Best Cyber podcasts we could find (Updated March 2019)
Related podcasts: Security Hacking Technology Malware Software Development Featured FM Cybersecurity Tech Emcryption Cyber Crime Spyware Steve Gibson Leo Laporte Infosec Twit Politics News Bitcoin Privacy Business  
Cyber public [search 0]
×
Join millions of Player FM users today to get Cyber news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
National Cyber Security, the only "Daily" Cyber Security news show in the world.The show is has been designed for the laymen person who may not be technical, but also informative enough for all of the computer geeks of the world. Think of it like the CNN Headline News of Cyber SecurityOur daily news includes the latest news in hacking, id theft, IT Jobs, Government Security, Risk Management and 60+ other categories. Execute Produced by one of the worlds most known and respected Ex-hacker Gre ...
 
Epicenter is a podcast about the technologies, projects & people driving decentralization and the global blockchain revolution. Every week, hosts Brian Fabian Crain, Sebastien Couture and Meher Roy find the most interesting people in the industry for in-depth discussions about their projects, ideas and stories. Epicenter is part of the Let's Talk Bitcoin Network.
 
The LTB Network provides a tokenized platform for podcasts, articles, and forums about the ideas, people, and projects building the new digital economy and the future of money.
 
News you can use about cyber security.
 
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
 
Creating connections through candid conversations about issues in cyberspace. The show will speak with specialists and knowledgeable people in and around the world of cyber based issues. Ranging from e-safety and cybersecurity through to the darker side of the internet, web and electronic devices.Important information for parents, teachers and anyone who needs to learn about cyberspace
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Exploring Cybersecurity, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
The best gavel-to-gavel legal news and information on the net. Host Bennet Kelley talks about the hot- button internet legal topics of the day, and stay up to date on the latest in internet law and policy. Hear the latest net trends impacting your business, and have your questions answered by leading authorities.
 
The Cracking Cyber Security podcast from TEISS is dedicated to cracking cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
 
5 cyberpunk, analog game designers get together to discuss the sub-genre. New contributions, old ones, and things we'd love to see more of.
 
FocusPoint Technologies is positioned to become the leading IT Cyber Security company in the US. We are headquartered in St Paul Minnesota but can work with organizations throughout the country. We offer a full range of cyber security products and services to our clients. The company is comprised of industry veterans with deep roots in the IT industry. The company was formed due to a belief that the market is extremely under-served in cyber security technology and services. It's also very co ...
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
C
Cyber Shots
Weekly+
 
Adult Conversations and comdey Cover art photo by http://www.nasa.gov/
 
Get the latest in technology news for your weekday commute. Wall Street Journal reporters join Tanya Bustos to cover leading companies, new gadgets, consumer trends and cyber issues. From San Francisco to New York to the hottest conferences, our journalists help you stay plugged in.
 
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
C
Cyber security
Daily+
 
A curated playlist of cybersecurity
 
S
Security Now (MP3)
Weekly
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity, and subscribe in Castbox or your favourite podcast app. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
A daily overview of the latest hacking news, exploits, vulnerabilities, leaks…. everything under one roof
 
How to be Cyber Smart in Life and in Business
 
Humanity is under serious threat. Individual identity and privacy is dead. Law in every jurisdiction has failed to provide security to identity of individual in Cyber age. Such is the failure of Governmental and democratic and corporate systems that even elections and electoral proceses are not secured. Not even a single election held at any level any part of the world is secure. Elections are easily manipulated with investments at fraction of costs. Election and electoral processes and syst ...
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
S
Security Now (MP3)
Weekly
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIO's, CEO's and CISO's discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry called cyber security.
 
M
Media Monarchy
Daily+
 
The real news... remixed! Media Monarchy is an independent news source which has grown to include the 'New World Next Week' video series with Corbett Report, the new music show called 'Pump Up Tha Volume' + interviews and extras from the worlds of food, technology, the occult and much more... http://feeds.feedburner.com/mediamonarchy
 
Hosted by Paul Roberts. The top minds in information security discuss the news of the week.
 
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join "En Términos de Ciberseguridad" a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
 
Raj Lala, President & CEO of Evolve ETFs, joins industry experts to discuss topics such as; cyber security, artificial intelligence (A.I.), auto innovation (including electric and self-driving cars), blockchain, ETFs, and more.
 
Apps have changed nearly everything about how we live—how we stay connected socially, how we engage in commerce, how we run our businesses. They’ve also completely transformed the darker world of cybercrime, hacktivism, espionage, and warfare. But what is an app, really? Being able to answer that question is vital for protecting our data—ourselves, our businesses, our communities—from today’s increasingly sophisticated pool of cyber attackers. F5 Labs conducted a year-long research study to ...
 
Why are teens shoplifting makeup and posting their hauls to Tumblr? How can a blind man run a marathon through the desert with just an iPhone? And what happens to your social media profiles after you die? Week on week we answer questions just like these on our digital culture podcast, Chips with Everything.
 
O
OBBM Network
Weekly+
 
Local business personalities on their successes, strengths, and perseverance in the marketplace to empower, inform and encourage the 80% of American micro to small businesses that tend to be family owned of 9 employees or less. Shows cover topics on business coaching, networking, health and fitness, criminal justice, cyber security, money, and veteran spotlights.
 
knowledge, production, performative, & liminality: At the Edge discusses ideas, crossing cultural boundaries to expand ideas about art, writing, knowledge, publishing, and production, while contending with challenges about access, virtual space, political context/challenges, and incursion of cyber cultures.
 
C
Click
Weekly
 
Technological and digital news from around the world.
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. His new show “Pod Save the World” will bring you behind the scenes into White House Situation Room meetings and secret negotiations through a series of conversations with people who were there.
 
This is Lawfare's series of audio podcasts.
 
P
Phones Show Chat
Weekly
 
The Phones Show Chat audio podcast from the UK
 
Join former U.S. Attorney Preet Bharara for a podcast about justice and fairness.
 
C
Conversations
Weekly+
 
Spend an hour in someone else's life. Conversations draws you deeper into the life story of someone you may have heard about, but never met.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
No one is more responsible for your professional development than you. Career Communications Group (ccgmag.com) makes that possible by bringing you cutting edge management seminars with the nation's leading corporations and agencies executives. Slides for this presentation can be found here: https://www.slideshare.net/ccgmag/woc-women-empowered-to-engage
 
Where Survivalists And Preppers Prepare To Survive
 
S
SpyCast
Weekly
 
Each week, the International Spy Museum will offer a new SpyCast featuring interviews and programs with ex-spies, intelligence experts, and espionage scholars. The SpyCast is hosted by Dr. Vince Houghton, historian and curator at the International Spy Museum. Dr. Houghton specializes in intelligence, diplomatic, and military history, with expertise in the late-WWII and early-Cold War eras. The International Spy Museum in Washington, DC is the only public museum in the U.S. solely dedicated t ...
 
Loading …
show series
 
Online drug dealers get busted due to poor OPSEC! People are still failing to wipe their USB sticks properly! A potential presidential candidate is outed as a former hacker! Flat Earthers! Pi! Empathy! All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley an ...…
 
Online drug dealers get busted due to poor OPSEC! People are still failing to wipe their USB sticks properly! A potential presidential candidate is outed as a former hacker! Flat Earthers! Pi! Empathy! All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley an ...…
 
In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scr ...…
 
What can one say about a crypto tantric episode other than wow. This is our spiciest Proof of Love yet! Ben Tantra Punk joined Stephanie and I to discuss this ancient practice. In between a few laughs and blushes, we get a great overview of tantric lovemaking, how it's different from regular lovemaking, the history of why there is tantric sex i ...…
 
Learn about: · What may be the biggest concerns for the future · Amazon and how they affect and disrupt various industries · How 5G may affect different parts of the world and impact lives · How artificial intelligence and automation may affect the future job market · Defining robots in the home and their role in our day to day lives · Sustaina ...…
 
Using Active Directory (AD) To Find Hosts That Are Not in AD https://isc.sans.edu/forums/diary/Using+AD+to+find+hosts+that+arent+in+AD+fun+with+the+IPAddress+construct/24762/ Microsoft Anti Malware Crashing Windows https://social.technet.microsoft.com/Forums/en-US/18ab60a3-3b26-4a07-b68d-84085ce66ce5/scep-crashing-pcs?forum=ConfigMgrCompliance& ...…
 
'œIf this is not logistically possible, we need solutions, not problems.''" Marc Weinstein Interview location: Los Angeles Interview date: Monday 18th March, 2019 Company: Wave Financial Role: Principal The two documentaries on Netflix and Hulu about the Fyre Festival highlight what can go disastrously wrong when you pitch a grand vision which ...…
 
A huge trove of medical records and prescriptions found exposed, How Hackers Pulled Off a $20 Million Mexican Bank Heist, Nasty WinRAR bug is being actively exploited to install hard-to-detect malware, Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web, and Two-thirds of all Android antivirus apps are frauds.…
 
To capitalize on its popularity among fashion and consumer-goods companies, Instagram is going deeper into the e-commerce business, selling products on feeds for the first time. The Wall Street Journal's Jeff Horwitz has more. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
First, Tommy and Ben talk about the New Zealand terrorist attack and the rise of right-wing extremist groups and nationalist political parties, Huawei and Brazil's far-right President Jair Bolsonaro visiting Trump. Then the New York Times's Charlie Warzel joins to discuss how radicalization happens online, how we can stop it and how journalists ...…
 
On episode 243 of our daily cybersecurity podcast we interview Chris Hadnagy, founder and CEO of Social-Engineer, LLC. Chris talks about what social engineering is, what it means in the age of social media, and who should be aware of it. Latest Hacking News Podcast #243: Social Engineering with Chris Hadnagy on Latest Hacking News.…
 
Last week's Patch Tuesday March Madness Win7 SHA256 Windows Update... Update Many attacks leveraging the recently discovered WinRAR vulnerability What happens when Apple, Google, and GoDaddy all drop a bit? A big recent jump in Mirai Botnet Capability Compromised Counter-Strike gaming servers Privacy enhancements coming in Android Q A pair of v ...…
 
Last week's Patch Tuesday March Madness Win7 SHA256 Windows Update... Update Many attacks leveraging the recently discovered WinRAR vulnerability What happens when Apple, Google, and GoDaddy all drop a bit? A big recent jump in Mirai Botnet Capability Compromised Counter-Strike gaming servers Privacy enhancements coming in Android Q A pair of v ...…
 
Last week's Patch Tuesday March Madness Win7 SHA256 Windows Update... Update Many attacks leveraging the recently discovered WinRAR vulnerability What happens when Apple, Google, and GoDaddy all drop a bit? A big recent jump in Mirai Botnet Capability Compromised Counter-Strike gaming servers Privacy enhancements coming in Android Q A pair of v ...…
 
Last week's Patch Tuesday March Madness Win7 SHA256 Windows Update... Update Many attacks leveraging the recently discovered WinRAR vulnerability What happens when Apple, Google, and GoDaddy all drop a bit? A big recent jump in Mirai Botnet Capability Compromised Counter-Strike gaming servers Privacy enhancements coming in Android Q A pair of v ...…
 
Last week's Patch Tuesday March Madness Win7 SHA256 Windows Update... Update Many attacks leveraging the recently discovered WinRAR vulnerability What happens when Apple, Google, and GoDaddy all drop a bit? A big recent jump in Mirai Botnet Capability Compromised Counter-Strike gaming servers Privacy enhancements coming in Android Q A pair of v ...…
 
Sarah Smarsh on the idiosyncratic women who raised her in Kansas
 
In this week’s show Patrick Gray and Alex Stamos discuss the week’s news, as well as discussing the rise of white supremacist communities and propaganda on the Internet and what can be done about it. News: Norsk Hydro ransomwared Huawei ban gets more and more political APT40 hitting USA hard Cyber Command’s Euro road-trip Kremlin interference i ...…
 
Demographic, technological, and geostrategic developments are disrupting the electoral landscape in sub-Saharan Africa. How do these shifts affect the political climate for democracy and participation across Africa? What have recent elections in Nigeria illustrated about these? And what about the clash between China and the United States in Afr ...…
 
Cambridge Science FestivalThis week we have a special programme recorded at the Cambridge Science Festival. Gareth and Bill have been running around the University to talk about holograms, quantum computing, finding out what our data is really used for by tech companies and social media sites and trying to find out if tech makes us happy – or n ...…
 
In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has ...…
 
Cloudflare Releases Proxy Detection Tools https://blog.cloudflare.com/monsters-in-the-middleboxes/ Business Email Compromise Moving to SMS https://www.agari.com/email-security-blog/bec-goes-mobile/ JavaScript Requests Without Same Origin Policy Limitations https://www.forcepoint.com/blog/security-labs/attacking-internal-network-public-internet- ...…
 
Support the show, consider donating: BTC: 1CD83r9EzFinDNWwmRW4ssgCbhsM5bxXwg ETH: 0x8cdb49ca5103Ce06717C4daBBFD4857183f50935 In the early days of Bitcoin, much of the community’s focus was around payment and getting merchants to adopt cryptocurrencies. Although the technology and narratives have evolved, some projects continue to embrace that o ...…
 
In the early days of Bitcoin, much of the community's focus was around payment and getting merchants to adopt cryptocurrencies. Although the technology and narratives have evolved, some projects continue to embrace that original vision of peer-to-peer business, where merchants and their customers interact directly, and if they so wish, anonymou ...…
 
In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O'Rourke of Texas was an early member. The post Podcast Episode 138: Hacker President? Joseph Men ...…
 
Scott and Ryan have been composing music together in the spirit of liberty since 2015. I was lucky enough to meet them along the way in my journey, and have a great respect for artists that realize the need for a touch of freedom in the message. It can be so powerful, as evidenced by Scott and Ryan's work. We get into their journey, some of the ...…
 
SPY Historian Vince Houghton sat down with the Director of the Center on Terrorism, Extremism, and Counterterrorism at Monterey to discuss terrorism financing, state-sponsorship, and the rise of domestic terrorism.
 
Ad trackers found on 89% of EU government sites and hacker puts forth collection of stolen databases up for sale on episode 242 of our daily cybersecurity podcast. Latest Hacking News Podcast #242 on Latest Hacking News.
 
After our interview with Alex Winter about his film "Trust Machine" we were invited to broadcast live from the SXSW screening of the film. Thessa Mooij coordinator at Breaker.io where "Trust Machine" airs on March 15 talks about how blockchain meets entertainment on the Breaker platform. On the studio side in Honolulu Chuck has a guest named Br ...…
 
Nude selfies. This episode is all about nude selfies. What happens if you take one and give it to a vengeful boyfriend. What happens when a hacker knows you have them and wants to steal them from your phone. What happens is not good. This episode was sponsored by Nord VPN. Visit nordvpn.com/darknet and use promo code "DARKNET". This episode was ...…
 
Two thirds of New Yorkers view Amazon's decision to scuttle a corporate headquarters in Queens as bad for the state. The Wall Street Journal's Jimmy Vielkind explains. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
(WOC Seminar 1736) NEEDED - "All In" Influential Men Champions for D&I (Presented by Consumers Energy) Learning Objective: Examine how adding influential decision makers to D&I initiatives can lead to success. Diversity and inclusion initiatives need to have "all hands-on-deck" to be successful, and this includes the company's upper level influ ...…
 
Bob Doneley is one of the only Australian vets specialising in the health of budgerigars (R)
 
In this clip from the latest episode of the CAFE Insider podcast, Preet and his co-host Anne Milgram discuss the New Zealand terror attacks and the tactics available to law enforcement for targeting domestic terrorists. To listen to the full episode, become a CAFE Insider member at CAFE.com/insider References in this clip: Reports from the U.S. ...…
 
It’s Robert Mueller as you’ve never heard him before. We have something special for you on the podcast today. Something very different. The Mueller report is coming. We all know that. We don’t know what’s going to be in it. We don't know when it's showing up. But Bob Mueller has already told a remarkable story. He’s told it scattered through di ...…
 
In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by polit ...…
 
Putty Updates https://www.chiark.greenend.org.uk/~sgtatham/putty/ Fujitsu Wireless Keyboard Vulnerabilities https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-033.txt Signed Malware Goes Undetected https://twitter.com/malwrhunterteam/status/1104082562216062978/photo/1?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E ...…
 
I am excited to have Kirk Phillips on this episode, he has been a long time supporter of The Tatiana Show and has helped me personally with my taxes. On this episode he joins us to speak about what you can do when you are getting SIM card attacked! He has been a victim himself and will tell us his experience and advise us on how to increase our ...…
 
We continue our discussion on onchain governance by diving into the common critiques that people have for Decred. Decred's Noah Pierau and I touch on: Enforceability of onchain votes Stake-based vs. entity-based voting Fairness & centralization in proof of stake systems The threat of malicious actors Rate and subscribe! Host: Jason Choi (@MrJas ...…
 
An international group of researchers, including some inventors of the popular gene-editing tool Crispr, called for a world-wide moratorium on editing DNA in human sperm, eggs and embryos to prevent births of genetically modified babies. At a recent gene-editing conference in Hong Kong, the debate raged on. Learn more about your ad choices. Vis ...…
 
Today I'm joined by Dr Jamie Madigan who is the host of a podcast called The Psychology of GAMES (not gaming as I called it in the chat #fail). He and his podcast will be such a great addition to your podcast library and knowledge bank - all of the questions you have about gaming have likely been answered on his podcast/site or in his book! See ...…
 
To celebrate 60 years of Barbie, Jordan Erica Webber looks back at some of the key moments in the history of the world-famous doll, and examines how Barbie became a representative of the tech world. Help support our independent journalism at theguardian.com/chipspod
 
On episode 241 of our daily cybersecurity podcast we are joined by Steve Black, Professor of Law at Texas Tech University School of Law. Steve discusses cyber law, the impact of technological developments on laws, and more. Latest Hacking News Podcast #241: Cyber Law with Steve Black, Professor of Law on Latest Hacking News.…
 
In this episode of Seated2Serve, meet Emily Zoog, VP of Veritex Bank and Treasurer for the Plano Chamber of Commerce Board of Directors. Host Jeff Bickerstaff unearths priceless nuggets from Emily's journey as she became a voice in the community that's getting attention from D Magazine and earning respect all over Dallas. Join the Plano Chamber ...…
 
The range of third-web platforms in development today is greater than ever. From data-centric blockchain based approaches to agent-centric designs like Secure Scuttlebut, the potential futures of the third web are rapidly expanding. Today we look at another approach with the Urbit platform. Like Secure Scuttlebutt, Urbit is agent centric. It is ...…
 
Doctor Munjed Al Muderis on returning to Iraq to operate on soldiers and civilians wounded in the war against ISIS
 
Binary Analysis With Jupyter and Radare2 https://isc.sans.edu/forums/diary/Binary+Analysis+with+Jupyter+and+Radare2/24748/ IMAP Brute Forcing against Cloud Accounts https://www.proofpoint.com/us/threat-insight/post/threat-actors-leverage-credential-dumps-phishing-and-legacy-email-protocols Google Allows GSuite Users to Disable SMS/Voice Authent ...…
 
In which Ted chats about phone form in the pocket(!) and Steve goes all Q-y
 
In this episode we catch up with Ashe Oro and Shawn Owens at the Anarchapulco conference. Ashe is sharing his ideas about his project Liberty VA's when an impromptu Shawn Owens joins in who just so happens to be Ashe's first customer.Shawn also answers the questions everyone wants to know what are you up to and why did you leave Salt.Shawn also ...…
 
Google login Twitter login Classic login