Best cryptographic podcasts we could find (Updated December 2017)
Related podcasts: Security Cryptography Tech Crypto Bitcoin Software Technology Science Blockchain Computer Programming Education Higher Education Natural Sciences Social Sciences Arts Books Whitepaper Cryptofinance Cypherpunks  
Cryptographic public [search 0]
show episodes
 
E
E&E Bitcoin 'Cast
Weekly
 
Ed and Ethan bring you the latest bitcoin news updates every weekday. Want to know whatès moving bitcoin today? Tune in to find out!
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals.Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
S
Satoshi Nakamoto Institute
Rare
 
On January 3rd, 2009, an anonymous computer programmer (or programmers) going by the name Satoshi Nakamoto mined the first block of the Bitcoin blockchain, kickstarting the world's first fully realized crypto-currency. Satoshi did not build Bitcoin in a vacuum, however. Instead he stood upon the shoulders of cryptographic giants and free software gurus. From Timothy C. May and the Cypherpunks to Richard Stallman, Nick Szabo and beyond, the foundations of Bitcoin were built by a distributed n ...
 
D
DECENTRALIZE, the podcast
Weekly
 
The best place for learning about what's going on with the latest decentralized tech.
 
S
Secure Sessions Podcast Sponsored By IPVanish VPN
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Security Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
 
T
The Threatpost Podcast
Weekly
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
T
The Math Factor
Monthly
 
A brief, weekly math conversation and puzzle, airing on KUAF 91.3 FM, Fayetteville Arkansas. Send your answers, comments, questions, puzzles, or cash, to mathfactor@uark.edu!
 
C
CRYPTO.decrypted
Weekly+
 
A series of shows on crypto currencies and blockhain technologies.
 
T
The Crypto-Mises Podcast
Monthly
 
The official podcast of the Satoshi Nakamoto Institute
 
T
The Privacy Blog
Daily+
 
Privacy, Security, Cryptography, and Anonymity
 
Q
Q.E.D. Code
Rare
 
Explore the intersection between software and mathematics. Michael L Perry takes you on a journey through the history of computing, information theory, cryptography, distributed systems, and everywhere else that math has influenced technology. Not only will you dive into math papers, but you'll also learn valuable programming techniques that you can apply in any language. Code Erat Demonstrandum
 
H
Harvard College's Computer Science 50: Introduction to Computer Science I
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, encapsulation, data structures, databases, memory management, software development, virtualization, and websites. Languages include C, PHP, and JavaScript plus SQL, CSS, and XHTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. De ...
 
p
pseudorandom podcast series
Daily+
 
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics!RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
 
T
This is CS50 2014.
Weekly
 
Introduction to the intellectual enterprises of computer science and the art of programming. This course teaches students how to think algorithmically and solve problems efficiently. Topics include abstraction, algorithms, data structures, encapsulation, resource management, security, software engineering, and web development. Languages include C, PHP, and JavaScript plus SQL, CSS, and HTML. Problem sets inspired by real-world domains of biology, cryptography, finance, forensics, and gaming. ...
 
I
Intellectual Icebergs
Rare
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
 
R
Return of Sherlock Holmes, The by DOYLE, Sir Arthur Conan
 
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures. (summary by Laurie Anne Walden)
 
E
Edgar Allan Poe Poems by Edgar Allan Poe
 
Best known for his scary tales, mystery and detective stories and imaginative fantasy stories, Edgar Allan Poe was also a gifted poet. He wrote more than 70 poems and almost all of them have been widely appreciated by readers and critics alike. This collection contains some of his most famous ones, including the immortal Raven, which combines a sense of doom and nameless despair. With its ringing, alliterative and repetitive lines and strange, supernatural atmosphere, it remains one of Poe's ...
 
Loading …
show series
 
Bob Van Valzah joined me for two calls that became a seven-part series on Digital Currencies & Bitcoin. To the left is Bob’s initial mining rig from 2010. To make it easier for folks we’ve merged all seven episodes together into this one large episode. Please note on several occasions throughout the podcast you’ll hear a brief snippet of music, ...…
 
Round 7 is here! Bitcoin smashes through to new highs, and what is bitchain? Plus, cryptographic kittens are a giant hairball in the Ethereum drain! And what will the IRS tax policy on cryptocurrency be? Email two@ blockheadspod.com to submit your Round 0 questions. ** www.blockheadspod.com/itunes – Subscribe on iTunes www.blockheadspod.com/goo ...…
 
Author: Liza Mundy Book: CODE GIRLS: The Untold Story of the American Women Code Breakers of World War II Publishing: Hachette Books (October 10, 2017) http://kscj.com/wp-content/uploads/2017/11/Liza_Mundy_to_air.mp3 Synopsis (from the Publisher): NATIONAL BESTSELLER “Prodigiously researched and engrossing.”—New York Times Book Review “Fascinat ...…
 
A
All Jupiter Broadcasting Shows
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
A
All Jupiter Broadcasting Videos
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
A
All Jupiter Broadcasting Videos
 
We air Microsoft's dirty laundry as news leaks about their less than stellar handling of a security database breach, plus a fascinating story of deceit, white lies, and tacos; all par for the course in the world of social engineering, and we find out that so-called-smart cards might not be so smart, after it is revealed that millions are vulner ...…
 
Critical systems once operated by humans are now becoming more dependent on code and developers. There are many benefits to machines and automation such as increased productivity, quality and predictability. But when websites crash, 911 systems go down or when radiation-therapy machines kill patients because of a software error, it’s vital that ...…
 
This week, prodigal son Marshall Hayner, founder of Metal (metalpaysme.com) shleps all the way accross the Bay Bridge to come home. Ben and Carter will chat with him about the cryptocurrency bubble, regulations, and his whilrwind journey as a founder. As always, you can HODL, and you reach out to us—or to our cryptographically authenticated stu ...…
 
T
The Top Entrepreneurs in Money, Marketing, Business and Life
 
Bruce Pon. He’s the CEO and founder of BigchainDB and he’s been playing in the crypto world. Famous Five: Favorite Book? – Mungerisms by Charlie Munger What CEO do you follow? – Vitalik Buterin Favorite online tool? — Streak CRM How many hours of sleep do you get?— At least 8 If you could let your 20-year old self, know one thing, what would it ...…
 
Moderator Dana Rodriguez is joined this week by cryptographer Jeremy Horwitz and teacher Laury Fischer.By david@kalw.org (David Latulippe).
 
Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De ValenceThis talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and give a brief overview of the implementation strategy. We wil ...…
 
In this presentation I will present the cryptographic aspects of a newsecure filesystem called SEF. The goals of this project is to create afilesystem that is secure, robust and easy to understand. The goal of this presentation is two fold. One is to present cryptographic primitive that can be used to design secure filesystems as opposed to the ...…
 
C
Chaos Computer Club - recent audio-only feed
 
All the pieces to make encryption easy, secure and anonymous are in widespread use. Only we're not using them properly, making it difficult for the users. In this talk, Guido will show what benefits can be gained by using existing cryptographic protocols in a slightly different configuration. Doing so makes authentication easy, community buildi ...…
 
Over the past year multiple people have been engaging language maintainers and designers to change their use of CSPRNGs (mainly relying on user-land RNGs like the one from OpenSSL, and sometimes suggesting "adding entropy" by various means from user-land daemons like haveged). In this short presentation we'll survey the struggle of cryptographe ...…
 
C
Chaos Computer Club - recent audio-only feed
 
We present “olmogo”, a novel cryptographic, distributed data storage system and end user application that could – within a single platform – replace today’s cloud storage, messaging / chat and social networks with a cryptographically secure alternative in which users can trustfully share their data while the infrastructure itself has no access ...…
 
In the 90's there was a political struggle about control of the availability of cryptographic technologies. Ultimately, it was won because certain industries aligned with civil society. Or it least it appears as if it was won. Since it is back. Trump, May and Macron have all demanded backdoors. In September the European Commission is slated to ...…
 
S
Something Cheeky: Movies
 
Wonder Woman - Part II Rosanna and Nikki enjoy functional superhero costumes, think the British cryptographers are crappy, are glad Diana doesn't apologize, think Dr. Poison has a boring name, and Nikki is conflicted about the lack of a sex scene. Nikki's most off-base prediction: Diana would reverse-engineer Steve's crashed plane to invent her ...…
 
In a blockchain, each block is “chained” to the previous one in a peer-to-peer data sharing network.We’ve all heard the buzz about the potential applications of blockchain technology. But what’s actually happening in developing countries in Asia and the Pacific?Beyond bitcoin payments and remittances, blockchain exists largely in the pilot stag ...…
 
The Internet of Things (IoT) will bring us a tsunami of network-enabled devices, for consumer use as well as yet to be imagined industrial and commercial applications. Many of these devices will be payment enabled, many using card payment rails. Securing those billions of IoT devices is going to require techniques deployed by the mobile industr ...…
 
Not everyday do you get to hear from someone that can make you feel like The Big Bang Theory got it way wrong, and Silicon Valley got it way right. I had the pleasure recently to talk to someone who relocated from his home-country, Czech Republic to the living breathing city of Hong Kong. A Sci-Fi fan who envisions a technology revolution world ...…
 
T
The Voice before the Void: Arcana, Story, Poetry
 
Genuine mysteries are so very rare, but here is an artifact of an unknown language, an unknown botany, an unknown madness, an unknown world. -The Voice before the Void “Voynich manuscript” Wikipedia The Voynich manuscript is an illustrated codex hand-written … Continue reading →
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
By now everyone's heard of Bitcoin, and probably has an opinion on it. But the world of cryptocurrencies has a new object of fascination: ICOs. Whereas the tech boom in the 90s was characterized by an obsession with IPOs, these ICOs (initial coin offerings) are cryptographic tokens being sold onto the market for hungry investors eager to get in ...…
 
On this bonus interview episode of Neocash Radio JJ talks with Dr Julian Hosp about TenX and COMIT. TenX is building a multi-blockchain debit card and mobile wallet that currently works with Bitcoin, DASH, Ether, and ERC20 tokens. COMIT is a Cryptographically-secure Off-chain Multi-asset Instant Transaction network that leverages Hashed Time Lo ...…
 
Ricky McCormick was found dead in a field near St. Louis, Missouri. It would be another routine investigation for police officers if it wasn't for cryptic notes found in Ricky's pocket. Not only are local law enforcement stumped, but so are the expert cryptographers at the FBI and they are asking for your help. Perhaps you can figure out what t ...…
 
T
The Tim Ferriss Show – The Blog of Author Tim Ferriss
 
“Trusted third parties are security holes.” – Nick Szabo Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He’s a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of “smart c ...…
 
Nick Szabo (@NickSzabo4) is a polymath. The breadth and depth of his interests and knowledge are truly astounding. He's a computer scientist, legal scholar, and cryptographer best known for his pioneering research in digital contracts and cryptocurrency. The phrase and concept of "smart contracts" were developed by Nick with the goal of bringin ...…
 
C
Camp Tech Podcast with Avery Swartz
 
Guest: Shawn Hooper What He Does: Shawn has worked as a computer programmer for most of his life, and is currently the Director of IT for Actionable Books — His job entails developing all of the internal tools for their staff. He is also a WordPress core contributor. Ponderance: How do SSL certificates and HTTPS help to secure websites? Find hi ...…
 
H
Hacking the System: Blueprint to Making $100,000
 
Get $10 of Bitcoin free when you buy Bitcoin here: http://ianbalina.com/sixfigures/coinbaseBitcoin is the first global, decentralized currency that allows you to send money from one person to another without involving a third party broker, such as a bank. You only need your computer to make transactions because Bitcoin is fundamentally software ...…
 
H
House of Mystery True Crime History
 
Of all the notorious serial killers of the 20th century, only San Francisco’s Zodiac remains at large. A cold-blooded psycho stalking the nightmare streets of the late 1960s, he left behind at least five dead victims. The menacing sociopath sent more than two dozen letters to the newspapers, including four weird ciphers. Only the first code was ...…
 
Metaverse EP 12- War does not determine who is right — only who is leftCryptoWar and CryptographyHiroJa Shibe Here-Speaking to you from a small café adjacent to the famous The Black Sun Bar. Given you the latest on what is happening on The Street and what is affecting our world here in the Metaverse.Newshttps://www.typeform.com/blog/human-exper ...…
 
C
ContraRisk Security Podcast
 
If your image of blockchain technology is entirely linked to crypto-currencies like Bitcoin, think again. Patrick Hubbard of SolarWinds explains that the distributed ledger approach of blockchain has applications far beyond payments and financial services. The assurance provided by a shared record, cryptographically certified, is that it offers ...…
 
H
HiroJa Shibe's Space Odyssey Network
 
MOSAP- EP 122- The Other Guys- People whom have work on Bitcoin CodeNEWShttp://thehackernews.com/2017/04/mastercard-fingerprint-payment-card.htmlhttp://bitcoinist.com/spells-genesis-game-launches-app/Places People MeetDev Mailing Listhttps://lists.linuxfoundation.org/mailman/listinfo/bitcoin-devhttp://bitcoin-development.narkive.com/Meetinghttp ...…
 
Welcome to show number 2017.17!Show Notes Kelly Penguin Girl and Jon "One Punch" Watson Kelly is not-so-secretly in love with the new President of France Newfie TV at CJON-DT still broadcasts the Twilight Zone! Read the blogs, by'! 11:00 - Jon's bit Jon explains cryptographics hashes, aaaannnnd.... ...then the Birthday Problem becomes the crypt ...…
 
T
Thinking Sideways Podcast
 
Unveiled in November 1990, Kryptos has baffled cryptographers for almost three decades, with two of its five messages still unbroken, and a promise of further mysteries after the last message is decrypted. What's the final answer to Kryptos? Nobody even knows the question yet.
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login