Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Introduction
00:00 • 3min
The Risks of Remote Assault on Mobile Phones
02:47 • 2min
The Exynos Auto Chips T51 23 Chipset
04:24 • 2min
How to Turn Off Wi-Fi Calling
06:21 • 2min
The NIST Pills Chrono Competition
07:53 • 2min
Row Hammer on Frodo
10:15 • 3min
The Importance of Speed in Cryptocurrency
12:49 • 2min
How to Move Forward Into a Post Quantum World
14:34 • 3min
The Importance of TLS RSA Key Negotiation
17:18 • 2min
Post Quantum Privacy Pass: A Cool Protocol
19:17 • 5min
The Induced Demand Problem
23:48 • 2min
Apple and the Cloudflare People in a Talk on Cryptography
25:25 • 2min
TLS Anvil: Adapting Combinatorial Testing for TLS Libraries
27:23 • 2min
How to Update TLS for Post Quantum Stuff
28:59 • 1min
How to Use a Hash Function to Encrypt Data
30:25 • 2min
WhatsApp and 10 Encrypted Backups
31:56 • 2min
The Threats to Encrypted Cloud Storage
34:04 • 2min
The Future of Cryptography
35:56 • 3min
Randomness in Cisco's Adaptive Security Appliance
39:11 • 2min
ECDSA Nonces Shutter in Key Duplication in a Large Number of X 509 Certificates Generated by Cisco
40:56 • 3min
The Future of Messaging and Encryption
44:01 • 2min
The Future of Cryptography
45:56 • 3min
The Future of Cryptography
49:14 • 3min
Security Cryptography: A Side Project
52:10 • 2min