Best cryptographic podcasts we could find (Updated August 2017)
Related podcasts: Security Cryptography Tech Bitcoin Software Science Crypto Threats Malware Cybersecurity Computer Programming Technology Higher Education Natural Sciences Social Sciences Arts Books Education Networksecurity  
Cryptographic public [search 0]
show episodes
 
E
E&E Bitcoin 'Cast
Weekly
 
Ed and Ethan bring you the latest bitcoin news updates every weekday. Want to know whatès moving bitcoin today? Tune in to find out!
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
D
DECENTRALIZE, the podcast
Weekly
 
The best place for learning about what's going on with the latest decentralized tech.
 
S
Satoshi Nakamoto Institute
Rare
 
On January 3rd, 2009, an anonymous computer programmer (or programmers) going by the name Satoshi Nakamoto mined the first block of the Bitcoin blockchain, kickstarting the world's first fully realized crypto-currency. Satoshi did not build Bitcoin in a vacuum, however. Instead he stood upon the shoulders of cryptographic giants and free software gurus. From Timothy C. May and the Cypherpunks to Richard Stallman, Nick Szabo and beyond, the foundations of Bitcoin were built by a distributed n ...
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Security Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
T
The Crypto-Mises Podcast
Monthly
 
The official podcast of the Satoshi Nakamoto Institute
 
T
The Privacy Blog
Daily+
 
Privacy, Security, Cryptography, and Anonymity
 
T
Talk Security
Monthly
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
Q
Q.E.D. Code
Rare
 
Explore the intersection between software and mathematics. Michael L Perry takes you on a journey through the history of computing, information theory, cryptography, distributed systems, and everywhere else that math has influenced technology. Not only will you dive into math papers, but you'll also learn valuable programming techniques that you can apply in any language. Code Erat Demonstrandum
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
T
This is CS50 2014.
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
E
Edgar Allan Poe Poems by Edgar Allan Poe
 
Best known for his scary tales, mystery and detective stories and imaginative fantasy stories, Edgar Allan Poe was also a gifted poet. He wrote more than 70 poems and almost all of them have been widely appreciated by readers and critics alike. This collection contains some of his most famous ones, including the immortal Raven, which combines a sense of doom and nameless despair. With its ringing, alliterative and repetitive lines and strange, supernatural atmosphere, it remains one of Poe's ...
 
p
pseudorandom podcast series
Daily+
 
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics!RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
 
R
Return of Sherlock Holmes, The by DOYLE, Sir Arthur Conan
 
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)
 
I
Intellectual Icebergs
Rare
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
 
Loading …
show series
 
In this presentation I will present the cryptographic aspects of a newsecure filesystem called SEF. The goals of this project is to create afilesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we're not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community buildi ...…
 
Over the past year multiple people have been engaging language maintainers and designers to change their use of CSPRNGs (mainly relying on user-land RNGs like the one from OpenSSL, and sometimes suggesting "adding entropy" by various means from user-land daemons like haveged). In this short presentation we'll survey the struggle of cryptographe ...…
 
C
Chaos Computer Club - recent audio-only feed
 
We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Side channel attacks (SCA) gained attention in the past years. New low cost tools like Chip-Whisperer proved that these attacks are not any more a theoretical, academic risk but a real threat to the security of the embedded systems. Many cryptographic products are now being developed having this attacks in mind and countermeasures are being imp ...…
 
C
Chaos Computer Club - recent audio-only feed
 
In the 90's there was a political struggle about control of the availability of cryptographic technologies. Ultimately, it was won because certain industries aligned with civil society. Or it least it appears as if it was won. Since it is back. Trump, May and Macron have all demanded backdoors. In September the European Commission is slated to ...…
 
S
Something Cheeky: Movies
 
Wonder Woman - Part II Rosanna and Nikki enjoy functional superhero costumes, think the British cryptographers are crappy, are glad Diana doesn't apologize, think Dr. Poison has a boring name, and Nikki is conflicted about the lack of a sex scene. Nikki's most off-base prediction: Diana would reverse-engineer Steve's crashed plane to invent her ...…
 
In a blockchain, each block is “chained” to the previous one in a peer-to-peer data sharing network.We’ve all heard the buzz about the potential applications of blockchain technology. But what’s actually happening in developing countries in Asia and the Pacific?Beyond bitcoin payments and remittances, blockchain exists largely in the pilot stag ...…
 
Few things are hotter in the financial services industry right now than blockchain. The technology is being tested in a variety of ways, going up against decades-old technology that’s ripe for replacement. But now that there are live blockchain-based systems in place, advocates need to prove that they’re better than the alternatives.Take Daimle ...…
 
The Internet of Things (IoT) will bring us a tsunami of network-enabled devices, for consumer use as well as yet to be imagined industrial and commercial applications. Many of these devices will be payment enabled, many using card payment rails. Securing those billions of IoT devices is going to require techniques deployed by the mobile industr ...…
 
Not everyday do you get to hear from someone that can make you feel like The Big Bang Theory got it way wrong, and Silicon Valley got it way right. I had the pleasure recently to talk to someone who relocated from his home-country, Czech Republic to the living breathing city of Hong Kong. A Sci-Fi fan who envisions a technology revolution world ...…
 
T
The Voice before the Void: Arcana, Story, Poetry
 
Genuine mysteries are so very rare, but here is an artifact of an unknown language, an unknown botany, an unknown madness, an unknown world.-The Voice before the Void"Voynich manuscript"WikipediaThe Voynich manuscript is an illustrated codex hand-written in an unknown writing system. The vellum on which it is written has been carbon-dated to th ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
On this bonus interview episode of Neocash Radio JJ talks with Dr Julian Hosp about TenX and COMIT. TenX is building a multi-blockchain debit card and mobile wallet that currently works with Bitcoin, DASH, Ether, and ERC20 tokens. COMIT is a Cryptographically-secure Off-chain Multi-asset Instant Transaction network that leverages Hashed Time Lo ...…
 
Ricky McCormick was found dead in a field near St. Louis, Missouri. It would be another routine investigation for police officers if it wasn't for cryptic notes found in Ricky's pocket. Not only are local law enforcement stumped, but so are the expert cryptographers at the FBI and they are asking for your help. Perhaps you can figure out what t ...…
 
T
The Tim Ferriss Show – The Blog of Author Tim Ferriss
 
“Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He’s a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of “smart c ...…
 
Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He's a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of "smart contracts" were developed by Nick with the goal of bringin ...…
 
C
Camp Tech Podcast with Avery Swartz
 
Guest: Shawn Hooper What He Does: Shawn has worked as a computer programmer for most of his life, and is currently the Director of IT for Actionable Books — His job entails developing all of the internal tools for their staff. He is also a WordPress core contributor. Ponderance: How do SSL certificates and HTTPS help to secure websites? Find hi ...…
 
In this SPECIAL EPISODE of the Hidden Forces podcast, Demetri Kofinas brings on two fellow entrepreneurs from New York City's burgeoning Silicon Alley - David Porzio and Man Hoang - to talk about some of the latest trends in tech, media, and culture. This is meant to be informal, funny, and casual. David Porzio is the founder of Translator Medi ...…
 
H
Hacking the System: Blueprint to Making $100,000
 
Get $10 of Bitcoin free when you buy Bitcoin here: http://ianbalina.com/sixfigures/coinbaseBitcoin is the first global, decentralized currency that allows you to send money from one person to another without involving a third party broker, such as a bank. You only need your computer to make transactions because Bitcoin is fundamentally software ...…
 
H
House of Mystery True Crime History
 
Of all the notorious serial killers of the 20th century, only San Francisco’s Zodiac remains at large. A cold-blooded psycho stalking the nightmare streets of the late 1960s, he left behind at least five dead victims. The menacing sociopath sent more than two dozen letters to the newspapers, including four weird ciphers. Only the first code was ...…
 
Metaverse EP 12- War does not determine who is right — only who is leftCryptoWar and CryptographyHiroJa Shibe Here-Speaking to you from a small café adjacent to the famous The Black Sun Bar. Given you the latest on what is happening on The Street and what is affecting our world here in the Metaverse.Newshttps://www.typeform.com/blog/human-exper ...…
 
C
ContraRisk Security Podcast
 
If your image of blockchain technology is entirely linked to crypto-currencies like Bitcoin, think again. Patrick Hubbard of SolarWinds explains that the distributed ledger approach of blockchain has applications far beyond payments and financial services. The assurance provided by a shared record, cryptographically certified, is that it offers ...…
 
H
HiroJa Shibe's Space Odyssey Network
 
MOSAP- EP 122- The Other Guys- People whom have work on Bitcoin CodeNEWShttp://thehackernews.com/2017/04/mastercard-fingerprint-payment-card.htmlhttp://bitcoinist.com/spells-genesis-game-launches-app/Places People MeetDev Mailing Listhttps://lists.linuxfoundation.org/mailman/listinfo/bitcoin-devhttp://bitcoin-development.narkive.com/Meetinghttp ...…
 
Welcome to show number 2017.17! Show Notes Kelly Penguin Girl and Jon “One Punch” Watson Kelly is not-so-secretly in love with the new President of France Newfie TV at CJON-DT still broadcasts the Twilight Zone! Read the blogs, by’! 11:00 – Jon’s bit Jon explains cryptographics hashes, aaaannnnd…. …then the Birthday Problem becomes the cryptogr ...…
 
T
Thinking Sideways Podcast
 
Unveiled in November 1990, Kryptos has baffled cryptographers for almost three decades, with two of its five messages still unbroken, and a promise of further mysteries after the last message is decrypted. What's the final answer to Kryptos? Nobody even knows the question yet.
 
T
Technology & Choice, and SAFE Crossroads podcasts
 
In this fourth installment of The Hemp Corner, we set out to better understand the amazing biochemical relationship between the human species and the cannabis plant. To get very far we have to break out some understanding of biochemical interactions in general and how they influence the human experience. Our guest, Dr. Jim Laurenzano, is a medi ...…
 
Over the last two years, Ransomware has become the hottest commodity in the criminal black market. And we do mean commodity—it's getting cheaper and more accessible to crooks, even the unskilled ones. On March 4th of this year, a leading cybercriminal, who goes by the name “Dereck1,” mentioned that there was a new ransomware variant out called ...…
 
EP 115 FungibilityNewshttp://www.metzdowd.com/pipermail/cryptography/2017-February/031604.htmlhttps://www.nytimes.com/2017/02/23/world/asia/kim-jong-nam-vx-nerve-agent-.html?_r=0http://marc.info/?l=git&m=148787047422954http://www.trustnodes.com/2017/04/03/arizona-gives-legal-status-blockchain-based-smart-contractshttp://www.reuters.com/article/ ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
Two secret organisations, staffed by brilliant cryptographers, unravelled Japanese codes during World War 2 to help the Allies in the battles of Midway and the Coral Sea.
 
TaaS Fund: Trading & Investing In Cryptocurrency TaaS is a tokenized closed-end fund designed to reduce the risks and technical barriers of investing in the blockchain space. Built on a profit-sharing smart contract, TaaS introduces a revolutionary Token-as-a-Service business model, allowing investors to subscribe to the fund’s income stream. T ...…
 
This week we talked about Blockchain, a word that is being used more and more in the investing world but not widely understood. We went over what this cryptographic network is, why it matters to the everyday person, and what to consider when making investments in middlemen, more specifically, the financial services industry. Are we […] The post ...…
 
On today's show I interview Joachim de Koning the founder of Internet of Coins. The goal of Internet of Coins is to create a comprehensive environment for personal finance that gives everyone access to all of the world?'?s Digital value systems. The platform is designed to connect all cryptographic ledgers and to integrate all token systems int ...…
 
Episode #91: Internet of Coins – Linking Our Digital Value Systems!On today’s show I interview Joachim De Koning the founder of Internet of Coins. The goal of Internet of Coins is to create a comprehensive environment for personal finance that gives everyone access to all of the world’s Digital value systems. The platform is designed to connect ...…
 
We take an alchemical examination of several classic texts in a search for hidden layers of meaning. These meanings are unlocked through a series of easy to follow steps, using a variety of steganographic and cryptographic techniques — as well as the insights of Gurdjieff and the Tao Te Ching. The message in fairy tales, Gnostic & Christian Gos ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login