Billede af showet CypherTalk

CypherTalk

Podcast af Oak Security

engelsk

Videnskab & teknologi

Begrænset tilbud

2 måneder kun 19 kr.

Derefter 99 kr. / månedOpsig når som helst.

  • 20 lydbogstimer pr. måned
  • Podcasts kun på Podimo
  • Gratis podcasts
Kom i gang

Læs mere CypherTalk

CypherTalk is a twice-monthly podcast on the realities of cybersecurity and privacy in a world that’s moving faster than our defenses. Hosted by Jade Doherty (who translates technical security into plain English) alongside rotating security and privacy experts — including co-host Stefan Beyer, co-founder of Oak Security — the show explores how modern cybersecurity attacks actually happen: not just through bugs in code, but through people, processes, supply chains, and the tools we rely on every day. The show also looks at the latest trends in privacy and its supporting technologies, such as cryptography and zero-knowledge proofs.  Expect conversations that balance big-picture trends (AI-driven threats, privacy tech like zero-knowledge, shifting security standards) with practical takeaways you can apply immediately — whether you’re a developer, a founder, or simply someone who uses the internet. Less hype. More clarity. Better security and privacy habits.

Alle episoder

10 episoder

episode Bug Bounties with Joran Honig cover

Bug Bounties with Joran Honig

Summary In this in-depth interview, Joran Honig, a renowned bug bounty hunter and security researcher, shares insights into finding crazy bugs, the differences between audits and bug bounties, and the role of AI in security workflows. Discover practical tips, mental models, and future trends in Web3 security and bug hunting. Key topics Edge case bugs and how to find them Differences between audits, bug bounties, and contest models The role of AI and automation in security research Tools and workflows for effective bug hunting Responsible disclosure and handling uncooperative projects   Sound Bites "AI can increase duplicates." "Grimoire guides audit tasks." "Flows help map complex code."   Resources Joran Honig X https://x.com/joranhonig Grimoire https://github.com/JoranHonig/grimoire Joran’s website https://joranhonig.nl/

I går - 53 min
episode Censorship Resistance with Shayan Eskandari cover

Censorship Resistance with Shayan Eskandari

Summary In this in-depth interview, Shayan Eskandari shares his journey from security expert to privacy innovator, discussing censorship resistance, Web3 security, and the future of decentralized internet infrastructure. Discover how his project MoaV aims to empower users in restrictive environments and explore the role of blockchain in privacy and decentralization.   Soundbites "My belief in information being free drives everything." "My wife’s experience in Iran inspired Moav." "Privacy in blockchain is a complex, layered issue."   Resources The DAO Security Fund: https://qf.giveth.io/project/cyphertalk-podcast:-security-education-for-ethereum?roundId=16 [https://qf.giveth.io/project/cyphertalk-podcast:-security-education-for-ethereum?roundId=16] MoaV https://moav.sh/ [https://moav.sh/]  Shayan’s website https://shayan.es/ [https://shayan.es/] Shayan’s X https://x.com/sbetamc [https://x.com/sbetamc]

11. maj 2026 - 56 min
episode The State of Web3 Security with Diogo Patão from rekt.news cover

The State of Web3 Security with Diogo Patão from rekt.news

Summary This episode features a deep dive into two newly released reports on Web3 security by rekt.news and Oak Security, insights from industry experts, and discussions on the future of blockchain security. We explore recent hacks, the role of AI, and how the community can enhance security practices.   Soundbites "AI is here to help us, not just to attack." "Human attack vectors dominate the security issues." "Diversify your assets and protocols to stay safe."   Links The DAO Security Fund CypherTalk: https://qf.giveth.io/project/cyphertalk-podcast:-security-education-for-ethereum?roundId=16 [https://qf.giveth.io/project/cyphertalk-podcast:-security-education-for-ethereum?roundId=16] Rekt News: https://qf.giveth.io/project/rekt-news-ethereums-security-intelligence-layer?roundId=16 [https://qf.giveth.io/project/rekt-news-ethereums-security-intelligence-layer?roundId=16]   The Reports: Oak Security’s State of Web3 Security: https://research.oaksecurity.io/ [https://research.oaksecurity.io/]  Rekt News’ War Room Report: https://github.com/RektHQ/Reports/blob/main/Rekt_Security_Summit_War_Room_Report.pdf [https://github.com/RektHQ/Reports/blob/main/Rekt_Security_Summit_War_Room_Report.pdf]

6. maj 2026 - 1 h 3 min
episode Auditing Cryptographic Protocols with Nadim Kobeissi cover

Auditing Cryptographic Protocols with Nadim Kobeissi

Summary In this in-depth interview, Nadim Kobeissi shares his extensive experience in cryptography audits, the limitations of formal verification, responsible disclosure practices, and the future of cryptography and security, including post-quantum cryptography and AI's impact on cybersecurity.   Keywords cryptography, security audits, formal verification, post-quantum cryptography, zero-knowledge proofs, responsible disclosure, cryptographic protocols, AI cybersecurity, cryptography research, software security   Key Topics * Cryptography audit process and focus areas * Limitations of formal verification tools * Responsible disclosure methodology * Future threats in cryptography including AI and quantum computing * Educational tools for understanding cryptographic protocols   Sound Bites "Cryptography is about designing systems that are mathematically sound." "Claims of formal verification being bug-free are often exaggerated." "AI will be used to stockpile vulnerabilities and exploits."   Links Nadim’s website: https://nadim.computer/ [https://nadim.computer/] Nadim’s LinkedIn: https://www.linkedin.com/in/nadimkobeissi [https://www.linkedin.com/in/nadimkobeissi] https://symbolic.software/ [https://symbolic.software/] https://cure53.de/ [https://cure53.de/]

21. apr. 2026 - 53 min
episode Password Manager Security and Applied Cryptography with Matilda Backendal cover

Password Manager Security and Applied Cryptography with Matilda Backendal

Summary In this in-depth interview, cryptography researcher Matilda Backendal [https://www.linkedin.com/in/matilda-backendal/] discusses applied cryptography, end-to-end encryption vulnerabilities, password manager security flaws, and the future of cryptographic research. Gain insights into real-world security challenges and best practices for protecting digital data. Keywords cryptography, end-to-end encryption, cloud storage security, password managers, cryptographic research, privacy, zero-knowledge proofs, digital identity, homomorphic encryption Key topics Applied cryptography and real-world applications Vulnerabilities in end-to-end encryption systems Security flaws in cloud storage and password managers Cryptographic research and formal verification Future trends and challenges in cryptography    Sound bites "Crypto is all around us in daily life." "Most cloud storage isn't end-to-end encrypted by default." "User-chosen passwords are a major security factor." Links Matilda's Website - https://mbackendal.github.io/ [https://mbackendal.github.io/] Paper - Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers - https://eprint.iacr.org/2026/058 [https://eprint.iacr.org/2026/058]

7. apr. 2026 - 47 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Vælg dit abonnement

Mest populære

Begrænset tilbud

Premium

20 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

2 måneder kun 19 kr.
Derefter 99 kr. / måned

Kom i gang

Premium Plus

100 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

Prøv gratis i 7 dage
Derefter 129 kr. / måned

Prøv gratis

Kun på Podimo

Populære lydbøger

Kom i gang

2 måneder kun 19 kr. Derefter 99 kr. / måned. Opsig når som helst.