Tue, 15 December 2015
In this issue:
- Policy Repercussions of the Paris Terrorist Attacks
- NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
- Reputation in the Information Age
- On CISA
- Voter Surveillance
- Worldwide Cryptographic Products Survey: Edits and Additions Wanted
- Security vs. Business Flexibility
from the December 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-12.mp3
Category: podcast
-- posted at: 12:21am MDT
|
|
Sun, 15 November 2015
In this issue:
- The Doxing Trend
- The Rise of Political Doxing
- Breaking Diffie-Hellman with Massive Precomputation (Again)
- Australia Is Testing Virtual Passports
- The Effects of Surveillance on the Victims
from the November 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-11.mp3
Category: podcast
-- posted at: 12:02am MDT
|
|
Thu, 15 October 2015
In this issue:
- Volkswagen and Cheating Software
- Living in a Code Yellow World
- Obama Administration Not Pursuing a Backdoor to Commercial Encryption
- Stealing Fingerprints
- Automatic Face Recognition and Surveillance
- Bringing Frozen Liquids through Airport Security
- SHA-1 Freestart Collision
from the October 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-10.mp3
Category: podcast
-- posted at: 11:05am MDT
|
|
Tue, 15 September 2015
In this issue:
- The Security Risks of Third-Party Data
- NSA Plans for a Post-Quantum World
- Drone Self-Defense and the Law
- Hacking Team, Computer Vulnerabilities, and the NSA
- TSA Master Keys
- Oracle CSO Rant Against Security Experts
- FBI and Apple's Encryption
- Animals vs. Drones
- Glenn Greenwald Debates Keith Alexander
- Wanted: Cryptography Products for Worldwide Survey
from the September 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-09.mp3
Category: podcast
-- posted at: 10:06am MDT
|
|
Sat, 15 August 2015
In this issue:
- Backdoors Won't Solve Comey's Going Dark Problem
- Another Salvo in the Second Crypto War (of Words)
- Cosa Nostra Dead Drops
- Bizarre High-Tech Kidnapping
- Fugitive Located by Spotify
- Intimidating Military Personnel by Targeting Their Families
- Stagefright Vulnerability in Android Phones
from the August 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-08.mp3
Category: podcast
-- posted at: 8:24am MDT
|
|
Wed, 15 July 2015
In this issue:
- Organizational Doxing
- Why We Encrypt
- The Secrecy of the Snowden Documents
- The Risks of Mandating Backdoors in Encryption Products
- What is the DoD's Position on Backdoors in Security Systems?
- Office of Personnel Management Data Hack
- More about the NSA's XKEYSCORE
- Hayden Mocks NSA Reforms
- NSA French and German Intercepts
- Hacking Team Is Hacked
from the July 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-07.mp3
Category: podcast
-- posted at: 8:06am MDT
|
|
Mon, 15 June 2015
In this issue:
- The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
- NSA Running a Massive IDS on the Internet Backbone
- Duqu 2.0
- Why the Recent Section 215 Reform Debate Doesn't Matter Much
- TSA Not Detecting Weapons at Security Checkpoints
- Chris Roberts and Avionics Security
- Encrypting Windows Hard Drives
- Should Companies Do Most of Their Computing in the Cloud? (Part 1)
- Should Companies Do Most of Their Computing in the Cloud? (Part 2)
- Should Companies Do Most of Their Computing in the Cloud? (Part 3)
- Eighth Movie-Plot Threat Contest Winner
from the June 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-06.mp3
Category: podcast
-- posted at: 6:30am MDT
|
|
Fri, 15 May 2015
In this issue:
- Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
- The Further Democratization of QUANTUM
- The Further Democratization of Stingray
- Eighth Movie-Plot Threat Contest Semifinalists
- Hacking Airplanes
- Counting the US Intelligence Community Leakers
- "Hinky" in Action
from the May 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-05.mp3
Category: podcast
-- posted at: 5:25am MDT
|
|
Wed, 15 April 2015
In this issue:
- More "Data and Goliath" News
- The Eighth Movie-Plot Threat Contest
- Metal Detectors at Sports Stadiums
- Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
- New Zealand's XKEYSCORE Use
- Australia Outlaws Warrant Canaries
from the April 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-04.mp3
Category: podcast
-- posted at: 5:12am MDT
|
|
Sun, 15 March 2015
In this issue:
- "Data and Goliath"'s Big Idea
- "Data and Goliath" News
- Everyone Wants You To Have Security, But Not from Them
- The Democratization of Cyberattack
- The Equation Group's Sophisticated Hacking and Exploitation Tools
- Ford Proud that "Mustang" Is a Common Password
- Attack Attribution and Cyber Conflict
- Co3 Systems Changes Its Name to Resilient Systems
- FREAK: Security Rollback Attack Against SSL
- Can the NSA Break Microsoft's BitLocker?
- Hardware Bit-Flipping Attack
from the March 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-03.mp3
Category: podcast
-- posted at: 4:12am MDT
|
|
Sun, 15 February 2015
In this issue:
- Samsung Television Spies on Viewers
- Accountability as a Security System
- When Thinking Machines Break the Law
- Obama Says Terrorism Is Not an Existential Threat
- National Academies Report on Bulk Intelligence Collection
- My Superpower
- New Book: "Data and Goliath"
- DEA Also Conducting Mass Telephone Surveillance
from the February 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-02.mp3
Category: podcast
-- posted at: 3:05am MDT
|
|
Thu, 15 January 2015
In this issue:
- Lessons from the Sony Hack
- Reacting to the Sony Hack
- Did North Korea Really Attack Sony?
- Attributing the Sony Attack
- The Limits of Police Subterfuge
- Leaked CIA Documents
- Doxing as an Attack
- Attack Attribution in Cyberspace
- The Security of Data Deletion
from the January 15, 2015 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
Direct download: crypto-gram-15-01.mp3
Category: podcast
-- posted at: 2:11am MDT
|
|