show episodes
 
The #1 podcast on Privacy+Cryptocurrency (yup- even mining), Privacy Tech, Personal OpSec/InfoSec, Self Defense, and the occasional rant about Biohacking. We talk to the insiders of industries that need privacy the most: crypto, blockchain, 'vice', personal defense, firearms, and more. Learn the attitude, tools, and secrets you'll need to look life defiantly in the eyes and tell it "Mine Your Biz!" Support this podcast: https://anchor.fm/mineyourbiz/support mineyourbiz.substack.com
 
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the CyberWire editorial team.
 
Loading …
show series
 
A reading of “We dwell in opportunity, a fairer opsec than irresponsibility”, written circa April 7, 2017. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material o…
 
A reading of “Let there be commerce between us: A catechesis of selling and buying”, written circa October 1, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous m…
 
A reading of “Disillusion and disappointment”, written circa April 7, 2017. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of Wealt…
 
A reading of “Strongly! Ardently! And tenderly!”, written circa April 8, 2017. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of We…
 
A reading of “A valediction forbidding globalism”, written circa April 8, 2017. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of W…
 
A reading of “Yours, very respectfully, and eff off”, written circa April 8, 2017. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment o…
 
A reading of “Swag us out!”, written circa October 30, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of Wealthy Elite, whose…
 
A reading of “Lament for good-doer, at end of history”, written circa October 30, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detrim…
 
A reading of “Arithmetic in ballot box, for VoterUndecided”, written circa October 30, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the d…
 
A reading of “Let us be speaking, you and I, in world not binary”, written circa October 30, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to…
 
A reading of “Tricking or threating for cyber B-team”, written circa October 30, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detrime…
 
Today we have Chris Howard from Veterans Breakthrough in the studio to discuss the concept of being broken, conquering yourself and what to do to move forward, regardless of what's happened to you. Follow them on Instagram and Facebook https://www.instagram.com/veterans_breakthrough/ https://www.facebook.com/veteransbreakthrough https://www.veteran…
 
Biz, lead developer from the BLUR network visited with me to give a full 360 degree education on the background, history, and design goals of this cryptonote. What makes BLUR different? Who have members of the ARW team collaborated with? What is their view of proof of work mining/miners? What technical hurdles have they dealt with? This interview g…
 
Jayson from the ARW project visited with me to give a full 360 degree education on the background, history, and design goals of Arrow Crypto. What makes ARW different? How was it funded? Who have members of the ARW team collaborated with? What is their view of proof of work mining/miners? What technical hurdles have they dealt with? This interview …
 
Draeth from the ARRR project visited with me to give a full 360 degree education on the background, history, and design goals of PirateChain & the then-just-announced GhostShip platform. What makes ARRR different? How was it funded? Who have members of the ARRR team collaborated with? What is their view of proof of work mining/miners? What technica…
 
Jeff from the SAFE project visited with me to give a full 360 degree education on the background, history, and design goals of the SafeCoin & SafeTrade platform. What makes the SAFE ecosystem different? How was SAFE funded? Who have members of the SAFE team collaborated with? What is their view of proof of work mining/miners? What technical hurdles…
 
Jason and John from the KMD project join me again to talk more about proof of work, privacy, and the design goals of the Komodo platform. Are FPGA's a threat to Proof of Work projects? What would be a threat? How does dPoW assist child chains in the KMD ecosystem? What about privacy? Does the KMD implementation of zk-SNARKs require users to opt in?…
 
Jason and John from the KMD project visited with me to give a full 360 degree education on the background, history, and design goals of the Komodo platform. How did they launch? Why did they launch? What code is Komodo based on? What makes the KMD ecosystem different? How was KMD funded? Who have members of the KMD team collaborated with? What is t…
 
Trekk is one of my absolute favorite people in the crypto scene: extremely down to Earth, and working hard to bridge the divide between the "normies" and the "nerds" Please give the show some love, and check out Trekk's media links below: https://twitter.com/SmartTrekken https://www.instagram.com/trekkencryptos/ https://anchor.fm/trekk --- Send in …
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login