Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
Tim Callan Podcasts
This podcast was created with the belief that the world is still a wonderful place full of good people. Each episode will feature a bit of evidence that things aren't as bleak as they might seem. There are people learning, overcoming, and achieving amazing things every day. And rather than denying that real-life problems exist, this program seeks to help you recharge your batteries so that you can "rally" and get back to fighting your own good fight, whatever that may be.
…
continue reading
This series was inspired by seeing firsthand the need for sales knowledge in the startup community – brilliant minds who could create anything but did not know how to find clients or sell their services. The goal of this event and these videos is for listeners to authentically receive process design, tools used, and tips on what works to successfully grow revenue and therefore, grow businesses. This series is for entrepreneurs, small businesses, intraprenuers, solopreneurs, nerds, creators, ...
…
continue reading
1
Root Causes 548: AI 1000 Days from Now - Emotional Intelligence
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 547: Should We Do Mass Revocation Fire Drills?
12:32
12:32
Play later
Play later
Lists
Like
Liked
12:32In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 546: New Research Codifies Arguments for and Against QWACs
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at https://orbilu.uni.lu/handle/10993/66334.By Tim Callan and Jason Soroko
…
continue reading
The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.By Tim Callan and Jason Soroko
…
continue reading
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.By Tim Callan and Jason Soroko
…
continue reading
Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs. Jason explains this attack and its implications.By Tim Callan and Jason Soroko
…
continue reading
In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 541: Introducing the HQC PQC Algorithm
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. We explain this code-based algorithm.By Tim Callan and Jason Soroko
…
continue reading
We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 539: What Is the Two-QWAC Architecture?
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The "two-QWAC architecture" introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain. We explain what's coming and why.…
…
continue reading
An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 537: The Thermodynamics of Privacy
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 536: Patent Blocker on ML-KEM
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations. We explain.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 535: The CPS Is a Superset of Actual Practices
10:22
10:22
Play later
Play later
Lists
Like
Liked
10:22The CPS must always be a superset of actual practices in a properly running CA. We explain why this is a product of good design.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 534: Signing the Machines That Think
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime. How do you know? Jason proposes that, the same way we sign our code, we should be signing our AI models as well.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 533: Flexibility Through Multi-CA Trust Models
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25By Tim Callan and Jason Soroko
…
continue reading
In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 531: Benefits of Single-purpose Root Hierarchies
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones. We discuss why.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 530: Introducing the AI Iceberg
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 529: What Is a Common Mark Certificate?
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 528: Misissued SSL Certificate for 1.1.1.1
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses. We go into the details.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 527: Key Dates for the Deprecation of Public mTLS
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25Client authentication using public TLS server certificates is on the deprecation path. In this episode we go through the key dates in this deprecation.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 526: Voice Biometrics Are Worthless
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 525: The End of Email-based DCV
10:03
10:03
Play later
Play later
Lists
Like
Liked
10:03A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years. We go into the details.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 524: How to Kill Three Birds with One Stone
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates. These are 47-day SSL, PQC, and the deprecation of mTLS. We describe the overlap between these efforts and how to combine them for better efficiency and project management.…
…
continue reading
1
Root Causes 523: Will Your Configuration Block MPIC DCV?
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 522: How Prepared Are Enterprises for PQC? (Part 2)
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28We complete our description and commentary on the results of Sectigo's survey of enterprise preparedness for Post Quantum Cryptography (PQC).By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 521: How Prepared Are Enterprises for PQC? (Part 1)
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22We begin to go over the results of Sectigo's recent survey of enterprises and their preparedness and plans for adopting Post Quantum Cryptography (PQC).By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 520: How Prepared Are IT Teams for 47-day Certificates?
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05Sectigo has released the results of its survey of IT professionals in charge of certificates to measure their readiness and preparation for 47-day maximum certificate term. We go over the results.By Tim Callan and Jason Soroko
…
continue reading
AI is not the elephant in the room. It is the room itself. Jason explains what he means by that.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 518: NCSC Lukewarm on FIDO WebAuthn
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31Britain's National Cyber Security Centre recently issued a lukewarm verdict on passkeys as an authentication solution. We explore the problems with WebAuthn, including account recovery, spotty availability, inconsistent implementation, and lack of Linux support.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 517: The Cost of Quantum Factoring
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20Jason walks us through an important recent paper from Google tracking the cost of quantum factoring.By Tim Callan and Jason Soroko
…
continue reading
Microsoft has finally announced that it will offer an update to Active Directory Certificate Services (ADCS, formerly MSCA) to support post quantum cryptography. We discuss Microsoft's checkered support for ADCS and offer some questions users should be asking.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 515: What Is Entropy-aware Governance?
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Jason coins the term "entropy-aware governance" to describe the idea of using the degree of entropy it contains to measure the strength of any given secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 514: Diary of an Online Firestorm
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread. We discuss what a more functional response would have looked like.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 513: Is Revocation the Best Remedy for CPS Misalignment?
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 512: CPS Versus Practices Misalignment
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.By Tim Callan and Jason Soroko
…
continue reading
We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason's adventure in creating his own custom root store.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 510: Introducing the GoML Browser
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18We discuss Jason's code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discuss SSL certificate information, EV indicators, and cookie handling.By Tim Callan and Jason Soroko
…
continue reading
We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.By Tim Callan and Jason Soroko
…
continue reading
"Code vibing" is using generative AI to create or improve working code. We share Jason's adventure using code vibing to create his own web browser.By Tim Callan and Jason Soroko
…
continue reading
The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 506: Recap of CABF Face-to-face #65
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting. We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.By Tim Callan and Jason Soroko
…
continue reading
In this episode we explain the potential for future quantum computers to break files signed today with RSA or ECC, called "Trust now, forge later."By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 504: Jason Programs a Quantum Computer
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48Jason describes his recent experience using Amazon Braket.By Tim Callan and Jason Soroko
…
continue reading
In this episode Jason explains the fallacy of "playing chicken" with the Quantum Apocalypse. We discuss stack ranking and "eyes open" PQC risk decisions.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 501: Why Increasing RSA Key Size Won't Solve the Quantum Problem
3:35
3:35
Play later
Play later
Lists
Like
Liked
3:35In this brief episode we explain why the problem that Shor's Algorithm poses to RSA and ECC can't be solved simply by increasing key size.By Tim Callan and Jason Soroko
…
continue reading
1
Root Causes 500: OMG! 500 Episodes of Root Causes!
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46Wow. It's episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it remains consistent, and the updates we're making to keep being a valuable resource for our listeners.By Tim Callan and Jason Soroko
…
continue reading
The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.By Tim Callan and Jason Soroko
…
continue reading
The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.By Tim Callan and Jason Soroko
…
continue reading