SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading

1
The Deep Dive : Mysteries, Conspiracies, Scandals, Covert Operations, Folklore, Legends & More.
coachbp1975
We want to explore and dive deep into the world of Mysteries, Conspiracies, Scandals, Covert Operations, Folklore, Legends & More. We never claim to know everything, we never claim our opinion is correct, we simply put the evidence we have on the table and allow the audience to decide for themselves.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Master the CompTIA Server+ exam with Audio Course—your audio companion for server hardware, administration, security, and troubleshooting. Every episode simplifies exam objectives into practical insights you can apply in real-world IT environments. Produced by BareMetalCyber.com, where you’ll find more prepcasts, books, and resources to power your certification success.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
Midweek Sitrep with Jerry Fowler is your biweekly briefing on what’s happening in the world of national security—decoded for everyday listeners. From classified documents and sanctions to cyberattacks, foreign interference, and spycraft, Jerry breaks down the headlines, the history, and the hidden forces shaping global power today. Whether it’s a presidential executive order, a new war in a far-off region, or a tech ban making waves in Washington, Jerry gives you the background and context t ...
…
continue reading

1
Project Sapphire - Securing Kazakhstan's Nuclear Material
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08By coachbp1975
…
continue reading

1
TNO046: Prisma AIRS: Securing the Multi-Cloud and AI Runtime (Sponsored)
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22Multi-cloud, automation, and AI are changing how modern networks operate and how firewalls and security policies are administered. In today’s sponsored episode with Palo Alto Networks, we dig into offerings such as CLARA (Cloud and AI Risk Assessment) that help ops teams gain more visibility into the structure and workflows of their multi-cloud net…
…
continue reading
By Circle Of Insight Productions
…
continue reading

1
Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Please enjoy this encore of Career Notes. Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of pr…
…
continue reading
See you next year!Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/KAB39N/By Yan Minagawa
…
continue reading

1
Holding the Fort: How did bridges happen (matrix-conf-2025)
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Take a trip back through time with me as we learn about how bridges happened. Why did we do it at all? Whose idea was it to hook up the then fledgling matrix.org network to the biggest IRC network? How many databases were shredded in the line of duty?This talk features a journey back through time as we look at bridges and integrations that have bee…
…
continue reading

1
Leading the way into CRA compliance: Element’s approach to the incoming regulation (matrix-conf-2025)
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13The Cyber Resilience Act is a new European regulation that has the main goal to increase European cyber security and resilience, through accountability. A lot has been said about the impacts of the CRA on open source, in particular towards non-profit foundations, but what about organisations - such as Element - that operate complex licensing models…
…
continue reading

1
How do messaging app users feel about untraceability? (matrix-conf-2025)
54:14
54:14
Play later
Play later
Lists
Like
Liked
54:14Messaging platforms offer to protect user privacy via a variety of features, such as disappearing messages, password-protected chats, and end-to-end encryption (E2EE), which primarily protect message contents. Beyond such features, "untraceable communication" tools for instant messaging protect users from network attackers observing transport layer…
…
continue reading

1
Getting started with Element Server Suite Community (matrix-conf-2025)
14:05
14:05
Play later
Play later
Lists
Like
Liked
14:05Join us for an introduction to the Element Server Suite Community, the simplest way to deploy a Kubernetes-based Matrix 2.0-ready stack, maintained by Element. This workshop will deploy all the components of the suite: a Synapse homeserver with Matrix Authentication Service enabled, a Matrix RTC backend for calls, and an Element web client. You'll …
…
continue reading

1
A Contextual Integrity approach to privacy in interoperable messaging (matrix-conf-2025)
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43This talk will introduce the Helen Nissenbaum's theory of Contextual Integrity as a framework for understanding privacy in messaging platforms. Contextual Integrity views privacy not as keeping information secret, but as making sure information flows in ways that match people’s expectations in a given context, or in other words, what feels appropri…
…
continue reading

1
Scaling Real-Time in NeoBoard: Our Journey from P2P to MatrixRTC + LiveKit (matrix-conf-2025)
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14[NeoBoard](https://neoboard.io/) is an open source real-time collaborative whiteboard built on the Matrix protocol. It functions both as a widget within chat-focused Matrix clients like Element Web, and as a standalone web app that acts as a lightweight, whiteboard-centric Matrix clientIn this talk, we’ll share how we migrated NeoBoard’s real-time …
…
continue reading

1
Integrating Matrix in a trustworthy collaborative ecosystem (matrix-conf-2025)
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08At Oodrive, our mission is to offer a secure and sovereign solution to manage our partners' most sensitive data.Building on this foundation, we are developing a secure collaboration platform that fully aligns with these values. Collaboration cannot happen without communication, therefore we decided to integrate a secure chat in our product. We chos…
…
continue reading

1
Portable identites (MSC 2787) and the GDPR right to rectification, a pressing need for server operators (matrix-conf-2025)
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Most of the discussions around privacy laws have been focused on the protection of data and condition of processing. But some others rights are starting to be litigated more widley and will soon play a bigger role for IT systems managers. This talk will focus on the GDPR article 16 (right to rectification), and how the current Matrix spec is inadeq…
…
continue reading

1
Solving the Fork Dilemma: How We Built a Maintainable Matrix Messenger (matrix-conf-2025)
51:52
51:52
Play later
Play later
Lists
Like
Liked
51:52Tammy is a multiplatform Matrix Messenger designed to be redefined by you. Want a different room list layout? Need a messaging interface tailored to a specific use case? Tammy’s extensible architecture makes that not only possible - but easy. In this talk, we’ll showcase how Tammy empowers developers to create radically customized Matrix experience…
…
continue reading

1
Building Matrix-Powered Campus Communication Platform Thousands Students (matrix-conf-2025)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this talk I will present my journey in developing a decentralized and secure communication platform for a university with thousands students and faculty members. Using Matrix and Element as foundation I tailored the solution to meet academic needs, ensure data privacy and integrate with some systems, bots, widgets etc.The session will cover:- Wh…
…
continue reading

1
Schulchat RLP as [matrix]-based school messenger (matrix-conf-2025)
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56fairkom has developed a [matrix]-based school messenger for the Department of Education of the German state of Rhineland-Palatinate to serve up to half a million users. Schulchat RLP has one code base for all platforms and is available as app on Apple and Google Play Stores.What makes this solution unique is the deep integration of the identity and…
…
continue reading

1
Smile for the malware. [Research Saturday]
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style too…
…
continue reading

1
CIA Operations to Prevent Allendes Rise - Project Fubelt
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51By coachbp1975
…
continue reading
Former White House Situation Room Director Larry Pfeiffer Talks Fear and Facts with SpyTalk. Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.com/talk_spy Subscribe to SpyTalk on Substack https://www.spytalk.co/ Take our listener sur…
…
continue reading
Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social med…
…
continue reading

1
Supporting TF-X with Matrix: best practices and pitfalls (matrix-conf-2025)
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23NATO organised a TaskForce-X Baltics event where we very quickly contracted, deployed and integrated telemetry and video streams from uncrewed platforms. This required a lot of coordination and this was done through our on-prem Matrix capability. I would like to share my experience by using Matrix to support this very demanding operational project.…
…
continue reading

1
The Role of the Matrix Protocol within Germany’s Sovereign and Secure Health Messenger Solution – A Loyal Player Embracing the Evolution of Secure Architectures (matrix-conf-2025)
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46Germany’s digital health infrastructure has long been built on the principles of sovereignty, open standards, and interoperability. With the electronic patient record (ePA) and KIM for secure data and document exchange, Germany established a federated ecosystem using standards such as FHIR and OIDC with sectoral identity providers. The recent intro…
…
continue reading

1
The Matrix SDK No One Talks About (matrix-conf-2025)
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Trixnity is rapidly emerging as a powerful, flexible, and fully asynchronous SDK for building Matrix applications using Kotlin Multiplatform. What many don't realize: Trixnity is already in widespread use - potentially powering apps usable by over 50 million people. It’s embedded in multiple Matrix-based messengers, though you’d only know it by dig…
…
continue reading

1
MatrixRTC - The key sharing problem (matrix-conf-2025)
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48Why is having large encrypted group calls difficult? How do other providers solve this? The future? Demos!Why are large encrypted group calls difficult to host? Specifically, we will go into the details about key sharing, how we can use some tricks to optimize it and how they are also a very big footgun.We will also see how other providers like jit…
…
continue reading

1
Why do I have 2 passwords? How to talk about encryption in Matrix (matrix-conf-2025)
50:15
50:15
Play later
Play later
Lists
Like
Liked
50:15Most modern software applications give total trust to the service provider. End-to-end encrypted (E2EE) services are different: the service provider is a gateway, and the real trust is with other people.This is unfamiliar, and can make using E2EE confusing. When you add in federation (meaning lots of different service providers) and a diverse set o…
…
continue reading

1
Element X and Pro Updates (matrix-conf-2025)
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17We will provide you with the latest updates on Element X mobile apps, as well the plan to sunset our classic Element apps. This includes both the current state, as well as a look into what to expect during the next couple of months and details about specific features like threads and spaces that many people are looking forward to on Element X. In t…
…
continue reading

1
Secure and Sovereign communications for United Nations International Computing Centre and its Partners (matrix-conf-2025)
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53Secure communication leveraging the Matrix protocol for UNICC and its partnersLicensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/WM9WAE/By Tima Soni
…
continue reading
In this talk, we will share the newest improvements to MatrixRTC. We'll focus on how the security and encryption architecture has evolved to provide robust, private communications for Matrix users. Additionally, we will show how to integrate Element Call into clients using the Rust or JS-SDK in a matter of minutes. Whether you're building a custom …
…
continue reading

1
Matrix French gov deployment: opening a private federation securely (matrix-conf-2025)
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05The French government has deployed a private Matrix federation for French civil servants called Tchap.Currently this federation has about 300 000 monthly active users and its usage is growing constantly.Today our federation is closed and we would like to be able to connect with other public French Matrix nodes (local authorities for instance), and …
…
continue reading

1
Joining the conversation: balancing privacy with usability for encrypted messages (matrix-conf-2025)
50:29
50:29
Play later
Play later
Lists
Like
Liked
50:29Being able to read the conversation in a room before you joined is a critical feature for some usecases, but end-to-end encryption makes it tricky to implement.In this technically-focussed talk, we'll cover the challenges behind implementing "history sharing", why previous attempts in this area failed, and how we solved those problems with minimal …
…
continue reading

1
Checklist 445 - Ransomware Revisited and a Bigger Bug Bounty
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55Apple is increasing bug bounties for good guys, in theory. We’ll talk about how much white hats might be able to get outta Cupertino. First though, Japan’s beer bungle was a ransomware attack. An update on that and the changing state of cyberattacks on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.c…
…
continue reading

1
No Desk Is an Island: Enabling Cross-Border Workspace Communication (matrix-conf-2025)
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38As EU member states (co-)develop sovereign workspace solutions for the public sector, the need for seamless communication between these platforms becomes increasingly important. France, Germany, and the Netherlands are among the countries working on such solutions together, with the goal of facilitating cross-border collaboration and data exchange …
…
continue reading

1
Invisible Crypto: can Matrix be both secure and easy to use? (matrix-conf-2025)
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15The Invisible Crypto initiative intends to make Matrix easier to use by ensuring that encrypted messaging is secure by default, and the user is not bothered by irrelevant information.In this talk we will give a status update, hopefully explaining why crypto needed to become slightly more visible on the journey towards making it disappear.We'll go i…
…
continue reading

1
Rocket.Chat: Entering the Matrix (matrix-conf-2025)
51:50
51:50
Play later
Play later
Lists
Like
Liked
51:50In this talk, we trace the journey of evolving Rocket.Chat from a standalone collaboration server into a full-fledged Matrix home-server — all built in TypeScript. We’ll dive into the architecture decisions, the incremental features (federation, room state sync, identity translation, event routing, crypto, and bridging), and the real challenges of …
…
continue reading

1
Lessons learned from implementing Native OIDC from scratch (matrix-conf-2025)
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04Are we OIDC yet ? YES ! We are !OpenID Connect evolved as the one and only identity standard in the modern web. With MSC3861, the [matrix] ecosystem is finally moving to OIDC as the authentication standard amongst clients and homeservers.Out of curiosity, I started implementing a native OIDC implementation from scratch : no OAuth 2.0 library, no Ru…
…
continue reading

1
Improving the security of the federation protocol (matrix-conf-2025)
49:26
49:26
Play later
Play later
Lists
Like
Liked
49:26The federation protocol is how Matrix homeservers communicate between each other. In private federations this isn't particularly challenging as the network is trusted but in the public federation this isn't true. This talk dives into what protocol improvements are in the works to make the public federation more secure against Byzantine actors, part…
…
continue reading

1
ESS - Element’s distribution for Matrix deployments (matrix-conf-2025)
57:36
57:36
Play later
Play later
Lists
Like
Liked
57:36In this talk we will provide insights on the new Element Server Suite (ESS) editions which provide an Element-supported way to deploy Matrix stacks. ESS is available in three editions- [ESS Community](https://github.com/element-hq/ess-helm) - the free Matrix distribution from Element for small-/mid-scale, non-commercial community use cases- [ESS Pr…
…
continue reading

1
How Matrix is becoming the communication standard for Public Sector (matrix-conf-2025)
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Matrix was built to become the open communication of the web and serve everyone. But, as the Internet and email did, its network effect started with governments. Today, and as proven by the audience in the room, most European governments and several others are either using it or looking at implementing it for their communications. This talk will te…
…
continue reading
Element X is coming to web and desktop! What does that mean? We’re going to make the apps simple, familiar, reliable and fast! Come learn more about the vision we have put together and all the progress we have made so far!The talk will cover:* The qualities/goals we are aiming for in EWX* The high level plan to achieve this including: * Our product…
…
continue reading

1
Eventually Consistent Access Control: Practical Insights on Matrix from Decentralized Systems Theory (matrix-conf-2025)
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39Access control is the core of any system's security, but usually provided by a single, centralized server. However, access control in a Matrix room is decentralized: every participating server *independently* decides *who* is authorized to send and receive *which* events, without consulting any other server. To the surprise of many, these decisions…
…
continue reading
Presentation of the Luxembourg efforts to establish a sovereign instant messaging ecosystem for the public and private sector for Luxembourg. More details to follow.Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://cfp.2025.matrix.org/matrix-conf-2025/talk/GEEKMY/…
…
continue reading

1
Governing Board transparency update (matrix-conf-2025)
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27In this talk we will cover- what is the Governing Board about- how does it fit into the Foundation - reviewing the last 12 months and outputs- showing some of the different processes like establishing Working Groups, what Committees are, interactions with the Foundation- what next- how to get involved in open governance- take some questionsLicensed…
…
continue reading

1
The Element update: Shininess, scalability and sustainability (matrix-conf-2025)
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03A whistle stop tour of Element’s progress over the last year! Highlights include Element Server Suite Community, the latest on Element X, Spaces, Threads and Element Call. There’s also Element Server Suite Pro, Synapse Pro and the launch of Element Pro; the Element app specifically for the workplace!Licensed to the public under https://creativecomm…
…
continue reading
*Declassified Club exclusive: SUBSCRIBE to listen to the full series* Who really killed John F. Kennedy in Dallas on 22 November 1963? Did the CIA have a vendetta against the 35th President of the United States after their failure against Castro in Cuba? Or was Lee Harvey Oswald just a lone gunman with a need for "justice"? Listen as David and Go…
…
continue reading

1
Catherine the Great - An Empress's Legacy
18:45
18:45
Play later
Play later
Lists
Like
Liked
18:45By coachbp1975
…
continue reading
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces …
…
continue reading

1
The High Price of Open Source: Building a Business Around Matrix (matrix-conf-2025)
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16Open Source has never been easy, but doing Open Source in the Matrix ecosystem poses a unique set of challenges. Add the pressure of sustaining a company on top of that, and you quickly find yourself in uncharted, and often uncomfortable, territory. This talk reflects on the reality of maintaining open source projects in the Matrix universe, especi…
…
continue reading

1
E2EE Direct Messaging in Bluesky with Matrix (matrix-conf-2025)
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43See a demo of E2EE encrypted DMs in Bluesky powered by Matrix. We will highlight the simple user experience and other advantages of this approach to adding E2EE to Bluesky.By reusing Matrix for E2EE DMs in Bluesky, we not only offer a trusted and tested open source encryption stack but also allow users to later expand their usage beyond chat to oth…
…
continue reading