show episodes
 
E
E&E Bitcoin 'Cast
Weekly
 
Ed and Ethan bring you the latest bitcoin news updates every weekday. Want to know whatès moving bitcoin today? Tune in to find out!
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
On January 3rd, 2009, an anonymous computer programmer (or programmers) going by the name Satoshi Nakamoto mined the first block of the Bitcoin blockchain, kickstarting the world's first fully realized crypto-currency. Satoshi did not build Bitcoin in a vacuum, however. Instead he stood upon the shoulders of cryptographic giants and free software gurus. From Timothy C. May and the Cypherpunks to Richard Stallman, Nick Szabo and beyond, the foundations of Bitcoin were built by a distributed n ...
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Security Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
The official podcast of the Satoshi Nakamoto Institute
 
C
CRYPTO.decrypted
Weekly+
 
A series of shows on crypto currencies and blockhain technologies.
 
Loading …
show series
 
Support the show, consider donating: BTC: 1CD83r9EzFinDNWwmRW4ssgCbhsM5bxXwg (https://epicenter.tv/tipbtc)BCC: 1M4dvWxjL5N9WniNtatKtxW7RcGV73TQTd (http://epicenter.tv/tipbch)ETH: 0x8cdb49ca5103Ce06717C4daBBFD4857183f50935 (https://epicenter.tv/tipeth)With the advent of mature quantum technologies, many of the critical cryptographic protocols wh ...…
 
The Interplanetary File System (IPFS) is a decentralized global, peer-to-peer file system. IPFS combines ideas from BitTorrent, Git, and Bitcoin, creating a new way to store and access objects across the Internet. When you access an object on almost any website, you are accessing the object via a location address—a URL. The URL tells you where ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Ethereum: Ultimate Beginner's Guide to Learn and Invest in EthereumAuthor: James C. AndersonNarrator: Alex MorrisonFormat: UnabridgedLength: 1 hr and 4 minsLanguage: EnglishRelease date: 12-04-17Publisher: James C. AndersonGenres: Business, Personal Fin ...…
 
The idea of a blockchain, the cryptographically enhanced digital ledger that underpins Bitcoin and most cryptocurrencies, is now being used to describe everything from a system for inter-bank transactions to a new supply chain database for Walmart. The term has become so widespread that it’s quickly losing meaning. https://www.theverge.com/2018 ...…
 
Smart contracts are programs that run on the Ethereum blockchain. A smart contract developer pays Ether to deploy the contract. When a contract is deployed, every full node on the Ethereum blockchain has a copy of the contract code in that node’s address space. Every full node needs to hold a copy of every smart contract. This allows every full ...…
 
In this bonus episode Scott yaks with fellow ancap and crypto lover Jake Bryan. BE WARNED, THERE ARE AUDIO ISSUES WITH THIS EPISODE!!! Scott, having been a big bad podcaster for a little over a year now didn't think he needed to do a routine sound check before recording this podcast, resulting in some electronic interference leaking into the fi ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Cryptocurrency Trading: How to Make Money by trading Bitcoin and Other CryptocurrencySubtitle: Cryptocurrency and Blockchain, Book 2Author: Devan HanselNarrator: Glynn AmburgeyFormat: UnabridgedLength: 1 hr and 57 minsLanguage: EnglishRelease date: 01-2 ...…
 
Tatiana and Josh interview Robert Viglione of ZenCash & Charles Hoskinson of IOHK.Topics Include:--"Cordano"--"The Importance of Doing Business in Cryptocurrency"--"What is a DAG?"--"Philosophy in Blockchain"About the Guests:- Robert Viglione is a Co-founder of ZenCash, a privacy-oriented cryptocurrency hyperfocused on usability, and President ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Dangerous MatingSubtitle: A.L.F.A.Author: Milly TaidenNarrator: Tyler Donne, Tess IrondaleFormat: UnabridgedLength: 6 hrs and 4 minsLanguage: EnglishRelease date: 01-16-18Publisher: Audible StudiosRatings: 5 of 5 out of 6 votesGenres: Romance, Paranorma ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: CryptocurrencySubtitle: The Complete Insider Guide of Cryptocurrency and Lucrative Secret to Become Millionaire with This Money of the FutureAuthor: Noah GladwynNarrator: Sam SlydellFormat: UnabridgedLength: 1 hr and 53 minsLanguage: EnglishRelease date ...…
 
This is episode #017 of the Bitcoin Sage show (@bitcoinsage). Today’s episode about bitcoin & crypto-currencies on January 1, 2018 – let’s get started with: I’d like to start by wishing everyone a Happy New Year and all the best in health, happiness and wealth in 2018. Our old, old friend Dennis Gartman back on CNBC spitting truth about bitcoin ...…
 
ClaimChain is a Public Key Infrastructure unique in that it can operate in fully decentralized settings with no trusted parties. A vouching mechanism among users, similar to the Web of Trust, assists with social authentication but without revealing the users' social graph. High-integrity data structures prevent equivocation and help detect comp ...…
 
ClaimChain is a Public Key Infrastructure unique in that it can operate in fully decentralized settings with no trusted parties. A vouching mechanism among users, similar to the Web of Trust, assists with social authentication but without revealing the users' social graph. High-integrity data structures prevent equivocation and help detect comp ...…
 
Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all. In contrast, activities like testing, debugging, and code review are accepted as essential. They are woven into the lives of nearly all developers. In this talk, I will explain how I see machine-checked proofs ...…
 
Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all. In contrast, activities like testing, debugging, and code review are accepted as essential. They are woven into the lives of nearly all developers. In this talk, I will explain how I see machine-checked proofs ...…
 
Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often triv ...…
 
In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number gener ...…
 
The Noise Protocol Framework is a toolkit for 2-party secure-channel protocols. Noise is used by WhatsApp for client-server communication, by the WireGuard VPN protocol, and by the Lightning Network. In this talk I'll describe the rationale behind such a framework, and how you can use it to build simple, efficient, and customized secure-channel ...…
 
In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number gener ...…
 
The Noise Protocol Framework is a toolkit for 2-party secure-channel protocols. Noise is used by WhatsApp for client-server communication, by the WireGuard VPN protocol, and by the Lightning Network. In this talk I'll describe the rationale behind such a framework, and how you can use it to build simple, efficient, and customized secure-channel ...…
 
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and the update mechanism itself are proprietary and have not been throughly analyze ...…
 
Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often triv ...…
 
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and the update mechanism itself are proprietary and have not been throughly analyze ...…
 
Bob Van Valzah joined me for two calls that became a seven-part series on Digital Currencies & Bitcoin. To the left is Bob’s initial mining rig from 2010. To make it easier for folks we’ve merged all seven episodes together into this one large episode. Please note on several occasions throughout the podcast you’ll hear a brief snippet of music, ...…
 
Round 7 is here! Bitcoin smashes through to new highs, and what is bitchain? Plus, cryptographic kittens are a giant hairball in the Ethereum drain! And what will the IRS tax policy on cryptocurrency be? Email two@ blockheadspod.com to submit your Round 0 questions. ** www.blockheadspod.com/itunes – Subscribe on iTunes www.blockheadspod.com/goo ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Cryptocurrency: Investing, Trading and Mining CryptocurrencySubtitle: 5000% ROI on Bitcoins in 12 Months: The Step-by-Step Guide on How to Invest in Cryptocurrencies (2nd Edition)Author: Scott WalkerNarrator: Jon TurnerFormat: UnabridgedLength: 48 minsL ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Cryptocurrency: The No-Nonsense Starter Guide to Mastering Bitcoin, Blockchain & The Cryptocurrency Revolution (Volume 1)Author: Graham JohnsonNarrator: Dave WrightFormat: UnabridgedLength: 54 minsLanguage: EnglishRelease date: 11-23-17Publisher: Graham ...…
 
Listen to this audiobook free with a 30-day trial. Go to http://hotaudiobook.com/free Title: Blockchain RevolutionSubtitle: How the Technology Behind Bitcoin Is Changing Money, Business and the WorldAuthor: Don Tapscott, Alex TapscottNarrator: John ChancerFormat: UnabridgedLength: 15 hrs and 2 minsLanguage: EnglishRelease date: 11-16-17Publishe ...…
 
Fred Baker joins Network Collective for a second episode, this time sharing the story about how the IETF came to an official policy regarding systemic Internet surveillance and wiretapping in data networking. Show Notes IETF Policy on Wiretapping – RFC 2804 IAB and IESG Statement on Cryptographic Technology and the Internet – RFC 1984 Fred Bake ...…
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
Critical systems once operated by humans are now becoming more dependent on code and developers. There are many benefits to machines and automation such as increased productivity, quality and predictability. But when websites crash, 911 systems go down or when radiation-therapy machines kill patients because of a software error, it’s vital that ...…
 
On Monday, September 15th, 2008, tourists and locals stood outside and watched as employees of Lehman Brothers left the New York City headquarters on news that the bank would need to liquidate or file bankruptcy. 46 Days later, Satoshi Nakamoto posted the first white paper outlining Bitcoin. Less than 3 months later, the first Bitcoin code was ...…
 
Google login Twitter login Classic login