Best cryptographic podcasts we could find (Updated February 2018)
Related podcasts: Security Cryptography Tech Crypto Bitcoin Software Technology Science Education Blockchain Computer Programming Higher Education Natural Sciences Social Sciences Arts Books Whitepaper Cryptofinance Cypherpunks  
Cryptographic public [search 0]
show episodes
 
E
E&E Bitcoin 'Cast
Weekly
 
Ed and Ethan bring you the latest bitcoin news updates every weekday. Want to know whatès moving bitcoin today? Tune in to find out!
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
S
Satoshi Nakamoto Institute
Rare
 
On January 3rd, 2009, an anonymous computer programmer (or programmers) going by the name Satoshi Nakamoto mined the first block of the Bitcoin blockchain, kickstarting the world's first fully realized crypto-currency. Satoshi did not build Bitcoin in a vacuum, however. Instead he stood upon the shoulders of cryptographic giants and free software gurus. From Timothy C. May and the Cypherpunks to Richard Stallman, Nick Szabo and beyond, the foundations of Bitcoin were built by a distributed n ...
 
D
DECENTRALIZE, the podcast
Weekly
 
The best place for learning about what's going on with the latest decentralized tech.
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Security Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
T
The Crypto-Mises Podcast
Monthly
 
The official podcast of the Satoshi Nakamoto Institute
 
C
CRYPTO.decrypted
Weekly+
 
A series of shows on crypto currencies and blockhain technologies.
 
T
The Privacy Blog
Daily+
 
Privacy, Security, Cryptography, and Anonymity
 
Q
Q.E.D. Code
Rare
 
Explore the intersection between software and mathematics. Michael L Perry takes you on a journey through the history of computing, information theory, cryptography, distributed systems, and everywhere else that math has influenced technology. Not only will you dive into math papers, but you'll also learn valuable programming techniques that you can apply in any language. Code Erat Demonstrandum
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
C
CS50 2014
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
p
pseudorandom podcast series
Daily+
 
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics!RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
 
R
Return of Sherlock Holmes, The by DOYLE, Sir Arthur Conan
 
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)
 
I
Intellectual Icebergs
Rare
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
 
E
Edgar Allan Poe Poems by Edgar Allan Poe
 
Best known for his scary tales, mystery and detective stories and imaginative fantasy stories, Edgar Allan Poe was also a gifted poet. He wrote more than 70 poems and almost all of them have been widely appreciated by readers and critics alike. This collection contains some of his most famous ones, including the immortal Raven, which combines a sense of doom and nameless despair. With its ringing, alliterative and repetitive lines and strange, supernatural atmosphere, it remains one of Poe's ...
 
O
One-Time Pod
Daily+
 
One-Time Pod explores the history of cryptography through episodes produced by students in Derek Bruff's first-year writing seminar at Vanderbilt University. Each episode considers a different code or cipher, how it works, and why it's interesting.The title is a play on the term "one-time pad," a cipher that's used just once and is thus perfectly secure. Thanks to Joe Hills for the title suggestion.For more on Dr. Bruff's first-year seminar on cryptography, visit the course homepage: http:// ...
 
Loading …
show series
 
T
The Ancap Barber Shop
 
In this bonus episode Scott yaks with fellow ancap and crypto lover Jake Bryan. BE WARNED, THERE ARE AUDIO ISSUES WITH THIS EPISODE!!! Scott, having been a big bad podcaster for a little over a year now didn't think he needed to do a routine sound check before recording this podcast, resulting in some electronic interference leaking into the fi ...…
 
S
Security Now (Video HD)
 
This week, before we focus upon the industry-wide catastrophe enabled by precisely timing the instructed execution of all contemporary high-performance processor architectures... we examine a change in Microsoft's policy regarding non-Microsoft A/V systems, Firefox Quantum's performance when tracking protections are enabled, the very worrisome ...…
 
This is episode #017 of the Bitcoin Sage show (@bitcoinsage). Today’s episode about bitcoin & crypto-currencies on January 1, 2018 – let’s get started with: I’d like to start by wishing everyone a Happy New Year and all the best in health, happiness and wealth in 2018. Our old, old friend Dennis Gartman back on CNBC spitting truth about bitcoin ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
ClaimChain is a Public Key Infrastructure unique in that it can operate in fully decentralized settings with no trusted parties. A vouching mechanism among users, similar to the Web of Trust, assists with social authentication but without revealing the users' social graph. High-integrity data structures prevent equivocation and help detect comp ...…
 
C
Chaos Computer Club - recent audio-only feed
 
ClaimChain is a Public Key Infrastructure unique in that it can operate in fully decentralized settings with no trusted parties. A vouching mechanism among users, similar to the Web of Trust, assists with social authentication but without revealing the users' social graph. High-integrity data structures prevent equivocation and help detect comp ...…
 
Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all. In contrast, activities like testing, debugging, and code review are accepted as essential. They are woven into the lives of nearly all developers. In this talk, I will explain how I see machine-checked proofs ...…
 
Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all. In contrast, activities like testing, debugging, and code review are accepted as essential. They are woven into the lives of nearly all developers. In this talk, I will explain how I see machine-checked proofs ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often triv ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number gener ...…
 
C
Chaos Computer Club - recent audio-only feed
 
The Noise Protocol Framework is a toolkit for 2-party secure-channel protocols. Noise is used by WhatsApp for client-server communication, by the WireGuard VPN protocol, and by the Lightning Network. In this talk I'll describe the rationale behind such a framework, and how you can use it to build simple, efficient, and customized secure-channel ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
The Noise Protocol Framework is a toolkit for 2-party secure-channel protocols. Noise is used by WhatsApp for client-server communication, by the WireGuard VPN protocol, and by the Lightning Network. In this talk I'll describe the rationale behind such a framework, and how you can use it to build simple, efficient, and customized secure-channel ...…
 
C
Chaos Computer Club - recent audio-only feed
 
In this talk we will present a deep-dive analysis of the anatomy of QNX: a proprietary, real-time operating system aimed at the embedded market used in many sensitive and critical systems, particularly within the automotive industry.We will present the first reverse-engineering and analysis of the exploit mitigations, secure random number gener ...…
 
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and the update mechanism itself are proprietary and have not been throughly analyze ...…
 
C
Chaos Computer Club - recent audio-only feed
 
Hoermann BiSecur is a bi-directional wireless access control system “for the convenient and secure operation of garage and entrance gate operators, door operators, lights […]” and smart home devices. The radio signal is AES-128 encrypted and the system is marketed to be “as secure as online banking”. In comparison to conventional and often triv ...…
 
Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. While it is well-known that CPUs feature a microcode update mechanism, very little is known about its inner workings given that microcode and the update mechanism itself are proprietary and have not been throughly analyze ...…
 
Bob Van Valzah joined me for two calls that became a seven-part series on Digital Currencies & Bitcoin. To the left is Bob’s initial mining rig from 2010. To make it easier for folks we’ve merged all seven episodes together into this one large episode. Please note on several occasions throughout the podcast you’ll hear a brief snippet of music, ...…
 
Round 7 is here! Bitcoin smashes through to new highs, and what is bitchain? Plus, cryptographic kittens are a giant hairball in the Ethereum drain! And what will the IRS tax policy on cryptocurrency be? Email two@ blockheadspod.com to submit your Round 0 questions. ** www.blockheadspod.com/itunes – Subscribe on iTunes www.blockheadspod.com/goo ...…
 
A
All Jupiter Broadcasting Shows
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
A
All Jupiter Broadcasting Videos
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
A
All Jupiter Broadcasting Videos
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
Critical systems once operated by humans are now becoming more dependent on code and developers. There are many benefits to machines and automation such as increased productivity, quality and predictability. But when websites crash, 911 systems go down or when radiation-therapy machines kill patients because of a software error, it’s vital that ...…
 
On Monday, September 15th, 2008, tourists and locals stood outside and watched as employees of Lehman Brothers left the New York City headquarters on news that the bank would need to liquidate or file bankruptcy. 46 Days later, Satoshi Nakamoto posted the first white paper outlining Bitcoin. Less than 3 months later, the first Bitcoin code was ...…
 
This week, prodigal son Marshall Hayner, founder of Metal (metalpaysme.com) shleps all the way accross the Bay Bridge to come home. Ben and Carter will chat with him about the cryptocurrency bubble, regulations, and his whilrwind journey as a founder. As always, you can HODL, and you reach out to us—or to our cryptographically authenticated stu ...…
 
T
The Top Entrepreneurs in Money, Marketing, Business and Life
 
Bruce Pon. He’s the CEO and founder of BigchainDB and he’s been playing in the crypto world. Famous Five: Favorite Book? – Mungerisms by Charlie Munger What CEO do you follow? – Vitalik Buterin Favorite online tool? — Streak CRM How many hours of sleep do you get?— At least 8 If you could let your 20-year old self, know one thing, what would it ...…
 
Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De ValenceThis talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and give a brief overview of the implementation strategy. We wil ...…
 
In this presentation I will present the cryptographic aspects of a newsecure filesystem called SEF. The goals of this project is to create afilesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
In this presentation I will present the cryptographic aspects of a newsecure filesystem called SEF. The goals of this project is to create afilesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we're not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community buildi ...…
 
C
Chaos Computer Club - recent events feed (low quality)
 
We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access ...…
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login