

Schneier on security for tomorrow’s software (Changelog Interviews #490)
May 20, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Introduction
00:00 • 2min
Adding a Telegraph Operator to Influx Data
01:56 • 2min
What Is Public Interest Technology?
03:35 • 3min
Is There a Path for It?
06:40 • 2min
How Did You Get Your First Book, Secrets and Lies?
08:59 • 3min
The Intro to Business Email Compromise
11:30 • 4min
Is Ransom Where?
15:39 • 2min
Bitcoin and Cryptocurrency
17:51 • 2min
The Block Chain Is a Myth, Right?
19:39 • 3min
Block Chain Base Financing - I'm Having Trouble With My Bit Coin
22:44 • 2min
Is There a Design Problem With Social Engineering?
24:44 • 2min
I'm Not a Computer User, I Can't Do That.
27:14 • 4min
Solar Winds
31:38 • 2min
I'm Not Up on Carseta Litigation, but Is It Working?
33:55 • 4min
How Does Facebook Make Money?
37:46 • 3min
Is This Good? Or Is It Bad?
40:51 • 2min
The Career Path?
42:38 • 2min
Open Source, Clote Source, Is Not a Magic Elixir
44:33 • 2min
Open Source and the Alpha Omega Project
46:52 • 5min
How to Stay on Top of Cryptogram?
51:45 • 2min
Cryptocurrency, Security Theatre?
54:06 • 2min
Is There a Security Theatre?
56:15 • 2min
The Unintended Consequences of Your Tex System
58:25 • 2min
You Don't Use the Cloud
01:00:46 • 3min
I'm Going to Spain to Get a Cr Code.
01:03:16 • 2min
Can You Use It to Day?
01:04:59 • 2min
Data Is the Pollution Problem of the Information Age
01:06:42 • 2min
I've Already Accepted Your Cookie Policy
01:08:49 • 2min
The Newist Books That Are Worth Reading?
01:11:06 • 2min
Finders Tolk Episode 89
01:13:05 • 2min