Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 3min
I've Never Heard of an Internship That Was Not Paid
02:37 • 2min
Doing an Internship Doesn't Matter to Other Companies?
04:57 • 4min
Do You Want to Work for a General Electric?
09:08 • 2min
What's Up With the Wiki Leaks?
11:19 • 2min
Is This a Pornographic or Something Like That on Your Work Computer?
12:53 • 3min
How to Uncover a Camera Camera
15:50 • 2min
What Is a Hashback?
18:16 • 2min
Is This Really Dangerous?
20:36 • 2min
Is It Safe to Use a Shaw One for Something Security Related?
22:08 • 3min
Is Make Magazine Really Good?
25:35 • 6min
Is There a Difference Between a Tessaract and a Binary?
31:09 • 2min
Pendemic, the Board Game
33:07 • 3min
Can You Play Pandemiic Legacy?
35:48 • 4min
The One Time Pad
39:40 • 4min
What Is Public Key Cryptography?
43:44 • 5min
The Awesome Part of Public Key Cryptography
48:26 • 4min
Using a Crypher to Transform Unincrupted Text
52:24 • 2min
Stateful Cyphers Are Bad
54:41 • 5min
Is There a Way to Keep Your Data Secure?
59:34 • 2min
Quantum Computers Can Decrypt Your Data Very Quickly and Parallelly
01:01:36 • 4min
What's the Point of Croptography?
01:06:02 • 6min