Best cryptographic podcasts we could find (Updated October 2017)
Related podcasts: Security Cryptography Tech Crypto Bitcoin Software Technology Science Blockchain Computer Programming Education Higher Education Natural Sciences Social Sciences Arts Books Whitepaper Cryptofinance Cypherpunks  
Cryptographic public [search 0]
show episodes
 
E
E&E Bitcoin 'Cast
Weekly
 
Ed and Ethan bring you the latest bitcoin news updates every weekday. Want to know whatès moving bitcoin today? Tune in to find out!
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
D
DECENTRALIZE, the podcast
Weekly
 
The best place for learning about what's going on with the latest decentralized tech.
 
S
Satoshi Nakamoto Institute
Rare
 
On January 3rd, 2009, an anonymous computer programmer (or programmers) going by the name Satoshi Nakamoto mined the first block of the Bitcoin blockchain, kickstarting the world's first fully realized crypto-currency. Satoshi did not build Bitcoin in a vacuum, however. Instead he stood upon the shoulders of cryptographic giants and free software gurus. From Timothy C. May and the Cypherpunks to Richard Stallman, Nick Szabo and beyond, the foundations of Bitcoin were built by a distributed n ...
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Security Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
T
The Crypto-Mises Podcast
Monthly
 
The official podcast of the Satoshi Nakamoto Institute
 
T
The Privacy Blog
Daily+
 
Privacy, Security, Cryptography, and Anonymity
 
C
CRYPTO.decrypted
Weekly+
 
A series of shows on crypto currencies and blockhain technologies.
 
Q
Q.E.D. Code
Rare
 
Explore the intersection between software and mathematics. Michael L Perry takes you on a journey through the history of computing, information theory, cryptography, distributed systems, and everywhere else that math has influenced technology. Not only will you dive into math papers, but you'll also learn valuable programming techniques that you can apply in any language. Code Erat Demonstrandum
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
p
pseudorandom podcast series
Daily+
 
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics!RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
 
T
This is CS50 2014.
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
E
Edgar Allan Poe Poems by Edgar Allan Poe
 
Best known for his scary tales, mystery and detective stories and imaginative fantasy stories, Edgar Allan Poe was also a gifted poet. He wrote more than 70 poems and almost all of them have been widely appreciated by readers and critics alike. This collection contains some of his most famous ones, including the immortal Raven, which combines a sense of doom and nameless despair. With its ringing, alliterative and repetitive lines and strange, supernatural atmosphere, it remains one of Poe's ...
 
I
Intellectual Icebergs
Rare
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
 
R
Return of Sherlock Holmes, The by DOYLE, Sir Arthur Conan
 
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)
 
Loading …
show series
 
https://Alphainvestors.Club - Hey guys! Thanks for joining us here at Alpha Investors.Club where today we will be reviewing MICROMONEY Crypto currency.MicroMoney Crypto currency, found online at MicroMoney.io, is a blockchain-based platform designed to disrupt the big data and credit bureau industries. It aims to connect customers to financial ...…
 
This week, prodigal son Marshall Hayner, founder of Metal (metalpaysme.com) shleps all the way accross the Bay Bridge to come home. Ben and Carter will chat with him about the cryptocurrency bubble, regulations, and his whilrwind journey as a founder. As always, you can HODL, and you reach out to us—or to our cryptographically authenticated stu ...…
 
T
The Top Entrepreneurs in Money, Marketing, Business and Life
 
Bruce Pon. He’s the CEO and founder of BigchainDB and he’s been playing in the crypto world. Famous Five: Favorite Book? – Mungerisms by Charlie Munger What CEO do you follow? – Vitalik Buterin Favorite online tool? — Streak CRM How many hours of sleep do you get?— At least 8 If you could let your 20-year old self, know one thing, what would it ...…
 
Moderator Dana Rodriguez is joined this week by cryptographer Jeremy Horwitz and teacher Laury Fischer.By david@kalw.org (David Latulippe).
 
In this presentation I will present the cryptographic aspects of a newsecure filesystem called SEF. The goals of this project is to create afilesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we're not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community buildi ...…
 
Over the past year multiple people have been engaging language maintainers and designers to change their use of CSPRNGs (mainly relying on user-land RNGs like the one from OpenSSL, and sometimes suggesting "adding entropy" by various means from user-land daemons like haveged). In this short presentation we'll survey the struggle of cryptographe ...…
 
C
Chaos Computer Club - recent audio-only feed
 
We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access ...…
 
In the 90's there was a political struggle about control of the availability of cryptographic technologies. Ultimately, it was won because certain industries aligned with civil society. Or it least it appears as if it was won. Since it is back. Trump, May and Macron have all demanded backdoors. In September the European Commission is slated to ...…
 
S
Something Cheeky: Movies
 
Wonder Woman - Part II Rosanna and Nikki enjoy functional superhero costumes, think the British cryptographers are crappy, are glad Diana doesn't apologize, think Dr. Poison has a boring name, and Nikki is conflicted about the lack of a sex scene. Nikki's most off-base prediction: Diana would reverse-engineer Steve's crashed plane to invent her ...…
 
In a blockchain, each block is “chained” to the previous one in a peer-to-peer data sharing network.We’ve all heard the buzz about the potential applications of blockchain technology. But what’s actually happening in developing countries in Asia and the Pacific?Beyond bitcoin payments and remittances, blockchain exists largely in the pilot stag ...…
 
The Internet of Things (IoT) will bring us a tsunami of network-enabled devices, for consumer use as well as yet to be imagined industrial and commercial applications. Many of these devices will be payment enabled, many using card payment rails. Securing those billions of IoT devices is going to require techniques deployed by the mobile industr ...…
 
Not everyday do you get to hear from someone that can make you feel like The Big Bang Theory got it way wrong, and Silicon Valley got it way right. I had the pleasure recently to talk to someone who relocated from his home-country, Czech Republic to the living breathing city of Hong Kong. A Sci-Fi fan who envisions a technology revolution world ...…
 
T
The Voice before the Void: Arcana, Story, Poetry
 
Genuine mysteries are so very rare, but here is an artifact of an unknown language, an unknown botany, an unknown madness, an unknown world. -The Voice before the Void “Voynich manuscript” Wikipedia The Voynich manuscript is an illustrated codex hand-written … Continue reading →
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
On this bonus interview episode of Neocash Radio JJ talks with Dr Julian Hosp about TenX and COMIT. TenX is building a multi-blockchain debit card and mobile wallet that currently works with Bitcoin, DASH, Ether, and ERC20 tokens. COMIT is a Cryptographically-secure Off-chain Multi-asset Instant Transaction network that leverages Hashed Time Lo ...…
 
Ricky McCormick was found dead in a field near St. Louis, Missouri. It would be another routine investigation for police officers if it wasn't for cryptic notes found in Ricky's pocket. Not only are local law enforcement stumped, but so are the expert cryptographers at the FBI and they are asking for your help. Perhaps you can figure out what t ...…
 
T
The Tim Ferriss Show – The Blog of Author Tim Ferriss
 
“Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He’s a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of “smart c ...…
 
Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He's a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of "smart contracts" were developed by Nick with the goal of bringin ...…
 
C
Camp Tech Podcast with Avery Swartz
 
Guest: Shawn Hooper What He Does: Shawn has worked as a computer programmer for most of his life, and is currently the Director of IT for Actionable Books — His job entails developing all of the internal tools for their staff. He is also a WordPress core contributor. Ponderance: How do SSL certificates and HTTPS help to secure websites? Find hi ...…
 
In this SPECIAL EPISODE of Hidden Forces podcast, Demetri Kofinas brings on two fellow entrepreneurs from New York City's burgeoning Silicon Alley - David Porzio and Man Hoang - to talk about some of the latest trends in tech, media, and culture. This is meant to be informal, funny, and casual. David Porzio is the founder of Translator Media an ...…
 
H
Hacking the System: Blueprint to Making $100,000
 
Get $10 of Bitcoin free when you buy Bitcoin here: http://ianbalina.com/sixfigures/coinbaseBitcoin is the first global, decentralized currency that allows you to send money from one person to another without involving a third party broker, such as a bank. You only need your computer to make transactions because Bitcoin is fundamentally software ...…
 
H
House of Mystery True Crime History
 
Of all the notorious serial killers of the 20th century, only San Francisco’s Zodiac remains at large. A cold-blooded psycho stalking the nightmare streets of the late 1960s, he left behind at least five dead victims. The menacing sociopath sent more than two dozen letters to the newspapers, including four weird ciphers. Only the first code was ...…
 
Metaverse EP 12- War does not determine who is right — only who is leftCryptoWar and CryptographyHiroJa Shibe Here-Speaking to you from a small café adjacent to the famous The Black Sun Bar. Given you the latest on what is happening on The Street and what is affecting our world here in the Metaverse.Newshttps://www.typeform.com/blog/human-exper ...…
 
C
ContraRisk Security Podcast
 
If your image of blockchain technology is entirely linked to crypto-currencies like Bitcoin, think again. Patrick Hubbard of SolarWinds explains that the distributed ledger approach of blockchain has applications far beyond payments and financial services. The assurance provided by a shared record, cryptographically certified, is that it offers ...…
 
H
HiroJa Shibe's Space Odyssey Network
 
MOSAP- EP 122- The Other Guys- People whom have work on Bitcoin CodeNEWShttp://thehackernews.com/2017/04/mastercard-fingerprint-payment-card.htmlhttp://bitcoinist.com/spells-genesis-game-launches-app/Places People MeetDev Mailing Listhttps://lists.linuxfoundation.org/mailman/listinfo/bitcoin-devhttp://bitcoin-development.narkive.com/Meetinghttp ...…
 
Welcome to show number 2017.17!Show Notes Kelly Penguin Girl and Jon "One Punch" Watson Kelly is not-so-secretly in love with the new President of France Newfie TV at CJON-DT still broadcasts the Twilight Zone! Read the blogs, by'! 11:00 - Jon's bit Jon explains cryptographics hashes, aaaannnnd.... ...then the Birthday Problem becomes the crypt ...…
 
T
Thinking Sideways Podcast
 
Unveiled in November 1990, Kryptos has baffled cryptographers for almost three decades, with two of its five messages still unbroken, and a promise of further mysteries after the last message is decrypted. What's the final answer to Kryptos? Nobody even knows the question yet.
 
T
Technology & Choice, and SAFE Crossroads podcasts
 
In this fourth installment of The Hemp Corner, we set out to better understand the amazing biochemical relationship between the human species and the cannabis plant. To get very far we have to break out some understanding of biochemical interactions in general and how they influence the human experience. Our guest, Dr. Jim Laurenzano, is a medi ...…
 
Over the last two years, Ransomware has become the hottest commodity in the criminal black market. And we do mean commodity—it's getting cheaper and more accessible to crooks, even the unskilled ones. On March 4th of this year, a leading cybercriminal, who goes by the name “Dereck1,” mentioned that there was a new ransomware variant out called ...…
 
EP 115 FungibilityNewshttp://www.metzdowd.com/pipermail/cryptography/2017-February/031604.htmlhttps://www.nytimes.com/2017/02/23/world/asia/kim-jong-nam-vx-nerve-agent-.html?_r=0http://marc.info/?l=git&m=148787047422954http://www.trustnodes.com/2017/04/03/arizona-gives-legal-status-blockchain-based-smart-contractshttp://www.reuters.com/article/ ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
This episode has been sponsored by Rollbar. Get a special offer via http://rollbar.com/pythonbytes #1 Brian: profile and pstats — Performance Analysis Doug Hellman is working on the Python 3 MOTW series that was so successful for Python 2. Recent edition is profile and pstats, for profiling parts of your code you may have concerns with and find ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login