Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Cryptography Podcasts
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Story
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,400 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
…
continue reading
PowerShell Community
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
The official podcast of the Satoshi Nakamoto Institute
…
continue reading
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
…
continue reading
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics! RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
…
continue reading
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
…
continue reading
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
…
continue reading
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
…
continue reading
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
1
en clair: forensic linguistics, literary detection, language mysteries, and more
Dr Claire Hardaker
en clair is a podcast about forensic linguistics, literary detection, language mysteries, cryptography, codes, language and the law, linguistic crime, undeciphered languages, and more, from past to present. Credits, links, podcast transcripts and more in the Case Notes: wp.lancs.ac.uk/enclair
…
continue reading
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:29
52:29
Play later
Play later
Lists
Like
Liked
52:29Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
World-leaders in Cryptography: Giuseppe Ateniese
1:34:41
1:34:41
Play later
Play later
Lists
Like
Liked
1:34:41Giuseppe is a Professor, Eminent Scholar in the Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University. He has advanced many areas of research, including proxy re-encryption, anonymous communication, two-party computation, secure storage, and provable da…
…
continue reading
1
Quantum, cryptography & metacomplexity with Oxford Computer Scientist Matthew Gray
1:51:36
1:51:36
Play later
Play later
Lists
Like
Liked
1:51:36You’ve heard of cryptography. Perhaps quantum cryptography too. Maybe even post-quantum cryptography. But what about *quantum post-quantum cryptography*?! When this came up in conversation with Oxford Computer Scientist Matthew Gray recently, I’d never heard of it. I wanted to know more, so I invited him for a podcast. Turns out, there’s a whole wo…
…
continue reading
https://mcdn.podbean.com/mf/web/wxjkax4ukr4a8zks/The_PowerShell_Podcast_episode_204_Al754vf.mp3 In this episode of The PowerShell Podcast, host Andrew Pla welcomes Dr. Al Carlson, a cryptographer, mathematician, and engineer whose career spans more than four decades in military intelligence, embedded systems, and advanced encryption research. Dr. C…
…
continue reading
1
Cryptography, Cracking Codes, and Breaking CBC with Dr. Al Carlson
1:20:51
1:20:51
Play later
Play later
Lists
Like
Liked
1:20:51In this episode of The PowerShell Podcast, host Andrew Pla welcomes Dr. Al Carlson, a cryptographer, mathematician, and engineer whose career spans more than four decades in military intelligence, embedded systems, and advanced encryption research. Dr. Carlson explains how set theory and mathematical patterns underpin all cryptography, breaking dow…
…
continue reading
1
The Imperial Jade: Nephrite and the Global History of a Stone
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18A global tour of nephrite jade, the “imperial gem” prized above gold. We explore its buttery mutton-fat luster and legendary toughness, why interlocking tremolite/actinolite fibers make it famously hard to break, and how this one mineral connected civilizations from ancient China and the Silk Road to the maritime jade routes of Southeast Asia and N…
…
continue reading
1
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack stra…
…
continue reading
1
Walking the Tree: DFS, BFS, and the Rules that Shape Data
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20A deep-dive into the spine of computing: tree traversal. We unpack depth-first search with preorder, inorder, and postorder, and breadth-first search’s level-by-level exploration. Learn what each visit order buys you—copying a tree, producing sorted keys, or generating postfix notation—and how memory models (stacks versus queues) drive real impleme…
…
continue reading
1
From Wild Tomato to Tuber: The Origin of the Potato
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10A landmark genomic study across 128 genomes reveals the potato arose 8–9 million years ago through a hybrid between a wild tomato ancestor and Etuberosum. We unpack how two genes—SP6A and IT1—flipped the switch to tuber formation, creating a brand-new underground storage organ, fueling Andean adaptation and global diversification. We also explore h…
…
continue reading
1
Root Causes 562 : What Is a Side Oracle Attack?
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57You may have heard of side channel attacks. Now Jason explains what a side oracle attack is and how a side oracle attack in conjunction with AI could be effective against the HQC or Falcon PQC algorithms.By Tim Callan and Jason Soroko
…
continue reading
1
3536: When AI Knows Us Too Well and What It Means for Human Choice
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31What happens when the systems designed to make life easier quietly begin shaping how we think, decide, and choose? In this episode of the Tech Talks Daily Podcast, I sit down with Jacob Ward, a journalist who has spent more than two decades examining the unseen effects of technology on human behavior. From reporting roles at NBC News, Al Jazeera, C…
…
continue reading
1
How Elite Athletes Perform Under Extreme Pressure
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48with @LairdLife @GabbyReece @AriannaSimpson Today's episode features two people who’ve spent their careers performing at the highest levels in sport and business: big-wave surfing pioneer Laird Hamilton and former pro volleyball star Gabby Reece. They join a16z crypto General Partner Arianna Simpson for a conversation that explores what it takes to…
…
continue reading
https://mcdn.podbean.com/mf/web/vjj2wtiqimctq8hk/The_PowerShell_Podcast_episode_207_Jorge_Suarez86hu6.mp3 Jorge Suarez joins The PowerShell Podcast to share his journey into PowerShell, automation, and community contribution. From attending his first MMS conference to building creative and practical PowerShell projects, Jorge talks about how PowerS…
…
continue reading
1
Building PowerShell Tools You Wish Existed with Jorge Suarez
51:38
51:38
Play later
Play later
Lists
Like
Liked
51:38Jorge Suarez joins The PowerShell Podcast to share his journey into PowerShell, automation, and community contribution. From attending his first MMS conference to building creative and practical PowerShell projects, Jorge talks about how PowerShell became the primary driver of his career growth. The conversation covers his popular Intune Hydration …
…
continue reading
From two teeth sold as dragon bones in a Hong Kong drugstore to the largest known primate, this episode reconstructs a giant’s life. We explore its colossal size, enamel armor, and a diet revealed by dental calculus and ancient proteins—tying it to orangutans—and uncover why porcupines may have gnawed away its bones as climates shifted and forests …
…
continue reading
1
The Hidden Driver of Big Networks: Perron–Frobenius and the Long-Run Shape of Complex Systems
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43A deep dive into the Perron–Frobenius theorem, from its origins with Perron and Frobenius to its role in irreducible nonnegative matrices. We unpack the guaranteed real, positive dominant eigenvalue (the Perron root) and its positive eigenvector, and explain how this single driver predicts long-run behavior in sprawling networks—think web graphs, p…
…
continue reading
1
Dark Fringes, Dark Photons: A Quantum-to-Cosmic Dive
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33Could the double-slit interference be explained if photons can briefly inhabit dark quantum states invisible to detectors? In this episode we connect that quantum idea to the cosmic mystery of dark photons—the hypothetical portal to a vast dark sector—and explore what current experiments and data analyses could mean for physics beyond the Standard …
…
continue reading
AI is undoubtedly the technology of the year for hacks and scams. While scammers are busy using AI to make scams more convincing, scam baiters are fighting back with ingenious grandma-style AIs that keep scammers busy for hours on end. There have also been some spectacular busts of scam centers. What’s next, AI scammers chatting with AI scam baiter…
…
continue reading
1
3535: HR at a Crossroads: Performance, Culture, and Technology
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05How is HR changing when AI, economic pressure, and rising employee expectations all collide at once? In this episode of Tech Talks Daily, I'm joined by Simon Noble, CEO of Cezanne HR, to unpack how the role of HR is evolving from a traditional support function into something far more closely tied to business performance. Simon shares why HR is incr…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:04:04
1:04:04
Play later
Play later
Lists
Like
Liked
1:04:04Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is t…
…
continue reading
1
The Bayeux Tapestry: A Loom-Sized Chronicle of Conquest
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37We untangle the 11th‑century embroidered narrative that preserves the Norman invasion. From Opus Anglicanum and Canterbury workmanship to border scenes of daily life, farming tools, and Halley’s Comet, we explore who stitched the story, who funded it, and what it reveals about power and perspective. Learn about its UNESCO Memory of the World status…
…
continue reading
Dive into non-orientable surfaces with the Klein bottle. We explain what it means for a surface to have no inside or outside, why physical models require self-intersections (immersions) in 3D, and how a true Klein bottle must live in four dimensions (R4) to embed without self-crossings. We'll connect to the Mobius strip, discuss boundary vs no boun…
…
continue reading
1
The Diffusion Blueprint: How the Heat Equation Connects Toast, Geometry, and Finance
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01A deep dive into Fourier's heat equation—the Laplacian, thermal diffusivity, and heat kernels—and how a simple smoothing principle unifies physics, geometry, image processing, and even financial markets. From a hot piece of toast cooling on the counter to Brownian motion in markets, this episode reveals the astonishing reach of one elegant PDE. Not…
…
continue reading
1
3534: Agentic AI at Scale: What 120 Million Monthly Conversations Really Mean
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14What does it really mean when AI moves from answering questions to making decisions that affect real people, real money, and real outcomes? In this episode of Tech Talks Daily, I'm joined by Joe Kim, CEO of Druid AI, for a grounded conversation about why agentic AI is becoming the focus for enterprises that have moved beyond experimentation. After …
…
continue reading
1
MoneroTopia26 Artist ULYXYZ! | EPI 245
2:06:36
2:06:36
Play later
Play later
Lists
Like
Liked
2:06:3647e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: https://uly.xyz TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:03:34) Monerotopia Price Report Segment w/ Bawdyanarchist. (00:44:43) Monerotopia Guest Segment w/ Ulysses XYZ. (01:18:10)…
…
continue reading
1
Famous Hacker Reveals TRUE Ethical Hacking Stories
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brok…
…
continue reading
1
From Peacock Feathers to Photonic Crystals: Slow Light and the Future of On-Chip Optics
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53A journey from the peacock feather’s structural color to engineered photonic crystals, showing how geometry—not pigment—controls light. We explore photonic band gaps, slow light, and how ultra-compact, energy-efficient on-chip lasers and switches arise from nanostructures—redefining data communication and security in the next generation of optics. …
…
continue reading
1
The Cheese and Bacon Roll: Australia’s Ubiquitous Bakery Icon
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09A deep dive into Australia’s beloved cheese and bacon roll (the CBR): fluffy, freshly baked dough topped with melted cheddar and crispy bacon that fuels mornings for tradies and bakery lovers alike. We trace its ubiquity, simple perfection, and regional twists—from tomato bits to cheese-filled riffs—while placing it in the wider Aussie bakery canon…
…
continue reading
1
Alicella gigantea: The 34-Centimeter Giant Amphipod of the Deep
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19Join us as we explore Alicella gigantea, the 34 cm white amphipod that thrives in abyssal and hadal trenches. We unpack abyssal gigantism, a decade-long lifespan, and a genome around 34.8 Gb that hints at a past whole-genome duplication, shaping its gigantism. With a cosmopolitan distribution across roughly 59% of the world’s oceans and gut microbe…
…
continue reading
1
3533: Smart Cities, AI, and Sovereignty, Gorilla Technology's CTO Explains What Works and What Fails
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46The world is building data centers, identity rails, and AI policy stacks at a speed that makes 2026 feel closer than it is. In this conversation, Rajesh Natarajan, Global Chief Technology Officer at Gorilla Technology Group, explains what it takes to engineer platforms that remain reliable, secure, and sovereign-ready for decades, especially when i…
…
continue reading
1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:28:28
1:28:28
Play later
Play later
Lists
Like
Liked
1:28:28Question? Text our Studio direct. If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “…
…
continue reading
1
TOI 561: A 10-Billion-Year-Old, Metal-Poor Planetary System
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22Meet TOI 561, a 10-billion-year-old orange dwarf in the Milky Way's thick disk—the galaxy's ancient backbone. This metal-poor star hosts at least four planets, including TOI 561b, a scorching super-Earth with an 11-hour orbit whose composition is debated: rocky with little iron or a water-rich body shrouded in a dense steam atmosphere. The discover…
…
continue reading
1
The Lazarus Fish: Coelacanth’s Ancient Comeback
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46From the fossil record's 66-million-year gap to the 1938 South African discovery, we trace the coelacanth's improbable return and why it's called the ultimate Lazarus taxon. We'll dive into Latimeria, the lobed-finned lineage that links us to lungfish and tetrapods, and explore their bizarre anatomy—the notochord and intracranial joint—that keep th…
…
continue reading
1
Vishapakar: The Dragon Stones and Armenia’s Water-Driven Megaliths
4:43
4:43
Play later
Play later
Lists
Like
Liked
4:43We explore the Vishapakar—massive basalt monuments of the Armenian highlands carved with fish, serpents, and other symbols, named for the water dragon Vishap. New research shows their placements align with ancient irrigation and water networks dating to the Chalcolithic (roughly 4,200–4,000 BCE), revealing a sophisticated water-centered ritual land…
…
continue reading
1
Entropic Gravity: Is Gravity Information, Not a Force?
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15We explore Verlinde's entropic gravity, the bold claim that gravity is not a fundamental force but an emergent force arising from information and thermodynamics. We'll tour the core ingredients— the holographic principle, equipartition of energy, and the Unruh effect— and show how they can reproduce Newton's law. We discuss the dramatic implication…
…
continue reading
1
3532: How AI Keeps Live Events Personal for Fans at Event Tickets Center
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03What makes live events feel personal in an age of algorithms making the calls? That's the tension marketers are living in right now. Ben Kruger, Chief Marketing Officer at Event Tickets Center, sits at the center of this shift. He has spent 20 years shaping server-side systems and performance marketing strategies, including a decade of persistence …
…
continue reading
1
Astra’s New Cloud Vulnerability Scanner Targets the “Oops Factor” Behind 73% of Cloud Breaches
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15This story was originally published on HackerNoon at: https://hackernoon.com/astras-new-cloud-vulnerability-scanner-targets-the-oops-factor-behind-73percent-of-cloud-breaches. Astra’s scanner detects cloud misconfigurations causing 73% of breaches with real-time monitoring, agentless visibility, and validated risk alerts. Check more stories related…
…
continue reading
1
How Compliance Requirements Shape Modern Software Architecture
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19This story was originally published on HackerNoon at: https://hackernoon.com/how-compliance-requirements-shape-modern-software-architecture. GDPR's "right to be forgotten" just redesigned your database. HIPAA moved your PHI to a separate infrastructure. Here’s how compliance shapes architecture. Check more stories related to cybersecurity at: https…
…
continue reading
1
Building a DeFi-Native Chain w/ Justin Havins (Katana)
1:04:24
1:04:24
Play later
Play later
Lists
Like
Liked
1:04:24What does it actually mean to build a chain around DeFi—not just host DeFi apps, but bake decentralized finance into the architecture itself? Justin Havins spent 13 years in traditional banking before joining Polygon's DeFi team, and now he's helping lead Katana, a new L2 that's trying something different: sharing chain revenue directly with users …
…
continue reading