Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Design Podcasts
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
An interactive lecture series recorded live at Design Hardware in Los Angeles, Ca.
…
continue reading
Michael Colligan is joined by experts, advocates, and professionals to discuss creating better quality night skies.
…
continue reading
This Line Isn’t Secure is an actual play Delta Green podcast blending high production value, immersive sound design, and slow-burning dread. Inspired by Archive 81 and Malevolent, it drags listeners into a world of conspiracies, cosmic horror, and paranoia. Nothing stays hidden forever.
…
continue reading
The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and ...
…
continue reading
Home Design Chat with Nancy Hugo, certified kitchen designer, covers all aspects of every room in the home. Kitchens, baths and whole-house remodeling, appliances, plumbing fixtures, flooring & countertop materials, and lighting are some of our topics. In addition, we cover aging-in-place, security systems, smart homes, backyard kitchens, window coverings, water treatment units & even wine pairing. Some of the favored topics are trends in kitchens, baths & interior designs, colors of the yea ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Welcome to Securing Your Brand, the podcast where Holly McFall and Melissa Jeda from SecureMark Legal discuss trademarks, copyrights, and intellectual property. Hosted by Matt Sky, each episode unpacks the complexities of IP law, offering insights and guidance to help you protect your brand and creative works.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
InventionIP is a leading intellectual property service provider that specializes in creating high-quality patent and trademark drawings to help clients advance their applications. Visit us to learn more.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
…
continue reading
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
…
continue reading
Locksmith Marketing Agency has become a trusted name for locksmith businesses looking to grow online, and one of their strongest offerings is Locksmith Website Design. They specialize in creating websites tailored specifically for locksmiths websites, that are fast, mobile-friendly, and optimized to generate more calls and bookings. Unlike generic web design companies, Locksmith Marketing Agency understands the locksmith industry and builds sites with conversion in mind. Their designs highli ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Which companies are on the cutting edge of artificial intelligence? What’s the next major breakthrough in healthcare? How do iconic brands reinvent themselves to appeal to the next generation? Most Innovative Companies is where tech, business, and innovation convene. Join hosts Yasmin Gagne and Josh Christensen as they bring you the latest innovations transforming business and society—and highlights the companies that are reshaping industries and culture.
…
continue reading
Relaxed Conversations around getting AI into production, whatever shape that may come in (agentic, traditional ML, LLMs, Vibes, etc)
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
The Kiss My Aesthetic Podcast is hosted by Michelle Wintersteen, the Brand Designer and Creative Director behind MKW Creative Co. a freelance brand design firm helping to define, design, build and grow vibrant brands for social-media-minded entrepreneurs. The KMA Podcast is an extension of the Kiss My Aesthetic Facebook Group and covers topics like creating brand awareness, mastering social media marketing, cementing your brand's online presence, and being your own damn boss. Michelle lives ...
…
continue reading
A podcast about web design and development.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading
Our award-winning podcast gives you practical advice from experts on systems, communications, content and design. Whether you’re using digital signage, or just considering it, we help you communicate better.
…
continue reading
Welcome to Trezor Talks, the official podcast from the creators of the world’s first crypto hardware wallet. Join us at Trezor, as we dive deep into insightful conversations with our team of experts, industry thought leaders, and innovators shaping the future of crypto security. Whether you're new to crypto or a seasoned pro, Trezor Talks is here to offer a fresh perspective on the world of digital assets, security, and self-custody.
…
continue reading
Joshua J Sheats, MSFS, CFP, CLU, ChFC, CASL, CAP, RHU, REBC is a financial planner who teaches people how to live a rich life now while building a plan for financial freedom in 10 years or less. He mixes creative approaches to lifestyle design, deep-dive financial planning techniques, and hard-core business strategy to equip you with the knowledge and inspiration you need to build financial independence.
…
continue reading
Web site building with WordPress. In this podcast we follow the hopeless exploits of David Waumsley and Nathan Wrigley as they try, and fail, to understand WordPress. They know that they love building websites with WordPress, but the complexities of this awesome web building solution are always out of reach. Not only are they not clever enough, but they just don't try all that hard
…
continue reading
A podcast for Architects and Engineers who want to thrive in this industry by creating more freedom, fulfillment and financial security. Join Scott Zurn, P.E. and guests in uncovering how to restore value and honor to the unique people who choose to be designers and caretakers of our built world and why it’s essential to the future of our society, our industry, and our planet.
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
A weekly podcast about the electronics industry. Occasional guests. Lots of laughs.
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
Thrive Podcast for Florists is the go-to show for floral designers who are ready to simplify their marketing, sell with confidence, and build a profitable flower business — without the second-guessing. Hosted by Kathleen, Business & Sales Strategist for Florists, each episode delivers real-world strategies, mindset shifts, and behind-the-scenes insights to help you attract better clients, price with clarity, and grow your floral design business with confidence. Whether you dream of more high ...
…
continue reading
f
…
continue reading
The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcas ...
…
continue reading
Dive into the exciting world of web creation with artificial intelligence tools. In *"Developing My Website with Artificial Intelligence"*, we explore step by step how to design, optimize, and manage websites efficiently, even if you're a beginner. From choosing the best hosting and domain to implementing advanced strategies like SEO, security, and monetization, each episode is packed with practical tips, innovative tools, and techniques to transform your ideas into a successful website. Whe ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
…
continue reading
Wir erzählen am Beispiel des französischen Widerstands im 2. Weltkrieg davon, was man beim Widerstand beachten sollte.Wir erzählen am Beispiel des französischen Widerstands im 2. Weltkrieg davon, was man beim Widerstand beachten sollte. Und was man damals (tm) schon falsch gemacht hätte, wenn es ein Internet gegeben hätte.Licensed to the public und…
…
continue reading

1
UK expected to recognise Palestinian state
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Britain is expected to take the unprecedented step of recognising a Palestinian state today. The move will be a major shift in foreign policy for the UK which has, for decades, insisted that recognition should only happen as part of a peace deal with Israel. Also: the US Pentagon fuels fears about press freedom with new restrictions on journalists,…
…
continue reading
Melodic Death Metal aus DresdenFünf (6) aufstrebende, aber erfolglose Musiker verzücken und/oder verletzen eure Ohren mit ihrem vielschichtigen, modern-melodischen Todesmetall. Doch dieser Schublade setzen sie mit Einflüssen fast aller extremen Metal-Richtungen stets gekonnt die Cocktail-Kirsche auf den Scheißehaufen. Inhaltlich stets auf der Gratw…
…
continue reading

1
Einführung in den Diskordianismus (DS2025)
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42Die Einführung findet statt, obwohl im fünfdeutigen Abstimmungsverfahren zweidreistimmig dagegen ausgeschieden wurde. Hail ERISPentagon, Penta-dies, Penta-das. 5, 17, 23, FNORD und Hot Dogs am Freitag. Das Chaos ist voll von Querverweisen auf diskordische Errungenschaften. Doch wo kommt das Ganze eigentlich her? Ein Apostel der Legion des dynamisch…
…
continue reading

1
Appease movement - Why the German Peace Movement fails to condemn Russia's Aggressive War against Ukraine (DS2025)
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Analysis from a naive peace activist who grew up and got wise.In 2014, Russia assulted Ukraine and in 2022, it started its full-scale invasion. The major part of the peace movement in Germany, however, not only stayed silent but even aggressively spreads Russian war propaganda narratives. Why?Way too many things about this russian aggression are co…
…
continue reading

1
Befreie dich von BigTech zum Wohle der Gesellschaft (DS2025)
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30Oder warum man als Links gerichteter Mensch kein Whatsapp nutzen sollteIch spreche etwas über das derzeitige politische Klima und wie große Technikfirmen dazu beitragen es zu verschlimmern. Danach zeige ich, wie man diese Technikfirmen aus seinen Leben verjagt und was für Vorteile man dadurch erlangt. Beginnend mit einfachen Schritten, die jeder in…
…
continue reading

1
Lowlights aus dem Überwachungssommer 2025 (DS2025)
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57Ob EU-, Bundes- oder Länder-Ebene: überall gibt es neue Pläne, uns alle zu überwachen. Lasst uns diese genauer beleuchten!Neue Vorstöße zur Chatkontrolle und zur Vorratsdatenspeicherung auf EU-Ebene, ein geplantes bundesweites Register für Menschen mit psychischen Erkrankungen, Palantir für BaWü und noch vieles mehr.Unsere Welt wird nicht nur immer…
…
continue reading

1
Deine politische Initiative - aus dem Kopf, auf die Straße, in den StaDDrat (DS2025)
46:59
46:59
Play later
Play later
Lists
Like
Liked
46:59Wie wird aus einer Idee eine politische Initiative? Und wie kann diese erfolgreich sein?In diesem Vortrag möchte ich allen, die sich mit ihrem Anliegen engagieren wollen oder dies bereits tun, Tipps und Hinweise geben, wie ihre Idee erfolgreich sein kann. Anhand von Praxisbeispielen möchte ich zeigen, wie man sich vernetzt, welche politischen Instr…
…
continue reading

1
Digital Euro - What the FAQ, ECB? (DS2025)
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49The European Central Bank wants to create a Digital Euro. We take a critical look at its published FAQ and the current design.In its FAQ about the Digital Euro, the ECB provides answers to 20+ questions about the retail central bank digital currency (CDBC) project for a Digital Euro. In good old Frequently-Questioned-Answers style, we will confront…
…
continue reading

1
Integration 2.0: why the old system in Germany fails (DS2025)
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33How the German integration system is delaying integration, and what the russian propaganda has to do with itGermany’s integration system was never built to help newcomers quickly find work. It was created decades ago for very different reasons — to slow things down, to keep migrants out of the labour market, to “protect” the status quo. That kind o…
…
continue reading

1
CRA: Cybersicherheit in der Gesellschaft (DS2025)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Update zur Implementierung des Cyber Resilience Act (CRA).Der Cyber Resilience Act (CRA) wird derzeit implementiert und noch immer herrschen einige Unklarheiten in Hinblick auf seine Auswirkungen auf die Freie Software Landschaft. Insbesondere die Rolle der Stewards ist teilweise unklar. Der Vortrag wird den aktuellen Stand der Debatte beleuchten a…
…
continue reading

1
Digitale Gewalt: feministische Cybersecurity als Brückenbauprojekt (DS2025)
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Bei digitaler Gewalt aus dem sozialen Nahraum braucht es feministische Cybersecurity und eine Brücke zw. IT und sozialer Arbeit.Digitale Gewalt ist heute Alltag in Beratungsstellen und häufig eine Fortsetzung von analoger Gewalt im sozialen Nahraum: Wenn (Ex-)Partner mit versteckten Tracking-Apps kontrollieren, intime Fotos veröffentlichen oder Ide…
…
continue reading

1
Fastreach: Welcher deutsche Bahnhof ist am besten angebunden? (DS2025)
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Beleuchtet werden Verfahren zur Bewertung der Erreichbarkeit von Orten und deren effiziente Implementierung.Fastreach ist ein Datenanalyseprojekt, das Isochrone basierend auf Fahrplandaten der deutschen Bahn und aller lokalen Verkehrsverbünde ermittelt. Basierend darauf lassen sich die Haltestellen bezüglich ihrer Erreichbarkeit bewerten und starke…
…
continue reading
Push-Benachrichtigungen auf Android-Handys ohne Google. Dezentralisiert und Open Source.Mit Open Source Tools wie microG bekommt man zwar erfolgreich proprietäre Google Software von seinem Android-Handy verbannt; die eigentlichen Benachrichtigungen werden aber dennoch über Google Server verschickt (Firebase Cloud Messaging).UnifiedPush ist ein Fram…
…
continue reading
Detalierter Vortrag über Nitrokey, Nitrokeys und FIDO2Nitrokey – Eine Open-Hardware und Open SourceSecurity FirmaIch stelle die Firma und ihre Produkte kurz vor, und lege dann den Fokus auf Authentifizierung und FIDO2/Passkeys im Besonderen.Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/about this event: https://talks.d…
…
continue reading

1
Git-basierte sachliche Online-Diskussionen (DS2025)
47:12
47:12
Play later
Play later
Lists
Like
Liked
47:12Online über kontroverse Themen zu diskutieren ist schwierig. Das hat strukturelle Gründe, die sich aber überwinden lassen.Über digitale Medien geführte Diskussionen zu kontroversen Themen verlaufen selten zufriedenstellend. Der Vortrag basiert auf der Überzeugung, dass diese miese Online-Diskussionskultur die Errungenschaften der FDGO gefährdet und…
…
continue reading

1
The Happy Pod: Nurse revives 'drunk' raccoon
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29A nurse in the US state of Kentucky has gone viral after she saved a baby raccoon who became 'drunk' on fermented fruit. The cub had passed out after eating peaches, thrown away by a distillery. Also: we hear from Bárbara Hernández, a cold water swimmer from Chile, known as the Ice Mermaid. She's front crawled her way to a Guinness World Record, co…
…
continue reading

1
fact your fear - Macht mit! Lösen wir Gemeinschaft. (DS2025)
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31Eine langfristige und konstruktive gesamtgesellschaftliche Lösungsfindung ist (aktuell nicht) möglich.Oder doch?Eine langfristige und konstruktive gesamtgesellschaftliche Lösungsfindung ist (aktuell nicht) möglich.Obwohl viele Akteure sich dafür konstruktiv einsetzen und/oder sogar entgeltlich dafür einsetzen sollten. Die Angst-Biologie und Aufmerk…
…
continue reading

1
Licht an gegen die „Going Dark“ Überwachungsagenda (DS2025)
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Wir dekonstruieren das „Going Dark“ Narrativ und schauen, welche Überwachungsmaßnahmen damit gerade propagiert werden.In letzter Zeit wird ein Narrativ wieder viel strapaziert: „Going Dark“. Die Erzählung geht so: Die "Guten", hier Strafverfolgungsbehörden" tappten bei ihren Ermittlungen vermeintlich im Dunkeln, während die Bösen, z.B. 'CYBERkrimin…
…
continue reading

1
Irgendwas mit Hardware Security Modules - Vortrag (DS2025)
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49Vorteile/Notwendigkeit aufzeigen, bestehende Implemetierungen anschauen/bewerten: zusätzlich ein Nitrokey-WorkshopDer Vortrag betrachtet die Vorteile, und eigentlich die Notwendigkeit, der Nutzung von Hardware Security Modules (HSM) hinsichtlich technischer als auch organisatorischer Aspekte.Folien zur Vorbereitung sind unter https://senf.space/ds2…
…
continue reading

1
Emanzipiertes (Social) Web - nicht nur für Menschen mit Sysadmin-Rechten (DS2025)
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Teilnahme am Social Web geht in aller Regel entweder unter fremden Regeln oder mensch ist Admin.Da ist Emanzipationspotential!Und diese Regeln gehen über die gesetzlichen (Beleidigung, üble Nachrede, Verleumdung etc.) hinaus. Wer allerdings Admin-Know-How hat und selbst einen Server betreibt, hat keine fremden Regeln.Das empfinde ich als unfair und…
…
continue reading

1
Das gläserne Baby? Unbeabsichtigte und unvorhergesehen Effekte der Speicherung genomischer Daten von Neugeborenen (DS2025)
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Sollte das Genom aller Neugeborenen in Deutschland sequenziert, analysiert und ggf. langfristig gespeichert werden?Genetische Daten werden in der Medizin für Diagnostik und Gesundheitsvorsorge immer wichtiger. Sie enthalten jedoch hochsensible Informationen über biologische Verwandtschaften, Gesundheitsrisiken, Behinderungen und Abstammung. Zudem w…
…
continue reading
Learn how Taler uses tokens to enable a wide array of use cases beyond digital cash, all while preserving anonymity in payments.Digital money everywhere, all the time, all at once... isn't it getting a little boring? In this talk you will learn how [GNU Taler](https://taler.net/), a privacy-focused payment system, leverages the properties of digita…
…
continue reading

1
Na endlich: Linux auf dem Smartphone (DS2025)
46:20
46:20
Play later
Play later
Lists
Like
Liked
46:20Lang hat es gedauert, doch nun nähern wir uns mit großen Schritten der Alltagstauglichkeit von Linux auf Smartphones!Nach einem Jahr Linux als Betriebssystem auf meinem Smartphone ziehe ich Bilanz: was geht, was geht nicht und wohin geht die Reise? Nebenher erzähle ich euch, was es eigentlich mit dem Streit um Halium auf sich hat, wie weit wir von …
…
continue reading

1
Freeze. Flight. Fight. Fawn: Queer Survival in Wartime Ukraine (DS2025)
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47Lives of queer Ukrainians reshaped by war — from the frontlines to exile, rebuilding community under constant uncertainty.This talk is a mosaic of stories from queer people whose lives changed irreversibly after Russia’s full-scale invasion of Ukraine on February 24, 2022. Some volunteered for the frontline and survived captivity, some became refug…
…
continue reading
Wie wir ohne Chefs unsere Jobs angenehmer gestalten und wo es dann ungeahnt mal hakt.Bei der Jointech eG wirtschaften wir in einem sogenannten Kollektivbetrieb gemeinsam. Dabei spielen Ideale und das Streben nach einer besseren Welt eine große Rolle - gleichzeitig wollen wir unsere Lohnarbeit im hier und jetzt angenehmer gestalten, sind jedoch imme…
…
continue reading
Network-Attached-Storage-Geräte (NAS) haben netteres Design als Selbstbaulösungen, aber gruselige Software. Lets replace it.Die großen NAS-(network attached storage)-Hersteller (QNAP, Synology, usw) sind berüchtigt für immer wieder auftretende Sicherheitslücken in deren Standard-Software. Trotzdem ist die spezialisiertere Hardware interessant und h…
…
continue reading
TelefonkartenDieser Vortrag will Euch auf eine Reise mitnehmen. Eine Reise, in eine Zeit, als man zum Telefonieren noch in eine Telefonzelle gehen und dort so komische Plastekarten in das Telefon stecken musste.Es ist eine Zeitreise in vielerlei Hinsicht. Hauptsächlich soll es darum gehen, wie sich die Telefonkarten entwickelten und wie sie (in ver…
…
continue reading

1
Liberals Celebrate Kirk Assassination on Social Media, 'Love' Texts from Assassin to Boyfriend & Designating Antifa as Terrorist Organization Week In Review
29:36
29:36
Play later
Play later
Lists
Like
Liked
29:36Charlie Kirk Assassination The central focus is the assassination of conservative activist Charlie Kirk. It highlights how some individuals on social media and in academic or professional positions were accused of celebrating his death. Commentary draws sharp contrasts between free speech protections and the consequences of hateful or violent speec…
…
continue reading

1
NATO intercepts Russian jets in Estonian airspace
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37NATO has intercepted Russian jets in Estonian airspace. The Kremlin denies that an incursion took place but it comes after similar incidents in Poland and Romania. Also: President Trump announces visa changes and a potential TikTok deal, the co-founder of the Palestinian-led BDS movement talks to the BBC, Notre Dame's bell towers reopen to the publ…
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
…
continue reading

1
Infrastructure, Cloud, and Supply Chain Security
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
…
continue reading
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
…
continue reading

1
Identity, Authentication, and Access Control
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
…
continue reading
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
…
continue reading

1
Security Foundations & Risk in the Modern Enterprise
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
…
continue reading

1
The DuckLake Lakehouse Format // Hannes Mühleisen // #339
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24The DuckLake Lakehouse Format // MLOps Podcast #339 with Hannes Mühleisen, Co-founder and CEO of DuckDB Labs. Join the Community: https://go.mlops.community/YTJoinIn Get the newsletter: https://go.mlops.community/YTNewsletter // Abstract Managing data on Object Stores has been a painful affair. Users had to choose between data swamp chaos or a maze…
…
continue reading

1
Usable end-to-end security with Delta Chat and Chatmail (DS2025)
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28Over the years, Delta Chat has matured to be an easy-to-use, secure, and even fast decentralized FOSS messenger app.Over the years, Delta Chat has matured to be an easy-to-use, secure, and even fast decentralized FOSS messenger app for all platforms. In this talk we discuss the background and origins of user-testing in eastern europe, the rise of t…
…
continue reading
A drone strike on a mosque in Sudan's Darfur region has killed more than 70 people. The attack in El Fasher city is being blamed on the paramilitary Rapid Support Forces. The RSF has been fighting to take over the city from the army, as the civil war in Sudan rages. Also: the Taliban in Afghanistan release an elderly British couple who'd been detai…
…
continue reading

1
Podcast: Schlüsseltechnologie Live: Wir lesen "Vom Mythos des Mann-Monats" (DS2025)
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07Dieses Buch über Softwareentwicklung von 1975 ist deutlich aktueller, als man denken würde.Im Podcast "Schlüsseltechnologie" erklären wir moderne Computertechnik von Grund auf. Nach dem Erfolg unserer ersten Live-Folge zum Diffie-Hellman-Verfahren sind wir zurück, und studieren diesmal die klassische Literatur des Fachs: In den Podcast-Folgen 68 un…
…
continue reading

1
Podcast: Reboot Politics ÷ Akronymisierbar (DS2025)
57:55
57:55
Play later
Play later
Lists
Like
Liked
57:55Crossover der beiden Podcasts Reboot Politics und Akronymisierbar.Technik, Politik und ganz viel Drumherum. Wir reden in dieser Folge vor allem über KI – von allen Richtungen betrachtet.Licensed to the public under https://creativecommons.org/licenses/by/4.0/de/about this event: https://talks.datenspuren.de/ds25/talk/8ZK7LR/…
…
continue reading
Los geht es ..."Under Construction!" Alles ist kaputt, angefangen von der Brücke über das Vertrauen bis hin zum Gesellschaftsvertrag. Krieg und Frieden stehen zur Disposition. Wir haben ein Interessantes Programm. Mit übergreifenden Themen wie Krieg in der Ukraine und seine Auswirkungen, Medien und seine sozialen Reichweiten, aber auch Quere Themen…
…
continue reading
Today’s discussion is on one of the most important transformations happening in the automotive industry: the shift from traditional 12-volt electrical systems to modern 48-volt architectures. For decades, 12V has been the backbone of vehicle electronics, but with the rise of electrification, ADAS, infotainment, and software-defined cars, the indust…
…
continue reading

1
Jimmy Kimmel Fired-Was it Right & Should the FCC have Gotten Involved plus Trump Designates ANTIFA a Terrorist Organization
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Jimmy Kimmel’s Firing & FCC Involvement The hosts argue that Jimmy Kimmel was suspended/fired not just because of controversial remarks about Charlie Kirk’s assassination, but also because of poor ratings, declining revenue for ABC, and refusal to apologize. They dispute claims that it was “cancel culture,” instead framing it as a business decision…
…
continue reading

1
Why Perform a Patent Invalidity Search Before Litigation | InventionIP Podcast
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Explore why conducting a patent invalidity search before litigation is essential for businesses and innovators. This episode explains how invalidity searches uncover prior art, assess patent strength, and provide critical leverage in disputes. Learn how this step minimizes legal risks, reduces unnecessary costs, and strengthens your position in cou…
…
continue reading

1
US blocks another UN Gaza ceasefire attempt
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26The United States has, for the sixth time since the start of the war in Gaza, vetoed a draft resolution at the UN Security Council demanding an immediate, unconditional and permanent ceasefire in the Palestinian territory. The US said that the resolution failed to recognise Israel’s right to defend itself as well as condemn Hamas. Also: President T…
…
continue reading