iVoox Podcast & radio
Descargar app gratis

Podcast
Cybersecurity explained to my grandma 1w392r
Por Nicolas REMARCK
7
0
The podcast for those who don't understand anything about it. (Translated from the French prodcast "La cybersecuritée expliquée à ma grand-mère" using AI) Hosted by Ausha. See ausha.co/privacy-policy for more information. 5z2vz
The podcast for those who don't understand anything about it.
(Translated from the French prodcast "La cybersecuritée expliquée à ma grand-mère" using AI)
Hosted by Ausha. See ausha.co/privacy-policy for more information.
#4 : This enemy who wants to do you good
Episodio en Cybersecurity explained to my grandma
This episode delves into the invisible but crucial world of digital authentication, starting with the everyday frustration of managing s. It explains that s exist to prove our identity, yet they are often weak, reused, or easy to guess, making them vulnerable to attacks. The episode uses the example of airport customs to illustrate how identity is verified through documents and biometrics, and draws parallels with digital methods. It highlights the risks of relying solely on s, even when hashed, as they can still be cracked through sophisticated techniques like brute force or rainbow tables. Physical keys and biometric data offer additional layers of security but are not immune to cloning or manipulation. The message is clear: no single method is enough to guarantee safety, and combining strong, varied methods is essential to protect our digital identities, which have very real implications in our lives. Hosted by Ausha. See ausha.co/privacy-policy for more information.
27:35
#3 : Encrypting is not encoding
Episodio en Cybersecurity explained to my grandma
This episode will explain you the major topics about cryptography : Hiding ≠ Protecting Steganography conceals a message’s existence (wax tablets, watermarked films). Coding just changes symbols (Morse, CD error-correction). Cryptography actually locks the content. Early & Perfect Ciphers Caesar shift is weak; a one-time pad is unbreakable but impractical because the key must match the message length. Kerckhoffs’ rule: everything about a system can be public—only the key must stay secret. Enigma showed strong design (159 quadrillion settings) yet fell to Turing owing to predictable message parts. Modern crypto Symmetric keys are fast but need a safe key swap. RSA (public/private keys) solves that, enabling HTTPS, digital signatures, and secure web traffic. Hashes act as digital fingerprints; g = encrypting a hash with the private key. Future challenges 2048-bit RSA is safe now, but quantum computers could break it. Post-quantum and homomorphic encryption aim to keep data secure—even while processed in the cloud. Bottom line: robust math plus open scrutiny—not secrecy—keeps our digital world safe, but we must adapt as computing power grows. Hosted by Ausha. See ausha.co/privacy-policy for more information.
28:41
#3 : Encrypting is not encoding
Episodio en Cybersecurity explained to my grandma
This episode will explain you the major topics about cryptography : Hiding ≠ Protecting Steganography conceals a message’s existence (wax tablets, watermarked films). Coding just changes symbols (Morse, CD error-correction). Cryptography actually locks the content. Early & Perfect Ciphers Caesar shift is weak; a one-time pad is unbreakable but impractical because the key must match the message length. Kerckhoffs’ rule: everything about a system can be public—only the key must stay secret. Enigma showed strong design (159 quadrillion settings) yet fell to Turing owing to predictable message parts. Modern crypto Symmetric keys are fast but need a safe key swap. RSA (public/private keys) solves that, enabling HTTPS, digital signatures, and secure web traffic. Hashes act as digital fingerprints; g = encrypting a hash with the private key. Future challenges 2048-bit RSA is safe now, but quantum computers could break it. Post-quantum and homomorphic encryption aim to keep data secure—even while processed in the cloud. Bottom line: robust math plus open scrutiny—not secrecy—keeps our digital world safe, but we must adapt as computing power grows. Hosted by Ausha. See ausha.co/privacy-policy for more information.
28:41
#2 : Why is so mean ?
Episodio en Cybersecurity explained to my grandma
The history of hackers from the dawn of humanity to the present day. Hackers ≠ villains “Hacker” simply means someone who pushes a system beyond its intended use; ethics split them into white hats(defenders) and black hats (attackers). Flaws are human, not machine Bugs stem from programming mistakes; early example: 1950s “bugs” were literal moths in tube computers. Hackers exploit such flaws just as lock-pickers exploit bad locks. First big hack (1834) The Blanc brothers bribed operators on ’s optical-telegraph network to slip stock tips through the error-correction mechanism, beating the market by days. Phone-phreak era (1950s-1970s) Captain Crunch’s 2600 Hz whistle fooled switches into granting free calls; Jobs & Wozniak sold “blue boxes” doing the same. Internet dawn & celebrity hackers Kevin Poulsen rerouted radio contests; Robert Morris’s worm crashed 10 % of the fledgling Internet; Kevin Mitnick mixed technical hacks with social engineering, landing on the FBI’s “Most Wanted.” Hacker collectivism Cypherpunks (1992): privacy, decentralization, crypto manifesto (free access, distrust authority). Anonymous: leaderless “digital flock” coordinating online protests. Chaos Computer Club (Berlin): white-hat research and public audits (e.g., ’s COVID app). Four modern tribes White hats / researchers – find and disclose bugs, defend privacy. Criminal crews – profit-driven ransomware, card theft, etc. Mercenaries – vendors of spyware like Pegasus, sold to states. Nation-states – build cyber-armies; Stuxnet showed state-grade sabotage. Why the bad reputation? Cyber-crime now out-earns all other transnational crime combined; 83 % of SMEs still lack basic defenses. As stakes rise—from personal data to national security—every hacker action feels existential. Bottom line: Hackers can be guardians or predators; their tools are neutral, but in a hyper-connected world the consequences—and the fear—have never been bigger. Hosted by Ausha. See ausha.co/privacy-policy for more information.
31:51
#2 : Why is so mean ?
Episodio en Cybersecurity explained to my grandma
The history of hackers from the dawn of humanity to the present day. Hackers ≠ villains “Hacker” simply means someone who pushes a system beyond its intended use; ethics split them into white hats(defenders) and black hats (attackers). Flaws are human, not machine Bugs stem from programming mistakes; early example: 1950s “bugs” were literal moths in tube computers. Hackers exploit such flaws just as lock-pickers exploit bad locks. First big hack (1834) The Blanc brothers bribed operators on ’s optical-telegraph network to slip stock tips through the error-correction mechanism, beating the market by days. Phone-phreak era (1950s-1970s) Captain Crunch’s 2600 Hz whistle fooled switches into granting free calls; Jobs & Wozniak sold “blue boxes” doing the same. Internet dawn & celebrity hackers Kevin Poulsen rerouted radio contests; Robert Morris’s worm crashed 10 % of the fledgling Internet; Kevin Mitnick mixed technical hacks with social engineering, landing on the FBI’s “Most Wanted.” Hacker collectivism Cypherpunks (1992): privacy, decentralization, crypto manifesto (free access, distrust authority). Anonymous: leaderless “digital flock” coordinating online protests. Chaos Computer Club (Berlin): white-hat research and public audits (e.g., ’s COVID app). Four modern tribes White hats / researchers – find and disclose bugs, defend privacy. Criminal crews – profit-driven ransomware, card theft, etc. Mercenaries – vendors of spyware like Pegasus, sold to states. Nation-states – build cyber-armies; Stuxnet showed state-grade sabotage. Why the bad reputation? Cyber-crime now out-earns all other transnational crime combined; 83 % of SMEs still lack basic defenses. As stakes rise—from personal data to national security—every hacker action feels existential. Bottom line: Hackers can be guardians or predators; their tools are neutral, but in a hyper-connected world the consequences—and the fear—have never been bigger. Hosted by Ausha. See ausha.co/privacy-policy for more information.
31:51
#1 : Introduction
Episodio en Cybersecurity explained to my grandma
First episode to introduce the aim of this podcast. Hosted by Ausha. See ausha.co/privacy-policy for more information.
16:37
#1 : Introduction
Episodio en Cybersecurity explained to my grandma
First episode to introduce the aim of this podcast. Hosted by Ausha. See ausha.co/privacy-policy for more information.
16:37
También te puede gustar Ver más
Lunaticoin Entusiasta Bitcoin | Conecto con personas de habla hispana con perfil propio dentro del mundo #bitcoin y comparto su valor | Colaborador en @EstudioBitcoin Actualizado
Applelianos Podcast de tecnología, principalmente de noticias sobre el mundo de Apple, con un grupo de compañeros expertos en los temas expuestos, descubre la información adecuada con nosotros. Actualizado
monos estocásticos monos estocásticos es un podcast sobre inteligencia artificial presentado por Antonio Ortiz (@antonello) y Matías S. Zavia (@matiass). Sacamos un episodio nuevo cada jueves. Puedes seguirnos en YouTube, LinkedIn y X. Más enlaces en cuonda.com/monos-estocasticos/links Hacemos todo lo que los monos estocásticos saben hacer: coser secuencias de formas lingüísticas que hemos observado en nuestros vastos datos de entrenamiento según la información probabilística de cómo se combinan. Actualizado