Podcasts about Encryption

Process of converting plaintext to ciphertext

  • 1,317PODCASTS
  • 3,673EPISODES
  • 48mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 5, 2025LATEST
Encryption

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Encryption

Show all podcasts related to encryption

Latest podcast episodes about Encryption

Hacker News Recap
October 4th, 2025 | The UK is still trying to backdoor encryption for Apple users

Hacker News Recap

Play Episode Listen Later Oct 5, 2025 14:29


This is a recap of the top 10 posts on Hacker News on October 04, 2025. This podcast was generated by wondercraft.ai (00:30): The UK is still trying to backdoor encryption for Apple usersOriginal post: https://news.ycombinator.com/item?id=45476273&utm_source=wondercraft_ai(01:52): Flock's gunshot detection microphones will start listening for human voicesOriginal post: https://news.ycombinator.com/item?id=45473698&utm_source=wondercraft_ai(03:14): How I influence tech company politics as a staff software engineerOriginal post: https://news.ycombinator.com/item?id=45473852&utm_source=wondercraft_ai(04:37): Alibaba cloud FPGA: the $200 Kintex UltraScale+Original post: https://news.ycombinator.com/item?id=45471136&utm_source=wondercraft_ai(05:59): Paged Out Issue #7 [pdf]Original post: https://news.ycombinator.com/item?id=45472319&utm_source=wondercraft_ai(07:21): ProofOfThought: LLM-based reasoning using Z3 theorem provingOriginal post: https://news.ycombinator.com/item?id=45475529&utm_source=wondercraft_ai(08:44): Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?Original post: https://news.ycombinator.com/item?id=45473033&utm_source=wondercraft_ai(10:06): A comparison of Ada and Rust, using solutions to the Advent of CodeOriginal post: https://news.ycombinator.com/item?id=45473861&utm_source=wondercraft_ai(11:29): Self-hosting email like it's 1984Original post: https://news.ycombinator.com/item?id=45473730&utm_source=wondercraft_ai(12:51): New antibiotic targets IBD and AI predicted how it would workOriginal post: https://news.ycombinator.com/item?id=45469579&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

Mac OS Ken
iPhone Sales and iCloud Encryption - MOSK: 10.02.2025

Mac OS Ken

Play Episode Listen Later Oct 2, 2025 17:48


- J.P. Morgan: iPhone 17 Strength Driven by Upgrades - UK Tries for Access to Encrypted iCloud Data of UK Citizens - Court Dismisses Apple/Amazon Price Fixing Case - Apple Moves to Dismiss xAI's Collusion Suit - Apple, Google, and Meta Have to Answer for Gambling Apps - iFixit: AirPods Pro 3 Are Not Repairable - Apple Buys Ireland's IC Mask Design - Three New Titles Hit Apple Arcade - Apple TV+ Outs Trailer for Documentary “Mr. Scorsese” Ahead of 17 October Premier - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra today at store.insta360.com/product/go-ultra?utm_term=macosken with code macosken - Active ransomware attacks and improving recovery trends on Checklist No. 442 - Find it today at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

2.5 Admins
2.5 Admins 267: Hoarding Cache

2.5 Admins

Play Episode Listen Later Oct 2, 2025 26:11


The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation   […]

FLYTECH Podcast
Apple vs Musk ⚖️ | EV Lease Hacks

FLYTECH Podcast

Play Episode Listen Later Oct 2, 2025 6:31


Today on FLYTECH Daily, Nick & Michelle break down the top 5 tech stories you need to know — in under 10 minutes:   Apple vs. Musk: Apple fires back at Elon Musk's lawsuit over its OpenAI deal, calling the claims “speculation on top of speculation” (Bloomberg). EV Lease Hacks: Ford & GM find a clever workaround to keep the $7,500 EV tax credit alive through leasing programs (Reuters). Porsche's OLED Flow Display: Porsche teases its Cayenne Electric with a futuristic curved OLED dashboard and new AI-powered voice assistant (Electrek, Autogefuehl). OpenAI Sora 2: Deepfake or reality? OpenAI unveils its most powerful video + audio generator yet, making hyperrealistic content mainstream (OpenAI briefing, The Verge). UK vs. Apple Encryption: The UK renews its demand for a backdoor into iCloud, reigniting the global encryption battle (Financial Times).     Takeaway: Tech isn't slowing down — from EV loopholes to AI deepfakes, the future is unfolding faster than ever.  

Late Night Linux All Episodes
2.5 Admins 267: Hoarding Cache

Late Night Linux All Episodes

Play Episode Listen Later Oct 2, 2025 26:11


The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation  ... Read More

Lex Fridman Podcast
#482 – Pavel Durov: Telegram, Freedom, Censorship, Money, Power & Human Nature

Lex Fridman Podcast

Play Episode Listen Later Oct 1, 2025 282:37


Pavel Durov is the founder and CEO of Telegram. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep482-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/pavel-durov-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Pavel's Telegram: https://t.me/durov Pavel's X: https://x.com/durov Telegram: https://telegram.org/ Telegram Contests: https://contest.com/ SPONSORS: To support this podcast, check out our sponsors & get discounts: Miro: Online collaborative whiteboard platform. Go to https://miro.com/ UPLIFT Desk: Standing desks and office ergonomics. Go to https://upliftdesk.com/lex Fin: AI agent for customer service. Go to https://fin.ai/lex LMNT: Zero-sugar electrolyte drink mix. Go to https://drinkLMNT.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex OUTLINE: (00:00) - Introduction (02:46) - Sponsors, Comments, and Reflections (11:29) - Philosophy of freedom (14:37) - No alcohol (22:42) - No phone (28:38) - Discipline (49:50) - Telegram: Lean philosophy, privacy, and geopolitics (1:05:12) - Arrest in France (1:21:23) - Romanian elections (1:32:18) - Power and corruption (1:41:50) - Intense education (1:53:51) - Nikolai Durov (1:58:19) - Programming and video games (2:02:33) - VK origins & engineering (2:19:46) - Hiring a great team (2:29:02) - Telegram engineering & design (2:48:04) - Encryption (2:53:01) - Open source (2:57:48) - Edward Snowden (3:00:20) - Intelligence agencies (3:01:32) - Iran and Russia government pressure (3:04:41) - Apple (3:11:38) - Poisoning (3:43:53) - Money (3:52:45) - TON (4:02:35) - Bitcoin (4:05:34) - Two chairs dilemma (4:12:14) - Children (4:23:24) - Father (4:27:55) - Quantum immortality (4:34:27) - Kafka PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips

Ctrl-Alt-Speech
Moderating is Such Sweet Sorrow

Ctrl-Alt-Speech

Play Episode Listen Later Oct 1, 2025 54:49 Transcription Available


In this week's roundup of the latest news in online speech, content moderation and internet regulation, Mike is joined by Dave Willner, founder of Zentropi, and long-time trust & safety expert who worked at Facebook, AirBnB, and OpenAI in Trust & Safety roles. Together they discuss:Masnick's Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well (Techdirt)UK makes new attempt to access Apple cloud data (Financial Times)Imgur pulls out of UK after data regulator warns of fines (TechCrunch)Leaked Meta guidelines show how it trains AI chatbots to respond to child sexual exploitation prompts (Business Insider)OpenAI's Sora joins Meta in pushing AI-generated videos. Some are worried about a flood of 'AI slop' (ABC News)Flights in Afghanistan grounded after internet shutdown (BBC) Ctrl-Alt-Speech is a weekly podcast from Techdirt and Everything in Moderation. Send us your feedback at podcast@ctrlaltspeech.com and sponsorship enquiries to sponsorship@ctrlaltspeech.com. Thanks for listening.

Crazy Wisdom
Episode #492: From Peer-to-Peer to Cosmolocalism: Michel Bauwens on Building the Next World

Crazy Wisdom

Play Episode Listen Later Sep 26, 2025 60:15


In this episode of Crazy Wisdom, host Stewart Alsop talks with Michel Bauwens, founder of the P2P Foundation, about the rise of peer-to-peer dynamics, the historical cycles shaping our present, and the struggles and possibilities of building resilient communities in times of crisis. The conversation moves through the evolution of the internet from Napster to Web3, the cultural shifts since 1968, Bauwens' personal experiences with communes and his 2018 cancellation, and the emerging vision of cosmolocalism and regenerative villages as alternatives to state and market decline. For more on Michel's work, you can explore his Substack at 4thgenerationcivilization.substack.com and the extensive P2P Foundation Wiki at wiki.p2pfoundation.net.Check out this GPT we trained on the conversationTimestamps00:00 Michel Bauwens explains peer-to-peer as both computer design and social relationship, introducing trans-local association and the idea of an anthropological revolution.05:00 Discussion of Web1, Web3, encryption, anti-surveillance, cozy web, and dark forest theory, contrasting early internet openness with today's fragmentation.10:00 Bauwens shares his 2018 cancellation, deplatforming, and loss of funding after a dispute around Jordan Peterson, reflecting on identity politics and peer-to-peer pluralism.15:00 The cultural shifts since 1968, the rise of identity movements, macro-historical cycles, and the fourth turning idea of civilizational change are unpacked.20:00 Memories of 1968 activism, communes, free love, hypergamy, and the collapse of utopian experiments, showing the need for governance and rules in cooperation.25:00 From communes to neo-Reichian practices, EST seminars, and lessons of human nature, Bauwens contrasts failed free love with lasting models like kibbutzim and Bruderhof.30:00 Communes that endure rely on transcendence, religious or ideological foundations, and Bauwens points to monasteries as models for resilience in times of decline.35:00 Cycles of civilization, overuse of nature, class divisions, and the threat of social unrest frame a wider reflection on populism, Eurasian vs Western models, and culture wars.40:00 Populism in Anglo vs continental Europe, social balance, Christian democracy, and the contrast with market libertarianism in Trump and Milei.45:00 Bauwens proposes cosmolocalism, regenerative villages, and bioregional alliances supported by Web3 communities like Crypto Commons Alliance and Ethereum Localism.50:00 Historical lessons from the Roman era, monasteries, feudal alliances, and the importance of reciprocity, pragmatic alliances, and preparing for systemic collapse.55:00 Localism, post-political collaboration, Ghent urban commons, Web3 experiments like Zuzalu, and Bauwens' resources: fortcivilizationsubstack.com and wiki.p2pfoundation.net.Key InsightsMichel Bauwens frames peer-to-peer not just as a technical design but as a profound social relationship, what he calls an “anthropological revolution.” Like the invention of writing or printing, the internet created trans-local association, allowing people across the globe to coordinate outside of centralized control.The conversation highlights the cycles of history, drawing from macro-historians and the “fourth turning” model. Bauwens explains how social movements rise, institutionalize, and collapse, with today's cultural polarization echoing earlier waves such as the upheavals of 1968. He sees our era as the end of a long cycle that began after World War II.Bauwens shares his personal cancellation in 2018, when posting a video about Jordan Peterson triggered accusations and led to deplatforming, debanking, and professional exclusion. He describes this as deeply traumatic, forcing him to rethink his political identity and shift his focus to reciprocity and trust in smaller, resilient networks.The episode revisits communes and free love experiments of the 1970s, where Bauwens lived for years. He concludes that without governance, rules, and shared transcendence, these communities collapse into chaos. He contrasts them with enduring models like the Bruderhof, kibbutzim, and monasteries, which rely on structure, ideology, or religion to survive.A major theme is populism and cultural polarization, with Bauwens distinguishing between Anglo-Saxon populism rooted in market libertarianism and continental populism shaped by Christian democratic traditions. The former quickly loses support by privileging elites, while the latter often maintains social balance through family and worker policies.Bauwens outlines his vision of cosmolocalism and regenerative villages, where “what's heavy is local, what's light is global.” He argues that bioregionalism combined with Web3 technologies offers a practical way to rebuild resilient communities, coordinate globally, and address ecological and social breakdown.Finally, the episode underscores the importance of pragmatic alliances across political divides. Bauwens stresses that survival and flourishing in times of systemic collapse depend less on ideology and more on reciprocity, concrete projects, and building trust networks that can outlast declining state and market systems.

InfosecTrain
Public Key Cryptography Simplified Encryption, Decryption & DigiNotar Hack (Superhero Edition)

InfosecTrain

Play Episode Listen Later Sep 21, 2025 48:51


Cybercrime Magazine Podcast
Quantum Minute. China Breaks RSA Encryption. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 19, 2025 1:57


A team in China has successfully broken RSA encryption using a D-Wave Advantage quantum computer, posing a significant threat to global data security. Earth.com explains that the researchers used a 22-bit RSA integer that had previously resisted attempts to break it, demonstrating the potential for quantum machines to tackle cryptographic problems. This breakthrough is concerning because RSA encryption is still widely used in many industries, including finance and government. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

The Post-Quantum World
Running Shor's Algorithm on Logical Qubits - with Peter Noell of Infleqtion

The Post-Quantum World

Play Episode Listen Later Sep 17, 2025 36:14


For the first time, Shor's Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we're still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical ratio of Sqale, which could lead to hundreds of logical qubits by 2028. Also, find out why Shor's Algorithm could surprisingly end up being one of the first killer apps for quantum computing, rather than a later use case. Join host Konstantinos Karagiannis for a wide-ranging chat with Peter Noell from Infleqtion. For more information on Infleqtion, visit https://infleqtion.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

David Bombal
#512: All Encryption Hacked in 3 Years?

David Bombal

Play Episode Listen Later Sep 15, 2025 38:17


Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Quantum computing isn't a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that's enough to break today's asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor's algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed. In this frank discussion, OTW joins David Bombal to explain: • Why asymmetric key exchange is the weak link for TLS/VPNs • How hybrid quantum + CUDA-Q accelerates timelines • Nation-states' “collect now, decrypt later” strategy • The painful window before post-quantum cryptography (PQC) rolls out • Risks of client-side scanning and on-device AI • NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // • USA stops UK creating Apple backdoor. Why ... • Will this Tiny Chip Change EVERYTHING in Q... // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 01:49 - OTW's Books 02:46 - Brilliant Advert 04:01 - Encryption and Apple Backdoors 05:12 - Nation-states Racing for Quantum Computing 08:35 - Jensen Huang's Hybrid Quantum Computer 10:57 - The Threat of National Agencies 12:10 - China Collecting Encrypted Data 13:56 - Post-Quantum Cryptography 17:58 - The NSA Collecting Data 19:21 - The NSA and Encryption 24:40 - Concerns Against Cryptography 28:09 - Client-Side Scanning 30:46 - Should you Run AI on your Devices? 34:56 - NVIDIA's Role on Cryptography 37:37 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

MacVoices Audio
MacVoices #25230: Live! - Intel Investment Debate and Bluesky's Mississippi Exit

MacVoices Audio

Play Episode Listen Later Sep 4, 2025 27:02


The panel examines the U.S. government's $8.9 billion investment in Intel, debating whether it strengthens national security or sets a risky precedent for government ownership in private companies. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Ben Roethig, Jeff Gamet, Eric Bolden, Web Bixby, and Jim Rea discuss Intel's challenges, the role of the CHIPS Act, and political optics. The session also examined Bluesky's withdrawal from Mississippi over strict age-verification laws, and the implications for other states and services. Today's MacVoices is supported by Insta360 and their new GO Ultra, the tiny 4K camera that goes everywhere with you. Visit store.Insta360.com and use the code  “MacVoices” for a free set of Sticky Tabs. Show Notes: Chapters: [0:10] Government investment in Intel [1:30] Concerns about state-owned enterprise [3:49] Intel's struggles and future outlook [5:43] Comparing Intel to past bailouts [7:19] Differences between subsidies and bailouts [7:57] Perspectives on government involvement [9:16] International vs U.S. approaches [11:29] Stratechery analysis on Intel [11:59] CHIPS Act and Intel's funding shift [15:17] Breakdown of grants and obligations [16:40] Political optics of Intel investment [20:30] Bluesky exits Mississippi [21:28] Age-verification law challenges [23:58] Privacy, Facebook, and data security [24:58] Broader implications of restrictive laws Links: Trump confirms US government's 10% stake in Intel, stock climbs https://9to5mac.com/2025/08/22/trump-confirms-us-governments-10-stake-in-intel-stock-climbs/ U.S. Intel https://stratechery.com/2025/u-s-intel/ Bluesky blocks service in Mississippi over age assurance law https://techcrunch.com/2025/08/24/bluesky-blocks-service-in-mississippi-over-age-assurance-law/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on  Twitter and Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Audio
MacVoices #25229: Live! - Gemini and Siri, The FTC's Encryption Demands, Y Combinator and Epic

MacVoices Audio

Play Episode Listen Later Sep 3, 2025 38:09


The MacVoices Live! panel debate reports that Apple may tap Google's Gemini for Siri, weighing multi-model AI, privacy, and sandboxed partnerships. Chuck Joiner, David Ginsburg, Marty Jencius, Brian Flanigan-Arthurs, Ben Roethig, Jeff Gamet, Eric Bolden, Web Bixby, and Jim Rea review the FTC's warning not to weaken encryption at governments' request, then examine Y Combinator's brief backing Epic against App Store fees. The discussion wraps up with claims that Meta inflated ad outcomes and evaded Apple's tracking rules, and the often uncomfortable trade-offs of still using Facebook.  Today's MacVoices is supported by Insta360 and their new GO Ultra, the tiny 4K camera that goes everywhere with you. Visit store.Insta360.com and use the code  “MacVoices” for a free set of Sticky Tabs. Show Notes: Chapters: [0:00] Intro and sponsor mention (Insta360 Go Ultra) [0:27] Apple considering Gemini for Siri: pros, cons, privacy [3:51] Multi-model approach, sandboxing, and user transparency [10:11] Sponsor read: Insta360 Go Ultra [11:36] FTC warns tech firms not to weaken encryption for governments [13:52] Legal conflicts across regions and disclosure dilemmas [16:01] Y Combinator backs Epic: App Store fees and innovation “tax” [21:14] Developer frustrations, big-app exceptions, and fairness [26:30] Meta accused of inflating ad results, dodging ATT tracking rules [33:28] The dilemma of using Facebook despite privacy concerns[36:35] Wrap-up Links: Apple is reportedly considering using Gemini to power the new Siri https://www.engadget.com/ai/apple-is-reportedly-considering-using-gemini-to-power-the-new-siri-184528449.html FTC warns Apple it must not weaken data encryption at behest of rogue governments https://www.applemust.com/ftc-warns-apple-it-must-not-weaken-data-encryption-at-behest-of-rogue-governments/ Y Combinator backs Epic in Apple appeal, calls App Store fee a ‘tax on innovation' https://9to5mac.com/2025/08/21/y-combinator-backs-epic-in-apple-appeal-calls-app-store-fee-a-tax-on-innovation/ Meta accused of inflating ad results & dodging Apple privacy rules https://appleinsider.com/articles/25/08/21/meta-accused-of-inflating-ad-results-dodging-apple-privacy-rules Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn, but prefers Bluesky. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on  Twitter and Mastodon. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

HPE Tech Talk
Can we build technology today to defend against the threats of tomorrow?

HPE Tech Talk

Play Episode Listen Later Aug 28, 2025 22:44


Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say

The Pure Report
15 Architectural Decisions Series: Encryption, Metadata, and Install/Repair/Replace (DIY)

The Pure Report

Play Episode Listen Later Aug 26, 2025 34:39


Episode 5 of our series covers always-on encryption, the smart use of metadata, and our DIY install/repair/upgrade approach. Pure's approach to security is to have it built-in and non-optional, with end-to-end encryption—covering both user data and metadata—using device or software-based AES-256 alongside features like Rapid Data Locking, role-based access controls, and secure erasure methods to protect against breaches and support compliance needs. Next, hear about how metadata serves as the “secret sauce” for Pure, enabling highly efficient, granular data services and powering capabilities like snapshots and instant cloning through a scalable, multi-tiered framework that writes, caches, and protects metadata in ways traditional arrays cannot match. Finally, we touch on installation, repairs, and upgrades which are designed for ultimate simplicity and DIY ease, with non-disruptive software and hardware changes—thanks to Pure's Evergreen architecture—which allows organizations to grow and evolve storage resources without operational downtime, complex migrations, or compromise. These architectural choices underpin Pure's promise of secure, resilient, and agile storage that adapts to changing business needs while remaining effortless to manage. Series Overview: Pure Storage's foundational approach to product engineering is guided by 15 architectural decisions that were established at the company's inception and have shaped both the technical and user experience across its product lines. These architectural choices were not made arbitrarily—they stem from a deliberate focus on simplicity, efficiency, and scalability, ensuring Pure could deliver storage solutions that break away from legacy complexity and enable continuous innovation without compromise. This series will guide viewers through all of the 15 principles, helping you understand why certain choices were made, how they impact your operations, and how they compare to other industry features and products. Join Pure Report podcast hosts Rob Ludeman, Andrew Miller, and J.D Wallace for this fun technical retrospective on Pure Storage.

Business of Tech
95% of AI Pilots Fail; UK Drops Apple Encryption Demand; US Buys 10% of Intel with Taxpayer Funds

Business of Tech

Play Episode Listen Later Aug 25, 2025 18:21


MIT's recent report reveals that a staggering 95% of enterprise generative AI pilot programs fail to deliver results, primarily due to poor execution rather than the quality of the AI models themselves. The study, which involved interviews with 150 leaders and a survey of 350 employees, highlights a significant learning gap in integrating these tools into business operations. Despite the promise of generative AI, most companies are misallocating their budgets, focusing on sales and marketing instead of back-office automation, where the highest returns are found. This disconnect is further exacerbated by outdated IT help desks, which hinder security and efficiency.The UK government has recently backed off its demand for Apple to provide backdoor access to user data protected by iCloud encryption, following pressure from U.S. officials. This decision is seen as a win for privacy advocates, but the ongoing clash between governments over data privacy regulations continues to pose challenges for tech companies. The FTC has warned major tech firms against compromising U.S. privacy standards in an effort to comply with foreign regulations, highlighting the complexities of compliance fragmentation that affects customers.In the realm of artificial intelligence, OpenAI has announced updates to its latest model, GPT-5, aiming to make it more approachable after user feedback indicated a preference for the previous version, GPT-4. Meanwhile, Chinese startup DeepSeek has launched a powerful AI model, DeepSeek v3.1, which challenges the dominance of American companies. Additionally, Elon Musk's XAI has open-sourced its GROK 2.5 model, despite facing controversy over its previous iterations. These developments illustrate the rapidly evolving landscape of AI technology and the competitive pressures within the industry.The U.S. government has made headlines by purchasing a 10% stake in Intel, investing $8.9 billion in taxpayer money to stabilize the company amid its ongoing struggles. Critics argue that this move represents a shift towards industrial policy rather than traditional capitalism, as the government selects specific companies as winners and losers. This intervention raises questions about the future of the semiconductor market, as government involvement could alter pricing, supply, and vendor strategies. For IT service providers, this situation underscores the importance of diversifying hardware investments and preparing clients for potential market disruptions. Four things to know today 00:00 MIT Finds 95% of GenAI Pilots Fail, While Businesses Overspend on Cloud and Ignore IT Gaps05:08 UK Retreats on Apple Backdoor Demand as FTC Warns Big Tech and OpenAI Lands Federal Deal08:14 GPT-5 Gets a Personality Makeover, DeepSeek Goes Big, Musk Goes Open Source, and Zoom Gives You a Robot Receptionist12:50 U.S. Buys 10% of Intel With $8.9B Investment, Blurring Lines Between Capitalism and Industrial Policy This is the Business of Tech.    Supported by:  https://scalepad.com/dave/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

iOS Today (Video HI)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (Video HI)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

iOS Today (MP3)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (MP3)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

All TWiT.tv Shows (MP3)
iOS Today 766: Task & Project Management

All TWiT.tv Shows (MP3)

Play Episode Listen Later Aug 21, 2025 55:23 Transcription Available


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

iOS Today (Video)
iOS 766: Task & Project Management - Systematically getting things done

iOS Today (Video)

Play Episode Listen Later Aug 21, 2025 55:23


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

HPE Tech Talk
How are governments reacting to the threat of quantum computers?

HPE Tech Talk

Play Episode Listen Later Aug 21, 2025 20:31


Why do quantum computers pose a threat to governments? This week Technology Now starts a two part dive into quantum computing. In this first episode, we ask: how are governments preparing to mitigate the threat posed by a hypothetical quantum computer which could be invented. Ken Rich, Federal CTO at HPE tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Ken Rich:https://www.linkedin.com/in/kenrich111/Sources:https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptographyhttps://www.britannica.com/technology/quantum-computerhttps://www.livescience.com/technology/computing/history-of-quantum-computing-key-moments-that-shaped-the-future-of-computingShor, Peter W.. “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.” SIAM Rev. 41 (1995): 303-332.P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 1994, pp. 124-134, doi: 10.1109/SFCS.1994.365700.https://www.newscientist.com/article/2399246-record-breaking-quantum-computer-has-more-than-1000-qubits/

Total Mikah (Audio)
iOS Today 766: Task & Project Management

Total Mikah (Audio)

Play Episode Listen Later Aug 21, 2025 55:23 Transcription Available


Transform your chaotic to-do lists into powerful project management systems that actually get things done! Mikah and Rosemary get busy with task and project management on iOS, comparing the built-in Reminders app to powerhouse tools like OmniFocus 4 and Things 3, plus they tackle tricky location-based automation challenges. Breaking down overwhelming projects - The hosts discuss how splitting large, daunting tasks into smaller, manageable steps makes projects feel achievable and less intimidating OmniFocus deep dive - Rosemary demonstrates OmniFocus's advanced features including tags, defer dates, repeat systems, time zone-specific due dates, sequential vs parallel projects, and custom perspectives for organizing tasks Things 3 overview - Mikah explains how Things 3 offers similar powerful functionality to OmniFocus but with different design choices and user experience approaches Reminders app capabilities - Detailed walkthrough of Apple's built-in Reminders showing subtasks, location-based reminders, time-based alerts, priority flags, and even printing options for physical lists News UK government backs down on iCloud encryption - The UK reportedly withdrew demands for backdoor access to encrypted iCloud data, avoiding security risks for users worldwide Apple Watch blood oxygen sensor returns - Apple cleverly circumvents the Masimo patent dispute by having the iPhone process blood oxygen measurements instead of the watch displaying them directly Feedback Location reminder delays - Bob writes about his home arrival reminders triggering 10+ minutes late despite expanding the geographic boundary, with suggestions including checking low power mode and resetting network settings Shortcuts Corner Focus mode automation challenges - Dustin asks about setting up three different focus modes for his wife's work schedule that aren't switching properly between personal, office, and client time App Caps Product Hunt - Mikah recommends this app and website for discovering new products and services before they become mainstream, despite the recent influx of AI-focused launches Bridges - Rosemary showcases this $1.99 link formatting and organization app that lets you save, categorize, and export links in multiple formats including Markdown, HTML, and JSON Hosts: Mikah Sargent and Rosemary Orchard Contact iOS Today at iOSToday@twit.tv. Download or subscribe to iOS Today at https://twit.tv/shows/ios-today Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

The Post-Quantum World
One PQC Playbook – with Kevin Hilscher of DigiCert

The Post-Quantum World

Play Episode Listen Later Aug 20, 2025 32:58


DigiCert is widely recognized for its expertise in PKI and as a TLS certificate authority. As you can imagine, they have a significant perspective on the quantum computing threat to encryption and the migration to post-quantum cryptography (PQC). We cover everything from the challenges of upgrading IoT devices to ML-DSA signature sizes, as well as the new DigiCert One platform the company offers to help manage the migration process. In the middle of this episode, you'll even get a clear summary of what a successful rollout to PQC looks like. Join host Konstantinos Karagiannis for a wide-ranging chat on actionable PQC steps you can take with Kevin Hilscher from DigiCert. There's even a Quantum Safe Playground to experiment with!For more information on DigiCert, visit www.digicert.com/.   Visit the Quantum Safe Playground at https://labs.digicert.com/quantum-safe.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

The Deep Dive Radio Show and Nick's Nerd News
Encryption security gets a global win...

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Aug 19, 2025 4:59


Watchdog on Wall Street
Apple vs. Governments: A Win for Privacy and Encryption

Watchdog on Wall Street

Play Episode Listen Later Aug 19, 2025 3:49 Transcription Available


LISTEN and SUBSCRIBE on:Apple Podcasts: https://podcasts.apple.com/us/podcast/watchdog-on-wall-street-with-chris-markowski/id570687608 Spotify: https://open.spotify.com/show/2PtgPvJvqc2gkpGIkNMR5i WATCH and SUBSCRIBE on:https://www.youtube.com/@WatchdogOnWallstreet/featured  Apple takes a stand for user privacy, defeating the UK government's push for a backdoor into its encrypted data. From the Investigatory Powers Act of 2016 to San Bernardino-era controversies, this episode explores how Apple's Advanced Data Protection safeguards iCloud users from government overreach and hackers alike. A deep dive into the tech giant's commitment to security, civil liberties, and why Apple continues to set the standard for protecting personal data worldwide.

Hashtag Trending
AI's Impact on Privacy, Insurance, Age Verification, and QR Code Scams

Hashtag Trending

Play Episode Listen Later Aug 19, 2025 11:46 Transcription Available


In this episode of Hashtag Trending, host Jim Love discusses the increasing role of AI in various aspects of our lives. Topics covered include OpenAI's plans for encrypting temporary chats to protect user privacy, the use of AI to appeal denied insurance claims through Counterforce Health, YouTube's AI-based age verification system, and the legal consequences of taking confidential documents from a former employer. Additionally, the episode warns about the growing epidemic of QR code scams and provides guidelines on how to stay safe. Love also encourages listeners to support the show through comments, likes, and donations. 00:00 Introduction and Overview 00:33 Open AI's Encryption for Chat 02:00 AI in Insurance Claims 04:18 YouTube's AI Age Verification 06:44 Consequences of Taking Documents from Old Jobs 08:25 QR Code Scams Epidemic 10:47 Conclusion and Call to Action

ITSPmagazine | Technology. Cybersecurity. Society
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 21:11


At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler

The Treasury Update Podcast
Exploring Homomorphic Encryption: Fundamentals and Potential Applications in Finance

The Treasury Update Podcast

Play Episode Listen Later Aug 11, 2025 20:49


In this episode, Craig Jeffery and Brian Weeks explore homomorphic encryption, an emerging encryption method that allows data to be processed while still encrypted. They discuss how it works, why it matters, and potential future applications in finance, benchmarking, and fraud detection. When will it become relevant to treasury? Listen in for a forward-looking perspective.   For a deeper technical dive, check out these videos: https://youtu.be/SEBdYXxijSo https://youtu.be/lNw6d05RW6E

The Post-Quantum World
Cracking Encryption by 2030? – with Dean Kassmann of IonQ

The Post-Quantum World

Play Episode Listen Later Aug 6, 2025 38:49


IonQ is poised to redefine the quantum computing landscape, projecting a staggering 80,000 logical qubits by 2030—potentially unlocking the power to crack encryption. NIST has us on a timeline to upgrade to post-quantum cryptography (PQC) by 2035, so this 5-year gap may spell doom for cybersecurity. Of course, these machines will also revolutionize industries from finance to drug discovery to AI. How is IonQ boosting their roadmap by orders of magnitude? Learn about their cutting-edge acquisitions and bold vision for scalable, error-corrected systems in this wide-ranging chat between host Konstantinos Karagiannis and IonQ SVP Dean Kassmann.For more information on IonQ, visit https://ionq.com/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.  Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

BlockHash: Exploring the Blockchain
Ep. 567 Joe Andrews | Decentralized Applications with Encryption on Aztec

BlockHash: Exploring the Blockchain

Play Episode Listen Later Aug 5, 2025 26:41


For episode 567 of the BlockHash Podcast, host Brandon Zemp is joined by Joe Andrews, Co-founder & President of Aztec. Aztec is a fully programmable private ZK-rollup on Ethereum enabling developers to create decentralized applications with encryption and scale.⏳ Timestamps: (0:00) Introduction(0:55) Who is Joe Andrews?(4:03) Aztec in 2025(6:00) Aztec Roadmap(8:05) Aztec's role in Privacy Onchain(12:50) Aztec ecosystem applications(16:30) Balancing Privacy and Compliance Onchain(20:40) Future of Privacy(23:45) Events & Conferences in 2025(24:35) Aztec website, socials & community 

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Security Now (MP3)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

All TWiT.tv Shows (MP3)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HD)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video HI)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video HI)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Audio)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Audio)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Security Now (Video LO)
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?

Security Now (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

From the Crows' Nest
Salt Typhoon, Encryption and Protecting Against Cybersecurity Threats

From the Crows' Nest

Play Episode Listen Later Jul 30, 2025 38:38


In this episode of From the Crows' Nest, host Ken Miller delves into the intersection of privacy and national security with Susan Landau, the Director of the Cybersecurity Center at Tufts University.Landau testified before Congress last month calling for improved encryption as a matter of national security. She tells host Ken Miller that the modern debate over encryption and cybersecurity dates back to a cyber espionage operation run by Chinese hackers called “Salt Typhoon” that breached various parties and critical U.S. infrastructure, including wiretapping members of both the Trump and Harris presidential campaigns. Their ability to breach texts and voice messages and access databases highlighted inefficiencies in America's cybersecurity infrastructure – and the tension between protecting American citizens from cyberattacks while posing additional challenges to law enforcement agencies worldwide.To learn more about today's topics or to stay updated on EMSO and EW developments, visit our homepage.We also invite you to share your thoughts, questions, or suggestions for future episodes by emailing host Ken Miller at host@fromthecrowsnest.org.

All TWiT.tv Shows (Video LO)
Security Now 1036: Inside the SharePoint 0-day

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Radio Leo (Video HD)
Security Now 1036: Inside the SharePoint 0-day

Radio Leo (Video HD)

Play Episode Listen Later Jul 30, 2025 178:21 Transcription Available


Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hacked. The Pentagon says the SharePoint RCE didn't get them. A look at a DPRK "laptop farm" to impersonate Americans. FIDO's passkey was NOT bypassed by a MITM after all. Is our data safe anywhere? The UK is trying to back-pedal out of the Apple ADP mess. Meanwhile, the EU resumes its push for "Chat Control". Microsoft fumbled the patch of a powerful Pwn2Own exploit Show Notes - https://www.grc.com/sn/SN-1036-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT threatlocker.com for Security Now bitwarden.com/twit uscloud.com

Politicology
Epstein, Encryption, and Vanishing Trust—The Weekly

Politicology

Play Episode Listen Later Jul 26, 2025 92:23


Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and  Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals about the importance of impartial justice and truth. They dig into the U.K.'s Banter Bill and its chilling effect on free speech—an essential pillar of democratic society. And they discuss the Tornado Cash trial unfolding in Manhattan, and how it could set a precedent that reshapes Americans' digital privacy rights. These aren't just headline stories—they're stress tests for the core values that make democracy function. Then, in Politicology+ they discuss Javier Milei proving his detractors wrong and the remarkable turn around in Argentina this year.  Not yet a Politicology+ member? Don't miss all the extra episodes on the private, ad-free version of this podcast. Upgrade now at politicology.com/plus. Find our sponsor links and promo codes here: https://bit.ly/44uAGZ8 Send your questions and ideas to podcast@politicology.com or leave a voicemail at ‪(703) 239-3068‬ Follow this week's panel on X (formerly Twitter): https://twitter.com/RonSteslow https://x.com/HagarChemali Related Reading:  WSJ- Justice Department Told Trump in May That His Name Is Among Many in the Epstein Files Axios - Deputy attorney general seeking meeting with Epstein associate Ghislaine Maxwell FP - Britain's War on Speech Comes for the Pub NYTimes - As Trump Quits UNESCO, China Expands Influence - The New York Times Axios - The trial of a Tornado Cash developer begins Coindesk - Legitimate Privacy Tool or Dirty Money ‘Laundromat'? Lawyers Debate Role of Tornado Cash on Day 1 of Roman Storm Trial Learn more about your ad choices. Visit megaphone.fm/adchoices

MacBreak Weekly (Audio)
MBW 982: Everyday I'm Scrobblin' - UK Backs Down on Apple Encryption Backdoor

MacBreak Weekly (Audio)

Play Episode Listen Later Jul 23, 2025 136:08


When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit

MacBreak Weekly (Video HI)
MBW 982: Everyday I'm Scrobblin' - UK Backs Down on Apple Encryption Backdoor

MacBreak Weekly (Video HI)

Play Episode Listen Later Jul 23, 2025 136:08


When will iOS 26's public beta will be made available? Is Apple losing ground in the AI talent war? Apple's first foldable iPhone could arrive next year. And a unique color could be coming with the iPhone 17 Pro. macOS Tahoe Public Beta Available for Some Users [Update: Pulled]. TSMC US chip production may soon only be three years behind Taiwan. UK backing down on Apple encryption backdoor after pressure from US. Bigfoot, Orca, and a Trombone, are among new emoji coming to iOS 26. Apple's Emoji Game is now out for News+ subscribers in the US and Canada. Why Apple Is Losing Ground in the AI Talent War (It's Not Just Money). The first foldable iPhone will arrive next year in Un-Apple-Like fashion. One of the iPhone 17 Pro colors might literally be Liquid Glass. 'Ted Lasso' Season 4: Juno Temple & Brendan Hunt return; new cast includes Tanya Reynolds, Faye Marsay & Ted's son. Apple warns Iranians of iPhone spyware attacks ahead of Israel conflict. Earth will spin faster today to create 2nd-shortest day in history. Picks of the Week: Andy's Pick: MDR Dasher Keyboard Alex's Pick: Flipboard Jason's Pick: Longplay Hosts: Leo Laporte, Alex Lindsay, Andy Ihnatko, and Jason Snell Download or subscribe to MacBreak Weekly at https://twit.tv/shows/macbreak-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/macbreak helixsleep.com/twit

Cyber Security Today
Cybersecurity Month in Review: Key Insights and Emerging Threats July 11, 2025

Cyber Security Today

Play Episode Listen Later Jul 12, 2025 70:10 Transcription Available


In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts of AI on the cybersecurity landscape. The panel also highlights industry shifts, new threat tactics, and the importance of strategic communication during incidents. The episode concludes with reflections on AI's integration into enterprise systems, emphasizing preparation and ethical considerations. 00:00 Introduction to the Cybersecurity Month in Review 00:12 Meet the Panelists 00:26 Laura Payne's Introduction 01:04 David Shipley's Introduction 01:38 Tammy Harper's Introduction 04:09 First Story: Montreal Scam Arrest 10:52 David Shipley's Big Story: Scattered Spider 16:40 The Rise of Young Cybercriminals 32:36 Ingram Micro Ransomware Attack 33:27 Government Breaches and Fast Recovery 34:56 Ingram Micro Incident and Communication Failures 35:55 Importance of Communication in Incident Response 37:39 Ransomware Trends and Threat Actor Tactics 39:55 Shift from Encryption to Exfiltration 46:41 Government Actions and Market Impact 51:27 AI in Cybersecurity: Risks and Opportunities 58:53 Ethical AI and Future Considerations 01:08:12 Final Thoughts and Wrap-Up

The Medieval Podcast
Mysterious Manuscripts with Garry Shaw

The Medieval Podcast

Play Episode Listen Later Jun 26, 2025 55:07


There are several famous examples of mysterious medieval writing, including the so-far unbreakable Voynich Manuscript. So, what secrets were medieval people trying to hide? And why? This week, Danièle speaks with Garry Shaw about who was encrypting their manuscripts, the codes they used, and the centuries of attempts to crack the Voynich Manuscript.You can support this podcast on Patreon at https://www.patreon.com/medievalists

The Post-Quantum World
ML-KEM Cocreator Unlocks Lattice-Based Cryptography — with Joppe Bos of NXP

The Post-Quantum World

Play Episode Listen Later Jun 25, 2025 43:46


When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we're beginning to migrate and trust our data to lattice-based cryptography, it's a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask than one of the coauthors of the PQC standard? Join host Konstantinos Karagiannis for a wide-ranging chat with Joppe Bos from NXP, where they discuss the past and future of ML-KEM.  For more information on NXP, visit www.nxp.com/.  Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and Twitter: @ProtivitiTech.     Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.

ITSPmagazine | Technology. Cybersecurity. Society
Inside the Mind of the UK's Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An Infosecurity EU 2025 Conversation with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA)

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 16, 2025 17:47


William Lyne of the UK's National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.When the UK's top cyber intelligence strategist sits down with you in London, you listen — and you hit record.At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It's not just a conversation — it's a rare front-row seat into how one of the world's most serious crime-fighting agencies is tackling ransomware 3.0.The message? Ransomware isn't just a cyber issue. It's a societal one. And it's evolving faster than we're prepared for — unless we change the game.“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn't just about tech — it's about access, scale, and business models. And most importantly, it's no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.Sean brings up the obvious: “Why does this still feel like we're always reacting?”Lyne responds: “We've shifted. We're going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.Marco flips the script by comparing today's cyber landscape to something deeply human. “Extortion is nothing new — we've just digitalized it. This is human behavior, scaled by tech.”From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it's all on their radar. But he's quick to note that cybercriminals aren't bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That's coming. And it will reshape how efficient — and damaging — these threats become.”And then the real insight lands:“You can't wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”That kind of operational openness isn't something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it's essential.William also highlights the NCA's partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.Why does this matter?Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It's not theory. It's strategy, lived on the front lines. 

Business of Tech
AI's Jagged Age: Memory Limits, Retrieval Bots, and Legal Battles Over Encryption and Privacy

Business of Tech

Play Episode Listen Later Jun 13, 2025 18:01


AI models have a defined memory ceiling, which is reshaping the ongoing debates surrounding copyright and data privacy. Recent research from Meta, Google DeepMind, Cornell, and NVIDIA reveals that large language models have a fixed memorization capacity of approximately 8.6 bits per parameter. This finding clarifies the distinction between memorized data and generalized knowledge, indicating that larger datasets do not necessarily lead to increased memorization of specific data points. This understanding is crucial as it informs the operational mechanisms of AI models and addresses concerns related to copyright infringement.Sundar Pichai, CEO of Google, has introduced the term "artificial jagged intelligence" to describe the current phase of AI development, highlighting the non-linear progress and the challenges faced by researchers despite significant advancements. Pichai's perspective reflects the mixed performance of AI models, which can exhibit extraordinary capabilities alongside notable errors. This sentiment is echoed by deep learning researcher Andrej Karpathy, emphasizing the unpredictability of AI performance and the need for a more nuanced understanding of its capabilities.The rise of AI retrieval bots is transforming how users access information online, with a significant increase in traffic from these bots. Companies like OpenAI and Anthropic are deploying these bots to summarize content in real-time, moving away from traditional search methods that provide links to multiple sources. This shift poses challenges for content publishers, as the growth of retrieval bots indicates a changing economic landscape where content is increasingly consumed by AI first, with human users following. Publishers may need to rethink their engagement strategies to adapt to this new reality.In the broader context of technology and cybersecurity, WhatsApp's intervention in a legal case concerning encryption and privacy rights highlights the growing role of platforms in surveillance debates. Additionally, the U.S. Cybersecurity and Infrastructure Security Agency faces leadership challenges amid a talent exodus, raising concerns about its operational effectiveness. As the IT services industry evolves, the integration of AI into various sectors, including hiring and cybersecurity, underscores the importance of execution, interoperability, and trust in automation. The future of technology will depend on how well businesses can navigate these changes and support their clients in making informed decisions.  Four things to know today  00:00 AI's Jagged Reality: Study Reveals Limits to Model Memory as Bots Redefine the Web Economy05:35 Cybersecurity Crossroads: WhatsApp Joins Apple in Legal Fight as U.S. Agency Leadership Crumbles08:29 AI Matures Into Infrastructure Layer as IT Vendors Shift Focus to Outcomes and Execution11:51 Legal Tech, GenAI, and Fast Food Bots All Show One Thing: Hype Doesn't Equal Success  This is the Business of Tech.    Supported by:  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The CyberWire
Bypassing Bitlocker encryption.

The CyberWire

Play Episode Listen Later May 15, 2025 39:08


Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment and direct from RSAC 2025, our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. Listen to Devin's interview here. Selected Reading Google fixes high severity Chrome flaw with public exploit (Bleeping Computer) BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released (Cyber Security News) The Internet's Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge (WIRED)  German operation shuts down crypto mixer eXch, seizes millions in assets (The Record) CFPB Quietly Kills Rule to Shield Americans From Data Brokers (WIRED) EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis (Irish Council for Civil Liberties) Operation RoundPress targeting high-value webmail servers (We Live Security) Google says hackers that hit UK retailers now targeting American stores (Reuters) Cybersecurity incident forces largest US steelmaker to take some operations offline (The Record) Infosec Layoffs Aren't the Bargain Boards May Think (Dark Reading)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices