Artwork

المحتوى المقدم من Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Vegas, Baby!

1:00:56
 
مشاركة
 

Manage episode 497209078 series 2956114
المحتوى المقدم من Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

We’re throwing a party in Vegas! Someone called it SCWPodCon last year, and the name stuck. It’s sponsored by Teleport, the infrastructure identity company. Get SSO for SSH! If Thomas was here, I’m sure he’d tell you that Fly.io uses Teleport internally. Oh also there's some thing called Black..pill? Black Pool? Something like that happening in Vegas, with crypto talks, so we chatted about them a bit, plus some other stuff
SCWPodCon 2025: https://securitycryptographywhatever.com/events/blackhat

Transcript: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/

Links:
- Fault Injection attacks on PQCS signatures: https://www.blackhat.com/us-25/briefings/schedule/index.html#bypassing-pqc-signature-verification-with-fault-injection-dilithium-xmss-sphincs-46362
- Another attack on TETRA: https://www.blackhat.com/us-25/briefings/schedule/index.html#2-cops-2-broadcasting-tetra-end-to-end-under-scrutiny-46143
- Attacks on SCADA / ICS protocols (OPC UA): https://www.blackhat.com/us-25/briefings/schedule/index.html#no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-44760
- Attacks on Nostr: https://www.blackhat.com/us-25/briefings/schedule/index.html#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
- https://signal.org/blog/the-ecosystem-is-moving/
- https://en.wikipedia.org/wiki/Nostr
- https://eurosp2025.ieee-security.org/program.html
- https://cispa.de/en/research/publications/84648-attacking-and-fixing-the-android-protected-confirmation-protocol
- https://hal.science/hal-05038009v2/file/main.pdf
- 8-bit, abacus, and a dog: https://eprint.iacr.org/2025/1237.pdf
- https://www.youtube.com/watch?v=Dlsa9EBKDGI
- https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
- https://eprint.iacr.org/2025/118

"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

  continue reading

فصول

1. Intro (00:00:00)

2. SCWPodCon (00:00:30)

3. Teleport (00:00:48)

4. SSH Certificates and X.509 (00:02:50)

5. Deirdre's Jerb (00:05:45)

6. Black Hat Crypto Highlights (00:06:33)

7. Hollywood Crypto Vulnerabilities (00:08:11)

8. Fault Injection Attacks on Post-Quantum Signatures (00:09:30)

9. Tetra Encryption Protocol (00:14:25)

10. Federated Protocols and Security (00:19:21)

11. Matrix Vulnerabilities (00:26:10)

12. Noster (00:26:38)

13. End-to-End Encryption Challenges (00:27:43)

14. Quantum Factoring with a Dog (00:31:07)

15. Quantum Computing Progress (00:33:11)

16. Fiat Shamir, Proving False Statements (00:49:13)

17. Come to our party (01:00:06)

58 حلقات

Artwork

Vegas, Baby!

Security Cryptography Whatever

43 subscribers

published

iconمشاركة
 
Manage episode 497209078 series 2956114
المحتوى المقدم من Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

We’re throwing a party in Vegas! Someone called it SCWPodCon last year, and the name stuck. It’s sponsored by Teleport, the infrastructure identity company. Get SSO for SSH! If Thomas was here, I’m sure he’d tell you that Fly.io uses Teleport internally. Oh also there's some thing called Black..pill? Black Pool? Something like that happening in Vegas, with crypto talks, so we chatted about them a bit, plus some other stuff
SCWPodCon 2025: https://securitycryptographywhatever.com/events/blackhat

Transcript: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/

Links:
- Fault Injection attacks on PQCS signatures: https://www.blackhat.com/us-25/briefings/schedule/index.html#bypassing-pqc-signature-verification-with-fault-injection-dilithium-xmss-sphincs-46362
- Another attack on TETRA: https://www.blackhat.com/us-25/briefings/schedule/index.html#2-cops-2-broadcasting-tetra-end-to-end-under-scrutiny-46143
- Attacks on SCADA / ICS protocols (OPC UA): https://www.blackhat.com/us-25/briefings/schedule/index.html#no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-44760
- Attacks on Nostr: https://www.blackhat.com/us-25/briefings/schedule/index.html#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
- https://signal.org/blog/the-ecosystem-is-moving/
- https://en.wikipedia.org/wiki/Nostr
- https://eurosp2025.ieee-security.org/program.html
- https://cispa.de/en/research/publications/84648-attacking-and-fixing-the-android-protected-confirmation-protocol
- https://hal.science/hal-05038009v2/file/main.pdf
- 8-bit, abacus, and a dog: https://eprint.iacr.org/2025/1237.pdf
- https://www.youtube.com/watch?v=Dlsa9EBKDGI
- https://www.quantamagazine.org/computer-scientists-figure-out-how-to-prove-lies-20250709/
- https://eprint.iacr.org/2025/118

"Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

  continue reading

فصول

1. Intro (00:00:00)

2. SCWPodCon (00:00:30)

3. Teleport (00:00:48)

4. SSH Certificates and X.509 (00:02:50)

5. Deirdre's Jerb (00:05:45)

6. Black Hat Crypto Highlights (00:06:33)

7. Hollywood Crypto Vulnerabilities (00:08:11)

8. Fault Injection Attacks on Post-Quantum Signatures (00:09:30)

9. Tetra Encryption Protocol (00:14:25)

10. Federated Protocols and Security (00:19:21)

11. Matrix Vulnerabilities (00:26:10)

12. Noster (00:26:38)

13. End-to-End Encryption Challenges (00:27:43)

14. Quantum Factoring with a Dog (00:31:07)

15. Quantum Computing Progress (00:33:11)

16. Fiat Shamir, Proving False Statements (00:49:13)

17. Come to our party (01:00:06)

58 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل