Podcasts about Obfuscation

Intentionally confusing wording to confuse people apart from an intended audience

  • 143PODCASTS
  • 177EPISODES
  • 53mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • May 21, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Obfuscation

Latest podcast episodes about Obfuscation

Using the Whole Whale Podcast
Alert: Microsoft 365 Grant Cancelled & What you need to know

Using the Whole Whale Podcast

Play Episode Listen Later May 21, 2025 25:14


Understanding Microsoft Nonprofit Licensing Changes: Survival Guide and Solutions In this episode, Joshua Pesky, the Chief Product Officer at RoundTable, discusses with George the partial termination of Microsoft's grants program around Office 365 licenses. The discussion covers the impact on nonprofits, the timeline for changes, and possible solutions for affected organizations. Joshua explains the importance of checking license statuses through the admin portal and suggests alternatives like using web applications, Google Suites, or open-source software to mitigate costs. The episode also delves into the broader implications of tech expenses in the nonprofit sector and offers practical advice for managing these upcoming changes. 00:00 Introduction and Overview 00:02 Microsoft's Licensing Changes Explained 01:19 Impact on Organizations 02:37 Timeline and Deadlines 03:09 Options and Solutions 05:37 Navigating the Admin Portal 09:03 Financial Implications 09:50 Nonprofit Sector Challenges 11:17 Security and Obfuscation 12:10 Practical Advice and Final Thoughts 17:18 Survival Guide and Final Remarks

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday Mar 17th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 18, 2025 7:03


Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authentication Bypass in xml-crypto and Node.js libraries xml-crypto, a library use in Node.js applications to decode XML and support SAML, has found to parse comments incorrectly leading to several SAML vulnerabilities. https://workos.com/blog/samlstorm One PUT Request to Own Tomcat: CVE-2025-24813 RCE is in the Wild A just made public deserialization vulnerablity in Tomcat is already being exploited. Contributing to the rapid exploit release is the similarity of this vulnerability to other Java deserializtion vulnerabilities. https://lab.wallarm.com/one-put-request-to-own-tomcat-cve-2025-24813-rce-is-in-the-wild/ CVE-2025-24813 CSS Abuse for Evasion and Tracking Attackers are using cascading stylesheets to evade detection and enable more stealthy tracking of users https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/

The FreeNZ Podcast
Data Obfuscation in NZ Vaccine Adverse Event Reporting

The FreeNZ Podcast

Play Episode Listen Later Mar 1, 2025 39:53


An update with Data analyst Albert Benevides to look further into how Medsafe obfuscates certain data in their reports when compared to the American VAERS.We welcome all public feedback and comments in order to dig deeper into what Medsafe are doing. We thank all who've been in touch so far. Please keep sharing the series that we did on the NZ covid vaccine data, linked below.Links:- The Purposeful Hiding of Covid-19 Vaccine Deaths In NZ | PART ONE: https://rumble.com/v6kyovv-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-one.html?e9s=src_v1_ucp- PART TWO: https://rumble.com/v6l1phg-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-two.html?e9s=src_v1_ucp- PART THREE: https://rumble.com/v6laeo1-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-three.html?e9s=src_v1_ucp- PART FOUR: https://rumble.com/v6lb2a1-the-purposeful-hiding-of-covid-19-vaccine-deaths-in-new-zealand-part-four.html?e9s=src_v1_ucp- VAERS Aware - https://www.vaersaware.com/new-zealand- Welcome The Eagle on Public Tableau - https://public.tableau.com/app/search/vizzes/welcome%20the%20eagle- Welcome The Eagle Substack - https://welcometheeagle.substack.com/- Closed VAERS profile - https://substack.com/@welcometheeagle- Welcome the Eagle on Rumble - https://rumble.com/user/welcometheeagle--------Subscribe to FreeNZ:- Substack - https://freenz.substack.com- Donorbox - www.donorbox.org/support-freenz-media- Locals - https://freenz.locals.com- Buy Me A Coffee - https://buymeacoffee.com/supportfreenz

The Agenda Podcast: Decoding Crypto
MEV attacks are draining users — but encryption can stop it (feat. Shutter Network)

The Agenda Podcast: Decoding Crypto

Play Episode Listen Later Feb 19, 2025 40:35


The crypto sector has entered an era of hyperfinancialization, and with this comes predatory MEV and manipulation of blockchain activities that were originally intended to be consensus-based and decentralized. Shutter Network core contributor Loring Harkness explains why encryption and credible neutrality can make blockchain transactions fair again.(00:00) Introduction to The Agenda podcast and this week's episode(01:47) Why credible neutrality and fairness matter(11:26) Blockchain is as easy as rock, paper, scissors(17:47) Everyday use cases for encrypted blockchain transactions(20:48) Why non-finance-focused blockchains still issue tokens(23:25) Blockchain, crypto and Myanmar(29:16) Will crypto remain censorship-resistant in an age of hyperfinacialization?(35:29) Would Shutter work on MMOGs like Pokemon?The Agenda is brought to you by Cointelegraph and hosted/produced by Ray Salmond and Jonathan DeYoung, with post-production by Elena Volkova (Hatch Up). Follow Cointelegraph on X (Twitter) at @Cointelegraph, Jonathan at @maddopemadic and Ray at @HorusHughes. Jonathan is also on Instagram at @maddopemadic, and he made the music for the podcast — hear more at madic.art.Follow Loring Harkness at @LoringHarkness.Check out Cointelegraph at cointelegraph.com.If you like what you heard, rate us and leave a review!The views, thoughts and opinions expressed in this podcast are its participants' alone and do not necessarily reflect or represent the views and opinions of Cointelegraph. This podcast (and any related content) is for entertainment purposes only and does not constitute financial advice, nor should it be taken as such. Everyone must do their own research and make their own decisions. The podcast's participants may or may not own any of the assets mentioned.

TRENDIFIER with Julian Dorey
#266 - UFO Coverup: Pentagon is Hiding Holy Grail Evidence | James Fox

TRENDIFIER with Julian Dorey

Play Episode Listen Later Jan 15, 2025 98:43


SPONSORS: - Z-BIOTICS: https://zbiotics.com/JULIAN (***TIMESTAMPS in description below) ~ James Fox returns for the third time on Julian Dorey Podcast to discuss his latest Documentary, "The Program" which goes behind the Congressional hearings to leave skeptics astounded by new assertions from a growing chorus of high-level insiders who insist there is definitive proof we are not alone. Jason Sands is a new UFO whistleblower, who has recently come forward with claims about his involvement in a 20-year black budget program and a surreal Alien encounter. BUY/RENT “The Program": https://geni.us/TheProgram PATREON https://www.patreon.com/JulianDorey FOLLOW JULIAN DOREY INSTAGRAM (Podcast): https://www.instagram.com/juliandoreypodcast/ INSTAGRAM (Personal): https://www.instagram.com/julianddorey/ X: https://twitter.com/julianddorey GUEST LINKS X: https://x.com/jamescfox IG: https://www.instagram.com/jamesfoxdirector/?hl=en Watch "Momen of Contact": https://shorturl.at/tSgOQ Watch "The Phenomenon": https://shorturl.at/9RWvG LISTEN to Julian Dorey Podcast Spotify ▶ https://open.spotify.com/show/5skaSpDzq94Kh16so3c0uz Apple ▶ https://podcasts.apple.com/us/podcast/trendifier-with-julian-dorey/id1531416289 ****TIMESTAMPS**** 00:00 - James Fox from The Phenomenon to ‘The Program', D.C. Investigation 10:01 - James Disastrous Film Company Lawsuit, 26:54 - Most Satisfying UFO Documentary (Devastating Setbacks) 31:21 - Pivotal UFO Interview Moments, Disclosure vs UFO Evidence 38:51 - Reads Congressional Source Document, Photographs & Evidence 46:31 - Intel Agency Individuals & Obfuscation, Evidence Behind Jason Sand's Encounter 52:03 - Telepathic Communication Residue, Devil's Advocate & Possibly Being Lied Too 01:00:30 - Why Does Jason Sand's Have Immunity vs Coworkers, Top Secret Information SCIF (James Fox) 01:10:45 - Special Access Programs & How Information is Controlled & Not Leaked, Black Budget Programs 01:21:21 - Hearing Craziest Stories During Black Budget Program CREDITS: - Host, Producer, and Editor: Julian Dorey - In-Studio Producer: Alessi Allaman - https://www.youtube.com/@UCyLKzv5fKxGmVQg3cMJJzyQ Julian Dorey Podcast Episode 266 - James Fox & Jason Sands Music by Artlist.io Learn more about your ad choices. Visit megaphone.fm/adchoices

Robert Knauer-- UNFILTERED!
THE OBFUSCATION DISPLAYED BY DONALD TRUMP AND SO MUCH MORE

Robert Knauer-- UNFILTERED!

Play Episode Listen Later Jan 8, 2025 12:14


PODCASTER ROBERT KNAUER EXPLAINS WHY DONALD TRUMP SAYS SO MANY INANE THINGS AND WHY IT IS OBFUSCATION. HE TELLS YOU THE STRAIGHT TRUTH ABOUT WHAT HE AND THE GOP PLAN TO DO WITH PROJECT 2025 INITIATIVES AND HOW SIMILAR IT IS TO WHAT NAZI GERMANY DID IN WWII TO THE JEWS. IT IS ALL ABOUT GETTING RICH AND RICHER. THE ONLY ONES THAT WILL BE BETTER OF ARE THE WEALTHIEST OF AMERICANS.

Southview Sermons - Southview Baptist Church
Letters to the Church — The Gospel ‑ God's Solution to Sin's Obfuscation of God

Southview Sermons - Southview Baptist Church

Play Episode Listen Later Nov 24, 2024 33:32


This week, Pastor Nathan Wakefield continues the Letters to the Church series with Romans 1:18‑23. This passage shows us that true worship is a choice that honors God, recognizing Him as the ultimate source of value and truth, rather than turning to false idols that lead us astray.Sermon notes are available on YouVersion Events.Video of the worship service is available for replay.

The Daily Decrypt - Cyber News and Discussions
Unicode Obfuscation, OpenAI Malware Operations, and Urgent Patches for Mozilla and Fortinet

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 11, 2024


Video Episode: https://youtu.be/igJqDBKj13o In today’s episode, we discuss a new cybercriminal campaign utilizing Unicode obfuscation to hide the Mongolian Skimmer on e-commerce platforms, aiming to steal sensitive data. OpenAI has reported disrupting over 20 malicious operations leveraging its technology for tasks including malware development and election-related misinformation. Additionally, we cover critical vulnerabilities in Firefox and Fortinet products, emphasizing the need for urgent updates to mitigate risks and ensure cybersecurity. References: 1. https://thehackernews.com/2024/10/cybercriminals-use-unicode-to-hide.html 2. https://thehackernews.com/2024/10/openai-blocks-20-global-malicious.html 3. https://www.helpnetsecurity.com/2024/10/10/cve-2024-9680/ 4. https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html Timestamps 00:00 – Introduction 01:12 – Fortinet Urgent Patch 02:12 – Firefox Zero-Day 03:14 – OpenAI blocks 20 abusive networks 05:04 – Unicode Obfuscation 1. What are today’s top cybersecurity news stories? 2. How is the Mongolian Skimmer using Unicode to hide its malware? 3. What actions has OpenAI taken against malicious operations using its platform? 4. What are the latest updates regarding the Firefox zero-day vulnerability CVE-2024-9680? 5. What critical vulnerabilities are impacting Fortinet and Palo Alto Networks? 6. How can ransomware be concealed with obfuscated scripts? 7. Which cybersecurity threats are currently being reported by CISA? 8. What steps should be taken to secure systems against the new vulnerabilities? 9. How are cyber actors leveraging generative AI for malicious purposes? 10. What recent updates have been made to safeguard web applications from skimmers? Unicode obfuscation, Mongolian Skimmer, malware, e-commerce, OpenAI, malware, misinformation, countermeasures, zero-day, Firefox, Mozilla, vulnerability, CISA, Fortinet, vulnerabilities, cyber threats

INDIGNITY MORNING PODCAST
Episode 344: Indignity Morning Podcast No. 344: A genuinely mind-boggling piece of obfuscation.

INDIGNITY MORNING PODCAST

Play Episode Listen Later Oct 7, 2024 7:34


The Daily Decrypt - Cyber News and Discussions
700k DrayTek Routers Vulnerable, Tech Recruiters Targeted with Malware – Cybersecurity News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Oct 3, 2024


Video Episode: https://youtu.be/7et_7YkwAHs In today’s episode, we dive into the alarming rise of malware delivery through fake job applications targeting HR professionals, specifically focusing on the More_eggs backdoor. We also discuss critical gaming performance issues in Windows 11 24H2 and the vulnerabilities in DrayTek routers that expose over 700,000 devices to potential hacking. Lastly, we address the urgent exploitation of a remote code execution flaw in Zimbra email servers, emphasizing the need for immediate updates to safeguard against evolving threats. Links to articles: 1. https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html 2. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-windows-11-24h2-gaming-performance-issues/ 3. https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html 4. https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/ Timestamps 00:00 – Introduction 01:14 – Zimbra RCE Vulnerability 02:17 – 700k DrayTek Routers Vulnerable 04:36 – Recruiters Targeted with Malware 06:14 – Microsoft blocks updates for gamers 1. What are today’s top cybersecurity news stories? 2. How is More_eggs malware targeting HR professionals? 3. What vulnerabilities exist in DrayTek routers? 4. Why did Microsoft block Windows 11 24H2 upgrades? 5. What is the impact of the Zimbra RCE flaw? 6. How do fake job applications spread malware? 7. What security measures can protect against More_eggs malware? 8. What are the latest gaming issues with Windows 11? 9. How can DrayTek router vulnerabilities be mitigated? 10. What are the latest tactics used by cybercriminals in email attacks? More_eggs, Golden Chickens, spear-phishing, credential theft, Microsoft, Windows 11, Asphalt 8, Intel Alder Lake+, DrayTek, vulnerabilities, exploits, cyber attackers, Zimbra, RCE, vulnerability, exploitation, # Intro HR professionals are under siege as a spear-phishing campaign disguised as fake job applications delivers the lethal More_eggs malware, leading to potentially devastating credential theft. Powered by the notorious Golden Chickens group, this malware-as-a-service targets recruiters with chilling precision. **How are recruitment officers unknowingly downloading malicious files, and what methods are threat actors using to bypass security measures?** “Microsoft is blocking Windows 11 24H2 upgrades on some systems due to critical gaming performance issues like Asphalt 8 crashes and Easy Anti-Cheat blue screens. The company is scrambling to resolve these problems that uniquely impact devices with Intel Alder Lake+ processors.” How can gamers with affected systems work around these issues until Microsoft releases a fix? Over 700,000 DrayTek routers are currently vulnerable to 14 newly discovered security flaws, with some critical exploits that could be used to take full control of the devices and infiltrate enterprise networks. Despite patches being released, many routers remain exposed, creating a lucrative target for cyber attackers. How can these vulnerabilities impact businesses that rely on DrayTek routers for network security? Hackers are leveraging a critical Zimbra RCE vulnerability to backdoor servers through specially crafted emails that execute malicious commands, revealing widespread exploitation just days after a proof-of-concept was published. Notable security experts warn of attackers embedding harmful code in the email’s CC field, which the Zimbra server inadvertently executes. How are attackers camouflaging their malicious emails to slip through security measures unnoticed? # Stories Welcome back to our podcast. Today, we’re talking about a new cyber threat targeting HR professionals. Researchers at Trend Micro have uncovered a spear-phishing campaign where fake job applications deliver a JavaScript backdoor called More_eggs to recruiters. This malware, sold as malware-as-a-service by a group known as Golden Chickens, can steal credentials for online banking, email accounts, and IT admin accounts. What’s unique this time is that attackers are using spear-phishing emails to build trust, as observed in a case targeting a talent search lead in engineering. The attack sequence involves downloading a ZIP file from a deceptive URL, leading to the execution of the More_eggs backdoor. This malware probes the host system, connects to a command-and-control server, and can download additional malicious payloads. Trend Micro’s findings highlight the persistent and evolving nature of these attacks, which are difficult to attribute because multiple threat actors can use the same toolkits. The latest insights also connect these activities to known cybercrime groups like FIN6. Stay vigilant, especially if you work in HR or recruitment. 1. **Spear-Phishing**: – **Definition**: A targeted phishing attack aiming at specific individuals or companies, typically using information about the victim to make fraudulent messages more convincing. – **Importance**: This method is specifically dangerous because it can trick even tech-savvy users by exploiting personalized details, leading to significant security breaches like credential theft. 2. **More_eggs**: – **Definition**: A JavaScript backdoor malware sold as a malware-as-a-service (MaaS) with capabilities to siphon credentials and provide unauthorized access to infected systems. – **Importance**: Due to its ability to latently steal sensitive information and its widespread use by various e-crime groups, More_eggs represents a significant threat to corporate cybersecurity. 3. **Malware-as-a-Service (MaaS)**: – **Definition**: A business model where malicious software is developed and sold to cybercriminals who can then use it to conduct attacks. – **Importance**: This model lowers the barrier of entry for cybercriminals, allowing even those with limited technical skills to launch sophisticated attacks using pre-made malware. 4. **Golden Chickens**: – **Definition**: A cybercriminal group (also known as Venom Spider) attributed with developing and distributing the More_eggs malware. – **Importance**: Understanding threat actors like Golden Chickens can help cybersecurity professionals anticipate and defend against specific threat tactics. 5. **Command-and-Control (C2) Server**: – **Definition**: A server used by threat actors to maintain communications with compromised systems within a target network to execute commands and control malware. – **Importance**: Disrupting C2 servers is crucial because it can cut off the attacker's control over their malware, mitigating the threat. 6. **LNK File**: – **Definition**: A shortcut file in Windows that points to another file or executable. – **Importance**: Misuse of LNK files in phishing campaigns can lead to automated execution of malicious payloads, making them an effective vector for malware distribution. 7. **PowerShell**: – **Definition**: A task automation framework from Microsoft consisting of a command-line shell and scripting language. – **Importance**: PowerShell is often used by attackers to execute and conceal malicious scripts due to its powerful capabilities and integration with Windows. 8. **Tactics, Techniques, and Procedures (TTPs)**: – **Definition**: The behavior patterns or methodologies used by cyber threat actors to achieve their goals. – **Importance**: Identifying TTPs helps security professionals understand, detect, and mitigate specific attack strategies used by threat actors. 9. **Obfuscation**: – **Definition**: The process of deliberately making code or data difficult to understand or interpret. – **Importance**: Obfuscation is commonly used by malware developers to conceal malicious activities and bypass security mechanisms. 10. **Cryptocurrency Miner**: – **Definition**: Software used to perform the computational work required to validate and add transactions to a blockchain ledger in exchange for cryptocurrency rewards. – **Importance**: Unauthorized cryptocurrency mining (cryptojacking) can misuse system resources for financial gain, leading to performance degradation and security vulnerabilities. — On today’s tech update: Microsoft has blocked upgrades to Windows 11 version 24H2 on certain systems due to gaming performance issues. Players of Asphalt 8 may encounter game crashes, while some systems running Easy Anti-Cheat might experience blue screens. These problems mainly affect devices with Intel Alder Lake+ processors. Until Microsoft resolves these issues, impacted users are advised not to manually upgrade using tools like the Media Creation Tool. Microsoft is working on fixes and will include them in upcoming updates. 1. **Windows 11 24H2**: A version of Microsoft’s Windows 11 operating system, released in the second half (H2) of 2024. It is significant because it represents Microsoft’s ongoing update cycle aimed at improving system performance and user experience, though it also highlights the challenges of software compatibility and stability. 2. **Asphalt 8 (Airborne)**: A popular racing video game often used for showcasing graphical and processing capabilities of devices. Its relevance lies in exposing potential software and hardware compatibility issues when new operating systems are released. 3. **Easy Anti-Cheat**: A software tool designed to detect and prevent cheating in multiplayer games. It is crucial for maintaining fair play and integrity in online gaming environments but can pose compatibility challenges with system updates. 4. **Blue Screen of Death (BSoD)**: An error screen displayed on Windows computers following a system crash. It is important as it signals serious software or hardware issues that could affect system stability and data integrity. 5. **Intel Alder Lake+ processors**: A generation of Intel’s microprocessors known for their hybrid architecture design. Understanding these chips is important for recognizing which systems might be more susceptible to the reported compatibility issues. 6. **vPro platform**: A set of Intel technologies aimed at enhancing business security and manageability. It’s critical to cybersecurity professionals because it allows for hardware-level encryption and more robust security management, but compatibility with OS updates can be problematic. 7. **MEMORY_MANAGEMENT error**: A specific type of error indicating system memory management problems, often leading to system crashes. It is crucial for cybersecurity and IT professionals as it affects the stability and reliability of a system. 8. **Compatibility holds (Safeguard IDs)**: Mechanisms employed by Microsoft to prevent system upgrades when known issues are detected. These are essential for protecting users from potential system failures and ensuring a stable computing environment. 9. **Media Creation Tool**: A Microsoft utility used for installing or upgrading Windows OS. It's important for IT professionals as it provides a means to manually deploy Windows updates, though it highlights the risks of bypassing automatic update safeguards. 10. **KB5043145 (Preview Update)**: A specific Windows update known to cause issues such as reboot loops and connection failures. Understanding these updates is crucial for maintaining system stability and ensuring that deployed systems are free from vulnerabilities and bugs. — In a recent cybersecurity alert, over 700,000 DrayTek routers have been identified as vulnerable to hacking due to 14 newly discovered security flaws. These vulnerabilities, found in both residential and enterprise routers, include two rated critical, with one receiving the maximum CVSS score of 10.0. This critical flaw involves a buffer overflow in the Web UI, potentially allowing remote code execution. Another significant vulnerability is OS command injection via communication binaries. The report highlights the widespread exposure of these routers’ web interfaces online, creating a tempting target for attackers, particularly in the U.S. DrayTek has released patches to address these vulnerabilities, urging users to apply updates, disable unnecessary remote access, and utilize security measures like ACLs and two-factor authentication. This development coincides with international cybersecurity agencies offering guidance to secure critical infrastructure, emphasizing the importance of safety, protecting valuable OT data, secure supply chains, and the role of people in cybersecurity. 1. **Vulnerability**: A weakness in a system or software that can be exploited by hackers. – **Importance**: Identifying vulnerabilities is crucial in cyber security because it helps protect systems from attacks. 2. **Router**: A device that routes data from one network to another, directing traffic on the internet. – **Importance**: Routers are essential for internet connectivity and their security is vital to prevent unauthorized access to networks. 3. **Buffer Overflow**: A coding error where a program writes more data to a buffer than it can hold, potentially leading to system crashes or unauthorized code execution. – **Importance**: Buffer overflows are common vulnerabilities that can be exploited to gain control of a system. 4. **Remote Code Execution (RCE)**: A type of vulnerability that allows an attacker to execute code on a remote system without authorization. – **Importance**: RCE vulnerabilities are highly critical as they enable attackers to take over affected systems. 5. **Cross-site Scripting (XSS)**: A web security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites. – **Importance**: XSS can be used to steal information, deface websites, and spread malware. 6. **Adversary-in-the-Middle (AitM) Attack**: An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. – **Importance**: AitM attacks can lead to data theft, man-in-the-middle proxy attacks, and unauthorized access to sensitive information. 7. **Denial-of-Service (DoS)**: An attack intended to shut down a machine or network, making it inaccessible to its intended users. – **Importance**: DoS attacks disrupt the availability of services and can cause significant downtime and financial loss. 8. **Access Control List (ACL)**: A list of permissions attached to an object that specifies which users or system processes can access the object and what operations they can perform. – **Importance**: ACLs are crucial for implementing security policies to control access to resources. 9. **Two-Factor Authentication (2FA)**: A security process in which the user provides two different authentication factors to verify themselves. – **Importance**: 2FA improves security by adding an additional layer of verification, making it harder for attackers to gain unauthorized access. 10. **Operational Technology (OT)**: Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events in an enterprise. – **Importance**: OT security is critical for the functioning and safety of critical infrastructure systems, such as those in manufacturing, power generation, and transportation. — Today, we’re discussing a critical remote code execution (RCE) vulnerability in Zimbra email servers, tracked as CVE-2024-45519, which hackers are actively exploiting. This flaw allows attackers to trigger malicious commands simply by sending specially crafted emails, which are processed by Zimbra’s post journal service. First flagged by Ivan Kwiatkowski of HarfangLab and confirmed by Proofpoint, the exploit involves spoofed emails with commands hidden in the “CC” field. Once processed, these emails deliver a webshell to the server, giving attackers full access for data theft or further network infiltration. A proof-of-concept exploit was released by Project Discovery on September 27, prompting immediate malicious activity. Administrators are urged to apply security updates released in Zimbra’s latest versions—9.0.0 Patch 41 and later—or disable the vulnerable postjournal service and ensure secure network configurations to mitigate the threat. Stay vigilant and update your Zimbra servers immediately to protect against this critical vulnerability. 1. **Remote Code Execution (RCE)** – **Definition**: A type of security vulnerability that enables attackers to run arbitrary code on a targeted server or computer. – **Importance**: This flaw can be exploited to gain full control over the affected machine, leading to data theft, unauthorized access, and further network penetration. 2. **Zimbra** – **Definition**: An open-source email, calendaring, and collaboration platform. – **Importance**: Popular among organizations for its integrated communication tools, making it a significant target for cyberattacks due to the sensitive data it handles. 3. **SMTP (Simple Mail Transfer Protocol)** – **Definition**: A protocol used to send and route emails across networks. – **Importance**: Integral to email services, its exploitation can deliver malicious content to servers and users, forming a vector for cyber-attacks. 4. **Postjournal Service** – **Definition**: A service within Zimbra used to parse incoming emails over SMTP. – **Importance**: Its vulnerability can be leveraged to execute arbitrary commands, making it a crucial attack point for hackers. 5. **Proof-of-Concept (PoC)** – **Definition**: A demonstration exploit showing that a vulnerability can be successfully taken advantage of. – **Importance**: PoC exploits serve as proof that theoretical vulnerabilities are practical and dangerous, necessitating urgent security responses. 6. **Base64 Encoding** – **Definition**: A method of encoding binary data into an ASCII string format. – **Importance**: Often used to encode commands within emails or other data streams to evade basic security detections. 7. **Webshell** – **Definition**: A type of malicious script that provides attackers with remote access to a compromised server. – **Importance**: Webshells afford attackers sustained control over a server, allowing for ongoing data theft, disruptions, and further exploits. 8. **CVE (Common Vulnerabilities and Exposures)** – **Definition**: A list of publicly known cybersecurity vulnerabilities and exposures, identified by unique CVE IDs. – **Importance**: Helps standardize and track security issues, facilitating communication and management of vulnerabilities across the cybersecurity community. 9. **Patch** – **Definition**: An update to software aimed at fixing security vulnerabilities or bugs. – **Importance**: Patching vulnerabilities is critical for protecting systems from attacks exploiting known security flaws. 10. **Execvp Function** – **Definition**: A function in Unix-like operating systems that executes commands with an argument vector, featuring improved input sanitization. – **Importance**: By replacing vulnerable functions like ‘popen,’ ‘execvp’ helps prevent the execution of malicious code, thus enhancing system security. —

Hashtag Realtalk with Aaron Bregg
Episode 103 - Let's have a RealTalk about Your Identity Journey

Hashtag Realtalk with Aaron Bregg

Play Episode Listen Later Sep 4, 2024 48:59


In this episode I talk with Matt Berzinski  about the important of understanding that identity is a journey not a destination. Matt is the Senior Director of Product Management for Ping Identity and has extensive knowledge about identity.Talking Points:Realtime Fraud/RiskOrchestrationOrganizations (The importance of offload work that you don't need to do it)Single Sign OnMulti FactorIdentity Verification (Francis talked about a local automotive company referencing mobile apps for a car)Robot or Vehicle Identity is a relationship not a dependency (Matt has a great Rosie the Robot from The Jetsons reference)Why is Obfuscation still important? Episode Charity:Proceeds from this episode's sponsorship will be going towards the Baker-Bonsai Friendship Fund. Bruce Baker was a great bonsai tree artist and along with Deal Bull, helped make the art of bonsai be something wonderful that can be shared for future generations at the Frederik Meijer Gardens.Episode Sponsor:This episode is sponsored by Ping Identity. Ping is an identity solutions provider based out of the great state of Colorado in the awesome town that is Denver.

The Charlie James Show Podcast
Theories & Obfuscation In Butler PA

The Charlie James Show Podcast

Play Episode Listen Later Aug 28, 2024 8:05


Theories & Obfuscation In Butler PA https://www.audacy.com/989word The Charlie James Show Listen on Spotify : https://spoti.fi/3MXOvGP Apple Podcasts: https://podcasts.apple.com/us/podcast/the-charlie-james-show-podcast/id1547262821 Follow us on Social Media Join our Live Stream Weekdays - 3pm to 7pm  Facebook: https://www.facebook.com/989word Rumble: https://rumble.com/c/c-2031096 X: https://twitter.com/989word Instagram: https://www.instagram.com/989word/ "Red Meat, Greenville." 08/28/24

The Charlie James Show Podcast
Hour 4 | Politico Can't Figure This One Out; Theories & Obfuscation In Butler PA; Jack Smith's Problematic New Indictment; They Silence Republicans, Time To Shout | 08-28-24 | The Charlie James Show

The Charlie James Show Podcast

Play Episode Listen Later Aug 28, 2024 33:53


“Politico Can't Figure This One Out” “Theories & Obfuscation In Butler PA” “Jack Smith's Problematic New Indictment” “They Silence Republicans, Time To Shout”

Rav Akiva Zweig's Podcast
390. Parshas Korach-Rosh Chodesh Tamuz: In Pursuit Of Shalom + Dealing With Cancel Culture & Obfuscation Of Truth

Rav Akiva Zweig's Podcast

Play Episode Listen Later Jul 5, 2024 56:30


Flywheelpod
Bringing Real Utility to NFTs with ERC-6551 w/ Benny G, Jimmy X, & Greg - Flywheel #109

Flywheelpod

Play Episode Listen Later Jun 19, 2024 56:50


In this episode of Flywheel, hosts DeFi Dave and Kapital K delve into the innovative world of ERC-6551 and Token Bound Accounts. The discussion features Benny, the author of the ERC-6551 standard, along with Jimmy and Greg from Agent. They explore the intricacies of token-bound accounts, their potential applications, and how they could significantly enhance the utility of NFTs. The guests share insights on the creation of ERC-6551, its use cases, and ongoing developments. The episode emphasizes the transformative potential of token bound accounts and offers a glimpse into upcoming features and projects utilizing this new standard. Timeline 00:00 Introduction to Flywheel 00:38 Exploring Token Bound Accounts 02:10 Guest Introduction: Benny and the ERC 6551 Standard 05:02 The Evolution and Future of NFTs 10:27 Introducing Agent: A New Marketplace 29:26 Understanding LP Tokens and Obfuscation 29:58 Transparency and Trustlessness in Blockchain 30:45 Exploring ERC 6551 and XNFTs 32:20 Version 4 and Cross-Chain Transactions 35:10 Innovative Use Cases for TBAs 37:05 Privacy and Security in TBAs 40:23 Future of TBAs and Community Involvement 43:46 Agent Roadmap and Marketplace 46:58 Potential of TBAs in DeFi 50:37 Post-Game Show: Reflecting on TBAs~~~~ Subscribe to the Flywheel mailing list: https://flywheeldefi.com~~~~Follow FlywheelTwitter: https://twitter.com/FlywheelDeFiTelegram: https://t.me/FlywheelDeFiYouTube: @flywheeldefiSpotify: https://open.spotify.com/show/34xXNO2...Apple Podcasts: https://podcasts.apple.com/us/podcast...~~~~Connect DeFi Dave: https://twitter.com/defidave22 Kiet: https://twitter.com/0xkapital_k Sam: https://twitter.com/traders_insight Lewy: https://x.com/lewquidity ~~~~ Not financial or tax advice. This channel is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. This video is not tax advice. Talk to your accountant. Do your own research.

Heather du Plessis-Allan Drive
David Parker: Labour Foreign Affairs spokesperson says Winston Peters' feud with Australian Foreign Minister an AUKUS obfuscation

Heather du Plessis-Allan Drive

Play Episode Listen Later May 2, 2024 4:54


Labour's Foreign Affairs spokesperson says critical comments from Winston Peters are distracting from real issues. Peters criticised former Australian Foreign Minister Bob Carr in an interview - over his stance on the AUKUS pact. Carr's called those comments defamatory. Labour's David Parker says the comments are being used to obfuscate the Government shift on AUKUS. "Saying 'well, we should look at it' to saying, just a couple of weeks ago, there are powerful reasons for New Zealand to engage practically with AUKUS." LISTEN ABOVESee omnystudio.com/listener for privacy information.

Data Driven
A Data Driven Retrospective: A Look Back Through Seven Seasons and 360 Episodes

Data Driven

Play Episode Listen Later Apr 8, 2024 70:49 Transcription Available


In this landmark 360th episode of Data Driven, we take a full-circle journey back through the past seven seasons, exploring the highs, lows, and everything in-between. Frank and Andy, in their signature style, veer off the beaten path, offering listeners not just a trip down memory lane, but an off-road adventure filled with insights, laughter, and a few unexpected detours. Join us as we reflect on where we've been and, more importantly, where we're headed next in the ever-evolving landscape of data and technology. It's an episode you won't want to miss, complete with the wisdom and whimsy that only Frank and Andy can provide.Moments00:00 Simpsons celebrates 360 episodes, announces new shows.06:48 Struggling with impostor syndrome, sibling dynamics, and survival.14:37 Experiments with AI feedback, brief show intros.20:19 Challenging start, surprised by success in audio.25:17 Uneven distribution; learned from former Microsoft colleague.29:47 Struggle with communication, engineer writes terse responses.35:47 Detective describes transit system in detail.38:25 Relieved when Amazon took over sci-fi series.43:28 Discussing latest blog post on OpenAI's capabilities.52:15 Obfuscation and difficulty in accessing information persist.56:41 Equal time for Democrats and Republicans in media.01:02:36 December is a mad time due to birthdays.01:05:06 Originally planned as a video podcast, logistics issues.01:09:44 360-degree journey concludes with data-driven discussions.

Science In-Between
Episode 187: Enthusiasm and Obfuscation

Science In-Between

Play Episode Listen Later Apr 3, 2024 44:33


In this episode, we discuss leading professional development to support ongoing changes in teachers' thinking. Things that bring us joy this week: Everyone on this Train is a Suspect (https://www.harpercollins.com/products/everyone-on-this-train-is-a-suspect-benjamin-stevenson?variant=41281421475874) Articles of Interest (https://99percentinvisible.org/aoi/) Intro/Outro Music: Notice of Eviction by Legally Blind (https://freemusicarchive.org/music/Legally_Blind)

Fallacious Trump
Obfuscation - FT#146

Fallacious Trump

Play Episode Listen Later Mar 31, 2024 85:07


In the one hundred and forty sixth episode we explore the Obfuscation Fallacy, starting with Trump badly clarifying his support for Putin, Trump's Doctors pretending he wasn't given supplemental oxygen when being treated for COVID, and Kevin McCarthy denying something nobody accused him of.In Mark's British Politics Corner we look at Boris being suitably vague about his plans to run for leader and his missing WhatsApp messages, Mark Harper and Graham Stuart being unclear repeatedly about whether Lee Anderson and Frank Hester said racist things.In the Fallacy in the Wild section, we check out examples from That Mitchell & Webb Look, Star Trek IV: The Voyage Home, and Shrek the Third.Jim and Mark go head to head in Fake News, the game in which Mark has to guess which one of three Trump quotes Jim made up.Then we talk about what's going on with Trump's various court cases.And finally, we round up some of the other crazy Trump stories from the past week.The full show notes for this episode can be found at https://fallacioustrump.com/ft146 You can contact the guys at pod@fallacioustrump.com, on Twitter @FallaciousTrump, or facebook at facebook.com/groups/fallacioustrumpSupport this podcast at — https://redcircle.com/fallacious-trump/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Troubled Minds Radio
The Historic UFO Hoax - Project Maximum Obfuscation

Troubled Minds Radio

Play Episode Listen Later Mar 11, 2024 192:34


Decades of UAP sightings, government reports hinting at unexplained phenomena, and the specter of hidden power struggles over the most groundbreaking potential discoveries in human history... could it be that the truth about UFOs lies not only in the skies but within the very corridors of the institutions tasked with investigating them? Is it possible that factions within the Department of Defense are waging a silent war to control the UAP narrative, shaping what we know and burying what we don't?LIVE ON Digital Radio! http://bit.ly/3m2Wxom or http://bit.ly/40KBtlWhttp://www.troubledminds.org Support The Show!https://www.spreaker.com/podcast/troubled-minds-radio--4953916/supporthttps://rokfin.com/creator/troubledmindshttps://patreon.com/troubledmindshttps://www.buymeacoffee.com/troubledmindshttps://troubledfans.comFriends of Troubled Minds! - https://troubledminds.org/friendsShow Schedule Sun-Mon-Tues-Wed-Thurs 7-10pstiTunes - https://apple.co/2zZ4hx6Spotify - https://spoti.fi/2UgyzqMTuneIn - https://bit.ly/2FZOErSTwitter - https://bit.ly/2CYB71U----------------------------------------https://troubledminds.org/the-historic-ufo-hoax-project-maximum-obfuscation/https://media.defense.gov/2024/Mar/08/2003409233/-1/-1/0/DOPSR-CLEARED-508-COMPLIANT-HRRV1-08-MAR-2024-FINAL.PDFhttps://www.politico.com/news/2024/03/08/us-alien-spacecraft-program-pentagon-report-00146013https://www.cnn.com/2024/03/08/politics/us-military-developing-ufo-detection-kits/index.html

CISSP Cyber Training Podcast - CISSP Training Program
CCT 122: CISSP Deep Dive: Uncovering Data Encryption, Loss Prevention, and Code Obfuscation Strategies (D2.6)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 11, 2024 44:54 Transcription Available


Embarking on a new chapter in my cybersecurity journey, I can't wait to share the depth of insights that come with stepping into the consulting realm. The world of cybersecurity is ever-evolving, and I'm here to navigate this complex landscape with you, offering the expertise you need to protect your data in today's digital battleground. From deciphering the states of data to unveiling the encryption methods that keep your information safe, this episode is a goldmine for anyone serious about mastering cybersecurity, whether for the CISSP exam or the harsh realities of the industry.Have you ever considered how data encryption and loss prevention go hand-in-hand? We dissect the nuances of data in transit, weighing the benefits of end-to-end encryption against the relative vulnerabilities within internal networks. Furthermore, exploring the Tor network opens up a discussion about the trade-offs between user anonymity and the potential for identity exposure. Tackling these complex issues, we also touch on the intricacies of managing digital rights and information access, with real-world examples that bring these concepts to life for our listeners.Wrapping up, we pull back the curtain on the shadowy realm of code obfuscation, a technique that keeps the prying eyes of attackers at bay, yet can be a double-edged sword in malware defense. I share my thoughts on the careful balance required to implement obfuscation effectively, without falling into a labyrinth of confusion that could stifle your team's productivity. Join us for this deep dive into the world of cybersecurity, where practical knowledge meets real-world applications, all aimed at fortifying your defenses in the digital age.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

NewsByte
A Presidential Border Duel, a Horror in Georgia, and Deliberate Obfuscation

NewsByte

Play Episode Listen Later Mar 4, 2024 23:29 Transcription Available


Dueling Presidential border visits, an Illegal Alien Horror in Georgia, and Biden Calls the Kettle Black. There are some in your face "did they really just say that" moments this week.

Inner Moonlight
Inner Moonlight: Lisa Huffaker

Inner Moonlight

Play Episode Listen Later Jan 28, 2024 57:08


Inner Moonlight is the monthly poetry reading series for the Wild Detectives in Dallas. The in-person show is the second Wednesday of every month in the Wild Detectives backyard. We love our podcast fans, so we release recordings of the live performances every month for y'all! On 1/10/24, we featured poet and artist Lisa Huffaker! Lisa Huffaker integrates poetry, collage, book arts, and assemblage in many hybrid forms, from sculptural vending machines to a book of visual poetry created from a misogynist “self improvement” manual. Her writing is published or forthcoming in The Georgia Review, Gulf Coast, Pleiades, Cincinnati Review, Diagram, Sixth Finch, Thrush, 32 Poems, and many other journals. Her visual poetry manuscript in progress was exhibited internationally as part of TU Delft and Cornell Tech's 3rd Workshop on Obfuscation. She is Teaching Artist in Residence for the Writer's Garret, and a fine arts instructor at Oil and Cotton Creative Exchange. Find her online at lisahuffaker.com. Note: Huffaker reads some of her visual poems during this episode. To see examples of her visual poems, visit her portfolio on her website! Presented by The Writer's Garret ⁠⁠https://writersgarret.org/⁠⁠ ⁠⁠www.logencure.com/innermoonlight⁠

Unlimited Opinions - Philosophy & Mythology
S7 E1: The Importance of Moral Relativism: Will It Really "Damn Our Souls and End Our Species?"

Unlimited Opinions - Philosophy & Mythology

Play Episode Listen Later Jan 9, 2024 45:28


Season Premiere! Join us as we begin discussing Peter Kreeft's wonderfully written A Refutation of Moral Relativism: Interviews with an Absolutist. In this episode, we talk about the structure of the book and Kreeft's use of the dialogue format, the importance of truth in a society, whether our current society is truly relativist or just another flavor of absolutist, and how we got to where we are. We also talk about the issues with the spread of American culture and how America is perceived by the rest of the world, and the dangerous ideology of obfuscation that is permeating the Left's attitude towards language, gender, and much else!Follow us on Twitter! https://twitter.com/UlmtdOpinions

Jesters of Ravenloft: A D&D Podcast
2.29 - Obfuscation, Trickery and Confusion

Jesters of Ravenloft: A D&D Podcast

Play Episode Listen Later Jan 5, 2024 55:04


The troupe prepared to do battle with the approaching caravan, when New Rogue recognized them as the Vistani, the travelling performers they had met in Happy Town. But just as they were greeting each other, the Doctor Deputy—thinking that Adam was speaking to him in code—attacked. Del managed to think quickly and stop the squire momentarily, but when he kept attacking, Adam shoved him into his bag of holding. Back at the were-camp, Tyler found a clever way to set up an invisible fishing hole in the sky where they could fish for ground worms, but will that even matter if the Vistani's fears aren't allayed by Jack Magnum's tricks? Featuring players Tyler Hewitt, Del Borovic, Guy Bradford, and Adam McNamara, and Dungeon Master Ryan LaPlante. Jesters of Ravenloft streams live every Wednesday at 8:30pm ET on Twitch (https://www.twitch.tv/dumbdumbdice) Enjoying Jesters of Ravenloft? - Consider becoming a Patron of Dumb-Dumbs & Dice for as little as $1 a month and gain access to a ton of extra BTS fun (https://www.patreon.com/dumbdumbdice) - Buy merch on our website (https://dumbdumbdice.com/) - Watch us on YouTube (https://youtube.com/@dumbdumbdice) - Follow us on Instagram (https://instagram.com/dumbdumbdice) - Follow us on Facebook (https://facebook.com/dumbdumbdice) Can't remember a discount code you wanted to use from one of our ads? Find it at https://fableandfolly.com/partners/ Artwork by the brilliant Del Borovic - Website & Portfolio (https://delborovic.com/) - Twitter (https://twitter.com/deltastic) Theme song by Sound Gallery by Dmitry Taras - YouTube (https://www.youtube.com/@soundgallerybydmitrytaras) - Pixabay (https://pixabay.com/music/fantasy-dreamy-childrens-dark-mysterious-halloween-night-scary-creepy-spooky-horror-music-116551/) Learn more about your ad choices. Visit megaphone.fm/adchoices

Crashes And Taxes Podcast
See Beyond the Lies: How to Win Against a Tide of Economic Obfuscation

Crashes And Taxes Podcast

Play Episode Listen Later Dec 28, 2023 94:08


Propaganda, delusional optimism and Fed policy is not the reality when it comes to market fundamentals. Yet, that's what's driving our economy and this concept of a “goldilocks situation”. It's nothing more than an attempt to lead us astray and destroy our wealth.   No matter what anyone tries to convince you, we're not fine, we're not headed for a soft landing. We're definitely headed for a major financial disruption, and we won't escape 2024 without it. Many investors are rushing back into stocks, and it's entirely by design. It's a tactic to uphold the illusion of economic recovery.    America has an addiction to cheap, big money. We constantly back ourselves into bad financial decisions and print money to get out of them. This always has repercussions and we can't put them off any longer.    The way to win right now? Dig deeper than the mainstream, and seek the truth beyond the lies that are being sold to us.    In this 100th episode special of Crashes & Taxes, we give you an overview of where things are, and why it's mission critical to go against the consensus right now.

The Day After TNB
Elaborate Obfuscation ft. The Voice | The Day After Ep. 411

The Day After TNB

Play Episode Listen Later Dec 20, 2023 249:36


Follow Amer on X: https://twitter.com/amerxmirza Email Us: TheDayAfter@THENEWBLXCK.com WhatsAPP: 07564841073 Join us in our twitter community - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://shorturl.at/jkrNQ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ The Day After, (00:00) Intro: (23:41) Headlines: Rishi Sunak slapped down by statistics watchdog for wrongly claiming debt is falling, Donald Trump ineligible for the US presidency under constitution's insurrection clause, Israel signals readiness for new temporary truce in Gaza as pressure mounts (28:59) Word on Road: Princess Love competing in the world poker tour world championship Celine Dion's sister gives an update on her declining health Owner of Manière De Voir's annoyance with black brits over support (01:15:18) Headlines: New York will set up a commission to consider reparations for slavery, DR Congo-Kenya rebel-group row rattles region, Elderly French couple lose rare African mask case worth millions (01:25:11) The People's Journal: William Ruto sparking Kenyans' anger, Asda reveals higher finance costs as boss defends debt structure, Google to pay compensation to millions of US customers after Play Store court case, Superdry profit warning sends shares to record low (01:33:29) Headlines: US judge orders names of more than 170 Jeffrey Epstein associates to be released, Italy court jails parents for life over 'honour killing' of Pakistani teen, Five children die in fire while father Christmas shopping (01:39:20) What You Saying & Interview - A comprehensive history of the Israel-Palestine conflict: What is this really about?? If peace is ever achieved, what will it look like??

Molly White's Citation Needed
Effective obfuscation

Molly White's Citation Needed

Play Episode Listen Later Nov 30, 2023 17:51


Silicon Valley's "effective altruism" and "effective accelerationism" only give a thin philosophical veneer to the industry's same old impulses. Originally published on November 25, 2023.

Genesis Community Church
God in the Void - Audio

Genesis Community Church

Play Episode Listen Later Oct 8, 2023 32:37


This morning Sam shared with us about God in the Void. What does that mean? Listen and find out. This is the audio podcast.

The Bailey And Harding Ultra Sound System
The Obfuscation of Ultra

The Bailey And Harding Ultra Sound System

Play Episode Listen Later Oct 6, 2023 59:56


It's episode 19 of the Bailey and Harding Ultra Sound System and just a little warning here: things get RANTY. There's a lot that's going in the bin this week, including mandatory kit dodgers, single-use shoes (what?!) and private land. Not to mention Allie's disdain at the absolute obfuscation of ultra (if you're not sure what that means, you're not the only one!) PLUS, it transpires that there's a very famous listener to the pod...All the links: Instagram: www.instagram.com/ultrasoundsystempod Playlist: https://bit.ly/ultrasoundsystemplaylist Email us: ultrasoundsystempod@gmail.com

Conservative Review with Daniel Horowitz
Billy Chemirmir's Serial Murders and the Power of Media and Political Obfuscation of Big Stories | Guest: Daniel Probst | 9/15/23

Conservative Review with Daniel Horowitz

Play Episode Listen Later Sep 15, 2023 63:32


Today is part two in a series on the serial murder of seniors in the North Dallas area by Billy Chemirmir. We are joined today by Daniel Probst, the nephew of the first known victim, Dr. Cathryn Sinclair, who was smothered to death in April 2016. Probst explains how he filed a homicide and robbery complaint immediately, yet there was never an effort to pursue the case by an understaffed police department, the medical examiner, or the senior living facility management. This episode is a reminder of the importance of exposing egregious trends and injustices in our society because public sunlight is the only way to redress our grievances. Probst warns us that we need to treat the lives of seniors the way we would children. I also give a brief update on the emerging details of the Freedom Caucus plan in the budget fight and how we need a shutdown battle to bring light to the forgotten man and forgotten issues.  Learn more about your ad choices. Visit megaphone.fm/adchoices

Two Old Bucks
147: Vixenology, Alien Obfuscation, RIP Robbie, Oppenheimer, Del Bikes Nakedly

Two Old Bucks

Play Episode Listen Later Aug 11, 2023 37:40


Alert Vixen Mimi finds Vintage Vixen jeans for sale. Our legal department is on the case, filing copyright infringement charges.  We're coming for you, Bann's Boutique.RIP  Robbie Robertson, Canadian singer-songwriter extrordinaire with The Band. Music from Big Pink was a landmark album.  Listen to The Weight from their documentary The Last Waltz. It doesn't get any better than this.Several listeners claim to have seen aliens, know aliens or perhaps be aliens. Dave suggests trees may be aliens and then learns somebody else already thought  the same thing.Dave rents About My Father, unfortunately a very unfunny movie. Watch the trailer, it's better than the movie.Del and Dave see Oppenheimer and both love it. Spectacular performances, so many shades of gray. Go see it!Del leads Dave to believe he rides his bike naked. Not a visual you want to remember.Dave offers a Public Service Announcement on the dangers of leaping before you look. Looking ahead, our Tahoe writers, Bridey Thelen-Heidel [episode 118] and Bruce Rettig [episode 125] will be back soon to tell us what's happening in their worlds.Frank Young [episiode 135] will also be back later this month to share some of his experiences from his career in USAID.BONUS TIP: The Perseid meteor shower peaks this weekend.Give us your thoughts: BUCKSTWOOLD@GMAIL.COM Find us on Twitter: @twooldbucks1Leave a Voice message - click HERE

TWiT Bits (MP3)
SN Clip: Microsoft's "Culture of Toxic Obfuscation"

TWiT Bits (MP3)

Play Episode Listen Later Aug 9, 2023 14:42


On Security Now, Steve Gibson and Leo Laporte talk about a LinkedIn posting by Amit Yoran, CEO of Tenable, who took Microsoft to the mat about its security. For the full episode go to: https://twit.tv/sn/934 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (Video HD)
SN Clip: Microsoft's "Culture of Toxic Obfuscation"

TWiT Bits (Video HD)

Play Episode Listen Later Aug 9, 2023 14:42


On Security Now, Steve Gibson and Leo Laporte talk about a LinkedIn posting by Amit Yoran, CEO of Tenable, who took Microsoft to the mat about its security. For the full episode go to: https://twit.tv/sn/934 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

Sermons by Bob Vincent and Others
Until all Is Fulfilled, 1

Sermons by Bob Vincent and Others

Play Episode Listen Later Aug 7, 2023 37:00


In Matthew 5-17-20, the Lord Jesus teaches us to hold to the plenary, verbal inspiration of Scripture, even down to the Hebrew letters themselves.--Jewish people would never refer to the Hebrew Bible as the Old Testament. They call it the Tanakh from its three major divisions- the Torah -T-r-, --------, the Nevi'im -N-v---m, ----------, and the Ketuvim -Ktuvim, ------------, as in Luke 24-44. But sometimes as simply, the Law and the Prophets, as Jesus does here in Matthew 5-17.--Even when we dislike something in the Bible, we are bound to hold to it and teach it.--Beware of those who evade speaking the truth. Obfuscation means bringing darkness rather than light. I must preach the Bible, and I must preach it clearly.--God has two books- the Bible and nature. The book of nature, or Natural Law, reveals that all people everywhere, at some level, know the true God -Romans 1-18-21-, and they also know the essence of the Ten Commandments -Romans 2-14-15-.--John the Baptist was depressed and stricken with doubt -Matthew 11-3-. So he sent his disciples to Jesus who demonstrated that he was the fulfillment of Old Testament prophecy -Matthew 11-5- Isaiah 61-1-3- 53-7- Psalm 110-1-3-.--Jesus then informs his disciples that John the Baptist is the fulfillment of Malachi 3-1 and Malachi 4-5.--This is not teaching reincarnation. --When the New Testament interprets the Old Testament, we have an infallible guide of interpretation.

Sermons by Bob Vincent and Others
Until all Is Fulfilled, 1

Sermons by Bob Vincent and Others

Play Episode Listen Later Aug 7, 2023 37:00


In Matthew 5-17-20, the Lord Jesus teaches us to hold to the plenary, verbal inspiration of Scripture, even down to the Hebrew letters themselves.--Jewish people would never refer to the Hebrew Bible as the Old Testament. They call it the Tanakh from its three major divisions- the Torah -T-r-, --------, the Nevi'im -N-v---m, ----------, and the Ketuvim -Ktuvim, ------------, as in Luke 24-44. But sometimes as simply, the Law and the Prophets, as Jesus does here in Matthew 5-17.--Even when we dislike something in the Bible, we are bound to hold to it and teach it.--Beware of those who evade speaking the truth. Obfuscation means bringing darkness rather than light. I must preach the Bible, and I must preach it clearly.--God has two books- the Bible and nature. The book of nature, or Natural Law, reveals that all people everywhere, at some level, know the true God -Romans 1-18-21-, and they also know the essence of the Ten Commandments -Romans 2-14-15-.--John the Baptist was depressed and stricken with doubt -Matthew 11-3-. So he sent his disciples to Jesus who demonstrated that he was the fulfillment of Old Testament prophecy -Matthew 11-5- Isaiah 61-1-3- 53-7- Psalm 110-1-3-.--Jesus then informs his disciples that John the Baptist is the fulfillment of Malachi 3-1 and Malachi 4-5.--This is not teaching reincarnation. --When the New Testament interprets the Old Testament, we have an infallible guide of interpretation.

Sermons by Bob Vincent and Others
Until all Is Fulfilled, 1

Sermons by Bob Vincent and Others

Play Episode Listen Later Aug 6, 2023 37:35


In Matthew 5:17-20, the Lord Jesus teaches us to hold to the plenary, verbal inspiration of Scripture, even down to the Hebrew letters themselves.Jewish people would never refer to the Hebrew Bible as the Old Testament. They call it the Tanakh from its three major divisions: the Torah (Tōrā, תּוֹרָה), the Nevi'im (Nəvīʾīm, נְבִיאִים), and the Ketuvim (Ktuvim, כְּתוּבִים‎), as in Luke 24:44. But sometimes as simply, the Law and the Prophets, as Jesus does here in Matthew 5:17.Even when we dislike something in the Bible, we are bound to hold to it and teach it.Beware of those who evade speaking the truth. Obfuscation means bringing darkness rather than light. I must preach the Bible, and I must preach it clearly.God has two books: the Bible and nature. The book of nature, or Natural Law, reveals that all people everywhere, at some level, know the true God (Romans 1:18-21), and they also know the essence of the Ten Commandments (Romans 2:14-15).John the Baptist was depressed and stricken with doubt (Matthew 11:3). So he sent his disciples to Jesus who demonstrated that he was the fulfillment of Old Testament prophecy (Matthew 11:5; Isaiah 61:1-3; 53:7; Psalm 110:1-3).Jesus then informs his disciples that John the Baptist is the fulfillment of Malachi 3:1 and Malachi 4:5.This is not teaching reincarnation. When the New Testament interprets the Old Testament, we have an infallible guide of interpretation.

The Nonlinear Library
AF - 3 levels of threat obfuscation by HoldenKarnofsky

The Nonlinear Library

Play Episode Listen Later Aug 2, 2023 10:57


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: 3 levels of threat obfuscation, published by HoldenKarnofsky on August 2, 2023 on The AI Alignment Forum. One of the biggest reasons alignment might be hard is what I'll call threat obfuscation: various dynamics that might make it hard to measure/notice cases where an AI system has problematic misalignment (even when the AI system is in a controlled environment and one is looking for signs of misalignment). I write more about this general fear in AI Safety Seems Hard to Measure. I think it's very important to understand threat obfuscation dynamics; to try to design ways of assessing danger that are designed with threat obfuscation dynamics in mind; and to avoid interpreting reassuring-seeming evidence too optimistically, by keeping in mind the various threat obfuscation dynamics that could affect it. I've seen three noticeably different threat obfuscation dynamics discussed, in ways that often leave me confused about exactly what dynamic someone is talking about, and when. This post aims to clear that up, based on a conversation with Paul Christiano. The three dynamics are: Simple "training game" dynamics: an AI system appears to behave helpfully, rather than attempting deception/manipulation/disempowerment of humans, because (a) it is good at predicting whether such attempts will be caught; (b) it is aiming for good in-episode performance (in terms of loss or reward); (c) such attempts would result in poor in-episode performance if caught. But if an AI system had a chance to do deception/manipulation/disempowerment that would not be detected, and would result in "good performance" within an episode, it would do so (this could include large-scale world takeover). These dynamics are dangerous because we might observe dangerous behavior, train AIs to behave less dangerously, then observe less dangerous behavior, and conclude that we've become more safe (when in fact we've trained the AIs to be more effective at deception). But we can still detect dangerous behavior in cases where it would not result in poor in-episode performance. For example, we might decide that when an AI system in the wild hacks its way to good in-episode performance, and is caught after the fact, we will at that point act as if the performance was actually good/intended (for example, no gradient descent against the behavior). Or we might deliberately conduct tests in which AI systems have opportunities to take over digital environments, obtaining high reward (no catch, not a trap, no attempt to "train out" the behavior when it happens).1 In these cases, situationally aware AI systems might "show their true colors" with fairly straightforward attempts to draw them out. Deceptive alignment: an AI system forms some aim (via inner misalignment) other than good in-episode performance. (This could include something like "an AI system that wants to maximize digital representations of reward across the galaxy, and is willing to get poor in-episode performance as part of a longer-term mission for that to happen.") It then gets good in-episode performance as part of a longer-term scheme to accomplish its other aim. In this case, the above techniques for getting an AI to "show its true colors" might2 fail. However, we could still get an AI to engage in specific behaviors that might be helpful to us and harmful to its goals, by specifically training the AI to behave in these ways. For example, we might want an AI to find security vulnerabilities that we can then patch. Even if doing so would undermine the AI's longer-term aim, we can use gradient descent to put a lot of pressure on it to find security vulnerabilities anyway. (Related: the "no sandbagging on checkable tasks" hypothesis) Gradient hacking: this also requires that an AI system has some aim other than good in-episode performance. Gradient hacking ...

Radio Grognard
Obfuscation

Radio Grognard

Play Episode Listen Later Jul 24, 2023 11:10


I talk about how to throw up smokescreens, distract and confuse PCs. --- Send in a voice message: https://podcasters.spotify.com/pod/show/radio-grognardks/message Support this podcast: https://podcasters.spotify.com/pod/show/radio-grognardks/support

Subconscious Realms
S2 EP 209 - Denial Of Creation / The Pregnant Void - Brandy & The Deep Share Podcast.

Subconscious Realms

Play Episode Listen Later May 25, 2023 88:01


Subconscious Realms Episode 209 - Denial Of Creation / The Pregnant Void - Brandy & The Deep Share Podcast. Ladies & Gentlemen, on this Episode of Subconscious Realms we welcome the Host & Creator of - The Deep Share Podcast, Andy for a Swap-Cast with an extremely talented Co-Host in attendance for Subconscious Realms, our Brandy to discuss; The Denial Of Creation....

The Rush Limbaugh Show
Daily Review with Clay and Buck - May 12 2023

The Rush Limbaugh Show

Play Episode Listen Later May 12, 2023 51:24


You just have to "hope" you don't get attacked. CNN Trump town hall fallout. Obfuscation at the border. Rush's immigration plan.Follow Clay & Buck on YouTube: https://www.youtube.com/c/clayandbuckSee omnystudio.com/listener for privacy information.

Kash's Corner
Kash's Corner: Obfuscation and Lies, From the Pentagon Intel Leak to the Whitewashing of the Afghanistan Exit Debacle

Kash's Corner

Play Episode Listen Later Apr 19, 2023 35:31


Why is the FBI targeting churches? Who approved the memos singling out Catholic churches and associating terms like “red pill” and “based” with domestic violent extremism?How did classified intelligence on Ukraine end up spreading online for weeks without being detected?And what does Kash Patel—as the person in charge of the Defense Department's transition from the Trump administration to the Biden administration—make of National Security Council spokesman John Kirby saying recently the Trump administration was not forthcoming when it came to plans for the Afghanistan withdrawal?We discuss all this and more in this week's episode of Kash's Corner.

EpochTV
Kash's Corner: Obfuscation and Lies, From the Pentagon Intel Leak to the Whitewashing of the Afghanistan Exit Debacle

EpochTV

Play Episode Listen Later Apr 15, 2023 36:09


Why is the FBI targeting churches? Who approved the memos singling out Catholic churches and associating terms like “red pill” and “based” with domestic violent extremism? How did classified intelligence on Ukraine end up spreading online for weeks without being detected? And what does Kash Patel—as the person in charge of the Defense Department's transition from the Trump administration to the Biden administration—make of National Security Council spokesman John Kirby saying recently the Trump administration was not forthcoming when it came to plans for the Afghanistan withdrawal? We discuss all this and more in this week's episode of Kash's Corner. ⭕️ Watch in-depth videos based on Truth & Tradition at Epoch TV

The Watchman Privacy Podcast
61 - Mac Pierce: Facial Recognition Obfuscation

The Watchman Privacy Podcast

Play Episode Listen Later Apr 10, 2023 37:27


Gabriel Custodiet interviews Mac Pierce, an artist who creates anti-facial recognition tools. They discuss the prevalence of facial recognition, previous attempts at obfuscating it, and some of the legal and practical questions surrounding its avoidance. Guest Links → https://www.macpierce.com/ → https://www.macpierce.com/the-optout-cap → https://www.macpierce.com/the-camera-shy-hoodie → https://www.youtube.com/watch?v=4hh5j6SBIbo (Opt Out Cap discussion) → https://twitter.com/TRANS_RES   Watchman Privacy → https://watchmanprivacy.com (newsletter, consultation requests) → https://twitter.com/watchmanprivacy → https://www.amazon.com/Watchman-Guide-Privacy-Financial-Lifestyle/dp/B08PX7KFS2   Privacy Courses (supports the show) → https://rpf.gumroad.com/l/privatebitcoin → https://rpf.gumroad.com/l/hackproof   Monero Donation Address (If you can't see the whole string, double click in the middle to select all) →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy   Please subscribe to and rate this podcast wherever you can to help it thrive. Thank you! →https://www.youtube.com/@WatchmanPrivacy →https://odysee.com/@WatchmanPrivacy   Timeline 0:00 – Introduction 1:38 – Overview of Mac Pierce's work - Ai WeiWei 5:00 – How prevalent is facial recognition? 8:00 – How do people unknowingly participate in facial recognition? 10:32 – Do face masks protect us against facial recognition? 11:59 – How concerned are you about gait analysis, tattoo analysis, etc.? 14:30 – How effective are other “adversarial fashion” such as Reflectacles and Leonardo Selvaggio masks 17:27 – Is it illegal to wear masks in public? - and post-COVID 19:20 – Opt Out Cap: how does it work? 21:40 – Why is it important to have a “real” face? 22:39 – How to test if anti-facial recognition equipment is working 24:04 – Camera Shy Hoodie 26:12 – Resources to learn about facial recognition 27:55 – The future of tracking people 29:44 – How to defy gait analysis 29:56 – 3D printed guns, Cody Wilson, ghost gunner 31:56 – How will the 3D printed gun era play out? 33:21 – The first digital death 35:40 – Final thoughts

Stuff That Interests Me
Life skills you learn from stand-up comedy

Stuff That Interests Me

Play Episode Listen Later Mar 8, 2023 10:37


Jonathan Johnson, from recruitment company, Auxato, got in touch and asked me to write a piece for him, explaining how it is I got from being stand-up comic and voice actor to a renowned (his words) longstanding, financial writer for Money Week. I thought readers would like it and he kindly gave me permission to republish it here. The questions are Jonathan's.Stand-up comedy – what life skills did it teach you?Stand-up comedy teaches you lots of things. How to stand on stage in front of a bunch of strangers. How to present yourself. How to entertain people. How to cope with pressure. How to deal with difficult situations and difficult people. How to think on your feet. Communication. Clarity.These are all really useful life skills that you might call upon in any number of other situations. Everyone should go and be a stand-up for a bit. But there is a lot more to being a stand-up than what you see on stage. Behind the scenes, every comic is running a small business. Every day you are trying to get gigs. You're sending out emails, making phone calls, posting on social media, all with the aim of pushing your brand, getting noticed and getting better work. You're running a diary. You're invoicing for the gigs you have done. You're chasing money from slow payers, while trying to extract money from the unsavoury promoters who are trying to wriggle out of paying you at all.You are travelling up and down the country four, five, sometimes seven nights a week to places you have probably only ever heard of, meeting all sorts of different people. As a result comics often know the country as well as anyone - all the while trying to keep costs down so that you can exit the gig at a profit. On top of all of that, but most fundamental of all, you have got to write an act that people find funny. You learn so many skills doing comedy. Even if you are not destined for stardom, which most of us aren't, the discipline still equips you for life. You just need to look at the many people who started out as comedians who have since gone on to achieve huge success in other fields, from Joe Rogan to Volodymyr Zelensky, to know there must be something in it.Yet, if you're a potential employer looking at someone's CV and you see the word comedian, I bet that makes you less likely, rather than more likely, to call them in for an interview.In fact, most comedians who decide they've done it for long enough and now want to try something else, find it near impossible to find employment because of the fact they have comedian on their CV. The only option for most is to set up another business. Please tell your friends on Twitter, Linked and Facebook about this really interesting article.What a random hotchpotch of a career you have. How did it happen?I'm now 53. The longest I've ever lasted in a “proper” job is three months. This was back in 1992, when I was 23. I used to get up every morning, get the tube into Leicester Square and then do 10am to 6.30pm in an office. I hated it. It was not that bad a job either, but I hated being stuck in an office all day with no fresh air and not owning my own time.That's not to say I'm not hard-working. I'm extremely hard-working. You just need to look at my output to see that. I would spend the next 15 years working occasionally as an actor, regularly as a voiceover (for some reason I always got more voiceover work than acting) and then, from 1997, as a comedian. All the while, I was trying to get stuff published - I wrote two novels and a million articles - but never with any success. I think I got one article in the Big Issue.But by 2006, I had made a bit of money, some in property (by accident) and some from voiceovers: I had been, at various points, the voice of such eminent products as First Direct, Nintendo 64 and the National Lottery. My dad had made a bit of money, too. Between us, we were trying to figure out how to turn our bit of money into a lot of money; because we were trying to raise five million quid to bring Kisses on a Postcard into the West End. From what I was reading at the time, commodities and gold, especially, seemed to be the place to invest, particularly with all the growth that was taking place in China. There were all sorts of people talking about it. But how to meet them and talk to them, without having to pay them? A podcast …What gave you the inspiration for the podcast interviews?I always knew I'd be a good presenter, even though I'd never actually done it. I was good at hosting comedy clubs and other such stuff. I approached a mining PR company called Commodity Watch and suggested we start a podcast. They didn't really understand what I was talking about, so I did it anyway and began interviewing all these various people I'd heard on the internet talking so wisely about stuff.My very first interview was with the billionaire, Jim Rogers, who had run the Quantum Fund with George Soros. My next two were with noted silver analyst, David Morgan, and the gold expert, James Turk. I quickly learnt that you could secure interviews with people “above your station” quite easily, if they have something to promote, such as a book. A lot of the time people are happy to help out, even if they don't have something to promote. To my surprise, there were far fewer walled gardens in the worlds of investment and commodities than in comedy and TV. People were much more open.Subscribe to The Flying Frisby.What brought about the job at Moneyweek?One of the people I interviewed was Merryn Somerset Webb who, at the time, was editor at Money Week. “We need people like you to come and write for us,” she said. “Come into the office next week and meet Toby, the MD.”So I did. Here I am, 17 years later and I am still writing the same weekly column, a column that has been popular and, in terms of longevity at least, successful. I've since published three books with a fourth on the way. I've written several documentaries, one of which was a huge internet sensation (even if I was never properly credited) and more besides. I think it's fair to say that partnership with Moneyweek has worked - for them and me. But if I had sent my CV in to Merryn, all she would have seen was stand-up comedian, voiceover artist, occasional actor, Johnny-come-lately podcast host and unpublished novelist. I don't think she would for a second have gone, “I need to get this bloke writing for us.” Pretty much any employer would have looked at my CV and passed it by.I now have this ridiculously random hotchpotch career that I can't begin to explain. I'm a financial writer, comedian, singer-songwriter, comedy music video maker, TV presenter and voiceover artist. A very nice chap who works in internet marketing and likes my output - but despairs at its lack of clarity - with whom I correspond frequently, put this graphic together to try and explain what I do.What can we learn from that episode with Merryn?Two things. One, I don't believe there is any substitute for face-to-face meetings. Meeting someone in the flesh inspires trust in a way that not a million emails can. (That, by the way, is, I think, why I never had stuff published. I just sent it in. I'm not even sure it got read. It's much easier to ignore a letter or an email than someone in person).Often it works in reverse too. You really admire someone online for whatever it is they've written or said, but then you meet them in person and realise this is not the type of person you should be listening too.Second, when you meet someone through the medium of an interview for a podcast, rather than just a meeting, it's like a heightened encounter. You get through so much more in an hour than you otherwise would. Get to know anyone who hosts a regular podcast and you will see they are total mavens. How many people do Joe Rogan, Konstantin Kisin or Steven Bartlett know as a result of their podcasts? How powerful are their networks? They are super connected - and trusted. Any introductions they make will carry weight.As it turns out, stand-up comedy was the ideal training ground for being a financial writer. In comedy, if the audience doesn't understand you, they don't laugh. If they don't laugh, you die. Thus does the comedian quickly learn the vital discipline of clarity. You also learn that you have to entertain people if you want to keep their attention.No such discipline exists in the world of financial journalism. Obfuscation is everywhere. It almost pays to be obfuscatory because then you can say, “Oh I didn't mean that, I meant this.” Some of the broadsheet journalists - guys who regularly win Finance Journalist of the Year or whatever - are as dull as ditch water and about as clear. Half the time, you have no idea what it is they are droning on about. I barely make it past the first paragraph.But do you know what? They probably got the job because their CV was right. Thank you for reading The Flying Frisby. Please like and share this post if you enjoyed it. .Other stuff:West Eng gig alert! This May, wearing my comedy hat, I'll be coming back to Crazy Coqs in Brasserie Zedel for another night of “curious comedy songs”. That's this May 7th. Please come if you're in town. They are super nights.AI and the FutureI recorded this 90-minute interview about AI the other day with Andy - super interesting - and it's now available to free subscribers:GoldInterested in protecting your wealth in these extraordinary times? Then be sure to own some gold bullion. My current recommended bullion dealer is The Pure Gold Company, whether you are taking delivery or storing online. Premiums are low, quality of service is high. You can deal with a human being. I have an affiliation deals with them.Here is some more info about Auxato: At Auxato, we don't just rely on your CV to get to know you. A key aspect of our approach to recruitment for our clients and candidates is the importance of building a long term relationship, learning about those skills that don't make it onto a CV. Want to experience a different recruitment way? Get in touch with us today and start your journey. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.theflyingfrisby.com/subscribe

Rightside Radio
12/21/22 - Obfuscation Nation

Rightside Radio

Play Episode Listen Later Dec 21, 2022 20:19


Dale Carter's America
DCA84 - Obfuscation

Dale Carter's America

Play Episode Listen Later Sep 14, 2022 63:21


In this episode, Dale and Kurt discuss the Democrat's focus on "MAGA Republicans" as the major threat to America, and their campaign to make the midterm elections all about their opponents and not their own failed policies. A tribute to the late Queen Elizabeth II and a comment on her reign and the British monarchy. Plus, ending cancer, airports, Alex Jones trial, gender policies in local schools, continuing violence across the country, offensive doors, and more. Make sure to subscribe wherever you get your podcasts and follow us on Facebook, Instagram, and Twitter. Thanks for tuning in to Dale Carter's America!

The Rational Reminder Podcast
Understanding Crypto 15: Prof. Vili Lehdonvirta: Cryptocracy: The Obfuscation of Power

The Rational Reminder Podcast

Play Episode Listen Later Sep 9, 2022 66:47


Today, we speak to Vili Lehdonvirta, Professor of Economics, Sociology, and Digital Social Research at the Oxford Internet Institute at the University of Oxford. Professor Lehdonvirta is a social scientist whose research focuses on ways digital technologies are reshaping the organization of economies, including their associated social effects. He is also the author of two books, Cloud Empires and Virtual Economies, which provide readers with an in-depth look into the power that crypto platforms hold and a well-rounded characterization of digital markets. In this episode, we talk about the ideological underpinnings of crypto and the role of governance in making cryptocurrencies possible. We discuss the role of states in scaling markets, how states and platform companies differ, the impacts of smart contracts on governance issues, and how control and power are centralized within crypto markets, as well as the social implications of blockchain technology. Listeners will also learn about past controversies within the crypto space, why people are still needed within crypto, and the blockchain paradox, plus more!   Key Points From This Episode:   We start by learning about John Perry Barlow's vision for cyberspace. [0:05:06] Find out about the role that states play in markets. [0:07:03] How markets function at scale if the state is not involved. [0:07:55] Professor Lehdonvirta's view on whether governance may precede markets. [0:08:59] The role massive platform companies play in today's economy. [0:09:44] Ways in which states and platform companies differ. [0:10:42] Why he thinks public blockchain technology has garnered so much attention. [0:11:27] An explanation of the influence John Perry Barlow's vision had on cryptocurrencies. [0:13:04] Learn what a Kleroterion is and the role it played in Athenian democracy. [0:14:01] Professor Lehdonvirta shares what it means to ‘trust in the code.' [0:17:05] An outline of the new properties smart contracts created. [0:18:59] Social and economic implications of unstoppable censorship-resistant contracts. [0:21:08] A brief rundown of how impactful smart contracts have been. [0:22:27] How the trustless and unstoppable claims of cryptocurrencies and DAOs were affected by the DAO story. [0:24:20] Whether the Bitcoin block-size conflict affected the perception of crypto as a trustless system. [0:28:17] We find out the current size of the Bitcoin development team. [0:31:05] Other examples of human discretion affecting the direction of Bitcoin. [0:31:46] Professor Lehdonvirta explains the strategies used to preserve trustlessness after the human interventions took place. [0:35:16] Details about an important strategy: the appeal to technical expertise. [0:38:53] Find out if the ability to fork blockchain networks restores trustless claims of crypto. [0:39:42] Whether users of a blockchain network, who are not miners, can influence crypto markets. [0:45:02] Professor Lehdonvirta's opinion on who has the most control over cryptocurrency networks. [0:49:35] Hear what aspect of Athenian democracy Nakamoto failed to replicate. [0:54:26] We learn what the blockchain paradox is (also known as the governance paradox). [0:56:50] Find out if Professor Lehdonvirta thinks technology changes the fundamental aspects which shape how societies are organized. [01:00:11] Find out if blockchain has eliminated the need for nation-states. [01:02:11] What cryptocurrencies have accomplished since their inception. [01:03:40]

Stand Firm Podcast
#115: Keeping the Loud Part Quiet: Obfuscation, HTB, and "Quiet" Orthodoxy

Stand Firm Podcast

Play Episode Listen Later Sep 8, 2022 45:17


Tore Says Show
Wed 24 Aug: Special Report - Fed Obfuscation - Election Hijack - MOU Access - Dallas Start - DHS Subs - Their Methods

Tore Says Show

Play Episode Listen Later Aug 25, 2022 46:42


Ohio is the epicenter, DHS is the culprit, and corrupt officials are the players. The question to ask is do you have MOU agreements? Texas is a good place to start. It all goes back to Homeland Security. Taxpayer financed fake election structure. They underestimate the people's spirit. How to own private voter software and hardware plus share the data. It all started in 2004. Nothing is dead on the internet. The contracts designed to hand over elections. The three ways they control state systems. Corrupt boards, judges and our diluted rights. Detailed agreements and careful control. Same contract, different states. Now it's called rules of engagement. Crowdstrike, Inc. hired to protect elections in NC. Tell them we do not consent to Federal control. Stop chasing Dominion and look at all machines. This is going to get fixed, and the time to start is now. Learn more about your ad choices. Visit megaphone.fm/adchoices