Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
Introduction
00:00 • 2min
TLS
01:56 • 2min
Isogony-Based Cryptography Is Not Just Isomalty, It's Complex.
04:23 • 2min
Is There a Quantum Computer?
06:00 • 2min
Tail Net Lock
07:33 • 2min
Using a Curve 25519 Key Exchange in a Distributed Setting?
09:16 • 2min
What Is a Valid Bag of Keys?
11:43 • 2min
WireGuard Derivative VPNs on the Podcast Have Raised $100 Million
13:30 • 2min
Octa Security
15:36 • 3min
Is There a Better SSO Provider?
18:25 • 5min
Do CISOs Really Make Sense?
23:19 • 2min
CISOs Are Moving Backwards Towards the Business Side
25:02 • 3min
Android 13 Is the First Android Release Where Memory Safety Vulnerabilities Do Not Represent a Majority of Android's Varies
27:48 • 3min
Using Memory Safe Languages in Projects
30:44 • 3min
Javascript Example and It's Broken Uh I've Tried to Find It Again but It Was Not Saved Well I Can't Ever See It Well but Magical Realism
33:18 • 2min
Rust in Android 13
34:49 • 2min
Chrome Masking - Pass Keys in Chrome
36:35 • 2min
Chrome Pass Keys on Windows 11 Mac OS and Android
38:15 • 2min
Pass Key Support for Android Password Manager Is Coming Soon
40:01 • 3min
FTX
42:38 • 2min
Is This Going to Affect Sea Cash?
44:24 • 2min
Cryptocurrency - Is This Really a Token Competition?
46:52 • 2min
I Think We're Gonna Get Another Supply Chain Security Notable Breach
48:53 • 3min
S-Bombs Fucking Software Bill of Materials
51:37 • 2min
Is Zig a Memory Safe Language?
53:49 • 2min
Passkis
55:25 • 2min
Security and Cryptography Podcast Bye and Tamas Petacic
57:23 • 2min