Open Source Security

By Josh Bressers

Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works.

There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is to hear from the people doing the work, they know...

Categories

Feed

https://opensourcesecuritypodcast.libsyn.com/rss

Link

https://opensourcesecurity.io/

Episodes

2025-01-20 Open Source Maintenance with Gary Kramlich

2025-01-13 Safety vs Security with Thomas Depierre

2025-01-01 The Future of Open Source Security

2024-12-30 The new NIST password guidance

2024-12-23 Santa's Supply Chain Security

2024-12-16 CWE Top 25 List

2024-12-09 FBI endorses E2E encryption

2024-12-02 The D-Link D-bacle

2024-11-25 What if XZ happened to a company? The openness of open source

2024-11-18 Wordpress plugin security

2024-11-11 Episode 454 - The state of open source with Brian Fox from Sonatype and Donald Fischer from Tidelift

2024-11-04 Software Liability

2024-10-28 All about Meshtastic

2024-10-21 Python security with Seth Larson

2024-10-14 What's Wrong With WordPress

2024-10-07 The CUPSpocalypse

2024-09-30 What's wrong with CISA?

2024-09-23 The Tidelift 2024 open source maintainer report

2024-09-16 Episode 446 - Researchers took over .MOBI TLD

2024-09-09 EPSS with Jay Jacobs

2024-09-02 Open Source and End of Life

2024-08-26 The Supply Chain Security Crisis

2024-08-19 The foundation of society, TLS certificates are a mess

2024-08-12 Is CWE useful?

2024-08-05 "What is open source" talk Josh gave

2024-07-29 Where are all the youth in open source?

2024-07-22 CISA's bad OSS advice vs the Whitehouse good advice

2024-07-15 CocoPods and proper funding for open source

2024-07-08 OpenSSH and node-ip - it's all exponential growth

2024-07-01 polyfill.io - open source is too big to fix

2024-06-24 Unreported vulnerabilities and everyone is getting hacked

2024-06-17 Should OpenSSH block misbehaving clients?

2024-06-10 Flipper Zero with Alex Kulagin

2024-06-03 Redirecting HTTP to HTTPS

2024-05-27 Frozen kernel security

2024-05-20 The autonomy of open source developers

2024-05-13 GitHub artifact attestation

2024-05-06 Will run0 replace sudo?

2024-04-29 Automatically exploiting CVEs with AI

2024-04-22 Video game cheaters, also pretendo

2024-04-15 The Notepad++ Parasite Website

2024-04-08 FCC cybersecurity label for consumer devices

2024-04-01 XZ Bonus Spectacular Episode

2024-04-01 Do you have a security.txt file?

2024-03-25 CISA's new SSDF attestation form

2024-03-18 What's going on at NVD

2024-03-11 Malicious GitHub repositories

2024-03-04 Being right all the time is hard

2024-02-26 Linux Kernel security with Greg K-H

2024-02-19 Thomas Depierre on open source in Europe

2024-02-12 Reducing attack surface for less security

2024-02-05 The exploited ecosystem of open source

2024-01-29 PyTorch and NPM get attacked, but it's OK

2024-01-22 Blame the users for bad passwords!

2024-01-15 The security tools that started it all

2024-01-08 Package identifiers are really hard

2024-01-01 Episode 409 - You wouldn't hack a train?

2023-12-25 Does Kubernetes need long term support?

2023-12-18 Should Santa use AI?

2023-12-11 The security of radio

2023-12-04 Modding games isn't cheating and security isn't fair

2023-11-27 Does the government banning apps work?

2023-11-20 Episode 402 - The EU's eIDAS regulation is a terrible idea

2023-11-13 Security skills shortage - We've tried nothing and the same thing keeps happening

2023-11-06 When can the government hack a victim?

2023-10-30 Curl, Security, and Daniel Stenberg

2023-10-23 Is only 11% of open source maintained?

2023-10-16 The curl and glibc vulnerabilities

2023-10-09 CLAs are bad, Mkay?

2023-10-02 Uncertainty, trust, and security

2023-09-25 The lie anyone can contribute to open source

2023-09-18 Can you secure something you don't own?

2023-09-11 Curl and the calamity of CVE

2023-09-04 The Wordpress 100 year disaster recovery problem

2023-08-28 Episode 390 - Rust shipping binaries doesn't matter

2023-08-21 What would HashiCorp do?

2023-08-14 Episode 388 - Video game vulnerabilities

2023-08-07 Enterprise open source is different

2023-07-31 We are watching web 2.0 burn

2023-07-24 Is open source an insider threat?

2023-07-17 What's next for open source?

2023-07-10 Is open source dying?

2023-07-03 Red Hat, you were the chosen one!

2023-06-26 WTF Reddit, APIs and risk

2023-06-19 Episode 380 - A new Sovereign Tech Fund program and the BBC on destroying hard drives

2023-06-12 Will open source save the world, again?

2023-06-05 Naming things is harder than security

2023-05-29 The world is changing too fast for humans to understand

2023-05-22 Open Source Summit, who built your open source, and AI

2023-05-15 The market forces of left-pad, Episode 77 remaster part 2

2023-05-08 Episode 374 - The event we called left-pad, Episode 77 remaster part 1

2023-05-01 Episode 373 – HHGG security, Episode 42 remaster part 2

2023-04-24 HHGG security, remaster part 1

2023-04-17 pip install is the tool we deserve but not the tool we need

2023-04-10 Open Source is bigger than you can imagine

2023-04-03 OpenAI broke ChatGPT then tried to blame open source

2023-03-27 The Sovereign Tech Fund with Fiona Krakenbürger

2023-03-20 Episode 367 - Open source will never be the same

2023-03-13 Software liability is coming

2023-03-06 "I am not your supplier" with Thomas Depierre

2023-02-27 Episode 364 - Using SBOMs is hard

2023-02-20 Joylynn Kirui from Microsoft on DevSecOps

2023-02-13 A lesson in Rust from Carol Nichols

2023-02-06 GitHub got pwnt, but it wasn't very exciting

2023-01-30 Memory safety and the NSA

2023-01-23 The NOTAM outage and other legacy technology

2023-01-16 Furby vs Alexa

2023-01-09 Is open source being overexploited?

2023-01-02 LastPass ducked up, now what?

2022-12-26 Security Boxing Day

2022-12-19 Jerry Bell tells us why Mastodon is awesome and MFA is hard

2022-12-12 Jill Moné-Corallo on GitHub's bug bounty program

2022-12-05 Stylometry removes anonymity

2022-11-28 Episode 351 - Is security or usability a law of the universe?

2022-11-21 Spam, Email, Content Moderation, and Infrastructure Oh My

2022-11-14 The cyber is coming from inside the house - the UK is scanning itself

2022-11-07 OpenSSL is the new lead paint

2022-10-31 Airtags in luggage and weasel security - two peas in a suitcase

2022-10-24 Security and working from home have terrible things in common

2022-10-17 Cheap hacking devices turn security upside down

2022-10-10 Python tarfile - 2022 is nothing like 2007

2022-10-03 Stop trying to fix the open source software supply chain

2022-09-26 Programming languages are the new operating system

2022-09-19 Time till open source alternative

2022-09-12 Let's chat about Let's Encrypt with Josh Aas

2022-09-05 Is a network problem a security vulnerability

2022-08-29 The government didn't make vulnerabilities illegal. Yet.

2022-08-22 Episode 337 - Security patches are getting worse - Dustin Childs from ZDI tells us why

2022-08-15 We don't have data, we have security biases

2022-08-08 Bull*&$% security ideas

2022-08-01 Leap seconds break everything

2022-07-25 Open Source is unfair

2022-07-18 PyPI: 2FA or not 2FA, that is the question

2022-07-11 GPG, but nothing makes sense

2022-07-04 The sliding scale of risk: seeing the forest for the trees

2022-06-27 Signing (What is it good for)

2022-06-20 The Security of Jobs or Job Security

2022-06-13 The security of alert fatigue

2022-06-06 Big fat containers

2022-05-30 Is one open source maintainer enough?

2022-05-23 Episode 324 - WTF is up with WFH

2022-05-16 The fake 7-Zip vulnerability and SBOM

2022-05-09 Adam Shostack on the security of Star Wars

2022-05-02 Relativistic Security: Project Zero on 0day

2022-04-25 Security Twitter is not the real world

2022-04-18 Patch Tuesday with a capital T

2022-04-11 Social engineering and why zlib got a 2018 CVE ID

2022-04-04 The lack of compromise in security

2022-03-28 You have to use open source

2022-03-21 Who even makes all these terrible decisions?

2022-03-14 The Linux Dirty Pipe vulnerability

2022-03-07 Insecurity at scale

2022-02-28 The Legend of the SBOM

2022-02-21 Did you scan the QR code?

2022-02-14 Hayley Tsukayama from the EFF talks about privacy

2022-02-07 The bright future of open source security

2022-01-31 Welcome to the jungle - How to talk about open source security

2022-01-24 Got vulnerabilities? Introducing GSD

2022-01-17 Open source isn't broken, it's an experience

2022-01-10 Norton, Ethereum, NFT, and Apes

2022-01-03 Will we ever fix all the vulnerabilities?

2021-12-27 Log4j Christmas Spectacular!

2021-12-20 Log4j is a mess

2021-12-13 You're holding it wrong: the importance of unlearning

2021-12-06 Apple vs NSO: What can copyright do for you?

2021-11-29 Experts From A World That No Longer Exists

2021-11-22 David A Wheeler discusses the OpenSSF

2021-11-15 25 years of smashing stacks, fun, and profit

2021-11-08 Is Trojan Source a vulnerability?

2021-11-01 Open source security isn't free

2021-10-25 Chris Wysopal on the state of security education

2021-10-18 Scoring OpenSSF Security Scoring

2021-10-11 Apache RCE and Twitch epic pwn

2021-10-04 Everyone sucks at vulnerability disclosure

2021-09-27 The security of the Matrix

2021-09-20 Who left this 0day on the floor?

2021-09-13 Linux Kernel compiler warnings considered dangerous

2021-09-06 Is GitHub's Copilot the new Clippy?

2021-08-30 Open source supply chain with Google's Dan Lorenc

2021-08-23 Open source owes you nothing!

2021-08-16 What happens when we DRM power tools?

2021-08-09 When vulnerability disclosure becomes dangerous

2021-08-02 The security of Rust: who left all this awesome in here?

2021-07-26 If you spy on journalists, you're the bad guys

2021-07-19 The perils of Single Sign On

2021-07-12 The audacity of Audacity: When open source goes rogue

2021-07-05 Could SELinux have stopped SolarWinds?

2021-06-28 Privacy and activism with Chris Weiland

2021-06-21 Security, behavior, and the environment

2021-06-14 What in the @#$% is going on with ransomware?

2021-06-07 Mr. Amazon's Neighborhood

2021-05-31 Can we stop the coming artificial unintelligence deluge?

2021-05-24 The Biden Cybersecurity Executive Order

2021-05-17 Pipeline security: There is no problem humans can't make worse

2021-05-10 Hello dark patterns my old friend

2021-05-03 Do not experiment on the Linux Kernel

2021-04-26 Can we trust any 3rd parties?

2021-04-19 Does 0day still mean 0day?

2021-04-12 The future of security scanning with Debricked

2021-04-05 The lies closed source can tell, open source can't

2021-03-29 DevSecOps with GitLab's Mark Loveless

2021-03-22 GitHub pulls exploits, LinuxFoundation sign all the things

2021-03-15 A discussion with Loris and Pop from Sysdig

2021-03-08 DWF is back! Welcome to community powered CVE

2021-03-01 Dave Jevans tells us what CipherTrace is up to

2021-02-22 What even is open source anymore?

2021-02-15 Stop using C

2021-02-08 The sudo and libgcrypt vulnerabilities

2021-02-01 9 bits of podcast, 8 bits of computing

2021-01-25 What if security wasn't joyless?

2021-01-18 Right to Repair Security

2021-01-11 Defenders only need to be right once

2021-01-04 Is open source dangerous? Open source won, who cares, shut up!

2020-12-28 Communication is hard, security communication is more hard

2020-12-25 Door 25: Why do we do the things we do? Question everything

2020-12-24 Door 24: Information wants to be free

2020-12-23 Door 23: How to report 1000 security flaws

2020-12-22 Door 22: How to report one security flaw

2020-12-21 Door 21: Bug bounties

2020-12-20 Door 20: Is SMS 2FA better than no 2FA?

2020-12-19 Door 19: TLS certificate trust

2020-12-18 Door 18: Don't roll your own crypto or auth

2020-12-17 Door 17: Vulnerability response

2020-12-16 Door 16: 16 bits of change

2020-12-15 Door 15: Supplier compliance

2020-12-14 Door 14: Backdoors

2020-12-13 Door 13: Unlucky or survivor bias?

2020-12-12 Door 12: Video game hacking

2020-12-11 Door 11: Should you get on a 737?

2020-12-10 Door 10: Deciding what information matters

2020-12-09 Door 09: public key cryptography

2020-12-08 Door 08: man 8 security

2020-12-07 Door 07: 7 is the best prime, 2 is the dumbest

2020-12-06 Door 06: 6 wifi risks ... that don't actually matter

2020-12-05 Door 05: 5 reasons you need 24/7 robot monitoring

2020-12-04 Door 04: EFF's Cover Your Tracks

2020-12-03 Door 03: Do all vulnerabilities matter equally?

2020-12-02 Door 02: Marketing department or selection bias?

2020-12-01 Door 01: Advent calendars

2020-11-23 Who is responsible if IoT burns down your house?

2020-11-16 Are old Android devices dangerous?

2020-11-09 Full disclosure won, deal with it

2020-11-02 HashiCorp Boundary with Jeff Mitchell

2020-10-26 Security, magic, and FaceID

2020-10-19 Securing network time and IoT

2020-10-12 Chat with Larry Cashdollar

2020-10-05 The past was a terrible place

2020-09-28 How to tell your story with Travis Murdock

2020-09-21 Security didn't find life on Venus

2020-09-14 Real security is boring

2020-09-07 Security Signals: What are you telling the world

2020-08-31 Grab Bag: The Security We Deserve Edition

2020-08-24 The only thing harder than signing files is managing users

2020-08-17 Cult of Information Security

2020-08-10 Secure Boot isn't Secure

2020-08-03 Passwords are pollution

2020-07-27 Weaponized attention

2020-07-20 Confidential Virtual Machines; The future of cloud computing

2020-07-13 The State of Open Source Security with Alyssa Miller from Snyk

2020-07-06 What Would Apple Do?

2020-06-29 Humans, conferences, and security: let me think and get back to you in a bit

2020-06-22 The convergence of application security

2020-06-15 We broke CVSSv3, now how do we fix it?

2020-06-08 Talking Container Security with Liz Rice

2020-06-01 Special cases are special: DNS, Websockets, and CSV

2020-05-25 Good advice or bad advice? Hang up, look up, and call back

2020-05-17 Beer, security, and consistency; the newer, better, triad

2020-05-11 Pounding square solutions into round holes: forced updates from Ubuntu

2020-05-04 Is BPG actually insecure?

2020-04-27 Working from home security: resistance is futile

2020-04-20 Security lessons from space: Apollo 13 edition

2020-04-13 Work without progress - what Infosec can learn from treadmills

2020-04-06 Security scanners are all terrible

2020-04-05 Building a talent "ecosystem"

2020-03-30 Video game hackers - speedrunning

2020-03-23 Depressing news sucks, we're talking about cheating in video games

2020-03-15 Wireguard vs IPsec: the OK Boomer of security

2020-03-08 Endpoint security with Tony Meehan

2020-03-02 Is it even possible to fix open source security?

2020-02-24 It’s DNS. It's always DNS

2020-02-17 Episode 183 - The great working from home experiment

2020-02-10 Does open source owe us anything?

2020-02-03 The security of SIM swapping

2020-01-27 A Tale of Two Vulnerabilities

2020-01-20 Google Project Zero and the 90 day clock

2020-01-13 Are CVEs important and will ransomware put you out of business?

2020-01-06 Fake or real? The security of counterfeit goods

2019-12-30 The 'predictions are stupid' prediction episode

2019-12-23 Defenders will always be one step behind

2019-12-16 GitHub turns security up to 11; A discussion with Rob Schultheis

2019-12-09 Ho Ho Homeland Security

2019-12-02 The security of planned obsolescence

2019-11-25 Measuring cybersecurity with Kathryn Waldron

2019-11-17 Until that quantum computer is cracking RSA keys, go sit back down!

2019-11-11 What happens when leadership doesn't care about security?

2019-11-03 The draconian draconians of DRM

2019-10-28 Security is terrible because digital literacy is terrible

2019-10-21 Every day should be cybersecurity awareness month!

2019-10-13 Grab Bag of Microsoft Security News

2019-10-07 DNS over HTTPS: Probably not the end of the world

2019-09-30 Death to Python 2

2019-09-23 SBOM with Allan Friedman

2019-09-16 Human nature and ad powered open source

2019-09-09 Disclosing security issues is insanely complicated: Part 2

2019-09-02 Disclosing security issues is insanely complicated: Part 1

2019-08-26 The mess that we call credit agencies in the US

2019-08-19 Backdoors and snake oil in our cryptography

2019-07-29 What if we MitM a whole country?

2019-07-22 Stealing cars and ransomware

2019-07-16 Chat with the authors of the book "The Fifth Domain"

2019-07-08 The unexpected security of AI, photographs, and VPN

2019-07-01 Tavis breaks the world ... again

2019-06-24 The DARPA Cyber Grand Challenge with David Brumley

2019-06-17 Our ad funded dystopian present

2019-06-10 Chat with Michael Coates about data security

2019-06-03 You just got pwnt, what now?

2019-05-27 Scams and operations as part of the supply chain

2019-05-20 What the @#$% happened to Microsoft?

2019-05-13 What do security and fire have in common?

2019-05-06 The security of money, which one is best?

2019-04-29 Security lessons from the phone book

2019-04-21 Hypothetical security: what if you find a USB flash drive?

2019-04-15 Timezones are hard, security is harder

2019-04-08 Good enough security is a pretty high bar

2019-04-01 Secure voting, firefox send, and toxic comments on the internet

2019-03-25 Information wants to be free

2019-03-18 Holy cow Beto was in the cDc, this is awesome!

2019-03-11 When the IoT attacks!

2019-03-04 How people feel is more important than being right

2019-02-25 Passwords, AI, and cloud strategy

2019-02-18 What's up with the container runc security flaw?

2019-02-11 Smart locks and the government hacking devices

2019-02-04 Bird Scooter: 0, Cory Doctorow: 1

2019-01-28 Windows micropatches, Google's privacy fine, and Mastercard fixes trial abuse

2019-01-21 Chat with Snyk co-founder Danny Grander

2019-01-14 The EU bug bounty program

2019-01-07 Australia's encryption backdoor bill

2018-12-24 2018 Christmas Special - Is Santa GDPR compliant?

2018-12-17 Walled gardens, appstores, and more

2018-12-10 The not so dire future of supply chain security

2018-12-03 Open Source, supply chains, npm, and you

2018-11-26 Cloudflare's service workers and the economics of security

2018-11-19 Talking about Kubernetes and container security with Liz Rice

2018-11-12 What will Apple's T2 chip mean for the rest of us?

2018-11-05 All about the security of voting

2018-10-29 Bloomberg and hardware backdoors - it's already happening

2018-10-22 The Google+ and Facebook incidents, it's not your data anymore

2018-10-15 Cloudflare's IPFS and onion service

2018-10-08 Will security follow Linus' lead on being nice?

2018-10-01 The future of the CISO with Michael Piacente

2018-09-24 Discussion with Brian Hajost from SteelCloud

2018-09-17 Review of "Click Here to Kill Everybody"

2018-09-10 Actual real security advice

2018-09-03 Google's Titan Key and the latest Struts issue

2018-08-27 The TLS 1.3 and DNS episode

2018-08-19 Review of Black Hat, Defcon, and the effect of security policies

2018-08-13 OSCon and actionable advice

2018-08-06 Bluetooth, phishing, airgaps, and eating soup off the floor

2018-07-30 The year of the Linux Desktop and other hardware stories

2018-07-23 Data isn't oil, it's nuclear waste

2018-07-16 More backdoors in open source

2018-07-09 The Gentoo security incident

2018-07-02 The Seven Properties of Highly Secure Devices

2018-06-25 Michael Feiertag from tCell

2018-06-17 Our unregulated future is here to stay

2018-06-11 You're bad a buying security, we can help!

2018-06-04 Consumer security is too broken to fix, and it doesn't matter

2018-05-28 When IT decisions kill people

2018-05-20 Automation: Humans are slow and dumb

2018-05-11 Are legal backdoors a good idea?

2018-05-07 Twitter passwords and npm backdoors

2018-04-30 DNSSEC, BGP, and reality

2018-04-15 Security flaws in beep and patch, how did we get here?

2018-04-15 Chat with Rami Saas the CEO of WhiteSource

2018-04-08 Security lessons from a 7 year old

2018-04-02 Humans and misinformation

2018-03-25 Short selling AMD security flaws

2018-03-18 Chat with Chris Rosen from IBM about Container Security

2018-03-11 Chat with Let's Encrypt co-founder Josh Aas

2018-03-03 What happens when 23 thousand certificates leak?

2018-02-23 NPM ate my files

2018-02-23 Have I been pwned?

2018-02-21 XKCD + CVE = XKCVE

2018-02-13 RSA, TLS, Chrome HTTP, and PCI

2018-02-07 Autosploit, bug bounties, and the future of security

2018-01-31 GPS tracking and jamming

2018-01-24 Skyfall: please don't yell 'fire'

2018-01-16 Risk lessons from Hawaii

2018-01-10 npm and the supply chain

2018-01-07 Meltdown aftermath

2017-12-19 Security Planner review

2017-12-13 Facial recognition and physical security

2017-12-06 Security from Santa

2017-11-28 Bitcoin: It's over 9000

2017-11-21 GitHub's Security Scanner

2017-11-14 The security of Intel ME

2017-11-07 Actionable security advice

2017-11-01 Ruining the Internet

2017-10-24 Cyber won

2017-10-15 Objects in mirror are less terrible than they appear

2017-10-09 Will aliens overthrow us before AI?

2017-10-03 Networks and Dnsmasq and IoT oh my

2017-09-26 Shoot, Shovel, and Bury

2017-09-11 All about the Equifax hack

2017-09-05 Market driven security

2017-08-30 The official blockchain episode

2017-08-15 The VPN Episode

2017-08-09 Backwards compatibility to the point of insanity

2017-08-01 We may never see amazing security research ever again

2017-07-18 Episode 56 - Devil's Advocate and other fuzzy topics

2017-07-12 Episode 55 - Good Docs Ruin My Story

2017-07-04 Episode 54 - Turning Into An Old Person

2017-06-28 Episode 53 - A Plane Isn't Like A Car

2017-06-20 Episode 52 - You Could Have Done It Right, But You Didn't

2017-06-12 Episode 51 - All About CVE

2017-06-06 Episode 50 - This Is A Security Podcast After All

2017-05-30 Episode 49 - Testing Software Is Impossible

2017-05-21 Episode 48 - Machine Learning: Not Actually Magic

2017-05-14 Episode 47 - WannaCry: Everything Is Basically Broken

2017-05-04 Episode 46 - Turns Out I'm Not A Bad Guy

2017-05-02 Episode 45 - Trust Is More Important Now Than The Truth

2017-04-25 Episode 44 - Bug Bounties Vs Pen Testing

2017-04-19 Episode 43 - We Are Totally Immature

2017-04-13 Episode 42 - Hitchhiker's Guide To Security

2017-04-10 Episode 41 - All Your Money Are Belong To Us

2017-04-02 Episode 40 - Let's Fork Bitcoin, Again

2017-03-28 Episode 39 - Flash On Your Dishwasher

2017-03-22 Episode 38 - We Ruin Everything

2017-03-09 Episode 37 - Your Bathtub Is More Dangerous Than A Shark

2017-03-05 Episode 36 - A Good Enough Podcast

2017-02-28 Episode 35 - Crazy Cosmic Accident

2017-02-22 Episode 34 - Bathing In Ebola Virus

2017-02-15 Episode 33 - Everybody Who Went To The Circus Is In The Circus (RSA 2017)

2017-02-08 Episode 32 - Gambling As A Service

2017-02-01 Episode 31 - XML Is Never The Solution

2017-01-25 Episode 30 - I'm Not An Expert But I've Been Yelled At By Experts

2017-01-22 Episode 29 - The Security Of Rogue One

2017-01-19 Episode 28 - RSA Conference 2017

2017-01-16 Episode 27 - Prove To Me You Are Human

2017-01-12 Episode 26 - Tell Your Sister, Stallman Was Right

2017-01-09 Episode 25 - The Future Is Now

2017-01-03 Episode 24 - The 2016 Prediction Edition

2016-12-28 Episode 23 - We Can't Patch People

2016-12-24 Episode 22 - IoT Wild West

2016-12-21 Episode 21 - CVE 10K Extravaganza

2016-12-19 Episode 20 - The Death Of PGP

2016-12-13 Episode 19 - A Field Full Of Razor Blades And Monsters

2016-12-09 Episode 18 - The Security Of Santa

2016-12-06 Episode 17 - Cyphercon Interview With Korgo

2016-12-02 Episode 16 - Cat And Mouse

2016-11-29 Episode 15 - Cyber Black Monday

2016-11-22 Episode 14 - David A Wheeler: CII Badges

2016-11-18 Episode 13 - CVE: The Metric System Of Security

2016-11-10 Episode 12 - Security Trebuchet

2016-10-31 Episode 11 - The Poison Candy Episode

2016-10-24 Episode 10 - The Super Botnet That Nobody Can Stop

2016-10-18 Episode 9 - Are Bug Bounties Measuring The Wrong Things

2016-10-11 Episode 8 - The Primality Of Prime Numbers

2016-10-03 Episode 7 - More Powerful Than Root

2016-09-29 Episode 6 - Foundational Knowledge Of Security

2016-09-29 Episode 5 - OpenSSL: The Library We Deserve

2016-09-21 Episode 4 - Dead Squirrel In A Box

2016-09-13 Episode - 3 The Lockpicking Sewing Circle

2016-09-07 Episode 2 - Instills The Proper Amount Of Fear

2016-09-06 Episode 1 - Rich History Of Security Flaws

Add this page to your gemini subscriptions for podcast updates.