Best cryptographic podcasts we could find (Updated June 2017)
Related podcasts: Security Cryptography Tech Science Crypto Threats Bitcoin Malware Cybersecurity Computer Software Programming Technology Higher Education Natural Sciences Social Sciences Arts Books Education Networksecurity  
Cryptographic public [search 0]
show episodes
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
D
DECENTRALIZE, the podcast
Weekly
 
The best place for learning about what's going on with the latest decentralized tech.
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
T
The Crypto-Mises Podcast
Monthly
 
The official podcast of the Satoshi Nakamoto Institute
 
T
The Privacy Blog
Daily+
 
Privacy, Security, Cryptography, and Anonymity
 
T
Talk Security
Monthly
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
Q
Q.E.D. Code
Rare
 
Explore the intersection between software and mathematics. Michael L Perry takes you on a journey through the history of computing, information theory, cryptography, distributed systems, and everywhere else that math has influenced technology. Not only will you dive into math papers, but you'll also learn valuable programming techniques that you can apply in any language. Code Erat Demonstrandum
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
E
Edgar Allan Poe Poems by Edgar Allan Poe
 
Best known for his scary tales, mystery and detective stories and imaginative fantasy stories, Edgar Allan Poe was also a gifted poet. He wrote more than 70 poems and almost all of them have been widely appreciated by readers and critics alike. This collection contains some of his most famous ones, including the immortal Raven, which combines a sense of doom and nameless despair. With its ringing, alliterative and repetitive lines and strange, supernatural atmosphere, it remains one of Poe's ...
 
T
This is CS50 2014.
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
p
pseudorandom podcast series
Daily+
 
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics!RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
 
I
Intellectual Icebergs
Rare
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
 
R
Return of Sherlock Holmes, The by DOYLE, Sir Arthur Conan
 
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)
 
Loading …
show series
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
On this bonus interview episode of Neocash Radio JJ talks with Dr Julian Hosp about TenX and COMIT. TenX is building a multi-blockchain debit card and mobile wallet that currently works with Bitcoin, DASH, Ether, and ERC20 tokens. COMIT is a Cryptographically-secure Off-chain Multi-asset Instant Transaction network that leverages Hashed Time Lo ...…
 
Ricky McCormick was found dead in a field near St. Louis, Missouri. It would be another routine investigation for police officers if it wasn't for cryptic notes found in Ricky's pocket. Not only are local law enforcement stumped, but so are the expert cryptographers at the FBI and they are asking for your help. Perhaps you can figure out what t ...…
 
“Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He’s a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of “smart c ...…
 
T
The Tim Ferriss Show – The Blog of Author Tim Ferriss
 
“Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He’s a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of “smart c ...…
 
Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He's a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of "smart contracts" were developed by Nick with the goal of bringin ...…
 
C
Camp Tech Podcast with Avery Swartz
 
Guest: Shawn Hooper What He Does: Shawn has worked as a computer programmer for most of his life, and is currently the Director of IT for Actionable Books — His job entails developing all of the internal tools for their staff. He is also a WordPress core contributor. Ponderance: How do SSL certificates and HTTPS help to secure websites? Find hi ...…
 
In this SPECIAL EPISODE of the Hidden Forces podcast, Demetri Kofinas brings on two fellow entrepreneurs from New York City's burgeoning Silicon Alley - David Porzio and Man Hoang - to talk about some of the latest trends in tech, media, and culture. This is meant to be informal, funny, and casual. David Porzio is the founder of Translator Medi ...…
 
Since the WannaCry ransomware ripped through the internet late last week, infecting hundreds of thousands of machines and locking up critical systems from healthcare to transportation, cryptographers have searched for a cure. Finding a flaw in WannaCry’s encryption scheme, after all, the could decrypt all those systems without any ransom. Now o ...…
 
Anarchast Ep.362 Jeff interviews returning guest Skinner Layne of Exosphere and Exobase entrepreneurship camps, topics include: college a waste of time, the demographic goldilocks zone of Latin America, Exosphere in Brazil, problem solving, bio-hacking, artificial intelligence and the blockchain, occupations becoming obsolete, real entrepreneur ...…
 
Anarchast Ep.362 Jeff interviews returning guest Skinner Layne of Exosphere and Exobase entrepreneurship camps, topics include: college a waste of time, the demographic goldilocks zone of Latin America, Exosphere in Brazil, problem solving, bio-hacking, artificial intelligence and the blockchain, occupations becoming obsolete, real entrepreneur ...…
 
H
Hacking the System: Blueprint to Making $100,000
 
Get $10 of Bitcoin free when you buy Bitcoin here: http://ianbalina.com/sixfigures/coinbaseBitcoin is the first global, decentralized currency that allows you to send money from one person to another without involving a third party broker, such as a bank. You only need your computer to make transactions because Bitcoin is fundamentally software ...…
 
H
House of Mystery True Crime History
 
Of all the notorious serial killers of the 20th century, only San Francisco’s Zodiac remains at large. A cold-blooded psycho stalking the nightmare streets of the late 1960s, he left behind at least five dead victims. The menacing sociopath sent more than two dozen letters to the newspapers, including four weird ciphers. Only the first code was ...…
 
Metaverse EP 12- War does not determine who is right — only who is leftCryptoWar and CryptographyHiroJa Shibe Here-Speaking to you from a small café adjacent to the famous The Black Sun Bar. Given you the latest on what is happening on The Street and what is affecting our world here in the Metaverse.Newshttps://www.typeform.com/blog/human-exper ...…
 
C
ContraRisk Security Podcast
 
If your image of blockchain technology is entirely linked to crypto-currencies like Bitcoin, think again. Patrick Hubbard of SolarWinds explains that the distributed ledger approach of blockchain has applications far beyond payments and financial services. The assurance provided by a shared record, cryptographically certified, is that it offers ...…
 
H
HiroJa Shibe's Space Odyssey Network
 
MOSAP- EP 122- The Other Guys- People whom have work on Bitcoin CodeNEWShttp://thehackernews.com/2017/04/mastercard-fingerprint-payment-card.htmlhttp://bitcoinist.com/spells-genesis-game-launches-app/Places People MeetDev Mailing Listhttps://lists.linuxfoundation.org/mailman/listinfo/bitcoin-devhttp://bitcoin-development.narkive.com/Meetinghttp ...…
 
Welcome to show number 2017.17! Show Notes Kelly Penguin Girl and Jon “One Punch” Watson Kelly is not-so-secretly in love with the new President of France Newfie TV at CJON-DT still broadcasts the Twilight Zone! Read the blogs, by’! 11:00 – Jon’s bit Jon explains cryptographics hashes, aaaannnnd…. …then the Birthday Problem becomes the cryptogr ...…
 
T
Thinking Sideways Podcast
 
Unveiled in November 1990, Kryptos has baffled cryptographers for almost three decades, with two of its five messages still unbroken, and a promise of further mysteries after the last message is decrypted. What's the final answer to Kryptos? Nobody even knows the question yet.
 
T
Technology & Choice, and SAFE Crossroads podcasts
 
In this fourth installment of The Hemp Corner, we set out to better understand the amazing biochemical relationship between the human species and the cannabis plant. To get very far we have to break out some understanding of biochemical interactions in general and how they influence the human experience. Our guest, Dr. Jim Laurenzano, is a medi ...…
 
Host: Sheryl Glick R.M.T. Special Guest: Scott And Suzanne Ramsey In today’s episode of Healing from Within, your host Sheryl Glick author of The Living Spirit which shares stories of spiritual awakenings spiritual communication healing energies and miracles which show us that all is not always exactly what it appears to be and the possibilitie ...…
 
Over the last two years, Ransomware has become the hottest commodity in the criminal black market. And we do mean commodity—it's getting cheaper and more accessible to crooks, even the unskilled ones. On March 4th of this year, a leading cybercriminal, who goes by the name “Dereck1,” mentioned that there was a new ransomware variant out called ...…
 
EP 115 FungibilityNewshttp://www.metzdowd.com/pipermail/cryptography/2017-February/031604.htmlhttps://www.nytimes.com/2017/02/23/world/asia/kim-jong-nam-vx-nerve-agent-.html?_r=0http://marc.info/?l=git&m=148787047422954http://www.trustnodes.com/2017/04/03/arizona-gives-legal-status-blockchain-based-smart-contractshttp://www.reuters.com/article/ ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
Two secret organisations, staffed by brilliant cryptographers, unravelled Japanese codes during World War 2 to help the Allies in the battles of Midway and the Coral Sea.
 
TaaS Fund: Trading & Investing In Cryptocurrency TaaS is a tokenized closed-end fund designed to reduce the risks and technical barriers of investing in the blockchain space. Built on a profit-sharing smart contract, TaaS introduces a revolutionary Token-as-a-Service business model, allowing investors to subscribe to the fund’s income stream. T ...…
 
This week we talked about Blockchain, a word that is being used more and more in the investing world but not widely understood. We went over what this cryptographic network is, why it matters to the everyday person, and what to consider when making investments in middlemen, more specifically, the financial services industry. Are we […] The post ...…
 
On today's show I interview Joachim de Koning the founder of Internet of Coins. The goal of Internet of Coins is to create a comprehensive environment for personal finance that gives everyone access to all of the world?'?s Digital value systems. The platform is designed to connect all cryptographic ledgers and to integrate all token systems int ...…
 
Episode #91: Internet of Coins – Linking Our Digital Value Systems!On today’s show I interview Joachim De Koning the founder of Internet of Coins. The goal of Internet of Coins is to create a comprehensive environment for personal finance that gives everyone access to all of the world’s Digital value systems. The platform is designed to connect ...…
 
We take an alchemical examination of several classic texts in a search for hidden layers of meaning. These meanings are unlocked through a series of easy to follow steps, using a variety of steganographic and cryptographic techniques — as well as the insights of Gurdjieff and the Tao Te Ching. The message in fairy tales, Gnostic & Christian Gos ...…
 
We take an alchemical examination of several classic texts in a search for hidden layers of meaning. These meanings are unlocked through a series of easy to follow steps, using a variety of steganographic and cryptographic techniques — as well as the insights of Gurdjieff and the Tao Te Ching. The message in fairy tales, Gnostic & Christian Gos ...…
 
H
HARAJUKU DATA LAKE
 
This week Morris and Sergio discuss Google's announcement of a successful collision attack on the SHA-1 cryptographic hash function. Show Notes Cloudbleed and SHA-1 Collision with Max Burkhardt An excellent discussion of the topic on Software Engineering Daily. Shattered.it The branded marketing site for this research result. The actual paper i ...…
 
Austin Seipp joins us to discuss Haskell security and infrastructure. We talk about how Haskell security differs from C (and where it doesn’t) and some coming changes to Cabal security. Then we discuss Cryptol: a Haskell-inspired language for implementing cryptographic algorithms in a way that more closely resembles their mathematical specifica ...…
 
DASH (Digital Cash) and Bitcoin see record highs this week. Cloudflare bleeds sensitive user data from many sites for months. (CHANGE YOUR PASSWORDS!) The SHA-1 cryptographic hashing algorithm is done, son! These internet-connected teddy bears will let anyone spy on your kids & capture biometric voice data. The nine most popular password manage ...…
 
Recorded: Dec 3rd, 2016Today on the show, we’ll discuss the story behind creation of Zcash, the importance of privacy, why the zerocoin protocol was never integrated into Bitcoin and how Zcash eventually evolved into it’s own blockchain protocol.We’re joined by Dr. Matthew Green, Assistant Professor of Computer Science at Johns Hopkins. He has ...…
 
Infiltration | Robert Gale On this episode of Argot: Audio Short Stories from the Veteran Voices of Pittsburgh Oral History Collection, WWII veteran Bob Gale of Pittsburgh, Pennsylvania shares a story about a dangerous and unnerving counter-intelligence mission testing flight-line security on an Allied airbase in England. After graduating from ...…
 
W
WashingTECH Tech Policy Podcast with Joe Miller
 
Taylor Moore (TayMoore_CDT) is the Center for Democracy & Technology's (CDT) Free Expression Fellow. Her work focuses on preserving the Internet as a global platform for speech and association, democratic accountability, the free exchange of information and ideas, and the freedom of thought.She previously served as the Google Policy Fellow for ...…
 
If you receive some information, how do you know if it’s intact or has been changed? You use a hash in a similar way to a checksum by including it along with the data. If you want to verify that the data is correct, recalculate the hash and compare. There are many ways to calculate a hash. This episode will describe two broad categories of hash ...…
 
The Flash Season 3, Episode 13 - Your cryptograph invitation has arrived! It is time to finally explore the deep jungle that is Gorilla City. Join us for the monkey business in this first part of the Grodd saga. Host Philip Mozolak and Tony Sindelar with Jason Snell.By podcast@theincomparable.com (The Incomparable).
 
Your cryptograph invitation has arrived! It is time to finally explore the deep jungle that is Gorilla City. Join us for the monkey business in this first part of the Grodd saga. Host Philip Mozolak and Tony Sindelar with Jason Snell Referenced Works Show Notes & LinksBy podcast@theincomparable.com (The Incomparable).
 
P
Pynchon in Public Podcast
 
04.18: Gravity’s Rainbow In which, despite efforts by Them to stop us, we continue our work on Gravity’s Rainbow with a look at Book Three, episode five – the Tchitcherine episode. Notes: Here’s an example of Kyrgyz script. When writing was first developed, a Latin alphabet was used. So “A screaming comes across the sky” would have looked like ...…
 
VL EXCLUSIVE - A man we have been following, personally, for years now, who we consider to be brilliant, honest and a leader in this country â?? Robert David Steele, just talked to us about pedo-gate, Comet Ping Pong, the NSA, the FBI, the CIA, Zionism, the Rothchilds, Soros, 9/11, the electoral reform, the shadow government, and his thoughts o ...…
 
O
Open Source Security Podcast
 
Josh and Kurt discuss RSA, the cryptographer's panel and of course, AI.
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login