Process of converting plaintext to ciphertext
POPULARITY
Categories
Encryption is often described as the "gold standard" of security, but what happens when the gold itself is targeted? Welcome to the world of cryptanalysis—the high-stakes science of deciphering encrypted data without the key. In 2025, as quantum computing and AI become more accessible, the battle between those who hide secrets and those who hunt them is reaching a fever pitch.In this episode, we break down the most sophisticated techniques hackers use to break even the toughest modern ciphers. We move beyond simple "password guessing" and dive into the mathematical and physical vulnerabilities that can render even AES-256 or RSA vulnerable if not implemented perfectly.
Dr. Rand Hindi is an entrepreneur and deeptech investor. He is the Founder and CEO at Zama and an investor in over 50 companies across privacy, AI, blockchain, and medtech. Rand started coding at the age of 10, founded a Social Network at 14, and started a PhD at 21. He then created Snips, a privacy-centric AI startup that was acquired by Sonos. Rand holds a BSc in Computer Science and a PhD in bioinformatics from UCL. In this conversation, we discuss:- Banks won't use stablecoins if they are public - zcash is the beacon of crypto privacy - Privacy is the final boss of blockchain - The future of surveillance and privacy - Fully Homomorphic Encryption (FHE) - Zama = confidentiality layer - TVS = Total Value Shielded - Zama is like HTTPS for blockchain - Confidentiality without sacrificing transparency - First-ever on-chain sealed-bid Dutch auction Zama X: @zamaWebsite: www.zama.orgTelegram: t.me/zama_on_telegramDr. Rand HindiX: @randhindiLinkedIn: Rand Hindi---------------------------------------------------------------------------------This episode is brought to you by PrimeXBT.PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50FollowApple PodcastsSpotifyAmazon MusicRSS FeedSee All
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters. Show notes Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers
Speed is winning deals, but speed is also feeding fraud. We sit down with CRC Specialty Professional Lines Broker Mark Waldeck to unpack the messy middle where e‑signatures, legacy policy language, and decentralized bank controls collide. From the difference between a simple e‑signature and a cryptographically protected digital signature to why underwriters hesitate when controls vary by department, we map the risk pathways that turn convenience into claims friction.We examine a headline‑grabbing fraud where a bank funded a multimillion‑dollar loan to an impersonator despite notary involvement and remote verification. The dispute with the insurer highlights a wider issue: policy forms born in the era of signature cards are being stretched to cover today's remote closings, and the gaps show up at the worst time. If you work with financial institutions, you'll get a practical checklist to help ensure your banking clients are protected, from enforcing MFA and encryption to tightening scrutiny as transaction size grows. Tune in to understand how small cracks in verification can become multimillion-dollar failures—and what you can do right now to help clients stay ahead of emerging fraud risks. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!
“Wake me when there's a yield. Until then, it's just electronic tulips with a nice PR team,” said a junk-bond trader I slept with in the '80s, who later asked me about Bitcoin from Sing Sing.This post, like my period, is three months late and yet another matter AI cannot solve, given my procrastination and sheer laziness. I remind you: I do not have a job, but I also do not have access to cash due to my husband's mob ties. Crypto solves this.Luckily I'm not pregnant, because I can't deal with the weight gain and no, my lack of blood is not age-related, thank you very much. I've simply been doing laps every morning in the jail swimming pool with some of the loveliest felons from the heyday of trad-fi in the '80s. Whoever claimed crypto had the most criminals clearly never lived through the Boiler Room years of slicked-back junk-bond bros whose foreplay consisted of a dry finger-bang while saying things like “financed raider” and “ramping the stock.” Even after all that, I still can't handle the on-chain mess we have today. Stress level: high.Between Bitcoin's drastic drop blasting through my alimony and child support; yes, I asked for the funds to be in Bitcoin, and yes, that day happened to land on October 10, which historically is the worst week for us Jews, I remain violently underwhelmed by machine learning.I instead cling to my hardcore, conservative, maximalist American values: the Bitcoin white paper, my Bible pure and pristine collateral with no need for interference. Much like my engagement ring, which was a gift. In this season of greetings, it's important to remember what we're grateful for. My list has been the same since I was thirteen years old: cigarettes, private jets, and Xanax.I digress.My guest today is the following Ivy League contemporary: Kyle O'Brien. He almost married my sister, which would have been awkward given the throbbing sexual tension permeating this episode. I am in awe of Kyle due to his knowledge, his Frenchness, his homoerotic encryption, and his commitment to longevity in a country where the biggest moneymaker is suicide prevention and Lexapro. Kyle is hot. Kyle is smart. He is also, allegedly, best friends with Biggie, Tupac, and Pavarotti from his stint at RapGenius.He is the primary advisor to the Founder & CEO of Zama AI. He is co-pilot on strategy, execution, startup acceleration, partnerships, growth experiments, new ventures, and “special projects that are not drugs. .Zama is an open-source cryptography company building state-of-the-art Fully Homomorphic Encryption (FHE) solutions for blockchain and AI basically wizard-level math that lets machines compute on encrypted data without ever seeing it. I promise you I wont need it. You might tho. Support the show
Soon, super computers will be able to crack our code. Will we be ready in time to prevent it?Matt Speirs reads Quantum Threat About AMIAMI is a not-for-profit media company that entertains, informs and empowers Canadians who are blind or partially sighted. Operating three broadcast services, AMI-tv and AMI-audio in English and AMI-télé in French, AMI's vision is to establish and support a voice for Canadians with disabilities, representing their interests, concerns and values through inclusion, representation, accessible media, reflection, representation and portrayal.Find more great AMI Original Content on AMI+Learn more at AMI.caConnect with Accessible Media Inc. online:X /Twitter @AccessibleMediaInstagram @AccessibleMediaInc / @AMI-audioFacebook at @AccessibleMediaIncTikTok @AccessibleMediaIncEmail feedback@ami.ca Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
Special Report: The Quantum Threshold (December 02, 2025)This special episode dissects the paradigm shift from theoretical quantum physics to engineering reality, triggered by Google's latest hardware and AI advancements.Key Topics & Takeaways:⚡ The Engineering Miracle (Google Willow): Google has unveiled "Willow," a 105-qubit processor that successfully demonstrates the "Threshold Theorem." For the first time, increasing the number of physical qubits (from code distance 3 to 7) has led to an exponential drop in error rates, proving that fault-tolerant quantum computing is physically possible.
We pull on a few loose threads from recent episodes, and some of them unravel into way more than we expected.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED.Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:
How has optical networking evolved over the past 25 years – and what's next? In this episode, Kent Lidström, CTO at Smartoptics, joins Mattias Fridström to explore:The biggest shifts in optical networking and what still needs to changeOpenness and disaggregation in the telecom industryShannon's limitHow mergers and acquisitions are reshaping the industryWhy enterprises are moving toward simpler services like “raw bandwidth”Encryption-based and physical security Strategies for managing component shortages through dual sourcingIf you're curious about the past, present, and future of optical networking, this conversation is packed with insights.
Ray White speaks to Adam Glichrist about today’s top stories from around the globe. First, a startling twist in Thailand, where a 65-year-old woman brought to a Buddhist temple for cremation was discovered alive in her coffin, a shocking reminder of how fragile life can be. Next, French President Emmanuel Macron announced plans for a new voluntary military national service, reassuring citizens that it “does not involve sending our youth to Ukraine,” following public concern sparked by warnings of Russian threats. Finally, in the world of encryption, the International Association for Cryptologic Research (IACR) had to cancel its leadership election results after a trustee lost part of the encrypted key, leaving the outcome inaccessible, a routine process turned into a high-stakes puzzle. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702See omnystudio.com/listener for privacy information.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco's Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten. Join us as we dive into the imminent future of cybersecurity, qubits, and entanglement technology from Cisco. // Vijoy Pandey SOCIALS // LinkedIn: / vijoy X: https://x.com/vijoy // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Intro 0:48 - Update on Quantum Computing 03:47 - Effects of Practical Quantum Computing 05:08 - Post Quantum Cryptography 06:12 - Why Bother with Quantum Computing 07:57 - How Do We get to Practical Quantum Computing 09:31 - Quantum Protocols and Applications 10:55 - Quantum Computing and Classical-Use Cases 13:28 - Practical Use Case for Quantum Alert 15:03 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #sponsored #ciscops25
Ray White speaks to Adam Glichrist about today’s top stories from around the globe. First, a startling twist in Thailand, where a 65-year-old woman brought to a Buddhist temple for cremation was discovered alive in her coffin, a shocking reminder of how fragile life can be. Next, French President Emmanuel Macron announced plans for a new voluntary military national service, reassuring citizens that it “does not involve sending our youth to Ukraine,” following public concern sparked by warnings of Russian threats. Finally, in the world of encryption, the International Association for Cryptologic Research (IACR) had to cancel its leadership election results after a trustee lost part of the encrypted key, leaving the outcome inaccessible, a routine process turned into a high-stakes puzzle. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702See omnystudio.com/listener for privacy information.
Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS
This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk. They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people. 01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security. CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com. 07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations. 08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first? Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security. 09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage. 12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets. 13:18 Lois: Wow. Thanks, Orlando, for joining us today. Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
In this episode of Cybersecurity Today, host Jim Love is joined by Tammy Harper, a senior threat intelligence researcher at Flare, to explore the future landscape of cybercrime. The conversation delves into various aspects like the evolution of underground markets, state-backed cyber sanctuaries, and decentralized escrow systems. Harper presents insights on extortion as a service, the implications of artificial intelligence in cybercrime, and the potential impact of quantum computing on encryption. The episode also discusses the changing nature of digital sovereignty and its effects on cybersecurity. This thorough examination offers a glimpse into the challenges and transformations in the world of cyber threats. 00:00 Introduction and Guest Introduction 01:14 Overview of Tammy Harper's Work 01:56 Future of Cybercrime: Key Pillars 03:43 The Underground Economy 08:18 Decentralization of Underground Forums 17:28 State-Backed Sanctuaries and Cybercrime Tourism 24:01 Extortion as a Service (EAS) 31:37 Affiliate Programs in Cybercrime 34:41 Usernames and Credibility in Cybercrime 36:25 Recruitment and the Perfect Storm 37:22 Money Mules and Financial Crimes 38:45 Ransomware Negotiators and Trust Issues 41:22 Artificial Intelligence in Cybercrime 49:16 Quantum Computing and Encryption 58:55 Digital Sovereignty and the Future of Cybercrime 01:05:48 Conclusion and Final Thoughts
Microsoft is actively preparing for the future of quantum-safe cryptography to protect against the potential risks posed by scalable quantum computing. The company is collaborating with global regulatory and technical bodies like NIST, IETF, and ISO to develop and align on quantum-safe encryption standards. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
Cybersecurity is an essential aspect of our increasingly digital world, focusing on the protection of information systems and networks from unauthorized access, data breaches, and cyber threats. With the rapid advancement of technology, the need for robust cybersecurity measures has become paramount. It involves a combination of proactive measures like implementing firewalls, encryption techniques, and access controls, as well as reactive measures such as incident response and threat intelligence analysis. Cybersecurity professionals work diligently to identify vulnerabilities, develop safeguards, and stay one step ahead of malicious actors, helping to ensure the integrity, confidentiality, and availability of digital assets. As our reliance on technology grows, cybersecurity plays a crucial role in preserving the trust and security of individuals, organizations, and society as a whole.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-x-zone-radio-tv-show--1078348/support.Please note that all XZBN radio and/or television shows are Copyright © REL-MAR McConnell Meda Company, Niagara, Ontario, Canada – www.rel-mar.com. For more Episodes of this show and all shows produced, broadcasted and syndicated from REL-MAR McConell Media Company and The 'X' Zone Broadcast Network and the 'X' Zone TV Channell, visit www.xzbn.net. For programming, distribution, and syndication inquiries, email programming@xzbn.net.We are proud to announce the we have launched TWATNews.com, launched in August 2025.TWATNews.com is an independent online news platform dedicated to uncovering the truth about Donald Trump and his ongoing influence in politics, business, and society. Unlike mainstream outlets that often sanitize, soften, or ignore stories that challenge Trump and his allies, TWATNews digs deeper to deliver hard-hitting articles, investigative features, and sharp commentary that mainstream media won't touch.These are stories and articles that you will not read anywhere else.Our mission is simple: to expose corruption, lies, and authoritarian tendencies while giving voice to the perspectives and evidence that are often marginalized or buried by corporate-controlled media
Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field. TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions. TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you." Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve
How are recent quantum computing breakthroughs reshaping business, competition, and society itself? What global challenges might quantum and AI either help with or introduce? We're trying something a little different and asking a futurist and bestselling author of The Quantum Economy to weigh in on how our increasing qubit counts might all play out in a few years. Join host Konstantinos Karagiannis for a wide-ranging, philosophical chat with Anders Indset, and get ready to hear about simulation theory towards the end. For more information on Anders Indset and his books, visit https://andersindset.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
In this episode of Crazy Wisdom, host Stewart Alsop talks with Richard Easton, co-author of GPS Declassified: From Smart Bombs to Smartphones, about the remarkable history behind the Global Positioning System and its ripple effects on technology, secrecy, and innovation. They trace the story from Roger Easton's early work on time navigation and atomic clocks to the 1973 approval of the GPS program, the Cold War's influence on satellite development, and how civilian and military interests shaped its evolution. The conversation also explores selective availability, the Gulf War, and how GPS paved the way for modern mapping tools like Google Maps and Waze, as well as broader questions about information, transparency, and the future of scientific innovation. Learn more about Richard Easton's work and explore early GPS documents at gpsdeclassified.com, or pick up his book GPS Declassified: From Smart Bombs to Smartphones.Check out this GPT we trained on the conversationTimestamps00:00 – Stewart Alsop introduces Richard Easton, who explains the origins of GPS, its 12-hour satellite orbits, and his father Roger Easton's early time navigation work.05:00 – Discussion on atomic clocks, the hydrogen maser, and how technological skepticism drove innovation toward the modern GPS system.10:00 – Miniaturization of receivers, the rise of smartphones as GPS devices, and early mapping tools like Google Maps and Waze.15:00 – The Apollo missions' computer systems and precision landings lead back to GPS development and the 1973 approval of the joint program office.20:00 – The Gulf War's use of GPS, selective availability, and how civilian receivers became vital for soldiers and surveyors.25:00 – Secrecy in satellite programs, from GRAB and POPPY to Eisenhower's caution after the U-2 incident, and the link between intelligence and innovation.30:00 – The myth of the Korean airliner sparking civilian GPS, Reagan's policy, and the importance of declassified documents.35:00 – Cold War espionage stories like Gordievsky's defection, the rise of surveillance, and early countermeasures to GPS jamming.40:00 – Selective availability ends in 2000, sparking geocaching and civilian boom, with GPS enabling agriculture and transport.45:00 – Conversation shifts to AI, deepfakes, and the reliability of digital history.50:00 – Reflections on big science, decentralization, and innovation funding from John Foster to SpaceX and Starlink.55:00 – Universities' bureaucratic bloat, the future of research education, and Richard's praise for the University of Chicago's BASIC program.Key InsightsGPS was born from competing visions within the U.S. military. Richard Easton explains that the Navy and Air Force each had different ideas for navigation satellites in the 1960s. The Navy wanted mid-Earth orbits with autonomous atomic clocks, while the Air Force preferred ground-controlled repeaters in geostationary orbit. The eventual compromise in 1973 created the modern GPS structure—24 satellites in six constellations—which balanced accuracy, independence, and resilience.Atomic clocks made global navigation possible. Roger Easton's early insight was that improving atomic clock precision would one day enable real-time positioning. The hydrogen maser, developed in 1960, became the breakthrough technology that made GPS feasible. This innovation turned a theoretical idea into a working global system and also advanced timekeeping for scientific and financial applications.Civilian access to GPS was always intended. Contrary to popular belief, GPS wasn't a military secret turned public after the Korean airliner tragedy in 1983. Civilian receivers, such as TI's 4100 model, were already available in 1981. Reagan's 1983 announcement merely reaffirmed an existing policy that GPS would serve both military and civilian users.The Gulf War proved GPS's strategic value. During the 1991 conflict, U.S. and coalition forces used mostly civilian receivers after the Pentagon lifted “selective availability,” which intentionally degraded accuracy. GPS allowed troops to coordinate movement and strikes even during sandstorms, changing modern warfare.Secrecy and innovation were deeply intertwined. Easton recounts how classified projects like GRAB and POPPY—satellites disguised as scientific missions—laid technical groundwork for navigation systems. The crossover between secret defense projects and public science fueled breakthroughs but also obscured credit and understanding.Ending selective availability unleashed global applications. When the distortion feature was turned off in May 2000, GPS accuracy improved instantly, leading to new industries—geocaching, precision agriculture, logistics, and smartphone navigation. This marked GPS's shift from a defense tool to an everyday utility.Innovation's future may rely on decentralization. Reflecting on his father's era and today's landscape, Easton argues that bureaucratic “big science” has grown sluggish. He sees promise in smaller, independent innovators—helped by AI, cheaper satellites, and private space ventures like SpaceX—continuing the cycle of technological transformation that GPS began.
EASY LISTENING DEP'T.: Protesters showing up to wave Israeli flags outside the building does not mean that the "tension was spilling out of the synagogue." It's like when anti semitic protesters showed up on Broadway outside the fence of Columbia University, and their behavior was incorporated into the brief against the Columbia campus protesters, the people who are on the outside are on the outside for a reason, and if they were representative of the situation inside, they would probably be inside. Please visit, read, and support INDIGNITY! https://www.indignity.net/
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow
How is the transition to passkeys going in 2025?
The MacVoices Live! panel discuss the Rivian CEO's claim that drivers will eventually appreciate cars without Apple CarPlay, sparking debate about automakers' push for control and subscription models. Chuck Joiner, David Ginsburg, Web Bixby, Marty Jencius, Brian Flanigan-Arthurs, Jeff Gamet, Eric Bolden, and Jim Rea explore consumer frustration over losing convenience and the rise of tech-based add-ons. More privacy concerns from the UK's renewed backdoor encryption request link to a discussion about broader issues of digital trust and data security that include a leak of iPhone schematics. MacVoices is supported by MacPaw and the Cloud Cleanup feature. Get Tidy Today! Try 7 days free and use my code MACVOICES20 for 20% off at clnmy.com/MACVOICES. Show Notes: Chapters: [0:00] Rivian questions the need for CarPlay [1:52] Tesla and control over in-car systems [3:20] Automakers' motives and data ownership [5:19] Rivian's CEO vision and user reactions [7:52] Subscription-based features debate [8:30] Convenience and continuity in CarPlay use [13:24] Apple's challenges with CarPlay Ultra [21:22] UK government revisits encryption backdoor request [26:36] Risks of mandated access and data leaks [29:53] Closing reflections on privacy and technology trust Links: Rivian says ‘customers will appreciate' lack of CarPlay eventually https://9to5mac.com/2025/10/06/rivian-says-customers-will-appreciate-lack-of-carplay-eventually/ UK government resumes row with Apple by demanding access to British users' data https://www.theguardian.com/technology/2025/oct/01/uk-government-apple-data-british-telecoms FCC accidentally leaked iPhone schematics, potentially giving rivals a peek at company secrets https://www.engadget.com/big-tech/fcc-accidentally-leaked-iphone-schematics-potentially-giving-rivals-a-peek-at-company-secrets-154551807.html Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
In this episode, Momo sits down with his friend and long-time flatmate, Sohail, a mathematician, for a relaxed conversation about RSA cryptography—how it works and why it was revolutionary. Sohail breaks down the math behind RSA with clear, accessible examples and shares bonus fun facts about mathematics, broken predictions, and the future of math in an open-source world.---Hardy writes: "The 'real' mathematics of the 'real' mathematicians, the mathematics of Fermat and Euler and Gauss and Abel and Riemann, is almost wholly 'useless'."A similar quote is attributed to Gauss, Sohail's beloved mathematician. He jokingly said "I must have committed blasphemy by attributing it to someone else." Here's the exact quote:"Mathematics is the queen of the sciences, and number theory is the queen of mathematics. She often condescends to render service to astronomy and other natural sciences, but under all circumstances she is entitled to first rank."---00:58 – Sohail's background in mathematics03:23 – Math and real-world applications08:11 – Asymmetric cryptography (like public-key cryptography) vs. symmetric cryptography (like the Caesar cipher)11:18 – Remembering Gauss and Gauss Junior15:55 – Is asymmetric cryptography mind-blowing?17:53 – Why RSA cryptography was ground-breaking21:01 – Explaining RSA through the “suitcase” analogy25:09 – The math behind RSA32:18 – What kinds of functions can be used in RSA?34:58 – Clock-like modular functions in RSA40:59 – Fermat's Little Theorem as the basis of RSA48:11 – A more complex function than Fermat's Little Theorem used in RSA50:43 – How your password reaches your bank securely using RSA59:41 – Do my function and my bank's function need to match in RSA?01:01:19 – The importance of prime numbers in cryptography01:04:06 – Accessible resources for math enthusiasts01:05:40 – Nuance: which exponentiation operations are invalid in RSA01:10:25 – Can a hacker intercept and decode an RSA-encrypted message?01:12:28 – Why the move to elliptic curves?01:14:00 – Other real-world applications of number theory01:19:03 – The future of mathematics---Fermat's little theorem explanation:https://en.wikipedia.org/wiki/Fermat's_little_theoremThe channel for explaining math concepts in simple words, 3Blue1Brown. This source doesn't explain Fermat's Little Theorem, but it is an accessible source for math enthusiasts without specialized training.https://www.youtube.com/@3blue1brownEnigma Cipher Center, the cryptography museum in Poznan, Polandhttps://csenigma.pl/en/My Nostr post about the internet and cryptography:https://primal.net/e/nevent1qqs9x3rxx3s9fhg6jwzvafgh6vvvxe658junc0vt4lphmcdl4w9ccrs9rk8dd---
This is a recap of the top 10 posts on Hacker News on October 04, 2025. This podcast was generated by wondercraft.ai (00:30): The UK is still trying to backdoor encryption for Apple usersOriginal post: https://news.ycombinator.com/item?id=45476273&utm_source=wondercraft_ai(01:52): Flock's gunshot detection microphones will start listening for human voicesOriginal post: https://news.ycombinator.com/item?id=45473698&utm_source=wondercraft_ai(03:14): How I influence tech company politics as a staff software engineerOriginal post: https://news.ycombinator.com/item?id=45473852&utm_source=wondercraft_ai(04:37): Alibaba cloud FPGA: the $200 Kintex UltraScale+Original post: https://news.ycombinator.com/item?id=45471136&utm_source=wondercraft_ai(05:59): Paged Out Issue #7 [pdf]Original post: https://news.ycombinator.com/item?id=45472319&utm_source=wondercraft_ai(07:21): ProofOfThought: LLM-based reasoning using Z3 theorem provingOriginal post: https://news.ycombinator.com/item?id=45475529&utm_source=wondercraft_ai(08:44): Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?Original post: https://news.ycombinator.com/item?id=45473033&utm_source=wondercraft_ai(10:06): A comparison of Ada and Rust, using solutions to the Advent of CodeOriginal post: https://news.ycombinator.com/item?id=45473861&utm_source=wondercraft_ai(11:29): Self-hosting email like it's 1984Original post: https://news.ycombinator.com/item?id=45473730&utm_source=wondercraft_ai(12:51): New antibiotic targets IBD and AI predicted how it would workOriginal post: https://news.ycombinator.com/item?id=45469579&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
- J.P. Morgan: iPhone 17 Strength Driven by Upgrades - UK Tries for Access to Encrypted iCloud Data of UK Citizens - Court Dismisses Apple/Amazon Price Fixing Case - Apple Moves to Dismiss xAI's Collusion Suit - Apple, Google, and Meta Have to Answer for Gambling Apps - iFixit: AirPods Pro 3 Are Not Repairable - Apple Buys Ireland's IC Mask Design - Three New Titles Hit Apple Arcade - Apple TV+ Outs Trailer for Documentary “Mr. Scorsese” Ahead of 17 October Premier - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra today at store.insta360.com/product/go-ultra?utm_term=macosken with code macosken - Active ransomware attacks and improving recovery trends on Checklist No. 442 - Find it today at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken
The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation […]
Today on FLYTECH Daily, Nick & Michelle break down the top 5 tech stories you need to know — in under 10 minutes: Apple vs. Musk: Apple fires back at Elon Musk's lawsuit over its OpenAI deal, calling the claims “speculation on top of speculation” (Bloomberg). EV Lease Hacks: Ford & GM find a clever workaround to keep the $7,500 EV tax credit alive through leasing programs (Reuters). Porsche's OLED Flow Display: Porsche teases its Cayenne Electric with a futuristic curved OLED dashboard and new AI-powered voice assistant (Electrek, Autogefuehl). OpenAI Sora 2: Deepfake or reality? OpenAI unveils its most powerful video + audio generator yet, making hyperrealistic content mainstream (OpenAI briefing, The Verge). UK vs. Apple Encryption: The UK renews its demand for a backdoor into iCloud, reigniting the global encryption battle (Financial Times). Takeaway: Tech isn't slowing down — from EV loopholes to AI deepfakes, the future is unfolding faster than ever.
The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation ... Read More
Pavel Durov is the founder and CEO of Telegram. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep482-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/pavel-durov-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Pavel's Telegram: https://t.me/durov Pavel's X: https://x.com/durov Telegram: https://telegram.org/ Telegram Contests: https://contest.com/ SPONSORS: To support this podcast, check out our sponsors & get discounts: Miro: Online collaborative whiteboard platform. Go to https://miro.com/ UPLIFT Desk: Standing desks and office ergonomics. Go to https://upliftdesk.com/lex Fin: AI agent for customer service. Go to https://fin.ai/lex LMNT: Zero-sugar electrolyte drink mix. Go to https://drinkLMNT.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex OUTLINE: (00:00) - Introduction (02:46) - Sponsors, Comments, and Reflections (11:29) - Philosophy of freedom (14:37) - No alcohol (22:42) - No phone (28:38) - Discipline (49:50) - Telegram: Lean philosophy, privacy, and geopolitics (1:05:12) - Arrest in France (1:21:23) - Romanian elections (1:32:18) - Power and corruption (1:41:50) - Intense education (1:53:51) - Nikolai Durov (1:58:19) - Programming and video games (2:02:33) - VK origins & engineering (2:19:46) - Hiring a great team (2:29:02) - Telegram engineering & design (2:48:04) - Encryption (2:53:01) - Open source (2:57:48) - Edward Snowden (3:00:20) - Intelligence agencies (3:01:32) - Iran and Russia government pressure (3:04:41) - Apple (3:11:38) - Poisoning (3:43:53) - Money (3:52:45) - TON (4:02:35) - Bitcoin (4:05:34) - Two chairs dilemma (4:12:14) - Children (4:23:24) - Father (4:27:55) - Quantum immortality (4:34:27) - Kafka PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips
In this week's roundup of the latest news in online speech, content moderation and internet regulation, Mike is joined by Dave Willner, founder of Zentropi, and long-time trust & safety expert who worked at Facebook, AirBnB, and OpenAI in Trust & Safety roles. Together they discuss:Masnick's Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well (Techdirt)UK makes new attempt to access Apple cloud data (Financial Times)Imgur pulls out of UK after data regulator warns of fines (TechCrunch)Leaked Meta guidelines show how it trains AI chatbots to respond to child sexual exploitation prompts (Business Insider)OpenAI's Sora joins Meta in pushing AI-generated videos. Some are worried about a flood of 'AI slop' (ABC News)Flights in Afghanistan grounded after internet shutdown (BBC) Ctrl-Alt-Speech is a weekly podcast from Techdirt and Everything in Moderation. Send us your feedback at podcast@ctrlaltspeech.com and sponsorship enquiries to sponsorship@ctrlaltspeech.com. Thanks for listening.
In this episode of Crazy Wisdom, host Stewart Alsop talks with Michel Bauwens, founder of the P2P Foundation, about the rise of peer-to-peer dynamics, the historical cycles shaping our present, and the struggles and possibilities of building resilient communities in times of crisis. The conversation moves through the evolution of the internet from Napster to Web3, the cultural shifts since 1968, Bauwens' personal experiences with communes and his 2018 cancellation, and the emerging vision of cosmolocalism and regenerative villages as alternatives to state and market decline. For more on Michel's work, you can explore his Substack at 4thgenerationcivilization.substack.com and the extensive P2P Foundation Wiki at wiki.p2pfoundation.net.Check out this GPT we trained on the conversationTimestamps00:00 Michel Bauwens explains peer-to-peer as both computer design and social relationship, introducing trans-local association and the idea of an anthropological revolution.05:00 Discussion of Web1, Web3, encryption, anti-surveillance, cozy web, and dark forest theory, contrasting early internet openness with today's fragmentation.10:00 Bauwens shares his 2018 cancellation, deplatforming, and loss of funding after a dispute around Jordan Peterson, reflecting on identity politics and peer-to-peer pluralism.15:00 The cultural shifts since 1968, the rise of identity movements, macro-historical cycles, and the fourth turning idea of civilizational change are unpacked.20:00 Memories of 1968 activism, communes, free love, hypergamy, and the collapse of utopian experiments, showing the need for governance and rules in cooperation.25:00 From communes to neo-Reichian practices, EST seminars, and lessons of human nature, Bauwens contrasts failed free love with lasting models like kibbutzim and Bruderhof.30:00 Communes that endure rely on transcendence, religious or ideological foundations, and Bauwens points to monasteries as models for resilience in times of decline.35:00 Cycles of civilization, overuse of nature, class divisions, and the threat of social unrest frame a wider reflection on populism, Eurasian vs Western models, and culture wars.40:00 Populism in Anglo vs continental Europe, social balance, Christian democracy, and the contrast with market libertarianism in Trump and Milei.45:00 Bauwens proposes cosmolocalism, regenerative villages, and bioregional alliances supported by Web3 communities like Crypto Commons Alliance and Ethereum Localism.50:00 Historical lessons from the Roman era, monasteries, feudal alliances, and the importance of reciprocity, pragmatic alliances, and preparing for systemic collapse.55:00 Localism, post-political collaboration, Ghent urban commons, Web3 experiments like Zuzalu, and Bauwens' resources: fortcivilizationsubstack.com and wiki.p2pfoundation.net.Key InsightsMichel Bauwens frames peer-to-peer not just as a technical design but as a profound social relationship, what he calls an “anthropological revolution.” Like the invention of writing or printing, the internet created trans-local association, allowing people across the globe to coordinate outside of centralized control.The conversation highlights the cycles of history, drawing from macro-historians and the “fourth turning” model. Bauwens explains how social movements rise, institutionalize, and collapse, with today's cultural polarization echoing earlier waves such as the upheavals of 1968. He sees our era as the end of a long cycle that began after World War II.Bauwens shares his personal cancellation in 2018, when posting a video about Jordan Peterson triggered accusations and led to deplatforming, debanking, and professional exclusion. He describes this as deeply traumatic, forcing him to rethink his political identity and shift his focus to reciprocity and trust in smaller, resilient networks.The episode revisits communes and free love experiments of the 1970s, where Bauwens lived for years. He concludes that without governance, rules, and shared transcendence, these communities collapse into chaos. He contrasts them with enduring models like the Bruderhof, kibbutzim, and monasteries, which rely on structure, ideology, or religion to survive.A major theme is populism and cultural polarization, with Bauwens distinguishing between Anglo-Saxon populism rooted in market libertarianism and continental populism shaped by Christian democratic traditions. The former quickly loses support by privileging elites, while the latter often maintains social balance through family and worker policies.Bauwens outlines his vision of cosmolocalism and regenerative villages, where “what's heavy is local, what's light is global.” He argues that bioregionalism combined with Web3 technologies offers a practical way to rebuild resilient communities, coordinate globally, and address ecological and social breakdown.Finally, the episode underscores the importance of pragmatic alliances across political divides. Bauwens stresses that survival and flourishing in times of systemic collapse depend less on ideology and more on reciprocity, concrete projects, and building trust networks that can outlast declining state and market systems.
A team in China has successfully broken RSA encryption using a D-Wave Advantage quantum computer, posing a significant threat to global data security. Earth.com explains that the researchers used a 22-bit RSA integer that had previously resisted attempts to break it, demonstrating the potential for quantum machines to tackle cryptographic problems. This breakthrough is concerning because RSA encryption is still widely used in many industries, including finance and government. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.
For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/. Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready. Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech. Questions and comments are welcome! Theme song by David Schwartz, copyright 2021. The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries. None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com
Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals about the importance of impartial justice and truth. They dig into the U.K.'s Banter Bill and its chilling effect on free speech—an essential pillar of democratic society. And they discuss the Tornado Cash trial unfolding in Manhattan, and how it could set a precedent that reshapes Americans' digital privacy rights. These aren't just headline stories—they're stress tests for the core values that make democracy function. Then, in Politicology+ they discuss Javier Milei proving his detractors wrong and the remarkable turn around in Argentina this year. Not yet a Politicology+ member? Don't miss all the extra episodes on the private, ad-free version of this podcast. Upgrade now at politicology.com/plus. Find our sponsor links and promo codes here: https://bit.ly/44uAGZ8 Send your questions and ideas to podcast@politicology.com or leave a voicemail at (703) 239-3068 Follow this week's panel on X (formerly Twitter): https://twitter.com/RonSteslow https://x.com/HagarChemali Related Reading: WSJ- Justice Department Told Trump in May That His Name Is Among Many in the Epstein Files Axios - Deputy attorney general seeking meeting with Epstein associate Ghislaine Maxwell FP - Britain's War on Speech Comes for the Pub NYTimes - As Trump Quits UNESCO, China Expands Influence - The New York Times Axios - The trial of a Tornado Cash developer begins Coindesk - Legitimate Privacy Tool or Dirty Money ‘Laundromat'? Lawyers Debate Role of Tornado Cash on Day 1 of Roman Storm Trial Learn more about your ad choices. Visit megaphone.fm/adchoices
When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit