Encrypted nyilvános
[search 0]
Több
Download the App!
show episodes
 
Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Loading …
show series
 
A journalist with an interest in crime and the supernatural is invited by a disliked former colleague to investigate a strange item that has come into the man’s possession.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE GREEN BOTTLE” by Bernard Capes, 1902.💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like…
  continue reading
 
This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
  continue reading
 
A shy novelist accepts an invitation to spend Christmas with another writer in a remote house in Penzance, Cornwall. He quickly regrets his decision… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MRS LUNT” by Hugh Walpole, 1926. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Supporting my work If you like, you candonate in the follo…
  continue reading
 
This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
  continue reading
 
This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
  continue reading
 
This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
  continue reading
 
This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
  continue reading
 
This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
  continue reading
 
This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
  continue reading
 
This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
  continue reading
 
This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
  continue reading
 
This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
  continue reading
 
This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
  continue reading
 
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
  continue reading
 
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
  continue reading
 
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
  continue reading
 
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
  continue reading
 
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
  continue reading
 
This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
  continue reading
 
This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
  continue reading
 
This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
  continue reading
 
This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
  continue reading
 
This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
  continue reading
 
Two stories by J.D. Beresford. In “The Misanthrope” a man pays a visit to a hermit living on a Cornish island to find out what drove him there. In “The Little Town” a traveller finds himself in a mysterious place watching an even more mysterious performance.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. …
  continue reading
 
Young Viola’s childhood is made less lonely by her mysterious companion “Binns” – but is he fairy, familiar or something more sinister? This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “YOUNG MAGIC by Helen de Guerry Simpson, 1925. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "YOUNG MAGIC” by Helen de Guerry Simpson. …
  continue reading
 
Out walking in the countryside, a man spots something different about a hill in Symondsbury, Dorset. Intrigued, he finds himself inexorably drawn into the ancient battle between good and evil. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE HILL” by R. Ellis Roberts, 1923. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the s…
  continue reading
 
An old man starts to fear for his safety when he suspects his live-in carer is not quite what he seems.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “DON’T GET AROUND MUCH ANYMORE” by Jasper L’Estrange.💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like, you can donate in the following ways:Patreon: https://ww…
  continue reading
 
A grandmother warns her grandchildren not to pick blackcurrants where they grow in a particular spot in the village. When asked why, she relates to them a strange piece of local history. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “AN EVENING'S ENTERTAINMENT" by M.R. James, 1925. TECHNICAL NOTE: I'm h…
  continue reading
 
Welcome to Privacy Reimagined, the official podcast of ZeroID — your front-row seat to the future of secure communication, encrypted connectivity, and total digital freedom. In a world where surveillance is the default and personal data is currency, ZeroID is building something radically different: an ecosystem of crypto-powered privacy tools that …
  continue reading
 
A sceptical researcher incurs the wrath of a sinister occultist and soon finds himself embroiled in strange, escalating events. As fear mounts and time runs short, he must uncover the truth behind the mysterious forces pursuing him. “CASTING THE RUNES” (1911) is a chilling tale of unseen menace and supernatural revenge.This original recording is an…
  continue reading
 
In The Tombs prison, New York, preparing to be hanged for a crime he didn’t commit, Harry Jessup has a supernatural experience with far-reaching repercussions. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE MAN WITH THE BROWN BEARD” by Nathaniel P. Babcock (a.k.a. Nathaniel T. Babcock), 1896. 💀💀💀💀💀💀…
  continue reading
 
A man is dogged by the vision of a seemingly innocuous rural scene that he becomes convinced is a harbinger of death. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “BEYONDARIL” by John Metcalfe (1971). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "’Beyondaril’”. First collected in “Dark Things” (ed. August Derleth,…
  continue reading
 
When Esor McIre, in his duties as County Surveyor, is called upon to inspect the property of his old schoolfriend Carlton, it awakens an old curiosity about his friend's family. But what he finds there is strange beyond his imagination. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “CARLTON’S FATHER” by…
  continue reading
 
The new curate in a remote village fails to heed the local superstitions surrounding a mysterious monolith (menhir) known as “The Grey Gammer”. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE MENHIR” by N. Dennett (1934). Compiled in “Panics: A Collection of Uneasy Tales” (ed. Unknown). Published by …
  continue reading
 
Send us a text Sarah brings 35 years of clinical expertise to our conversation, revealing how relationship therapy has transformed from a one-dimensional approach to a comprehensive science-based system. As founder of Relate Center in Austin, Texas, she's pioneered an integrated method combining physical therapists, psychotherapists, and physicians…
  continue reading
 
Two stories about lonely travellers seeking shelter…who find more than they bargained for. In “The Lover of the Dead”, a stranded motorist uncovers a grisly secret, while “The Witch Finder” sees the titular character’s past catch up with him. These stories are from the grotesque imagination of Frederick Cowles and taken from his book “The Night Win…
  continue reading
 
When two friends hiking in the Pennines become lost, they think their fortunes have changed when they find refuge in the old Roper house. But as the night draws in and the house begins to reveal its dark secrets, they discover all is not what it seems. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE …
  continue reading
 
After being run over by a traction engine, Mr Tilly – now a spirit – elects to keep his appointment at a séance with the famed medium Mrs Cumberbatch. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MR. TILLY’S SEANCE” by E.F. Benson (1922). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 About the story: "Mr Tilly’s Séance” by E. F. B…
  continue reading
 
Nothing will ever be the same again for a country doctor when his son finds something deeply disturbing buried in the ground. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE UNDERBODY” by Alison V. Harding (1949). Sorry it's been a while. Spotify took down about 60 episodes over a spurious copyright …
  continue reading
 
When a worker at the local potteries burns to death in a freak industrial accident, the Reverend Noah Scallard develops a morbid obsession with his parishioner’s unfortunate demise. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE FIRING-CHAMBER” by John Metcalfe (1962). 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Sorry it's bee…
  continue reading
 
Send us a text Nestled along the scenic Southern Oregon coast, Southern Coos Hospital faces a unique set of challenges that many healthcare organizations never encounter. With just 25 beds serving a rural population of about 15,000, this critical access hospital demonstrates remarkable innovation in stretching limited resources while maintaining ro…
  continue reading
 
Send us a text Surgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field. The stakes couldn't be high…
  continue reading
 
What is the secret of the curiously empty seat on the Embankment between the Avenue and Westminster Bridge?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “ON THE EMBANKMENT” by Hugh E. Wright (1919).CREATOR’S NOTE: Due to some copyright confusion, Spotify have alerted me to the fact that 61 episodes of t…
  continue reading
 
Dark rumours surround a famous stage ventriloquist. Does his dummy contain the soul of his former partner?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE DEVIL DOLL” by Frederick E. Smith (1955).CREATOR’S NOTE: These recordings contain sound effects and music because that’s what I personally like to …
  continue reading
 
Having relocated their family to her husband’s ancestral home, Laura becomes concerned by their daughter’s increasingly naughty and wilful behaviour, and her husband’s darkening mood, leading her to believe Lichen Hall is not all it seems.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE PLAYFELLOW” by…
  continue reading
 
Walking in the Cotswolds, a man encounters a strange garden with unfinished walls and its even stranger owner. But what – or who – is this fortress designed to keep out?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE GARDEN THAT WAS DESOLATE” by Ulric Daubeny (1919).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workI…
  continue reading
 
A family adopts a stray poodle who charms its way into their lives, but were the strange portents that heralded the little dog's arrival more than shadow…?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MORE THAN SHADOW” by Dorothy Quick (1954).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my workIf you like, you can donate…
  continue reading
 
A recently married man becomes convinced that his wife is haunted by a disturbing doppelgänger – perhaps a “fetch” – that only he can see. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “FETCH” by Rebecca Lloyd (2016).For more information about the author and her work, please visit her website: https://w…
  continue reading
 
A bus driver recalls the highs and lows of his life in this dark and blackly comic monologue. This is a bit of an experiment for me, inspired by the popular character monologues written by Alan Bennett that were broadcast on British television in the 1990s. If people like it, I may make it the start of an occasional series called "Talking Dead".“TH…
  continue reading
 
Visiting Munich on his way to Transylvania, an Englishman ignores the warnings of the hotelier and coach driver in order to explore an abandoned village on the pagan festival of Walpurgis Night.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “DRACULA’S GUEST” by Bram Stoker (1897).💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀CREATOR’S…
  continue reading
 
Loading …

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás