Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
Security Controls Podcasts
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Decoding Geopolitics is a podcast that tries to make sense of today's dangerous world by talking with real experts on international relations, strategy and security.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Take a peek inside the real-life stories of physical security professionals with the team from J & J Access & Security. These guys have a great chemistry, and it comes through hilariously on this podcast about the lives of locksmiths and security pros.
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
…
continue reading
World-renowned aviation-industry consultants and former NTSB investigators John Goglia and Greg Feith have 100 years of worldwide aviation safety experience between them. In this hard-hitting podcast series they talk about everything aviation -- from the behind-the-scenes facts on deadly air crashes to topics of interest such as tips and tricks for navigating through airports and security, traveling with infants and children, unruly passengers, and packing your bags to ease through security.
…
continue reading
At TROUBLEMAKERS, we explore how to rebel in an age when a few elite have so much control. We speak with inspiring people from all walks of life across the planet on the tools they use to subvert and seize power for the transformation of our world. TROUBLEMAKERS is a place to learn from each other about how to make change. This podcast is a transcontinental operation brought to you by Beautiful Trouble, MOVE the Global Social Movement Centre, MS TCDC, and Global Platforms.
…
continue reading
Full Metal Packet is the go-to podcast for security leaders who want the truth about what it takes to defend at scale. Hosted by Yegor and Alex, the founders of Windscribe (trusted by 90M+ people) and Control D, this show pulls back the curtain on how operators actually handle breach incidents, reduce noise, and prepare for the post-AI security world. Season 1 features CISOs, DFIR commanders, and security architects from SaaS, healthcare, government, and hospitality. Each episode dives into: ...
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Brought to you by the Texas National Security Review, this podcast features lectures, interviews, and panel discussions at The University of Texas at Austin.
…
continue reading
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
The 2008 financial crisis did more than rattle Wall Street—it reshaped our neighborhoods. Homes that once built security for families became speculative investments. Over ten years later, that tension has only sharpened. This series explores how we got here and what it will take to put control back in local hands—because the question isn’t whether the void will be filled, but by whom. Learn more at strongtowns.org/stackedagainstus
…
continue reading
Welcome to "Calm Your Caveman" – the podcast that gives you the tools for anxiety mastery. I'm Dr. Adriana Jarvis Twitchell, and my doctoral degree in anxiety management strategies qualifies me to guide you on this journey. I've walked the path from chronic anxiety to security, and I'm here to help you do the same. In this podcast, you'll find control through understanding how emotions are generated and learn effective anxiety mastery strategies for every circumstance. By tuning in, you’ll a ...
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impac ...
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
Which companies are on the cutting edge of artificial intelligence? What’s the next major breakthrough in healthcare? How do iconic brands reinvent themselves to appeal to the next generation? Most Innovative Companies is where tech, business, and innovation convene. Join hosts Yasmin Gagne and Josh Christensen as they bring you the latest innovations transforming business and society—and highlights the companies that are reshaping industries and culture.
…
continue reading
In a world where security breaches are not a matter of "if" but "when," "Command & Control: An IT Security Podcast" stands as a bastion of knowledge and expertise. Hosted by Aaron Banner, a distinguished retired Army Colonel and cyber security expert, this podcast is designed to equip businesses with the tools and knowledge they need to maintain a fortress of digital security. Aaron Banner brings to the table years of experience having protected national security at the highest levels, to br ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Retirement is the plan. You worked hard to get where you are, now have a retirement that works hard for you. If you want to achieve… confidence, peace of mind, control of your future, a rock-solid income plan, financial freedom, and unrestricted options in retirement this show is the right one for you! Retirement is approaching and you can’t afford to make mistakes with your money. In the back of your mind, there are concerns about what happens if there is another financial downfall as you a ...
…
continue reading
Move beyond the headlines to see how the past defines our world.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Pinch of Salt is the podcast from Salt Sovereignty exploring the future of self-custody, decentralized governance, and trustless infrastructure. Every episode dives into the stories, challenges, and innovations shaping how organizations reclaim control of their digital assets. From builders in crypto, blockchain architects, security engineers, to policy thinkers, we bring you candid conversations on everything from automated policy enforcement to agent-managed yield accounts, open infrastruc ...
…
continue reading
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
This podcast is an interview series with career professionals in cyber security as we get their takes on shadow IT, extended access control, agentic AI and how they arrived at this point in their careers.
…
continue reading
The Wealth Nation Podcast aims to empower you to take control of your money management and to secure an abundant future for yourself and your family by making wise money decisions. Host, Yolanda Rose Haripersad will pick the biggest, brightest brains in finance and entrepreneurship to provide you with ideas and strategies to manage your money and build generational wealth.
…
continue reading
Red Dot Mindset is the official podcast of Grey Matter Ops, your tactical guide to surviving — and thriving — in a world where hesitation can cost you everything. Hosted using advanced AI narration and written by a decorated U.S. Air Force Security Forces veteran, each episode blends military-grade strategy with real-world self-defense, situational awareness, and survival psychology. Whether you're facing a street-level threat, a digital stalker, or just the daily grind of modern life, we’ll ...
…
continue reading
Money is one of the greatest tools we have to build a life we love. Whether you're seeking financial freedom or security, or simply want to have more peace of mind when it comes to money, learning how to use it wisely is essential. In this show you will to learn how to take control of your finances, start investing and put your money to work to serve you and others more effectively. You will learn from world-class personal finance experts as well as from Sebastien’s experience in reaching fi ...
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
A podcast for security professionals, provided by the Total Security Daily Advisor.
…
continue reading
NPR's Up First is the news you need to start your day. The three biggest stories of the day, with reporting and analysis from NPR News — in 10 minutes. Available weekdays at 6:30 a.m. ET, with hosts Leila Fadel, Steve Inskeep, Michel Martin and A Martinez. Also available on Saturdays at 9 a.m. ET, with Ayesha Rascoe and Scott Simon. On Sundays, hear a longer exploration behind the headlines with Ayesha Rascoe on "The Sunday Story," available by 8 a.m. ET. Subscribe and listen, then support y ...
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
EU War Against Privacy Explained (Chat Control)
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47For the past few months, the EU has been on a mission to break privacy and end-to-end encryption in the name of child safety. Here's what this means for you, even if you're not an EU citizen. Learn how to build better personal privacy and security online with our free 7-day email course: https://www.allthingssecured.com/email-course/ ▶ Special than…
…
continue reading

1
Securing the Future with Cisco: AI, Quantum, and the Evolution of Networking
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44In this episode of Command and Control, host Jason Pope sits down with Kinney Yee and LeeAnn Larson to explore how Cisco is redefining secure networking with innovation, intelligence, and integration. From AI Canvas and SecureX to post-quantum cryptography, the discussion highlights how Cisco’s ecosystem—backed by XenTegra’s expertise—delivers a sm…
…
continue reading

1
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode of the Security Repo Podcast, Aria Langer returns to share deep insights from her work in privileged access management and the challenges of implementing security controls without alienating coworkers. She and Dwayne dive into the often-overlooked importance of empathy in cybersecurity, exploring how human connection can make securi…
…
continue reading

1
#88 John Bolton Warns: The System Is Breaking Down - And The World’s Out of Control
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56➡️ Watch the full interview ad-free, join a community of geopolitics enthusiasts and gain access to exclusive content on PATREON: https://www.patreon.com/DecodingGeopolitics ➡️ Sign up to my free geopolitics newsletter: https://stationzero.substack.com/ This is a conversation with John Bolton - a former US ambassador to the United Nations and a for…
…
continue reading
Homeless encampments are a part of the landscape in many U.S. cities. In Oakland, California, one of the longest-standing and most well-known encampments was at Union Point Park. It was right by the water, and it had a beautiful view of the sunset. But it was also a concern for some local residents, who worried about crime and safety. When the city…
…
continue reading

1
India and China - true partners or rivals?
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35India and China - one of the most complex and consequential relationships in modern geopolitics.By Australian Broadcasting Corporation
…
continue reading
See you next year!Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/KAB39N/By Yan Minagawa
…
continue reading

1
Holding the Fort: How did bridges happen (matrix-conf-2025)
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty?This talk features a journey back through time as we look at bridges and integrations that have bee…
…
continue reading

1
Leading the way into CRA compliance: Element’s approach to the incoming regulation (matrix-conf-2025)
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models…
…
continue reading

1
"No Kings" Protests; Aid Slow for Gaza; U.S. - China Trade War Heats Up
14:49
14:49
Play later
Play later
Lists
Like
Liked
14:49Thousands of "No Kings" rallies are planned across the U.S. today, protesting the Trump administration's policies. Plus, over a week in the Hamas-Israel ceasefire, desperately needed humanitarian aid has been slow to arrive in Gaza. We'll also look at the latest salvos in the ongoing trade war between the U.S. and China. Learn more about sponsor me…
…
continue reading

1
How do messaging app users feel about untraceability? (matrix-conf-2025)
54:14
54:14
Play later
Play later
Lists
Like
Liked
54:14Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer…
…
continue reading

1
Getting started with Element Server Suite Community (matrix-conf-2025)
14:05
14:05
Play later
Play later
Lists
Like
Liked
14:05Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll …
…
continue reading

1
Scaling Real-Time in NeoBoard: Our Journey from P2P to MatrixRTC + LiveKit (matrix-conf-2025)
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix clientIn this talk, we’ll share how we migrated NeoBoard’s real-time …
…
continue reading

1
A Contextual Integrity approach to privacy in interoperable messaging (matrix-conf-2025)
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropri…
…
continue reading

1
Integrating Matrix in a trustworthy collaborative ecosystem (matrix-conf-2025)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data.Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chos…
…
continue reading

1
Portable identites (MSC 2787) and the GDPR right to rectification, a pressing need for server operators (matrix-conf-2025)
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadeq…
…
continue reading

1
Solving the Fork Dilemma: How We Built a Maintainable Matrix Messenger (matrix-conf-2025)
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experience…
…
continue reading

1
Building Matrix-Powered Campus Communication Platform Thousands Students (matrix-conf-2025)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc.The session will cover:- Wh…
…
continue reading

1
Schulchat RLP as [matrix]-based school messenger (matrix-conf-2025)
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores.What makes this solution unique is the deep integration of the identity and…
…
continue reading

1
The Role of the Matrix Protocol within Germany’s Sovereign and Secure Health Messenger Solution – A Loyal Player Embracing the Evolution of Secure Architectures (matrix-conf-2025)
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent intro…
…
continue reading

1
Supporting TF-X with Matrix: best practices and pitfalls (matrix-conf-2025)
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project.…
…
continue reading

1
The Matrix SDK No One Talks About (matrix-conf-2025)
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by dig…
…
continue reading

1
Element X and Pro Updates (matrix-conf-2025)
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17We will provide you with the latest updates on Element X mobile apps, as well the plan to sunset our classic Element apps. This includes both the current state, as well as a look into what to expect during the next couple of months and details about specific features like threads and spaces that many people are looking forward to on Element X. In t…
…
continue reading

1
MatrixRTC - The key sharing problem (matrix-conf-2025)
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos!Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun.We will also see how other providers like jit…
…
continue reading

1
Why do I have 2 passwords? How to talk about encryption in Matrix (matrix-conf-2025)
50:15
50:15
Play later
Play later
Lists
Like
Liked
50:15Most modern software applications give total trust to the service provider. End-to-end encrypted (E2EE) services are different: the service provider is a gateway, and the real trust is with other people.This is unfamiliar, and can make using E2EE confusing. When you add in federation (meaning lots of different service providers) and a diverse set o…
…
continue reading

1
Secure and Sovereign communications for United Nations International Computing Centre and its Partners (matrix-conf-2025)
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53Secure communication leveraging the Matrix protocol for UNICC and its partnersLicensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/WM9WAE/By Tima Soni
…
continue reading

1
Matrix French gov deployment: opening a private federation securely (matrix-conf-2025)
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05The French government has deployed a private Matrix federation for French civil servants called Tchap.Currently this federation has about 300 000 monthly active users and its usage is growing constantly.Today our federation is closed and we would like to be able to connect with other public French Matrix nodes (local authorities for instance), and …
…
continue reading

1
Joining the conversation: balancing privacy with usability for encrypted messages (matrix-conf-2025)
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29Being able to read the conversation in a room before you joined is a critical feature for some usecases, but end-to-end encryption makes it tricky to implement.In this technically-focussed talk, we'll cover the challenges behind implementing "history sharing", why previous attempts in this area failed, and how we solved those problems with minimal …
…
continue reading
In this talk, we will share the newest improvements to MatrixRTC. We'll focus on how the security and encryption architecture has evolved to provide robust, private communications for Matrix users. Additionally, we will show how to integrate Element Call into clients using the Rust or JS-SDK in a matter of minutes. Whether you're building a custom …
…
continue reading

1
Rocket.Chat: Entering the Matrix (matrix-conf-2025)
51:50
51:50
Play later
Play later
Lists
Like
Liked
51:50In this talk, we trace the journey of evolving Rocket.Chat from a standalone collaboration server into a full-fledged Matrix home-server — all built in TypeScript. We’ll dive into the architecture decisions, the incremental features (federation, room state sync, identity translation, event routing, crypto, and bridging), and the real challenges of …
…
continue reading

1
Invisible Crypto: can Matrix be both secure and easy to use? (matrix-conf-2025)
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15The Invisible Crypto initiative intends to make Matrix easier to use by ensuring that encrypted messaging is secure by default, and the user is not bothered by irrelevant information.In this talk we will give a status update, hopefully explaining why crypto needed to become slightly more visible on the journey towards making it disappear.We'll go i…
…
continue reading

1
No Desk Is an Island: Enabling Cross-Border Workspace Communication (matrix-conf-2025)
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38As EU member states (co-)develop sovereign workspace solutions for the public sector, the need for seamless communication between these platforms becomes increasingly important. France, Germany, and the Netherlands are among the countries working on such solutions together, with the goal of facilitating cross-border collaboration and data exchange …
…
continue reading

1
Militarisation of Tech: Redefining the Battlefield
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24This week we talk to Ilia and Serhat about the creeping militarisation of technology, and with it our societies. Links All of our militarisation work: https://privacyinternational.org/campaigns/militarisation-of-tech What is Militarisation of Tech?: https://privacyinternational.org/long-read/5668/what-militarisation-tech Key Concerns Regarding Gove…
…
continue reading

1
Lessons learned from implementing Native OIDC from scratch (matrix-conf-2025)
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Are we OIDC yet ? YES ! We are !OpenID Connect evolved as the one and only identity standard in the modern web. With MSC3861, the [matrix] ecosystem is finally moving to OIDC as the authentication standard amongst clients and homeservers.Out of curiosity, I started implementing a native OIDC implementation from scratch : no OAuth 2.0 library, no Ru…
…
continue reading

1
ESS - Element’s distribution for Matrix deployments (matrix-conf-2025)
57:36
57:36
Play later
Play later
Lists
Like
Liked
57:36In this talk we will provide insights on the new Element Server Suite (ESS) editions which provide an Element-supported way to deploy Matrix stacks. ESS is available in three editions- [ESS Community](https://github.com/element-hq/ess-helm) - the free Matrix distribution from Element for small-/mid-scale, non-commercial community use cases- [ESS Pr…
…
continue reading

1
Improving the security of the federation protocol (matrix-conf-2025)
49:26
49:26
Play later
Play later
Lists
Like
Liked
49:26The federation protocol is how Matrix homeservers communicate between each other. In private federations this isn't particularly challenging as the network is trusted but in the public federation this isn't true. This talk dives into what protocol improvements are in the works to make the public federation more secure against Byzantine actors, part…
…
continue reading

1
Bolton Indicted, Trump and Zelenskyy Meeting, Rebuilding Gaza
14:52
14:52
Play later
Play later
Lists
Like
Liked
14:52John Bolton is indicted on 18 counts for allegedly mishandling classified information dating back to his time as national security advisor during President Trump’s first term. President Volodymyr Zelenskyy meets with President Trump at the White House to discuss Ukraine's request for long-range missiles, Trump says he will meet with Russia's presid…
…
continue reading

1
How Matrix is becoming the communication standard for Public Sector (matrix-conf-2025)
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Matrix was built to become the open communication of the web and serve everyone. But, as the Internet and email did, its network effect started with governments. Today, and as proven by the audience in the room, most European governments and several others are either using it or looking at implementing it for their communications. This talk will te…
…
continue reading
Presentation of the Luxembourg efforts to establish a sovereign instant messaging ecosystem for the public and private sector for Luxembourg. More details to follow.Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/GEEKMY/…
…
continue reading

1
Eventually Consistent Access Control: Practical Insights on Matrix from Decentralized Systems Theory (matrix-conf-2025)
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39Access control is the core of any system's security, but usually provided by a single, centralized server. However, access control in a Matrix room is decentralized: every participating server *independently* decides *who* is authorized to send and receive *which* events, without consulting any other server. To the surprise of many, these decisions…
…
continue reading
Element X is coming to web and desktop! What does that mean? We’re going to make the apps simple, familiar, reliable and fast! Come learn more about the vision we have put together and all the progress we have made so far!The talk will cover:* The qualities/goals we are aiming for in EWX* The high level plan to achieve this including: * Our product…
…
continue reading

1
Governing Board transparency update (matrix-conf-2025)
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27In this talk we will cover- what is the Governing Board about- how does it fit into the Foundation - reviewing the last 12 months and outputs- showing some of the different processes like establishing Working Groups, what Committees are, interactions with the Foundation- what next- how to get involved in open governance- take some questionsLicensed…
…
continue reading

1
The Element update: Shininess, scalability and sustainability (matrix-conf-2025)
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03A whistle stop tour of Element’s progress over the last year! Highlights include Element Server Suite Community, the latest on Element X, Spaces, Threads and Element Call. There’s also Element Server Suite Pro, Synapse Pro and the launch of Element Pro; the Element app specifically for the workplace!Licensed to the public under https://creativecomm…
…
continue reading

1
We need to stop the AI slop before it’s too late
1:10:31
1:10:31
Play later
Play later
Lists
Like
Liked
1:10:31On today’s episode, co-hosts Yasmin Gagne and Josh Christensen discuss the latest news in business and innovation, including renewed trade tensions with China, Instagram’s new approach to protecting minors from harmful content, and Spotify’s new partnership with Netflix. Next, AI video technology has come a long way since 2023’s famous fever dream …
…
continue reading

1
The High Price of Open Source: Building a Business Around Matrix (matrix-conf-2025)
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16Open Source has never been easy, but doing Open Source in the Matrix ecosystem poses a unique set of challenges. Add the pressure of sustaining a company on top of that, and you quickly find yourself in uncharted, and often uncomfortable, territory. This talk reflects on the reality of maintaining open source projects in the Matrix universe, especi…
…
continue reading

1
An Update on reaching the German Government via Matrix (matrix-conf-2025)
37:30
37:30
Play later
Play later
Lists
Like
Liked
37:30With *Beyond Instant Messaging: Matrix in the Public Sector* last year, we presented FITKO and the German Federal Ministry of the Interior joining efforts to pilot a Matrix-based next-generation communication infrastructure for digital government services, with the goal to showcase end-to-end encryption, great usability and machine-readable communi…
…
continue reading

1
E2EE Direct Messaging in Bluesky with Matrix (matrix-conf-2025)
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43See a demo of E2EE encrypted DMs in Bluesky powered by Matrix. We will highlight the simple user experience and other advantages of this approach to adding E2EE to Bluesky.By reusing Matrix for E2EE DMs in Bluesky, we not only offer a trusted and tested open source encryption stack but also allow users to later expand their usage beyond chat to oth…
…
continue reading

1
Commercialising Matrix (matrix-conf-2025)
44:52
44:52
Play later
Play later
Lists
Like
Liked
44:52Can Matrix compete with Big Tech? That remains an open question - but the market conditions in Europe have never been more favorable to sovereign, European software solutions. So how do we build commercially sound companies based on Matrix? This talk will focus on real-world use cases, showcase features built for public-sector customers, explore vi…
…
continue reading

1
Large-scale multi-tenancy hosting for TI-Messenger (matrix-conf-2025)
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02In this talk we will introduce Synapse Pro, the Matrix server for professional environments from Element. Synapse Pro is built to support professional Matrix deployments in terms of scalability, efficiency and high availability. It comes in two flavours, Synapse Pro for Small Hosts and Synapse Pro for Large Hosts. The Small Hosts solution introduce…
…
continue reading

1
The German BundesMessenger (matrix-conf-2025)
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22The BundesMessenger is the soverein communication solution for the German government and armed forces. Developed to be robust, secure and interconnected it serves as the basis for collaboration in the public sector. With a sharp focus on user experience, an uncompromised commitment to free and open-source software and state-of-the-art deployment of…
…
continue reading