Process of converting plaintext to ciphertext
POPULARITY
Categories
Bret is joined by the founders of Plakar - Julien Mangeard and Gilles Chehade - to nerd out over backup engineering. The kind where you're building your own file formats and cryptographic layers, not just wiring up cron jobs. We get into how Plakar deduplicates and encrypts at the source so your cloud provider never sees your keys. Also, their snapshot model has no chain dependencies, which means you can delete any backup without breaking the others. We had a fun hour of backup horror stories, ransomware pragmatism, where I'm lobbying hard for a Docker volume integration.Check out the video podcast version here: https://youtu.be/OPRK5osKQHI
On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »
Apple's legendary evangelist Guy Kawasaki reveals how signal messaging and open-source AI are rewriting playbooks for privacy, immortality, and activism. Hear candid stories and sharp opinions from someone who has shaped—and challenged—today's tech giants. OpenAI robotics hardware lead resigns ChatGPT returns to the top of the App Store after DoD controversy OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway Anthropic Made Pitch in Drone Swarm Contest During Pentagon Feud Anthropic chief back in talks with Pentagon about AI deal OpenAI robotics leader resigns over concerns about Pentagon AI deal BREAKING: Sam Altman's greed and dishonesty are finally catching up to him ChatGPT update curbs 'cringe,' cuts down on answer refusals OpenAI's GPT-5.4 sets new records on professional benchmarks OpenAI Releases New ChatGPT Model For Working In Excel and Google Sheets - Slashdot OpenAI delays ChatGPT's 'adult mode' again OpenAI's IPO Hopes Face Skeptical Investor Community Sources: Meta has signed a multiyear AI content licensing deal with News Corp worth $50M per year; the deal will run for at least three years Zuckerberg has "finished" with Alexandr Wang, worth US$14 billion Yann LeCun Raises $1 Billion To Build AI That Understands the Physical World Mira Murati's Thinking Machines Lab signs a chip supply deal with Nvidia worth tens of billions of dollars, planning to deploy 1GW+ of next-gen Vera Rubin chips Meta didn't buy Moltbook for bots — it bought into the agentic web Where did you think the training data was coming from? You could be an influencer without even realizing it Amazon Wins Court Order To Block Perplexity's AI Shopping Bots Amazon's Health AI is now open to all US customers After outages, Amazon to make senior engineers sign off on AI-assisted changes Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai Nvidia Is Planning to Launch an Open-Source AI Agent Platform How to Talk to Someone Experiencing 'AI Psychosis' Tiiny AI Pocket Lab: The First Pocket-Size AI Supercomputer A lot of journalism folks are offering editing advice as Grammarly's AI "experts" AI-generated art can't be copyrighted after Supreme Court declines to review the rule Judges Find AI Doesn't Have Human Intelligence in Two New Court Cases Ars Technica fires reporter after AI controversy involving fabricated quotes Start Up No.2624: Canadian journal retracts 25 years of studies, the AI writing question, Netflix buys Affleck AI firm, and more William Shatner says he turned a $42 money transfer from Elon Musk into nearly $200,000 for his charity YouTube Lays Claim to Another Crown: The World's Largest Media Company ET Fall Preview 1994 Payphone Go This company wants to pay you $800 to bully AI for a day Tweakbench - your favorite producer's favorite plugins lol Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Guy Kawasaki Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/machines monarch.com with code IM Melissa.com/twit get.stash.com/im
Apple's legendary evangelist Guy Kawasaki reveals how signal messaging and open-source AI are rewriting playbooks for privacy, immortality, and activism. Hear candid stories and sharp opinions from someone who has shaped—and challenged—today's tech giants. OpenAI robotics hardware lead resigns ChatGPT returns to the top of the App Store after DoD controversy OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway Anthropic Made Pitch in Drone Swarm Contest During Pentagon Feud Anthropic chief back in talks with Pentagon about AI deal OpenAI robotics leader resigns over concerns about Pentagon AI deal BREAKING: Sam Altman's greed and dishonesty are finally catching up to him ChatGPT update curbs 'cringe,' cuts down on answer refusals OpenAI's GPT-5.4 sets new records on professional benchmarks OpenAI Releases New ChatGPT Model For Working In Excel and Google Sheets - Slashdot OpenAI delays ChatGPT's 'adult mode' again OpenAI's IPO Hopes Face Skeptical Investor Community Sources: Meta has signed a multiyear AI content licensing deal with News Corp worth $50M per year; the deal will run for at least three years Zuckerberg has "finished" with Alexandr Wang, worth US$14 billion Yann LeCun Raises $1 Billion To Build AI That Understands the Physical World Mira Murati's Thinking Machines Lab signs a chip supply deal with Nvidia worth tens of billions of dollars, planning to deploy 1GW+ of next-gen Vera Rubin chips Meta didn't buy Moltbook for bots — it bought into the agentic web Where did you think the training data was coming from? You could be an influencer without even realizing it Amazon Wins Court Order To Block Perplexity's AI Shopping Bots Amazon's Health AI is now open to all US customers After outages, Amazon to make senior engineers sign off on AI-assisted changes Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai Nvidia Is Planning to Launch an Open-Source AI Agent Platform How to Talk to Someone Experiencing 'AI Psychosis' Tiiny AI Pocket Lab: The First Pocket-Size AI Supercomputer A lot of journalism folks are offering editing advice as Grammarly's AI "experts" AI-generated art can't be copyrighted after Supreme Court declines to review the rule Judges Find AI Doesn't Have Human Intelligence in Two New Court Cases Ars Technica fires reporter after AI controversy involving fabricated quotes Start Up No.2624: Canadian journal retracts 25 years of studies, the AI writing question, Netflix buys Affleck AI firm, and more William Shatner says he turned a $42 money transfer from Elon Musk into nearly $200,000 for his charity YouTube Lays Claim to Another Crown: The World's Largest Media Company ET Fall Preview 1994 Payphone Go This company wants to pay you $800 to bully AI for a day Tweakbench - your favorite producer's favorite plugins lol Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Guy Kawasaki Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/machines monarch.com with code IM Melissa.com/twit get.stash.com/im
Apple's legendary evangelist Guy Kawasaki reveals how signal messaging and open-source AI are rewriting playbooks for privacy, immortality, and activism. Hear candid stories and sharp opinions from someone who has shaped—and challenged—today's tech giants. OpenAI robotics hardware lead resigns ChatGPT returns to the top of the App Store after DoD controversy OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway Anthropic Made Pitch in Drone Swarm Contest During Pentagon Feud Anthropic chief back in talks with Pentagon about AI deal OpenAI robotics leader resigns over concerns about Pentagon AI deal BREAKING: Sam Altman's greed and dishonesty are finally catching up to him ChatGPT update curbs 'cringe,' cuts down on answer refusals OpenAI's GPT-5.4 sets new records on professional benchmarks OpenAI Releases New ChatGPT Model For Working In Excel and Google Sheets - Slashdot OpenAI delays ChatGPT's 'adult mode' again OpenAI's IPO Hopes Face Skeptical Investor Community Sources: Meta has signed a multiyear AI content licensing deal with News Corp worth $50M per year; the deal will run for at least three years Zuckerberg has "finished" with Alexandr Wang, worth US$14 billion Yann LeCun Raises $1 Billion To Build AI That Understands the Physical World Mira Murati's Thinking Machines Lab signs a chip supply deal with Nvidia worth tens of billions of dollars, planning to deploy 1GW+ of next-gen Vera Rubin chips Meta didn't buy Moltbook for bots — it bought into the agentic web Where did you think the training data was coming from? You could be an influencer without even realizing it Amazon Wins Court Order To Block Perplexity's AI Shopping Bots Amazon's Health AI is now open to all US customers After outages, Amazon to make senior engineers sign off on AI-assisted changes Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai Nvidia Is Planning to Launch an Open-Source AI Agent Platform How to Talk to Someone Experiencing 'AI Psychosis' Tiiny AI Pocket Lab: The First Pocket-Size AI Supercomputer A lot of journalism folks are offering editing advice as Grammarly's AI "experts" AI-generated art can't be copyrighted after Supreme Court declines to review the rule Judges Find AI Doesn't Have Human Intelligence in Two New Court Cases Ars Technica fires reporter after AI controversy involving fabricated quotes Start Up No.2624: Canadian journal retracts 25 years of studies, the AI writing question, Netflix buys Affleck AI firm, and more William Shatner says he turned a $42 money transfer from Elon Musk into nearly $200,000 for his charity YouTube Lays Claim to Another Crown: The World's Largest Media Company ET Fall Preview 1994 Payphone Go This company wants to pay you $800 to bully AI for a day Tweakbench - your favorite producer's favorite plugins lol Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Guy Kawasaki Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/machines monarch.com with code IM Melissa.com/twit get.stash.com/im
Apple's legendary evangelist Guy Kawasaki reveals how signal messaging and open-source AI are rewriting playbooks for privacy, immortality, and activism. Hear candid stories and sharp opinions from someone who has shaped—and challenged—today's tech giants. OpenAI robotics hardware lead resigns ChatGPT returns to the top of the App Store after DoD controversy OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway Anthropic Made Pitch in Drone Swarm Contest During Pentagon Feud Anthropic chief back in talks with Pentagon about AI deal OpenAI robotics leader resigns over concerns about Pentagon AI deal BREAKING: Sam Altman's greed and dishonesty are finally catching up to him ChatGPT update curbs 'cringe,' cuts down on answer refusals OpenAI's GPT-5.4 sets new records on professional benchmarks OpenAI Releases New ChatGPT Model For Working In Excel and Google Sheets - Slashdot OpenAI delays ChatGPT's 'adult mode' again OpenAI's IPO Hopes Face Skeptical Investor Community Sources: Meta has signed a multiyear AI content licensing deal with News Corp worth $50M per year; the deal will run for at least three years Zuckerberg has "finished" with Alexandr Wang, worth US$14 billion Yann LeCun Raises $1 Billion To Build AI That Understands the Physical World Mira Murati's Thinking Machines Lab signs a chip supply deal with Nvidia worth tens of billions of dollars, planning to deploy 1GW+ of next-gen Vera Rubin chips Meta didn't buy Moltbook for bots — it bought into the agentic web Where did you think the training data was coming from? You could be an influencer without even realizing it Amazon Wins Court Order To Block Perplexity's AI Shopping Bots Amazon's Health AI is now open to all US customers After outages, Amazon to make senior engineers sign off on AI-assisted changes Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai Nvidia Is Planning to Launch an Open-Source AI Agent Platform How to Talk to Someone Experiencing 'AI Psychosis' Tiiny AI Pocket Lab: The First Pocket-Size AI Supercomputer A lot of journalism folks are offering editing advice as Grammarly's AI "experts" AI-generated art can't be copyrighted after Supreme Court declines to review the rule Judges Find AI Doesn't Have Human Intelligence in Two New Court Cases Ars Technica fires reporter after AI controversy involving fabricated quotes Start Up No.2624: Canadian journal retracts 25 years of studies, the AI writing question, Netflix buys Affleck AI firm, and more William Shatner says he turned a $42 money transfer from Elon Musk into nearly $200,000 for his charity YouTube Lays Claim to Another Crown: The World's Largest Media Company ET Fall Preview 1994 Payphone Go This company wants to pay you $800 to bully AI for a day Tweakbench - your favorite producer's favorite plugins lol Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Guy Kawasaki Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/machines monarch.com with code IM Melissa.com/twit get.stash.com/im
Apple's legendary evangelist Guy Kawasaki reveals how signal messaging and open-source AI are rewriting playbooks for privacy, immortality, and activism. Hear candid stories and sharp opinions from someone who has shaped—and challenged—today's tech giants. OpenAI robotics hardware lead resigns ChatGPT returns to the top of the App Store after DoD controversy OpenAI Had Banned Military Use. The Pentagon Tested Its Models Through Microsoft Anyway Anthropic Made Pitch in Drone Swarm Contest During Pentagon Feud Anthropic chief back in talks with Pentagon about AI deal OpenAI robotics leader resigns over concerns about Pentagon AI deal BREAKING: Sam Altman's greed and dishonesty are finally catching up to him ChatGPT update curbs 'cringe,' cuts down on answer refusals OpenAI's GPT-5.4 sets new records on professional benchmarks OpenAI Releases New ChatGPT Model For Working In Excel and Google Sheets - Slashdot OpenAI delays ChatGPT's 'adult mode' again OpenAI's IPO Hopes Face Skeptical Investor Community Sources: Meta has signed a multiyear AI content licensing deal with News Corp worth $50M per year; the deal will run for at least three years Zuckerberg has "finished" with Alexandr Wang, worth US$14 billion Yann LeCun Raises $1 Billion To Build AI That Understands the Physical World Mira Murati's Thinking Machines Lab signs a chip supply deal with Nvidia worth tens of billions of dollars, planning to deploy 1GW+ of next-gen Vera Rubin chips Meta didn't buy Moltbook for bots — it bought into the agentic web Where did you think the training data was coming from? You could be an influencer without even realizing it Amazon Wins Court Order To Block Perplexity's AI Shopping Bots Amazon's Health AI is now open to all US customers After outages, Amazon to make senior engineers sign off on AI-assisted changes Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai Nvidia Is Planning to Launch an Open-Source AI Agent Platform How to Talk to Someone Experiencing 'AI Psychosis' Tiiny AI Pocket Lab: The First Pocket-Size AI Supercomputer A lot of journalism folks are offering editing advice as Grammarly's AI "experts" AI-generated art can't be copyrighted after Supreme Court declines to review the rule Judges Find AI Doesn't Have Human Intelligence in Two New Court Cases Ars Technica fires reporter after AI controversy involving fabricated quotes Start Up No.2624: Canadian journal retracts 25 years of studies, the AI writing question, Netflix buys Affleck AI firm, and more William Shatner says he turned a $42 money transfer from Elon Musk into nearly $200,000 for his charity YouTube Lays Claim to Another Crown: The World's Largest Media Company ET Fall Preview 1994 Payphone Go This company wants to pay you $800 to bully AI for a day Tweakbench - your favorite producer's favorite plugins lol Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Guest: Guy Kawasaki Download or subscribe to Intelligent Machines at https://twit.tv/shows/intelligent-machines. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: helixsleep.com/machines monarch.com with code IM Melissa.com/twit get.stash.com/im
Infosec Decoded Season 6 #17: Fully Homomorphic Encryption ChipWith sambowne@infosec.exchange and Doug SpindlerLinks: https://samsclass.info/news/news_031226.htmlRecorded Thu, Mar 12, 2026
Cindy Cohn joins Remarkable People to break down encryption, Section 230, metadata, and the real meaning of the First and Fourth Amendments in the digital age. As longtime leader of the Electronic Frontier Foundation, she has taken on the Department of Justice, challenged mass surveillance, and helped secure the tools we rely on every day.We also dive into her new memoir, Privacy's Defender: My Thirty-Year Fight Against Digital Surveillance, and what comes next in the fight for online freedom.--Guy Kawasaki is on a mission to make you remarkable. His Remarkable People podcast features interviews with remarkable people such as Jane Goodall, Marc Benioff, Woz, Kristi Yamaguchi, and Bob Cialdini. Every episode will make you more remarkable.With his decades of experience in Silicon Valley as a Venture Capitalist and advisor to the top entrepreneurs in the world, Guy's questions come from a place of curiosity and passion for technology, start-ups, entrepreneurship, and marketing. If you love society and culture, documentaries, and business podcasts, take a second to follow Remarkable People.Listeners of the Remarkable People podcast will learn from some of the most successful people in the world with practical tips and inspiring stories that will help you be more remarkable.Episodes of Remarkable People organized by topic: https://bit.ly/rptopologyListen to Remarkable People here: **https://podcasts.apple.com/us/podcast/guy-kawasakis-remarkable-people/id1483081827**Like this show? Please leave us a review -- even one sentence helps! Consider including your Twitter handle so we can thank you personally!Thank you for your support; it helps the show!See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
A discussion of privacy, ethics, and technology was prompted after reports that Google recovered Nest camera footage believed to be deleted. Chuck Joiner, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, and Web Bixby review how cloud data is actually erased, the role of backups and mirrored servers, and the difficult balance between privacy promises and aiding law enforcement. The conversation expands into broader concerns about surveillance technology, online data permanence, and how companies should handle sensitive information in critical situations. This edition of MacVoices is sponsored by Squarespace. Go to Squarespace.com/macvoices and click "enter an offer code" under the pricing and put in the code "macvoices" to receive a 10% discount. Squarespace: Everything you need to create an exceptional website. Show Notes: Chapters: 00:00 Introduction to surveillance and AI topics00:24 Recovered Nest camera footage raises privacy questions01:08 How deleted video was reportedly recovered02:05 Ethical concerns about surveillance cameras02:22 Corporate dilemma: privacy vs public safety03:13 Questions about data retention policies04:25 How cloud storage distributes and retains data05:31 Monetization and retention of surveillance footage06:22 Guest departure and show housekeeping07:23 How “deleted” cloud data actually works08:36 Backups, mirrored servers, and forensic recovery09:59 Internal decision-making around recovered data11:08 Subscription models and video retention limits12:45 Law enforcement implications and future requests13:41 Encryption and control of stored video15:52 The permanence of data on the internet17:09 Lessons about sharing data online18:32 Sponsor message and website strategy discussion20:10 OpenClaw creator joins OpenAI21:10 Impact on the AI development race23:01 Limits and risks of current AI tools24:25 Security concerns with AI assistants25:44 The early stage of modern AI development27:14 Why OpenAI may be the safer home for the project28:52 AI interacting directly with operating systems30:05 The road toward intelligent digital assistants31:40 Closing reflections on technology ethics and change Links: Google recovers "deleted" Nest video in high-profile abduction casehttps://arstechnica.com/google/2026/02/google-recovers-deleted-nest-video-in-high-profile-abduction-case/ Peter Steinberger joins OpenAIhttps://thenextweb.com/news/peter-steinberger-joins-openai Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
A discussion of privacy, ethics, and technology was prompted after reports that Google recovered Nest camera footage believed to be deleted. Chuck Joiner, Marty Jencius, Jim Rea, Eric Bolden, Jeff Gamet, and Web Bixby review how cloud data is actually erased, the role of backups and mirrored servers, and the difficult balance between privacy promises and aiding law enforcement. The conversation expands into broader concerns about surveillance technology, online data permanence, and how companies should handle sensitive information in critical situations. This edition of MacVoices is sponsored by Squarespace. Go to Squarespace.com/macvoices and click "enter an offer code" under the pricing and put in the code "macvoices" to receive a 10% discount. Squarespace: Everything you need to create an exceptional website. Show Notes: Chapters: 00:00 Introduction to surveillance and AI topics 00:24 Recovered Nest camera footage raises privacy questions 01:08 How deleted video was reportedly recovered 02:05 Ethical concerns about surveillance cameras 02:22 Corporate dilemma: privacy vs public safety 03:13 Questions about data retention policies 04:25 How cloud storage distributes and retains data 05:31 Monetization and retention of surveillance footage 06:22 Guest departure and show housekeeping 07:23 How "deleted" cloud data actually works 08:36 Backups, mirrored servers, and forensic recovery 09:59 Internal decision-making around recovered data 11:08 Subscription models and video retention limits 12:45 Law enforcement implications and future requests 13:41 Encryption and control of stored video 15:52 The permanence of data on the internet 17:09 Lessons about sharing data online 18:32 Sponsor message and website strategy discussion 20:10 OpenClaw creator joins OpenAI 21:10 Impact on the AI development race 23:01 Limits and risks of current AI tools 24:25 Security concerns with AI assistants 25:44 The early stage of modern AI development 27:14 Why OpenAI may be the safer home for the project 28:52 AI interacting directly with operating systems 30:05 The road toward intelligent digital assistants 31:40 Closing reflections on technology ethics and change Links: Google recovers "deleted" Nest video in high-profile abduction case https://arstechnica.com/google/2026/02/google-recovers-deleted-nest-video-in-high-profile-abduction-case/ Peter Steinberger joins OpenAI https://thenextweb.com/news/peter-steinberger-joins-openai Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession 'firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
This episode is an introductory guide to the fundamentals of encryption. We define essential terminology such as plaintext, ciphertext, and algorithms while distinguishing between symmetric and asymmetric cryptography. Beyond basic concepts, the source explores modern security applications like secure browsing and end-to-end messaging, alongside emerging technologies like post-quantum and homomorphic encryption. The episode emphasizes that digital privacy is a fundamental human right, protecting users from identity theft, mass surveillance, and data tampering. We highlight tools like Signal and Proton Mail to offer practical advice for maintaining digital trust in an increasingly data-driven world. The episode concludes by framing encryption as the primary defense for financial and personal safety in the modern era. Episode Time Stamps 00:00 Going Linux #476 · An intro to encryption 01:10 Bill is still on Manjaro, Larry upgraded Linux Mint 05:32 Encryption: definition 06:28 Core concepts: plain text, cypher text 06:44 Cypher text 08:58 How it works 09:48 The main types of encryption 12:22 Key signing parties 13:51 Common applications 17:59 Cool new cryptographic techniques 18:33 Post-Quantum Cryptography (PQC) 21:43 Homomorphic Encryption (HE) 27:17 Quantum Cryptography (Quantum Key Distribution) 29:55 Biometric Encryption 31:32 Why even care about encryption? 32:25 How encryption makes stolen data useless 33:22 Defending Against Mass Surveillance Preventing "Eavesdropping" 34:18 Preserving Human Rights and Free Speech Protecting Vulnerable Groups 36:09 Ensuring Data Integrity Anti-Tampering 37:03 Maintaining Digital Trust Foundation of the Economy 37:31 Ideas to protect you security 39:25 Final thoughts 41:53 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe
Anabeli discusses Hushmail's email and form encryption for confidential client communication. Episode Show Notes: kayladas.com/episode158 Hushmail: kayladas.com/hushmail Use our link to receive a free month on your new Hushmail account. Free Therapist Private Practice Community: facebook.com/groups/exclusiveprivatepracticecommunity The Passive Practice Book (Canada): kayladas.com/the-passive-practice-canada The Passive Practice Book (US): kayladas.com/the-passive-practice-us Canadian Clinical Supervision Therapist Directory: canadianclinicalsupervision.ca Credits & Disclaimers Music by Denis Pavlov Music from Pixabay The Designer Practice Podcast and Evaspare Inc. has an affiliate and/or sponsorship relationship for advertisements in our podcast episodes. We receive commission or monetary compensation, at no extra cost to you, when you use our promotional codes and/or check out advertisement links.
A Note from James:In the last episode, we talked about whether Martin Shkreli really deserves the label “most hated man in America.” My conclusion was no, and I hope you came to the same conclusion after hearing his perspective.In this episode, we shift gears completely. We talk about Bitcoin, crypto, AI, energy, optical computing, and what the future of technology might actually look like.Martin has a very unusual combination of skills—finance, biotech, programming—and I always enjoy hearing how he connects ideas across different fields. That's what this conversation is about.Episode Description:What happens when AI demand collides with the limits of computing power and energy?In Part 2, Martin Shkreli and James explore the future of technology—from crypto vulnerabilities to optical computing, GPU scaling, and the potential energy crisis driven by artificial intelligence.They discuss whether Bitcoin can survive quantum computing, why stablecoins solve real-world financial problems, and how computing architecture may shift beyond traditional silicon chips. The conversation then moves into AI economics: why companies might spend billions on compute to make better decisions, how energy constraints could shape innovation, and why optical computing could become the next major breakthrough.This episode isn't about controversy—it's about technological leverage, incentives, and where computation is heading next.What You'll Learn:Why quantum computing could eventually threaten Bitcoin's encryptionThe real-world advantages of stablecoins and decentralized paymentsHow AI demand could create massive new energy constraintsWhy optical (photonic) computing may outperform traditional silicon chipsHow businesses might use large-scale AI compute for strategic decisionsTimestamped Chapters:[00:02:00] Bitcoin, Encryption & Quantum Computing Risks[00:03:02] A Note from James[00:03:34] Crypto Markets: Speculation vs. Utility[00:05:23] Banking Control, Debanking & Stablecoins[00:07:40] Moore's Law, Huang's Law & The Limits of Silicon[00:08:45] Optical Computing Explained[00:09:12] NVIDIA, Parallelization & Power Consumption[00:10:24] Energy Constraints & The Electrical Grid[00:11:41] AI Energy Demand vs. Countries[00:12:24] Corporate AI Decision-Making at Scale[00:13:37] The Coming Explosion of AI Compute[00:14:20] Energy Efficiency vs. Speed[00:15:17] GPU Efficiency Improvements & Jevons Paradox[00:17:00] Why AI Is Different from Traditional Computing[00:17:47] Optical vs. Quantum vs. DNA Computing[00:18:19] Why Optical Computing Fits AI Perfectly[00:19:28] Precision, Bits & Neural Networks[00:21:24] Error Tolerance in AI Systems[00:22:00] Fiber Optics & Existing Infrastructure[00:23:16] New Computing Paradigms Beyond Silicon[00:24:00] Matrix Multiplication & AI Workloads[00:24:53] Closing ThoughtsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Quantum computing is accelerating — and putting today's encryption on a clock. John Stackhouse goes inside Xanadu's Toronto lab with Christian Weedbrook to meet Aurora, a networked quantum computer built to push scale in the right direction and speaks with Photonic's Dr. Stephanie Simmons about “harvest now, decrypt later,” fault-tolerant quantum, and why every organization needs a post-quantum cryptography (PQC) transition plan. It's not all doom and gloom. Simmons also lays out what quantum could unlock as it scales: new possibilities in materials, chemistry, and discovery that are moving from theory toward real-world impact. In this episode: Inside Xanadu: Aurora and what “networked quantum” looks like in the real world What “fault-tolerant” quantum means — and why it matters “Harvest now, decrypt later” and the trust implications for institutions Post-quantum cryptography (PQC): where leaders should start Quantum upside: materials, chemistry, and faster discovery RBC – Thought Leadership Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this episode, hosts Lois Houston and Nikita Abraham are joined by special guests Samvit Mishra and Rashmi Panda for an in-depth discussion on security and migration with Oracle Database@AWS. Samvit shares essential security best practices, compliance guidance, and data protection mechanisms to safeguard Oracle databases in AWS, while Rashmi walks through Oracle's powerful Zero-Downtime Migration (ZDM) tool, explaining how to achieve seamless, reliable migrations with minimal disruption. Oracle Database@AWS Architect Professional: https://mylearn.oracle.com/ou/course/oracle-databaseaws-architect-professional/155574 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, Anna Hulkower, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:26 Nikita: Welcome to the Oracle University Podcast! I'm Nikita Abraham, Team Lead: Editorial Services with Oracle University, and with me is Lois Houston, Director of Communications and Adoption with Customer Success Services. Lois: Hello again! We're continuing our discussion on Oracle Database@AWS and in today's episode, we're going to talk about the aspects of security and migration with two special guests: Samvit Mishra and Rashmi Panda. Samvit is a Senior Manager and Rashmi is a Senior Principal Database Instructor. 00:59 Nikita: Hi Samvit and Rashmi! Samvit, let's begin with you. What are the recommended security best practices and data protection mechanisms for Oracle Database@AWS? Samvit: Instead of everyone using the root account, which has full access, we create individual users with AWS, IAM, Identity Center, or IAM service. And in addition, you must use multi-factor authentication. So basically, as an example, you need a password and a temporary code from virtual MFA app to log in to the console. Always use SSL or TLS to communicate with AWS services. This ensures data in transit is encrypted. Without TLS, the sensitive information like credentials or database queries can be intercepted. AWS CloudTrail records every action taken in your AWS account-- who did what, when, and from where. This helps with audit, troubleshooting, and detecting suspicious activity. So you must set up API and user activity logging with AWS CloudTrail. Use AWS encryption solutions along with all default security controls within AWS services. To store and manage keys by using transparent data encryption, which is enabled by default, Oracle Database@AWS uses OCI vaults. Currently, Oracle Database@AWS doesn't support the AWS Key Management Service. You should also use advanced managed security services such as Amazon Macie, which assists in discovering and securing sensitive data that is stored in Amazon S3. 03:08 Lois: And how does Oracle Database@AWS deliver strong security and compliance? Samvit: Oracle Database@AWS enforces transparent data encryption for all data at REST, ensuring stored information is always protected. Data in transit is secured using SSL and Native Network Encryption, providing end-to-end confidentiality. Oracle Database@AWS also uses OCI Vault for centralized and secure key management. This allows organizations to manage encryption keys with fine-grained control, rotation policies, and audit capabilities to ensure compliance with regulatory standards. At the database level, Oracle Database@AWS supports unified auditing and fine-grained auditing to track user activity and sensitive operations. At the resource level, AWS CloudTrail and OCI audit service provide comprehensive visibility into API calls and configuration changes. At the database level, security is enforced using database access control lists and Database Firewall to restrict unauthorized connections. At the VPC level, network ACLs and security groups provide layered network isolation and access control. Again, at the database level, Oracle Database@AWS enforces access controls to Database Vault, Virtual Private Database, and row-level security to prevent unauthorized access to sensitive data. And at a resource level, AWS IAM policies, groups, and roles manage user permissions with the fine-grained control. 05:27 Lois Samvit, what steps should users be taking to keep their databases secure? Samvit: Security is not a single feature but a layered approach covering user access, permissions, encryption, patching, and monitoring. The first step is controlling who can access your database and how they connect. At the user level, strong password policies ensure only authorized users can login. And at the network level, private subnets and network security group allow you to isolate database traffic and restrict access to trusted applications only. One of the most critical risks is accidental or unauthorized deletion of database resources. To mitigate this, grant delete permissions only to a minimal set of administrators. This reduces the risk of downtime caused by human error or malicious activity. Encryption ensures that even if the data is exposed, it cannot be read. By default, all databases in OCI are encrypted using transparent data encryption. For migrated databases, you must verify encryption is enabled and active. Best practice is to rotate the transparent data encryption master key every 90 days or less to maintain compliance and limit exposure in case of key compromise. Unpatched databases are one of the most common entry points for attackers. Always apply Oracle critical patch updates on schedule. This mitigates known vulnerabilities and ensures your environment remains protected against emerging threats. 07:33 Nikita: Beyond what users can do, are there any built-in features or tools from Oracle that really help with database security? Samvit: Beyond the basics, Oracle provides powerful database security tools. Features like data masking allow you to protect sensitive information in non-production environments. Auditing helps you monitor database activity and detect anomalies or unauthorized access. Oracle Data Safe is a managed service that takes database security to the next level. It can access your database configuration for weaknesses. It can also detect risky user accounts and privileges, identify and classify sensitive data. It can also implement controls such as masking to protect that data. And it can also continuously audit user activity to ensure compliance and accountability. Now, transparent data encryption enables you to encrypt sensitive data that you store in tables and tablespaces. It also enables you to encrypt database backups. After the data is encrypted, this data is transparently decrypted for authorized users or applications when they access that data. You can configure OCI Vault as a part of the transparent data encryption implementation. This enables you to centrally manage keystore in your enterprise. So OCI Vault gives centralized control over encryption keys, including key rotation and customer managed keys. 09:23 Lois: So obviously, lots of companies have to follow strict regulations. How does Oracle Database@AWS help customers with compliance? Samvit: Oracle Database@AWS has achieved a broad and rigorous set of compliance certifications. The service supports SOC 1, SOC 2, and SOC 3, as well as HIPAA for health care data protection. If we talk about SOC 1, that basically covers internal controls for financial statements and reporting. SOC 2 covers internal controls for security, confidentiality, processing integrity, privacy, and availability. SOC 3 covers SOC 2 results tailored for a general audience. And HIPAA is a federal law that protects patients' health information and ensures its confidentiality, integrity, and availability. It also holds certifications and attestations such as CSA STAR, C5. Now C5 is a German government standard that verifies cloud providers meet strict security and compliance requirements. CSA STAR attestation is an independent third-party audit of cloud security controls. CSA STAR certification also validates a cloud provider's security posture against CSA's cloud controls matrix. And HDS is a French certification that ensures cloud providers meet stringent requirements for hosting and protecting health care data. Oracle Database@AWS also holds ISO and IEC standards. You can also see PCI DSS, which is basically for payment card security and HITRUST, which is for high assurance health care framework. So, these certifications ensure that Oracle Database@AWS not only adheres to best practices in security and privacy, but also provides customers with assurance that their workloads align with globally recognized compliance regimes. 11:47 Nikita: Thank you, Samvit. Now Rashmi, can you walk us through Oracle's migration solution that helps teams move to OCI Database Services? Rashmi: Oracle Zero-Downtime Migration is a robust and flexible end-to-end database migration solution that can completely automate and streamline the migration of Oracle databases. With bare minimum inputs from you, it can orchestrate and execute the entire migration task, virtually needing no manual effort from you. And the best part is you can use this tool for free to migrate your source Oracle databases to OCI Oracle Database Services faster and reliably, eliminating the chances of human errors. You can migrate individual databases or migrate an entire fleet of databases in parallel. 12:34 Nikita: Ok. For someone planning a migration with ZDM, are there any key points they should keep in mind? Rashmi: When migrating using ZDM, your source databases may require minimal downtime up to 15 minutes or no downtime at all, depending upon the scenario. It is built with the principles of Oracle maximum availability architecture and leverages technologies like Oracle GoldenGate and Oracle Data Guard to achieve high availability and online migration workflow using Oracle migration methods like RMAN, Data Pump, and Database Links. Depending on the migration requirement, ZDM provides different migration method options. It can be logical or physical migration in an online or offline mode. Under the hood, it utilizes the different database migration technologies to perform the migration. 13:23 Lois: Can you give us an example of this? Rashmi: When you are migrating a mission critical production database, you can use the logical online migration method. And when you are migrating a development database, you can simply choose the physical offline migration method. As part of the migration job, you can perform database upgrades or convert your database to multitenant architecture. ZDM offers greater flexibility and automation in performing the database migration. You can customize workflow by adding pre or postrun scripts as part of the workflow. Run prechecks to check for possible failures that may arise during migration and fix them. Audit migration jobs activity and user actions. Control the execution like schedule a job pause, resume, if needed, suspend and resume the job, schedule the job or terminate a running job. You can even rerun a job from failure point and other such capabilities. 14:13 Lois: And what kind of migration scenarios does ZDM support? Rashmi: The minimum version of your source Oracle Database must be 11.2.0.4 and above. For lower versions, you will have to first upgrade to at least 11.2.0.4. You can migrate Oracle databases that may be of the Standard or Enterprise edition. ZDM supports migration of Oracle databases, which may be a single-instance, or RAC One Node, or RAC databases. It can migrate on Unix platforms like Linux, Oracle Solaris, and AIX. For Oracle databases on AIX and Oracle Solaris platform, ZDM uses logical migration method. But if the source platform is Linux, it can use both physical and logical migration method. You can use ZDM to migrate databases that may be on premises, or in third-party cloud, or even within Oracle Cloud Infrastructure. ZDM leverages Oracle technologies like RMAN datacom, Database Links, Data Guard, Oracle GoldenGate when choosing a specific migration workflow. 15:15 Are you ready to revolutionize the way you work? Discover a wide range of Oracle AI Database courses that help you master the latest AI-powered tools and boost your career prospects. Start learning today at mylearn.oracle.com. 15:35 Nikita: Welcome back! Rashmi, before someone starts using ZDM, is there any prep work they should do or things they need to set up first? Rashmi: Working with ZDM needs few simple configuration. Zero-downtime migration provides a command line interface to run your migration job. First, you have to download the ZDM binary, preferably download from my Oracle Support, where you can get the binary with the latest updates. Set up and configure the binary by following the instructions available at the same invoice node. The host in which ZDM is installed and configured is called the zero-downtime migration service host. The host has to be Oracle Linux version 7 or 8, or it can be RCL 8. Next is the orchestration step where connection to the source and target is configured and tested like SSH configuration with source and target, opening the ports in respective destinations, creation of dump destination, granting required database privileges. Prepare the response file with parameter values that define the workflow that ZDM should use during Oracle Database migration. You can also customize the migration workflow using the response file. You can plug in run scripts to be executed before or after a specific phase of the migration job. These customizations are called custom plugins with user actions. Your sources may be hosted on-premises or OCI-managed database services, or even third-party cloud. They may be Oracle Database Standard or Enterprise edition and on accelerator infrastructure or a standard compute. The target can be of the same type as the source. But additionally, ZDM supports migration to multicloud deployments on Oracle Database@Azure, Oracle Database@Google Cloud, and Oracle Database@AWS. You begin with a migration strategy where you list the different databases that can be migrated, classification of the databases, grouping them, performing three migration checks like dependencies, downtime requirement versions, and preparing the order migration, the target migration environment, et cetera. 17:27 Lois: What migration methods and technologies does ZDM rely on to complete the move? Rashmi: There are primarily two types of migration: physical or logical. Physical migration pertains to copy of the database OS blocks to the target database, whereas in logical migration, it involves copying of the logical elements of the database like metadata and data. Each of these migration methods can be executed when the database is online or offline. In online mode, migration is performed simultaneously while the changes are in progress in the source database. While in offline mode, all changes to the source database is frozen. For physical offline migration, it uses backup and restore technique, while with the physical online, it creates a physical standby using backup and restore, and then performing a switchover once the standby is in sync with the source database. For logical offline migration, it exports and imports database metadata and data into the target database, while in logical online migration, it is a combination of export and import operation, followed by apply of incremental updates from the source to the target database. The physical or logical offline migration method is used when the source database of the application can allow some downtime for the migration. The physical or logical online migration approach is ideal for scenarios where any downtime for the source database can badly affect critical applications. The only downtime that can be tolerated by the application is only during the application connection switchover to the migrated database. One other advantage is ZDM can migrate one or a fleet of Oracle databases by executing multiple jobs in parallel, where each job workflow can be customized to a specific database need. It can perform physical or logical migration of your Oracle databases. And whether it should be performed online or offline depends on the downtime that can be approved by business. 19:13 Nikita: Samvit and Rashmi, thanks for joining us today. Lois: Yeah, it's been great to have you both. If you want to dive deeper into the topics we covered today, go to mylearn.oracle.com and search for the Oracle Database@AWS Architect Professional course. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 19:35 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
The panel starts out by discussing a major deal for Apple TV and what it could mean for their content ambitions. Chuck Joiner, David Ginsburg, Jeff Gamet, Jim Rea, Web Bixby, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, Mark Fuccio, and Norbert Frassa debate encryption initiatives, comparing Signal and Messages security, including open source, metadata, and device safety considerations. The session wraps with commentary on the apparent abandonment of about 8K TVs due to cost, lack of content, and limited real-world viewing benefits. This edition of MacVoices is brought to you by the MacVoices Dispatch, our weekly newsletter that keeps you up-to-date on any and all MacVoices-related information. Subscribe today and don't miss a thing. Show Notes: Chapters: 00:00 Introduction and show context 12:00 Discussion of Hollywood trends and feel-good films 24:00 Messaging security debate: Signal vs. iMessage 36:00 Rise of decentralized social platforms 48:00 Weekly tech coverage across related shows 54:00 Wrap-up and social media presence Links: Apple TV may have found its Game of Thrones https://www.applemust.com/apple-tv-may-have-found-its-game-of-thrones/ Electronic Frontier Foundation wants tech companies like Apple to ‘Encrypt It Already' https://appleworld.today/2026/01/electronic-frontier-foundation-wants-tech-companies-like-apple-to-encrypt-it-already Everybody Has Something To Hide by Guy Kawasaki https://amzn.to/4atZG7i The TV industry finally concedes that the future may not be in 8K https://arstechnica.com/gadgets/2026/01/lg-joins-the-rest-of-the-world-accepts-that-people-dont-want-8k-tvs/ Comcast keeps losing customers despite price guarantee and unlimited data https://arstechnica.com/tech-policy/2026/01/comcast-keeps-losing-customers-despite-price-guarantee-and-unlimited-data/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Norbert Frassa is a technology “man about town”. Follow him on Twitter and see what he's up to. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
The panel starts out by discussing a major deal for Apple TV and what it could mean for their content ambitions. Chuck Joiner, David Ginsburg, Jeff Gamet, Jim Rea, Web Bixby, Brian Flanigan-Arthurs, Eric Bolden, Marty Jencius, Mark Fuccio, and Norbert Frassa debate encryption initiatives, comparing Signal and Messages security, including open source, metadata, and device safety considerations. The session wraps with commentary on the apparent abandonment of about 8K TVs due to cost, lack of content, and limited real-world viewing benefits. This edition of MacVoices is brought to you by the MacVoices Dispatch, our weekly newsletter that keeps you up-to-date on any and all MacVoices-related information. Subscribe today and don't miss a thing. Show Notes: Chapters: 00:00 Introduction and show context 12:00 Discussion of Hollywood trends and feel-good films 24:00 Messaging security debate: Signal vs. iMessage 36:00 Rise of decentralized social platforms 48:00 Weekly tech coverage across related shows 54:00 Wrap-up and social media presence Links: Apple TV may have found its Game of Thrones https://www.applemust.com/apple-tv-may-have-found-its-game-of-thrones/ Electronic Frontier Foundation wants tech companies like Apple to 'Encrypt It Already' https://appleworld.today/2026/01/electronic-frontier-foundation-wants-tech-companies-like-apple-to-encrypt-it-already Everybody Has Something To Hide by Guy Kawasaki https://amzn.to/4atZG7i The TV industry finally concedes that the future may not be in 8K https://arstechnica.com/gadgets/2026/01/lg-joins-the-rest-of-the-world-accepts-that-people-dont-want-8k-tvs/ Comcast keeps losing customers despite price guarantee and unlimited data https://arstechnica.com/tech-policy/2026/01/comcast-keeps-losing-customers-despite-price-guarantee-and-unlimited-data/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Norbert Frassa is a technology "man about town". Follow him on Twitter and see what he's up to. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter, LinkedIn, or on Mastodon. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession 'firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Jim and Allan disagree on how new hard drive tech is likely to work, more on storage and compute in the same box, and how we set up disk encryption on laptops. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes OpenZFS Monitoring and Observability News/discussion Western Digital doubles the performance of hard drives with dual-actuator High-Bandwidth, with path to 8X performance increase — Power-Optimized HDDs will reduce power by 20 percent Free consulting We were asked about how we set up disk encryption on laptops. A quick-start guide to OpenZFS native encryption – Ars Technica Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation See our contact page for ways to get in touch.
Jim and Allan disagree on how new hard drive tech is likely to work, more on storage and compute in the same box, and how we set up disk encryption on laptops. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes OpenZFS Monitoring and Observability News/discussion Western Digital doubles the performance of hard drives with dual-actuator High-Bandwidth, with path to 8X performance increase — Power-Optimized HDDs will reduce power by 20 percent Free consulting We were asked about how we set up disk encryption on laptops. A quick-start guide to OpenZFS native encryption – Ars Technica Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation See our contact page for ways to get in touch.
Atombeam CEO Charles Yeomans joins Chris Lustrino to break down a deceptively simple idea with massive implications: make data smaller while it's streaming so you can move and process more of it—without upgrading networks.Charles explains Atombeam's commercial product NeurPack, how it can often quadruple effective bandwidth, and why this matters across IoT, smart meters, satellites, defense, oil & gas wells, fintech, and eventually data centers and GPU utilization. They also dig into the realities of commercialization—choosing near-term deals that close fast while still pursuing multi-year “industry standard” opportunities—and why execution (not invention) is the real differentiator.00:00 What Atombeam does (pizza analogy)03:13 NeurPack explained05:35 Why 95% of IoT data doesn't move09:38 “Like launching 3 more satellites”13:57 Commercialization + customers16:31 Data centers + GPU utilization24:29 Defense traction + partnerships26:44 What success looks like (distribution)
At the dawn of 2026, the post quantum (PQ) era has effectively arrived with “harvest now, decrypt later” style attacks and the availability of NIST post quantum cryptography (PQC) standards. So, how prepared are organizations really, and what does the future of encryption look like? In this episode, our Entrust PQ experts Michael Klieman and Samantha Mabey answer these questions and more by sharing key insights and trends from the Entrust 2026 Global State of Post-Quantum and Cryptographic Security Trends.
None of Your Goddamn BusinessJohn Morgan Salomon said something during our conversation that I haven't stopped thinking about. We were discussing encryption, privacy laws, the usual terrain — and he cut through all of it with five words: "It's none of your goddamn business."Not elegant. Not diplomatic. But exactly right.John has spent 30 years in information security. He's Swiss, lives in Spain, advises governments and startups, and uses his real name on social media despite spending his career thinking about privacy. When someone like that tells you he's worried, you should probably pay attention.The immediate concern is something called "Chat Control" — a proposed EU law that would mandate access to encrypted communications on your phone. It's failed twice. It's now in its third iteration. The Danish Information Commissioner is pushing it. Germany and Poland are resisting. The European Parliament is next.The justification is familiar: child abuse materials, terrorism, drug trafficking. These are the straw man arguments that appear every time someone wants to break encryption. And John walked me through the pattern: tragedy strikes, laws pass in the emotional fervor, and those laws never go away. The Patriot Act. RIPA in the UK. The Clipper Chip the FBI tried to push in the 1990s. Same playbook, different decade.Here's the rhetorical trap: "Do you support terrorism? Do you support child abuse?" There's only one acceptable answer. And once you give it, you've already conceded the frame. You're now arguing about implementation rather than principle.But the principle matters. John calls it the panopticon — the Victorian-era prison design where all cells face inward toward a central guard tower. No walls. Total visibility. The transparent citizen. If you can see what everyone is doing, you can spot evil early. That's the theory.The reality is different. Once you build the infrastructure to monitor everyone, the question becomes: who decides what "evil" looks like? Child pornographers, sure. Terrorists, obviously. But what about LGBTQ individuals in countries where their existence is criminalized? John told me about visiting Chile in 2006, where his gay neighbor could only hold his partner's hand inside a hidden bar. That was a democracy. It was also a place where being yourself was punishable by prison.The targets expand. They always do. Catholics in 1960s America. Migrants today. Anyone who thinks differently from whoever holds power at any given moment. These laws don't just catch criminals — they set precedents. And precedents outlive the people who set them.John made another point that landed hard: the privacy we've already lost probably isn't coming back. Supermarket loyalty cards. Surveillance cameras. Social media profiles. Cookie consent dialogs we click through without reading. That version of privacy is dead. But there's another kind — the kind that prevents all that ambient data from being weaponized against you as an individual. The kind that stops your encrypted messages from becoming evidence of thought crimes. That privacy still exists. For now.Technology won't save us. John was clear about that. Neither will it destroy us. Technology is just an element in a much larger equation that includes human nature, greed, apathy, and the willingness of citizens to actually engage. He sent emails to 40 Spanish members of European Parliament about Chat Control. One responded.That's the real problem. Not the law. Not the technology. The apathy.Republic comes from "res publica" — the thing of the people. Benjamin Franklin supposedly said it best: "A republic, if you can keep it." Keeping it requires attention. Requires understanding what's at stake. Requires saying, when necessary: this is none of your goddamn business.Stay curious. Stay Human. Subscribe to the podcast. And if you have thoughts, drop them in the comments — I actually read them.Marco CiappelliSubscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/John Salomon Experienced, international information security leader. vCISO, board & startup advisor, strategist.https://www.linkedin.com/in/johnsalomon/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
حلقة جديدة قوية من البودكاسترز مع مهند الكلش المدير التنفيذي لدى Zoom في الشرق الأوسط وتركيا وإفريقيا وباكستان
In this episode of Security Squawk, Bryan Hornung, Reginald Ande, & Randy Bryan break down three stories that should change how executives think about cyber risk. This is not about tools, alerts, or vendor promises. It is about operational dependency, leadership accountability, and financial exposure when systems fail. Story one focuses on active exploitation of SolarWinds Web Help Desk vulnerabilities being used as an entry point for ransomware staging. Researchers are seeing attackers move fast after initial access, blending in by using legitimate remote management and incident response tools. That is the point. When attackers use normal looking admin utilities, many organizations do not detect the intrusion until the business impact is already locked in. If you run Web Help Desk or you have not verified your patch posture, this is a governance issue, not an IT debate. Patch timelines and exposure management are leadership decisions because they directly affect business interruption risk. Story two is a warning about the ransomware market adapting. As more organizations refuse to pay for data theft only extortion, threat actors are expected to pivot back toward encryption. Encryption creates urgency because it disrupts operations. The financial exposure shifts toward downtime, recovery labor, lost revenue, and customer churn. Executives should treat restore capability like a business continuity requirement. If your recovery plan has not been tested under pressure, it is not a plan. Story three covers the BridgePay ransomware incident and the downstream impact on merchants and local government services. Even when payment card data is not confirmed compromised, availability failures still create real harm. Customers do not care which vendor was hit. They only see that your business cannot process transactions. This is a clear reminder to revisit vendor criticality, SLAs, outage communications, and contingency processing options. Security Squawk is built for business owners, executives, board members, and IT leaders who want the real world impact without the fear marketing. Subscribe, share, and support the show at https://buymeacoffee.com/securitysquawk
This show has been flagged as Clean by the host. Create a Linux kiosk at your library Start without a guest account The first few steps of this process don't actually require a guest user directory to exist, so do NOT create your guest user account yet. However, you do need to choose what your guest user account is going to be called. A reasonable account name for Don's purposes is libraryguest. On my personal computer I call my guest account guestaccount, and I've used kioskguest on some installations. I avoid just the name “guest” because in modern computing the term “guest” gets used in a few other ways (such as a “guest operating system” in a virtual environment), and it's just easier to find something unique in logs. Choose a unique name for you guest account, but don't create it yet. For this article, I'm using libraryguest. Create the PostSession script By default, GDM recognises several states: Init, PostLogin, PreSession, and PostSession. Each state has a directory located in /etc/gdm. When you place a shell script called Default in one of those directories, GDM runs the script when it reaches that state. To trigger actions to clean up a user's environment upon logout, create the file /etc/gdm/PostSession/Default. You can add whatever actions you want to run upon logout to the Default script. In the case of Don's library, we wanted to clear everything from the guest's home directory, including browser history, any LibreOffice files or GIMP files they may have created, and so on. It was important that we limited the very drastic action of removing all user data to just the guest user. We didn't want the admin's data to be erased upon logout, so whatever rule we added to /etc/gdm/PostSession/Default had to be limited to the guest user. Here's what we came up with: #!/usr/bin/sh echo "$USER logged out at `date`" >> /tmp/PostSession.log if [ "X$USER" = "Xlibraryguest" ]; then rm -rf "$HOME" fi exit 0 The first line is for logging purposes. The /tmp directory gets cleared out on most distributions automatically, so we weren't worried about creating a file that'll grow forever and eventually crash the computer. If your distribution of choice doesn't clean out /tmp automatically, create a cron job to do that for you. GDM knows what user triggered the logout process, so the if statement verifies that the user logging out is definitely the libraryguest user (that's the literal name of the user we created for library patrons).Note that the whitespace around the square brackets is important, so be precise when typing! As long as it is libraryguest, then the script removes the entire user directory ($HOME). That can be extremely dangerous if you make a mistake, so do thorough testing on a dummy system before implementing a script like this! If you get a condition wrong, you could erase your entire home directory upon logout. In this example, I've successfully limited the rm command to a logout action performed by user libraryguest. The entire /home/libraryguest directory is erased, and the computer returns to the GDM login screen. When a new user logs in, a fresh directory is created for the user. You can put any number of commands in your script, of course. You don't have to erase an entire directory. If all you really want to do is clear browser history and any stray data, then you can do that instead. If you need to copy specific configuration files into the environment, you can do that during the PreSession state. Just be sure to test thoroughly before committing your creation to your users! What happens when the guest doesn't log out At this point, the computer erases all of the user's data when the user logs out, but a reboot or a shutdown is different to a logout. GDM doesn't enter a PostSession state after a reboot signal has been received, even if the reboot occurs during an active GDM session. The easiest and safest way to erase an entire home directory when there's a cut to system power is to use a temporary RAM filesystem (tmpfs) to house the data in the first place. If the systems you're configuring have 8 GB or more, and the system is exclusively used as a guest computer, you can probably afford to use RAM as the guest's home directory. If your system doesn't have a lot of RAM, then you can use the systemd work-around in the next section. Assuming you have the RAM to spare, and that your systems are supported by a backup power supply, you can add a tmpfs entry in /etc/fstab. In this example, my tmpfs is mounted to /home/libraryguest and is just 2 GB: tmpfs /home/libraryguest tmpfs rw,nosuid,nodev,size=2G 0 0 That's plenty of space for some Internet browsing and even a few LibreOffice documents to be saved while a user works. Mount the new volume: $ sudo mount /home/libraryguest Next, you must create the libraryguest user manually in a terminal.The useradd command creates user profiles: $ sudo useradd --home-dir /home/libraryguest libraryguest useradd: warning: the home directory /home/libraryguest/ already exists. useradd: Not copying any file from skel directory into it. Because you've already created a location for the home directory, you do get a warning after creating the user. It's only a warning, not a fatal error, and the guest account is automatically populated later. Create a password for the new user: $ sudo passwd libraryguest That's it! You've created a guest account that refreshes with every logout and every reboot. You can skip over the next section of this article. Using systemd targets instead of a ramdisk Assuming you can't create a ramdisk for temporary user data, you can instead create a systemd service that runs a script when the reboot, poweroff, and multi-user targets are triggered: [Unit] Description=Kiosk cleanup [Service] Type=oneshot ExecStart=/usr/local/bin/kiosk-cleanup.sh [Install] WantedBy=poweroff.target reboot.target multi-user.target Save the file to /etc/systemd/system/kioskmode.service and then enable it: $ sudo systemctl enable --now kioskmode The script, like the GDM script, removes the libraryguest directory. Unlike GDM script, this one must also recreate an empty home directory and grant it user permissions: #!/usr/bin/bash rm -rf /home/libraryguest mkdir /home/libraryguest chown -R libraryguest:libraryguest /home/libraryguest Grant the script itself permission to run: $ sudo chmod +x /usr/local/bin/kiosk-cleanup.sh Now the libraryguest user data is erased after: Logout Reboot Shutdown Startup Essentially, no matter how the computer loses its session or its power, the libraryguest account starts fresh when a new session is started. Security and privacy Using systemd to erase data at shutdown and startup isn't strictly as secure as using a temporary ramdisk for all user data. Should the computer lose power suddenly, all saved user data in the libraryguest account is present during the next boot. Of course, it's erased as soon as multi-user.target is called by systemd, but it is technically possible to interrupt the boot process and mine for data. You must use full drive encryption to protect data from being discovered by an interrupted boot sequence. Why not just use xguest On many Linux distributions, the xguest package is designed to provide the Guest account, which resets after each logout. It was an extremely useful package that I installed on every machine I owned, because it's handy to be able to let friends use my computer without risking them making a mess of my home directory. Lately, it seems that xguest is failing to launch a desktop, however, presumably because it relies on X11. If xguest works for you in your tests, then you may want to use it instead of the solution I've presented here. My solution offers a lot of flexibility, thanks to GDM's autodetection of session states. Kiosks in libraries Privacy and personal information is more important than ever. Regardless of how you setup a kiosk for your library, you have an obligation to your users to keep them informed of how their data is being stored. This goes both ways. Users need to know that their data is destined to be erased as soon as they log out, and also they deserve to be assured that their data is not retained. However, it's also your responsibility to admit that glitches and exceptions could occur. Users need to understand that the computer they're using are public computers on a public network. Encryption is being used for traffic and for data storage, but you cannot guarantee absolute privacy. As long as everyone understands the arrangement, everyone can compute with confidence. Linux, GDM, and systemd are great tools to help libraries create a sustainable, robust, honest, and communal computing platform. Show notes taken from https://www.both.org/?p=13327
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you'll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don't reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn't change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption
This conversation reframes faith as correspondence, not striving. The issue isn't effort, information, or intensity—it's response. From the beginning, humanity was created in image and likeness, meaning the blueprint was already complete before the action began. Confusion doesn't come from God withholding direction, but from us responding out of fear, lack, or anticipation instead of alignment. Jesus models this perfectly: He doesn't chase instruction, ask excessive questions, or live in delay. He moves as the instruction itself.The discussion uses modern metaphors—encryption, direct connection, ethernet versus Wi-Fi—to explain spiritual efficiency. Prayer, especially “Our Father,” is presented as an encrypted alignment that protects identity and blocks interference. Faith is not future-based hope but present-tense movement. Jesus never lives ahead of Himself or behind Himself—He operates in now. The call of the episode is simple but confrontational: stop relaying life through anxiety and start living as God's intention already in motion.Timestamps00:00 – Opening flow & setting the conversation02:15 – Image, likeness, and correspondence05:10 – Striving vs responding08:40 – Faith as alignment, not effort12:05 – Jesus as the instruction15:30 – Overthinking, over-praying, and delay18:45 – Prayer as encrypted alignment22:20 – “Our Father” and identity protection26:10 – Faith only exists in the now30:00 – Ethernet vs Wi-Fi (direct connection metaphor)34:40 – Removing interference and clutter38:15 – Living as intention, not anticipation42:00 – Closing reflections on union and movement Get full access to REDTRI3 at redin30.substack.com/subscribe
RNZ replay 30 January 2026 In conversation with RNZ "Nine to Noon" host Kathryn Ryan, we look at the recent massive layoffs at Amazon, France's social media laws for under 15s, Microsoft giving the keys to your data kingdom to the FBI, and what happens when an organisation tasked with maintaining the safety of the airways turns to a computer to 'flood the zone' with regulation? Thanks to RNZ - Nine To Noon The Next Billion Seconds with Mark Pesce is produced by Ampel and Myrtle and Pine Listen on Spotify, Apple Sign up for 'The Practical Futurist' newsletter here. https://nextbillionseconds.com See omnystudio.com/listener for privacy information.
In 2026, digital privacy and security reflect a global power struggle among governments, corporations, and infrastructure providers. Encryption, once seen as absolute, is now conditional as regulators and companies find ways around it. Reports that Meta can bypass WhatsApp's end-to-end encryption and Ireland's new lawful interception rules illustrate a growing tolerance for backdoors, risking weaker international standards. Meanwhile, data collection grows deeper: TikTok reportedly tracks GPS, AI-interaction metadata, and cross‑platform behavior, leaving frameworks like OWASP as the final defense against mass exploitation.Cyber risk is shifting from isolated vulnerabilities to structural flaws. The OWASP Top 10 for 2025–26 shows that old problems—access control failures, misconfigurations, weak cryptography, and insecure design—remain endemic. Supply-chain insecurity, epitomized by the “PackageGate” (Shai‑Hulud) flaw in JavaScript ecosystems, demonstrates that inconsistent patching and poor governance expose developers system‑wide. Physical systems are no safer: at Pwn2Own Automotive 2026, researchers proved that electric vehicle chargers and infotainment systems can be hacked en masse, making charging a car risky in the same way as connecting to public Wi‑Fi. The lack of hardware‑rooted trust and sandboxing standards leaves even critical infrastructure vulnerable.Corporate and national sovereignty concerns are converging around what some call “digital liberation.” The alleged 1.4‑terabyte Nike breach by the “World Leaks” ransomware group shows how centralization magnifies damage—large, unified data stores become single points of catastrophic failure. In response, the EU's proposed Cloud and AI Development Act aims to build technological independence by funding open, auditable, and locally governed systems. Procurement rules are turning into tools of geopolitical self‑protection. For individuals, reliance on cloud continuity carries personal risks: in one case, a University of Cologne professor lost years of AI‑assisted research after a privacy setting change deleted key files, revealing that even privacy mechanisms can erase digital memory without backup.At the technological frontier, risk extends beyond IT. Ethics, aerospace engineering, and sustainability intersect in new fault lines. Anthropic's “constitutional AI” reframes alignment as a psychological concept, incorporating principles of self‑understanding and empathy—but critics warn this blurs science and philosophy. NASA's decision to modify, rather than redesign, the Orion capsule's heat shield for Artemis II—despite earlier erosion on Artemis I—has raised fears of “normalization of deviance,” where deadlines outweigh risk discipline. Beyond Earth, environmental data show nearly half of the world's largest cities already face severe water stress, exposing the intertwined fragility of digital, physical, and ecological systems.Across these issues, a shared theme emerges: sustainable security now depends not just on technical patches but on redefining how society manages data permanence, institutional transparency, and the planetary limits of infrastructure. The boundary between online safety, physical resilience, and environmental stability is dissolving—revealing that long‑term survival may rest less on innovation itself and more on rebuilding trust across the systems that sustain it.
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
If you're using Bitlocker, you're not nearly as secure as you think!
Step into the fascinating world of cryptography. Host Amy Ciminnisi sits down with Yuri Kramarz from Cisco Talos Incident Response and Tim Wadhwa-Brown from Cisco Customer Experience to learn what encryption really accomplishes, where it leaves gaps, and when defenders need to take proactive measures.Whether you're picturing classic codebreakers or the latest quantum-proof ciphers, this episode unpacks the essentials: what encryption and hashing actually mean, why key management is a make-or-break factor, and how even the best algorithms can fall short if the basics aren't handled right.G7's "Coordinating the Transition to Post-Quantum Cryptography in the Financial Sector" roadmap: https://home.treasury.gov/news/press-releases/sb0355
Technology correspondent Mark Pesce joins Kathryn on the French parliament's backing of a social media ban for under 15s, following Australia's move - does that mean more countries will follow?
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security
Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok's creation of sexually explicit images. Glimmers of access pierce Iran's internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland's energy sector to Russia's Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it's time to pay for space safety.” Selected Reading FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread) European Commission opens new investigation into X's Grok (The Register) Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times) Hackers can bypass npm's Shai-Hulud defenses via Git dependencies (Bleeping Computer) Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer) CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer) CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer) ESET Research: Sandworm behind cyberattack on Poland's power grid in late 2025 (ESET) Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing) CISA won't attend infosec industry's biggest conference (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
As a Canadian therapist in private practice, you are probably often needing to send and receive sensitive, private information. How often have you worried about these documents' security and safety? What should you do to secure email communications and keep unnecessary stress at bay? This is where Hushmail comes to the rescue. For less than $20 CAD per month, you can completely insure, assure, and secure your entire email inbox, including your forms and signatures. They pride themselves on security and simplicity, leaving you with a solution that you can start using right out of the box from the minute to sign up. In this episode, I chat with Anabeli about everything to do with Hushmail. We answer your questions and provide clear solutions to help you start 2026 with both digital email security and peace of mind. MEET ANABELI Anabeli Jackson is the Marketing Manager at Hushmail, where she leads content strategy and helps therapists understand secure communication with clarity and confidence. She focuses on removing the overwhelm from topics like encryption, compliance, and secure communication so clinicians can protect client trust and stay compliant with confidence. Anabeli has been with Hushmail since 2014 and brings a strong foundation in communication and marketing. Her work supports mental health providers across Canada and the U.S. who depend on Hushmail to communicate securely with their clients. Learn more about Anabeli on her LinkedIn profile. In this episode: What is Hushmail? Why Canadian therapists should use Hushmail What encryption is and why you need to use it How you can get started with Hushmail What is Hushmail? 'Hushmail is a secure email platform … built specifically for healthcare and therapy practices. It lets you send and receive secure, encrypted emails, and it helps you build secure forms where you can collect information securely with legally binding signatures - and it's all in one place.' - Anabeli Jackson The two cornerstones of Hushmail are focused on client and clinician security when sending sensitive emails and documents online, and simplicity since you don't need to do any tech implementation yourself! These essential emails and documents are securely sent and kept private and secure by using encryption to protect them. Why Canadian therapists should use Hushmail You may be asking: Why should I pay to use Hushmail instead of the available, free services? The answer is this: Canadian therapists handle highly sensitive information from multiple clients. Using a free email provider simply does not provide enough security and protection, while Hushmail guarantees it. 'We make it really practical to have [your client's private information] safeguarded, because encryption is the one step … that you can put in place to have your information secure … So [Hushmail] supports federal law, but also with provincial privacy laws.' - Anabeli Jackson Hushmail provides the security that you and your clients need to send private information without concern in an easy, simple way. Plus, it is a Canadian company that is PIPEDA and HIPAA compliant! What encryption is and why you need to use it Encryption is essentially a method of scrambling the information contained in emails and documents so that it cannot be understood by any third party, other than the intended recipient. With Hushmail, you have a key that both scrambles and unscrambles the message which only you and your client has access to. '[Encryption] is relevant because nowadays the online risk and cyber security … there's a lot of bad actors out there, and you don't want this information out there. You don't want this information to be seen by people who are not the intended recipients. So, encryption is a very easy way to protect that information.' - Anabeli Jackson How you can get started with Hushmail Take the step now to secure your communications with clients, and save both them and yourself the stress and anxiety of worrying whether the information is safe. And with Hushmail, that peace of mind will not break the bank. For purely email purposes, you can get Hushmail for $16.99 CAD. If you want to include the forms and signatures, it is $24.99 CAD. If you are listening to this episode and want to try Hushmail out, click this link to sign up with Hushmail and get your first month entirely free of charge! Connect with me: Instagram Website Resources mentioned and useful links: Regan Swerhun: Expanding Private Care to Northern Communities | EP 185 Learn more about the tools and deals that I love and use for my Canadian private practice Sign up for my free e-course on How to Start an Online Canadian Private Practice Jane App (use code FEARLESS2MO for two months free) Get started with Hushmail here and get one month for free! Learn more about Anabeli on her LinkedIn profile Rate, review, and subscribe to this podcast on Apple Podcasts, Spotify, Amazon, and TuneIn
Talking about the new Brickstorm security risk where you don't even know you have been compromised. They are stealing your critical industry information to then compete against you. The layers of security, our application products like vDefend and Avi application security and all other topics from learning to getting started.
This conversation explores the profound transformation in the criminal justice system driven by technological advancements, particularly in the realm of cybercrime, data analysis, and artificial intelligence. It delves into the challenges of jurisdiction, the complexities of cross-border evidence collection, and the implications of encryption on privacy and security. The discussion also highlights systemic biases revealed through data, the fairness paradox in algorithmic risk assessments, and the need for legislative reforms to adapt to these changes. Ultimately, it emphasizes the importance of AI literacy within the justice system to ensure that core principles of due process are upheld in a digital world.In today's rapidly evolving legal landscape, the traditional foundations of criminal justice are being reshaped by three transformative forces. As we delve into these changes, we uncover the profound impact of cybercrime, data-driven insights into systemic bias, and the philosophical shift towards restorative justice.Cybercrime and Jurisdiction: The borderless nature of cybercrime challenges traditional notions of jurisdiction. With crimes often spanning multiple countries, the Budapest Convention on Cybercrime emerges as a critical framework for international cooperation. However, the absence of universal enforcement mechanisms highlights the need for continued legal innovation.Data-Driven Insights into Systemic Bias: Data analysis reveals deep-rooted biases in the justice system, particularly affecting marginalized communities. Tools like COMPASS, intended to introduce objectivity, have inadvertently amplified existing biases. This underscores the importance of transparency and fairness in algorithmic decision-making.Restorative Justice and Legislative Reform: The shift towards restorative justice emphasizes healing and accountability over punishment. By involving victims, offenders, and communities in the justice process, this approach aims to repair harm and reduce recidivism. Legislative reforms, such as the elimination of mandatory minimums and bail reform, further support this transformative vision.Conclusion: As we navigate these changes, the legal profession must adapt to ensure justice remains fair and equitable. By embracing technological advancements and addressing systemic biases, we can uphold the rule of law and protect the rights of all individuals.Subscribe Now: Stay informed about the latest developments in criminal justice by subscribing to our newsletter.TakeawaysThe traditional era of criminal justice is fundamentally over.Cybercrime challenges the concept of jurisdiction.International cooperation is essential for addressing cybercrime.Cross-border evidence collection is a significant bottleneck.Encryption poses a dilemma between privacy and security.Authentication of digital evidence is crucial but not sufficient for admissibility.Deepfakes threaten the integrity of multimedia evidence.Data analysis reveals systemic biases in sentencing.Algorithmic risk assessments can perpetuate existing biases.Legislative reforms are necessary to adapt to technological advancements.criminal justice, cybercrime, jurisdiction, international law, encryption, digital evidence, systemic bias, AI, legislative reform, due process
Dr. Rand Hindi is an entrepreneur and deeptech investor. He is the Founder and CEO at Zama and an investor in over 50 companies across privacy, AI, blockchain, and medtech. Rand started coding at the age of 10, founded a Social Network at 14, and started a PhD at 21. He then created Snips, a privacy-centric AI startup that was acquired by Sonos. Rand holds a BSc in Computer Science and a PhD in bioinformatics from UCL. In this conversation, we discuss:- Banks won't use stablecoins if they are public - zcash is the beacon of crypto privacy - Privacy is the final boss of blockchain - The future of surveillance and privacy - Fully Homomorphic Encryption (FHE) - Zama = confidentiality layer - TVS = Total Value Shielded - Zama is like HTTPS for blockchain - Confidentiality without sacrificing transparency - First-ever on-chain sealed-bid Dutch auction Zama X: @zamaWebsite: www.zama.orgTelegram: t.me/zama_on_telegramDr. Rand HindiX: @randhindiLinkedIn: Rand Hindi---------------------------------------------------------------------------------This episode is brought to you by PrimeXBT.PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50FollowApple PodcastsSpotifyAmazon MusicRSS FeedSee All
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
We pull on a few loose threads from recent episodes, and some of them unravel into way more than we expected.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED.Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks: