Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
1
"The Green Bottle" by Bernard Capes
37:18
37:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
37:18A journalist with an interest in crime and the supernatural is invited by a disliked former colleague to investigate a strange item that has come into the man’s possession.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE GREEN BOTTLE” by Bernard Capes, 1902.💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
"Mrs Lunt" by Hugh Walpole
46:15
46:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
46:15A shy novelist accepts an invitation to spend Christmas with another writer in a remote house in Penzance, Cornwall. He quickly regrets his decision… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MRS LUNT” by Hugh Walpole, 1926. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Supporting my work If you like, you candonate in the follo…
…
continue reading
1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
continue reading
1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
continue reading
1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading
1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading
1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading
1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading
1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading
1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading
1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading
1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
1
Episode 9 - From Stuxnet to ECC
27:41
27:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
27:41This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
1
Episode 8 - Code, Keys, and Chaos
36:22
36:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:22This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
1
Episode 7 - Unreliability is Insecurity
39:44
39:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:44This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
1
Episode 6 - Defensive Crypto Decoded
31:54
31:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:54This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
1
Episode 5 - The Designer's Mind
38:09
38:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
38:09This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading
1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading
1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading
1
Episode 2 - Cryptography's Engineering of Trust
45:03
45:03
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:03This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
…
continue reading
1
Episode 1 - The Protocol Paradox in Cryptography and System Security
34:54
34:54
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:54This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
…
continue reading
This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
…
continue reading
1
"The Misanthrope" & "The Little Town" by J. D. Beresford
45:49
45:49
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:49Two stories by J.D. Beresford. In “The Misanthrope” a man pays a visit to a hermit living on a Cornish island to find out what drove him there. In “The Little Town” a traveller finds himself in a mysterious place watching an even more mysterious performance.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. …
…
continue reading
1
"Young Magic" by Helen de Guerry Simpson
1:03:18
1:03:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:03:18Young Viola’s childhood is made less lonely by her mysterious companion “Binns” – but is he fairy, familiar or something more sinister? This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “YOUNG MAGIC by Helen de Guerry Simpson, 1925. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "YOUNG MAGIC” by Helen de Guerry Simpson. …
…
continue reading
1
"The Hill" by R. Ellis-Roberts
41:00
41:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
41:00Out walking in the countryside, a man spots something different about a hill in Symondsbury, Dorset. Intrigued, he finds himself inexorably drawn into the ancient battle between good and evil. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE HILL” by R. Ellis Roberts, 1923. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the s…
…
continue reading
1
"Don't Get Around Much Anymore" by Jasper L'Estrange
42:34
42:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:34An old man starts to fear for his safety when he suspects his live-in carer is not quite what he seems.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “DON’T GET AROUND MUCH ANYMORE” by Jasper L’Estrange.💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like, you can donate in the following ways:Patreon: https://ww…
…
continue reading
1
"An Evening's Entertainment" by M.R. James
32:11
32:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:11A grandmother warns her grandchildren not to pick blackcurrants where they grow in a particular spot in the village. When asked why, she relates to them a strange piece of local history. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “AN EVENING'S ENTERTAINMENT" by M.R. James, 1925. TECHNICAL NOTE: I'm h…
…
continue reading
Welcome to Privacy Reimagined, the official podcast of ZeroID — your front-row seat to the future of secure communication, encrypted connectivity, and total digital freedom. In a world where surveillance is the default and personal data is currency, ZeroID is building something radically different: an ecosystem of crypto-powered privacy tools that …
…
continue reading
1
"Casting the Runes" by M.R. James
58:44
58:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
58:44A sceptical researcher incurs the wrath of a sinister occultist and soon finds himself embroiled in strange, escalating events. As fear mounts and time runs short, he must uncover the truth behind the mysterious forces pursuing him. “CASTING THE RUNES” (1911) is a chilling tale of unseen menace and supernatural revenge.This original recording is an…
…
continue reading
1
"The Man with the Brown Beard" by Nathaniel P. Babcock
42:57
42:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:57In The Tombs prison, New York, preparing to be hanged for a crime he didn’t commit, Harry Jessup has a supernatural experience with far-reaching repercussions. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE MAN WITH THE BROWN BEARD” by Nathaniel P. Babcock (a.k.a. Nathaniel T. Babcock), 1896. 💀💀💀💀💀💀…
…
continue reading
1
"Beyondaril" by John Metcalfe
22:14
22:14
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:14A man is dogged by the vision of a seemingly innocuous rural scene that he becomes convinced is a harbinger of death. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “BEYONDARIL” by John Metcalfe (1971). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "’Beyondaril’”. First collected in “Dark Things” (ed. August Derleth,…
…
continue reading
1
"Carlton's Father" by Eric Ambrose
34:13
34:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:13When Esor McIre, in his duties as County Surveyor, is called upon to inspect the property of his old schoolfriend Carlton, it awakens an old curiosity about his friend's family. But what he finds there is strange beyond his imagination. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “CARLTON’S FATHER” by…
…
continue reading
1
"The Menhir" by N. Dennett
49:13
49:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
49:13The new curate in a remote village fails to heed the local superstitions surrounding a mysterious monolith (menhir) known as “The Grey Gammer”. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE MENHIR” by N. Dennett (1934). Compiled in “Panics: A Collection of Uneasy Tales” (ed. Unknown). Published by …
…
continue reading
1
Sarah's 35-Year Journey Shows How Mental Health Care Has Evolved
59:04
59:04
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
59:04Send us a text Sarah brings 35 years of clinical expertise to our conversation, revealing how relationship therapy has transformed from a one-dimensional approach to a comprehensive science-based system. As founder of Relate Center in Austin, Texas, she's pioneered an integrated method combining physical therapists, psychotherapists, and physicians…
…
continue reading
1
"The Lover of the Dead" | "The Witch Finder"
34:21
34:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:21Two stories about lonely travellers seeking shelter…who find more than they bargained for. In “The Lover of the Dead”, a stranded motorist uncovers a grisly secret, while “The Witch Finder” sees the titular character’s past catch up with him. These stories are from the grotesque imagination of Frederick Cowles and taken from his book “The Night Win…
…
continue reading
When two friends hiking in the Pennines become lost, they think their fortunes have changed when they find refuge in the old Roper house. But as the night draws in and the house begins to reveal its dark secrets, they discover all is not what it seems. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE …
…
continue reading
1
"Mr. Tilly's Séance" by E. F. Benson
42:31
42:31
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:31After being run over by a traction engine, Mr Tilly – now a spirit – elects to keep his appointment at a séance with the famed medium Mrs Cumberbatch. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MR. TILLY’S SEANCE” by E.F. Benson (1922). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "Mr Tilly’s Séance” by E. F. B…
…
continue reading
1
"The Underbody" by Alison V. Harding
52:40
52:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
52:40Nothing will ever be the same again for a country doctor when his son finds something deeply disturbing buried in the ground. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE UNDERBODY” by Alison V. Harding (1949). Sorry it's been a while. Spotify took down about 60 episodes over a spurious copyright …
…
continue reading
1
"The Firing Chamber" by John Metcalfe
32:06
32:06
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:06When a worker at the local potteries burns to death in a freak industrial accident, the Reverend Noah Scallard develops a morbid obsession with his parishioner’s unfortunate demise. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE FIRING-CHAMBER” by John Metcalfe (1962). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Sorry it's bee…
…
continue reading
1
From Ransomware to Recovery: How One Rural Hospital Transformed Its Cybersecurity
57:51
57:51
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
57:51Send us a text Nestled along the scenic Southern Oregon coast, Southern Coos Hospital faces a unique set of challenges that many healthcare organizations never encounter. With just 25 beds serving a rural population of about 15,000, this critical access hospital demonstrates remarkable innovation in stretching limited resources while maintaining ro…
…
continue reading
1
The Future of Medicine: How Robotic Surgery is Revolutionizing Healthcare with Dave Saunders
1:14:37
1:14:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:14:37Send us a text Surgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field. The stakes couldn't be high…
…
continue reading
1
"On the Embankment" by Hugh E. Wright
43:38
43:38
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
43:38What is the secret of the curiously empty seat on the Embankment between the Avenue and Westminster Bridge?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “ON THE EMBANKMENT” by Hugh E. Wright (1919).CREATOR’S NOTE: Due to some copyright confusion, Spotify have alerted me to the fact that 61 episodes of t…
…
continue reading
1
"The Devil Doll" by Frederick E. Smith
43:00
43:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
43:00Dark rumours surround a famous stage ventriloquist. Does his dummy contain the soul of his former partner?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE DEVIL DOLL” by Frederick E. Smith (1955).CREATOR’S NOTE: These recordings contain sound effects and music because that’s what I personally like to …
…
continue reading
1
"The Playfellow" by Lady Cynthia Asquith
1:07:39
1:07:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:07:39Having relocated their family to her husband’s ancestral home, Laura becomes concerned by their daughter’s increasingly naughty and wilful behaviour, and her husband’s darkening mood, leading her to believe Lichen Hall is not all it seems.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE PLAYFELLOW” by…
…
continue reading
1
"The Garden That Was Desolate" by Ulric Daubeny
28:02
28:02
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:02Walking in the Cotswolds, a man encounters a strange garden with unfinished walls and its even stranger owner. But what – or who – is this fortress designed to keep out?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE GARDEN THAT WAS DESOLATE” by Ulric Daubeny (1919).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workI…
…
continue reading
1
"More Than Shadow" by Dorothy Quick
34:19
34:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
34:19A family adopts a stray poodle who charms its way into their lives, but were the strange portents that heralded the little dog's arrival more than shadow…?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MORE THAN SHADOW” by Dorothy Quick (1954).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like, you can donate…
…
continue reading
1
"Fetch" by Rebecca Lloyd
50:56
50:56
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
50:56A recently married man becomes convinced that his wife is haunted by a disturbing doppelgänger – perhaps a “fetch” – that only he can see. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “FETCH” by Rebecca Lloyd (2016).For more information about the author and her work, please visit her website: https://w…
…
continue reading
1
"The Bus Driver's Fear of Change" by Jasper L'Estrange
35:30
35:30
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:30A bus driver recalls the highs and lows of his life in this dark and blackly comic monologue. This is a bit of an experiment for me, inspired by the popular character monologues written by Alan Bennett that were broadcast on British television in the 1990s. If people like it, I may make it the start of an occasional series called "Talking Dead".“TH…
…
continue reading
1
"Dracula's Guest" by Bram Stoker
37:05
37:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
37:05Visiting Munich on his way to Transylvania, an Englishman ignores the warnings of the hotelier and coach driver in order to explore an abandoned village on the pagan festival of Walpurgis Night.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “DRACULA’S GUEST” by Bram Stoker (1897).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀CREATOR’S…
…
continue reading