Crypto-Gram Security Podcast
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter

Syndication

add to my PodNova

Obligatory Fine Print: The Crypto-Gram Newsletter is created by and Copyright (c) Bruce Schneier. The newsletter is hosted here in audio format with Bruce Schneier's permission. Dan Henage is responsible for creation of the audio version of the newsletter. The official site of the Crypto-Gram Newsletter is here. The Crypto-Gram Newsletter may not be reproduced, duplicated, copied, sold, resold, or otherwise exploited without the express written permission of Bruce Schneier.

Support the web hosting costs for this podcast:

Thank you to all those that have donated in the past years!

Archives:

2015
August
July
June
May
April
March
February
January

2014
December
November
October
September
August
July
June
May
April
March
February
January

2013
December
November
October
September
August
July
June
May
April
March
February
January

2012
December
November
October
September
August
July
June
May
April
March
February
January

2011
December
November
October
September
August
July
June
May
April
March
February
January

2010
December
November
October
September
August
July
June
May
April
March
February
January

2009
December
November
October
September
August
July
June
May
April
March
February
January

2008
December
November
October
September
August
July
June
May
April
March
February
January

2007
December
November
October
September
August
July
June
May
April
March
February
January

2006
December
November
October
September
August
July
June
May
April
March
February
January

2005
December
November
October
September
August

Thanks to Amplifico for the tunes!

In this issue:

  • Backdoors Won't Solve Comey's Going Dark Problem
  • Another Salvo in the Second Crypto War (of Words)
  • Cosa Nostra Dead Drops
  • Bizarre High-Tech Kidnapping
  • Fugitive Located by Spotify
  • Intimidating Military Personnel by Targeting Their Families
  • Stagefright Vulnerability in Android Phones

from the August 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-08.mp3
Category:podcast -- posted at: 2:24 PM

In this issue:

  • Organizational Doxing
  • Why We Encrypt
  • The Secrecy of the Snowden Documents
  • The Risks of Mandating Backdoors in Encryption Products
  • What is the DoD's Position on Backdoors in Security Systems?
  • Office of Personnel Management Data Hack
  • More about the NSA's XKEYSCORE
  • Hayden Mocks NSA Reforms
  • NSA French and German Intercepts
  • Hacking Team Is Hacked

from the July 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-07.mp3
Category:podcast -- posted at: 2:06 PM

In this issue:

  • The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
  • NSA Running a Massive IDS on the Internet Backbone
  • Duqu 2.0
  • Why the Recent Section 215 Reform Debate Doesn't Matter Much
  • TSA Not Detecting Weapons at Security Checkpoints
  • Chris Roberts and Avionics Security
  • Encrypting Windows Hard Drives
  • Should Companies Do Most of Their Computing in the Cloud? (Part 1)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 2)
  • Should Companies Do Most of Their Computing in the Cloud? (Part 3)
  • Eighth Movie-Plot Threat Contest Winner

from the June 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-06.mp3
Category:podcast -- posted at: 12:30 PM

In this issue:

  • Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
  • The Further Democratization of QUANTUM
  • The Further Democratization of Stingray
  • Eighth Movie-Plot Threat Contest Semifinalists
  • Hacking Airplanes
  • Counting the US Intelligence Community Leakers
  • "Hinky" in Action

from the May 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-05.mp3
Category:podcast -- posted at: 11:25 AM

In this issue:

  • More "Data and Goliath" News
  • The Eighth Movie-Plot Threat Contest
  • Metal Detectors at Sports Stadiums
  • Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
  • New Zealand's XKEYSCORE Use
  • Australia Outlaws Warrant Canaries

from the April 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-04.mp3
Category:podcast -- posted at: 11:12 AM

In this issue:

  • "Data and Goliath"'s Big Idea
  • "Data and Goliath" News
  • Everyone Wants You To Have Security, But Not from Them
  • The Democratization of Cyberattack
  • The Equation Group's Sophisticated Hacking and Exploitation Tools
  • Ford Proud that "Mustang" Is a Common Password
  • Attack Attribution and Cyber Conflict
  • Co3 Systems Changes Its Name to Resilient Systems
  • FREAK: Security Rollback Attack Against SSL
  • Can the NSA Break Microsoft's BitLocker?
  • Hardware Bit-Flipping Attack

from the March 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-03.mp3
Category:podcast -- posted at: 10:12 AM

In this issue:

  • Samsung Television Spies on Viewers
  • Accountability as a Security System
  • When Thinking Machines Break the Law
  • Obama Says Terrorism Is Not an Existential Threat
  • National Academies Report on Bulk Intelligence Collection
  • My Superpower
  • New Book: "Data and Goliath"
  • DEA Also Conducting Mass Telephone Surveillance

from the February 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-02.mp3
Category:podcast -- posted at: 10:05 AM

In this issue:

  • Lessons from the Sony Hack
  • Reacting to the Sony Hack
  • Did North Korea Really Attack Sony?
  • Attributing the Sony Attack
  • The Limits of Police Subterfuge
  • Leaked CIA Documents
  • Doxing as an Attack
  • Attack Attribution in Cyberspace
  • The Security of Data Deletion

from the January 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-15-01.mp3
Category:podcast -- posted at: 9:11 AM

In this issue:

  • Regin
  • FBI Agents Pose as Repairmen to Bypass Warrant Process
  • NSA Hacking of Cell Phone Networks
  • Comments on the Sony Hack
  • Over 700 Million People Taking Steps to Avoid NSA Surveillance
  • Corporations Misusing Our Data

from the December 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-12.mp3
Category:podcast -- posted at: 8:12 AM

In this issue:

  • Crypto Wars II
  • Hacking Team Documentation
  • The Future of Incident Response
  • How Did the Feds Identity Dread Pirate Roberts?
  • Spritz: A New RC4-Like Stream Cipher
  • NSA Classification ECI = Exceptionally Controlled Information

from the November 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage

Direct download: crypto-gram-14-11.mp3
Category:podcast -- posted at: 7:02 AM