By Josh Bressers
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works.
There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is to hear from the people doing the work, they know...
=> https://opensourcesecuritypodcast.libsyn.com/rss
=> https://opensourcesecurity.io/
=> 2025-01-13 Safety vs Security with Thomas Depierre | 2025-01-01 The Future of Open Source Security | 2024-12-30 The new NIST password guidance | 2024-12-23 Santa's Supply Chain Security | 2024-12-16 CWE Top 25 List | 2024-12-09 FBI endorses E2E encryption | 2024-12-02 The D-Link D-bacle | 2024-11-25 What if XZ happened to a company? The openness of open source | 2024-11-18 Wordpress plugin security | 2024-11-11 Episode 454 - The state of open source with Brian Fox from Sonatype and Donald Fischer from Tidelift | 2024-11-04 Software Liability | 2024-10-28 All about Meshtastic | 2024-10-21 Python security with Seth Larson | 2024-10-14 What's Wrong With WordPress | 2024-10-07 The CUPSpocalypse | 2024-09-30 What's wrong with CISA? | 2024-09-23 The Tidelift 2024 open source maintainer report | 2024-09-16 Episode 446 - Researchers took over .MOBI TLD | 2024-09-09 EPSS with Jay Jacobs | 2024-09-02 Open Source and End of Life | 2024-08-26 The Supply Chain Security Crisis | 2024-08-19 The foundation of society, TLS certificates are a mess | 2024-08-12 Is CWE useful? | 2024-08-05 "What is open source" talk Josh gave | 2024-07-29 Where are all the youth in open source? | 2024-07-22 CISA's bad OSS advice vs the Whitehouse good advice | 2024-07-15 CocoPods and proper funding for open source | 2024-07-08 OpenSSH and node-ip - it's all exponential growth | 2024-07-01 polyfill.io - open source is too big to fix | 2024-06-24 Unreported vulnerabilities and everyone is getting hacked | 2024-06-17 Should OpenSSH block misbehaving clients? | 2024-06-10 Flipper Zero with Alex Kulagin | 2024-06-03 Redirecting HTTP to HTTPS | 2024-05-27 Frozen kernel security | 2024-05-20 The autonomy of open source developers | 2024-05-13 GitHub artifact attestation | 2024-05-06 Will run0 replace sudo? | 2024-04-29 Automatically exploiting CVEs with AI | 2024-04-22 Video game cheaters, also pretendo | 2024-04-15 The Notepad++ Parasite Website | 2024-04-08 FCC cybersecurity label for consumer devices | 2024-04-01 XZ Bonus Spectacular Episode | 2024-04-01 Do you have a security.txt file? | 2024-03-25 CISA's new SSDF attestation form | 2024-03-18 What's going on at NVD | 2024-03-11 Malicious GitHub repositories | 2024-03-04 Being right all the time is hard | 2024-02-26 Linux Kernel security with Greg K-H | 2024-02-19 Thomas Depierre on open source in Europe | 2024-02-12 Reducing attack surface for less security | 2024-02-05 The exploited ecosystem of open source | 2024-01-29 PyTorch and NPM get attacked, but it's OK | 2024-01-22 Blame the users for bad passwords! | 2024-01-15 The security tools that started it all | 2024-01-08 Package identifiers are really hard | 2024-01-01 Episode 409 - You wouldn't hack a train? | 2023-12-25 Does Kubernetes need long term support? | 2023-12-18 Should Santa use AI? | 2023-12-11 The security of radio | 2023-12-04 Modding games isn't cheating and security isn't fair | 2023-11-27 Does the government banning apps work? | 2023-11-20 Episode 402 - The EU's eIDAS regulation is a terrible idea | 2023-11-13 Security skills shortage - We've tried nothing and the same thing keeps happening | 2023-11-06 When can the government hack a victim? | 2023-10-30 Curl, Security, and Daniel Stenberg | 2023-10-23 Is only 11% of open source maintained? | 2023-10-16 The curl and glibc vulnerabilities | 2023-10-09 CLAs are bad, Mkay? | 2023-10-02 Uncertainty, trust, and security | 2023-09-25 The lie anyone can contribute to open source | 2023-09-18 Can you secure something you don't own? | 2023-09-11 Curl and the calamity of CVE | 2023-09-04 The Wordpress 100 year disaster recovery problem | 2023-08-28 Episode 390 - Rust shipping binaries doesn't matter | 2023-08-21 What would HashiCorp do? | 2023-08-14 Episode 388 - Video game vulnerabilities | 2023-08-07 Enterprise open source is different | 2023-07-31 We are watching web 2.0 burn | 2023-07-24 Is open source an insider threat? | 2023-07-17 What's next for open source? | 2023-07-10 Is open source dying? | 2023-07-03 Red Hat, you were the chosen one! | 2023-06-26 WTF Reddit, APIs and risk | 2023-06-19 Episode 380 - A new Sovereign Tech Fund program and the BBC on destroying hard drives | 2023-06-12 Will open source save the world, again? | 2023-06-05 Naming things is harder than security | 2023-05-29 The world is changing too fast for humans to understand | 2023-05-22 Open Source Summit, who built your open source, and AI | 2023-05-15 The market forces of left-pad, Episode 77 remaster part 2 | 2023-05-08 Episode 374 - The event we called left-pad, Episode 77 remaster part 1 | 2023-05-01 Episode 373 – HHGG security, Episode 42 remaster part 2 | 2023-04-24 HHGG security, remaster part 1 | 2023-04-17 pip install is the tool we deserve but not the tool we need | 2023-04-10 Open Source is bigger than you can imagine | 2023-04-03 OpenAI broke ChatGPT then tried to blame open source | 2023-03-27 The Sovereign Tech Fund with Fiona Krakenbürger | 2023-03-20 Episode 367 - Open source will never be the same | 2023-03-13 Software liability is coming | 2023-03-06 "I am not your supplier" with Thomas Depierre | 2023-02-27 Episode 364 - Using SBOMs is hard | 2023-02-20 Joylynn Kirui from Microsoft on DevSecOps | 2023-02-13 A lesson in Rust from Carol Nichols | 2023-02-06 GitHub got pwnt, but it wasn't very exciting | 2023-01-30 Memory safety and the NSA | 2023-01-23 The NOTAM outage and other legacy technology | 2023-01-16 Furby vs Alexa | 2023-01-09 Is open source being overexploited? | 2023-01-02 LastPass ducked up, now what? | 2022-12-26 Security Boxing Day | 2022-12-19 Jerry Bell tells us why Mastodon is awesome and MFA is hard | 2022-12-12 Jill Moné-Corallo on GitHub's bug bounty program | 2022-12-05 Stylometry removes anonymity | 2022-11-28 Episode 351 - Is security or usability a law of the universe? | 2022-11-21 Spam, Email, Content Moderation, and Infrastructure Oh My | 2022-11-14 The cyber is coming from inside the house - the UK is scanning itself | 2022-11-07 OpenSSL is the new lead paint | 2022-10-31 Airtags in luggage and weasel security - two peas in a suitcase | 2022-10-24 Security and working from home have terrible things in common | 2022-10-17 Cheap hacking devices turn security upside down | 2022-10-10 Python tarfile - 2022 is nothing like 2007 | 2022-10-03 Stop trying to fix the open source software supply chain | 2022-09-26 Programming languages are the new operating system | 2022-09-19 Time till open source alternative | 2022-09-12 Let's chat about Let's Encrypt with Josh Aas | 2022-09-05 Is a network problem a security vulnerability | 2022-08-29 The government didn't make vulnerabilities illegal. Yet. | 2022-08-22 Episode 337 - Security patches are getting worse - Dustin Childs from ZDI tells us why | 2022-08-15 We don't have data, we have security biases | 2022-08-08 Bull*&$% security ideas | 2022-08-01 Leap seconds break everything | 2022-07-25 Open Source is unfair | 2022-07-18 PyPI: 2FA or not 2FA, that is the question | 2022-07-11 GPG, but nothing makes sense | 2022-07-04 The sliding scale of risk: seeing the forest for the trees | 2022-06-27 Signing (What is it good for) | 2022-06-20 The Security of Jobs or Job Security | 2022-06-13 The security of alert fatigue | 2022-06-06 Big fat containers | 2022-05-30 Is one open source maintainer enough? | 2022-05-23 Episode 324 - WTF is up with WFH | 2022-05-16 The fake 7-Zip vulnerability and SBOM | 2022-05-09 Adam Shostack on the security of Star Wars | 2022-05-02 Relativistic Security: Project Zero on 0day | 2022-04-25 Security Twitter is not the real world | 2022-04-18 Patch Tuesday with a capital T | 2022-04-11 Social engineering and why zlib got a 2018 CVE ID | 2022-04-04 The lack of compromise in security | 2022-03-28 You have to use open source | 2022-03-21 Who even makes all these terrible decisions? | 2022-03-14 The Linux Dirty Pipe vulnerability | 2022-03-07 Insecurity at scale | 2022-02-28 The Legend of the SBOM | 2022-02-21 Did you scan the QR code? | 2022-02-14 Hayley Tsukayama from the EFF talks about privacy | 2022-02-07 The bright future of open source security | 2022-01-31 Welcome to the jungle - How to talk about open source security | 2022-01-24 Got vulnerabilities? Introducing GSD | 2022-01-17 Open source isn't broken, it's an experience | 2022-01-10 Norton, Ethereum, NFT, and Apes | 2022-01-03 Will we ever fix all the vulnerabilities? | 2021-12-27 Log4j Christmas Spectacular! | 2021-12-20 Log4j is a mess | 2021-12-13 You're holding it wrong: the importance of unlearning | 2021-12-06 Apple vs NSO: What can copyright do for you? | 2021-11-29 Experts From A World That No Longer Exists | 2021-11-22 David A Wheeler discusses the OpenSSF | 2021-11-15 25 years of smashing stacks, fun, and profit | 2021-11-08 Is Trojan Source a vulnerability? | 2021-11-01 Open source security isn't free | 2021-10-25 Chris Wysopal on the state of security education | 2021-10-18 Scoring OpenSSF Security Scoring | 2021-10-11 Apache RCE and Twitch epic pwn | 2021-10-04 Everyone sucks at vulnerability disclosure | 2021-09-27 The security of the Matrix | 2021-09-20 Who left this 0day on the floor? | 2021-09-13 Linux Kernel compiler warnings considered dangerous | 2021-09-06 Is GitHub's Copilot the new Clippy? | 2021-08-30 Open source supply chain with Google's Dan Lorenc | 2021-08-23 Open source owes you nothing! | 2021-08-16 What happens when we DRM power tools? | 2021-08-09 When vulnerability disclosure becomes dangerous | 2021-08-02 The security of Rust: who left all this awesome in here? | 2021-07-26 If you spy on journalists, you're the bad guys | 2021-07-19 The perils of Single Sign On | 2021-07-12 The audacity of Audacity: When open source goes rogue | 2021-07-05 Could SELinux have stopped SolarWinds? | 2021-06-28 Privacy and activism with Chris Weiland | 2021-06-21 Security, behavior, and the environment | 2021-06-14 What in the @#$% is going on with ransomware? | 2021-06-07 Mr. Amazon's Neighborhood | 2021-05-31 Can we stop the coming artificial unintelligence deluge? | 2021-05-24 The Biden Cybersecurity Executive Order | 2021-05-17 Pipeline security: There is no problem humans can't make worse | 2021-05-10 Hello dark patterns my old friend | 2021-05-03 Do not experiment on the Linux Kernel | 2021-04-26 Can we trust any 3rd parties? | 2021-04-19 Does 0day still mean 0day? | 2021-04-12 The future of security scanning with Debricked | 2021-04-05 The lies closed source can tell, open source can't | 2021-03-29 DevSecOps with GitLab's Mark Loveless | 2021-03-22 GitHub pulls exploits, LinuxFoundation sign all the things | 2021-03-15 A discussion with Loris and Pop from Sysdig | 2021-03-08 DWF is back! Welcome to community powered CVE | 2021-03-01 Dave Jevans tells us what CipherTrace is up to | 2021-02-22 What even is open source anymore? | 2021-02-15 Stop using C | 2021-02-08 The sudo and libgcrypt vulnerabilities | 2021-02-01 9 bits of podcast, 8 bits of computing | 2021-01-25 What if security wasn't joyless? | 2021-01-18 Right to Repair Security | 2021-01-11 Defenders only need to be right once | 2021-01-04 Is open source dangerous? Open source won, who cares, shut up! | 2020-12-28 Communication is hard, security communication is more hard | 2020-12-25 Door 25: Why do we do the things we do? Question everything | 2020-12-24 Door 24: Information wants to be free | 2020-12-23 Door 23: How to report 1000 security flaws | 2020-12-22 Door 22: How to report one security flaw | 2020-12-21 Door 21: Bug bounties | 2020-12-20 Door 20: Is SMS 2FA better than no 2FA? | 2020-12-19 Door 19: TLS certificate trust | 2020-12-18 Door 18: Don't roll your own crypto or auth | 2020-12-17 Door 17: Vulnerability response | 2020-12-16 Door 16: 16 bits of change | 2020-12-15 Door 15: Supplier compliance | 2020-12-14 Door 14: Backdoors | 2020-12-13 Door 13: Unlucky or survivor bias? | 2020-12-12 Door 12: Video game hacking | 2020-12-11 Door 11: Should you get on a 737? | 2020-12-10 Door 10: Deciding what information matters | 2020-12-09 Door 09: public key cryptography | 2020-12-08 Door 08: man 8 security | 2020-12-07 Door 07: 7 is the best prime, 2 is the dumbest | 2020-12-06 Door 06: 6 wifi risks ... that don't actually matter | 2020-12-05 Door 05: 5 reasons you need 24/7 robot monitoring | 2020-12-04 Door 04: EFF's Cover Your Tracks | 2020-12-03 Door 03: Do all vulnerabilities matter equally? | 2020-12-02 Door 02: Marketing department or selection bias? | 2020-12-01 Door 01: Advent calendars | 2020-11-23 Who is responsible if IoT burns down your house? | 2020-11-16 Are old Android devices dangerous? | 2020-11-09 Full disclosure won, deal with it | 2020-11-02 HashiCorp Boundary with Jeff Mitchell | 2020-10-26 Security, magic, and FaceID | 2020-10-19 Securing network time and IoT | 2020-10-12 Chat with Larry Cashdollar | 2020-10-05 The past was a terrible place | 2020-09-28 How to tell your story with Travis Murdock | 2020-09-21 Security didn't find life on Venus | 2020-09-14 Real security is boring | 2020-09-07 Security Signals: What are you telling the world | 2020-08-31 Grab Bag: The Security We Deserve Edition | 2020-08-24 The only thing harder than signing files is managing users | 2020-08-17 Cult of Information Security | 2020-08-10 Secure Boot isn't Secure | 2020-08-03 Passwords are pollution | 2020-07-27 Weaponized attention | 2020-07-20 Confidential Virtual Machines; The future of cloud computing | 2020-07-13 The State of Open Source Security with Alyssa Miller from Snyk | 2020-07-06 What Would Apple Do? | 2020-06-29 Humans, conferences, and security: let me think and get back to you in a bit | 2020-06-22 The convergence of application security | 2020-06-15 We broke CVSSv3, now how do we fix it? | 2020-06-08 Talking Container Security with Liz Rice | 2020-06-01 Special cases are special: DNS, Websockets, and CSV | 2020-05-25 Good advice or bad advice? Hang up, look up, and call back | 2020-05-17 Beer, security, and consistency; the newer, better, triad | 2020-05-11 Pounding square solutions into round holes: forced updates from Ubuntu | 2020-05-04 Is BPG actually insecure? | 2020-04-27 Working from home security: resistance is futile | 2020-04-20 Security lessons from space: Apollo 13 edition | 2020-04-13 Work without progress - what Infosec can learn from treadmills | 2020-04-06 Security scanners are all terrible | 2020-04-05 Building a talent "ecosystem" | 2020-03-30 Video game hackers - speedrunning | 2020-03-23 Depressing news sucks, we're talking about cheating in video games | 2020-03-15 Wireguard vs IPsec: the OK Boomer of security | 2020-03-08 Endpoint security with Tony Meehan | 2020-03-02 Is it even possible to fix open source security? | 2020-02-24 It’s DNS. It's always DNS | 2020-02-17 Episode 183 - The great working from home experiment | 2020-02-10 Does open source owe us anything? | 2020-02-03 The security of SIM swapping | 2020-01-27 A Tale of Two Vulnerabilities | 2020-01-20 Google Project Zero and the 90 day clock | 2020-01-13 Are CVEs important and will ransomware put you out of business? | 2020-01-06 Fake or real? The security of counterfeit goods | 2019-12-30 The 'predictions are stupid' prediction episode | 2019-12-23 Defenders will always be one step behind | 2019-12-16 GitHub turns security up to 11; A discussion with Rob Schultheis | 2019-12-09 Ho Ho Homeland Security | 2019-12-02 The security of planned obsolescence | 2019-11-25 Measuring cybersecurity with Kathryn Waldron | 2019-11-17 Until that quantum computer is cracking RSA keys, go sit back down! | 2019-11-11 What happens when leadership doesn't care about security? | 2019-11-03 The draconian draconians of DRM | 2019-10-28 Security is terrible because digital literacy is terrible | 2019-10-21 Every day should be cybersecurity awareness month! | 2019-10-13 Grab Bag of Microsoft Security News | 2019-10-07 DNS over HTTPS: Probably not the end of the world | 2019-09-30 Death to Python 2 | 2019-09-23 SBOM with Allan Friedman | 2019-09-16 Human nature and ad powered open source | 2019-09-09 Disclosing security issues is insanely complicated: Part 2 | 2019-09-02 Disclosing security issues is insanely complicated: Part 1 | 2019-08-26 The mess that we call credit agencies in the US | 2019-08-19 Backdoors and snake oil in our cryptography | 2019-07-29 What if we MitM a whole country? | 2019-07-22 Stealing cars and ransomware | 2019-07-16 Chat with the authors of the book "The Fifth Domain" | 2019-07-08 The unexpected security of AI, photographs, and VPN | 2019-07-01 Tavis breaks the world ... again | 2019-06-24 The DARPA Cyber Grand Challenge with David Brumley | 2019-06-17 Our ad funded dystopian present | 2019-06-10 Chat with Michael Coates about data security | 2019-06-03 You just got pwnt, what now? | 2019-05-27 Scams and operations as part of the supply chain | 2019-05-20 What the @#$% happened to Microsoft? | 2019-05-13 What do security and fire have in common? | 2019-05-06 The security of money, which one is best? | 2019-04-29 Security lessons from the phone book | 2019-04-21 Hypothetical security: what if you find a USB flash drive? | 2019-04-15 Timezones are hard, security is harder | 2019-04-08 Good enough security is a pretty high bar | 2019-04-01 Secure voting, firefox send, and toxic comments on the internet | 2019-03-25 Information wants to be free | 2019-03-18 Holy cow Beto was in the cDc, this is awesome! | 2019-03-11 When the IoT attacks! | 2019-03-04 How people feel is more important than being right | 2019-02-25 Passwords, AI, and cloud strategy | 2019-02-18 What's up with the container runc security flaw? | 2019-02-11 Smart locks and the government hacking devices | 2019-02-04 Bird Scooter: 0, Cory Doctorow: 1 | 2019-01-28 Windows micropatches, Google's privacy fine, and Mastercard fixes trial abuse | 2019-01-21 Chat with Snyk co-founder Danny Grander | 2019-01-14 The EU bug bounty program | 2019-01-07 Australia's encryption backdoor bill | 2018-12-24 2018 Christmas Special - Is Santa GDPR compliant? | 2018-12-17 Walled gardens, appstores, and more | 2018-12-10 The not so dire future of supply chain security | 2018-12-03 Open Source, supply chains, npm, and you | 2018-11-26 Cloudflare's service workers and the economics of security | 2018-11-19 Talking about Kubernetes and container security with Liz Rice | 2018-11-12 What will Apple's T2 chip mean for the rest of us? | 2018-11-05 All about the security of voting | 2018-10-29 Bloomberg and hardware backdoors - it's already happening | 2018-10-22 The Google+ and Facebook incidents, it's not your data anymore | 2018-10-15 Cloudflare's IPFS and onion service | 2018-10-08 Will security follow Linus' lead on being nice? | 2018-10-01 The future of the CISO with Michael Piacente | 2018-09-24 Discussion with Brian Hajost from SteelCloud | 2018-09-17 Review of "Click Here to Kill Everybody" | 2018-09-10 Actual real security advice | 2018-09-03 Google's Titan Key and the latest Struts issue | 2018-08-27 The TLS 1.3 and DNS episode | 2018-08-19 Review of Black Hat, Defcon, and the effect of security policies | 2018-08-13 OSCon and actionable advice | 2018-08-06 Bluetooth, phishing, airgaps, and eating soup off the floor | 2018-07-30 The year of the Linux Desktop and other hardware stories | 2018-07-23 Data isn't oil, it's nuclear waste | 2018-07-16 More backdoors in open source | 2018-07-09 The Gentoo security incident | 2018-07-02 The Seven Properties of Highly Secure Devices | 2018-06-25 Michael Feiertag from tCell | 2018-06-17 Our unregulated future is here to stay | 2018-06-11 You're bad a buying security, we can help! | 2018-06-04 Consumer security is too broken to fix, and it doesn't matter | 2018-05-28 When IT decisions kill people | 2018-05-20 Automation: Humans are slow and dumb | 2018-05-11 Are legal backdoors a good idea? | 2018-05-07 Twitter passwords and npm backdoors | 2018-04-30 DNSSEC, BGP, and reality | 2018-04-15 Security flaws in beep and patch, how did we get here? | 2018-04-15 Chat with Rami Saas the CEO of WhiteSource | 2018-04-08 Security lessons from a 7 year old | 2018-04-02 Humans and misinformation | 2018-03-25 Short selling AMD security flaws | 2018-03-18 Chat with Chris Rosen from IBM about Container Security | 2018-03-11 Chat with Let's Encrypt co-founder Josh Aas | 2018-03-03 What happens when 23 thousand certificates leak? | 2018-02-23 NPM ate my files | 2018-02-23 Have I been pwned? | 2018-02-21 XKCD + CVE = XKCVE | 2018-02-13 RSA, TLS, Chrome HTTP, and PCI | 2018-02-07 Autosploit, bug bounties, and the future of security | 2018-01-31 GPS tracking and jamming | 2018-01-24 Skyfall: please don't yell 'fire' | 2018-01-16 Risk lessons from Hawaii | 2018-01-10 npm and the supply chain | 2018-01-07 Meltdown aftermath | 2017-12-19 Security Planner review | 2017-12-13 Facial recognition and physical security | 2017-12-06 Security from Santa | 2017-11-28 Bitcoin: It's over 9000 | 2017-11-21 GitHub's Security Scanner | 2017-11-14 The security of Intel ME | 2017-11-07 Actionable security advice | 2017-11-01 Ruining the Internet | 2017-10-24 Cyber won | 2017-10-15 Objects in mirror are less terrible than they appear | 2017-10-09 Will aliens overthrow us before AI? | 2017-10-03 Networks and Dnsmasq and IoT oh my | 2017-09-26 Shoot, Shovel, and Bury | 2017-09-11 All about the Equifax hack | 2017-09-05 Market driven security | 2017-08-30 The official blockchain episode | 2017-08-15 The VPN Episode | 2017-08-09 Backwards compatibility to the point of insanity | 2017-08-01 We may never see amazing security research ever again | 2017-07-18 Episode 56 - Devil's Advocate and other fuzzy topics | 2017-07-12 Episode 55 - Good Docs Ruin My Story | 2017-07-04 Episode 54 - Turning Into An Old Person | 2017-06-28 Episode 53 - A Plane Isn't Like A Car | 2017-06-20 Episode 52 - You Could Have Done It Right, But You Didn't | 2017-06-12 Episode 51 - All About CVE | 2017-06-06 Episode 50 - This Is A Security Podcast After All | 2017-05-30 Episode 49 - Testing Software Is Impossible | 2017-05-21 Episode 48 - Machine Learning: Not Actually Magic | 2017-05-14 Episode 47 - WannaCry: Everything Is Basically Broken | 2017-05-04 Episode 46 - Turns Out I'm Not A Bad Guy | 2017-05-02 Episode 45 - Trust Is More Important Now Than The Truth | 2017-04-25 Episode 44 - Bug Bounties Vs Pen Testing | 2017-04-19 Episode 43 - We Are Totally Immature | 2017-04-13 Episode 42 - Hitchhiker's Guide To Security | 2017-04-10 Episode 41 - All Your Money Are Belong To Us | 2017-04-02 Episode 40 - Let's Fork Bitcoin, Again | 2017-03-28 Episode 39 - Flash On Your Dishwasher | 2017-03-22 Episode 38 - We Ruin Everything | 2017-03-09 Episode 37 - Your Bathtub Is More Dangerous Than A Shark | 2017-03-05 Episode 36 - A Good Enough Podcast | 2017-02-28 Episode 35 - Crazy Cosmic Accident | 2017-02-22 Episode 34 - Bathing In Ebola Virus | 2017-02-15 Episode 33 - Everybody Who Went To The Circus Is In The Circus (RSA 2017) | 2017-02-08 Episode 32 - Gambling As A Service | 2017-02-01 Episode 31 - XML Is Never The Solution | 2017-01-25 Episode 30 - I'm Not An Expert But I've Been Yelled At By Experts | 2017-01-22 Episode 29 - The Security Of Rogue One | 2017-01-19 Episode 28 - RSA Conference 2017 | 2017-01-16 Episode 27 - Prove To Me You Are Human | 2017-01-12 Episode 26 - Tell Your Sister, Stallman Was Right | 2017-01-09 Episode 25 - The Future Is Now | 2017-01-03 Episode 24 - The 2016 Prediction Edition | 2016-12-28 Episode 23 - We Can't Patch People | 2016-12-24 Episode 22 - IoT Wild West | 2016-12-21 Episode 21 - CVE 10K Extravaganza | 2016-12-19 Episode 20 - The Death Of PGP | 2016-12-13 Episode 19 - A Field Full Of Razor Blades And Monsters | 2016-12-09 Episode 18 - The Security Of Santa | 2016-12-06 Episode 17 - Cyphercon Interview With Korgo | 2016-12-02 Episode 16 - Cat And Mouse | 2016-11-29 Episode 15 - Cyber Black Monday | 2016-11-22 Episode 14 - David A Wheeler: CII Badges | 2016-11-18 Episode 13 - CVE: The Metric System Of Security | 2016-11-10 Episode 12 - Security Trebuchet | 2016-10-31 Episode 11 - The Poison Candy Episode | 2016-10-24 Episode 10 - The Super Botnet That Nobody Can Stop | 2016-10-18 Episode 9 - Are Bug Bounties Measuring The Wrong Things | 2016-10-11 Episode 8 - The Primality Of Prime Numbers | 2016-10-03 Episode 7 - More Powerful Than Root | 2016-09-29 Episode 6 - Foundational Knowledge Of Security | 2016-09-29 Episode 5 - OpenSSL: The Library We Deserve | 2016-09-21 Episode 4 - Dead Squirrel In A Box | 2016-09-13 Episode - 3 The Lockpicking Sewing Circle | 2016-09-07 Episode 2 - Instills The Proper Amount Of Fear | 2016-09-06 Episode 1 - Rich History Of Security Flaws
Add this page to your gemini subscriptions for podcast updates.
text/gemini
This content has been proxied by September (ba2dc).