German cipher machine
POPULARITY
Episode 170 of The Watchman Privacy Podcast – Torchlight Chat – The Enigma Machine: Hiding in the Open The Enigma Machine was significant in how it changed the conversation about how to protect information. Gabriel and Urban discuss the differences and tradeoffs of encryption and steganography, and why hiding in plain sight is an important option for security. GUEST → https://x.com/realUrbanHacker WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/ CRYPTO DONATIONS →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy (Monero) →https://btcpay0.voltageapp.io/apps/3JDQDSj2rp56KDffH5sSZL19J1Lh/pos (BTC) Music by Karl Casey @ White Bat Audio
Joël is joined by fellow thoughtboter Aji Slater as they discuss their previous experiences in designing content for workshops. Learn how to best structure your workshop for an audience, the benefits of a workshop over a talk and vice versa, as well as how to tackle the different hurdles your audience might face when working through your presentation. — Try your hand at Joël's recommendation of visualising your Git Branching (https://learngitbranching.js.org/). You can watch Ali's Enigma Machine workshop here (https://www.youtube.com/watch?v=KrLVIf-pS4g), Or connect with him via LinkedIn (https://www.linkedin.com/in/doodlingdev/) Your host for this episode has been Joël Quenneville (https://www.linkedin.com/in/joel-quenneville-96b18b58/). If you would like to support the show, head over to our GitHub page (https://github.com/sponsors/thoughtbot), or check out our website (https://bikeshed.thoughtbot.com). Got a question or comment about the show? Why not write to our hosts: hosts@bikeshed.fm This has been a thoughtbot (https://thoughtbot.com/) podcast. Stay up to date by following us on social media - YouTube (https://www.youtube.com/@thoughtbot/streams) - LinkedIn (https://www.linkedin.com/company/150727/) - Mastodon (https://thoughtbot.social/@thoughtbot) - Instagram (https://www.instagram.com/thoughtbot/) © 2025 thoughtbot, inc.
In this week's episode, learn the incredible story of Alan Turing - a man who not only laid the foundations of modern computer science, but also had an immense impact on the Second World War due to his work in deciphering the Enigma code. Hosted on Acast. See acast.com/privacy for more information.
The Enigma Machine's history reveals its evolution from a commercial device to a pivotal tool for German military encryption in World War II. Despite German belief in its unbreakability, Allied efforts at Bletchley Park, led by Alan Turing and others, succeeded in decoding Enigma messages, providing crucial intelligence that influenced the war's outcome.
Dr. Stephen Phillips interviews author Charles Lachman to discuss his book, Codename Nemo: The Hunt for a Nazi U-Boat and the Elusive Enigma Machine, which tells the story of the U.S. Navy's capture of the German U-boat, U-505 on June 4, 1944.
Podcast Episode 182
How much depended on breaking Enigma's code? Mathematician James Grime and host, Alice Loxton peer beneath the hood of one of the most storied inventions in military history: the near-unbreakable Enigma Machine, used by German military throughout World War II as a means of protecting critical communications. From SPYSCAPE, the home of secrets. A Cup And Nuzzle production. Series produced by Alex Burnard, Morgan Childs, Claire Crofton, Joe Foley, Frank Palmer, Kellie Redmond and Isabel Sutton. Music by Nick Ryan. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this episode, we're back at Bletchley Park, the secret base of the Code Breakers of World War Two. Tom sits down with Erica & Dr. Thomas to unpack a man often associated with codebreaking, Alan Turing, to find out the truth, the fiction and the legacy of one of Bletchley's most famous names. LinksHere's an deep dive video into the Enigma Machine with Erica Follow Bad Manors on InstagramFollow Tom on Instagram and TikTokTake a look at Bletchley Park Credits Produced by Atomized Studios for iHeartRadioHost: Tom HoughtonProducers: Willem Olenski, Rebecca Rappaport & Chris AttawayExecutive Producers: Faye Stewart & Zad RogersProduction Manager: Kaitlin ParamorProduction Coordinator: Bella SaliniSee omnystudio.com/listener for privacy information.
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage, told by historian Alice Loxton. Coming soon to the Spyscape Podcast Network.
Dawn's guest is the hilarious author of the book, Your Child is Not Broken - How to Parent Your Neurodivergent Child Without Losing Your Marbles. Find her and the organization she runs in the UK for other parents of neurodivergent children who struggle in school, EOTAS Matters. Dawn's SourcesBook - Alan Turing, ENIGMA by Anna Revell (2017) Doc - Alan Turing: The Scientist who Saved the Allies Essay - Turing and Autism [Autism Parent Magazine]----See Dawn on THE HISTORY CHANNEL!Crazy Rich AncientsHistories Greatest Mysteries (several coming next season)HILF is now on Patreon! ---NEXT NEW EPISODE:Nov. 22nd, 2023 - Cleopatra, Part 1, with comedian Kiki Andersen.HILF is part of The DEN - Deluxe Edition Network. Go there to find your NEXT favorite podcast!---WANNA TALK? Find us on Instagram or email us hilfpodcast@gmail.comTheme song: Composed and performed by Kat Perkins.
The Great James Bond Car Robbery | 007 | Mission | Heist | True Crime
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage, told by historian Alice Loxton. Coming soon to the Spyscape Podcast Network.
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage, told by historian Alice Loxton. Coming soon to the Spyscape Podcast Network.
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage, told by historian Alice Loxton. Coming soon to the Spyscape Podcast Network.
True Russian Spy Missions: Espionage | Investigation | Historical
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage, told by historian Alice Loxton. Coming soon to the Spyscape Podcast Network.
The Enigma Machine. The B2 stealth bomber. The poisoned-tipped umbrella. Napoleon's Briefcase of Secrets. As long as there has been conflict, there have been spies, and as long as there have been spies, there have been incredible gadgets and iconic objects. These are the stories of the tools that power the world of espionage.
A British party of Lieutenant Francis Fasson, Able Seaman Colin Grazier, and canteen assistant Tommy Brown, boarded the slowly-sinking submarine after it had been damaged by depth charges and retrieved the Enigma codebooks and all the current settings for the U-boat ...
In June 1944 five Destroyer Escorts had a giant success in capturing German U-Boat 505. The capture was a huge development in the war, as the United States now had access to an Enigma Machine, acoustic torpedo, and submarine to study. DEs USS PILLSBURY (DE-133), USS POPE (DE-134), USS FLAHERTY (DE-135), USS CHATELAIN (DE-149), and USS JENKS (DE-665) made up Escort Division 4 and worked together to capture the U-Boat.Follow along with our transcript and check out the photos on our website. If you like what you hear and are able to help us out by leaving a donation, we appreciate every dollar we are given! Donations are used to restore, preserve, and educate the public about USS SLATER and Destroyer Escorts. USS SLATER is a private not-for-profit museum that receives no regular support from New York State, the federal government, or the US Navy. We are funded by private donations, ticket, and merchandise sales. Thanks for listening and lending your support!Support the show
The British had been hugely successful at breaking German codes in the First World War. The Germans were determined not to let that happen again. This time they had Enigma, a code machine that produced messages that could not be decrypted. Or so the Germans believed.
On this episode, I'm on a top secret mission at Bletchley Park, the secret base of the Code Breakers of World War Two. It's here that Head of the S.I.S. Sir Admiral Hugh Sinclair, quietly recruited the country's brightest and best mathematicians, puzzle solvers, and service professionals to develop an intelligence gathering code, breaking crack force. Join me, Erica & Dr. Thomas as I attempt to break some code and change the course of history forever... or just figure out what I drunkenly texted the family WhatsApp last Christmas. Tom will be performing his new work in progress all month at Edinburgh Festival. Catch the show everyday at 7pm at the Laughing Horse at The Counting House (Aug 7-27).Ticket info here.LinksHere's an deep dive video into the Enigma Machine with Erica Follow Bad Manors on InstagramFollow Tom on Instagram and TikTokTake a look at Bletchley Park Credits Produced by Atomized Studios for iHeartRadioHost: Tom HoughtonProducers: Willem Olenski, Rebecca Rappaport & Chris AttawayExecutive Producers: Faye Stewart & Zad RogersProduction Manager: Kaitlin ParamorProduction Coordinator: Bella SaliniSee omnystudio.com/listener for privacy information.
Episode 181, Recorded 8/16/2023. Sparkly Vampires. Facebook listens and other shocking tech news in Tech. Famous Marlins. Buffalo fights. Thanks to our sponsors. Todd's Theater Corner. Is that Knott's Landing? An eternity of Macs. No free lunch.
Alan Mathison Turing was a British mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist. Turing was highly influential in the development of theoretical computer science, providing a formalization of the concepts of algorithm and computation with the Turing machine, which can be considered a model of a general-purpose computer. He is widely considered to be the father of theoretical computer science and artificial intelligence. Travel to Italy With Me here Travel to Japan With Me here Bonus episodes as well as ad-free episodes on Patreon. Find us on Instagram. Join us on Discord. Submit your relatives on our website Join the Book Club on http://chirpbooks.com/history Get some delicious COFFEE Podcast Youtube Channel Learn more about your ad choices. Visit megaphone.fm/adchoices
Anna and Paul discuss probability theory, secret Nazi codes, Jurassic Park, tuberculosis, the first vegan, and sacrificing everything for your country in a deep podcast. Grab your code-breaking manual and let's head into the trenches of World War II! Follow @engineering_history_podcast on Instagram to keep up with our latest updates :)
Back from the archives! We loved our discussion with Dr. Andrew Hammond, Historian and Curator of the International Spy Museum so much that we brought it back for your enjoyment this week! Hammond takes us through the classic period of espionage and the reliance on physical data and spycraft techniques to transport through to the modern day battlefield of cyber intelligence and espionage. And he provides insights on the historical throughlines of attacks that haven't really changed over the centuries, by and large what is being sought is the same it is simply the mechanism by which exploits are executed have evolved. He also lends perspective on the cyber threat landscape ahead, and asks is this the dreadnought moment? Dr. Andrew Hammond, Historian & Curator at the International Spy Museum Dr. Andrew Hammond is Historian & Curator at the International Spy Museum. His interest in intelligence came from a period of service in the Royal Air Force, with secondments to the British Army and the Royal Navy. He specializes in military and intelligence history and is fascinated by how the artifacts at the Museum – whether an Enigma Machine, a Stinger Missile or the Jester's Laptop – help tell personal stories and larger historical narratives. He is the author of a forthcoming book entitled, Struggles for Freedom: Afghanistan and US Foreign Policy Since 1979 and is working on another book that tells the story of 9/11 and the post-9/11 wars through the voices of military and intelligence veterans. He has taught at a number of institutions on both sides of the Atlantic and has held fellowships at the British Library, the Library of Congress, New York University and the University of Warwick. He was formerly a Mellon Public Humanities Fellow at the 9/11 Memorial Museum and is currently a Public Policy Fellow at the Wilson Center. He hosts SpyCast, the Museum's podcast, and has taken acting and public speaking courses in London, New York, Birmingham and Washington, DC. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e235
Dorian Lynskey and Ian Dunt explain the most misunderstood ideas and people in politics. This time: part 2 of their Winston Churchill deconstruction. The pair chronicle the turbulent decade that defined Churchill's political legacy. From Munich and his unexpected elevation to power, from the Bengal Famine to victory over Hitler, his surprise defeat in the 1945 election and his long, gloomy decline, they look at a life which still casts a shadow over Britain. And they even read Boris Johnson's Churchill book, so you don't have to. Churchill craved greatness. Did he live up to his ideal? There's only one way to find out… Listen to next week's episode right now when you support Origin Story on Patreon: www.Patreon.com/originstorypod “I think what he did was primarily journalism, rather than being a prime minister.” – Ian Dunt “People think they can look at Churchill like a lifestyle guru they can replicate without the nuance.” – Dorian Lynskey “Churchill personifies the European confusion that has lasted in this country to the present day” – Ian Dunt Reading List: Churchill by Roy Jenkins The Churchill Factor by Boris Johnson Churchill: Military Genius or Menace? By Stephen Napier Churchill and Orwell: The Fight for Freedom by Thomas E. Ricks Churchill: Walking with Destiny by Andrew Roberts Oblivion or Glory: 1921 and the Making of Winston Churchill by David Stafford Churchill's Shadow by Geoffrey Wheatcroft Free Thinking: Churchill's Reputation – BBC Radio 3 Written and presented by Dorian Lynskey and Ian Dunt. Audio production and music by Jade Bailey. Logo art by Mischa Welsh. Lead Producer is Anne-Marie Luff. Group Editor: Andrew Harrison. Origin Story is a Podmasters production. https://twitter.com/OriginStorycast Learn more about your ad choices. Visit megaphone.fm/adchoices
Sezar, El-Kindi, Vigenere, Enigma Makinesi ve gizlilik içinde yaşayan kahramanlar... İnternet güvenliğini daha iyi anlamak için, kriptografinin kısa bir tarihine bakacağız. Sezar'dan 1970'lere kadar süren bir yolculuk olacak..Bu podcast, Cambly hakkında reklam içerir.Cambly'nin %60 indirimden 6fular koduyla yararlanmak için aşağıdaki linke tıklayın.https://cambly.biz/6fularCambly Kids'in %60 indiriminden 6fularkids koduyla yararlanmak için ise aşağıdaki linke tıklayın.https://cambly.biz/6fularkidsBölümler:(00:04) Güven. (02:00) Sezar Şifresi. (05:00) El-Kindi ve Frekans Analizi.(06:40) Vigenere Şifresi.(10:55) Enigma Makinesi.(18:04) Marian Rejewski.(20:45) Alan Turing. (23:25) 70'ler: İkinci Kriptografi Devrimi. (25:00) Patreon teşekkürleri..Kaynaklar:Yazı: Kriptografi tarihiVideo: How did the Enigma Machine work?Video: Turing's Enigma Problem - ComputerphileVideo: 158,962,555,217,826,360,000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Episode: 2666 Codes, ciphers and Alan Turing. Today codes, ciphers and Alan Turing.
Welcome to episode 9 of Hattie Talks: Mathematics! Today, in honour of the upcoming Remembrance Day, I'm talking about the Enigma machine - in under 10 minutes. Enjoy the new longest episode yet!
Pastor Levi Matteson continues in our sermon series, This Means War, with instructions on how to get messages from God in our battle for truth. The Scripture text: John 1:38-50, 14:16-18,25-27, 15:1-8; Gal.5:13-26.This podcast episode is a Sunday message from Evangel Community Church, Houghton, Michigan, September 25, 2022.
Doug jumped into the universe created by Enigma Studios to follow the fantastic sci-fi horror story told through the games The Enigma Machine, ECHOSTASIS, Mothered, & Mothered Demo.
PlayersToo Podcast - A Video Game Podcast For Gamers Like You, By Gamers Like You!
On this week's PlayersToo Podcast: The PS5's price is being raised around the world — but not in the USA A UK consumer champion plans to sue Sony for ‘ripping off' gamers PlayStation have bought mobile gaming specialists Savage Studios Xbox's Activision deal is facing closer scrutiny from the UK's competition watchdog As ever we share what we've been playing this week, and shout-out to other stories including: review scores for Saints Row and Immortality; a falsely rumoured Amazon takeover of EA and more! We finish the show with our PlayAlong discussion on The Enigma Machine and The Floor is Jelly, two indie games included in the recent Itch.io Bundle for Abortion Funds – find out what we thought of these wildly different games, and why you should give them a try! Our PlayAlong game for September is Inscryption, the critically adored roguelike deckbuilder from Daniel Mullins! Play as we do and join us on the first show of October to hear what we think. Find and follow PlayersToo on: Twitter // Facebook // Instagram // YouTube If you enjoy this podcast PLEASE give 5 stars and a review on Apple Podcasts and Spotify – it would help us out so much! PlayersToo is back next week with more news and discussion - join us! Until then, find our show notes and links at playerstoo.com
PlayersToo Podcast - A Video Game Podcast For Gamers Like You, By Gamers Like You!
On this week's PlayersToo Podcast: our Gamescom Opening Night Live recap special! We run through every game shown at Geoff Keighley's latest summer showcase, giving you our take on the ones to watch and the flops just minutes after the show wrapped. From huge IP like Hogwarts Legacy, Gotham Knights and Sonic Frontiers to some intriguing smaller titles and everything in between, we've got you covered with all the news you need from Gamescom. Our PlayAlong games for August are The Enigma Machine and The Floor is Jelly, two wildly different indies from Itch's recent Bundle for Abortion Funds. Play as we do and join us on the first show of September to hear what we think. Find and follow PlayersToo on: Twitter // Facebook // Instagram // YouTube If you enjoy this podcast PLEASE give 5 stars and a review on Apple Podcasts and Spotify – it would help us out so much! PlayersToo is back next week with more news and discussion - join us! Until then, find our show notes and links at playerstoo.com
اینکه پیام هایی که میفرستیم به دست گیرندۀ مورد نظرمون برسند مهمه، ولی مهمتر از اون اینه که فقط به دست گیرندۀ مورد نظرمون برسند! مخفی کردن پیام ها از هر شخصی به جز کسی که میخوایم اونو دریافت کنه انگیزه اولیهای برای بوجود آمدن علم رمزنگاری بود. توی این اپیزود به تاریخ رمزنگاری از زمان یونانیان باستان تا به امروز و کاربرد های دیگر آن میپردازیم.
PlayersToo Podcast - A Video Game Podcast For Gamers Like You, By Gamers Like You!
On this week's PlayersToo Podcast: Xbox reacts to PlayStation's complaints about Call of Duty going exclusive At the same time, Xbox reveal Sony pay companies not to appear on Game Pass Square Enix are considering selling stakes in their remaining studios Marvel's Midnight Suns and Hogwarts Legacy join a recent raft of game delays As always we start the show with what we've been playing, and shout out to other stories including reviews for Spider-Man on PC and Cult of the Lamb, a new Middle-Earth game from Weta Workshop, and Forspoken's terrible new trailer. We finish the show with a look ahead to next week's Gamescom Opening Night Live showcase - what games do we expect to see and what are our expectations for the event? Our PlayAlong games for August are The Enigma Machine and The Floor is Jelly, two wildly different indies from Itch's recent Bundle for Abortion Funds. Play as we do and join us on the first show of September to hear what we think. Find and follow PlayersToo on: Twitter // Facebook // Instagram // YouTube If you enjoy this podcast PLEASE give 5 stars and a review on Apple Podcasts and Spotify – it would help us out so much! PlayersToo is back next week with more news and discussion - join us! Until then, find our show notes and links at playerstoo.com
PlayersToo Podcast - A Video Game Podcast For Gamers Like You, By Gamers Like You!
On this week's PlayersToo Podcast: GTA VI details emerge: new setting, female protagonist and more PlayStation and Nintendo report falling sales; chip shortage and economy blamed Sony contest Xbox Activision deal, saying CoD could affect gamers' console choice Aspyr's Knights of the Old Republic remake has been delayed indefinitely Plus shout-outs to more stories including: this month's PS Plus and Xbox Game Pass games; reviews for Xenoblade Chronicles 3; MultiVersus is a huge hit and more! We begin the show as always with what we've been playing and finish with our PlayAlong discussion of the majestic puzzlers Monument Valley 1 and 2! Our PlayAlong games for August are The Enigma Machine and The Floor is Jelly, two wildly different indies from Itch's recent Bundle for Abortion Funds. Play as we do and join us on the first show of September to hear what we think. Find and follow PlayersToo on: Twitter // Facebook // Instagram // YouTube If you enjoy this podcast PLEASE give 5 stars and a review on Apple Podcasts and Spotify – it would help us out so much! PlayersToo is back next week with more news and discussion - join us! Until then, find our show notes and links at playerstoo.com
Alcatraz. Once America's most notorious prison now houses four makeshift, dummy heads. Painstakingly crafted and topped with real human hair; how did these masks help destroy the reputation of America's most formidable prison? The Enigma Machine is among the many guns, planes and chilling machines of war at the National Museum of the Navy. How did this machine help to win World War Two? And is Walter's Museum of Art in Baltimore, Maryland the actual home of the Mona Lisa?For even more Mysteries at the Museum, head to discovery+. Go to discoveryplus.com/mystery to start your 7-day free trial today. Terms apply.Find episode transcripts here: https://mysteries-at-the-museum.simplecast.com/episodes/prison-ploy-enigma-machine-mona-lisa
Sean talks about going to a shooting range and the first rule of gun safety (just have fun with it), why most dads are bad people, and Tony explains how a mathematician helped end World War II. Featuring a surprise ending: Sean's camera cuts out for the last 10 minutes of the show.
"here's how the Enigma machine works"
This will probably be the last podcast for a while, so we better talk about some video games. We Played... Euam finished SPG (that's shread playing game) Artful Escape and checks out Enigma Machine. He also attempts to play Oxenfree, but it does not go well.Calum talks new Apex Legends season content. Timestamps... 3:14 - We are very tired5:26 - Local COVID Updates13:45 - The Artful Escape18:19 - Oxenfree might be busted on PC?20:59 - Phasmophobia in VR hurts.22:57 - The Enigma Machine26:42 - Apex Legends34:12 - Music Intermission36:40 - News - FFXIV Endwalker is delayed48:04 - News - Steam Deck and Playdate are also delayed into next year51:01 - News - Overwatch 2 and Diablo 4 are also also delayed into * checks notes * 2023?!55:29 - News - Microsoft are making much needed improvements to the Xbox App for PC57:33 - News - The Nintendo Switch Online Pass Expansion is making people very very unhappy.1:01:43 - News - MercurySteam left a bunch of developers out of the credits for Metroid Dread, saying that's just how the system works. Youch.1:05:27 - News - Eurogamer ran possibly the best interview in games journalism as they grilled a head of EA FIFA about lootboxes. Everyone should read this.1:11:51 - News - The long rumoured GTA Trilogy "Definitive Edition" appears to be pretty definitively terrible.1:19:50 - End of year plans. Intro Music - There It Is - Kevin MacLeod (incompetech.com) Outro Music - Honey Bee - Kevin MacLeod (incompetech.com) News Sting - News Intro - Maximilien (soundbible.com) All Licensed under Creative Commons: By Attribution 3.0
The Fantasy Football Weekly crew guides you through a week full of injuries and illnesses, give you players whom to take a chance on, give premature speculation, and Charch gives a brief history lesson in WW2 history. Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
Episode 271. Topic: Enigma machine. Theme: Spying. What is the enigma machine and why is this type of encryption so hard to break? What eventually solved it and how did it influence the second world war?
Executive Director of Computer Museum of America Rena Youngblood is in the studio for today's episode of Atlanta Real Estate Forum Radio. Joined by co-hosts Carol Morgan and Todd Schnick, the group discusses several can't miss exhibits, fun-filled summer camps and an exciting in-person event! Youngblood is the first Executive Director of the Computer Museum of America. Before joining the museum team, she worked in education and association for over 10 years. She was with the Georgia Charter School Association for seven years and then moved on to the National Teacher's Association for five years. In January of 2020, Youngblood fell in love with the potential of the museum and started working with the nonprofit. The mission of the Computer Museum of America is to preserve, educate, inspire and empower. The museum is designed to help everyone – children and adults – remember how far we have advanced with technology in a relatively short amount of time. Located in Atlanta, the museum offers a look into the past and a glimpse of the future of computing. Due to the COVID-19 (coronavirus) pandemic, the Computer Museum of America had to make several changes like many other businesses in the world. During this change, the museum shifted its focus internally. While visitors were not allowed to attend the museum, the staff of the Computer Museum of America worked to upgrade the design and layout of the building to better prepare for when people could return. The Computer Museum of America is gearing up for its first event planned to take place on April 29, 2021. Bytes, Brews and Bourbon is the first of many after-hours events. Taking place on Thursday from 5:30 p.m. to 9 p.m., the event will have live music from The Bourbon Brothers, delicious light appetizers, adult beverages for purchase and the unveiling of a new exhibit. The new exhibit will feature computers from movies. The museum currently has several fun-filled and informative exhibits for attendees to peruse. The Timeline of Computer History offers a complete timeline of artifacts from the digital past through today. Highlights include Datapoint 2200, Altair 8800 and an original Apple 1, as well as Atari 2600, Gameboy, Nintendo, Commodore 64 and so much more! The entire timeline has over 2,000 points of interest. Another fascinating exhibit at the museum is A Tribute to Apollo 11. This immersive exhibit offers viewings of an animated documentary, Getting to the Moon and Back, as well as several types of computers NASA used. The exhibit also features dioramas of scenes from Apollo 11-17. A Tribute to Apollo 11 joined the museum after the 50th anniversary of the mission in 2019. The Supercomputing exhibit at the Computer Museum of America offers an extensive collection of supercomputers. This exhibit illustrates the impact of these machines on daily lives from weather predictions to artificial intelligence and cybersecurity. The most recent exhibit from the Computer Museum of America is The Enigma Machine. Used by the Germans in World War II, this machine was designed to secure communication between military personnel. Around 40,000 Enigma machines were created, and it is estimated that less than 300 are currently intact today. Gearing up for the summer, the Computer Museum of America has four week-long camps planned in the upcoming months. Attendance in the summer camps will be capped at 10 campers per class. The Full STEAM Ahead summer camp is designed for fourth- through eighth-graders. Each day, campers will take on one of the elements of STEAM, progressing through science, technology, engineering, art and math. Running from 9 a.m. to 3 p.m. Monday through Friday, the camp is expected to have tons of fun activities, experiments and learning opportunities. To register for one of the summer camps, visit www.computermuseumofamerica.org/calendar. In addition to the 35,000 square feet of museum,
Episode: 2666 Codes, ciphers and Alan Turing. Today codes, ciphers and Alan Turing.
We get caught up on some wacky news stories, read a powerful listener email, share a few rants and play a hilarious round of Weird Trivia! Topics: Queen's Gambit, UFOs, Monoliths, Enigma Machine, Movie Theater Future, Book Treasure Found, Porn Lawsuit and more!
A conversation about mathematics inspired by an Enigma machine. Presented by Katie Steckles and Peter Rowlett, with special guest Tom Briggs.
A conversation about mathematics inspired by an Enigma machine. Presented by Katie Steckles and Peter Rowlett, with special guest Tom Briggs.
On this episode of the world famous Sofa King Podcast, we look at the life and imagination of Ian Fleming. Fleming was of course, the creator of the iconic James Bond and author of a dozen Bond books, but he was also a key figure in British Intelligence during WWII. In fact, many people say his depiction of Bond is one of the most accurate depictions of what a spy was like during the war. His own exploits involve trying to steal an Enigma Machine, training one of the most important commando-spy units in Great Britain, and even helping draft the key elements of the CIA in Washington, D.C. He was a drinker, a womanizer, an adulterer, and a spy, and the world was made better for him. He was born to a very wealthy family. His grandfather was the founder of a bank, and the family had deep pockets and strong political connections. His father died in the trenches in WWI, and he grew up a smart and inquisitive child (though not one who cared for school work). Eventually, he was sent to a boarding school in Austria where he could train to join the Foreign Office. He applied for work there, but he failed to land a job. So, his mom got him a post as a reporter, and he traveled extensively, even coming close to an interview with Joseph Stalin. When the war started, his mother got him hired as the assistant of Admiral Godfrey, head of Naval Intelligence. From there, Ian Fleming had a sterling career. He wrote a thing called the Trout Memo, came up with plans to steal an Enigma Machine, trained the 30th Commando and worked with the SOE. His men were the epitome of British Intelligence officers, trusted by the Navy, and responsible for securing plans for things like the V-2 Rocket and the Messerschmitt Me 163 fighters. He was also close with Wild Bill Donovan, who was the chief liaison between British and American Intelligence during the war. In fact, the two of them wrote the blueprints for what would become the CIA. After the war, he went back to being a journalist, but was bored to tears by it. His job allowed him three months of vacation every year, and he built a house in Jamaica, called Golden Eye, which is where he would stay. Eventually, one of his long time girlfriends/affairs, was left by her husband (she and Ian were having an affair while also having affairs on each other…). They married, and before the marriage, he was challenged to write Casino Royale, the first Bond story. So how was this book received? What did his friends think, and why did the publisher decide to print it? Where did he get the name James Bond from? What spies and events were his novels based on? How much did he smoke and drink each day? How many affairs did he have? How did the movie deals come to be, and why is JFK key for the success of James Bond? Listen, laugh, learn. Visit Our Sources: https://www.cia.gov/news-information/featured-story-archive/2018-featured-story-archive/ian-fleming-the-man-behind-the-most-famous-spy.html https://en.wikipedia.org/wiki/Ian_Fleming https://www.ianfleming.com/ian-fleming/ https://www.nytimes.com/2008/11/09/travel/09Jamaica.html https://www.theguardian.com/books/2019/nov/11/extraordinary-letters-between-ian-fleming-and-wife-to-be-sold https://www.famousauthors.org/ian-fleming https://www.youtube.com/watch?v=8cIcFSDa79Y https://blog.bookstellyouwhy.com/bid/290676/book-collector-s-tidbits-ian-fleming-and-james-bond
Breaking an unbreakable code to save, at the very least, millions and millions of lives. To possibly stop Hitler from taking over the world. That was the unimaginably stressful task assigned to a select group of codebreakers during WW2. And, the codebreaking all-stars were initially primarily composed of a group of POLISH mathematicians - I know, right? JK. And then later, British, French, and Americans helped them. They were all racing against the clock to deconstruct the most powerful encoding machine of their day - the Enigma machine. The Enigma machine allowed its operator to type in a message and then scramble it into a code that many deemed totally unbreakable. But Allied codebreakers, lead by genius Alan Turning, did break it. Over and over again. And every time they did, the Nazis created a new, advanced model. Back and forth it went for years. The Nazis used Enigma Machines for ALL their most important military communications: ambushes, bombing raids, U-boat attacks in the North Atlantic on Allied supply lines, and more. And if the codebreakers hadn't kept beating the Enigma, the war would've claimed an estimated 14 to 21 million additional lives. And Hitler might have won. THIS is our epic tale for today. Hail Nimrod! In honor of Veteran’s Day, November 11th, we are making a Bad Magic Productions donation of $10,000 to https://veteransfoodpantry.org/. Thank you Space Lizards! Allen and Linda Erickson founded the NW Montana Veterans Pantry & Stand Down over twenty years ago to serve the veteran community in the Flathead Valley and North West region of Montana. They have since expanded their operations to include a variety of other veteran services. To find out more, visit: https://veteransfoodpantry.org/ Also, through November 23rd, we are accepting Giving Tree applications to help give numerous Cult of the Curious families a holiday Bojangles would be proud of. If you have children, and due to financial hardships, are worried there will no gifts to open this holiday season, we want to help! Please - copy and paste the following email: givingtree@badmagicproductions.com you can remain anonymous if you wish. Watch the Suck on YouTube: https://youtu.be/4Sxi48qqMbo Merch - https://badmagicmerch.com/ Discord! https://discord.gg/tqzH89v COTC private FB Group: https://www.facebook.com/groups/cultofthecurious/ For all merch related questions: https://badmagicmerch.com/pages/contact Please rate and subscribe on iTunes and elsewhere and follow the suck on social media!! @timesuckpodcast on IG and http://www.facebook.com/timesuckpodcast Wanna become a Space Lizard? We're over 9500 strong! Click here: https://www.patreon.com/timesuckpodcast Sign up through Patreon and for $5 a month you get to listen to the Secret Suck, which will drop Thursdays at Noon, PST. You'll also get 20% off of all regular Timesuck merch PLUS access to exclusive Space Lizard merch. You get to vote on two Monday topics each month via the app. And you get the download link for my new comedy album, Feel the Heat. Check the Patreon posts to find out how to download the new album and take advantage of other benefits. See omnystudio.com/listener for privacy information.
Eliminate logging hassles. Emile shows how to integrate QRZ online logging with Logbook Of The World for a simple, quick single log entry across platforms. Mike presents our friend Chip, K9MIT’s Enigma Machine. Pull out those floppy disks and relive the days of early PCs and DOS. George goes old school DOS on the Raspberry Pi with Dosbox. Announcing the AmateurLogic.TV 15th Anniversary Contest. This perfect QRP package includes the Icom IC-705 all band all mode transceiver and Utility Backpack, MFJ-2289PKG Big Ear Antenna package with tripod and carry bag, MFJ-4115 portable power supply, Heil Sound BM-17 headset, and the collection of Forrest Mim’s Engineer’s Mini Notebooks. Help us celebrate. Visit amateurlogic.tv/contest today for details. 1:15:14
Eliminate logging hassles. Emile shows how to integrate QRZ online logging with Logbook Of The World for a simple, quick single log entry across platforms. Mike presents our friend Chip, K9MIT’s Enigma Machine. Pull out those floppy disks and relive the days of early PCs and DOS. George goes old school DOS on the Raspberry Pi with Dosbox. Announcing the AmateurLogic.TV 15th Anniversary Contest. This perfect QRP package includes the Icom IC-705 all band all mode transceiver and Utility Backpack, MFJ-2289PKG Big Ear Antenna package with tripod and carry bag, MFJ-4115 portable power supply, Heil Sound BM-17 headset, and the collection of Forrest Mim’s Engineer’s Mini Notebooks. Help us celebrate. Visit amateurlogic.tv/contest today for details. 1:15:14
Hello Randomers and Randomites. On June 4, 1944, U.S. Naval Task Group 22.3 made sonar contact with German submarine U-505 off the coast of western Africa. After the group opened fire on the submarine, it was damaged and surfaced. The sub, its crew, documents and an Enigma Machine were captured by the Allied Forces and the sub was taken to Bermuda and now resides in the Museum of Science and Industry in Chicago, IL. One of the ships in the task group was the USS Jenks (DE-665). On board this ship was my grandfather, Joe Opsitnick. With it being Memorial Day, I reached out to him to get some of the story direct from the source. So please sit back and enjoy this tale of baseball, Naval training and warfare from one of the brave veterans who helped the United States into what it is today. Thank you to all the veterans of all wars, both those with us and those that have left us. Thank you for doing what you did to make us free. Thank a veteran and never forget what they did for us. Carnival of Randomness This episode was sponsored by Opsitnick & Associates. Lawyers and advocates for you, the people, for 40 years. Visit them on Facebook or their website
Alan Turing, his early life and the Enigma Machine.
Welcome to the History of Computing Podcast, where we explore the history of information technology. Because understanding the past prepares us for the innovations of the future! Todays episode is scraping the surface of cryptography. Cryptography is derived from the Greek words kryptos, which stands for hidden and grafein, which stands for to write. Through history, cryptography has meant the process of concealing the contents of a message from all except those who know the key. Dating back to 1900 BC in Egypt and Julius Caesar using substitution cyphers, encryption used similar techniques for thousands of years, until a little before World War II. Vigenere designed the first known cipher thatused an encryption key in the 16th century. Since then with most encryption, you convert the contents, known as plaintext, into encrypted information that's otherwise unintelligible, known as cipher text. The cypher is a pair of algorithms - one to encrypt, the other to decrypt. Those processes are done by use of a key. Encryption has been used throughout the ages to hide messages. Thomas Jefferson built a wheel cypher. The order of the disks you put in the wheel was the key and you would provide a message, line the wheels up and it would convert the message into cypher text. You would tell the key to the person on the other end, they would put in the cypher text and out would pop the message. That was 1795 era encryption and is synonymous with what we call symmetrical key cryptography, which was independently invented by Etienne Bazeries and used well into the 1900s by the US Army. The Hebern rotor machine in the 19th century gave us an electro-mechanical version of the wheel cypher and then everything changed in encryption with the introduction of the Enigma Machine, which used different rotors placed into a machine and turned at different speeds based on the settings of those rotors. The innovations that came out of breaking that code and hiding the messages being sent by the Allies kickstarted the modern age of encryption. Most cryptographic techniques rely heavily on the exchange of cryptographic keys. Symmetric-key cryptography refers to encryption methods where both senders and receivers of data share the same key and data is encrypted and decrypted with algorithms based on those keys. The modern study of symmetric-key ciphers revolves around block ciphers and stream ciphers and how these ciphers are applied. Block ciphers take a block of plaintext and a key, then output a block of ciphertext of the same size. DES and AES are block ciphers. AES, also called Rijndael, is a designated cryptographic standard by the US government. AES usually uses a key size of 128, 192 or 256 bits. DES is no longer an approved method of encryption triple-DES, its variant, remains popular. Triple-DES uses three 56-bit DES keys and is used across a wide range of applications from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Stream ciphers create an arbitrarily long stream of key material, which is combined with a plaintext bit by bit or character by character, somewhat like the one-time pad encryption technique. In a stream cipher, the output stream is based on an internal state, which changes as the cipher operates. That state's change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known stream cipher. Cryptographic hash functions do not use keys but take data and output a short, fixed length hash in a one-way function. For good hashing algorithms, collisions (two plaintexts which produce the same hash) are extremely difficult to find, although they do happen. Symmetric-key cryptosystems typically use the same key for encryption and decryption. A disadvantage of symmetric ciphers is that a complicated key management system is necessary to use them securely. Each distinct pair of communicating parties must share a different key. The number of keys required increases with the number of network members. This requires very complex key management schemes in large networks. It is also difficult to establish a secret key exchange between two communicating parties when a secure channel doesn't already exist between them. You can think of modern cryptography in computers as beginning with DES, or the Data Encryption Standard, us a 56-bit symmetric-key algorithm developed by IBM and published in 1975, with some tweaks here and there from the US National Security Agency. In 1977, Whitfield Diffie and Martin Hellman claimed they could build a machine for $20 million dollars that could find a DES key in one day. As computers get faster, the price goes down as does the time to crack the key. Diffie and Hellman are considered the inventors of public-key cryptography, or asymmetric key cryptography, which they proposed in 1976. With public key encryption, two different but mathematically related keys are used: a public key and a private key. A public key system is constructed so that calculation of the private key is computationally infeasible from knowledge of the public key, even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. In public-key cryptosystems, the public key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol. The next year, Ron Rivest, Adi Shamir and Leonard Adleman developed the RSA encryption algorithm at MIT and founded RSA Data Security a few years later in 1982. Later, it became publicly known that asymmetric cryptography had been invented by James H. Ellis at GCHQ, a British intelligence organization and that both the Diffie-Hellman and RSA algorithms had been previously developed in 1970 and were initially called “non-secret encryption.” Apparently Ellis got the idea reading a bell labs paper about encrypting voice communication from World War II. Just to connect some dots here, Alan Turing, who broke the Enigma encryption, visited the proposed author of that paper, Shannon, in 1943. This shouldn't take anything away from Shannon, who was a brilliant mathematical genius in his own right, and got to see Gödel, Einstein, and others at Princeton. Random note: he invented wearables to help people cheat at roulette. Computer nerds have been trying leverage their mad skills to cheat at gambling for a long time. By the way, he also tried to cheat at, er, I mean, program chess very early on, noting that 10 to the 120th power was the game-tree complexity of chess and wrote a paper on it. Of course someone who does those things as a hobby would be widely recognized as the father of informational theory. RSA grew throughout the 80s and 90s and in 1995, they spun off a company called VeriSign, who handled patent agreements for the RSA technology until the patents wore out, er, I mean expired. RSA Security was acquired by EMC Corporation in 2006 for $2.1 billion and was a division of EMC until EMC was acquired by Dell in 2016. They also served as a CA - that business unit was sold in 2010 to Symantec for $1.28B. RSA has made a number of acquisitions and spun other businesses off over the years, helping them get into more biometric encryption options and other businesses. Over time the 56 bit key size of DES was too small and it was followed up by Triple-DES in 1998. And Advanced Encryption Standard, or AES, also in 1998. Diffie-Hellman and RSA, in addition to being the first public examples of high quality public-key cryptosystems have been amongst the most widely used. In addition to encryption, public-key cryptography can be used to implement digital signature schemes. A digital signature is somewhat like an ordinary signature; they have the characteristic that they are easy for a user to produce, but difficult for anyone else to forge. Digital signatures can also be permanently tied to the content of the message being signed as they cannot be moved from one document to another as any attempt will be detectable. In digital signature schemes, there are two algorithms: one for signing, in which a secret key is used to process the message (or a hash of the message or both), and one for verification, in which the matching public key is used with the message to check the validity of the signature. RSA and DSA are two of the most popular digital signature schemes. Digital signatures are central to the operation of public key infrastructures and to many network security schemes (SSL/TLS, many VPNs, etc). Digital signatures provide users with the ability to verify the integrity of the message, thus allowing for non-repudiation of the communication. Public-key algorithms are most often based on the computational complexity of hard problems, often from number theory. The hardness of RSA is related to the integer factorization problem, while Diffie-Hellman and DSA are related to the discrete logarithm problem. More recently, elliptic curve cryptography has developed in which security is based on number theoretic problems involving elliptic curves. Because of the complexity of the underlying problems, most public-key algorithms involve operations such as modular multiplication and exponentiation, which are much more computationally expensive than the techniques used in most block ciphers, especially with typical key sizes. As a result, public-key cryptosystems are commonly hybrid systems, in which a fast symmetric-key encryption algorithm is used for the message itself, while the relevant symmetric key is sent with the message, but encrypted using a public-key algorithm. Hybrid signature schemes are often used, in which a cryptographic hash function is computed, and only the resulting hash is digitally signed. OpenSSL is a software library that most applications use to access the various encryption mechanisms supported by the operating systems. OpenSSL supports Diffie-Hellman and various versions of RSA, MD5, AES, Base, sha, DES, cast and rc. OpenSSL allows you to create ciphers, decrypt information and set the various parameters required to encrypt and decrypt data. There are so many of these algorithms because people break them and then a new person has to come along and invent one and then version it, then add more bits to it, etc. At this point, I personally assume that all encryption systems can be broken. This might mean that the system is broken while encrypting, or the algorithm itself is broken once encrypted. A great example would be an accidental programming mistake allowing a password to be put into the password hint rather than in the password. Most flaws aren't as simple as that. Although Kerckhoffs's principle teaches us that the secrecy of your message should depend on the secrecy of the key, and not on the secrecy of the system used to encrypt the message. Some flaws are with the algorithms themselves, though. At this point most of those are public and security without a password or private key they just take too long to decrypt to be worth anything once decrypted. This doesn't mean we don't encrypt things, it just means that in addition to encryption we now add another factor to that security. But we'll leave the history of two-factor security to another episode. Finally, RSA made a lot of money because they used ciphers that were publicly reviewed and established as a standard. Public review of various technological innovations allows for commentary and making it better. Today, you can trust most encryption systems because due to that process, it costs more to decrypt what you're sending over the wire than what is being sent is worth. In other words, collaboration trumps secrecy.
This episode of Learn Polish Podcast is about the Enigma Machine, a german cypher machine. The code done on the Enigma were first broken by Polish mathematicians. Then was added more complexity to the Enigma machine and decryption was more difficult. Please listen to the whole history in Polish, this way you will practise understanding spoken Polish. The post RP346: Jak złamano kod Enigmy appeared first on Learn Polish Language Online Resource.
We're in Milton Keynes, England, with Lindsay Williams of Lindsay Does Languages. The town is best known for Bletchley Park, where the Enigma Code was cracked during World War II. It is a short ride from London, so it makes a perfect detour to get out of the big city for a day trip. The Show notes are at https://WeTravelThere.com/milton Don’t wait in airport security lines. We have a special limited time offer for listeners. Try CLEAR free for 2 months, when you go to wetravelthere.com/clear and sign up today.
Welcome to the Enigma Machine podcast! Sit back and let us take you on a journey.
We’ve talked about encryption in just about every single one of these shows but we’ve never actually talked about what it means to encrypt something. Did you know that Julius Caesar used cryptography to send secret messages to his generals? You may have heard about the vaunted Enigma Machine used by the Germans in World War II, but how did it work? I’ll walk you through the basics of creating secret codes and how to crack them - the science of cryptography and cryptanalysis! Secret codes have one big problem, though: coded messages stick out like a sore thumb. When you capture a spy with a piece of paper full of gibberish, you can bet it’s a coded message. But what if you could hide your messages in plain site? That’s called steganography and I’ll explain how crafty people have hidden messages since the days of the Ancient Greeks. For Further Insight: The Code Book by Simon Singh The Code Breakers by David Kahn Help me to help you! Visit: https://patreon.com/FirewallsDontStopDragons
This week Alan and John discuss silencing a home server and buying the wrong ram. All links can also be found at https://polymatic.link/show41 john | Ink cartridges are a scam | https://polymatic.link/j5 alan | Building an Enigma Machine | https://polymatic.link/jd john | Linus Tech tips: sub $50 mic roundup | https://polymatic.link/j6 alan | Making a Burrito is tricky | https://polymatic.link/je john | Silencing a R210 server | https://polymatic.link/j7 alan | Hello World: The Rise of AI | https://polymatic.link/jf john | How Star Wars was was saved in the edit | https://polymatic.link/j8 alan | Building a Vortex Tube | https://polymatic.link/jg john | Gorillaz- Humility | https://polymatic.link/j9 alan | Not-A-Flamethrower Unboxing! | https://polymatic.link/jh john | Muon detector | https://polymatic.link/jc alan | Ferrofluid | https://polymatic.link/ji john | One fear to rule them all | https://polymatic.link/ja alan | COPY TV | https://polymatic.link/jj john | Garduino | https://polymatic.link/jb alan | ISTOP | https://polymatic.link/jk Music ==================== alan | Casey Abrams | Simple Life | https://polymatic.link/jl alan | Lauren Aquilina – Kicks | https://polymatic.link/jm alan | Tessa Violet | Crush | https://polymatic.link/jn john | Shirobon – Regain control | https://polymatic.link/jo Twitter: Alan http://twitter.com/chaess Twitter: John http://twitter.com/webdevvie For feedback: podcast@polymatic.media Music by Sahy Uhns . Which you can find at https://polymatic.link/ek Twitter polymatic: http://twitter.com/thepolymatic Website http://polymatic.media
The Enigma machine was an electromechanical device used extensively throughout WW2 to encrypt highly classified secret military messages and was thought to be unbreakable by the Nazi’s. The enigma messages were decoded by teams of mathematicians at Bletchley Park who helped to end the war early saving potentially 21 million lives. Facebook @robotsforeyespodcast Instagram @robotsforeyespodcast Twitter @robotsforeyes Robotsforeyes@gmail.com
Poetic Metal 2.0. The comeback episode. We discuss the future of the show, friendship, live music, and our goals moving forward. Check out Enigma Machine on Bandcamp! https://enigmamachine1.bandcamp.com/
In the latest Q and A show from The Naked Scientists, we answer your questions with the help of an expert panel - plant scientist Beverley Glover, mathematician James Grime, physicist Jess Wade and Angel investor Peter Cowley. What makes plants carnivorous, what's the highest prime number we know of, and how do WWII coding machines work? Plus, how long would a fidget spinner spin for in space, what's the best way to water a plant, and what happened to Google Glass? Like this podcast? Please help us by supporting the Naked Scientists
In the latest Q and A show from The Naked Scientists, we answer your questions with the help of an expert panel - plant scientist Beverley Glover, mathematician James Grime, physicist Jess Wade and Angel investor Peter Cowley. What makes plants carnivorous, what's the highest prime number we know of, and how do WWII coding machines work? Plus, how long would a fidget spinner spin for in space, what's the best way to water a plant, and what happened to Google Glass? Like this podcast? Please help us by supporting the Naked Scientists
John and Myself(Chris) join returning guest Nino Tuwhenaugh for our ongoing expose of the punk rock scene. Topics include: The Sex Pistols, Bill Grundy Today Show Interview, Siouxsie Sioux, Malcolm McLaren, Clifford Frith, Enigma Machine, Julian Huxley, David Livingstone, Transhumanism, Croydon College, Situationism, Situationist International, Discordianism , Kerry Wendell Thornley, Lee Harvey Oswald, Burning Man, The Occupy Movement, Ian MacKaye, UAWMF, Weather Underground, Herbert Marcuse, King Mob, Vivienne Westwood, Nihilism, Denialism, Steven Abrams, The Clash, Joe Strummer, Vegetarianism, Mick Jones, Strand School, Vince White, Stewart Home, Julia Callan-Thompson, Michael X, Gale Benson, Leonard Plugge, Malcom X, Temporary Autonomous Zone, Hakim Bey, Pedophilia, Bestiality, Musical Truths, The Kray Twins, Alfred Kinsey, I Could Puke: The Life and Crimes of Mr.� Ott, Serial Killers,Intro music "The Clash-Hateful" , Outro music "The Clash - Death Or Glory" hoaxbusterscall.com
Welcome to a special interview segment of the History of Personal Computing podcast! In this episode, David and Jeff are speaking to Sam Ammons, creator of the Mini681, a modern replica of the 1975 MITS Altair 680 microcomputer. Links mention in the show: Sam's eBay link: MITS ALTAIR 680 CLONE, MINI 681 Sam's Enigma Machine reproduction on […]
During WWII, an elite team of British codebreakers, including Alan Turing and Gordon Welchman, were tasked with cracking one of the most complex secret communication systems in existence: Hitler's... The latest in science, culture, and history from Smithsonian Channel.
Video 51 in the series "A History of the Navy in 100 Objects" presented by the United States Naval Academy. This is about the Enigma Machine.
Last week marked the 101st birthday of the code-breaker and computer scientist Alan Turing, so Ginny Smith met up with James Grime, from the Enigma Project, to find out more about the German code machine that Turing and his colleagues at Bletchley Park worked so hard to crack... Like this podcast? Please help us by supporting the Naked Scientists
Last week marked the 101st birthday of the code-breaker and computer scientist Alan Turing, so Ginny Smith met up with James Grime, from the Enigma Project, to find out more about the German code machine that Turing and his colleagues at Bletchley Park worked so hard to crack... Like this podcast? Please help us by supporting the Naked Scientists
Robin Ince and Brian Cox are joined on stage by comedian Dave Gorman, author and Enigma Machine owner Simon Singh and Bletchley Park enthusiast Dr Sue Black as they discuss secret science, code-breaking and the extraordinary achievements of the team working at Bletchley during WWII.
In this episode co-hosted by TechStuff's Jonathan Strickland, the focus is on the codes and cryptologists of World War II. Tune in to learn more about the Enigma Machine, Alan Turing, Code Talkers and more in the conclusion of this two-part episode. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisers
In this special episode co-hosted by TechStuff's Jonathan Strickland, the focus is on the codes, cipher machines, and cryptologists of World War II. Tune in to learn more about the Enigma Machine, Alan Turing, Code Talkers and more. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisers