From courtroom dramas to miscarriages of justice, to how the law affects you — and so much more. The Law Report is your accessible guide to the big legal stories unfolding in Australia and across the world.
…
continue reading
Let’s Encrypt Podcasts
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Each week, I sit down with the innovators and builders shaping the future of crypto and web3. Growth isn’t a sprint; it’s a process—built gradually, step by step, block by block. Let’s build something incredible, together. All onchain.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
MadnessBros Podcast : A music discovery and tech talk podcast
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
Shad with Peter Abilla - Why Crypto Marketing Still Uses the Old Playbooks
52:34
52:34
Play later
Play later
Lists
Like
Liked
52:34Summary Shad from Rare Minds walks through how crypto marketing has changed and why most teams are still stuck in old playbooks. He explains the Giga Method as a way to connect Web2-style rigor with Web3-native mechanics, so campaigns are built on real incentives and game design, not just hype. Throughout the conversation he pushes on three pillars…
…
continue reading
1
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
…
continue reading
1
Luis Bezzenberger - How Shutter Network Protects Against MEV
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32Summary In this conversation, Luis Bezenberger discusses Shutter Network, an encryption as a service mechanism designed to provide decentralized encryption and decryption. He explains the importance of Shutter Network in protecting against MEV (maximal extractable value) and the challenges faced in the Ethereum transaction supply chain. The discuss…
…
continue reading
1
Countdown to Australia's social media ban
28:58
28:58
Play later
Play later
Lists
Like
Liked
28:58In two weeks' time, Australia's social media ban for children under 16 will come into force. How will it work? Will it protect kids from online harm? And could they find ways around the restrictions?By Australian Broadcasting Corporation
…
continue reading
1
Drake Exchange on Monad: Building the Main Clearing House for Perps
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Summary Larry Smoove from Drake Exchange breaks down how Drake is positioning itself as the main trading venue on Monad, with a focus on serious traders who still want a smooth, approachable experience. He explains how flexible collateral, smart strategy design, and tight integration with RedStone’s OEV tools help make liquidations fairer, margin m…
…
continue reading
1
Yannik Schrade - Arcium, the encrypted Supercomputer
57:44
57:44
Play later
Play later
Lists
Like
Liked
57:44In this conversation, Yannick Schrade, co-founder and CEO of Arcium, discusses the inception of Arcium, its focus on encrypted computing, and the choice of the Solana ecosystem. He elaborates on the unique features of Arcium, including its ability to perform computations on encrypted data without decryption, the advantages of multi-party computatio…
…
continue reading
1
Storytelling, Hacks, And Headlines: Samantha Yap On Crypto PR with Peter Abilla
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35Summary Samantha Yap, founder of Yap Global, walks through how she built one of the first crypto-native PR agencies and what good communications actually looks like in this industry. She explains why storytelling and trust are the real currency in a skeptical, noisy crypto environment, and how to translate complex, technical ideas into narratives t…
…
continue reading
1
Josie Leung - MilkyWay, Modular Shared Security Through Liquid Restaking
52:32
52:32
Play later
Play later
Lists
Like
Liked
52:32Summary In this conversation, Josie Leung from Milky Way shares her journey from traditional Web2 roles to the crypto space, discussing her experiences at LinkedIn and Crypto.com. She emphasizes the importance of understanding both technical and business aspects in product development. The discussion also explores the potential of LinkedIn as a mar…
…
continue reading
1
Stacy Spikes on How Mogul Turns Movies Into A Fantasy Sports Game For Fans
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05Summary Stacy Spikes, co-founder and CEO of MoviePass, talks with Peter Abilla (@shmula, @papiofficial) through his path from the music business into film and why he is now building Mogul. Mogul treats movies a bit like fantasy sports, letting fans predict outcomes, compete with each other, and feel real skin in the game around what gets made and h…
…
continue reading
1
PP087: Why SBOMs Are Cooler and More Useful Than You Think
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
…
continue reading
1
How legally tight are prenuptial agreements?
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13Are prenuptial agreements always legally watertight? Or can they be tossed out by the courts? The High Court recently handed down a decision that focused on a poorly drafted prenup and to what extent the disgruntled client could sue the lawyers who drafted the leaky document.By Australian Broadcasting Corporation
…
continue reading
1
Tim Hafner: OpenServe, Telegram, and the Future of Crypto-Native Agentic Apps
48:20
48:20
Play later
Play later
Lists
Like
Liked
48:20Summary Tim Hafner, co-founder and CEO of OpenServe, walks through what they learned running a hackathon at Berlin Blockchain Week and how it shaped the product. He talks about why Telegram is becoming the default home for crypto apps and why most people still find building usable apps way too hard. Tim shares how OpenServe is trying to give builde…
…
continue reading
1
Alon Muroch: How SSV Labs Is Redefining Ethereum Staking and Validator Economics with SSV Network
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Summary Alon Morch, founder and CEO of SSV Labs, talks about how his time in the Israeli military shaped how he thinks about risk, leadership, and building companies. He explains what SSV Labs actually does: an engineering team behind SSV Network that works on Ethereum’s staking and validator infrastructure so validators can be safer, more flexible…
…
continue reading
1
Evgeny Yurtaev on Zerion's Journey from Portfolio Tracker to Crypto Wallet and Developer API
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52Summary Evgeny Yurtaev, CEO of Zerion, walks through how Zerion went from a simple way to see your onchain portfolio to a full wallet and developer-facing API. He explains why they always shipped based on real user behavior, how data shaped the roadmap, and why staying flexible matters in a market that keeps changing. He also talks about growth in …
…
continue reading
November 11 marks the 50th anniversary of the dismissal of Prime Minister Gough Whitlam by Governor-General Sir John Kerr — an event that exposed and tested the architecture of Australia's constitution.By Australian Broadcasting Corporation
…
continue reading
1
Gavin Thomas on Smart Transparency on TEN Protocol Layer 2
47:40
47:40
Play later
Play later
Lists
Like
Liked
47:40Summary In this conversation, Gavin introduces TEN Protocol, a Layer 2 on Ethereum focused on balancing privacy and transparency in smart contracts. He explains the idea of “smart transparency,” enabling developers to define which data stays private and which remains public. Gavin discusses how this flexibility opens new use cases in gaming, tradin…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
1
Fifty years of the Australian Law Reform Commission
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04The Australian Law Reform Commission is celebrating its 50th anniversary. The Law Report's Damien Carrick hosted an event in Melbourne to mark its half century.By Australian Broadcasting Corporation
…
continue reading
1
Casey Craig: Euphoria Finance Makes Crypto Trading Mobile-first, Fun, Fast, and Accessible
33:23
33:23
Play later
Play later
Lists
Like
Liked
33:23Summary In this episode, Casey Craig of Euphoria Finance shares how the team is reimagining derivatives trading through a mobile-first, consumer-focused design. Euphoria’s core innovation—“tap trading”—removes friction and makes trading intuitive, fast, and enjoyable, and crypto marketing with Peter Abilla. Casey explains how this simple mechanic, …
…
continue reading
1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
continue reading
1
Matt Mudano - Making Native Bitcoin the World's Settlement Layer with Arch Network
40:47
40:47
Play later
Play later
Lists
Like
Liked
40:47Summary In this episode, Matt Mudano, co-founder and CEO of Arch Network, explains how Arch is pioneering a new execution platform purpose-built for Bitcoin-native DeFi. Unlike EVMs or SVMs, Arch introduces a virtual machine and consensus layer that can directly interact with the Bitcoin mempool, enabling smart contracts and transaction signing wit…
…
continue reading
1
Do we have a right to free speech in Australia?
28:58
28:58
Play later
Play later
Lists
Like
Liked
28:58The implied freedom of political communication has been at the centre of several recent high-profile court decisions. The Law Report asks: do Australians have a constitutional right to freedom of speech? And what form does it take?By Australian Broadcasting Corporation
…
continue reading
1
The Rise of Etherex DEX on Linea, an Ethereum-first Layer 2
56:37
56:37
Play later
Play later
Lists
Like
Liked
56:37Summary Trantor walks through how Etherex became the leading decentralized exchange on Linea, what it took to build early in a turbulent ecosystem, and why foundation alignment matters more than capital, and crypto marketing with Peter Abilla. He explains the role of Rex33, why its tokenomics are designed for long-term liquidity instead of short-te…
…
continue reading
1
Nirav Murthy on the Future of AI and IP Licensing on Camp Network
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Summary Nirav Murthy, co-founder of Camp Network, talks through how Camp is building a user-friendly IP licensing platform that blends AI and blockchain, and crypto marketing with Peter Abilla. The project shifted from a Layer 2 to a Layer 1 so they could control the tech stack, tailor the network to IP use cases, and support developers building on…
…
continue reading
1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading
1
FOI reform and government transparency; Prosecuting the spread of deepfakes online
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05The Federal Government says it wants to reform the Freedom of Information system - what's in the proposed changes? And is the law keeping up with the growing number of pornographic deepfake images of young people being shared online?By Australian Broadcasting Corporation
…
continue reading
1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading
1
High Court lets police access evidence from encrypted app used in global raids
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04The High Court has unanimously upheld the use of police evidence obtained by monitoring an encrypted messaging app used by organised criminals. The decision is a huge victory for policing, but does it raise questions about the breadth of Australia's surveillance laws?By Australian Broadcasting Corporation
…
continue reading
1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading
1
If a self-driving car crashes, who is liable?
28:58
28:58
Play later
Play later
Lists
Like
Liked
28:58As driver assistance technology become more prevalent, a persistent question remains: who is liable in the event of an accident? And looking into a future where fully driverless cars take to Australian roads: what new laws will we need?By Australian Broadcasting Corporation
…
continue reading
1
Unlocking the Future of Blockchain with Zero Knowledge Proofs with Shiv Shankar of Boundless
1:06:16
1:06:16
Play later
Play later
Lists
Like
Liked
1:06:16Summary Shiv Shankar, CEO of Boundless / Risc Zero, reflects on leadership, the evolution of Zero Knowledge (ZK) technology, and the role Boundless plays in the blockchain ecosystem. He shares lessons from Amazon, the importance of empowering teams, and the growing demand for ZK, and crypto marketing with Peter Abilla. The discussion also covers th…
…
continue reading
1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading
1
How should wrongful convictions be compensated?
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Queensland man Terry Irving was recently awarded $130,000 in damages for a malicious prosecution over 30 years ago. The Law Report looks at compensation for wrongful convictions in Australia and asks: do we need a better system?By Australian Broadcasting Corporation
…
continue reading