Podcasts about Encryption

Process of converting plaintext to ciphertext

  • 1,333PODCASTS
  • 3,728EPISODES
  • 48mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jan 29, 2026LATEST
Encryption

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Encryption

Show all podcasts related to encryption

Latest podcast episodes about Encryption

Mark Pesce - The Next Billion Seconds
RNZ Nine To Noon Replay: French social media ban, Microsoft encryption sharing

Mark Pesce - The Next Billion Seconds

Play Episode Listen Later Jan 29, 2026 18:32


RNZ replay 30 January 2026 In conversation with RNZ "Nine to Noon" host Kathryn Ryan, we look at the recent massive layoffs at Amazon, France's social media laws for under 15s, Microsoft giving the keys to your data kingdom to the FBI, and what happens when an organisation tasked with maintaining the safety of the airways turns to a computer to 'flood the zone' with regulation? Thanks to RNZ - Nine To Noon The Next Billion Seconds with Mark Pesce is produced by Ampel and Myrtle and Pine Listen on Spotify, Apple Sign up for 'The Practical Futurist' newsletter here. https://nextbillionseconds.com See omnystudio.com/listener for privacy information.

Security Now (MP3)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (MP3)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

All TWiT.tv Shows (MP3)
Security Now 1062: AI-Generated Malware

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video HD)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video HD)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video HI)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video HI)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Radio Leo (Audio)
Security Now 1062: AI-Generated Malware

Radio Leo (Audio)

Play Episode Listen Later Jan 28, 2026 161:34


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

Security Now (Video LO)
SN 1062: AI-Generated Malware - Ireland Legalizes Spyware

Security Now (Video LO)

Play Episode Listen Later Jan 28, 2026


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

The Deep Dive Radio Show and Nick's Nerd News
Microsoft's Backdoor Into Our Encryption...

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Jan 28, 2026 8:12


If you're using Bitlocker, you're not nearly as secure as you think!

Talos Takes
Cracking the code: What encryption can (and can't) do for you

Talos Takes

Play Episode Listen Later Jan 28, 2026 27:51


Step into the fascinating world of cryptography. Host Amy Ciminnisi sits down with Yuri Kramarz from Cisco Talos Incident Response and Tim Wadhwa-Brown from Cisco Customer Experience to learn what encryption really accomplishes, where it leaves gaps, and when defenders need to take proactive measures.Whether you're picturing classic codebreakers or the latest quantum-proof ciphers, this episode unpacks the essentials: what encryption and hashing actually mean, why key management is a make-or-break factor, and how even the best algorithms can fall short if the basics aren't handled right.G7's "Coordinating the Transition to Post-Quantum Cryptography in the Financial Sector" roadmap: https://home.treasury.gov/news/press-releases/sb0355

RNZ: Nine To Noon
Tech: French social media ban, Microsoft encryption sharing

RNZ: Nine To Noon

Play Episode Listen Later Jan 28, 2026 17:18


Technology correspondent Mark Pesce joins Kathryn on the French parliament's backing of a social media ban for under 15s, following Australia's move - does that mean more countries will follow? 

All TWiT.tv Shows (Video LO)
Security Now 1062: AI-Generated Malware

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 28, 2026 161:34 Transcription Available


Can AI really write malware better than hackers ever could? This episode exposes the first real-world case of advanced, fully AI-generated malware and why it signals a seismic shift in cybersecurity risk. CISA's uncertain future remains quite worrisome. Worrisome is Ireland's new "lawful" interception law. The EU's Digital Rights organization pushes back. Microsoft acknowledges it turns over user encryption keys. Alex Neihaus on AI enterprise usage dangers. Gavin confesses he put a database on the Internet. Worries about a massive podcast rewinding backlog. What does the emergence of AI-generated malware portend? Show Note - https://www.grc.com/sn/SN-1062-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow trustedtech.team/securitynow365 zscaler.com/security

The CyberWire
When encryption meets enforcement.

The CyberWire

Play Episode Listen Later Jan 26, 2026 32:03


Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok's creation of sexually explicit images. Glimmers of access pierce Iran's internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of  multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland's energy sector to Russia's Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it's time to pay for space safety.” Selected Reading FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread) European Commission opens new investigation into X's Grok (The Register) Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times) Hackers can bypass npm's Shai-Hulud defenses via Git dependencies (Bleeping Computer) Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer) CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer) CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer) ESET Research: Sandworm behind cyberattack on Poland's power grid in late 2025 (ESET)  Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing) CISA won't attend infosec industry's biggest conference (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.   Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Fearless Practice
Anabeli Jackson: Secure Email Solutions for Canadian Therapists | Ep 186

Fearless Practice

Play Episode Listen Later Jan 21, 2026 15:28


As a Canadian therapist in private practice, you are probably often needing to send and receive sensitive, private information. How often have you worried about these documents' security and safety? What should you do to secure email communications and keep unnecessary stress at bay?  This is where Hushmail comes to the rescue. For less than $20 CAD per month, you can completely insure, assure, and secure your entire email inbox, including your forms and signatures. They pride themselves on security and simplicity, leaving you with a solution that you can start using right out of the box from the minute to sign up.  In this episode, I chat with Anabeli about everything to do with Hushmail. We answer your questions and provide clear solutions to help you start 2026 with both digital email security and peace of mind.  MEET ANABELI Anabeli Jackson is the Marketing Manager at Hushmail, where she leads content strategy and helps therapists understand secure communication with clarity and confidence. She focuses on removing the overwhelm from topics like encryption, compliance, and secure communication so clinicians can protect client trust and stay compliant with confidence. Anabeli has been with Hushmail since 2014 and brings a strong foundation in communication and marketing. Her work supports mental health providers across Canada and the U.S. who depend on Hushmail to communicate securely with their clients. Learn more about Anabeli on her LinkedIn profile.  In this episode:  What is Hushmail? Why Canadian therapists should use Hushmail  What encryption is and why you need to use it  How you can get started with Hushmail   What is Hushmail? 'Hushmail is a secure email platform … built specifically for healthcare and therapy practices. It lets you send and receive secure, encrypted emails, and it helps you build secure forms where you can collect information securely with legally binding signatures - and it's all in one place.' - Anabeli Jackson The two cornerstones of Hushmail are focused on client and clinician security when sending sensitive emails and documents online, and simplicity since you don't need to do any tech implementation yourself!  These essential emails and documents are securely sent and kept private and secure by using encryption to protect them.   Why Canadian therapists should use Hushmail  You may be asking: Why should I pay to use Hushmail instead of the available, free services?  The answer is this: Canadian therapists handle highly sensitive information from multiple clients. Using a free email provider simply does not provide enough security and protection, while Hushmail guarantees it.  'We make it really practical to have [your client's private information] safeguarded, because encryption is the one step … that you can put in place to have your information secure … So [Hushmail] supports federal law, but also with provincial privacy laws.' - Anabeli Jackson  Hushmail provides the security that you and your clients need to send private information without concern in an easy, simple way. Plus, it is a Canadian company that is PIPEDA and HIPAA compliant! What encryption is and why you need to use it  Encryption is essentially a method of scrambling the information contained in emails and documents so that it cannot be understood by any third party, other than the intended recipient.  With Hushmail, you have a key that both scrambles and unscrambles the message which only you and your client has access to.  '[Encryption] is relevant because nowadays the online risk and cyber security … there's a lot of bad actors out there, and you don't want this information out there. You don't want this information to be seen by people who are not the intended recipients. So, encryption is a very easy way to protect that information.' - Anabeli Jackson  How you can get started with Hushmail  Take the step now to secure your communications with clients, and save both them and yourself the stress and anxiety of worrying whether the information is safe.  And with Hushmail, that peace of mind will not break the bank. For purely email purposes, you can get Hushmail for $16.99 CAD. If you want to include the forms and signatures, it is $24.99 CAD.  If you are listening to this episode and want to try Hushmail out, click this link to sign up with Hushmail and get your first month entirely free of charge! Connect with me: Instagram Website  Resources mentioned and useful links: Regan Swerhun: Expanding Private Care to Northern Communities | EP 185  Learn more about the tools and deals that I love and use for my Canadian private practice Sign up for my free e-course on How to Start an Online Canadian Private Practice Jane App (use code FEARLESS2MO for two months free) Get started with Hushmail here and get one month for free! Learn more about Anabeli on her LinkedIn profile Rate, review, and subscribe to this podcast on Apple Podcasts, Spotify, Amazon, and TuneIn

InfosecTrain
Cryptanalysis Exposed: How Hackers Crack the Uncrackable

InfosecTrain

Play Episode Listen Later Dec 26, 2025 4:56


Encryption is often described as the "gold standard" of security, but what happens when the gold itself is targeted? Welcome to the world of cryptanalysis—the high-stakes science of deciphering encrypted data without the key. In 2025, as quantum computing and AI become more accessible, the battle between those who hide secrets and those who hunt them is reaching a fever pitch.In this episode, we break down the most sophisticated techniques hackers use to break even the toughest modern ciphers. We move beyond simple "password guessing" and dive into the mathematical and physical vulnerabilities that can render even AES-256 or RSA vulnerable if not implemented perfectly.

CryptoNews Podcast
#502: Rand Hindi, CEO of Zama, on Fully Homomorphic Encryption (FHE), Total Value Shielded (TVS), and The future of Privacy

CryptoNews Podcast

Play Episode Listen Later Dec 22, 2025 28:42


Dr. Rand Hindi is an entrepreneur and deeptech investor. He is the Founder and CEO at Zama and an investor in over 50 companies across privacy, AI, blockchain, and medtech. Rand started coding at the age of 10, founded a Social Network at 14, and started a PhD at 21. He then created Snips, a privacy-centric AI startup that was acquired by Sonos. Rand holds a BSc in Computer Science and a PhD in bioinformatics from UCL. In this conversation, we discuss:- Banks won't use stablecoins if they are public - zcash is the beacon of crypto privacy - Privacy is the final boss of blockchain - The future of surveillance and privacy - Fully Homomorphic Encryption (FHE) - Zama = confidentiality layer - TVS = Total Value Shielded - Zama is like HTTPS for blockchain - Confidentiality without sacrificing transparency - First-ever on-chain sealed-bid Dutch auction Zama X: @zamaWebsite: www.zama.orgTelegram: t.me/zama_on_telegramDr. Rand HindiX: @randhindiLinkedIn: Rand Hindi---------------------------------------------------------------------------------This episode is brought to you by PrimeXBT.PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers.  PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50FollowApple PodcastsSpotifyAmazon MusicRSS FeedSee All

The CyberWire
Where encryption meets executive muscle.

The CyberWire

Play Episode Listen Later Dec 19, 2025 27:37


Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business News
Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers

Risky Business News

Play Episode Listen Later Dec 10, 2025 4:37


Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters. Show notes Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers

Placing You First Insurance Podcast by CRC Group
From Ink To Encryption: Understanding E-Signature Risks in the Digital Banking Era

Placing You First Insurance Podcast by CRC Group

Play Episode Listen Later Dec 5, 2025 22:49 Transcription Available


Speed is winning deals, but speed is also feeding fraud. We sit down with CRC Specialty Professional Lines Broker Mark Waldeck to unpack the messy middle where e‑signatures, legacy policy language, and decentralized bank controls collide. From the difference between a simple e‑signature and a cryptographically protected digital signature to why underwriters hesitate when controls vary by department, we map the risk pathways that turn convenience into claims friction.We examine a headline‑grabbing fraud where a bank funded a multimillion‑dollar loan to an impersonator despite notary involvement and remote verification. The dispute with the insurer highlights a wider issue: policy forms born in the era of signature cards are being stretched to cover today's remote closings, and the gaps show up at the worst time. If you work with financial institutions, you'll get a practical checklist to help ensure your banking clients are protected, from enforcing MFA and encryption to tightening scrutiny as transaction size grows. Tune in to understand how small cracks in verification can become multimillion-dollar failures—and what you can do right now to help clients stay ahead of emerging fraud risks. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!

Glitter Ledger
Zama's Homo Encryption on Rap Genius with Kyle O'Brien

Glitter Ledger

Play Episode Listen Later Dec 5, 2025 57:50


“Wake me when there's a yield. Until then, it's just electronic tulips with a nice PR team,” said a junk-bond trader I slept with in the '80s, who later asked me about Bitcoin from Sing Sing.This post, like my period, is three months late and  yet another matter AI cannot solve, given my procrastination and sheer laziness. I remind you: I do not have a job, but I also do not have access to cash due to my husband's mob ties. Crypto solves this.Luckily I'm not pregnant, because I can't deal with the weight gain  and no, my lack of blood is not age-related, thank you very much. I've simply been doing laps every morning in the jail swimming pool with some of the loveliest felons from the heyday of trad-fi in the '80s. Whoever claimed crypto had the most criminals clearly never lived through the Boiler Room years of slicked-back junk-bond bros whose foreplay consisted of a dry finger-bang while saying things like “financed raider” and “ramping the stock.” Even after all that, I still can't handle the on-chain mess we have today. Stress level: high.Between Bitcoin's drastic drop blasting through my alimony and child support; yes, I asked for the funds to be in Bitcoin, and yes, that day happened to land on October 10, which historically is the worst week for us Jews,  I remain violently underwhelmed by machine learning.I instead cling to my hardcore, conservative, maximalist American values: the Bitcoin white paper, my Bible pure and pristine collateral with no need for interference. Much like my engagement ring, which was a gift. In this season of greetings, it's important to remember what we're grateful for. My list has been the same since I was thirteen years old: cigarettes, private jets, and Xanax.I digress.My guest today is the following Ivy League contemporary: Kyle O'Brien. He almost married my sister, which would have been awkward given the throbbing sexual tension permeating this episode. I am in awe of Kyle  due to  his knowledge, his Frenchness, his homoerotic encryption, and his commitment to longevity in a country where the biggest moneymaker is suicide prevention and Lexapro. Kyle is hot. Kyle is smart. He is also, allegedly, best friends with Biggie, Tupac, and Pavarotti from his stint at RapGenius.He is the primary advisor to the Founder & CEO of Zama AI. He is co-pilot on strategy, execution, startup acceleration, partnerships, growth experiments, new ventures, and “special projects that are not drugs. .Zama is an open-source cryptography company building state-of-the-art Fully Homomorphic Encryption (FHE) solutions for blockchain and AI  basically wizard-level math that lets machines compute on encrypted data without ever seeing it. I promise you I wont need it. You might tho. Support the show

Voices of The Walrus
Quantum Threat

Voices of The Walrus

Play Episode Listen Later Dec 5, 2025 24:59


Soon, super computers will be able to crack our code. Will we be ready in time to prevent it?Matt Speirs reads Quantum Threat  About AMIAMI is a not-for-profit media company that entertains, informs and empowers Canadians who are blind or partially sighted. Operating three broadcast services, AMI-tv and AMI-audio in English and AMI-télé in French, AMI's vision is to establish and support a voice for Canadians with disabilities, representing their interests, concerns and values through inclusion, representation, accessible media, reflection, representation and portrayal.Find more great AMI Original Content on AMI+Learn more at AMI.caConnect with Accessible Media Inc. online:X /Twitter @AccessibleMediaInstagram @AccessibleMediaInc / @AMI-audioFacebook at @AccessibleMediaIncTikTok @AccessibleMediaIncEmail feedback@ami.ca Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
⚛️AI Unraveled Special: The Quantum Threshold – Google's ‘Willow' Breakthrough, AlphaQubit, & The End of Encryption

AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store

Play Episode Listen Later Dec 2, 2025 15:10


Special Report: The Quantum Threshold (December 02, 2025)This special episode dissects the paradigm shift from theoretical quantum physics to engineering reality, triggered by Google's latest hardware and AI advancements.Key Topics & Takeaways:⚡ The Engineering Miracle (Google Willow): Google has unveiled "Willow," a 105-qubit processor that successfully demonstrates the "Threshold Theorem." For the first time, increasing the number of physical qubits (from code distance 3 to 7) has led to an exponential drop in error rates, proving that fault-tolerant quantum computing is physically possible.

LINUX Unplugged
643: The Sunday Soapbox

LINUX Unplugged

Play Episode Listen Later Dec 1, 2025 91:34 Transcription Available


We pull on a few loose threads from recent episodes, and some of them unravel into way more than we expected.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED.Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:

The Connectivity Podcast
EP61: Trends and challenges in optical networking

The Connectivity Podcast

Play Episode Listen Later Dec 1, 2025 21:59


How has optical networking evolved over the past 25 years – and what's next? In this episode, Kent Lidström, CTO at Smartoptics, joins Mattias Fridström to explore:The biggest shifts in optical networking and what still needs to changeOpenness and disaggregation in the telecom industryShannon's limitHow mergers and acquisitions are reshaping the industryWhy enterprises are moving toward simpler services like “raw bandwidth”Encryption-based and physical security Strategies for managing component shortages through dual sourcingIf you're curious about the past, present, and future of optical networking, this conversation is packed with insights.

The World View with Adam Gilchrist
World View with Adam Gilchrist: The Cryptic Own Goal

The World View with Adam Gilchrist

Play Episode Listen Later Nov 26, 2025 4:01 Transcription Available


Ray White speaks to Adam Glichrist about today’s top stories from around the globe. First, a startling twist in Thailand, where a 65-year-old woman brought to a Buddhist temple for cremation was discovered alive in her coffin, a shocking reminder of how fragile life can be. Next, French President Emmanuel Macron announced plans for a new voluntary military national service, reassuring citizens that it “does not involve sending our youth to Ukraine,” following public concern sparked by warnings of Russian threats. Finally, in the world of encryption, the International Association for Cryptologic Research (IACR) had to cancel its leadership election results after a trustee lost part of the encrypted key, leaving the outcome inaccessible, a routine process turned into a high-stakes puzzle. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702See omnystudio.com/listener for privacy information.

David Bombal
#522: Does Traditional Encryption End in 2027?

David Bombal

Play Episode Listen Later Nov 26, 2025 15:24


Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco's Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten. Join us as we dive into the imminent future of cybersecurity, qubits, and entanglement technology from Cisco. // Vijoy Pandey SOCIALS // LinkedIn: / vijoy X: https://x.com/vijoy // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Intro 0:48 - Update on Quantum Computing 03:47 - Effects of Practical Quantum Computing 05:08 - Post Quantum Cryptography 06:12 - Why Bother with Quantum Computing 07:57 - How Do We get to Practical Quantum Computing 09:31 - Quantum Protocols and Applications 10:55 - Quantum Computing and Classical-Use Cases 13:28 - Practical Use Case for Quantum Alert 15:03 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #sponsored #ciscops25

The Best of Breakfast with Bongani Bingwa
World View with Adam Gilchrist: The Cryptic Own Goal

The Best of Breakfast with Bongani Bingwa

Play Episode Listen Later Nov 26, 2025 4:01 Transcription Available


Ray White speaks to Adam Glichrist about today’s top stories from around the globe. First, a startling twist in Thailand, where a 65-year-old woman brought to a Buddhist temple for cremation was discovered alive in her coffin, a shocking reminder of how fragile life can be. Next, French President Emmanuel Macron announced plans for a new voluntary military national service, reassuring citizens that it “does not involve sending our youth to Ukraine,” following public concern sparked by warnings of Russian threats. Finally, in the world of encryption, the International Association for Cryptologic Research (IACR) had to cancel its leadership election results after a trustee lost part of the encrypted key, leaving the outcome inaccessible, a routine process turned into a high-stakes puzzle. 702 Breakfast with Bongani Bingwa is broadcast on 702, a Johannesburg based talk radio station. Bongani makes sense of the news, interviews the key newsmakers of the day, and holds those in power to account on your behalf. The team bring you all you need to know to start your day Thank you for listening to a podcast from 702 Breakfast with Bongani Bingwa Listen live on Primedia+ weekdays from 06:00 and 09:00 (SA Time) to Breakfast with Bongani Bingwa broadcast on 702: https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/36edSLV or find all the catch-up podcasts here https://buff.ly/zEcM35T Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702See omnystudio.com/listener for privacy information.

Closed Network Privacy Podcast
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat

Closed Network Privacy Podcast

Play Episode Listen Later Nov 22, 2025 154:03


Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168Website / Donations / Support - https://closednetwork.io/support/BTC Lightning Donations - closednetwork@getalby.com / simon@primal.netThank You Patreons! - https://www.patreon.com/closednetworkMichael Bates - Privacy Bad AssDavid - Privacy Bad AssDaniel J Martin - Privacy Bad AssTK - Privacy Bad AssDavid - Privacy Bad AssMrMilkMustache - Privacy SupporterHutch - Privacy AdvocateTOP LIGHTNING BOOSTERS !!!! THANK YOU !!!@bon@somealphabeticcharacters@basedpotato@Turquoise Panda@wartime@Grounded-GridThank You To Our Moderators:Unintelligentseven - Follow on NOSTR primal.net/p/npub15rp9gyw346fmcxgdlgp2y9a2xua9ujdk9nzumflshkwjsc7wepwqnh354dMaddestMax - Follow on NOSTR primal.net/p/npub133yzwsqfgvsuxd4clvkgupshzhjn52v837dlud6gjk4tu2c7grqq3sxavtJoin Our CommunityClosed Network Forum - https://forum.closednetwork.ioJoin Our Matrix Channels!Main - https://matrix.to/#/#closedntwrk:matrix.orgOff Topic - https://matrix.to/#/#closednetworkofftopic:matrix.orgSimpleX Group Chat - https://smp9.simplex.im/g#SRBJK7JhuMWa1jgxfmnOfHz7Bl5KjnKUFL5zy-Jn-j0Join Our Mastodon server!https://closednetwork.socialFollow Simon On The SocialsMastodon - https://closednetwork.social/@simonNOSTR - Public Address - npub186l3994gark0fhknh9zp27q38wv3uy042appcpx93cack5q2n03qte2lu2 - primal.net/simonTwitter / X - @ClosedNtwrkInstagram - https://www.instagram.com/closednetworkpodcast/YouTube - https://www.youtube.com/@closednetworkEmail - simon@closednetwork.ioFollow Zach - https://github.com/ZamicolCoze JS - https://github.com/Cyphrme/CozeJS

Oracle University Podcast
Understanding Security Risks and Threats in the Cloud - Part 1

Oracle University Podcast

Play Episode Listen Later Nov 18, 2025 14:11


This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk.   They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses.   Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people.  01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security.  CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com.  07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations.  08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first?  Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security.  09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage.  12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets.  13:18 Lois: Wow. Thanks, Orlando, for joining us today.  Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart  course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

Cyber Security Today
Cybercrime and the Future: An In-Depth Discussion with Tammy Harper, Flare.io

Cyber Security Today

Play Episode Listen Later Nov 15, 2025 68:42


In this episode of Cybersecurity Today, host Jim Love is joined by Tammy Harper, a senior threat intelligence researcher at Flare, to explore the future landscape of cybercrime. The conversation delves into various aspects like the evolution of underground markets, state-backed cyber sanctuaries, and decentralized escrow systems. Harper presents insights on extortion as a service, the implications of artificial intelligence in cybercrime, and the potential impact of quantum computing on encryption. The episode also discusses the changing nature of digital sovereignty and its effects on cybersecurity. This thorough examination offers a glimpse into the challenges and transformations in the world of cyber threats. 00:00 Introduction and Guest Introduction 01:14 Overview of Tammy Harper's Work 01:56 Future of Cybercrime: Key Pillars 03:43 The Underground Economy 08:18 Decentralization of Underground Forums 17:28 State-Backed Sanctuaries and Cybercrime Tourism 24:01 Extortion as a Service (EAS) 31:37 Affiliate Programs in Cybercrime 34:41 Usernames and Credibility in Cybercrime 36:25 Recruitment and the Perfect Storm 37:22 Money Mules and Financial Crimes 38:45 Ransomware Negotiators and Trust Issues 41:22 Artificial Intelligence in Cybercrime 49:16 Quantum Computing and Encryption 58:55 Digital Sovereignty and the Future of Cybercrime 01:05:48 Conclusion and Final Thoughts

Cybercrime Magazine Podcast
Quantum Minute. Microsoft Preparing Quantum-Safe Encryption Standards. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Nov 7, 2025 1:48


Microsoft is actively preparing for the future of quantum-safe cryptography to protect against the potential risks posed by scalable quantum computing. The company is collaborating with global regulatory and technical bodies like NIST, IETF, and ISO to develop and align on quantum-safe encryption standards. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

No Password Required
No Password Required Podcast Episode 65 — Steve Orrin

No Password Required

Play Episode Listen Later Nov 4, 2025 44:51


Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice  SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field.  TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions.  TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security  Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you."  Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve

ai technology advice young innovation evolution startups artificial intelligence collaboration networking mentorship cybersecurity biology intel cto compliance organizations intersection required diverse governance machine learning nurturing misinformation iot surround homeland security poker autonomy lovecraft team building passwords deepfakes internet of things federal government community engagement critical thinking hellraiser blind spots body language collectibles phishing emerging technologies cloud computing hackathons hands on learning jim collins scalability encryption defcon call of cthulhu career journey data protection team dynamics good to great social engineering built to last leadership roles world series of poker zero trust summaryin ai ethics pinhead cryptography predictive analytics intelligence community experiential learning firmware veterans administration edge computing department of defense intel corporation learning from failure threat intelligence pattern recognition orrin startup culture bruce schneier creative collaboration human psychology ai security ethical hacking customer focus physical security performance optimization technology leadership applied ai innovation culture fedramp capture the flag behavioral analysis web security kali linux federal programs cybersecurity insights government technology pathfinding puzzle box continuous monitoring nurturing talent reliability engineering failure analysis buffer overflow poker tells quality of service
The Post-Quantum World
From Quantum Economy to Simulation Theory – with Anders Indset

The Post-Quantum World

Play Episode Listen Later Oct 29, 2025 44:54


How are recent quantum computing breakthroughs reshaping business, competition, and society itself? What global challenges might quantum and AI either help with or introduce? We're trying something a little different and asking a futurist and bestselling author of The Quantum Economy to weigh in on how our increasing qubit counts might all play out in a few years. Join host Konstantinos Karagiannis for a wide-ranging, philosophical chat with Anders Indset, and get ready to hear about simulation theory towards the end.   For more information on Anders Indset and his books, visit https://andersindset.com/.   Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti Technology on LinkedIn and X: @ProtivitiTech.             Questions and comments are welcome!  Theme song by David Schwartz, copyright 2021.  The views expressed by the participants of this program are their own and do not represent the views of, nor are they endorsed by, Protiviti Inc., The Post-Quantum World, or their respective officers, directors, employees, agents, representatives, shareholders, or subsidiaries.  None of the content should be considered investment advice, as an offer or solicitation of an offer to buy or sell, or as an endorsement of any company, security, fund, or other securities or non-securities offering. Thanks for listening to this podcast. Protiviti Inc. is an equal opportunity employer, including minorities, females, people with disabilities, and veterans.  

Crazy Wisdom
Episode #501: From Atomic Clocks to Smartphones: The Real Story of GPS

Crazy Wisdom

Play Episode Listen Later Oct 27, 2025 58:46


In this episode of Crazy Wisdom, host Stewart Alsop talks with Richard Easton, co-author of GPS Declassified: From Smart Bombs to Smartphones, about the remarkable history behind the Global Positioning System and its ripple effects on technology, secrecy, and innovation. They trace the story from Roger Easton's early work on time navigation and atomic clocks to the 1973 approval of the GPS program, the Cold War's influence on satellite development, and how civilian and military interests shaped its evolution. The conversation also explores selective availability, the Gulf War, and how GPS paved the way for modern mapping tools like Google Maps and Waze, as well as broader questions about information, transparency, and the future of scientific innovation. Learn more about Richard Easton's work and explore early GPS documents at gpsdeclassified.com, or pick up his book GPS Declassified: From Smart Bombs to Smartphones.Check out this GPT we trained on the conversationTimestamps00:00 – Stewart Alsop introduces Richard Easton, who explains the origins of GPS, its 12-hour satellite orbits, and his father Roger Easton's early time navigation work.05:00 – Discussion on atomic clocks, the hydrogen maser, and how technological skepticism drove innovation toward the modern GPS system.10:00 – Miniaturization of receivers, the rise of smartphones as GPS devices, and early mapping tools like Google Maps and Waze.15:00 – The Apollo missions' computer systems and precision landings lead back to GPS development and the 1973 approval of the joint program office.20:00 – The Gulf War's use of GPS, selective availability, and how civilian receivers became vital for soldiers and surveyors.25:00 – Secrecy in satellite programs, from GRAB and POPPY to Eisenhower's caution after the U-2 incident, and the link between intelligence and innovation.30:00 – The myth of the Korean airliner sparking civilian GPS, Reagan's policy, and the importance of declassified documents.35:00 – Cold War espionage stories like Gordievsky's defection, the rise of surveillance, and early countermeasures to GPS jamming.40:00 – Selective availability ends in 2000, sparking geocaching and civilian boom, with GPS enabling agriculture and transport.45:00 – Conversation shifts to AI, deepfakes, and the reliability of digital history.50:00 – Reflections on big science, decentralization, and innovation funding from John Foster to SpaceX and Starlink.55:00 – Universities' bureaucratic bloat, the future of research education, and Richard's praise for the University of Chicago's BASIC program.Key InsightsGPS was born from competing visions within the U.S. military. Richard Easton explains that the Navy and Air Force each had different ideas for navigation satellites in the 1960s. The Navy wanted mid-Earth orbits with autonomous atomic clocks, while the Air Force preferred ground-controlled repeaters in geostationary orbit. The eventual compromise in 1973 created the modern GPS structure—24 satellites in six constellations—which balanced accuracy, independence, and resilience.Atomic clocks made global navigation possible. Roger Easton's early insight was that improving atomic clock precision would one day enable real-time positioning. The hydrogen maser, developed in 1960, became the breakthrough technology that made GPS feasible. This innovation turned a theoretical idea into a working global system and also advanced timekeeping for scientific and financial applications.Civilian access to GPS was always intended. Contrary to popular belief, GPS wasn't a military secret turned public after the Korean airliner tragedy in 1983. Civilian receivers, such as TI's 4100 model, were already available in 1981. Reagan's 1983 announcement merely reaffirmed an existing policy that GPS would serve both military and civilian users.The Gulf War proved GPS's strategic value. During the 1991 conflict, U.S. and coalition forces used mostly civilian receivers after the Pentagon lifted “selective availability,” which intentionally degraded accuracy. GPS allowed troops to coordinate movement and strikes even during sandstorms, changing modern warfare.Secrecy and innovation were deeply intertwined. Easton recounts how classified projects like GRAB and POPPY—satellites disguised as scientific missions—laid technical groundwork for navigation systems. The crossover between secret defense projects and public science fueled breakthroughs but also obscured credit and understanding.Ending selective availability unleashed global applications. When the distortion feature was turned off in May 2000, GPS accuracy improved instantly, leading to new industries—geocaching, precision agriculture, logistics, and smartphone navigation. This marked GPS's shift from a defense tool to an everyday utility.Innovation's future may rely on decentralization. Reflecting on his father's era and today's landscape, Easton argues that bureaucratic “big science” has grown sluggish. He sees promise in smaller, independent innovators—helped by AI, cheaper satellites, and private space ventures like SpaceX—continuing the cycle of technological transformation that GPS began.

INDIGNITY MORNING PODCAST
Episode 557: Indignity Morning Podcast No. 557: Secrecy and encryption.

INDIGNITY MORNING PODCAST

Play Episode Listen Later Oct 17, 2025 13:08


EASY LISTENING DEP'T.: Protesters showing up to wave Israeli flags outside the building does not mean that the "tension was spilling out of the synagogue." It's like when anti semitic protesters showed up on Broadway outside the fence of Columbia University, and their behavior was incorporated into the brief against the Columbia campus protesters, the people who are on the outside are on the outside for a reason, and if they were representative of the situation inside, they would probably be inside. Please visit, read, and support INDIGNITY! https://www.indignity.net/

Security Now (MP3)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (MP3)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (MP3)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HD)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HD)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video HI)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video HI)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Radio Leo (Audio)
Security Now 1047: RediShell's CVSS 10.0

Radio Leo (Audio)

Play Episode Listen Later Oct 15, 2025 165:35


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Security Now (Video LO)
SN 1047: RediShell's CVSS 10.0 - The Rise of Mega Botnets

Security Now (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

All TWiT.tv Shows (Video LO)
Security Now 1047: RediShell's CVSS 10.0

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Oct 15, 2025 152:07 Transcription Available


Texas is on the brink of forcing Apple and Google to overhaul app downloads with strict age verification laws—are tech giants ready, or is your privacy about to get caught in the crossfire? The EU aborted their Chat Control vote knowing it would fail. Salesforce says it's not going to pay; customer data is released. Hackers claim Discord breach netted 70,000 government IDs. Microsoft to move Github to Azure. What could possibly go wrong. New California law allows universal data sharing opt-out. OpenAI reports that it's blocking foreign abuse. Who cares. IE Mode refuses to die, so Microsoft is burying it deeper. The massive mess created by Texas legislation SB2420. The BreachForums website gets a makeover. 100,000 strong global botnet attacking U.S. RDP services. UI experts weigh in on Apple's iOS 26 user-interface. 330,000 publicly exposed REDIS servers are RCE-vulnerable Show Notes - https://www.grc.com/sn/SN-1047-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security expressvpn.com/securitynow vanta.com/SECURITYNOW canary.tools/twit - use code: TWIT bigid.com/securitynow

Hacker News Recap
October 4th, 2025 | The UK is still trying to backdoor encryption for Apple users

Hacker News Recap

Play Episode Listen Later Oct 5, 2025 14:29


This is a recap of the top 10 posts on Hacker News on October 04, 2025. This podcast was generated by wondercraft.ai (00:30): The UK is still trying to backdoor encryption for Apple usersOriginal post: https://news.ycombinator.com/item?id=45476273&utm_source=wondercraft_ai(01:52): Flock's gunshot detection microphones will start listening for human voicesOriginal post: https://news.ycombinator.com/item?id=45473698&utm_source=wondercraft_ai(03:14): How I influence tech company politics as a staff software engineerOriginal post: https://news.ycombinator.com/item?id=45473852&utm_source=wondercraft_ai(04:37): Alibaba cloud FPGA: the $200 Kintex UltraScale+Original post: https://news.ycombinator.com/item?id=45471136&utm_source=wondercraft_ai(05:59): Paged Out Issue #7 [pdf]Original post: https://news.ycombinator.com/item?id=45472319&utm_source=wondercraft_ai(07:21): ProofOfThought: LLM-based reasoning using Z3 theorem provingOriginal post: https://news.ycombinator.com/item?id=45475529&utm_source=wondercraft_ai(08:44): Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble?Original post: https://news.ycombinator.com/item?id=45473033&utm_source=wondercraft_ai(10:06): A comparison of Ada and Rust, using solutions to the Advent of CodeOriginal post: https://news.ycombinator.com/item?id=45473861&utm_source=wondercraft_ai(11:29): Self-hosting email like it's 1984Original post: https://news.ycombinator.com/item?id=45473730&utm_source=wondercraft_ai(12:51): New antibiotic targets IBD and AI predicted how it would workOriginal post: https://news.ycombinator.com/item?id=45469579&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

Mac OS Ken
iPhone Sales and iCloud Encryption - MOSK: 10.02.2025

Mac OS Ken

Play Episode Listen Later Oct 2, 2025 17:48


- J.P. Morgan: iPhone 17 Strength Driven by Upgrades - UK Tries for Access to Encrypted iCloud Data of UK Citizens - Court Dismisses Apple/Amazon Price Fixing Case - Apple Moves to Dismiss xAI's Collusion Suit - Apple, Google, and Meta Have to Answer for Gambling Apps - iFixit: AirPods Pro 3 Are Not Repairable - Apple Buys Ireland's IC Mask Design - Three New Titles Hit Apple Arcade - Apple TV+ Outs Trailer for Documentary “Mr. Scorsese” Ahead of 17 October Premier - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra today at store.insta360.com/product/go-ultra?utm_term=macosken with code macosken - Active ransomware attacks and improving recovery trends on Checklist No. 442 - Find it today at checklist.libsyn.com - Catch Ken on Mastodon - @macosken@mastodon.social - Send Ken an email: info@macosken.com - Chat with us on Patreon for as little as $1 a month. Support the show at Patreon.com/macosken

2.5 Admins
2.5 Admins 267: Hoarding Cache

2.5 Admins

Play Episode Listen Later Oct 2, 2025 26:11


The weird errors you see when your root partition is full, TikTok uses a lot of bandwidth by preloading videos, and dealing with a ZFS pool that won't import.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation   […]

FLYTECH Podcast
Apple vs Musk ⚖️ | EV Lease Hacks

FLYTECH Podcast

Play Episode Listen Later Oct 2, 2025 6:31


Today on FLYTECH Daily, Nick & Michelle break down the top 5 tech stories you need to know — in under 10 minutes:   Apple vs. Musk: Apple fires back at Elon Musk's lawsuit over its OpenAI deal, calling the claims “speculation on top of speculation” (Bloomberg). EV Lease Hacks: Ford & GM find a clever workaround to keep the $7,500 EV tax credit alive through leasing programs (Reuters). Porsche's OLED Flow Display: Porsche teases its Cayenne Electric with a futuristic curved OLED dashboard and new AI-powered voice assistant (Electrek, Autogefuehl). OpenAI Sora 2: Deepfake or reality? OpenAI unveils its most powerful video + audio generator yet, making hyperrealistic content mainstream (OpenAI briefing, The Verge). UK vs. Apple Encryption: The UK renews its demand for a backdoor into iCloud, reigniting the global encryption battle (Financial Times).     Takeaway: Tech isn't slowing down — from EV loopholes to AI deepfakes, the future is unfolding faster than ever.  

Lex Fridman Podcast
#482 – Pavel Durov: Telegram, Freedom, Censorship, Money, Power & Human Nature

Lex Fridman Podcast

Play Episode Listen Later Oct 1, 2025 282:37


Pavel Durov is the founder and CEO of Telegram. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep482-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/pavel-durov-transcript CONTACT LEX: Feedback - give feedback to Lex: https://lexfridman.com/survey AMA - submit questions, videos or call-in: https://lexfridman.com/ama Hiring - join our team: https://lexfridman.com/hiring Other - other ways to get in touch: https://lexfridman.com/contact EPISODE LINKS: Pavel's Telegram: https://t.me/durov Pavel's X: https://x.com/durov Telegram: https://telegram.org/ Telegram Contests: https://contest.com/ SPONSORS: To support this podcast, check out our sponsors & get discounts: Miro: Online collaborative whiteboard platform. Go to https://miro.com/ UPLIFT Desk: Standing desks and office ergonomics. Go to https://upliftdesk.com/lex Fin: AI agent for customer service. Go to https://fin.ai/lex LMNT: Zero-sugar electrolyte drink mix. Go to https://drinkLMNT.com/lex Shopify: Sell stuff online. Go to https://shopify.com/lex OUTLINE: (00:00) - Introduction (02:46) - Sponsors, Comments, and Reflections (11:29) - Philosophy of freedom (14:37) - No alcohol (22:42) - No phone (28:38) - Discipline (49:50) - Telegram: Lean philosophy, privacy, and geopolitics (1:05:12) - Arrest in France (1:21:23) - Romanian elections (1:32:18) - Power and corruption (1:41:50) - Intense education (1:53:51) - Nikolai Durov (1:58:19) - Programming and video games (2:02:33) - VK origins & engineering (2:19:46) - Hiring a great team (2:29:02) - Telegram engineering & design (2:48:04) - Encryption (2:53:01) - Open source (2:57:48) - Edward Snowden (3:00:20) - Intelligence agencies (3:01:32) - Iran and Russia government pressure (3:04:41) - Apple (3:11:38) - Poisoning (3:43:53) - Money (3:52:45) - TON (4:02:35) - Bitcoin (4:05:34) - Two chairs dilemma (4:12:14) - Children (4:23:24) - Father (4:27:55) - Quantum immortality (4:34:27) - Kafka PODCAST LINKS: - Podcast Website: https://lexfridman.com/podcast - Apple Podcasts: https://apple.co/2lwqZIr - Spotify: https://spoti.fi/2nEwCF8 - RSS: https://lexfridman.com/feed/podcast/ - Podcast Playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4 - Clips Channel: https://www.youtube.com/lexclips

Ctrl-Alt-Speech
Moderating is Such Sweet Sorrow

Ctrl-Alt-Speech

Play Episode Listen Later Oct 1, 2025 54:49 Transcription Available


In this week's roundup of the latest news in online speech, content moderation and internet regulation, Mike is joined by Dave Willner, founder of Zentropi, and long-time trust & safety expert who worked at Facebook, AirBnB, and OpenAI in Trust & Safety roles. Together they discuss:Masnick's Impossibility Theorem: Content Moderation At Scale Is Impossible To Do Well (Techdirt)UK makes new attempt to access Apple cloud data (Financial Times)Imgur pulls out of UK after data regulator warns of fines (TechCrunch)Leaked Meta guidelines show how it trains AI chatbots to respond to child sexual exploitation prompts (Business Insider)OpenAI's Sora joins Meta in pushing AI-generated videos. Some are worried about a flood of 'AI slop' (ABC News)Flights in Afghanistan grounded after internet shutdown (BBC) Ctrl-Alt-Speech is a weekly podcast from Techdirt and Everything in Moderation. Send us your feedback at podcast@ctrlaltspeech.com and sponsorship enquiries to sponsorship@ctrlaltspeech.com. Thanks for listening.

Crazy Wisdom
Episode #492: From Peer-to-Peer to Cosmolocalism: Michel Bauwens on Building the Next World

Crazy Wisdom

Play Episode Listen Later Sep 26, 2025 60:15


In this episode of Crazy Wisdom, host Stewart Alsop talks with Michel Bauwens, founder of the P2P Foundation, about the rise of peer-to-peer dynamics, the historical cycles shaping our present, and the struggles and possibilities of building resilient communities in times of crisis. The conversation moves through the evolution of the internet from Napster to Web3, the cultural shifts since 1968, Bauwens' personal experiences with communes and his 2018 cancellation, and the emerging vision of cosmolocalism and regenerative villages as alternatives to state and market decline. For more on Michel's work, you can explore his Substack at 4thgenerationcivilization.substack.com and the extensive P2P Foundation Wiki at wiki.p2pfoundation.net.Check out this GPT we trained on the conversationTimestamps00:00 Michel Bauwens explains peer-to-peer as both computer design and social relationship, introducing trans-local association and the idea of an anthropological revolution.05:00 Discussion of Web1, Web3, encryption, anti-surveillance, cozy web, and dark forest theory, contrasting early internet openness with today's fragmentation.10:00 Bauwens shares his 2018 cancellation, deplatforming, and loss of funding after a dispute around Jordan Peterson, reflecting on identity politics and peer-to-peer pluralism.15:00 The cultural shifts since 1968, the rise of identity movements, macro-historical cycles, and the fourth turning idea of civilizational change are unpacked.20:00 Memories of 1968 activism, communes, free love, hypergamy, and the collapse of utopian experiments, showing the need for governance and rules in cooperation.25:00 From communes to neo-Reichian practices, EST seminars, and lessons of human nature, Bauwens contrasts failed free love with lasting models like kibbutzim and Bruderhof.30:00 Communes that endure rely on transcendence, religious or ideological foundations, and Bauwens points to monasteries as models for resilience in times of decline.35:00 Cycles of civilization, overuse of nature, class divisions, and the threat of social unrest frame a wider reflection on populism, Eurasian vs Western models, and culture wars.40:00 Populism in Anglo vs continental Europe, social balance, Christian democracy, and the contrast with market libertarianism in Trump and Milei.45:00 Bauwens proposes cosmolocalism, regenerative villages, and bioregional alliances supported by Web3 communities like Crypto Commons Alliance and Ethereum Localism.50:00 Historical lessons from the Roman era, monasteries, feudal alliances, and the importance of reciprocity, pragmatic alliances, and preparing for systemic collapse.55:00 Localism, post-political collaboration, Ghent urban commons, Web3 experiments like Zuzalu, and Bauwens' resources: fortcivilizationsubstack.com and wiki.p2pfoundation.net.Key InsightsMichel Bauwens frames peer-to-peer not just as a technical design but as a profound social relationship, what he calls an “anthropological revolution.” Like the invention of writing or printing, the internet created trans-local association, allowing people across the globe to coordinate outside of centralized control.The conversation highlights the cycles of history, drawing from macro-historians and the “fourth turning” model. Bauwens explains how social movements rise, institutionalize, and collapse, with today's cultural polarization echoing earlier waves such as the upheavals of 1968. He sees our era as the end of a long cycle that began after World War II.Bauwens shares his personal cancellation in 2018, when posting a video about Jordan Peterson triggered accusations and led to deplatforming, debanking, and professional exclusion. He describes this as deeply traumatic, forcing him to rethink his political identity and shift his focus to reciprocity and trust in smaller, resilient networks.The episode revisits communes and free love experiments of the 1970s, where Bauwens lived for years. He concludes that without governance, rules, and shared transcendence, these communities collapse into chaos. He contrasts them with enduring models like the Bruderhof, kibbutzim, and monasteries, which rely on structure, ideology, or religion to survive.A major theme is populism and cultural polarization, with Bauwens distinguishing between Anglo-Saxon populism rooted in market libertarianism and continental populism shaped by Christian democratic traditions. The former quickly loses support by privileging elites, while the latter often maintains social balance through family and worker policies.Bauwens outlines his vision of cosmolocalism and regenerative villages, where “what's heavy is local, what's light is global.” He argues that bioregionalism combined with Web3 technologies offers a practical way to rebuild resilient communities, coordinate globally, and address ecological and social breakdown.Finally, the episode underscores the importance of pragmatic alliances across political divides. Bauwens stresses that survival and flourishing in times of systemic collapse depend less on ideology and more on reciprocity, concrete projects, and building trust networks that can outlast declining state and market systems.

Politicology
Epstein, Encryption, and Vanishing Trust—The Weekly

Politicology

Play Episode Listen Later Jul 26, 2025 92:23


Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and  Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals about the importance of impartial justice and truth. They dig into the U.K.'s Banter Bill and its chilling effect on free speech—an essential pillar of democratic society. And they discuss the Tornado Cash trial unfolding in Manhattan, and how it could set a precedent that reshapes Americans' digital privacy rights. These aren't just headline stories—they're stress tests for the core values that make democracy function. Then, in Politicology+ they discuss Javier Milei proving his detractors wrong and the remarkable turn around in Argentina this year.  Not yet a Politicology+ member? Don't miss all the extra episodes on the private, ad-free version of this podcast. Upgrade now at politicology.com/plus. Find our sponsor links and promo codes here: https://bit.ly/44uAGZ8 Send your questions and ideas to podcast@politicology.com or leave a voicemail at ‪(703) 239-3068‬ Follow this week's panel on X (formerly Twitter): https://twitter.com/RonSteslow https://x.com/HagarChemali Related Reading:  WSJ- Justice Department Told Trump in May That His Name Is Among Many in the Epstein Files Axios - Deputy attorney general seeking meeting with Epstein associate Ghislaine Maxwell FP - Britain's War on Speech Comes for the Pub NYTimes - As Trump Quits UNESCO, China Expands Influence - The New York Times Axios - The trial of a Tornado Cash developer begins Coindesk - Legitimate Privacy Tool or Dirty Money ‘Laundromat'? Lawyers Debate Role of Tornado Cash on Day 1 of Roman Storm Trial Learn more about your ad choices. Visit megaphone.fm/adchoices