In-Depth Series: Privacy and Security
- Number of episodes: 84
- Open/closed: open
- Date of earliest show: 2008-06-19
- Date of latest show: 2023-02-24
- Series RSS feeds: ogg, spx, mp3
In this open series, you can contribute shows that are on the topic of Privacy and Security
2023-02-24. 00:15:28. Clean.
.
An update on the preparations for quantum computing
2023-02-02. 00:18:27. Clean.
.
Diving into privacy-aware and offline methods to generate one time passwords
2022-11-14. 00:04:11. Explicit.
.
A short episode about the reaching effects of breaches and forgotten accounts
2022-10-17. 00:50:54. Explicit.
.
A philosophical look at the future of technology.
2022-10-04. 01:11:37. Explicit.
.
Brady and I discuss Mis-information, Dis-information, and Fake News.
2022-09-27. 00:30:40. Explicit.
.
I discuss the issue of what makes a real hacker with my my son
2022-09-21. 00:30:20. Explicit.
.
I discuss the value of an Education, certifications, and a positive Social Media presence.
2022-09-07. 00:15:07. Explicit.
.
Brady & I discuss stupid things done by those of us who really should know better.
2022-08-22. 00:16:37. Explicit.
.
I talk about getting into or advancing in cybersecurity & how keyboards could trick malware.
2022-07-11. 00:39:09. Explicit.
.
I have a discussion about data reduction with special guest and author, R. Brady Frost
2022-06-28. 00:16:22. Explicit.
.
I talk about my new Hardware password manager
2022-06-27. 00:18:20. Explicit.
.
Making ourselves a less attractive target by utilizing a password manager.
2022-06-22. 00:41:27. Explicit.
.
I have a discussion about Internet security with R. Brady Frost along with our sons
2022-06-14. 00:14:34. Explicit.
.
Making ourselves a less attractive target by implementing 2FA.
2022-06-07. 00:15:59. Explicit.
.
We take a closer look at the types of Evil Steve's attacking us
2022-05-25. 00:14:12. Explicit.
.
Security as a people problem: Who is actually attacking us? Meet Evil Steve.
2022-05-17. 00:09:30. Explicit.
.
Tracing my security woes to the source using "Good Idea Fairy Hunting"
2022-05-13. 00:10:41. Clean.
.
Pilot episode. Change your password
2022-03-08. 00:13:31. Clean.
.
How I manage password security.
2021-10-06. 00:09:11. Clean.
.
Google search is monopolistic here are some alternatives
2021-06-18. 00:11:05. Clean.
.
A look at some security issues in Android
2021-05-21. 00:10:03. Clean.
.
People commonly say that their own, or someone else's, Facebook has been hacked.
2021-05-13. 00:08:40. Clean.
.
Presenting my favorite general information security podcasts
2021-04-29. 00:07:18. Clean.
.
Presenting my favorite information security news and current events podcasts
2021-01-01. 00:16:18. Clean.
.
A look at how malware is now targeting Linux, especially servers
2020-12-22. 00:21:19. Clean.
.
Nextcloud is easy. You should try it.
2020-12-21. 00:02:00. Clean.
.
Turn a Thumb drive into a Key to lock/unlock your linux machine.
2020-10-14. 00:04:37. Clean.
.
Zipfiles can contain all kinds of evilness and unpacking them can lead to unexpected results
2020-09-09. 00:20:01. Clean.
.
A story about pentesting physical security
2020-09-04. 00:11:20. Clean.
.
A recent update to LastPass added a Security Dashboard
2020-08-25. 00:13:45. Clean.
.
NIST has concluded Round Two of the quantum encryption search and moved to Round Three
2020-08-20. 00:12:06. Clean.
.
How an insecure object reference lead to a covid-related databreach
2020-01-13. 00:23:10. Explicit.
.
Onlykey more like you better have two keys!
2020-01-10. 00:17:26. Clean.
.
Some recent updates to Firefox that add useful features
2019-11-22. 00:14:21. Clean.
.
Looking at an object lesson for proper IT management processes and the cost of failure
2019-07-19. 00:12:37. Clean.
.
How will quantum computing affect the security of encryption?
2019-07-05. 00:28:22. Clean.
.
What NIST suggests as a framework to improve security at the Enterprise level
2019-05-24. 00:22:17. Clean.
.
What CERT recommends to mitigate security and privacy threats to your home network.
2019-04-15. 00:25:23. Clean.
.
Klaatu demonstrates how to use LVM and cryptsetup to create and use portable encrypted filesystems
2019-02-21. 00:07:40. Explicit.
.
Helped a client avoid being scammed on Craigslist and wanted to share some tips to HPR.
2019-01-15. 00:07:47. Clean.
.
How to do passwords better.
2018-12-19. 00:22:31. Clean.
.
Klaatu talks about manipulating PDFs with gs and pdf-stapler
2018-12-13. 00:39:40. Clean.
.
Klaatu provides an overview of Scribus in part 1 of a mini-series about steganography
2018-05-25. 00:18:37. Clean.
.
The GDPR becomes enforceable today and Ken gives an overview on what it is and how it effects you.
2018-05-21. 00:42:29. Clean.
.
Quasi-philosophical musing about how trust is built both online and in real life
2018-04-27. 00:18:42. Clean.
.
TLS 1.3 is the newest protocol standard for secure communications on the Web.
2018-03-30. 00:17:41. Explicit.
.
Using Diffie-Hellman Key Exchange to implement Forward Secrecy
2018-03-16. 00:20:31. Clean.
.
A basic explanation of how Diffie-Hellman-Merkle Key Exchange works
2016-08-26. 00:36:29. Clean.
.
A discussion of the problems with SSL certificates, and some solutions
2016-08-12. 00:41:02. Clean.
.
A discussion of how SSL certificates work
2016-01-08. 00:57:26. Clean.
.
An expanded discussion of the LastPass intrusion as delivered at our LUG.
2015-12-17. 00:22:46. Clean.
.
In HPR 1900, Ahuka suggests changing the default ssh port, I ask why not employ port forwarding?
2015-12-11. 00:18:39. Clean.
.
We introduce the idea of using public/private key pairs for authentication
2015-11-13. 00:16:49. Clean.
.
In this we tutorial explore the basics of making an ssh connection.
2015-11-04. 00:03:45. Clean.
.
How I do password management among my devices.
2015-10-28. 00:12:38. Explicit.
.
Demonstration of using the diceware method of passphrase generation
2015-10-02. 00:18:35. Clean.
.
To learn ssh it helps to experiment, so this explains setting up a simple home server.
2015-09-04. 00:17:02. Clean.
.
ssh is the secure way of connecting to a remote computer. This is an introduction to a mini-series.
2015-08-13. 00:08:20. Clean.
.
How to hide a password using a password card
2015-07-10. 00:23:00. Clean.
.
LastPass was hacked, but how bad is it?
2015-05-29. 00:15:11. Clean.
.
GnuPG and TrueCrypt updated, and how we support free software.
2015-03-18. 00:20:04. Explicit.
.
Fin talks about his favourite browser extensions.
2015-03-06. 00:18:11. Clean.
.
A look at the problems that SSL certificates can have, and offers some solutions
2014-12-26. 00:17:40. Clean.
.
This episode looks at secure connections between users and Web sites.
2014-11-14. 00:20:31. Clean.
.
This episode looks the two kinds of encryption keys, and why to use each one.
2014-10-17. 00:21:33. Clean.
.
This episode explores the best password practices from a mathematical viewpoint with recommendations
2014-09-17. 00:26:28. Clean.
.
Understanding password security begins with understanding hashing.
2014-08-25. 00:28:18. Clean.
.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
2014-07-22. 00:31:05. Clean.
.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
2014-06-12. 00:18:37. Clean.
.
What is needed to have security in Open Source projects.
2014-06-05. 01:29:39. Clean.
.
Using GPG to encrypt or sign e-mail
2014-05-02. 00:28:53. Clean.
.
Ahuka and Tony Bemus discuss key signing and how you build a web of trust.
2014-04-30. 00:38:15. Explicit.
.
John Duarte talks about setting up OpenVPN
2014-04-21. 00:21:37. Clean.
.
A summary of the "Heartbleed" OpenSSL vulnerability
2014-04-07. 00:16:27. Clean.
.
This looks at how you can use encryption to sign email and to privately secure it in Gmail.
2014-03-24. 00:05:00. Clean.
.
@sigflup tells us how to Encrypt Your Stuff With Blowfish with openssl on the command line
2014-03-11. 00:23:41. Clean.
.
Ahuka discusses using Thunderbird and Enigmail to send and receive encrypted email
2014-03-10. 00:24:17. Explicit.
.
I wanted to get my GPG key signed so I joined the FOSDEM 2014 keysigning event
2014-03-06. 00:18:58. Explicit.
.
deepgeek advocates the use of a pager for privacy reasons
2013-12-27. 00:30:55. Clean.
.
How to generate keys on the command line in Linux using GPG
2013-11-29. 00:22:18. Clean.
.
The fundamentals of encryption and asymmetric public key cryptography
2013-11-06. 00:22:23. Clean.
.
The need for privacy and the practicality of achieving it
2008-06-27. 00:08:18. Explicit.
.
Talking about different ways to define privacy.
2008-06-19. 00:19:07. Explicit.
.
This covers the paper around internet privacy. If we don't have anything to hide, why secure it?