-SNARKs, which underpin Zcash's privacy features.Topics we discuss are well captured by the timestamps below.Watch on YouTube or X. Listen on Apple Podcasts, Spotify, or any other podcast platform. Follow me on X for updates on future episodes.Click here to support my work.Timestamps0:00 - Zooko Wilcox-O'Hearn0:04 - Writing the first blog post on Bitcoin ever6:21 - Bitcoin's fundamental privacy flaw9:40 - Unstoppable private money12:19 - Will Zcash compete with Bitcoin as a store of value?14:24 - How many people are using Zcash?16:18 - Good security is good usability20:10 - Social credit systems and ubiquitous surveillance23:43 - Why Monero's privacy tech can't work35:21 - Integrating ZKPs into other blockchains39:51 - Privacy comes from money at rest, not from money in flight47:42 - Why did the price of ZEC fall so drastically in the beginning?51:49 - Zcash stablecoins? 55:50 - Quantum threats to Zcash1:02:50 - Encrypted love notes in the blockchain'1:07:07 - Privacy enabled cultural trends1:12:43 - Nate Wilcox1:14:38 - Why do you need privacy if you have nothing to hide? 1:16:16 - A brief history of Zcash1:22:42 - Why does Zcash have opt-in privacy?1:26:55 - Does Zcash still rely on a trusted setup?1:30:49 - Upgrading the Zcash protocol to Hybrid PoW/PoS1:40:50 - A bug that almost killed Zcash1:52:40 - Zcash's funding model2:09:09 - Why can't privacy be added as an L2?2:14:35 - Scaling Zcash and making it more interoperable2:23:16 - Shielded Labs2:24:39 - Nate's vision for Zcash2:27:53 - Sean Bowe2:32:53 - Censorship resistance is a spectrum2:35:26 - Will privacy coins be banned?2:37:49 - Privacy and scalability2:41:47 - Programmable money2:43:31 - Summary of Sean's contributions to the field of cryptography2:55:17 - Zcash might get privacy against quantum adversaries for free3:00:14 - Halo3:05:34 - What Sean's working on right now3:11:54 - What has influenced Sean's thinking in cryptography the most?3:13:36 - Being a high school dropout working in crypto3:15:08 - Zcash is just getting startedFollow me on X.Follow Zooko on X.Follow Nate on X.Follow Sean on X. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit www.arjunkhemani.com

Recorded Future - Inside Threat Intelligence for Cyber Security

Session, a little known encrypted messaging app out of Australia, thought it would help the world keep its communication private—and then a new law threatened their plans.

Cyber Security Headlines
Government to name witness in encrypted chat sting

Cyber Security Headlines

Play Episode Listen Later Dec 24, 2024 6:50


Using LLMs to generate malware variants NSO liable for WhatsApp hacks OpenAI fined for privacy violations Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecurity and provides a full audit of every action, allowed or blocked, for risk management and compliance. Onboarding and operation are fully supported by their US-based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit ThreatLocker.com. For the story behind the headlines, go to CISOSeries.com

Cybercrime Magazine Podcast
Exposing 'Anom.' Inside The FBI's Secret Encrypted Phone Company. Joseph Cox, Journalist & Author.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 16, 2024 25:30


Joseph Cox is an award-winning investigative journalist covering hacking, crime, and privacy. He is author of the book, "Dark Wire: The Incredible True Story of the Largest Sting Operation Ever," and gave a popular DEF CON 32 presentation titled “Inside the FBI's Secret Encrypted Phone Company, Anom." In this episode, Cox breaks down his experience discovering the FBI's secret phone company, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Hacker And The Fed
Telecom Hacks, Ransomware Fallout, Encrypted Chats, and a Diss Track Challenge

Hacker And The Fed

Play Episode Listen Later Dec 12, 2024 46:00


Cybersecurity Chaos: Encrypted Chats, Ransomware Woes, and a Diss Track Challenge This week on Hacker And The Fed former FBI agent Chris Tarbell and ex-black hat hacker Hector Monsegur discuss the largest U.S. telecom hack in history attributed to Chinese state-sponsored attackers, the FBI's surprising push for encrypted communications, and the takedown of an encrypted messaging service used by criminals. They also tackle the bankruptcy of vodka giant Stoli following a devastating ransomware attack and share actionable advice for cybersecurity resilience. Send HATF your questions at questions@hackerandthefed.com.

Chinese Mandarin Podcast- MaoMi Chinese

Subscriber-only episodeToday, we will dive into the mystery of encrypted Chinese Google reviews left by Chinese people abroad. Join us as we decode hidden messages and explore their meanings!Support MaoMi & Get exclusive   to premium content!https://www.buzzsprout.com/1426696/subscribe↗️Transcript and translation are available on https://maomichinese.comInterested in any topics? leave me a message on: https://maomichinese.com or https://www.instagram.com/maomichinese/?hl=enText me what you think :)

Front Burner
Canadian encrypted phones, a mass hack, and 10 thousand arrests

Front Burner

Play Episode Listen Later Dec 2, 2024 24:54


More than 10,000 arrests, a mountain of drugs stopped at the border, and more than a hundred assassination attempts thwarted. Those are just some of the results of a massive police data hacking operation in Europe to disrupt organized crime. And at the center of it all – Vancouver tech company Sky Global – that promised communication couldn't be hacked by their encrypted phones.Frédéric Zalac, and Radio-Canada's investigative program Enquête teamed up with journalists from a dozen European media organizations for the year-long investigation.The documentary aired on The Fifth Estate as “Cracked: Crimes Behind Encryption.” You can watch it on YouTube.For transcripts of Front Burner, please visit: https://www.cbc.ca/radio/frontburner/transcripts

Security Now (MP3)
SN 990: Is Telegram an Encrypted App? - CrowdStrike Exodus, DDoS-as-a-Service, 'Active Listening' Ad Tech?

Security Now (MP3)

Play Episode Listen Later Sep 4, 2024 129:19


Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Active Listening" has apparently not ended Cascading Bloom Filter follow-up Closing the Loop Is Telegram an encrypted app? Show Notes - https://www.grc.com/sn/SN-990-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bigid.com/securitynow threatlocker.com for Security Now vanta.com/SECURITYNOW joindeleteme.com/twit promo code TWIT

The MFCEO Project
766. Andy & DJ CTI: DNC Day 3 Speakers, Would-Be Trump Assasin's Encrypted Messages & Family Sues Detroit Judge

The MFCEO Project

Play Episode Listen Later Aug 23, 2024 80:44


On today's episode, Andy & DJ discuss the speakers on the third day of the 2024 Democratic National Convention, the would-be Trump assassin having encrypted messaging accounts on platforms in 3 foreign countries, and the family of the sleepy teen who is now suing the Detroit judge who cuffed their daughter.