Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...
Kevin Mitnick (RIP) visits Google’s NYC office to discuss his book “Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker” with Eran Feigenbaum, Google’s Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series....
In the early 1990s, a group of mathematicians, misfits, hackers, and hobbyists calling themselves “the cypherpunks” came together around a shared belief that the internet would either demolish society’s artificial walls or lay the groundwork for an Orwellian state. They saw cryptography as a weapon against central planning...
The Unbreakable Kryptos Code (youtu.be)
Malicious Backdoor in xz liblzma (youtu.be)
Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing.https://openwall.com/lists/…/2…
new linux exploit is absolutely insane (youtu.be)
Broadcast LoRa packets WITHOUT a radio (youtu.be)
AI summary of transcript:...
Charles on Selective Disclosure Regimes using Midnight (youtu.be)
Hosky speaks at length about selective disclosure regimes using Midnight....
How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN (youtu.be)
DO NOT try this EVER....
How to Start a War With a Flash Drive (31:45) (youtu.be)
Advanced Meshtastic Series (www.youtube.com)
Welcome to the Advanced Meshtastic Series. We’ll be getting into some of the more advanced things you can do with Meshtastic.
True Random Numbers - Computerphile (12:15) (youtu.be)
Programs aren’t capable of generating true random numbers, so how can we? Are they even useful? Dr Valerio Giuffrida demonstrates how to get a true random number from most computers.
Darknet Diaries: True stories from the dark side of the Internet (darknetdiaries.com)
I just learned about this podcast today. Enjoy!
How the Best Hackers Learn Their Craft [42:46] (youtu.be)
All cops are broadcasting: Obtaining the secret TETRA primitives after decades in the shadows (47:30) (youtu.be)
In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and...
"Formally Verifying Everybody's Cryptography" by Mike Dodds, Joey Dodds (Strange Loop 2022) (40:30) (youtu.be)
Formal Methods for the Working DeFi Dev by Rikard Hjort | Devcon Bogota (1:03:31) (youtu.be)
Public Key Cryptography - Computerphile (6:19) (youtu.be)
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography...
Lichee Pi 4A: Serious RISC-V Desktop Computing (19:13) (youtu.be)
Sipeed Lichee Pi 4A RISC-V SBC review and Debian demo. This is the first RISC-V computer I’ve tested that’s provided a usable desktop computing experience right out of the box. End-user RISC-V is starting to arrive! :)...
Let's Discuss the Potential for Vulnerability Here: Why you should check your secrets into Git | Warren Parad (55:08) (youtu.be)
Slides - https://authress.io/l/codemotion...
Video-Based Cryptanalysis [3:00] (youtu.be)
Video-Based Cryptanalysis
Vitalik Buterin explains Ethereum (youtu.be)
Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications....
Blockchain is a terrible idea for elections, actually.
https://www.protocol.com/media-library/vote-check.jpg?id=24672159&width=1245&height=700&quality=85&coordinates=7%2C0%2C8%2C0...
This Guy Built an Endgame Rocket Espresso Machine | An Engineer's Rocket Appartamento Mods [12:12] (youtu.be)
My first espresso machine, a rocket appartamento, has turned into a testbed for all my ideas of how much technology you can pack into an espresso machine. Let me share what I’ve done, and please ask about what you would like to hear more of!...
My Adventures as the World's Most Wanted Hacker | Kevin Mitnick | Talks at Google [52:11] (youtu.be)
Kevin Mitnick (RIP) visits Google’s NYC office to discuss his book “Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker” with Eran Feigenbaum, Google’s Director of Security for Google Apps. This event took place on August 17, 2011, as part of the Authors@Google series....
Secrets Hidden in Images (Steganography) - Computerphile [12:13] (youtu.be)
Secret texts buried in a picture of your dog? Image Analyst Dr. Mike Pound explains the art of steganography in digital images.
Cypherpunks Write Code (youtu.be)
In the early 1990s, a group of mathematicians, misfits, hackers, and hobbyists calling themselves “the cypherpunks” came together around a shared belief that the internet would either demolish society’s artificial walls or lay the groundwork for an Orwellian state. They saw cryptography as a weapon against central planning...
Cicada 3301: An Internet Mystery (youtu.be)
In this video I explore an elaborate cryptographic internet puzzle orchestrated by a mysterious individual or group known as Cicada 3301....