Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ekr

1:48:16
 
Share
 

Manage episode 420095457 series 2956114
Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
  continue reading

Chapters

1. ekr (00:00:00)

2. History of Internet Security Protocols (00:00:12)

3. Evolution of TLS Protocol Version (00:05:52)

4. Evolution of TLS and Security (00:15:23)

5. Certificate Transparency Design and Implementation (00:25:35)

6. Advancements in Private Information Retrieval (00:36:28)

7. Complexities of Certificate Transparency Implementation (00:40:30)

8. Design Constraints in Digital Signatures (00:48:06)

9. Challenges in Internet Security and DNS (00:58:02)

10. Post-Quantum Cryptography and Adoption Trends (01:09:48)

11. Binary Transparency and Security Models (01:23:14)

12. Security Measures for Web Applications (01:35:29)

54 episodes

Artwork

ekr

Security Cryptography Whatever

45 subscribers

published

iconShare
 
Manage episode 420095457 series 2956114
Content provided by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Deirdre Connolly, Thomas Ptacek, David Adrian, Deirdre Connolly, Thomas Ptacek, and David Adrian or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
  continue reading

Chapters

1. ekr (00:00:00)

2. History of Internet Security Protocols (00:00:12)

3. Evolution of TLS Protocol Version (00:05:52)

4. Evolution of TLS and Security (00:15:23)

5. Certificate Transparency Design and Implementation (00:25:35)

6. Advancements in Private Information Retrieval (00:36:28)

7. Complexities of Certificate Transparency Implementation (00:40:30)

8. Design Constraints in Digital Signatures (00:48:06)

9. Challenges in Internet Security and DNS (00:58:02)

10. Post-Quantum Cryptography and Adoption Trends (01:09:48)

11. Binary Transparency and Security Models (01:23:14)

12. Security Measures for Web Applications (01:35:29)

54 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play