Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Vegas, Baby!

1:00:56
 
Share
 

Manage episode 497209078 series 2956114
Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

We’re throwing a party in Vegas! Someone called it SCWPodCon last year, and the name stuck. It’s sponsored by Teleport, the infrastructure identity company. Get SSO for SSH! If Thomas was here, I’m sure he’d tell you that Fly.io uses Teleport internally. Oh also there's some thing called Black..pill? Black Pool? Something like that happening in Vegas, with crypto talks, so we chatted about them a bit, plus some other stuff
SCWPodCon 2025: https://securitycryptographywhatever.com/events/blackhat

Transcript: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/

Links:
- Fault Injection attacks on PQCS signatures: https://www.blackhat.com/us-25/briefings/schedule/index.html#bypassing-pqc-signature-verification-with-fault-injection-dilithium-xmss-sphincs-46362
- Another attack on TETRA: https://www.blackhat.com/us-25/briefings/schedule/index.html#2-cops-2-broadcasting-tetra-end-to-end-under-scrutiny-46143
- Attacks on SCADA / ICS protocols (OPC UA): https://www.blackhat.com/us-25/briefings/schedule/index.html#no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-44760
- Attacks on Nostr: https://www.blackhat.com/us-25/briefings/schedule/index.html#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
- https://signal.org/blog/the-ecosystem-is-moving/
- https://en.wikipedia.org/wiki/Nostr
- https://eurosp2025.ieee-security.org/program.html
- https://cispa.de/en/research/publications/84648-attacking-and-fixing-the-android-protected-confirmation-protocol
- https://hal.science/hal-05038009v2/file/main.pdf
- 8-bit, abacus, and a dog: https://eprint.iacr.org/2025/1237.pdf
- https://www.youtube.com/watch?v=Dlsa9EBKDGI
- https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
- https://eprint.iacr.org/2025/118

"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

  continue reading

Chapters

1. Intro (00:00:00)

2. SCWPodCon (00:00:30)

3. Teleport (00:00:48)

4. SSH Certificates and X.509 (00:02:50)

5. Deirdre's Jerb (00:05:45)

6. Black Hat Crypto Highlights (00:06:33)

7. Hollywood Crypto Vulnerabilities (00:08:11)

8. Fault Injection Attacks on Post-Quantum Signatures (00:09:30)

9. Tetra Encryption Protocol (00:14:25)

10. Federated Protocols and Security (00:19:21)

11. Matrix Vulnerabilities (00:26:10)

12. Noster (00:26:38)

13. End-to-End Encryption Challenges (00:27:43)

14. Quantum Factoring with a Dog (00:31:07)

15. Quantum Computing Progress (00:33:11)

16. Fiat Shamir, Proving False Statements (00:49:13)

17. Come to our party (01:00:06)

56 episodes

Artwork

Vegas, Baby!

Security Cryptography Whatever

47 subscribers

published

iconShare
 
Manage episode 497209078 series 2956114
Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

We’re throwing a party in Vegas! Someone called it SCWPodCon last year, and the name stuck. It’s sponsored by Teleport, the infrastructure identity company. Get SSO for SSH! If Thomas was here, I’m sure he’d tell you that Fly.io uses Teleport internally. Oh also there's some thing called Black..pill? Black Pool? Something like that happening in Vegas, with crypto talks, so we chatted about them a bit, plus some other stuff
SCWPodCon 2025: https://securitycryptographywhatever.com/events/blackhat

Transcript: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/

Links:
- Fault Injection attacks on PQCS signatures: https://www.blackhat.com/us-25/briefings/schedule/index.html#bypassing-pqc-signature-verification-with-fault-injection-dilithium-xmss-sphincs-46362
- Another attack on TETRA: https://www.blackhat.com/us-25/briefings/schedule/index.html#2-cops-2-broadcasting-tetra-end-to-end-under-scrutiny-46143
- Attacks on SCADA / ICS protocols (OPC UA): https://www.blackhat.com/us-25/briefings/schedule/index.html#no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-44760
- Attacks on Nostr: https://www.blackhat.com/us-25/briefings/schedule/index.html#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
- https://signal.org/blog/the-ecosystem-is-moving/
- https://en.wikipedia.org/wiki/Nostr
- https://eurosp2025.ieee-security.org/program.html
- https://cispa.de/en/research/publications/84648-attacking-and-fixing-the-android-protected-confirmation-protocol
- https://hal.science/hal-05038009v2/file/main.pdf
- 8-bit, abacus, and a dog: https://eprint.iacr.org/2025/1237.pdf
- https://www.youtube.com/watch?v=Dlsa9EBKDGI
- https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
- https://eprint.iacr.org/2025/118

"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

  continue reading

Chapters

1. Intro (00:00:00)

2. SCWPodCon (00:00:30)

3. Teleport (00:00:48)

4. SSH Certificates and X.509 (00:02:50)

5. Deirdre's Jerb (00:05:45)

6. Black Hat Crypto Highlights (00:06:33)

7. Hollywood Crypto Vulnerabilities (00:08:11)

8. Fault Injection Attacks on Post-Quantum Signatures (00:09:30)

9. Tetra Encryption Protocol (00:14:25)

10. Federated Protocols and Security (00:19:21)

11. Matrix Vulnerabilities (00:26:10)

12. Noster (00:26:38)

13. End-to-End Encryption Challenges (00:27:43)

14. Quantum Factoring with a Dog (00:31:07)

15. Quantum Computing Progress (00:33:11)

16. Fiat Shamir, Proving False Statements (00:49:13)

17. Come to our party (01:00:06)

56 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play