Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Introduction
00:00 • 2min
Siber Diplomat - Christopher Painter
02:12 • 2min
I Think It's a Vodo, Technical Issue That Ordinary People Can't Understand
03:59 • 2min
Ciber Is Not Distinctive - It's About Exploiting Systems
06:06 • 2min
Is It Important to Disclose Vulnerabilities?
07:43 • 2min
Tor Signals Versus Human Intelligence
09:39 • 2min
The White House and the Department of Homeland Security
11:12 • 2min
Ga Systems vs Other Similar Ego Systems?
12:52 • 4min
What Are the Types of Signals That Surveyors Look For?
16:34 • 2min
Is There a Time Line for Such Attacks?
18:07 • 3min
Getting Companies to Patch Known Vulnerabilities
21:29 • 2min
Are You a Ransom Wearer?
23:16 • 2min
Do You Care About the Ransom Wor Attacks?
25:39 • 2min
Aren't We Connected to the Internet?
27:10 • 2min
I Don't Think We're Going to See a Siber Attack
28:51 • 2min
Is There a Roll for Decentralized Data Base Toachknowledge?
30:59 • 3min
The Ukranians Are Getting Out in Front Far Better Than They Have Been Before, and That Makes a Difference
34:24 • 2min
Is It Possible to Use Software to Break Hardware?
36:01 • 2min
What Do You Think About the by Demonstration?
37:45 • 4min