POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Tool Update: Sigs.py Jim updates sigs.py. The tool verifies hashes for files and automatically recognizes what hash is used. https://isc.sans.edu/diary/Tool%20update%3A%20sigs.py%20-%20added%20check%20mode/31706 Google Announcing Quantum Safe Digital Signatures in Cloud KMS Google announced the option to use quantum safe digital signatures for its cloud key management system. https://cloud.google.com/blog/products/identity-security/announcing-quantum-safe-digital-signatures-in-cloud-kms Windows 11 Patch issues The February Patch Tuesday appears to have caused issues with a number of Windows 11 systems. In particular the usability of the file manager appears to be affected. https://www.windowslatest.com/2025/02/16/windows-11-kb5051987-breaks-file-explorer-install-fails-on-windows-11-24h2/ LTE/5G Vulnerabilities Researchers at the university of Florida have identified a large number of vulnerabilities in 5G and LTE networks. https://nathanielbennett.com/publications/ransacked.pdf
Zu den letzten Episoden gab es viel inhaltliches Feedback, auf das Christopher und Sylvester in Folge 19 gerne eingehen. Außerdem reden die beiden noch einmal über das Tor-Projekt, denn eine aktuelle und interessante Angriffswelle auf das System hat es gerade so nicht in die vergangene Folge geschafft. Anschließend schauen sich die Hosts einige in letzter Zeit bekannt gewordene Security-Fails an. Die sind teilweise wirklich erschreckend und fanden sich ausgerechnet in Produkten von IT-Sicherheitsfirmen. So mancher Hersteller muss sich offenbar nochmal die Basics hinter die Ohren schreiben. Um Zertifikate geht es natürlich auch wieder, denn was wäre das Internet, ohne Geknarze in seiner Public-Key-Infrastruktur? - [Frontal-Bericht](https://www.youtube.com/watch?v=7anmIIwg0gI) - [BCP-38](http://www.bcp38.info/index.php/Main_Page) - [Passwort-Hashing-Funktionen](https://www.heise.de/hintergrund/IT-Security-Wie-Schluesselableitungsfunktionen-funktionieren-und-was-sie-leisten-9241241.html) - [Géant vs. Sectigo](https://doku.tid.dfn.de/de:dfnpki:tcsfaq:aktuellesituation) Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort
Brendan Schaub reveals talking it out with SteveWillDoIt after Steve made some negative Twitter/X posts about him, Bryan discusses why he's really starting to like MMA reporter Luke Thomas, and the guys talk current events around the world including Reggie Bush getting back his Hesiman Trophy, Kanye's new venture and much more! True Classic - Upgrade your wardrobe and get up to 25% OFF @trueclassic at https://trueclassic.com/FIGHTER ! #trueclassicpod #sponsored JOYMODE - https://usejoymode.com/fighter or enter code: Fighter at checkout for 20% off your first order Sportsmans's Cove Lodge - http://alaskasbestlodge.com/ Use code “TFATK” at checkout for 10% off your first trip! Fieldcraft Survival - https://fieldcraftsurvival.com/fighter Use code: Fighter20 for 20% OFF Training and Product Happy Hippo - https://happyhippo.com/pages/brendan-schaub Promo Code: Thiccc24 for 20% OFF for LIFE!
What do you know about cryptography? Have you ever wanted to get a better understanding of some of the maths behind encryption? This week we speak to Ed, a Senior Technologist at PI, about some of the history and basics of encryption. Find out more about encryption: - Computerphile on youtube (https://www.youtube.com/@Computerphile) is a computer science professor with a range of useful and accessible videos on encryption - Cloudflare have a helpful learning centre including this article on how encryption works and why cloudflare use Lava lamps to generate keys: https://www.cloudflare.com/en-gb/learning/ssl/lava-lamp-encryption/ - This is a helpful article on Diffie-Hellman including a diagram of the colours demonstration, which Ed discusses during the podcast: https://www.comparitech.com/blog/information-security/diffie-hellman-key-exchange/ - This article is great for learning more about hashing: https://auth0.com/blog/hashing-in-action-understanding-bcrypt/ - And if you're interested here is the wikipedia page on the Skytale sticks Ed talks about (https://en.wikipedia.org/wiki/Scytale) Learn more about PI's work on encryption: - PI's main encryption learn page: https://privacyinternational.org/learn/encryption - A PI report on the importance of End to End Encryption (E2EE): https://privacyinternational.org/report/4949/securing-privacy-end-end-encryption
1986, Mexico City, Nairobi, Phnom Penh, Frankfurt, DC area Hashes, --- Send in a voice message: https://podcasters.spotify.com/pod/show/ononh3/message Support this podcast: https://podcasters.spotify.com/pod/show/ononh3/support
This Week: The Chiefs! Drastic temperatures and snow in the South East. Strep throat. Dust mites. Shoe spikes. Justin takes up tap dancing. Hash is fucking dog food. Farmer's Dog. Why is rent so much? Why are mortgages so much? T. Swift is not “unlucky”. Tearful fans. Digging Up the Past in Paris. The black-eyed pea capital of the world. That piece of magic bread under hot chicken. "If it's dirty, it's good". Done with pancakes. Recorded January 21st, 2024 We would be honored by your support and, sweet Jesus, it would help Justin sleep at night: https://anchor.fm/sushi-jackknife/support Nathan and Justin's Music: https://judystruckstop.bandcamp.com/ As Always: Twitter: @SushiJackknife @badlandsbadley @Bob_ThangPod Email: sushijackknife@gmail.com instagram: justindrakecroft, siddandthefinches --- Support this podcast: https://podcasters.spotify.com/pod/show/sushi-jackknife/support
The American Democracy Minute Radio Report & Podcast for Jan. 18, 2024Louisiana Legislature Hashes Out New Court-Ordered Congressional Maps with Two Majority Black DistrictsRacing the clock, the Louisiana legislature meets this week to hash out new court-ordered Congressional voting districts, with two of them being majority Black. They're also considering new state supreme court districts.Our podcasting host recently made changes which stops us from including our entire script as part of the podcast content. To view the whole script, please go to our website and find today's report.Today's LinksArticles & Resources:American Democracy Minute - Appeals Court (Finally) Finds Louisiana Congressional Map was Discriminatory; Orders New Maps to Be Drawn by January 15Democracy Docket - 5th Circuit Sets Timeline for New Louisiana Congressional Map Ahead of 2024 ElectionsLouisiana Illuminator - Both parties push for Louisiana's second majority-Black congressional districtLouisiana Illuminator - Map with 2nd Black Louisiana Supreme Court district clears House committeeAssociated Press - Proposed Louisiana congressional map, with second majority-Black district, advancesLouisiana Illuminator - How Gov. Jeff Landry is proposing to ‘close' Louisiana's primariesGroups Taking Action:NAACP Legal Defense Fund, ACLU Louisiana, Power Coalition for Equity and JusticePlease follow us on Facebook and Twitter and SHARE! Find all of our reports at AmericanDemocracyMinute.orgWant ADM sent to your email? Sign up here!#Democracy #DemocracyNews #VotingRightsAct #FairMaps #EndGerrymandering #lalege #lagov
Robert De Niro and his ex-assistant Graham Robinson have “fully and finally resolved” their nasty court battle — and the legendary actor will NOT appeal the recent court decision entered against him.Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In dieser Folge wird es wieder etwas technischer. Zusammen mit Renè Pickhardt schauen wir unter die Lightning-Haube und darauf, was das Zahlungsnetzwerk eigentlich im Innersten zusammenhält. HTLCs - eine Zusammensetzung aus Hash, Time, Lock und Contract - sind hierbei ein essenzieller Bestandteil. Doch noch besser wären PTLCs, bei denen Points die Hashes ersetzen. Damit wären neue Funktionen, mehr Privatsphäre und ne ganze Menge anderer geiler Shice möglich. Doch wie funktioniert das alles noch einmal? Was macht Punkte kryptographisch besser als Hashes? Welche Anwendungsszenarien ergeben sich daraus und was ist ein realistischer Zeitplan für die Umsetzung? Dazu reden wir über den aktuellen Stand der Pickhardt-(Richter)-Payments, über deutsche Zukunftsgeldgeschichten in China, lernen viel über den Median und fassen unsere Erfahrungen aus 20 Monaten Value4Value-Experiment zusammen.(tl;dl: fetzt!) Doch hört selbst!
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/twit
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Last week's news about evidence of LastPass vault decryption targeting cryptocurrency keys, and the UK's backing down on its encryption monitoring legislation. How hardware security modules (HSMs) allow cryptographic operations like code signing without exposing private keys. Browser identity segregation using multiple profiles rather than separate browsers. Requirements and best practices for securely wiping data from modern solid state drives. A countdown clock for the 32-bit UNIX time rollover in the year 2038. Steve's plan to move off Twitter and onto email lists for Security Now communication. A deep dive into cryptographic hash collisions, using fewer hash bits, and balancing anonymity with statistical meaning. Show Notes - https://www.grc.com/sn/SN-940-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.
Ricky Martin and his ex-husband Jwan Yosef have reached a settlement in their divorce in record time, RadarOnline.com has learned.Advertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In order to truly understand why Bitcoin works, we must understand a fundamental tool that operates at basically every level of the system. The hash function. And using the hash function, we can build one of the most important elements of the game theory that keeps the system honest, Proof of work. This is the second episode of the Bitcoin Basics series: Hashes & Proofs of Work To play around yourself with the hashing tools discussed you can: - open a Terminal window on your Mac or Linux computer and type... shasum -a 256 [insert file] Replacing [insert file] with the file path of whatever you wish to hash (you can usually drag and drop) - On Windows open the "command prompt" and type... Get-FileHash -Path [insert file] To verify my Proof of Work done in the episode: echo -n "H18" | shasum -a 256 (this works on Mac & Linux, but unfortunately the process on Windows was too complicated to go through the trouble of confirming it) Don't forget to check out our amazing sponsors: • Dive into the Bitcoin only wallet, the cypherpunk calculator, and a company that has built secure Bitcoin products for nearly a decade. Code BITCOINAUDIBLE gets 9% off everything in your cart! (https://guyswann.com/coldcard) • Gets sats back every time you dump fiat at a store, to pay your bills, everything in your fiat life pays you sats with the Fold Debit Card and FoldApp. 20,000 FREE SATS! at (https://guyswann.com/fold) • The best place to onboard a true Bitcoiner - Stack sats automatically, withdraw automatically, and learn or get help from the best team of Bitcoiners out there with Swan Bitcoin. (https://swanbitcoin.com/guy) -------------------------------------- "You never change things by fighting the existing reality. To change something, build a new model, that makes teh existing model obsolete." – R. Buckminster Fuller Learn more about your ad choices. Visit megaphone.fm/adchoices
In order to truly understand why Bitcoin works, we must understand a fundamental tool that operates at basically every level of the system. The hash function. And using the hash function, we can build one of the most important elements of the game theory that keeps the system honest, Proof of work. This is the second episode of the Bitcoin Basics series: Hashes & Proofs of Work To play around yourself with the hashing tools discussed you can: - open a Terminal window on your Mac or Linux computer and type... shasum -a 256 [insert file] Replacing [insert file] with the file path of whatever you wish to hash (you can usually drag and drop) - On Windows open the "command prompt" and type... Get-FileHash -Path [insert file] To verify my Proof of Work done in the episode: echo -n "H18" | shasum -a 256 (this works on Mac & Linux, but unfortunately the process on Windows was too complicated to go through the trouble of confirming it) Don't forget to check out our amazing sponsors: • Dive into the Bitcoin only wallet, the cypherpunk calculator, and a company that has built secure Bitcoin products for nearly a decade. Code BITCOINAUDIBLE gets 9% off everything in your cart! (https://guyswann.com/coldcard) • Gets sats back every time you dump fiat at a store, to pay your bills, everything in your fiat life pays you sats with the Fold Debit Card and FoldApp. 20,000 FREE SATS! at (https://guyswann.com/fold) • The best place to onboard a true Bitcoiner - Stack sats automatically, withdraw automatically, and learn or get help from the best team of Bitcoiners out there with Swan Bitcoin. (https://swanbitcoin.com/guy) -------------------------------------- "You never change things by fighting the existing reality. To change something, build a new model, that makes teh existing model obsolete." – R. Buckminster Fuller Learn more about your ad choices. Visit megaphone.fm/adchoices --- Send in a voice message: https://podcasters.spotify.com/pod/show/bitcoinaudible/message
In Hour 4, Tobin lashes out on Lebron for 10 straight minutes while Leroy attempts to box in this Semantic Samurai. We close the show out with a interview of the former Boxing Promoter of the year, newly inducted Florida Boxing Hall of Famer and friend of the show Peter Khan joins us with Hialeah Gardens' very own Alien King Aaron Aponte.
Software Engineering Radio - The Podcast for Professional Software Developers
Roberto Di Cosmo, Computer Science professor at University Paris Diderot and founder of the Software Heritage initiative, discusses how to protect against sudden loss from the collapse of a "free" source code repository provider, how to protect...
Gisele Bündchen appears to have broken her silence on her marriage troubles with Tom Brady by leaving a cryptic comment on a post. Listen here and learn more at RadarOnline.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Nextauth.js account takeover due to parsing flaw, URL parsing flaw in Go's net/url, another path traversal, Slack exposes password hashes (whaaat!?), Twitter exposes 5.4 million accounts, ransomware and research against PyPI and GitHub, videos from fwd:cloudsec 2022. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw207
Nextauth.js account takeover due to parsing flaw, URL parsing flaw in Go's net/url, another path traversal, Slack exposes password hashes (whaaat!?), Twitter exposes 5.4 million accounts, ransomware and research against PyPI and GitHub, videos from fwd:cloudsec 2022. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw207
Philippe Humeau joins us this hour to talk about CrowdSec - an IDS/IPS that uses crowd sourced information to evaluate threats on your network! -- During The Show -- 01:00 New Red Hat CEO Matt Hicks New Red Hat CEO (https://www.redhat.com/en/about/press-releases/red-hat-names-matt-hicks-president-and-chief-executive-officer) 03:44 Remove all traces of a user on logout? - Wayne TailsOS (https://tails.boum.org/) Noah's hackish solution TempFS? RamDisk? SquashFS? 'Delete' isn't a thing (Inodes) PhotoRec (https://www.cgsecurity.org/wiki/PhotoRec) 09:30 Recommendations for hosting provider - Gary Gary's Site (https://www.shawanga.com/) Host Gator Self Host with Hugo Tied to Hosting provider 14:00 Listener responds about CAD on Linux - Heath FreeCAD (https://www.freecad.org/) LibreCAD (https://librecad.org/) TinkerCAD (https://www.tinkercad.com/) Run under Wine 15:30 More Info about Steve's Solar? - Ian Steve likes his EnPhase Solar (https://enphase.com/) setup Hacks Home Assistant Integration (https://github.com/briancmpbll/home_assistant_custom_envoy) 18:30 News Wire Linux Better on i9 Systems Ghacks (https://www.ghacks.net/2022/07/09/linux-is-performing-better-than-windows-11-according-to-this-benchmark-test/) UltimateXR XR Today (https://www.xrtoday.com/virtual-reality/ultimatexr-launches-free-open-source-unity-tool/) EMQX 5.0 EIN News (https://www.einnews.com/pr_news/580326713/emqx-5-0-released-the-ultra-scalable-open-source-mqtt-broker) Calibre 6.0 9 to 5 Linux (https://9to5linux.com/calibre-6-0-released-with-full-text-search-arm64-support-on-linux-qt-6-port) Budgie Desktop 10.6.2 Buddies of Budgie (https://blog.buddiesofbudgie.org/budgie-10-6-2-released/) Linux Mint 21 Beta 9 to 5 Linux (https://9to5linux.com/linux-mint-21-beta-is-now-available-for-download-heres-a-first-look) Debian GNU/Linux 11.4 9 to 5 Linux (https://9to5linux.com/debian-gnu-linux-11-4-bullseye-released-with-79-security-updates-and-81-bug-fixes) Kali Linux on Linode Help Net Security (https://www.helpnetsecurity.com/2022/07/11/linode-kali-linux/) Paladin Cloud Security-as-Code Virtualization Review (https://virtualizationreview.com/articles/2022/07/11/paladin-cloud.aspx) Android Zero Day XDA Developers (https://www.xda-developers.com/pixel-6-galaxy-s22-linux-kernel-vulnerability-root-android/) OrBit Malware Cyper Security News (https://cybersecuritynews.com/orbit-undetected-linux-malware/) CrowdSec Interview Philippe Ew-Mow from CrowdSec (https://www.crowdsec.net/) What is CrowdSec How CrowdSec works Domains and Hashes vs IP Address and Behavior How IPs are cleaned Reporting based on "identity" not IP Address IDS and IPS CrowdSec Agent and CrowdSec Console Open Source Cyber Threat Intelligence (CTI) CrowdSec API How does CrowdSec resolve IDS and IPS problems? Blocking Unique Attacks The 3 Tiers of Crowdsec CrowdSec and GDPR Using Crowdsec Bouncers (IPS) CrowdSec Best Practices Replay Mode Integration into Firewalls CrowdSec on OPNSense (https://www.crowdsec.net/blog/crowdsec-arrives-on-opnsense) Best place to get started/learn CrowdSec Docs (doc.crowdsec.net) 49:00 Thoughts on CrowdSec Noah has been playing with CrowdSec Can also identify and block malicious out going traffic 51:00 Interview with Matt Hicks Interview with Matt Hicks (YouTube) (https://www.youtube.com/watch?v=qWg5cRH9YQg) -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/294) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed) Special Guest: Steve Ovens.
The Wonderswan Episode: A Little Extra Free Time, 35 Minutes, The Wonderswan's Story, Boring Emulation, Vertical/Horizontal, The Extra Work, Joy From Obscurity, The Perfect Grey Market, Hashes and Dumps, The Joy to Play. Announcing the Wonderswan collection at https://archive.org/details/wonderswan-library which has settled down to about 260 games, all playable and all rather interesting, especially if the Swan was never a part of your life, like me.
Immer mehr Darstellungen von sexuell missbrauchten Kindern fluten Teile des Internets. Die EU reagiert mit einem Gesetz. Doch schießt Brüssel über das Ziel hinaus? Weltweit werden laut EU-Kommission 85 Millionen Bilder und Videos mit Missbrauch-Darstellungen gemeldet, plus Dunkelziffer. Gigantischen Mengen von Darstellungen missbrauchter Kinder fluten also Teile des Netzes. Am Mittwoch hat die EU-Kommission deshalb einen Maßnahmenkatalog dagegen vorgelegt. EU-Innenkommissarin Ylva Johansson spricht von einer bahnbrechenden Gesetzgebung und sagt: "And to the perpetrators. We are coming for you.” Doch an dem Gesetzentwurf hagelt es Kritik. Denn die EU-Kommission will dazu Chat-Apps wie WhatsApp oder Facebook Messenger einspannen und die privaten Nachrichten ihrer Nutzer durchleuchten", sagt Jannis Brühl, Leiter des SZ-Digitalteams. Google, Facebook und Co sollen künftig jede Nachricht in jedem privaten Chat mit "Hashes", also digitalen Fingerabdrücken, scannen. Dabei seien diese Kriminellen vor allem im Darknet oder auf bestimmte Plattformen im Netz aktiv. Beim Kampf gegen die Darstellung von Kindesmissbrauch und deren Verbreitung dürfe "nicht die demokratische Kontrolle ausgeschaltet werden", meint Brühl. Im Grund drohe da "Big Brother", die Dystopie von George Orwell. Weitere Nachrichten: Ukraine stoppt Gas-Transit, Maskenpflicht fällt bei Flügen weg, Musk will Trump zurück bei Twitter. Moderation, Redaktion: Lars Langenau Redaktion: Vinzent-.Vitus Leitgeb Produktion: Immanuel Pedersen _Zusätzliches Audiomaterial über EU-Kommission _
¿Cuáles son las novedades de Bitcoin y su ecosistema más relevantes para un inversor que han ocurrido en el último año? En esta charla con Ricardo Pérez-Marco, doctor en Matemáticas especializado en estudios sobre sistemas dinámicos, Bitcoin, Blockchain y plataformas descentralizadas y trader, repasamos los acontecimientos más relevantes ocurridos desde que grabamos el episodio 44 de este podcast. Si te interesa Bitcoin puedes también escuchar el debate que tuvimos con Enrique Gallego en los episodios 41 y 42, así como el primer podcast que grabé con Ricardo en los episodios 32 y 33.Temas comentados: Evolución del precio, capitalización de mercado y volatilidad de Bitcoin en el último año. Adopción de Bitcoin como moneda de curso legal por El Salvador y la República Centroafricana. Análisis de los Bitcoin no movidos, los que probablemente estén perdidos y los que tienen los Exchanges. Composición de los integrantes del mercado: Hodlers, compradores institucionales y especuladores. Premio Ricardo Pérez-Marco de Olimpiadas Matemáticas. Tasa de Hashes de bitcoin como indicador de salud de la red. Introducción de Taproot para mejorar la privacidad y la capacidad de Bitcoin para crear smart contracts. Lightning Network para poder hacer micropagos con satoshis de forma casi instantánea. Recomendaciones para comprar y custodiar satoshis. Evolución de las principales criptomonedas por capitalización de mercado en el último año. Sesgo de supervivencia en las inversiones. Más info con enlaces a los contenidos comentados en el Blog de Juan Such en Rankia:https://www.rankia.com/blog/such/5385832-56-invertir-bitcoin-novedades-ultimo-ano-ricardo-perez-marco
Michael Saylor Interview - Transkription & Übersetzung Teil 1/2 erschienen am 29.11.2021 bei der TC Show Quelle: https://youtu.be/wdJFeSY8UVk transkribiert & übersetzt: @Chris_SHA256 Die Bitcoin Bibliothek distanziert sich von den Inhalten der Tucker Carlson Show abseits des transkribierten Interviews. Die Bitcoin Bibliothek auf Telegram: https://t.me/btc_bibliothek Bitcoin Bibliothek auf Twitter: https://twitter.com/BTC_Bibliothek Lightning Tips Bitcoin Bibliothek: Chris_SHA256@ln.tips "Die Miner bilden eine Wand aus verschlüsselter Energie, sie wandeln Elektrizität in Hashes. Und innerhalb dieser Wand aus Elektrizität, dieser Energiewand, ist der Bitcoin-Ledger, das Kassenbuch, das dezentralisiert verteilt ist." Podcasting 2.0 App: https://breez.technology/ https://www.fountain.fm/
Good ole Jerry hash stops by to sit with us and hash out life it with us!! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
My friend and fellow student of money codenamed "Lester" joins me for a multi-episode conversation exploring the excellent book "The Twilight of Gold" by Melchior Palyi.Be sure to check out NYDIG, one of the most important companies in Bitcoin: https://nydig.com/GUESTLester's Twitter: https://twitter.com/ProgrammableTxBOOKThe Twilight of Gold: https://archive.org/details/twilightofgold190000paly/PODCASTPodcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsE?si=wgVuY16XR0io4NLNo0A11A&nd=1RSS Feed: https://feeds.simplecast.com/MLdpYXYITranscript:OUTLINE00:00:00 “What is Money?” Intro00:00:08 Some Reflections on The Bank of England00:05:11 Bitcoin as “The Ultimate Land Grab”00:09:46 Stock-to-Flow Ratios and the Contradiction of a Gold Standard00:15:58 England's Subjugation of India through Force and Money00:20:20 Hashes per Kilowatt Hour per Sat: The Most Stable Metric00:29:00 The Human Obsession with Automaticity00:33:21 A Potential Weakness in Bitcoin: Rule Changes00:34:27 NYDIG00:35:35 The Key to Sustainable Social Institutions: Resistance to Rule Changes00:41:34 The Weaponization of Inflation and Deflation00:45:36 Real Price Deflation and the Future of Employment00:49:29 Bitcoin Incentivizes You to Improve the Intelligence of Others00:53:00 Gold as a “Pre-Commitment Mechanism”00:56:00 Bitcoin as the Ultimate Ulysses Contract01:00:24 How the Gold Standard Directly Incentivizes War01:02:43 There are Only Two Ways to Resolve Disputes: Contract and ConflictSOCIALBreedlove Twitter: https://twitter.com/Breedlove22WiM? Twitter: https://twitter.com/WhatisMoneyShowLinkedIn: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22?lang=enAll My Current Work: https://linktr.ee/breedlove22WRITTEN WORKMedium: https://breedlove22.medium.com/Substack: https://breedlove22.substack.com/WAYS TO CONTRIBUTEBitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Sats via Tippin.me: https://tippin.me/@Breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://venmo.com/code?user_id=1784359925317632528The "What is Money?" Show Patreon Page: https://www.patreon.com/user?u=32843101&fan_landing=trueRECOMMENDED BUSINESSESWorldclass Bitcoin Financial Services: https://nydig.com/Join Me At Bitcoin 2022 (10% off if paying with fiat, or discount code BREEDLOVE for Bitcoin): https://www.tixr.com/groups/bitcoinconference/events/bitcoin-2022-26217Automatic Recurring Bitcoin Buying: https://www.swanbitcoin.com/breedlove/Buy Bitcoin in a Tax-Advantaged Account: https://www.daim.io/robert-breedlove/Buy Your Dream Home without Selling Your Bitcoin with Ledn: https://ledn.io/en/?utm_source=breedlove&utm_medium=email+&utm_campaign=substack
LeMarkus Bailey's Exclusive Interview with Eastern Michigan RB Jawon Hamilton --- Support this podcast: https://anchor.fm/insidethehashes3/support
Kris Thomas' Exclusive Interview with Central Missouri DL Chima Dunga --- Support this podcast: https://anchor.fm/insidethehashes3/support
Kris Thomas' Exclusive Interview with Arkansas LB Grant Morgan --- Support this podcast: https://anchor.fm/insidethehashes3/support
Kris Thomas' Exclusive Interview with Old Dominion OL Isaac Weaver --- Support this podcast: https://anchor.fm/insidethehashes3/support
In der zweiten Folge des Nodesignal-Buchclubs besprechen Jan-Paul, Thorsten, Chris, Martin und Calso das zweite Kapitel des Buches "Bitcoin begreifen" von Kalle Rosenbaum. Das Buch ist im Original unter dem Titel "Grokking Bitcoin" erschienen. Die deutsche Übersetzung des Buches stammt von Volker Herminghaus. In den nächsten Wochen werden nach und nach weitere Folgen des Buchclubs erscheinen, in denen das Buch Kapitel für Kapitel besprochen und diskutiert wird. Hier könnt ihr uns eine Spende über Lightning da lassen: ⚡️ tip@tip.nodesignal.space -------------- Blockzeit: 714841 Themen des zweiten Kapitels: Kryptografische Hashfunktionen Nutzen und Anwendung von Hashfunktionen Digitale Signaturen Private/Public Key Verfahren Hashfunktionen und digitale Signaturen in Bitcoin -------------- Wenn ihr Bock habt bei einer Folge dabei zu sein, kontaktiert uns gerne über Twitter. Für Feedback und weitergehenden Diskussionen kommt gerne in die Telegramgruppe von Nodesignal und bewertet uns bei Spotify und Apple Podcasts.
Ned McCann's Exclusive Interview with Central Arkansas WR LuJuan Winningham --- Support this podcast: https://anchor.fm/insidethehashes3/support
Sam Kirk's Exclusive Interview with Valley Christian HS WR Jurrion Dickey --- Support this podcast: https://anchor.fm/insidethehashes3/support
Cam Mellor and Ian Cummings talk NFL Draft news with Tony Pauline about several CFB prospects who may stay at school another season or declare for the NFL Draft. Cam and Ian then discuss some of the better coaching hires by various programs, preview the College Football Playoff, and discuss several NFL Draft prospects on Between the Hashes. Learn more about your ad choices. Visit megaphone.fm/adchoices
Oli and Ian are here for you weekly episode of Between the Hashes. They discuss Garrett Wilson and if he's going to be the WR1 for this draft class. With tons of receivers entering the draft, Oli and Ian break down their top five and who their sleepers are. With players returning to school to play another year at the college level, we discuss who you should be looking out for in the 2023 NFL Draft class. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Between the Hashes crew is back and here for your latest updates on everything draft news. Tony gives you what he's hearing in regards to big names like Kaleb Eleby and Desmond Ridder. The crew breaks down the Senior Bowl quarterbacks and who they think can shine. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join our Patreon for exclusive content & bonus episodes: www.patreon.com/highscore510 ----more---- AG3 & DJartt are in studio w/ GUESTS: 1) Hashes Clay of Chillville Brand (@hashesclay) Marijuana Sommelier, Food Critic, & 420 Entrepreneur 2) Ben "BG the Juice Man" Artist & Boxing Expert Topics: 1) Interview w/ Cannabis & Food Vlogger, Hashes Clay {6:40} 2) BOXING!!! {18:50} Oleksandr Usyk defeats Anthony Joshua Wilder vs Fury 3 is here! Who wins & why? 3) Pumpkin Spice Season Taste Test!!! {40:08) ----more---- ***CUTTY CORNER SHOUTOUTS*** {46:55} SPECIAL THANKS to Hashes & BG for joining us! *Patreon Page: www.patreon.com/highscore510 *Email: (HighScore510.Fans@gmail.com) *MUSIC BY: Taj Easton (https://www.tajeaston.com) *SPONSORS: New Parkway Theatre, Oakland: https://www.thenewparkway.com Til Infinity Clothing: https:/ttps://tilinfinityco.com
In this Safeguarding Podcast with Hany Farid, Professor at the University of California, Berkeley: PhotoDNA, what is is and how it works, what PhotoDNA doesn't do, what are Hashes and do they work in an End-to-End Encrypted world, is Apple's NeuralHash child safety proposal the incipient slippery slope as many claim, Apple's Secret Sharing Threshold and why that's a problem, and "WhatsApp's hypocrisy". Links to other relevant content: The Good, the Bad and the Ugly of Apple's Curate's Egg: https://safetonetfoundation.org/2021/08/12/apples-curates-egg/ CSI Apple: The Omnibus Edition https://safetonetfoundation.org/2021/08/26/csi-apple-the-omnibus-edition/ You've Already Agreed to Apple's CSAM Detection but you just didn't know it: https://safetonetfoundation.org/2021/08/18/youve-already-agreed-to-apples-csam-detection-but-you-just-didnt-know-it/ Safeguarding Podcast with Glen Pounder CCO Child Rescue Coalition: https://safetonetfoundation.org/2021/08/28/safeguarding-podcast-jane-with-glen-pounder-coo-child-rescue-coalition/ Apple's notice on Expanded Protections for Children: https://www.apple.com/child-safety/ WhatsApp's website: on-device scanning for contraband content: WhatsApp automatically performs checks to determine if a link is suspicious. To protect your privacy, these checks take place entirely on your device, and because of end-to-end encryption, WhatsApp can't see the content of your messages. https://faq.whatsapp.com/android/security-and-privacy/suspicious-links/?lang=en WhatsApp's website on CSAM detection: Our detection methods include the use of advanced automated technology, including photo- and video-matching technology, to proactively scan unencrypted information such as profile and group photos and user reports for known CEI. We have additional technology to detect new, unknown CEI within this unencrypted information. We also use machine learning classifiers to both scan text surfaces, such as user profiles and group descriptions, and evaluate group information and behavior for suspected CEI sharing. Using these techniques, WhatsApp bans more than 300,000 accounts per month for suspected CEI sharing. https://faq.whatsapp.com/general/how-whatsapp-helps-fight-child-exploitation/?lang=en Hany Farid's Newsweek piece on WhatsApp's Hypocrisy: https://www.newsweek.com/should-we-celebrate-condemn-apples-new-child-protection-measures-opinion-1618828
In Episode 7, we chat with Nadav Kohen of Suredbits and discuss payment points as an alternative to HTLCs on the Lightning Network. In this conversation we cover: Payment points (1:55) - Blog post part 1 - HTLCs (2:00) Timelocks (4:16) HTLC drawbacks (5:38) - Payment decorrelation - Wormhole attack presented in Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability (6:35) Point time lock contracts (PTLCs) (9:50) - Adaptor signatures on Schnorr Proof of payment (13:25) Invoiceless transactions (15:05) Hashes, pre-images, and HTLC mechanics (16:35) Onion analogy (18:55) PTLC mechanics (19:30) Why don't we use PTLCs today? (22:15) Lightning in Scriptless Scripts posting by Andrew Poelstra March 2017 Improving proof of payment (26:10) Stuckless payments (30:46) Spam on Lightning (35:46) Selling Signatures and Schnorr signatures off the main chain (36:55) Contingent payments (39:20) Escrow contracts (41:28) Atomic multiparty setup and payment renegotiation (46:02) ETA of payment points (48:02) Thanks as always to Matthew Zipkin for the sound engineering.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Whats App Phishing https://www.heise.de/newsticker/meldung/Phishing-Mails-gaukeln-Ende-von-WhatsApp-Abonnement-vor-4447165.html Encrypted EMail Phishing https://www.bleepingcomputer.com/news/security/phishing-scam-asks-you-to-login-to-read-encrypted-message/ Android Apps Link to Fake Sites https://news.drweb.com/show/?i=13313&lng=en&c=5 Precomputed Hash Tables https://a.ndronic.us/pre-computed-hash-table-v-1-0/
Best selling author PJ Colando joins the show today to talk about her latest, "Hashes & Bashes!" Her previous novel, "Stashes" is available on Amazon from PJ's author page here! Active in SCWA (Southern California Writers Association), PJ is always up to something fun! Today we'll hear her story and so much more! Call 323 657-1493 to ask a question and join the fun! Take the Rated G Radio10 Question Anonymous Survey! Buy Garrett's album BLOND JESUS!Rated G Radio is on iTunes. Get the most recent 300 episodes free here!