Tuesday, 2024-11-19.
00:16:24.
Clean.
privacy, security, hiding.
Sgoti argues privacy is not hiding
Friday, 2024-07-12.
00:18:02.
Clean.
Passkeys, encryption, passwords, security.
We take a look at passkeys and ask if this is what you should be using
Monday, 2024-03-25.
00:12:06.
Clean.
Oh No News, Threat analysis, QNAP.
Sgoti gives us some moral panic ridden pearl clutching nonsense.
Thursday, 2024-03-07.
00:12:02.
Clean.
Bitwarden, Passwords, News.
Sgoti talks about passwords and Bitwarden.
Thursday, 2024-01-04.
00:19:53.
Clean.
grapheneOS, Google, data privacy, security.
How and why I live with a de-Googled phone
Thursday, 2023-12-21.
00:10:06.
Clean.
quantum computing, post-quantum computing, post-quantum cryptography, cryptography.
An NIST guide is published aimed at IT and Security professionals
Tuesday, 2023-11-28.
00:14:35.
Clean.
Oh No News, Threat analysis, InfoSec, Google Dynamic Search Ads.
Sgoti talks about Malware distributed via Google's Dynamic Ads and more.
Thursday, 2023-11-16.
00:09:13.
Clean.
LastPass, password vault.
LastPass was hacked, what should you do?
Tuesday, 2023-10-03.
00:36:41.
Clean.
User space, investment scams, recovery scams.
Sgoti talks about investment and recovery scams.
Wednesday, 2023-08-02.
00:05:16.
Explicit.
bio, backgrown, questions, mm, Machinist's mate.
Lurking Prion answers questions about his name, former career field as an MM
Monday, 2023-07-24.
00:29:01.
Clean.
Oh No News, InfoSec, browser security, session tokens, session id.
Sgoti discusses the threat of convenience.
Wednesday, 2023-07-12.
00:24:45.
Clean.
User space, Cybercrime, fraud, scams.
Sgoti talks about internet scams.
Wednesday, 2023-05-17.
00:14:33.
Clean.
Ubiquiti dev, Toyota, Sextortion, Twitter, Discord.
Sgoti talks about Toyota's data leak and more, on the Oh No! News.
Friday, 2023-02-24.
00:15:28.
Clean.
NIST, Encryption, quantum computing.
An update on the preparations for quantum computing
Thursday, 2023-02-02.
00:18:27.
Clean.
2FA, OTP, TOTP, HOTP, security.
Diving into privacy-aware and offline methods to generate one time passwords
Monday, 2022-11-14.
00:04:11.
Explicit.
cybersecurity, security, EvilSteve, breach, data reduction, privacy.
A short episode about the reaching effects of breaches and forgotten accounts
Monday, 2022-10-17.
00:50:54.
Explicit.
cybersecurity, security, EvilSteve, socialmedia, technology, philosophy, future.
A philosophical look at the future of technology.
Tuesday, 2022-10-04.
01:11:37.
Explicit.
cybersecurity, security, EvilSteve, misinformation, disinformation, fakenews.
Brady and I discuss Mis-information, Dis-information, and Fake News.
Tuesday, 2022-09-27.
00:30:40.
Explicit.
cybersecurity, security, EvilSteve, hacking, hacker.
I discuss the issue of what makes a real hacker with my my son
Wednesday, 2022-09-21.
00:30:20.
Explicit.
cybersecurity, security, EvilSteve, socialmedia, education, certifications.
I discuss the value of an Education, certifications, and a positive Social Media presence.
Wednesday, 2022-09-07.
00:15:07.
Explicit.
cybersecurity, security, EvilSteve, users, stupid human tricks, customer service.
Brady & I discuss stupid things done by those of us who really should know better.
Monday, 2022-08-22.
00:16:37.
Explicit.
cybersecurity, security, EvilSteve, malware, career.
I talk about getting into or advancing in cybersecurity & how keyboards could trick malware.
Monday, 2022-07-11.
00:39:09.
Explicit.
cybersecurity, security, EvilSteve, breach, data reduction, privacy.
I have a discussion about data reduction with special guest and author, R. Brady Frost
Tuesday, 2022-06-28.
00:16:22.
Explicit.
passwords, password managers, Hardware Security.
I talk about my new Hardware password manager
Monday, 2022-06-27.
00:18:20.
Explicit.
cybersecurity, security, 2FA, EvilSteve, password manager, password, breach.
Making ourselves a less attractive target by utilizing a password manager.
Wednesday, 2022-06-22.
00:41:27.
Explicit.
cybersecurity, security, EvilSteve, breach, data reduction, privacy.
I have a discussion about Internet security with R. Brady Frost along with our sons
Tuesday, 2022-06-14.
00:14:34.
Explicit.
adminadmin, Lurking Prion, cybersecurity, security, threats, 2FA, Evil Steve, two factor.
Making ourselves a less attractive target by implementing 2FA.
Tuesday, 2022-06-07.
00:15:59.
Explicit.
adminadmin, cybersecurity, security, threats, threat actors, Evil Steve.
We take a closer look at the types of Evil Steve's attacking us
Wednesday, 2022-05-25.
00:14:12.
Explicit.
adminadmin, cyber security, security, threats, threat actors, Evil Steve.
Security as a people problem: Who is actually attacking us? Meet Evil Steve.
Tuesday, 2022-05-17.
00:09:30.
Explicit.
adminadmin, Lurking Prion, 2022, cybersecurity, infosec.
Tracing my security woes to the source using "Good Idea Fairy Hunting"
Friday, 2022-05-13.
00:10:41.
Clean.
password, cybersecurity, password1234.
Pilot episode. Change your password
Tuesday, 2022-03-08.
00:13:31.
Clean.
Password Managers, Online Security, Bitwarden, KeePassXC.
How I manage password security.
Wednesday, 2021-10-06.
00:09:11.
Clean.
searx, whoogle, metager, gigablast, private.sh, ecosia, startpage, qwant, brave, duckduckgo.
Google search is monopolistic here are some alternatives
Friday, 2021-06-18.
00:11:05.
Clean.
Android, malware.
A look at some security issues in Android
Friday, 2021-05-21.
00:10:03.
Clean.
Facebook, scams.
People commonly say that their own, or someone else's, Facebook has been hacked.
Thursday, 2021-05-13.
00:08:40.
Clean.
infosec, podcasts, security.
Presenting my favorite general information security podcasts
Thursday, 2021-04-29.
00:07:18.
Clean.
infosec, podcasts, security.
Presenting my favorite information security news and current events podcasts
Friday, 2021-01-01.
00:16:18.
Clean.
Linux, malware, ssh.
A look at how malware is now targeting Linux, especially servers
Tuesday, 2020-12-22.
00:21:19.
Clean.
cloud, nextcloud, owncloud, server.
Nextcloud is easy. You should try it.
Monday, 2020-12-21.
00:02:00.
Clean.
security, usb.
Turn a Thumb drive into a Key to lock/unlock your linux machine.
Wednesday, 2020-10-14.
00:04:37.
Clean.
pentesting, security, hacking, zip.
Zipfiles can contain all kinds of evilness and unpacking them can lead to unexpected results
Wednesday, 2020-09-09.
00:20:01.
Clean.
pentesting, security, hacking, biometrics.
A story about pentesting physical security
Friday, 2020-09-04.
00:11:20.
Clean.
LastPass, passwords, security, monitoring.
A recent update to LastPass added a Security Dashboard
Tuesday, 2020-08-25.
00:13:45.
Clean.
security, encryption, quantum computing.
NIST has concluded Round Two of the quantum encryption search and moved to Round Three
Thursday, 2020-08-20.
00:12:06.
Clean.
pentesting, security, hacking.
How an insecure object reference lead to a covid-related databreach
Monday, 2020-01-13.
00:23:10.
Explicit.
fob, 2fa, onlykey, security, computers.
Onlykey more like you better have two keys!
Friday, 2020-01-10.
00:17:26.
Clean.
Firefox, Sync, Container.
Some recent updates to Firefox that add useful features
Friday, 2019-11-22.
00:14:21.
Clean.
IT Management, Security.
Looking at an object lesson for proper IT management processes and the cost of failure
Friday, 2019-07-19.
00:12:37.
Clean.
Encryption, Quantum Computing.
How will quantum computing affect the security of encryption?
Friday, 2019-07-05.
00:28:22.
Clean.
Enterprise, Security.
What NIST suggests as a framework to improve security at the Enterprise level
Friday, 2019-05-24.
00:22:17.
Clean.
Home Networks, Security.
What CERT recommends to mitigate security and privacy threats to your home network.
Monday, 2019-04-15.
00:25:23.
Clean.
encryption.
Klaatu demonstrates how to use LVM and cryptsetup to create and use portable encrypted filesystems
Thursday, 2019-02-21.
00:07:40.
Explicit.
craigslist, scam, con, social engineering, puppy, dog, money, moneygram, infosec, cyber-security 101.
Helped a client avoid being scammed on Craigslist and wanted to share some tips to HPR.
Tuesday, 2019-01-15.
00:07:47.
Clean.
Information Security for Everyone.
How to do passwords better.
Wednesday, 2018-12-19.
00:22:31.
Clean.
pdf, ebook, bloat, print.
Klaatu talks about manipulating PDFs with gs and pdf-stapler
Thursday, 2018-12-13.
00:39:40.
Clean.
design, steganography, scribus, layout.
Klaatu provides an overview of Scribus in part 1 of a mini-series about steganography
Friday, 2018-05-25.
00:18:37.
Clean.
GDPR, General Data Protection Regulation.
The GDPR becomes enforceable today and Ken gives an overview on what it is and how it effects you.
Monday, 2018-05-21.
00:42:29.
Clean.
trust, social engineering, gpg, pgp, community.
Quasi-philosophical musing about how trust is built both online and in real life
Friday, 2018-04-27.
00:18:42.
Clean.
Ephemeral Diffie-Hellman, Encryption, TLS.
TLS 1.3 is the newest protocol standard for secure communications on the Web.
Friday, 2018-03-30.
00:17:41.
Explicit.
Diffie-Hellman, Encryption, Forward Secrecy.
Using Diffie-Hellman Key Exchange to implement Forward Secrecy
Friday, 2018-03-16.
00:20:31.
Clean.
Diffie-Hellman, Encryption.
A basic explanation of how Diffie-Hellman-Merkle Key Exchange works
Friday, 2016-08-26.
00:36:29.
Clean.
SSL, Certificates, encryption.
A discussion of the problems with SSL certificates, and some solutions
Friday, 2016-08-12.
00:41:02.
Clean.
SSL, Certificates, encryption.
A discussion of how SSL certificates work
Friday, 2016-01-08.
00:57:26.
Clean.
LastPass, passwords, password vaults.
An expanded discussion of the LastPass intrusion as delivered at our LUG.
Thursday, 2015-12-17.
00:22:46.
Clean.
ssh, port forwarding, router.
In HPR 1900, Ahuka suggests changing the default ssh port, I ask why not employ port forwarding?
Friday, 2015-12-11.
00:18:39.
Clean.
ssh, client, encryption, keys.
We introduce the idea of using public/private key pairs for authentication
Friday, 2015-11-13.
00:16:49.
Clean.
ssh, client, basics.
In this we tutorial explore the basics of making an ssh connection.
Wednesday, 2015-11-04.
00:03:45.
Clean.
Lastpass, keepass, password management.
How I do password management among my devices.
Wednesday, 2015-10-28.
00:12:38.
Explicit.
security, gpg.
Demonstration of using the diceware method of passphrase generation
Friday, 2015-10-02.
00:18:35.
Clean.
ssh, Telnet, server.
To learn ssh it helps to experiment, so this explains setting up a simple home server.
Friday, 2015-09-04.
00:17:02.
Clean.
ssh, Telnet, shell, security.
ssh is the secure way of connecting to a remote computer. This is an introduction to a mini-series.
Thursday, 2015-08-13.
00:08:20.
Clean.
Privacy, security, passwords.
How to hide a password using a password card
Friday, 2015-07-10.
00:23:00.
Clean.
LastPass, password vault.
LastPass was hacked, but how bad is it?
Friday, 2015-05-29.
00:15:11.
Clean.
TrueCrypt, GnuPG, support.
GnuPG and TrueCrypt updated, and how we support free software.
Wednesday, 2015-03-18.
00:20:04.
Explicit.
browser extensions, firefox, noscript, https everywhere, adblock edge, librejs.
Fin talks about his favourite browser extensions.
Friday, 2015-03-06.
00:18:11.
Clean.
TLS, SSL, Certificates.
A look at the problems that SSL certificates can have, and offers some solutions
Friday, 2014-12-26.
00:17:40.
Clean.
TLS, SSL, Certificates.
This episode looks at secure connections between users and Web sites.
Friday, 2014-11-14.
00:20:31.
Clean.
symmetric, asymmetric, encryption.
This episode looks the two kinds of encryption keys, and why to use each one.
Friday, 2014-10-17.
00:21:33.
Clean.
passwords, entropy.
This episode explores the best password practices from a mathematical viewpoint with recommendations
Wednesday, 2014-09-17.
00:26:28.
Clean.
hashing, passwords.
Understanding password security begins with understanding hashing.
Monday, 2014-08-25.
00:28:18.
Clean.
Security and Privacy series, cost/benefit.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
Tuesday, 2014-07-22.
00:31:05.
Clean.
Security and Privacy series, cost/benefit.
This episode looks at a sensible model of obtaining the right amount of security for your needs.
Thursday, 2014-06-12.
00:18:37.
Clean.
security, Open Source.
What is needed to have security in Open Source projects.
Thursday, 2014-06-05.
01:29:39.
Clean.
GPG, email, Thunderbird, Enigmail, encrypt, sign.
Using GPG to encrypt or sign e-mail
Friday, 2014-05-02.
00:28:53.
Clean.
public key encryption, GPG, keyring, key signing, Mailvelope.
Ahuka and Tony Bemus discuss key signing and how you build a web of trust.
Wednesday, 2014-04-30.
00:38:15.
Explicit.
OpenVPN, Centos6, Debian.
John Duarte talks about setting up OpenVPN
Monday, 2014-04-21.
00:21:37.
Clean.
heartbleed, openssl, vulnerability, security.
A summary of the "Heartbleed" OpenSSL vulnerability
Monday, 2014-04-07.
00:16:27.
Clean.
encryption, email.
This looks at how you can use encryption to sign email and to privately secure it in Gmail.
Monday, 2014-03-24.
00:05:00.
Clean.
openssl, BlowFish, encryption.
@sigflup tells us how to Encrypt Your Stuff With Blowfish with openssl on the command line
Tuesday, 2014-03-11.
00:23:41.
Clean.
encryption, email.
Ahuka discusses using Thunderbird and Enigmail to send and receive encrypted email
Monday, 2014-03-10.
00:24:17.
Explicit.
Security, Privacy, PGP, key, key signing.
I wanted to get my GPG key signed so I joined the FOSDEM 2014 keysigning event
Thursday, 2014-03-06.
00:18:58.
Explicit.
pager, privacy.
deepgeek advocates the use of a pager for privacy reasons
Friday, 2013-12-27.
00:30:55.
Clean.
security, GPG, key, kgpg, seahorse.
How to generate keys on the command line in Linux using GPG
Friday, 2013-11-29.
00:22:18.
Clean.
encryption, cryptography, asymmetric public key cryptography, RSA.
The fundamentals of encryption and asymmetric public key cryptography
Wednesday, 2013-11-06.
00:22:23.
Clean.
privacy, security.
The need for privacy and the practicality of achieving it
Friday, 2008-06-27.
00:08:18.
Explicit.
privacy, quotes, philosophy, definition.
Talking about different ways to define privacy.
Thursday, 2008-06-19.
00:19:07.
Explicit.
privacy, terrorists, paper, internet, national security, theory.
This covers the paper around internet privacy. If we don't have anything to hide, why secure it?