Changelog Master Feed

Schneier on security for tomorrow’s software (Changelog Interviews #490)

May 20, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Adding a Telegraph Operator to Influx Data
01:56 • 2min
3
What Is Public Interest Technology?
03:35 • 3min
4
Is There a Path for It?
06:40 • 2min
5
How Did You Get Your First Book, Secrets and Lies?
08:59 • 3min
6
The Intro to Business Email Compromise
11:30 • 4min
7
Is Ransom Where?
15:39 • 2min
8
Bitcoin and Cryptocurrency
17:51 • 2min
9
The Block Chain Is a Myth, Right?
19:39 • 3min
10
Block Chain Base Financing - I'm Having Trouble With My Bit Coin
22:44 • 2min
11
Is There a Design Problem With Social Engineering?
24:44 • 2min
12
I'm Not a Computer User, I Can't Do That.
27:14 • 4min
13
Solar Winds
31:38 • 2min
14
I'm Not Up on Carseta Litigation, but Is It Working?
33:55 • 4min
15
How Does Facebook Make Money?
37:46 • 3min
16
Is This Good? Or Is It Bad?
40:51 • 2min
17
The Career Path?
42:38 • 2min
18
Open Source, Clote Source, Is Not a Magic Elixir
44:33 • 2min
19
Open Source and the Alpha Omega Project
46:52 • 5min
20
How to Stay on Top of Cryptogram?
51:45 • 2min
21
Cryptocurrency, Security Theatre?
54:06 • 2min
22
Is There a Security Theatre?
56:15 • 2min
23
The Unintended Consequences of Your Tex System
58:25 • 2min
24
You Don't Use the Cloud
01:00:46 • 3min
25
I'm Going to Spain to Get a Cr Code.
01:03:16 • 2min
26
Can You Use It to Day?
01:04:59 • 2min
27
Data Is the Pollution Problem of the Information Age
01:06:42 • 2min
28
I've Already Accepted Your Cookie Policy
01:08:49 • 2min
29
The Newist Books That Are Worth Reading?
01:11:06 • 2min
30
Finders Tolk Episode 89
01:13:05 • 2min