x.com/naval
…
continue reading
Intelligent Infinity Podcasts
Exploring different topics in our society. We hope to change the world one conversation at a time! 🌎 Welcome to The Intelligent World, where we cover different topics in our society across different programming! Check us out wherever you listen to your podcasts, YouTube, and on social media! If you'd like to submit topics to discuss, fill out this Google Form You can email us at: [email protected] Follow us on Instagram: @theintelligentworld Subscribe to our Youtube channel V ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the rise of automation, AI, and IoT, the intrinsically safe mobile phone is no longer just a tool for calls and texts. It’s a smart device that integrate ...
…
continue reading
Michigan Made. Iowa Inspired. AutoVision News Radio centers on future vehicle technology, including next-generation ADAS innovations, electrification, and software-defined cars. As we stand in the middle of what will be deemed one of the most significant eras in automotive, Carl Anthony amplifies the minds and voices behind this historic transformation while coming to terms with middle age, father loss, and what it means to be successful in Detroit.
…
continue reading
1
JKS Foundation (a division of Petri Dish Foundation) - The Juncture Where Fundamental Truths Come Together
Petri Dish Foundation
Our podcasts are geared towards listeners who desire knowledge regarding fundamental truths and wisdom. Though our content varies from series to series, the presentations are always based on evidence. As the 21st century unfolds and the entire world wakes up every day to a fog of conflict of interest-based illusions, our content is designed to counteract these relentless forces.
…
continue reading
Captured live at Cosmoverse 2025, this episode brings host Sebastian in conversation with Michael (better known as Cryptocito, Cosmos investor via Cito Ventures) and Magnus (@0xMagmar, Co-CEO Cosmos Labs). Against a backdrop of institutional gravitas, central banks mingling alongside Revolut executives, the conversation traces Cosmos' arc across fi…
…
continue reading
1
Take A Virtual Tour of Surveillance Tech Along the U.S./Mexico Border
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56This story was originally published on HackerNoon at: https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border. We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. Check more stories related to cybersecurity at:…
…
continue reading
1
I Built a Password Tool in 2 Weekends (And Got 1,000 Users)
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
1
Yield Basis: Disrupting Defi & Bitcoin Yield
1:00:05
1:00:05
Play later
Play later
Lists
Like
Liked
1:00:05Brian Fabian Crain and Michael Egorov, Curve Finance founder, discuss Curve's origins: solving inefficient DAI/USDC swaps after MakerDAO borrows by creating a DeFi AMM for stablecoins and LSTs. It hit 1M TVL with a bonding curve concentrating liquidity at 1:1, more effective for pegged assets than Uniswap. Features grew to include BTC wrappers, stE…
…
continue reading
1
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
…
continue reading
1
GodLoader Malware Loader: What You Need to Be Aware of
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
1
Transforming Global IT Compliance: Rashmi Sets New Standards in NIST Framework Implementation
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
The Best Only Want to Work With the Best 0:00 You'll Never Be Able to Hire Anybody Better Than You 3:49 Break Every Rule to Get the Best People 6:45 It Just Takes a Small Group of People to Create Something Great 10:19 Find Undiscovered Talent Before Everyone Else 14:56 Great People Have Taste in Other People 19:04 Every Great Engineer Is Also an A…
…
continue reading
1
Lamina1: Building The Future of The Creator Economy
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47Sci-fi titan Neal Stephenson, whose Snow Crash coined the term 'metaverse' and Cryptonomicon, which foreshadowed crypto in 1999, joins Friederike to discuss his "hard sci-fi" method: building immersive, consistent worlds, not prophecy. He's now co-founder of Lamina1, aiming to restore Web1's ethos and give creators IP sovereignty with direct microp…
…
continue reading
1
What Every E-Commerce Brand Should Know About Prompt Injection Attacks
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
…
continue reading
1
How IPinfo Turns Registry Data into Real Intelligence
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading
1
How to Protect Your Kids Online When They're Playing Video Games
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
…
continue reading
1
Security That Moves at Dev Speed: Practical Ways to Shift Left
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
AI Sidebar Spoofing Attack:SquareX Uncovers Malicious Extensions That Impersonate AI Browser Sidebar
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
…
continue reading
1
Smart Attacks, Smarter Defenses: How AI is Transforming DDoS Attacks
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
…
continue reading
1
Is Blockchain Still a Revolution or Becoming Another Upgrade? Ep.621
1:15:34
1:15:34
Play later
Play later
Lists
Like
Liked
1:15:34As blockchain tech gets co-opted by legacy players for efficiency gains, has the revolution lost its edge? Crypto philosopher Paul Dylan-Ennis and Jito's Head of Governance, Dr. Nick Almond, join Friederike to probe this shift from 2017's visionary DAOs to today's Telegram-negotiated votes and whale capture. Rooted in philosophy and complex systems…
…
continue reading
1
Brave: Building the Private User-Friendly Internet - Kyle Den Hartog
1:07:04
1:07:04
Play later
Play later
Lists
Like
Liked
1:07:04Brave has spent a decade building a privacy-first browser that empowers users with tools like ad-blocking and fingerprinting protection, now serving 100 million monthly active users. Security engineer Kyle Den Hartog joins Friederike to unpack the centralization traps in digital identity from email's spam-driven dominance to one-size-fits-all DeFi …
…
continue reading
1
Noble: Solving Crypto's Liquidity Problem, One Chain at a Time - Jelena Djuric
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26In this episode, Sebastien is joined by Jelena Djuric, co-founder of Noble, a generic asset issuance chain built for the Cosmos ecosystem. Jelena shares her journey into crypto, which began with an interest in political science, leading her to discover Bitcoin's potential. She describes the origins of Noble, created to solve a critical need within …
…
continue reading
1
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
…
continue reading
1
Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
…
continue reading
1
The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
…
continue reading
1
Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
…
continue reading
1
Building Resilient Operations Through ITIL-Based Incident Management
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
…
continue reading
Inspiration All the Way Down 0:00 Life is Lived in the Arena 2:40 If You Want to Learn, Do 4:51 In Most Difficult Things in Life, The Solution is Indirect 6:15 When You Truly Work for Yourself 7:30 Find Your Specific Knowledge Through Action 10:12 You Have to Enjoy It a Lot 12:06 Pause, Reflect, See How Well it Did 14:45 Blame Yourself for Everythi…
…
continue reading
1
Benjamin Sarquis Peillard: Cap Labs – Insured Yield & the Future of Stablecoins
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02In this episode, Sebastien Couture is joined by Benjamin, the founder of CAP, a stablecoin protocol designed to provide insured yield. The protocol features two main products: CUSD, a digital dollar, and stCUSD, its staked, yield-bearing version. Yield is generated through an "allocation engine" where third-party operators borrow from the protocol'…
…
continue reading
http://nav.al/simplestBy Naval
…
continue reading
1
Quantum Photons Deliver the Ultimate Random Number Generator
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49This story was originally published on HackerNoon at: https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator. HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices Check more stories related to cybersecurity at: ht…
…
continue reading
1
Inside the AI-Driven Supply Chain: How Scribe Security Is Building Trust at Code Speed
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-ai-driven-supply-chain-how-scribe-security-is-building-trust-at-code-speed. Scribe Security’s ScribeHub combines signed provenance, SBOMs, and AI agents to secure AI-generated code and meet global supply chain regulations. Check more stories related to cybersecu…
…
continue reading
1
ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04This story was originally published on HackerNoon at: https://hackernoon.com/threatbook-launches-best-of-breed-advanced-threat-intelligence-solution. 34% of cyber-attacks worldwide take place within the Asia Pacific (APAC) ThreatBook ATI is able to capture new, difficult-to-detect threats emanating from withi Check more stories related to cybersecu…
…
continue reading
http://nav.al/good-productsBy Naval
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/you-should-be-faking-your-security-answers. One way to guarantee they won’t know the answers to these questions is if you make them up and save them in your password manager for future reference. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
…
continue reading
1
Want to Stay Safe Online? Lie About Your Birthday
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34This story was originally published on HackerNoon at: https://hackernoon.com/want-to-stay-safe-online-lie-about-your-birthday. Your birth date, like your phone number, is personal information that scammers can use to steal your identity or target you for fraud. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. …
…
continue reading
1
Sia Redefines Cloud Security with Supreme Privacy and Impenetrable Protection
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15This story was originally published on HackerNoon at: https://hackernoon.com/sia-redefines-cloud-security-with-supreme-privacy-and-impenetrable-protection. Sia delivers decentralized cloud security with Supreme Privacy and Impenetrable Protection, eliminating single points of failure and insider threats. Check more stories related to cybersecurity …
…
continue reading
1
The Day I Learned My NAS Was Traceable Through TLS Logs
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17This story was originally published on HackerNoon at: https://hackernoon.com/the-day-i-learned-my-nas-was-traceable-through-tls-logs. I recently learned about a new way to leak your privacy, and it's a scary one. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #dns, …
…
continue reading
1
How to Stop Getting Spam Emails—The Complete Guide to Removing Your Personal Information Online
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51This story was originally published on HackerNoon at: https://hackernoon.com/how-to-stop-getting-spam-emailsthe-complete-guide-to-removing-your-personal-information-online. How to remove your personal information from the major data broker sites and get fewer ads in your inbox. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
How Generative AI Can Be Used in Cybersecurity
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50This story was originally published on HackerNoon at: https://hackernoon.com/how-generative-ai-can-be-used-in-cybersecurity. Explore how generative AI is transforming cybersecurity: its dual-use risks, defense tools, and what teams must do to stay ahead. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can…
…
continue reading
1
Most Books Should Be Skimmed, A Few Should Be Devoured
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43Transcript: http://nav.al/devourBy Naval
…
continue reading
Transcript: http://nav.al/densityBy Naval
…
continue reading
1
Research Round Up: On Anonymization -Creating Data That Enables Generalization Without Memorization
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35This story was originally published on HackerNoon at: https://hackernoon.com/research-round-up-on-anonymization-creating-data-that-enables-generalization-without-memorization. Anonymization is what lets us take the most sensitive information and transform it into a safe, usable substrate for machine learning. Check more stories related to cybersecu…
…
continue reading
1
Mento: Onchain FX Markets - Decentralising World Currencies - Markus Franke
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14TradFi FX markets are slow, expensive and often lack liquidity for direct swaps between different world currencies, having to route through USD pairs. While crypto could technically solve pairing through AMM pools, those needed to be arbitraged in order to reflect TradFi rates. With 15 fully-backed stablecoins, Mento is building the largest FX infr…
…
continue reading
Transcript: http://nav.al/foolBy Naval
…
continue reading
1
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth Session Playback
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
…
continue reading
1
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading
1
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
…
continue reading
1
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10This story was originally published on HackerNoon at: https://hackernoon.com/how-to-get-a-reverse-shell-on-macos-using-a-flipper-zero-as-a-badusb. Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also…
…
continue reading
1
Introducing the InfoSec colour wheel — blending developers with red and blue security teams.
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40This story was originally published on HackerNoon at: https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700. As a developer turned security person, I’ve learnt first-hand how important it is for all teams to work together, more than just DevSecOps. Check more stories related to…
…
continue reading
1
f(x) Protocol: Decentralized Yield-Bearing Stablecoin & 0-Liquidation Perp - Cyrille Brière
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22Without a doubt, the introduction of stablecoins has vastly increased overall crypto liquidity, adoption and real-world use cases as they offered a safe haven against the industry’s volatility, especially during bearmarkets. However, despite being extremely efficient, the main stablecoin actors (i.e. Circle & Tether) are centralised entities. Many …
…
continue reading