Process of converting plaintext to ciphertext
POPULARITY
Categories
A Note from James:In the last episode, we talked about whether Martin Shkreli really deserves the label “most hated man in America.” My conclusion was no, and I hope you came to the same conclusion after hearing his perspective.In this episode, we shift gears completely. We talk about Bitcoin, crypto, AI, energy, optical computing, and what the future of technology might actually look like.Martin has a very unusual combination of skills—finance, biotech, programming—and I always enjoy hearing how he connects ideas across different fields. That's what this conversation is about.Episode Description:What happens when AI demand collides with the limits of computing power and energy?In Part 2, Martin Shkreli and James explore the future of technology—from crypto vulnerabilities to optical computing, GPU scaling, and the potential energy crisis driven by artificial intelligence.They discuss whether Bitcoin can survive quantum computing, why stablecoins solve real-world financial problems, and how computing architecture may shift beyond traditional silicon chips. The conversation then moves into AI economics: why companies might spend billions on compute to make better decisions, how energy constraints could shape innovation, and why optical computing could become the next major breakthrough.This episode isn't about controversy—it's about technological leverage, incentives, and where computation is heading next.What You'll Learn:Why quantum computing could eventually threaten Bitcoin's encryptionThe real-world advantages of stablecoins and decentralized paymentsHow AI demand could create massive new energy constraintsWhy optical (photonic) computing may outperform traditional silicon chipsHow businesses might use large-scale AI compute for strategic decisionsTimestamped Chapters:[00:02:00] Bitcoin, Encryption & Quantum Computing Risks[00:03:02] A Note from James[00:03:34] Crypto Markets: Speculation vs. Utility[00:05:23] Banking Control, Debanking & Stablecoins[00:07:40] Moore's Law, Huang's Law & The Limits of Silicon[00:08:45] Optical Computing Explained[00:09:12] NVIDIA, Parallelization & Power Consumption[00:10:24] Energy Constraints & The Electrical Grid[00:11:41] AI Energy Demand vs. Countries[00:12:24] Corporate AI Decision-Making at Scale[00:13:37] The Coming Explosion of AI Compute[00:14:20] Energy Efficiency vs. Speed[00:15:17] GPU Efficiency Improvements & Jevons Paradox[00:17:00] Why AI Is Different from Traditional Computing[00:17:47] Optical vs. Quantum vs. DNA Computing[00:18:19] Why Optical Computing Fits AI Perfectly[00:19:28] Precision, Bits & Neural Networks[00:21:24] Error Tolerance in AI Systems[00:22:00] Fiber Optics & Existing Infrastructure[00:23:16] New Computing Paradigms Beyond Silicon[00:24:00] Matrix Multiplication & AI Workloads[00:24:53] Closing ThoughtsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Quantum computing is accelerating — and putting today's encryption on a clock. John Stackhouse goes inside Xanadu's Toronto lab with Christian Weedbrook to meet Aurora, a networked quantum computer built to push scale in the right direction and speaks with Photonic's Dr. Stephanie Simmons about “harvest now, decrypt later,” fault-tolerant quantum, and why every organization needs a post-quantum cryptography (PQC) transition plan. It's not all doom and gloom. Simmons also lays out what quantum could unlock as it scales: new possibilities in materials, chemistry, and discovery that are moving from theory toward real-world impact. In this episode: Inside Xanadu: Aurora and what “networked quantum” looks like in the real world What “fault-tolerant” quantum means — and why it matters “Harvest now, decrypt later” and the trust implications for institutions Post-quantum cryptography (PQC): where leaders should start Quantum upside: materials, chemistry, and faster discovery RBC – Thought Leadership Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode, hosts Lois Houston and Nikita Abraham are joined by special guests Samvit Mishra and Rashmi Panda for an in-depth discussion on security and migration with Oracle Database@AWS. Samvit shares essential security best practices, compliance guidance, and data protection mechanisms to safeguard Oracle databases in AWS, while Rashmi walks through Oracle's powerful Zero-Downtime Migration (ZDM) tool, explaining how to achieve seamless, reliable migrations with minimal disruption. Oracle Database@AWS Architect Professional: https://mylearn.oracle.com/ou/course/oracle-databaseaws-architect-professional/155574 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, Anna Hulkower, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Nikita: Welcome to the Oracle University Podcast! I'm Nikita Abraham, Team Lead: Editorial Services with Oracle University, and with me is Lois Houston, Director of Communications and Adoption with Customer Success Services. Lois: Hello again! We're continuing our discussion on Oracle Database@AWS and in today's episode, we're going to talk about the aspects of security and migration with two special guests: Samvit Mishra and Rashmi Panda. Samvit is a Senior Manager and Rashmi is a Senior Principal Database Instructor. 00:59 Nikita: Hi Samvit and Rashmi! Samvit, let's begin with you. What are the recommended security best practices and data protection mechanisms for Oracle Database@AWS? Samvit: Instead of everyone using the root account, which has full access, we create individual users with AWS, IAM, Identity Center, or IAM service. And in addition, you must use multi-factor authentication. So basically, as an example, you need a password and a temporary code from virtual MFA app to log in to the console. Always use SSL or TLS to communicate with AWS services. This ensures data in transit is encrypted. Without TLS, the sensitive information like credentials or database queries can be intercepted. AWS CloudTrail records every action taken in your AWS account-- who did what, when, and from where. This helps with audit, troubleshooting, and detecting suspicious activity. So you must set up API and user activity logging with AWS CloudTrail. Use AWS encryption solutions along with all default security controls within AWS services. To store and manage keys by using transparent data encryption, which is enabled by default, Oracle Database@AWS uses OCI vaults. Currently, Oracle Database@AWS doesn't support the AWS Key Management Service. You should also use advanced managed security services such as Amazon Macie, which assists in discovering and securing sensitive data that is stored in Amazon S3. 03:08 Lois: And how does Oracle Database@AWS deliver strong security and compliance? Samvit: Oracle Database@AWS enforces transparent data encryption for all data at REST, ensuring stored information is always protected. Data in transit is secured using SSL and Native Network Encryption, providing end-to-end confidentiality. Oracle Database@AWS also uses OCI Vault for centralized and secure key management. This allows organizations to manage encryption keys with fine-grained control, rotation policies, and audit capabilities to ensure compliance with regulatory standards. At the database level, Oracle Database@AWS supports unified auditing and fine-grained auditing to track user activity and sensitive operations. At the resource level, AWS CloudTrail and OCI audit service provide comprehensive visibility into API calls and configuration changes. At the database level, security is enforced using database access control lists and Database Firewall to restrict unauthorized connections. At the VPC level, network ACLs and security groups provide layered network isolation and access control. Again, at the database level, Oracle Database@AWS enforces access controls to Database Vault, Virtual Private Database, and row-level security to prevent unauthorized access to sensitive data. And at a resource level, AWS IAM policies, groups, and roles manage user permissions with the fine-grained control. 05:27 Lois Samvit, what steps should users be taking to keep their databases secure? Samvit: Security is not a single feature but a layered approach covering user access, permissions, encryption, patching, and monitoring. The first step is controlling who can access your database and how they connect. At the user level, strong password policies ensure only authorized users can login. And at the network level, private subnets and network security group allow you to isolate database traffic and restrict access to trusted applications only. One of the most critical risks is accidental or unauthorized deletion of database resources. To mitigate this, grant delete permissions only to a minimal set of administrators. This reduces the risk of downtime caused by human error or malicious activity. Encryption ensures that even if the data is exposed, it cannot be read. By default, all databases in OCI are encrypted using transparent data encryption. For migrated databases, you must verify encryption is enabled and active. Best practice is to rotate the transparent data encryption master key every 90 days or less to maintain compliance and limit exposure in case of key compromise. Unpatched databases are one of the most common entry points for attackers. Always apply Oracle critical patch updates on schedule. This mitigates known vulnerabilities and ensures your environment remains protected against emerging threats. 07:33 Nikita: Beyond what users can do, are there any built-in features or tools from Oracle that really help with database security? Samvit: Beyond the basics, Oracle provides powerful database security tools. Features like data masking allow you to protect sensitive information in non-production environments. Auditing helps you monitor database activity and detect anomalies or unauthorized access. Oracle Data Safe is a managed service that takes database security to the next level. It can access your database configuration for weaknesses. It can also detect risky user accounts and privileges, identify and classify sensitive data. It can also implement controls such as masking to protect that data. And it can also continuously audit user activity to ensure compliance and accountability. Now, transparent data encryption enables you to encrypt sensitive data that you store in tables and tablespaces. It also enables you to encrypt database backups. After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access that data. You can configure OCI Vault as a part of the transparent data encryption implementation. This enables you to centrally manage keystore in your enterprise. So OCI Vault gives centralized control over encryption keys, including key rotation and customer managed keys. 09:23 Lois: So obviously, lots of companies have to follow strict regulations. How does Oracle Database@AWS help customers with compliance? Samvit: Oracle Database@AWS has achieved a broad and rigorous set of compliance certifications. The service supports SOC 1, SOC 2, and SOC 3, as well as HIPAA for health care data protection. If we talk about SOC 1, that basically covers internal controls for financial statements and reporting. SOC 2 covers internal controls for security, confidentiality, processing integrity, privacy, and availability. SOC 3 covers SOC 2 results tailored for a general audience. And HIPAA is a federal law that protects patients' health information and ensures its confidentiality, integrity, and availability. It also holds certifications and attestations such as CSA STAR, C5. Now C5 is a German government standard that verifies cloud providers meet strict security and compliance requirements. CSA STAR attestation is an independent third-party audit of cloud security controls. CSA STAR certification also validates a cloud provider's security posture against CSA's cloud controls matrix. And HDS is a French certification that ensures cloud providers meet stringent requirements for hosting and protecting health care data. Oracle Database@AWS also holds ISO and IEC standards. You can also see PCI DSS, which is basically for payment card security and HITRUST, which is for high assurance health care framework. So, these certifications ensure that Oracle Database@AWS not only adheres to best practices in security and privacy, but also provides customers with assurance that their workloads align with globally recognized compliance regimes. 11:47 Nikita: Thank you, Samvit. Now Rashmi, can you walk us through Oracle's migration solution that helps teams move to OCI Database Services? Rashmi: Oracle Zero-Downtime Migration is a robust and flexible end-to-end database migration solution that can completely automate and streamline the migration of Oracle databases. With bare minimum inputs from you, it can orchestrate and execute the entire migration task, virtually needing no manual effort from you. And the best part is you can use this tool for free to migrate your source Oracle databases to OCI Oracle Database Services faster and reliably, eliminating the chances of human errors. You can migrate individual databases or migrate an entire fleet of databases in parallel. 12:34 Nikita: Ok. For someone planning a migration with ZDM, are there any key points they should keep in mind? Rashmi: When migrating using ZDM, your source databases may require minimal downtime up to 15 minutes or no downtime at all, depending upon the scenario. It is built with the principles of Oracle maximum availability architecture and leverages technologies like Oracle GoldenGate and Oracle Data Guard to achieve high availability and online migration workflow using Oracle migration methods like RMAN, Data Pump, and Database Links. Depending on the migration requirement, ZDM provides different migration method options. It can be logical or physical migration in an online or offline mode. Under the hood, it utilizes the different database migration technologies to perform the migration. 13:23 Lois: Can you give us an example of this? Rashmi: When you are migrating a mission critical production database, you can use the logical online migration method. And when you are migrating a development database, you can simply choose the physical offline migration method. As part of the migration job, you can perform database upgrades or convert your database to multitenant architecture. ZDM offers greater flexibility and automation in performing the database migration. You can customize workflow by adding pre or postrun scripts as part of the workflow. Run prechecks to check for possible failures that may arise during migration and fix them. Audit migration jobs activity and user actions. Control the execution like schedule a job pause, resume, if needed, suspend and resume the job, schedule the job or terminate a running job. You can even rerun a job from failure point and other such capabilities. 14:13 Lois: And what kind of migration scenarios does ZDM support? Rashmi: The minimum version of your source Oracle Database must be 11.2.0.4 and above. For lower versions, you will have to first upgrade to at least 11.2.0.4. You can migrate Oracle databases that may be of the Standard or Enterprise edition. ZDM supports migration of Oracle databases, which may be a single-instance, or RAC One Node, or RAC databases. It can migrate on Unix platforms like Linux, Oracle Solaris, and AIX. For Oracle databases on AIX and Oracle Solaris platform, ZDM uses logical migration method. But if the source platform is Linux, it can use both physical and logical migration method. You can use ZDM to migrate databases that may be on premises, or in third-party cloud, or even within Oracle Cloud Infrastructure. ZDM leverages Oracle technologies like RMAN datacom, Database Links, Data Guard, Oracle GoldenGate when choosing a specific migration workflow. 15:15 Are you ready to revolutionize the way you work? Discover a wide range of Oracle AI Database courses that help you master the latest AI-powered tools and boost your career prospects. Start learning today at mylearn.oracle.com. 15:35 Nikita: Welcome back! Rashmi, before someone starts using ZDM, is there any prep work they should do or things they need to set up first? Rashmi: Working with ZDM needs few simple configuration. Zero-downtime migration provides a command line interface to run your migration job. First, you have to download the ZDM binary, preferably download from my Oracle Support, where you can get the binary with the latest updates. Set up and configure the binary by following the instructions available at the same invoice node. The host in which ZDM is installed and configured is called the zero-downtime migration service host. The host has to be Oracle Linux version 7 or 8, or it can be RCL 8. Next is the orchestration step where connection to the source and target is configured and tested like SSH configuration with source and target, opening the ports in respective destinations, creation of dump destination, granting required database privileges. Prepare the response file with parameter values that define the workflow that ZDM should use during Oracle Database migration. You can also customize the migration workflow using the response file. You can plug in run scripts to be executed before or after a specific phase of the migration job. These customizations are called custom plugins with user actions. Your sources may be hosted on-premises or OCI-managed database services, or even third-party cloud. They may be Oracle Database Standard or Enterprise edition and on accelerator infrastructure or a standard compute. The target can be of the same type as the source. But additionally, ZDM supports migration to multicloud deployments on Oracle Database@Azure, Oracle Database@Google Cloud, and Oracle Database@AWS. You begin with a migration strategy where you list the different databases that can be migrated, classification of the databases, grouping them, performing three migration checks like dependencies, downtime requirement versions, and preparing the order migration, the target migration environment, et cetera. 17:27 Lois: What migration methods and technologies does ZDM rely on to complete the move? Rashmi: There are primarily two types of migration: physical or logical. Physical migration pertains to copy of the database OS blocks to the target database, whereas in logical migration, it involves copying of the logical elements of the database like metadata and data. Each of these migration methods can be executed when the database is online or offline. In online mode, migration is performed simultaneously while the changes are in progress in the source database. While in offline mode, all changes to the source database is frozen. For physical offline migration, it uses backup and restore technique, while with the physical online, it creates a physical standby using backup and restore, and then performing a switchover once the standby is in sync with the source database. For logical offline migration, it exports and imports database metadata and data into the target database, while in logical online migration, it is a combination of export and import operation, followed by apply of incremental updates from the source to the target database. The physical or logical offline migration method is used when the source database of the application can allow some downtime for the migration. The physical or logical online migration approach is ideal for scenarios where any downtime for the source database can badly affect critical applications. The only downtime that can be tolerated by the application is only during the application connection switchover to the migrated database. One other advantage is ZDM can migrate one or a fleet of Oracle databases by executing multiple jobs in parallel, where each job workflow can be customized to a specific database need. It can perform physical or logical migration of your Oracle databases. And whether it should be performed online or offline depends on the downtime that can be approved by business. 19:13 Nikita: Samvit and Rashmi, thanks for joining us today. Lois: Yeah, it's been great to have you both. If you want to dive deeper into the topics we covered today, go to mylearn.oracle.com and search for the Oracle Database@AWS Architect Professional course. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 19:35 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
The panel starts out by discussing a major deal for Apple TV and what it could mean for their content ambitions. Chuck Joiner, David Ginsburg, Jeff Gamet, Jim Rea, Web Bixby, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, Mark Fuccio, and Norbert Frassa debate encryption initiatives, comparing Signal and Messages security, including open source, metadata, and device safety considerations. The session wraps with commentary on the apparent abandonment of about 8K TVs due to cost, lack of content, and limited real-world viewing benefits. This edition of MacVoices is brought to you by the MacVoices Dispatch, our weekly newsletter that keeps you up-to-date on any and all MacVoices-related information. Subscribe today and don't miss a thing. Show Notes: Chapters: 00:00 Introduction and show context 12:00 Discussion of Hollywood trends and feel-good films 24:00 Messaging security debate: Signal vs. iMessage 36:00 Rise of decentralized social platforms 48:00 Weekly tech coverage across related shows 54:00 Wrap-up and social media presence Links: Apple TV may have found its Game of Thrones https://www.applemust.com/apple-tv-may-have-found-its-game-of-thrones/ Electronic Frontier Foundation wants tech companies like Apple to ‘Encrypt It Already' https://appleworld.today/2026/01/electronic-frontier-foundation-wants-tech-companies-like-apple-to-encrypt-it-already Everybody Has Something To Hide by Guy Kawasaki https://amzn.to/4atZG7i The TV industry finally concedes that the future may not be in 8K https://arstechnica.com/gadgets/2026/01/lg-joins-the-rest-of-the-world-accepts-that-people-dont-want-8k-tvs/ Comcast keeps losing customers despite price guarantee and unlimited data https://arstechnica.com/tech-policy/2026/01/comcast-keeps-losing-customers-despite-price-guarantee-and-unlimited-data/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Norbert Frassa is a technology “man about town”. Follow him on Twitter and see what he's up to. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The panel starts out by discussing a major deal for Apple TV and what it could mean for their content ambitions. Chuck Joiner, David Ginsburg, Jeff Gamet, Jim Rea, Web Bixby, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, Mark Fuccio, and Norbert Frassa debate encryption initiatives, comparing Signal and Messages security, including open source, metadata, and device safety considerations. The session wraps with commentary on the apparent abandonment of about 8K TVs due to cost, lack of content, and limited real-world viewing benefits. This edition of MacVoices is brought to you by the MacVoices Dispatch, our weekly newsletter that keeps you up-to-date on any and all MacVoices-related information. Subscribe today and don't miss a thing. Show Notes: Chapters: 00:00 Introduction and show context 12:00 Discussion of Hollywood trends and feel-good films 24:00 Messaging security debate: Signal vs. iMessage 36:00 Rise of decentralized social platforms 48:00 Weekly tech coverage across related shows 54:00 Wrap-up and social media presence Links: Apple TV may have found its Game of Thrones https://www.applemust.com/apple-tv-may-have-found-its-game-of-thrones/ Electronic Frontier Foundation wants tech companies like Apple to 'Encrypt It Already' https://appleworld.today/2026/01/electronic-frontier-foundation-wants-tech-companies-like-apple-to-encrypt-it-already Everybody Has Something To Hide by Guy Kawasaki https://amzn.to/4atZG7i The TV industry finally concedes that the future may not be in 8K https://arstechnica.com/gadgets/2026/01/lg-joins-the-rest-of-the-world-accepts-that-people-dont-want-8k-tvs/ Comcast keeps losing customers despite price guarantee and unlimited data https://arstechnica.com/tech-policy/2026/01/comcast-keeps-losing-customers-despite-price-guarantee-and-unlimited-data/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Norbert Frassa is a technology "man about town". Follow him on Twitter and see what he's up to. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession 'firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Jim and Allan disagree on how new hard drive tech is likely to work, more on storage and compute in the same box, and how we set up disk encryption on laptops. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes OpenZFS Monitoring and Observability News/discussion Western Digital doubles the performance of hard drives with dual-actuator High-Bandwidth, with path to 8X performance increase — Power-Optimized HDDs will reduce power by 20 percent Free consulting We were asked about how we set up disk encryption on laptops. A quick-start guide to OpenZFS native encryption – Ars Technica Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation See our contact page for ways to get in touch.
Jim and Allan disagree on how new hard drive tech is likely to work, more on storage and compute in the same box, and how we set up disk encryption on laptops. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes OpenZFS Monitoring and Observability News/discussion Western Digital doubles the performance of hard drives with dual-actuator High-Bandwidth, with path to 8X performance increase — Power-Optimized HDDs will reduce power by 20 percent Free consulting We were asked about how we set up disk encryption on laptops. A quick-start guide to OpenZFS native encryption – Ars Technica Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation See our contact page for ways to get in touch.
Atombeam CEO Charles Yeomans joins Chris Lustrino to break down a deceptively simple idea with massive implications: make data smaller while it's streaming so you can move and process more of it—without upgrading networks.Charles explains Atombeam's commercial product NeurPack, how it can often quadruple effective bandwidth, and why this matters across IoT, smart meters, satellites, defense, oil & gas wells, fintech, and eventually data centers and GPU utilization. They also dig into the realities of commercialization—choosing near-term deals that close fast while still pursuing multi-year “industry standard” opportunities—and why execution (not invention) is the real differentiator.00:00 What Atombeam does (pizza analogy)03:13 NeurPack explained05:35 Why 95% of IoT data doesn't move09:38 “Like launching 3 more satellites”13:57 Commercialization + customers16:31 Data centers + GPU utilization24:29 Defense traction + partnerships26:44 What success looks like (distribution)
At the dawn of 2026, the post quantum (PQ) era has effectively arrived with “harvest now, decrypt later” style attacks and the availability of NIST post quantum cryptography (PQC) standards. So, how prepared are organizations really, and what does the future of encryption look like? In this episode, our Entrust PQ experts Michael Klieman and Samantha Mabey answer these questions and more by sharing key insights and trends from the Entrust 2026 Global State of Post-Quantum and Cryptographic Security Trends.
None of Your Goddamn BusinessJohn Morgan Salomon said something during our conversation that I haven't stopped thinking about. We were discussing encryption, privacy laws, the usual terrain — and he cut through all of it with five words: "It's none of your goddamn business."Not elegant. Not diplomatic. But exactly right.John has spent 30 years in information security. He's Swiss, lives in Spain, advises governments and startups, and uses his real name on social media despite spending his career thinking about privacy. When someone like that tells you he's worried, you should probably pay attention.The immediate concern is something called "Chat Control" — a proposed EU law that would mandate access to encrypted communications on your phone. It's failed twice. It's now in its third iteration. The Danish Information Commissioner is pushing it. Germany and Poland are resisting. The European Parliament is next.The justification is familiar: child abuse materials, terrorism, drug trafficking. These are the straw man arguments that appear every time someone wants to break encryption. And John walked me through the pattern: tragedy strikes, laws pass in the emotional fervor, and those laws never go away. The Patriot Act. RIPA in the UK. The Clipper Chip the FBI tried to push in the 1990s. Same playbook, different decade.Here's the rhetorical trap: "Do you support terrorism? Do you support child abuse?" There's only one acceptable answer. And once you give it, you've already conceded the frame. You're now arguing about implementation rather than principle.But the principle matters. John calls it the panopticon — the Victorian-era prison design where all cells face inward toward a central guard tower. No walls. Total visibility. The transparent citizen. If you can see what everyone is doing, you can spot evil early. That's the theory.The reality is different. Once you build the infrastructure to monitor everyone, the question becomes: who decides what "evil" looks like? Child pornographers, sure. Terrorists, obviously. But what about LGBTQ individuals in countries where their existence is criminalized? John told me about visiting Chile in 2006, where his gay neighbor could only hold his partner's hand inside a hidden bar. That was a democracy. It was also a place where being yourself was punishable by prison.The targets expand. They always do. Catholics in 1960s America. Migrants today. Anyone who thinks differently from whoever holds power at any given moment. These laws don't just catch criminals — they set precedents. And precedents outlive the people who set them.John made another point that landed hard: the privacy we've already lost probably isn't coming back. Supermarket loyalty cards. Surveillance cameras. Social media profiles. Cookie consent dialogs we click through without reading. That version of privacy is dead. But there's another kind — the kind that prevents all that ambient data from being weaponized against you as an individual. The kind that stops your encrypted messages from becoming evidence of thought crimes. That privacy still exists. For now.Technology won't save us. John was clear about that. Neither will it destroy us. Technology is just an element in a much larger equation that includes human nature, greed, apathy, and the willingness of citizens to actually engage. He sent emails to 40 Spanish members of European Parliament about Chat Control. One responded.That's the real problem. Not the law. Not the technology. The apathy.Republic comes from "res publica" — the thing of the people. Benjamin Franklin supposedly said it best: "A republic, if you can keep it." Keeping it requires attention. Requires understanding what's at stake. Requires saying, when necessary: this is none of your goddamn business.Stay curious. Stay Human. Subscribe to the podcast. And if you have thoughts, drop them in the comments — I actually read them.Marco CiappelliSubscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/John Salomon Experienced, international information security leader. vCISO, board & startup advisor, strategist.https://www.linkedin.com/in/johnsalomon/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
حلقة جديدة قوية من البودكاسترز مع مهند الكلش المدير التنفيذي لدى Zoom في الشرق الأوسط وتركيا وإفريقيا وباكستان
In this episode of Security Squawk, Bryan Hornung, Reginald Ande, & Randy Bryan break down three stories that should change how executives think about cyber risk. This is not about tools, alerts, or vendor promises. It is about operational dependency, leadership accountability, and financial exposure when systems fail. Story one focuses on active exploitation of SolarWinds Web Help Desk vulnerabilities being used as an entry point for ransomware staging. Researchers are seeing attackers move fast after initial access, blending in by using legitimate remote management and incident response tools. That is the point. When attackers use normal looking admin utilities, many organizations do not detect the intrusion until the business impact is already locked in. If you run Web Help Desk or you have not verified your patch posture, this is a governance issue, not an IT debate. Patch timelines and exposure management are leadership decisions because they directly affect business interruption risk. Story two is a warning about the ransomware market adapting. As more organizations refuse to pay for data theft only extortion, threat actors are expected to pivot back toward encryption. Encryption creates urgency because it disrupts operations. The financial exposure shifts toward downtime, recovery labor, lost revenue, and customer churn. Executives should treat restore capability like a business continuity requirement. If your recovery plan has not been tested under pressure, it is not a plan. Story three covers the BridgePay ransomware incident and the downstream impact on merchants and local government services. Even when payment card data is not confirmed compromised, availability failures still create real harm. Customers do not care which vendor was hit. They only see that your business cannot process transactions. This is a clear reminder to revisit vendor criticality, SLAs, outage communications, and contingency processing options. Security Squawk is built for business owners, executives, board members, and IT leaders who want the real world impact without the fear marketing. Subscribe, share, and support the show at https://buymeacoffee.com/securitysquawk
This show has been flagged as Clean by the host. Create a Linux kiosk at your library Start without a guest account The first few steps of this process don't actually require a guest user directory to exist, so do NOT create your guest user account yet. However, you do need to choose what your guest user account is going to be called. A reasonable account name for Don's purposes is libraryguest. On my personal computer I call my guest account guestaccount, and I've used kioskguest on some installations. I avoid just the name “guest” because in modern computing the term “guest” gets used in a few other ways (such as a “guest operating system” in a virtual environment), and it's just easier to find something unique in logs. Choose a unique name for you guest account, but don't create it yet. For this article, I'm using libraryguest. Create the PostSession script By default, GDM recognises several states: Init, PostLogin, PreSession, and PostSession. Each state has a directory located in /etc/gdm. When you place a shell script called Default in one of those directories, GDM runs the script when it reaches that state. To trigger actions to clean up a user's environment upon logout, create the file /etc/gdm/PostSession/Default. You can add whatever actions you want to run upon logout to the Default script. In the case of Don's library, we wanted to clear everything from the guest's home directory, including browser history, any LibreOffice files or GIMP files they may have created, and so on. It was important that we limited the very drastic action of removing all user data to just the guest user. We didn't want the admin's data to be erased upon logout, so whatever rule we added to /etc/gdm/PostSession/Default had to be limited to the guest user. Here's what we came up with: #!/usr/bin/sh echo "$USER logged out at `date`" >> /tmp/PostSession.log if [ "X$USER" = "Xlibraryguest" ]; then rm -rf "$HOME" fi exit 0 The first line is for logging purposes. The /tmp directory gets cleared out on most distributions automatically, so we weren't worried about creating a file that'll grow forever and eventually crash the computer. If your distribution of choice doesn't clean out /tmp automatically, create a cron job to do that for you. GDM knows what user triggered the logout process, so the if statement verifies that the user logging out is definitely the libraryguest user (that's the literal name of the user we created for library patrons).Note that the whitespace around the square brackets is important, so be precise when typing! As long as it is libraryguest, then the script removes the entire user directory ($HOME). That can be extremely dangerous if you make a mistake, so do thorough testing on a dummy system before implementing a script like this! If you get a condition wrong, you could erase your entire home directory upon logout. In this example, I've successfully limited the rm command to a logout action performed by user libraryguest. The entire /home/libraryguest directory is erased, and the computer returns to the GDM login screen. When a new user logs in, a fresh directory is created for the user. You can put any number of commands in your script, of course. You don't have to erase an entire directory. If all you really want to do is clear browser history and any stray data, then you can do that instead. If you need to copy specific configuration files into the environment, you can do that during the PreSession state. Just be sure to test thoroughly before committing your creation to your users! What happens when the guest doesn't log out At this point, the computer erases all of the user's data when the user logs out, but a reboot or a shutdown is different to a logout. GDM doesn't enter a PostSession state after a reboot signal has been received, even if the reboot occurs during an active GDM session. The easiest and safest way to erase an entire home directory when there's a cut to system power is to use a temporary RAM filesystem (tmpfs) to house the data in the first place. If the systems you're configuring have 8 GB or more, and the system is exclusively used as a guest computer, you can probably afford to use RAM as the guest's home directory. If your system doesn't have a lot of RAM, then you can use the systemd work-around in the next section. Assuming you have the RAM to spare, and that your systems are supported by a backup power supply, you can add a tmpfs entry in /etc/fstab. In this example, my tmpfs is mounted to /home/libraryguest and is just 2 GB: tmpfs /home/libraryguest tmpfs rw,nosuid,nodev,size=2G 0 0 That's plenty of space for some Internet browsing and even a few LibreOffice documents to be saved while a user works. Mount the new volume: $ sudo mount /home/libraryguest Next, you must create the libraryguest user manually in a terminal.The useradd command creates user profiles: $ sudo useradd --home-dir /home/libraryguest libraryguest useradd: warning: the home directory /home/libraryguest/ already exists. useradd: Not copying any file from skel directory into it. Because you've already created a location for the home directory, you do get a warning after creating the user. It's only a warning, not a fatal error, and the guest account is automatically populated later. Create a password for the new user: $ sudo passwd libraryguest That's it! You've created a guest account that refreshes with every logout and every reboot. You can skip over the next section of this article. Using systemd targets instead of a ramdisk Assuming you can't create a ramdisk for temporary user data, you can instead create a systemd service that runs a script when the reboot, poweroff, and multi-user targets are triggered: [Unit] Description=Kiosk cleanup [Service] Type=oneshot ExecStart=/usr/local/bin/kiosk-cleanup.sh [Install] WantedBy=poweroff.target reboot.target multi-user.target Save the file to /etc/systemd/system/kioskmode.service and then enable it: $ sudo systemctl enable --now kioskmode The script, like the GDM script, removes the libraryguest directory. Unlike GDM script, this one must also recreate an empty home directory and grant it user permissions: #!/usr/bin/bash rm -rf /home/libraryguest mkdir /home/libraryguest chown -R libraryguest:libraryguest /home/libraryguest Grant the script itself permission to run: $ sudo chmod +x /usr/local/bin/kiosk-cleanup.sh Now the libraryguest user data is erased after: Logout Reboot Shutdown Startup Essentially, no matter how the computer loses its session or its power, the libraryguest account starts fresh when a new session is started. Security and privacy Using systemd to erase data at shutdown and startup isn't strictly as secure as using a temporary ramdisk for all user data. Should the computer lose power suddenly, all saved user data in the libraryguest account is present during the next boot. Of course, it's erased as soon as multi-user.target is called by systemd, but it is technically possible to interrupt the boot process and mine for data. You must use full drive encryption to protect data from being discovered by an interrupted boot sequence. Why not just use xguest On many Linux distributions, the xguest package is designed to provide the Guest account, which resets after each logout. It was an extremely useful package that I installed on every machine I owned, because it's handy to be able to let friends use my computer without risking them making a mess of my home directory. Lately, it seems that xguest is failing to launch a desktop, however, presumably because it relies on X11. If xguest works for you in your tests, then you may want to use it instead of the solution I've presented here. My solution offers a lot of flexibility, thanks to GDM's autodetection of session states. Kiosks in libraries Privacy and personal information is more important than ever. Regardless of how you setup a kiosk for your library, you have an obligation to your users to keep them informed of how their data is being stored. This goes both ways. Users need to know that their data is destined to be erased as soon as they log out, and also they deserve to be assured that their data is not retained. However, it's also your responsibility to admit that glitches and exceptions could occur. Users need to understand that the computer they're using are public computers on a public network. Encryption is being used for traffic and for data storage, but you cannot guarantee absolute privacy. As long as everyone understands the arrangement, everyone can compute with confidence. Linux, GDM, and systemd are great tools to help libraries create a sustainable, robust, honest, and communal computing platform. Show notes taken from https://www.both.org/?p=13327
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you'll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don't reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn't change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption
This conversation reframes faith as correspondence, not striving. The issue isn't effort, information, or intensity—it's response. From the beginning, humanity was created in image and likeness, meaning the blueprint was already complete before the action began. Confusion doesn't come from God withholding direction, but from us responding out of fear, lack, or anticipation instead of alignment. Jesus models this perfectly: He doesn't chase instruction, ask excessive questions, or live in delay. He moves as the instruction itself.The discussion uses modern metaphors—encryption, direct connection, ethernet versus Wi-Fi—to explain spiritual efficiency. Prayer, especially “Our Father,” is presented as an encrypted alignment that protects identity and blocks interference. Faith is not future-based hope but present-tense movement. Jesus never lives ahead of Himself or behind Himself—He operates in now. The call of the episode is simple but confrontational: stop relaying life through anxiety and start living as God's intention already in motion.Timestamps00:00 – Opening flow & setting the conversation02:15 – Image, likeness, and correspondence05:10 – Striving vs responding08:40 – Faith as alignment, not effort12:05 – Jesus as the instruction15:30 – Overthinking, over-praying, and delay18:45 – Prayer as encrypted alignment22:20 – “Our Father” and identity protection26:10 – Faith only exists in the now30:00 – Ethernet vs Wi-Fi (direct connection metaphor)34:40 – Removing interference and clutter38:15 – Living as intention, not anticipation42:00 – Closing reflections on union and movement Get full access to REDTRI3 at redin30.substack.com/subscribe
In this urgent security assessment from January 30, 2026, the Qubit Value podcast conducts a comprehensive audit of the encryption standards currently securing the global economy, declaring many of them obsolete in the face of quantum advancements. The hosts identify RSA (2048/4096-bit) and Elliptic Curve Cryptography (ECC/ECDSA) as "definitively vulnerable," warning that ECC is particularly fragile against quantum attacks due to its smaller key sizes. They flag the ubiquitous Diffie-Hellman key exchange as a systemic risk, noting that it secures nearly 95% of web traffic. To counter the immediate "Harvest Now, Decrypt Later" threat, the episode prescribes a mandatory migration to NIST's approved Post-Quantum Cryptography (PQC) standards: ML-KEM (formerly Kyber) for key encapsulation, ML-DSA (formerly Dilithium) for digital signatures, Falcon for efficiency in constrained environments, and Sphincs+ (SLHDSA) as a conservative hash-based backup. The discussion concludes by urging executives to adopt a "Hybrid" strategy—pairing classical algorithms with quantum-resistant ones—and to achieve full crypto-agility by the industry's hard deadline of 2030. Want to hear more? Send a message to Qubit Value
RNZ replay 30 January 2026 In conversation with RNZ "Nine to Noon" host Kathryn Ryan, we look at the recent massive layoffs at Amazon, France's social media laws for under 15s, Microsoft giving the keys to your data kingdom to the FBI, and what happens when an organisation tasked with maintaining the safety of the airways turns to a computer to 'flood the zone' with regulation? Thanks to RNZ - Nine To Noon The Next Billion Seconds with Mark Pesce is produced by Ampel and Myrtle and Pine Listen on Spotify, Apple Sign up for 'The Practical Futurist' newsletter here. https://nextbillionseconds.com See omnystudio.com/listener for privacy information.
In 2026, digital privacy and security reflect a global power struggle among governments, corporations, and infrastructure providers. Encryption, once seen as absolute, is now conditional as regulators and companies find ways around it. Reports that Meta can bypass WhatsApp's end-to-end encryption and Ireland's new lawful interception rules illustrate a growing tolerance for backdoors, risking weaker international standards. Meanwhile, data collection grows deeper: TikTok reportedly tracks GPS, AI-interaction metadata, and cross‑platform behavior, leaving frameworks like OWASP as the final defense against mass exploitation.Cyber risk is shifting from isolated vulnerabilities to structural flaws. The OWASP Top 10 for 2025–26 shows that old problems—access control failures, misconfigurations, weak cryptography, and insecure design—remain endemic. Supply-chain insecurity, epitomized by the “PackageGate” (Shai‑Hulud) flaw in JavaScript ecosystems, demonstrates that inconsistent patching and poor governance expose developers system‑wide. Physical systems are no safer: at Pwn2Own Automotive 2026, researchers proved that electric vehicle chargers and infotainment systems can be hacked en masse, making charging a car risky in the same way as connecting to public Wi‑Fi. The lack of hardware‑rooted trust and sandboxing standards leaves even critical infrastructure vulnerable.Corporate and national sovereignty concerns are converging around what some call “digital liberation.” The alleged 1.4‑terabyte Nike breach by the “World Leaks” ransomware group shows how centralization magnifies damage—large, unified data stores become single points of catastrophic failure. In response, the EU's proposed Cloud and AI Development Act aims to build technological independence by funding open, auditable, and locally governed systems. Procurement rules are turning into tools of geopolitical self‑protection. For individuals, reliance on cloud continuity carries personal risks: in one case, a University of Cologne professor lost years of AI‑assisted research after a privacy setting change deleted key files, revealing that even privacy mechanisms can erase digital memory without backup.At the technological frontier, risk extends beyond IT. Ethics, aerospace engineering, and sustainability intersect in new fault lines. Anthropic's “constitutional AI” reframes alignment as a psychological concept, incorporating principles of self‑understanding and empathy—but critics warn this blurs science and philosophy. NASA's decision to modify, rather than redesign, the Orion capsule's heat shield for Artemis II—despite earlier erosion on Artemis I—has raised fears of “normalization of deviance,” where deadlines outweigh risk discipline. Beyond Earth, environmental data show nearly half of the world's largest cities already face severe water stress, exposing the intertwined fragility of digital, physical, and ecological systems.Across these issues, a shared theme emerges: sustainable security now depends not just on technical patches but on redefining how society manages data permanence, institutional transparency, and the planetary limits of infrastructure. The boundary between online safety, physical resilience, and environmental stability is dissolving—revealing that long‑term survival may rest less on innovation itself and more on rebuilding trust across the systems that sustain it.
In this episode from January 29, 2026, the Qubit Value podcast confronts the looming security crisis of the "Harvest Now, Decrypt Later" threat, where adversaries are already stealing encrypted data to unlock it once quantum computers mature. The discussion centers on the urgent need to migrate to Post-Quantum Cryptography (PQC), highlighting the new NIST-approved standards: ML-KEM (formerly Kyber) for key encapsulation and ML-DSA (formerly Dilithium) for digital signatures. The hosts explain that these algorithms rely on lattice-based mathematics, which creates a multi-dimensional "garden trellis" problem that is bafflingly complex even for quantum machines. A key takeaway is the concept of "Crypto-Agility," treating cryptographic protocols like swappable software modules rather than hard-coded locks, allowing companies to quickly patch vulnerabilities as threats evolve. The episode concludes with a stark warning to executives: the transition isn't an IT upgrade but a foundational rebuild of digital trust, and waiting until 2030 to act is a guaranteed strategy for obsolescence. Want to hear more? Send a message to Qubit Value
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
If you're using Bitlocker, you're not nearly as secure as you think!
Step into the fascinating world of cryptography. Host Amy Ciminnisi sits down with Yuri Kramarz from Cisco Talos Incident Response and Tim Wadhwa-Brown from Cisco Customer Experience to learn what encryption really accomplishes, where it leaves gaps, and when defenders need to take proactive measures.Whether you're picturing classic codebreakers or the latest quantum-proof ciphers, this episode unpacks the essentials: what encryption and hashing actually mean, why key management is a make-or-break factor, and how even the best algorithms can fall short if the basics aren't handled right.G7's "Coordinating the Transition to Post-Quantum Cryptography in the Financial Sector" roadmap: https://home.treasury.gov/news/press-releases/sb0355
Technology correspondent Mark Pesce joins Kathryn on the French parliament's backing of a social media ban for under 15s, following Australia's move - does that mean more countries will follow?
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok's creation of sexually explicit images. Glimmers of access pierce Iran's internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland's energy sector to Russia's Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it's time to pay for space safety.” Selected Reading FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread) European Commission opens new investigation into X's Grok (The Register) Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times) Hackers can bypass npm's Shai-Hulud defenses via Git dependencies (Bleeping Computer) Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer) CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer) CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer) ESET Research: Sandworm behind cyberattack on Poland's power grid in late 2025 (ESET) Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing) CISA won't attend infosec industry's biggest conference (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Anita Meyer is a researcher and author known for her work on The Bible Code, focusing on hidden patterns, encrypted messages, and mathematical structures believed by some to be embedded within biblical texts. Meyer explores equidistant letter sequences, numerical symbolism, and linguistic anomalies, examining whether these patterns point to historical events, prophetic insights, or deeper layers of meaning within scripture. Her work sits at the intersection of theology, mathematics, and metaphysical inquiry, encouraging readers to reconsider the Bible not only as a spiritual document, but also as a complex informational text that may contain coded knowledge beyond its surface narrative.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media
As a Canadian therapist in private practice, you are probably often needing to send and receive sensitive, private information. How often have you worried about these documents' security and safety? What should you do to secure email communications and keep unnecessary stress at bay? This is where Hushmail comes to the rescue. For less than $20 CAD per month, you can completely insure, assure, and secure your entire email inbox, including your forms and signatures. They pride themselves on security and simplicity, leaving you with a solution that you can start using right out of the box from the minute to sign up. In this episode, I chat with Anabeli about everything to do with Hushmail. We answer your questions and provide clear solutions to help you start 2026 with both digital email security and peace of mind. MEET ANABELI Anabeli Jackson is the Marketing Manager at Hushmail, where she leads content strategy and helps therapists understand secure communication with clarity and confidence. She focuses on removing the overwhelm from topics like encryption, compliance, and secure communication so clinicians can protect client trust and stay compliant with confidence. Anabeli has been with Hushmail since 2014 and brings a strong foundation in communication and marketing. Her work supports mental health providers across Canada and the U.S. who depend on Hushmail to communicate securely with their clients. Learn more about Anabeli on her LinkedIn profile. In this episode: What is Hushmail? Why Canadian therapists should use Hushmail What encryption is and why you need to use it How you can get started with Hushmail What is Hushmail? 'Hushmail is a secure email platform … built specifically for healthcare and therapy practices. It lets you send and receive secure, encrypted emails, and it helps you build secure forms where you can collect information securely with legally binding signatures - and it's all in one place.' - Anabeli Jackson The two cornerstones of Hushmail are focused on client and clinician security when sending sensitive emails and documents online, and simplicity since you don't need to do any tech implementation yourself! These essential emails and documents are securely sent and kept private and secure by using encryption to protect them. Why Canadian therapists should use Hushmail You may be asking: Why should I pay to use Hushmail instead of the available, free services? The answer is this: Canadian therapists handle highly sensitive information from multiple clients. Using a free email provider simply does not provide enough security and protection, while Hushmail guarantees it. 'We make it really practical to have [your client's private information] safeguarded, because encryption is the one step … that you can put in place to have your information secure … So [Hushmail] supports federal law, but also with provincial privacy laws.' - Anabeli Jackson Hushmail provides the security that you and your clients need to send private information without concern in an easy, simple way. Plus, it is a Canadian company that is PIPEDA and HIPAA compliant! What encryption is and why you need to use it Encryption is essentially a method of scrambling the information contained in emails and documents so that it cannot be understood by any third party, other than the intended recipient. With Hushmail, you have a key that both scrambles and unscrambles the message which only you and your client has access to. '[Encryption] is relevant because nowadays the online risk and cyber security … there's a lot of bad actors out there, and you don't want this information out there. You don't want this information to be seen by people who are not the intended recipients. So, encryption is a very easy way to protect that information.' - Anabeli Jackson How you can get started with Hushmail Take the step now to secure your communications with clients, and save both them and yourself the stress and anxiety of worrying whether the information is safe. And with Hushmail, that peace of mind will not break the bank. For purely email purposes, you can get Hushmail for $16.99 CAD. If you want to include the forms and signatures, it is $24.99 CAD. If you are listening to this episode and want to try Hushmail out, click this link to sign up with Hushmail and get your first month entirely free of charge! Connect with me: Instagram Website Resources mentioned and useful links: Regan Swerhun: Expanding Private Care to Northern Communities | EP 185 Learn more about the tools and deals that I love and use for my Canadian private practice Sign up for my free e-course on How to Start an Online Canadian Private Practice Jane App (use code FEARLESS2MO for two months free) Get started with Hushmail here and get one month for free! Learn more about Anabeli on her LinkedIn profile Rate, review, and subscribe to this podcast on Apple Podcasts, Spotify, Amazon, and TuneIn
Security, compliance, and resilience are the cornerstones of trust. In this episode, Lois Houston and Nikita Abraham continue their conversation with David Mills and Tijo Thomas, exploring how Oracle Cloud Infrastructure empowers organizations to protect data, stay compliant, and scale with confidence. Real-world examples from Zoom, KDDI, 8x8, and Uber highlight these capabilities. Cloud Business Jumpstart: https://mylearn.oracle.com/ou/course/cloud-business-jumpstart/152957 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Communications and Adoption with Customer Success Services, and with me is Nikita Abraham, Team Lead: Editorial Services with Oracle University. Nikita: Hi everyone! In our last episode, we started the conversation around the real business value of Oracle Cloud Infrastructure and how it helps organizations create impact at scale. Lois: Today, we're taking a closer look at what keeps the value strong — things like security, compliance, and the technology that helps businesses stay resilient. To walk us through it, we have our experts from Oracle University, David Mills, Senior Principal PaaS Instructor, and Tijo Thomas, Principal OCI Instructor. 01:12 Nikita: Hi David and Tijo! It's great to have you both here! Tijo, let's start with you. How does Oracle Cloud Infrastructure help organizations stay secure? Tijo: OCI uses a security first approach to protect customer workloads. This is done with implementing a Zero Trust Model. A Zero Trust security model use frequent user authentication and authorization to protect assets while continuously monitoring for potential breaches. This would assume that no users, no devices, no applications are universally trusted. Continuous verification is always required. Access is granted only based on the context of request, the level of trust, and the sensitivity of that asset. There are three strategic pillars that Oracle security first approach is built on. The first one is being automated. With automation, the business doesn't have to rely on any manual work to stay secure. Threat detection, patching, and compliance checks, all these happen automatically. And that reduces human errors and also saving time. Security in OCI is always turned on. Encryption is automatic. Identity checks are continuous. Security is not an afterthought in OCI. It is incorporated into every single layer. Now, while we talk about Oracle's security first approach, remember security is a shared responsibility, and what that means while Oracle handles the data center, the hardware, the infrastructure, software, consumers are responsible for securing their apps, configurations and the data. 03:06 Lois: Tijo, let's discuss this with an example. Imagine an online store called MuShop. They're a fast-growing business selling cat products. Can you walk us through how a business like this can enhance its end-to-end security and compliance with OCI? Tijo: First of all, focusing on securing web servers. These servers host the web portal where customers would browse, they log in, and place their orders. So these web servers are a prime target for attackers. To protect these entry points, MuShop deployed a service called OCI Web Application Firewall. On top of that, the MuShop business have also used OCI security list and network security groups that will control their traffic flow. As when the businesses grow, new users such as developers, operations, finance, staff would all need to be onboarded. OCI identity services is used to assign roles, for example, giving developers access to only the dev instances, and finance would access just the billing dashboards. MuShop also require MFA multi-factor authentication, and that use both password and a time-based authentication code to verify their identities. Talking about some of the critical customer data like emails, addresses, and the payment info, this data is stored in databases and storage. Using OCI Vault, the data is encrypted with customer managed keys. Oracle Data Safe is another service, and that is used to audit who has got access to sensitive tables, and also mask real customer data in non-production environments. 04:59 Nikita: Once those systems are in place, how can MuShop use OCI tools to detect and respond to threats quickly? Tijo: For that, MuShop used a service called OCI Cloud Guard. Think of it like a security operation center, and which is built right into OCI. It monitors the entire OCI environment continuously, and it can track identity activities, storage settings, network configurations and much more. If it finds something risky, like a publicly exposed object storage bucket, or maybe a user having a broad access to that environment, it raises a security finding. And better yet, it can automatically respond. So if someone creates a resource outside of their policy, OCI Cloud Guard can disable it. 05:48 Lois: And what about preventing misconfigurations? How does OCI make that easier while keeping operations secure? Tijo: OCI Security Zone is another service and that is used to enforce security postures in OCI. The goody zones help you to avoid any accidental misconfigurations. For example, in a security zone, you can choose users not to create a storage bucket that is publicly accessible. To stay ahead of vulnerabilities, MuShop runs OCI vulnerability scanning. They have scheduled to scan weekly to capture any outdated libraries or misconfigurations. OCI Security Advisor is another service that is used to flag any unused open ports and with recommending stronger access rules. MuShop needed more than just security. They also had to be compliant. OCI's compliance certifications have helped them to meet data privacy and security regulations across different regions and industries. There are additional services like OCI audit logs for traceability that help them pass internal and external audits. 07:11 Oracle University is proud to announce three brand new courses that will help your teams unlock the power of Redwood—the next generation design system. Redwood enhances the user experience, boosts efficiency, and ensures consistency across Oracle Fusion Cloud Applications. Whether you're a functional lead, configuration consultant, administrator, developer, or IT support analyst, these courses will introduce you to the Redwood philosophy and its business impact. They'll also teach you how to use Visual Builder Studio to personalize and extend your Fusion environment. Get started today by visiting mylearn.oracle.com. 07:52 Nikita: Welcome back! We know that OCI treats security as a continuous design principle: automated, always on, and built right into the platform. David, do you have a real-world example of a company that needed to scale rapidly and was able to do so successfully with OCI? David: In late 2019, Zoom averaged 10 million meeting participants a day. By April 2020, well that number surged to over 300 million as video conferencing became essential for schools, businesses, and families around the world due to the global pandemic. To meet that explosive demand, Zoom chose OCI not just for performance, but for the ability to scale fast. In just nine hours, OCI engineers helped Zoom move from deployment to live production, handling hundreds of thousands of concurrent meetings immediately. Within weeks, they were supporting millions. And Zoom didn't just scale, they sustained it. With OCI's next-gen architecture, Zoom avoided the performance bottlenecks common in legacy clouds. They used OCI functions and cloud native services to scale workloads flexibly and securely. Today, Zoom transfers more than seven petabytes of data per day through Oracle Cloud. That's enough bandwidth to stream HD video continuously for 93 years. And they do it while maintaining high availability, low latency, and enterprise grade security. As articulated by their CEO Erik Yuan, Zoom didn't just meet the moment, they redefined it with OCI behind the scenes. 09:45 Nikita: That's an incredible story about scale and agility. Do you have more examples of companies that turned to OCI to solve complex data or integration challenges? David: Telecom giant KDDI with over 64 million subscribers, faced a growing data dilemma. Data was everywhere. Survey results, system logs, behavioral analytics, but it was scattered across thousands of sources. Different tools for different tasks created silos, delays, and rising costs. KDDI needed a single platform to connect it all, and they chose Oracle. They replaced their legacy data systems with a modern data platform built on OCI and Autonomous Database. Now they can analyze behavior, improve service planning, and make faster, smarter decisions without the data chaos. But KDDI didn't stop there. They built a 300 terabyte data lake and connected all their systems-- custom on-prem apps, SaaS providers like Salesforce, and even multi-cloud infrastructure. Thanks to Oracle Integration and pre-built adapters, everything works together in real-time, even across clouds. AWS, Azure, and OCI now operate in harmony. The results? Reduced operational costs, faster development cycles, governance and API access improved across the board. KDDI can now analyze customer behavior to improve services like where to expand their 5G network. Next up, 8 by 8 powers communication for over 55,000 companies and 160 countries with more than 3 million users, depending on its voice, video, and messaging tools every day. To maintain that scale, they needed a cloud that could deliver low latency global availability and high performance without blowing up costs. Well, they moved their video meeting services from Amazon to OCI and went live in just four days. The results? 25% increase in performance per node, 80% reduction in network egress costs, and a significantly lower overall infrastructure spend. But this wasn't just a lift and shift. 8 by 8 also replaced legacy tools with Oracle Logging Analytics, giving their teams a single view across apps, infrastructure, and regions. 8 by 8 scaled up fast. They migrated core voice services, deployed over 300 microservices using OCI Kubernetes, and now run over 1,700 nodes across 26 global OCI regions. In addition, OCI's Ampere-based virtual machines gave them a major boost, sustaining 80% CPU utilization and more than 30% increased performance per core and with no degradation. And with OCI's Observability and Management platform, they gained real-time visibility into application health across both on-prem and cloud. Bottom line, 8x8 represents yet another excellent example of a company leveraging OCI for maximum business results. 13:24 Lois: Uber handles more than a million trips per hour, and Oracle Cloud Infrastructure is an integral part of making that possible. Can you walk us through how OCI supports Uber's needs? David: Uber, the world's largest on-demand mobility platform, handles over 1 million trips every hour. And behind the scenes, OCI is helping to make that possible. In 2023, Uber began migrating thousands of microservices, data platforms, and AI models to OCI. Why? Because OCI provides the automation, flexibility, and infrastructure scale needed to support Uber's explosive growth. Today, Uber uses OCI Compute to handle massive trips serving traffic and OCI Object Storage to replace one of the largest Hadoop-based data environments in the industry. They needed global reach and multi-cloud compatibility, and OCI delivered. But it's not just scale, it's intelligence. Uber runs dozens of AI models on OCI to support real-time predictions up 14 million per second. From ride pricing to traffic patterns, this AI layer powers every trip behind the scenes. And by shifting stateless workloads to OCI Ampere ARM Compute servers, Uber reduced cost while increasing CPU efficiency. For AI inferencing, Uber uses OCI's AI infrastructure to strike the perfect balance between speed, throughput, and cost. So the next time you use your Uber app to schedule a ride, consider what happens behind the scenes with OCI. 15:18 Lois: That's so impressive! Thank you, David, for those wonderful stories, and Tijo for all of your insights. Whether you're in strategy, finance, or transformation, we hope you're walking away with a clearer view of the business value OCI can bring. Nikita: Yeah, and if you want to learn more about the topics we discussed today, visit mylearn.oracle.com and search for the Cloud Business Jumpstart course. Until next time, this is Nikita Abraham… Lois: And Lois Houston signing off! 15:48 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Talking about the new Brickstorm security risk where you don't even know you have been compromised. They are stealing your critical industry information to then compete against you. The layers of security, our application products like vDefend and Avi application security and all other topics from learning to getting started.
This conversation explores the profound transformation in the criminal justice system driven by technological advancements, particularly in the realm of cybercrime, data analysis, and artificial intelligence. It delves into the challenges of jurisdiction, the complexities of cross-border evidence collection, and the implications of encryption on privacy and security. The discussion also highlights systemic biases revealed through data, the fairness paradox in algorithmic risk assessments, and the need for legislative reforms to adapt to these changes. Ultimately, it emphasizes the importance of AI literacy within the justice system to ensure that core principles of due process are upheld in a digital world.In today's rapidly evolving legal landscape, the traditional foundations of criminal justice are being reshaped by three transformative forces. As we delve into these changes, we uncover the profound impact of cybercrime, data-driven insights into systemic bias, and the philosophical shift towards restorative justice.Cybercrime and Jurisdiction: The borderless nature of cybercrime challenges traditional notions of jurisdiction. With crimes often spanning multiple countries, the Budapest Convention on Cybercrime emerges as a critical framework for international cooperation. However, the absence of universal enforcement mechanisms highlights the need for continued legal innovation.Data-Driven Insights into Systemic Bias: Data analysis reveals deep-rooted biases in the justice system, particularly affecting marginalized communities. Tools like COMPASS, intended to introduce objectivity, have inadvertently amplified existing biases. This underscores the importance of transparency and fairness in algorithmic decision-making.Restorative Justice and Legislative Reform: The shift towards restorative justice emphasizes healing and accountability over punishment. By involving victims, offenders, and communities in the justice process, this approach aims to repair harm and reduce recidivism. Legislative reforms, such as the elimination of mandatory minimums and bail reform, further support this transformative vision.Conclusion: As we navigate these changes, the legal profession must adapt to ensure justice remains fair and equitable. By embracing technological advancements and addressing systemic biases, we can uphold the rule of law and protect the rights of all individuals.Subscribe Now: Stay informed about the latest developments in criminal justice by subscribing to our newsletter.TakeawaysThe traditional era of criminal justice is fundamentally over.Cybercrime challenges the concept of jurisdiction.International cooperation is essential for addressing cybercrime.Cross-border evidence collection is a significant bottleneck.Encryption poses a dilemma between privacy and security.Authentication of digital evidence is crucial but not sufficient for admissibility.Deepfakes threaten the integrity of multimedia evidence.Data analysis reveals systemic biases in sentencing.Algorithmic risk assessments can perpetuate existing biases.Legislative reforms are necessary to adapt to technological advancements.criminal justice, cybercrime, jurisdiction, international law, encryption, digital evidence, systemic bias, AI, legislative reform, due process
Dr. Rand Hindi is an entrepreneur and deeptech investor. He is the Founder and CEO at Zama and an investor in over 50 companies across privacy, AI, blockchain, and medtech. Rand started coding at the age of 10, founded a Social Network at 14, and started a PhD at 21. He then created Snips, a privacy-centric AI startup that was acquired by Sonos. Rand holds a BSc in Computer Science and a PhD in bioinformatics from UCL. In this conversation, we discuss:- Banks won't use stablecoins if they are public - zcash is the beacon of crypto privacy - Privacy is the final boss of blockchain - The future of surveillance and privacy - Fully Homomorphic Encryption (FHE) - Zama = confidentiality layer - TVS = Total Value Shielded - Zama is like HTTPS for blockchain - Confidentiality without sacrificing transparency - First-ever on-chain sealed-bid Dutch auction Zama X: @zamaWebsite: www.zama.orgTelegram: t.me/zama_on_telegramDr. Rand HindiX: @randhindiLinkedIn: Rand Hindi---------------------------------------------------------------------------------This episode is brought to you by PrimeXBT.PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50FollowApple PodcastsSpotifyAmazon MusicRSS FeedSee All
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters. Show notes Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers
Speed is winning deals, but speed is also feeding fraud. We sit down with CRC Specialty Professional Lines Broker Mark Waldeck to unpack the messy middle where e‑signatures, legacy policy language, and decentralized bank controls collide. From the difference between a simple e‑signature and a cryptographically protected digital signature to why underwriters hesitate when controls vary by department, we map the risk pathways that turn convenience into claims friction.We examine a headline‑grabbing fraud where a bank funded a multimillion‑dollar loan to an impersonator despite notary involvement and remote verification. The dispute with the insurer highlights a wider issue: policy forms born in the era of signature cards are being stretched to cover today's remote closings, and the gaps show up at the worst time. If you work with financial institutions, you'll get a practical checklist to help ensure your banking clients are protected, from enforcing MFA and encryption to tightening scrutiny as transaction size grows. Tune in to understand how small cracks in verification can become multimillion-dollar failures—and what you can do right now to help clients stay ahead of emerging fraud risks. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!
“Wake me when there's a yield. Until then, it's just electronic tulips with a nice PR team,” said a junk-bond trader I slept with in the '80s, who later asked me about Bitcoin from Sing Sing.This post, like my period, is three months late and yet another matter AI cannot solve, given my procrastination and sheer laziness. I remind you: I do not have a job, but I also do not have access to cash due to my husband's mob ties. Crypto solves this.Luckily I'm not pregnant, because I can't deal with the weight gain and no, my lack of blood is not age-related, thank you very much. I've simply been doing laps every morning in the jail swimming pool with some of the loveliest felons from the heyday of trad-fi in the '80s. Whoever claimed crypto had the most criminals clearly never lived through the Boiler Room years of slicked-back junk-bond bros whose foreplay consisted of a dry finger-bang while saying things like “financed raider” and “ramping the stock.” Even after all that, I still can't handle the on-chain mess we have today. Stress level: high.Between Bitcoin's drastic drop blasting through my alimony and child support; yes, I asked for the funds to be in Bitcoin, and yes, that day happened to land on October 10, which historically is the worst week for us Jews, I remain violently underwhelmed by machine learning.I instead cling to my hardcore, conservative, maximalist American values: the Bitcoin white paper, my Bible pure and pristine collateral with no need for interference. Much like my engagement ring, which was a gift. In this season of greetings, it's important to remember what we're grateful for. My list has been the same since I was thirteen years old: cigarettes, private jets, and Xanax.I digress.My guest today is the following Ivy League contemporary: Kyle O'Brien. He almost married my sister, which would have been awkward given the throbbing sexual tension permeating this episode. I am in awe of Kyle due to his knowledge, his Frenchness, his homoerotic encryption, and his commitment to longevity in a country where the biggest moneymaker is suicide prevention and Lexapro. Kyle is hot. Kyle is smart. He is also, allegedly, best friends with Biggie, Tupac, and Pavarotti from his stint at RapGenius.He is the primary advisor to the Founder & CEO of Zama AI. He is co-pilot on strategy, execution, startup acceleration, partnerships, growth experiments, new ventures, and “special projects that are not drugs. .Zama is an open-source cryptography company building state-of-the-art Fully Homomorphic Encryption (FHE) solutions for blockchain and AI basically wizard-level math that lets machines compute on encrypted data without ever seeing it. I promise you I wont need it. You might tho. Support the show
We pull on a few loose threads from recent episodes, and some of them unravel into way more than we expected.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED.Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
How has optical networking evolved over the past 25 years – and what's next? In this episode, Kent Lidström, CTO at Smartoptics, joins Mattias Fridström to explore:The biggest shifts in optical networking and what still needs to changeOpenness and disaggregation in the telecom industryShannon's limitHow mergers and acquisitions are reshaping the industryWhy enterprises are moving toward simpler services like “raw bandwidth”Encryption-based and physical security Strategies for managing component shortages through dual sourcingIf you're curious about the past, present, and future of optical networking, this conversation is packed with insights.
Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS
In this episode of Cybersecurity Today, host Jim Love is joined by Tammy Harper, a senior threat intelligence researcher at Flare, to explore the future landscape of cybercrime. The conversation delves into various aspects like the evolution of underground markets, state-backed cyber sanctuaries, and decentralized escrow systems. Harper presents insights on extortion as a service, the implications of artificial intelligence in cybercrime, and the potential impact of quantum computing on encryption. The episode also discusses the changing nature of digital sovereignty and its effects on cybersecurity. This thorough examination offers a glimpse into the challenges and transformations in the world of cyber threats. 00:00 Introduction and Guest Introduction 01:14 Overview of Tammy Harper's Work 01:56 Future of Cybercrime: Key Pillars 03:43 The Underground Economy 08:18 Decentralization of Underground Forums 17:28 State-Backed Sanctuaries and Cybercrime Tourism 24:01 Extortion as a Service (EAS) 31:37 Affiliate Programs in Cybercrime 34:41 Usernames and Credibility in Cybercrime 36:25 Recruitment and the Perfect Storm 37:22 Money Mules and Financial Crimes 38:45 Ransomware Negotiators and Trust Issues 41:22 Artificial Intelligence in Cybercrime 49:16 Quantum Computing and Encryption 58:55 Digital Sovereignty and the Future of Cybercrime 01:05:48 Conclusion and Final Thoughts
In this episode of Crazy Wisdom, host Stewart Alsop talks with Richard Easton, co-author of GPS Declassified: From Smart Bombs to Smartphones, about the remarkable history behind the Global Positioning System and its ripple effects on technology, secrecy, and innovation. They trace the story from Roger Easton's early work on time navigation and atomic clocks to the 1973 approval of the GPS program, the Cold War's influence on satellite development, and how civilian and military interests shaped its evolution. The conversation also explores selective availability, the Gulf War, and how GPS paved the way for modern mapping tools like Google Maps and Waze, as well as broader questions about information, transparency, and the future of scientific innovation. Learn more about Richard Easton's work and explore early GPS documents at gpsdeclassified.com, or pick up his book GPS Declassified: From Smart Bombs to Smartphones.Check out this GPT we trained on the conversationTimestamps00:00 – Stewart Alsop introduces Richard Easton, who explains the origins of GPS, its 12-hour satellite orbits, and his father Roger Easton's early time navigation work.05:00 – Discussion on atomic clocks, the hydrogen maser, and how technological skepticism drove innovation toward the modern GPS system.10:00 – Miniaturization of receivers, the rise of smartphones as GPS devices, and early mapping tools like Google Maps and Waze.15:00 – The Apollo missions' computer systems and precision landings lead back to GPS development and the 1973 approval of the joint program office.20:00 – The Gulf War's use of GPS, selective availability, and how civilian receivers became vital for soldiers and surveyors.25:00 – Secrecy in satellite programs, from GRAB and POPPY to Eisenhower's caution after the U-2 incident, and the link between intelligence and innovation.30:00 – The myth of the Korean airliner sparking civilian GPS, Reagan's policy, and the importance of declassified documents.35:00 – Cold War espionage stories like Gordievsky's defection, the rise of surveillance, and early countermeasures to GPS jamming.40:00 – Selective availability ends in 2000, sparking geocaching and civilian boom, with GPS enabling agriculture and transport.45:00 – Conversation shifts to AI, deepfakes, and the reliability of digital history.50:00 – Reflections on big science, decentralization, and innovation funding from John Foster to SpaceX and Starlink.55:00 – Universities' bureaucratic bloat, the future of research education, and Richard's praise for the University of Chicago's BASIC program.Key InsightsGPS was born from competing visions within the U.S. military. Richard Easton explains that the Navy and Air Force each had different ideas for navigation satellites in the 1960s. The Navy wanted mid-Earth orbits with autonomous atomic clocks, while the Air Force preferred ground-controlled repeaters in geostationary orbit. The eventual compromise in 1973 created the modern GPS structure—24 satellites in six constellations—which balanced accuracy, independence, and resilience.Atomic clocks made global navigation possible. Roger Easton's early insight was that improving atomic clock precision would one day enable real-time positioning. The hydrogen maser, developed in 1960, became the breakthrough technology that made GPS feasible. This innovation turned a theoretical idea into a working global system and also advanced timekeeping for scientific and financial applications.Civilian access to GPS was always intended. Contrary to popular belief, GPS wasn't a military secret turned public after the Korean airliner tragedy in 1983. Civilian receivers, such as TI's 4100 model, were already available in 1981. Reagan's 1983 announcement merely reaffirmed an existing policy that GPS would serve both military and civilian users.The Gulf War proved GPS's strategic value. During the 1991 conflict, U.S. and coalition forces used mostly civilian receivers after the Pentagon lifted “selective availability,” which intentionally degraded accuracy. GPS allowed troops to coordinate movement and strikes even during sandstorms, changing modern warfare.Secrecy and innovation were deeply intertwined. Easton recounts how classified projects like GRAB and POPPY—satellites disguised as scientific missions—laid technical groundwork for navigation systems. The crossover between secret defense projects and public science fueled breakthroughs but also obscured credit and understanding.Ending selective availability unleashed global applications. When the distortion feature was turned off in May 2000, GPS accuracy improved instantly, leading to new industries—geocaching, precision agriculture, logistics, and smartphone navigation. This marked GPS's shift from a defense tool to an everyday utility.Innovation's future may rely on decentralization. Reflecting on his father's era and today's landscape, Easton argues that bureaucratic “big science” has grown sluggish. He sees promise in smaller, independent innovators—helped by AI, cheaper satellites, and private space ventures like SpaceX—continuing the cycle of technological transformation that GPS began.
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
- J.P. Morgan: iPhone 17 Strength Driven by Upgrades - UK Tries for Access to Encrypted iCloud Data of UK Citizens - Court Dismisses Apple/Amazon Price Fixing Case - Apple Moves to Dismiss xAI's Collusion Suit - Apple, Google, and Meta Have to Answer for Gambling Apps - iFixit: AirPods Pro 3 Are Not Repairable - Apple Buys Ireland's IC Mask Design - Three New Titles Hit Apple Arcade - Apple TV+ Outs Trailer for Documentary “Mr. Scorsese” Ahead of 17 October Premier - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra today at store.insta360.com/product/go-ultra?utm_term=macosken with code macosken - Active ransomware attacks and improving recovery trends on Checklist No. 442 - Find it today at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
Pavel Durov is the founder and CEO of Telegram. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep482-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/pavel-durov-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Pavel's Telegram: https://t.me/durov Pavel's X: https://x.com/durov Telegram: https://telegram.org/ Telegram Contests: https://contest.com/ SPONSORS: To support this podcast, check out our sponsors & get discounts: Miro: Online collaborative whiteboard platform. Go to https://miro.com/ UPLIFT Desk: Standing desks and office ergonomics. Go to https://upliftdesk.com/lex Fin: AI agent for customer service. Go to https://fin.ai/lex LMNT: Zero-sugar electrolyte drink mix. Go to https://drinkLMNT.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex OUTLINE: (00:00) - Introduction (02:46) - Sponsors, Comments, and Reflections (11:29) - Philosophy of freedom (14:37) - No alcohol (22:42) - No phone (28:38) - Discipline (49:50) - Telegram: Lean philosophy, privacy, and geopolitics (1:05:12) - Arrest in France (1:21:23) - Romanian elections (1:32:18) - Power and corruption (1:41:50) - Intense education (1:53:51) - Nikolai Durov (1:58:19) - Programming and video games (2:02:33) - VK origins & engineering (2:19:46) - Hiring a great team (2:29:02) - Telegram engineering & design (2:48:04) - Encryption (2:53:01) - Open source (2:57:48) - Edward Snowden (3:00:20) - Intelligence agencies (3:01:32) - Iran and Russia government pressure (3:04:41) - Apple (3:11:38) - Poisoning (3:43:53) - Money (3:52:45) - TON (4:02:35) - Bitcoin (4:05:34) - Two chairs dilemma (4:12:14) - Children (4:23:24) - Father (4:27:55) - Quantum immortality (4:34:27) - Kafka PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips