Podcasts about Encryption

Process of converting plaintext to ciphertext

  • 1,319PODCASTS
  • 3,693EPISODES
  • 48mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 29, 2025LATEST
Encryption

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Encryption

Show all podcasts related to encryption

Latest podcast episodes about Encryption

The Post-Quantum World
From Quantum Economy to Simulation Theory – with Anders Indset

The Post-Quantum World

Play Episode Listen Later Oct 29, 2025 44:54


How are recent quantum computing breakthroughs reshaping business, competition, and society itself? What global challenges might quantum and AI either help with or introduce? We're trying something a little different and asking a futurist and bestselling author of The Quantum Economy to weigh in on how our increasing qubit counts might all play out in a few years. Join host Konstantinos Karagiannis for a wide-ranging, philosophical chat with Anders Indset, and get ready to hear about simulation theory towards the end.   For more information on Anders Indset and his books, visit https://andersindset.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Crazy Wisdom
Episode #501: From Atomic Clocks to Smartphones: The Real Story of GPS

Crazy Wisdom

Play Episode Listen Later Oct 27, 2025 58:46


In this episode of Crazy Wisdom, host Stewart Alsop talks with Richard Easton, co-author of GPS Declassified: From Smart Bombs to Smartphones, about the remarkable history behind the Global Positioning System and its ripple effects on technology, secrecy, and innovation. They trace the story from Roger Easton's early work on time navigation and atomic clocks to the 1973 approval of the GPS program, the Cold War's influence on satellite development, and how civilian and military interests shaped its evolution. The conversation also explores selective availability, the Gulf War, and how GPS paved the way for modern mapping tools like Google Maps and Waze, as well as broader questions about information, transparency, and the future of scientific innovation. Learn more about Richard Easton's work and explore early GPS documents at gpsdeclassified.com, or pick up his book GPS Declassified: From Smart Bombs to Smartphones.Check out this GPT we trained on the conversationTimestamps00:00 – Stewart Alsop introduces Richard Easton, who explains the origins of GPS, its 12-hour satellite orbits, and his father Roger Easton's early time navigation work.05:00 – Discussion on atomic clocks, the hydrogen maser, and how technological skepticism drove innovation toward the modern GPS system.10:00 – Miniaturization of receivers, the rise of smartphones as GPS devices, and early mapping tools like Google Maps and Waze.15:00 – The Apollo missions' computer systems and precision landings lead back to GPS development and the 1973 approval of the joint program office.20:00 – The Gulf War's use of GPS, selective availability, and how civilian receivers became vital for soldiers and surveyors.25:00 – Secrecy in satellite programs, from GRAB and POPPY to Eisenhower's caution after the U-2 incident, and the link between intelligence and innovation.30:00 – The myth of the Korean airliner sparking civilian GPS, Reagan's policy, and the importance of declassified documents.35:00 – Cold War espionage stories like Gordievsky's defection, the rise of surveillance, and early countermeasures to GPS jamming.40:00 – Selective availability ends in 2000, sparking geocaching and civilian boom, with GPS enabling agriculture and transport.45:00 – Conversation shifts to AI, deepfakes, and the reliability of digital history.50:00 – Reflections on big science, decentralization, and innovation funding from John Foster to SpaceX and Starlink.55:00 – Universities' bureaucratic bloat, the future of research education, and Richard's praise for the University of Chicago's BASIC program.Key InsightsGPS was born from competing visions within the U.S. military. Richard Easton explains that the Navy and Air Force each had different ideas for navigation satellites in the 1960s. The Navy wanted mid-Earth orbits with autonomous atomic clocks, while the Air Force preferred ground-controlled repeaters in geostationary orbit. The eventual compromise in 1973 created the modern GPS structure—24 satellites in six constellations—which balanced accuracy, independence, and resilience.Atomic clocks made global navigation possible. Roger Easton's early insight was that improving atomic clock precision would one day enable real-time positioning. The hydrogen maser, developed in 1960, became the breakthrough technology that made GPS feasible. This innovation turned a theoretical idea into a working global system and also advanced timekeeping for scientific and financial applications.Civilian access to GPS was always intended. Contrary to popular belief, GPS wasn't a military secret turned public after the Korean airliner tragedy in 1983. Civilian receivers, such as TI's 4100 model, were already available in 1981. Reagan's 1983 announcement merely reaffirmed an existing policy that GPS would serve both military and civilian users.The Gulf War proved GPS's strategic value. During the 1991 conflict, U.S. and coalition forces used mostly civilian receivers after the Pentagon lifted “selective availability,” which intentionally degraded accuracy. GPS allowed troops to coordinate movement and strikes even during sandstorms, changing modern warfare.Secrecy and innovation were deeply intertwined. Easton recounts how classified projects like GRAB and POPPY—satellites disguised as scientific missions—laid technical groundwork for navigation systems. The crossover between secret defense projects and public science fueled breakthroughs but also obscured credit and understanding.Ending selective availability unleashed global applications. When the distortion feature was turned off in May 2000, GPS accuracy improved instantly, leading to new industries—geocaching, precision agriculture, logistics, and smartphone navigation. This marked GPS's shift from a defense tool to an everyday utility.Innovation's future may rely on decentralization. Reflecting on his father's era and today's landscape, Easton argues that bureaucratic “big science” has grown sluggish. He sees promise in smaller, independent innovators—helped by AI, cheaper satellites, and private space ventures like SpaceX—continuing the cycle of technological transformation that GPS began.

INDIGNITY MORNING PODCAST
Episode 557: Indignity Morning Podcast No. 557: Secrecy and encryption.

INDIGNITY MORNING PODCAST

Play Episode Listen Later Oct 17, 2025 13:08


EASY LISTENING DEP'T.: Protesters showing up to wave Israeli flags outside the building does not mean that the "tension was spilling out of the synagogue." It's like when anti semitic protesters showed up on Broadway outside the fence of Columbia University, and their behavior was incorporated into the brief against the Columbia campus protesters, the people who are on the outside are on the outside for a reason, and if they were representative of the situation inside, they would probably be inside. Please visit, read, and support INDIGNITY! https://www.indignity.net/

Security Now (MP3)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (MP3)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HD)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HD)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HI)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HI)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Radio Leo (Audio)
Security Now 1047: RediShell's CVSS 10.0

Radio Leo (Audio)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video LO)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (Video LO)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07 Transcription Available


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Radio Leo (Video HD)
Security Now 1047: RediShell's CVSS 10.0

Radio Leo (Video HD)

Play Episode Listen Later Oct 15, 2025 152:07 Transcription Available


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

MacVoices Audio
MacVoices #25259: Live! - Rivian's CarPlay Position, More UK Cloud Demands, FCC iPhone Leaks

MacVoices Audio

Play Episode Listen Later Oct 14, 2025 30:46


The MacVoices Live! panel discuss the Rivian CEO's claim that drivers will eventually appreciate cars without Apple CarPlay, sparking debate about automakers' push for control and subscription models. Chuck Joiner, David Ginsburg, Web Bixby, Marty Jencius, Brian Flanigan-Arthurs, Jeff Gamet, Eric Bolden, and Jim Rea explore consumer frustration over losing convenience and the rise of tech-based add-ons. More privacy concerns from the UK's renewed backdoor encryption request link to a discussion about broader issues of digital trust and data security that include a leak of iPhone schematics.  MacVoices is supported by MacPaw and the Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use my code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Rivian questions the need for CarPlay [1:52] Tesla and control over in-car systems [3:20] Automakers' motives and data ownership [5:19] Rivian's CEO vision and user reactions [7:52] Subscription-based features debate [8:30] Convenience and continuity in CarPlay use [13:24] Apple's challenges with CarPlay Ultra [21:22] UK government revisits encryption backdoor request [26:36] Risks of mandated access and data leaks [29:53] Closing reflections on privacy and technology trust Links: Rivian says ‘customers will appreciate' lack of CarPlay eventually https://9to5mac.com/2025/10/06/rivian-says-customers-will-appreciate-lack-of-carplay-eventually/ UK government resumes row with Apple by demanding access to British users' data https://www.theguardian.com/technology/2025/oct/01/uk-government-apple-data-british-telecoms FCC accidentally leaked iPhone schematics, potentially giving rivals a peek at company secrets https://www.engadget.com/big-tech/fcc-accidentally-leaked-iphone-schematics-potentially-giving-rivals-a-peek-at-company-secrets-154551807.html Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Gerde Atash
94 - How RSA Turned Beautiful Math into Unbreakable Encryption

Gerde Atash

Play Episode Listen Later Oct 10, 2025 85:20


In this episode, Momo sits down with his friend and long-time flatmate, Sohail, a mathematician, for a relaxed conversation about RSA cryptography—how it works and why it was revolutionary. Sohail breaks down the math behind RSA with clear, accessible examples and shares bonus fun facts about mathematics, broken predictions, and the future of math in an open-source world.---Hardy writes: "The 'real' mathematics of the 'real' mathematicians, the mathematics of Fermat and Euler and Gauss and Abel and Riemann, is almost wholly 'useless'."A similar quote is attributed to Gauss, Sohail's beloved mathematician. He jokingly said "I must have committed blasphemy by attributing it to someone else." Here's the exact quote:"Mathematics is the queen of the sciences, and number theory is the queen of mathematics. She often condescends to render service to astronomy and other natural sciences, but under all circumstances she is entitled to first rank."---00:58 – Sohail's background in mathematics03:23 – Math and real-world applications08:11 – Asymmetric cryptography (like public-key cryptography) vs. symmetric cryptography (like the Caesar cipher)11:18 – Remembering Gauss and Gauss Junior15:55 – Is asymmetric cryptography mind-blowing?17:53 – Why RSA cryptography was ground-breaking21:01 – Explaining RSA through the “suitcase” analogy25:09 – The math behind RSA32:18 – What kinds of functions can be used in RSA?34:58 – Clock-like modular functions in RSA40:59 – Fermat's Little Theorem as the basis of RSA48:11 – A more complex function than Fermat's Little Theorem used in RSA50:43 – How your password reaches your bank securely using RSA59:41 – Do my function and my bank's function need to match in RSA?01:01:19 – The importance of prime numbers in cryptography01:04:06 – Accessible resources for math enthusiasts01:05:40 – Nuance: which exponentiation operations are invalid in RSA01:10:25 – Can a hacker intercept and decode an RSA-encrypted message?01:12:28 – Why the move to elliptic curves?01:14:00 – Other real-world applications of number theory01:19:03 – The future of mathematics---Fermat's little theorem explanation:https://en.wikipedia.org/wiki/Fermat's_little_theoremThe channel for explaining math concepts in simple words, 3Blue1Brown. This source doesn't explain Fermat's Little Theorem, but it is an accessible source for math enthusiasts without specialized training.https://www.youtube.com/@3blue1brownEnigma Cipher Center, the cryptography museum in Poznan, Polandhttps://csenigma.pl/en/My Nostr post about the internet and cryptography:https://primal.net/e/nevent1qqs9x3rxx3s9fhg6jwzvafgh6vvvxe658junc0vt4lphmcdl4w9ccrs9rk8dd---

Hacker News Recap
October 4th, 2025 | The UK is still trying to backdoor encryption for Apple users

Hacker News Recap

Play Episode Listen Later Oct 5, 2025 14:29


This is a recap of the top 10 posts on Hacker News on October 04, 2025. This podcast was generated by wondercraft.ai (00:30): The UK is still trying to backdoor encryption for Apple usersOriginal post: https://news.ycombinator.com/item?id=45476273&utm_source=wondercraft_ai(01:52): Flock's gunshot detection microphones will start listening for human voicesOriginal post: https://news.ycombinator.com/item?id=45473698&utm_source=wondercraft_ai(03:14): How I influence tech company politics as a staff software engineerOriginal post: https://news.ycombinator.com/item?id=45473852&utm_source=wondercraft_ai(04:37): Alibaba cloud FPGA: the $200 Kintex UltraScale+Original post: https://news.ycombinator.com/item?id=45471136&utm_source=wondercraft_ai(05:59): Paged Out Issue #7 [pdf]Original post: https://news.ycombinator.com/item?id=45472319&utm_source=wondercraft_ai(07:21): ProofOfThought: LLM-based reasoning using Z3 theorem provingOriginal post: https://news.ycombinator.com/item?id=45475529&utm_source=wondercraft_ai(08:44): Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?Original post: https://news.ycombinator.com/item?id=45473033&utm_source=wondercraft_ai(10:06): A comparison of Ada and Rust, using solutions to the Advent of CodeOriginal post: https://news.ycombinator.com/item?id=45473861&utm_source=wondercraft_ai(11:29): Self-hosting email like it's 1984Original post: https://news.ycombinator.com/item?id=45473730&utm_source=wondercraft_ai(12:51): New antibiotic targets IBD and AI predicted how it would workOriginal post: https://news.ycombinator.com/item?id=45469579&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

Mac OS Ken
iPhone Sales and iCloud Encryption - MOSK: 10.02.2025

Mac OS Ken

Play Episode Listen Later Oct 2, 2025 17:48


- J.P. Morgan: iPhone 17 Strength Driven by Upgrades - UK Tries for Access to Encrypted iCloud Data of UK Citizens - Court Dismisses Apple/Amazon Price Fixing Case - Apple Moves to Dismiss xAI's Collusion Suit - Apple, Google, and Meta Have to Answer for Gambling Apps - iFixit: AirPods Pro 3 Are Not Repairable - Apple Buys Ireland's IC Mask Design - Three New Titles Hit Apple Arcade - Apple TV+ Outs Trailer for Documentary “Mr. Scorsese” Ahead of 17 October Premier - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra today at store.insta360.com/product/go-ultra?utm_term=macosken with code macosken - Active ransomware attacks and improving recovery trends on Checklist No. 442 - Find it today at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

2.5 Admins
2.5 Admins 267: Hoarding Cache

2.5 Admins

Play Episode Listen Later Oct 2, 2025 26:11


The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation   […]

FLYTECH Podcast
Apple vs Musk ⚖️ | EV Lease Hacks

FLYTECH Podcast

Play Episode Listen Later Oct 2, 2025 6:31


Today on FLYTECH Daily, Nick & Michelle break down the top 5 tech stories you need to know — in under 10 minutes:   Apple vs. Musk: Apple fires back at Elon Musk's lawsuit over its OpenAI deal, calling the claims “speculation on top of speculation” (Bloomberg). EV Lease Hacks: Ford & GM find a clever workaround to keep the $7,500 EV tax credit alive through leasing programs (Reuters). Porsche's OLED Flow Display: Porsche teases its Cayenne Electric with a futuristic curved OLED dashboard and new AI-powered voice assistant (Electrek, Autogefuehl). OpenAI Sora 2: Deepfake or reality? OpenAI unveils its most powerful video + audio generator yet, making hyperrealistic content mainstream (OpenAI briefing, The Verge). UK vs. Apple Encryption: The UK renews its demand for a backdoor into iCloud, reigniting the global encryption battle (Financial Times).     Takeaway: Tech isn't slowing down — from EV loopholes to AI deepfakes, the future is unfolding faster than ever.  

Late Night Linux All Episodes
2.5 Admins 267: Hoarding Cache

Late Night Linux All Episodes

Play Episode Listen Later Oct 2, 2025 26:11


The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation  ... Read More

Lex Fridman Podcast
#482 – Pavel Durov: Telegram, Freedom, Censorship, Money, Power & Human Nature

Lex Fridman Podcast

Play Episode Listen Later Oct 1, 2025 282:37


Pavel Durov is the founder and CEO of Telegram. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep482-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/pavel-durov-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Pavel's Telegram: https://t.me/durov Pavel's X: https://x.com/durov Telegram: https://telegram.org/ Telegram Contests: https://contest.com/ SPONSORS: To support this podcast, check out our sponsors & get discounts: Miro: Online collaborative whiteboard platform. Go to https://miro.com/ UPLIFT Desk: Standing desks and office ergonomics. Go to https://upliftdesk.com/lex Fin: AI agent for customer service. Go to https://fin.ai/lex LMNT: Zero-sugar electrolyte drink mix. Go to https://drinkLMNT.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex OUTLINE: (00:00) - Introduction (02:46) - Sponsors, Comments, and Reflections (11:29) - Philosophy of freedom (14:37) - No alcohol (22:42) - No phone (28:38) - Discipline (49:50) - Telegram: Lean philosophy, privacy, and geopolitics (1:05:12) - Arrest in France (1:21:23) - Romanian elections (1:32:18) - Power and corruption (1:41:50) - Intense education (1:53:51) - Nikolai Durov (1:58:19) - Programming and video games (2:02:33) - VK origins & engineering (2:19:46) - Hiring a great team (2:29:02) - Telegram engineering & design (2:48:04) - Encryption (2:53:01) - Open source (2:57:48) - Edward Snowden (3:00:20) - Intelligence agencies (3:01:32) - Iran and Russia government pressure (3:04:41) - Apple (3:11:38) - Poisoning (3:43:53) - Money (3:52:45) - TON (4:02:35) - Bitcoin (4:05:34) - Two chairs dilemma (4:12:14) - Children (4:23:24) - Father (4:27:55) - Quantum immortality (4:34:27) - Kafka PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips

Ctrl-Alt-Speech
Moderating is Such Sweet Sorrow

Ctrl-Alt-Speech

Play Episode Listen Later Oct 1, 2025 54:49 Transcription Available


In this week's roundup of the latest news in online speech, content moderation and internet regulation, Mike is joined by Dave Willner, founder of Zentropi, and long-time trust & safety expert who worked at Facebook, AirBnB, and OpenAI in Trust & Safety roles. Together they discuss:Masnick's Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well (Techdirt)UK makes new attempt to access Apple cloud data (Financial Times)Imgur pulls out of UK after data regulator warns of fines (TechCrunch)Leaked Meta guidelines show how it trains AI chatbots to respond to child sexual exploitation prompts (Business Insider)OpenAI's Sora joins Meta in pushing AI-generated videos. Some are worried about a flood of 'AI slop' (ABC News)Flights in Afghanistan grounded after internet shutdown (BBC) Ctrl-Alt-Speech is a weekly podcast from Techdirt and Everything in Moderation. Send us your feedback at podcast@ctrlaltspeech.com and sponsorship enquiries to sponsorship@ctrlaltspeech.com. Thanks for listening.

Crazy Wisdom
Episode #492: From Peer-to-Peer to Cosmolocalism: Michel Bauwens on Building the Next World

Crazy Wisdom

Play Episode Listen Later Sep 26, 2025 60:15


In this episode of Crazy Wisdom, host Stewart Alsop talks with Michel Bauwens, founder of the P2P Foundation, about the rise of peer-to-peer dynamics, the historical cycles shaping our present, and the struggles and possibilities of building resilient communities in times of crisis. The conversation moves through the evolution of the internet from Napster to Web3, the cultural shifts since 1968, Bauwens' personal experiences with communes and his 2018 cancellation, and the emerging vision of cosmolocalism and regenerative villages as alternatives to state and market decline. For more on Michel's work, you can explore his Substack at 4thgenerationcivilization.substack.com and the extensive P2P Foundation Wiki at wiki.p2pfoundation.net.Check out this GPT we trained on the conversationTimestamps00:00 Michel Bauwens explains peer-to-peer as both computer design and social relationship, introducing trans-local association and the idea of an anthropological revolution.05:00 Discussion of Web1, Web3, encryption, anti-surveillance, cozy web, and dark forest theory, contrasting early internet openness with today's fragmentation.10:00 Bauwens shares his 2018 cancellation, deplatforming, and loss of funding after a dispute around Jordan Peterson, reflecting on identity politics and peer-to-peer pluralism.15:00 The cultural shifts since 1968, the rise of identity movements, macro-historical cycles, and the fourth turning idea of civilizational change are unpacked.20:00 Memories of 1968 activism, communes, free love, hypergamy, and the collapse of utopian experiments, showing the need for governance and rules in cooperation.25:00 From communes to neo-Reichian practices, EST seminars, and lessons of human nature, Bauwens contrasts failed free love with lasting models like kibbutzim and Bruderhof.30:00 Communes that endure rely on transcendence, religious or ideological foundations, and Bauwens points to monasteries as models for resilience in times of decline.35:00 Cycles of civilization, overuse of nature, class divisions, and the threat of social unrest frame a wider reflection on populism, Eurasian vs Western models, and culture wars.40:00 Populism in Anglo vs continental Europe, social balance, Christian democracy, and the contrast with market libertarianism in Trump and Milei.45:00 Bauwens proposes cosmolocalism, regenerative villages, and bioregional alliances supported by Web3 communities like Crypto Commons Alliance and Ethereum Localism.50:00 Historical lessons from the Roman era, monasteries, feudal alliances, and the importance of reciprocity, pragmatic alliances, and preparing for systemic collapse.55:00 Localism, post-political collaboration, Ghent urban commons, Web3 experiments like Zuzalu, and Bauwens' resources: fortcivilizationsubstack.com and wiki.p2pfoundation.net.Key InsightsMichel Bauwens frames peer-to-peer not just as a technical design but as a profound social relationship, what he calls an “anthropological revolution.” Like the invention of writing or printing, the internet created trans-local association, allowing people across the globe to coordinate outside of centralized control.The conversation highlights the cycles of history, drawing from macro-historians and the “fourth turning” model. Bauwens explains how social movements rise, institutionalize, and collapse, with today's cultural polarization echoing earlier waves such as the upheavals of 1968. He sees our era as the end of a long cycle that began after World War II.Bauwens shares his personal cancellation in 2018, when posting a video about Jordan Peterson triggered accusations and led to deplatforming, debanking, and professional exclusion. He describes this as deeply traumatic, forcing him to rethink his political identity and shift his focus to reciprocity and trust in smaller, resilient networks.The episode revisits communes and free love experiments of the 1970s, where Bauwens lived for years. He concludes that without governance, rules, and shared transcendence, these communities collapse into chaos. He contrasts them with enduring models like the Bruderhof, kibbutzim, and monasteries, which rely on structure, ideology, or religion to survive.A major theme is populism and cultural polarization, with Bauwens distinguishing between Anglo-Saxon populism rooted in market libertarianism and continental populism shaped by Christian democratic traditions. The former quickly loses support by privileging elites, while the latter often maintains social balance through family and worker policies.Bauwens outlines his vision of cosmolocalism and regenerative villages, where “what's heavy is local, what's light is global.” He argues that bioregionalism combined with Web3 technologies offers a practical way to rebuild resilient communities, coordinate globally, and address ecological and social breakdown.Finally, the episode underscores the importance of pragmatic alliances across political divides. Bauwens stresses that survival and flourishing in times of systemic collapse depend less on ideology and more on reciprocity, concrete projects, and building trust networks that can outlast declining state and market systems.

Cybercrime Magazine Podcast
Quantum Minute. China Breaks RSA Encryption. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 19, 2025 1:57


A team in China has successfully broken RSA encryption using a D-Wave Advantage quantum computer, posing a significant threat to global data security. Earth.com explains that the researchers used a 22-bit RSA integer that had previously resisted attempts to break it, demonstrating the potential for quantum machines to tackle cryptographic problems. This breakthrough is concerning because RSA encryption is still widely used in many industries, including finance and government. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

The Post-Quantum World
Running Shor's Algorithm on Logical Qubits - with Peter Noell of Infleqtion

The Post-Quantum World

Play Episode Listen Later Sep 17, 2025 36:14


For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

David Bombal
#512: All Encryption Hacked in 3 Years?

David Bombal

Play Episode Listen Later Sep 15, 2025 38:17


Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Quantum computing isn't a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that's enough to break today's asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor's algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states' “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

MacVoices Audio
MacVoices #25230: Live! - Intel Investment Debate and Bluesky's Mississippi Exit

MacVoices Audio

Play Episode Listen Later Sep 4, 2025 27:02


The panel examines the U.S. government's $8.9 billion investment in Intel, debating whether it strengthens national security or sets a risky precedent for government ownership in private companies. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Ben Roethig, Jeff Gamet, Eric Bolden, Web Bixby, and Jim Rea discuss Intel's challenges, the role of the CHIPS Act, and political optics. The session also examined Bluesky's withdrawal from Mississippi over strict age-verification laws, and the implications for other states and services. Today's MacVoices is supported by Insta360 and their new GO Ultra, the tiny 4K camera that goes everywhere with you. Visit store.Insta360.com and use the code  “MacVoices” for a free set of Sticky Tabs. Show Notes: Chapters: [0:10] Government investment in Intel [1:30] Concerns about state-owned enterprise [3:49] Intel's struggles and future outlook [5:43] Comparing Intel to past bailouts [7:19] Differences between subsidies and bailouts [7:57] Perspectives on government involvement [9:16] International vs U.S. approaches [11:29] Stratechery analysis on Intel [11:59] CHIPS Act and Intel's funding shift [15:17] Breakdown of grants and obligations [16:40] Political optics of Intel investment [20:30] Bluesky exits Mississippi [21:28] Age-verification law challenges [23:58] Privacy, Facebook, and data security [24:58] Broader implications of restrictive laws Links: Trump confirms US government's 10% stake in Intel, stock climbs https://9to5mac.com/2025/08/22/trump-confirms-us-governments-10-stake-in-intel-stock-climbs/ U.S. Intel https://stratechery.com/2025/u-s-intel/ Bluesky blocks service in Mississippi over age assurance law https://techcrunch.com/2025/08/24/bluesky-blocks-service-in-mississippi-over-age-assurance-law/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on  Twitter and Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #25229: Live! - Gemini and Siri, The FTC's Encryption Demands, Y Combinator and Epic

MacVoices Audio

Play Episode Listen Later Sep 3, 2025 38:09


The MacVoices Live! panel debate reports that Apple may tap Google's Gemini for Siri, weighing multi-model AI, privacy, and sandboxed partnerships. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Ben Roethig, Jeff Gamet, Eric Bolden, Web Bixby, and Jim Rea review the FTC's warning not to weaken encryption at governments' request, then examine Y Combinator's brief backing Epic against App Store fees. The discussion wraps up with claims that Meta inflated ad outcomes and evaded Apple's tracking rules, and the often uncomfortable trade-offs of still using Facebook.  Today's MacVoices is supported by Insta360 and their new GO Ultra, the tiny 4K camera that goes everywhere with you. Visit store.Insta360.com and use the code  “MacVoices” for a free set of Sticky Tabs. Show Notes: Chapters: [0:00] Intro and sponsor mention (Insta360 Go Ultra) [0:27] Apple considering Gemini for Siri: pros, cons, privacy [3:51] Multi-model approach, sandboxing, and user transparency [10:11] Sponsor read: Insta360 Go Ultra [11:36] FTC warns tech firms not to weaken encryption for governments [13:52] Legal conflicts across regions and disclosure dilemmas [16:01] Y Combinator backs Epic: App Store fees and innovation “tax” [21:14] Developer frustrations, big-app exceptions, and fairness [26:30] Meta accused of inflating ad results, dodging ATT tracking rules [33:28] The dilemma of using Facebook despite privacy concerns[36:35] Wrap-up Links: Apple is reportedly considering using Gemini to power the new Siri https://www.engadget.com/ai/apple-is-reportedly-considering-using-gemini-to-power-the-new-siri-184528449.html FTC warns Apple it must not weaken data encryption at behest of rogue governments https://www.applemust.com/ftc-warns-apple-it-must-not-weaken-data-encryption-at-behest-of-rogue-governments/ Y Combinator backs Epic in Apple appeal, calls App Store fee a ‘tax on innovation' https://9to5mac.com/2025/08/21/y-combinator-backs-epic-in-apple-appeal-calls-app-store-fee-a-tax-on-innovation/ Meta accused of inflating ad results & dodging Apple privacy rules https://appleinsider.com/articles/25/08/21/meta-accused-of-inflating-ad-results-dodging-apple-privacy-rules Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on  Twitter and Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

HPE Tech Talk
Can we build technology today to defend against the threats of tomorrow?

HPE Tech Talk

Play Episode Listen Later Aug 28, 2025 22:44


Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

The Pure Report
15 Architectural Decisions Series: Encryption, Metadata, and Install/Repair/Replace (DIY)

The Pure Report

Play Episode Listen Later Aug 26, 2025 34:39


Episode 5 of our series covers always-on encryption, the smart use of metadata, and our DIY install/repair/upgrade approach. Pure's approach to security is to have it built-in and non-optional, with end-to-end encryption—covering both user data and metadata—using device or software-based AES-256 alongside features like Rapid Data Locking, role-based access controls, and secure erasure methods to protect against breaches and support compliance needs. Next, hear about how metadata serves as the “secret sauce” for Pure, enabling highly efficient, granular data services and powering capabilities like snapshots and instant cloning through a scalable, multi-tiered framework that writes, caches, and protects metadata in ways traditional arrays cannot match. Finally, we touch on installation, repairs, and upgrades which are designed for ultimate simplicity and DIY ease, with non-disruptive software and hardware changes—thanks to Pure's Evergreen architecture—which allows organizations to grow and evolve storage resources without operational downtime, complex migrations, or compromise. These architectural choices underpin Pure's promise of secure, resilient, and agile storage that adapts to changing business needs while remaining effortless to manage. Series Overview: Pure Storage's foundational approach to product engineering is guided by 15 architectural decisions that were established at the company's inception and have shaped both the technical and user experience across its product lines. These architectural choices were not made arbitrarily—they stem from a deliberate focus on simplicity, efficiency, and scalability, ensuring Pure could deliver storage solutions that break away from legacy complexity and enable continuous innovation without compromise. This series will guide viewers through all of the 15 principles, helping you understand why certain choices were made, how they impact your operations, and how they compare to other industry features and products. Join Pure Report podcast hosts Rob Ludeman, Andrew Miller, and J.D Wallace for this fun technical retrospective on Pure Storage.

Business of Tech
95% of AI Pilots Fail; UK Drops Apple Encryption Demand; US Buys 10% of Intel with Taxpayer Funds

Business of Tech

Play Episode Listen Later Aug 25, 2025 18:21


MIT's recent report reveals that a staggering 95% of enterprise generative AI pilot programs fail to deliver results, primarily due to poor execution rather than the quality of the AI models themselves. The study, which involved interviews with 150 leaders and a survey of 350 employees, highlights a significant learning gap in integrating these tools into business operations. Despite the promise of generative AI, most companies are misallocating their budgets, focusing on sales and marketing instead of back-office automation, where the highest returns are found. This disconnect is further exacerbated by outdated IT help desks, which hinder security and efficiency.The UK government has recently backed off its demand for Apple to provide backdoor access to user data protected by iCloud encryption, following pressure from U.S. officials. This decision is seen as a win for privacy advocates, but the ongoing clash between governments over data privacy regulations continues to pose challenges for tech companies. The FTC has warned major tech firms against compromising U.S. privacy standards in an effort to comply with foreign regulations, highlighting the complexities of compliance fragmentation that affects customers.In the realm of artificial intelligence, OpenAI has announced updates to its latest model, GPT-5, aiming to make it more approachable after user feedback indicated a preference for the previous version, GPT-4. Meanwhile, Chinese startup DeepSeek has launched a powerful AI model, DeepSeek v3.1, which challenges the dominance of American companies. Additionally, Elon Musk's XAI has open-sourced its GROK 2.5 model, despite facing controversy over its previous iterations. These developments illustrate the rapidly evolving landscape of AI technology and the competitive pressures within the industry.The U.S. government has made headlines by purchasing a 10% stake in Intel, investing $8.9 billion in taxpayer money to stabilize the company amid its ongoing struggles. Critics argue that this move represents a shift towards industrial policy rather than traditional capitalism, as the government selects specific companies as winners and losers. This intervention raises questions about the future of the semiconductor market, as government involvement could alter pricing, supply, and vendor strategies. For IT service providers, this situation underscores the importance of diversifying hardware investments and preparing clients for potential market disruptions. Four things to know today 00:00 MIT Finds 95% of GenAI Pilots Fail, While Businesses Overspend on Cloud and Ignore IT Gaps05:08 UK Retreats on Apple Backdoor Demand as FTC Warns Big Tech and OpenAI Lands Federal Deal08:14 GPT-5 Gets a Personality Makeover, DeepSeek Goes Big, Musk Goes Open Source, and Zoom Gives You a Robot Receptionist12:50 U.S. Buys 10% of Intel With $8.9B Investment, Blurring Lines Between Capitalism and Industrial Policy This is the Business of Tech.    Supported by:  https://scalepad.com/dave/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

iOS Today (Video HI)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (Video HI)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

iOS Today (MP3)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (MP3)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

All TWiT.tv Shows (MP3)
iOS Today 766: Task & Project Management

All TWiT.tv Shows (MP3)

Play Episode Listen Later Aug 21, 2025 55:23 Transcription Available


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

iOS Today (Video)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (Video)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

HPE Tech Talk
How are governments reacting to the threat of quantum computers?

HPE Tech Talk

Play Episode Listen Later Aug 21, 2025 20:31


Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/

The Post-Quantum World
One PQC Playbook – with Kevin Hilscher of DigiCert

The Post-Quantum World

Play Episode Listen Later Aug 20, 2025 32:58


DigiCert is widely recognized for its expertise in PKI and as a TLS certificate authority. As you can imagine, they have a significant perspective on the quantum computing threat to encryption and the migration to post-quantum cryptography (PQC). We cover everything from the challenges of upgrading IoT devices to ML-DSA signature sizes, as well as the new DigiCert One platform the company offers to help manage the migration process. In the middle of this episode, you'll even get a clear summary of what a successful rollout to PQC looks like. Join host Konstantinos Karagiannis for a wide-ranging chat on actionable PQC steps you can take with Kevin Hilscher from DigiCert. There's even a Quantum Safe Playground to experiment with!For more information on DigiCert, visit www.digicert.com/.   Visit the Quantum Safe Playground at https://labs.digicert.com/quantum-safe.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

The Deep Dive Radio Show and Nick's Nerd News
Encryption security gets a global win...

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Aug 19, 2025 4:59


Watchdog on Wall Street
Apple vs. Governments: A Win for Privacy and Encryption

Watchdog on Wall Street

Play Episode Listen Later Aug 19, 2025 3:49 Transcription Available


LISTEN and SUBSCRIBE on:Apple Podcasts: https://podcasts.apple.com/us/podcast/watchdog-on-wall-street-with-chris-markowski/id570687608 Spotify: https://open.spotify.com/show/2PtgPvJvqc2gkpGIkNMR5i WATCH and SUBSCRIBE on:https://www.youtube.com/@WatchdogOnWallstreet/featured  Apple takes a stand for user privacy, defeating the UK government's push for a backdoor into its encrypted data. From the Investigatory Powers Act of 2016 to San Bernardino-era controversies, this episode explores how Apple's Advanced Data Protection safeguards iCloud users from government overreach and hackers alike. A deep dive into the tech giant's commitment to security, civil liberties, and why Apple continues to set the standard for protecting personal data worldwide.

ITSPmagazine | Technology. Cybersecurity. Society
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 21:11


At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler

The Treasury Update Podcast
Exploring Homomorphic Encryption: Fundamentals and Potential Applications in Finance

The Treasury Update Podcast

Play Episode Listen Later Aug 11, 2025 20:49


In this episode, Craig Jeffery and Brian Weeks explore homomorphic encryption, an emerging encryption method that allows data to be processed while still encrypted. They discuss how it works, why it matters, and potential future applications in finance, benchmarking, and fraud detection. When will it become relevant to treasury? Listen in for a forward-looking perspective.   For a deeper technical dive, check out these videos: https://youtu.be/SEBdYXxijSo https://youtu.be/lNw6d05RW6E

BlockHash: Exploring the Blockchain
Ep. 567 Joe Andrews | Decentralized Applications with Encryption on Aztec

BlockHash: Exploring the Blockchain

Play Episode Listen Later Aug 5, 2025 26:41


For episode 567 of the BlockHash Podcast, host Brandon Zemp is joined by Joe Andrews, Co-founder & President of Aztec. Aztec is a fully programmable private ZK-rollup on Ethereum enabling developers to create decentralized applications with encryption and scale.⏳ Timestamps: (0:00) Introduction(0:55) Who is Joe Andrews?(4:03) Aztec in 2025(6:00) Aztec Roadmap(8:05) Aztec's role in Privacy Onchain(12:50) Aztec ecosystem applications(16:30) Balancing Privacy and Compliance Onchain(20:40) Future of Privacy(23:45) Events & Conferences in 2025(24:35) Aztec website, socials & community 

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Security Now (MP3)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HD)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HI)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HI)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Audio)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Audio)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video LO)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Politicology
Epstein, Encryption, and Vanishing Trust—The Weekly

Politicology

Play Episode Listen Later Jul 26, 2025 92:23


Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and  Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals about the importance of impartial justice and truth. They dig into the U.K.'s Banter Bill and its chilling effect on free speech—an essential pillar of democratic society. And they discuss the Tornado Cash trial unfolding in Manhattan, and how it could set a precedent that reshapes Americans' digital privacy rights. These aren't just headline stories—they're stress tests for the core values that make democracy function. Then, in Politicology+ they discuss Javier Milei proving his detractors wrong and the remarkable turn around in Argentina this year.  Not yet a Politicology+ member? Don't miss all the extra episodes on the private, ad-free version of this podcast. Upgrade now at politicology.com/plus. Find our sponsor links and promo codes here: https://bit.ly/44uAGZ8 Send your questions and ideas to podcast@politicology.com or leave a voicemail at ‪(703) 239-3068‬ Follow this week's panel on X (formerly Twitter): https://twitter.com/RonSteslow https://x.com/HagarChemali Related Reading:  WSJ- Justice Department Told Trump in May That His Name Is Among Many in the Epstein Files Axios - Deputy attorney general seeking meeting with Epstein associate Ghislaine Maxwell FP - Britain's War on Speech Comes for the Pub NYTimes - As Trump Quits UNESCO, China Expands Influence - The New York Times Axios - The trial of a Tornado Cash developer begins Coindesk - Legitimate Privacy Tool or Dirty Money ‘Laundromat'? Lawyers Debate Role of Tornado Cash on Day 1 of Roman Storm Trial Learn more about your ad choices. Visit megaphone.fm/adchoices

MacBreak Weekly (Audio)
MBW 982: Everyday I'm Scrobblin' - UK Backs Down on Apple Encryption Backdoor

MacBreak Weekly (Audio)

Play Episode Listen Later Jul 23, 2025 136:08


When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit