Programming Throwdown

Cryptography

Mar 30, 2017
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 3min
2
I've Never Heard of an Internship That Was Not Paid
02:37 • 2min
3
Doing an Internship Doesn't Matter to Other Companies?
04:57 • 4min
4
Do You Want to Work for a General Electric?
09:08 • 2min
5
What's Up With the Wiki Leaks?
11:19 • 2min
6
Is This a Pornographic or Something Like That on Your Work Computer?
12:53 • 3min
7
How to Uncover a Camera Camera
15:50 • 2min
8
What Is a Hashback?
18:16 • 2min
9
Is This Really Dangerous?
20:36 • 2min
10
Is It Safe to Use a Shaw One for Something Security Related?
22:08 • 3min
11
Is Make Magazine Really Good?
25:35 • 6min
12
Is There a Difference Between a Tessaract and a Binary?
31:09 • 2min
13
Pendemic, the Board Game
33:07 • 3min
14
Can You Play Pandemiic Legacy?
35:48 • 4min
15
The One Time Pad
39:40 • 4min
16
What Is Public Key Cryptography?
43:44 • 5min
17
The Awesome Part of Public Key Cryptography
48:26 • 4min
18
Using a Crypher to Transform Unincrupted Text
52:24 • 2min
19
Stateful Cyphers Are Bad
54:41 • 5min
20
Is There a Way to Keep Your Data Secure?
59:34 • 2min
21
Quantum Computers Can Decrypt Your Data Very Quickly and Parallelly
01:01:36 • 4min
22
What's the Point of Croptography?
01:06:02 • 6min