The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays we have Bug Bounty programs, where hackers get paid to find and disclose security flaws, and even get some cash for their work.ResourcesInternet Scanner Finds Security HolesCERIAS - Center for Education and Research in Information Assurance and SecurityA history of bug bounty programs & incentivised vulnerability disclosureWearing Many Hats: The Rise of the Professional Security HackerHacking the PentagonSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
23:29
--------
23:29
Red Team: The Best Job in Cybersecurity (Until You Get Arrested)
What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of the most notorious Red Team exercises in history, when two Coalfire employees were arrested and fought a long legal battle, just for doing their jobs. ResourcesInside the Courthouse Break-In Spree That Landed Two White-Hat Hackers in JailDarknet Diaries Episode 59: The CourthouseCoalfire Systems websiteDEF CON 22 - Eric Smith and Josh Perrymon - Advanced Red Teaming: All Your Badges Are Belong To UsHow RFID Technology Works: Revolutionizing the Supply ChainNolaCon 2019 D 07 Breaking Into Your Building A Hackers Guide to Unauthorized Physical AccessSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
28:30
--------
28:30
Random Number Generators Pt 3: Under the Hood
What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We'll even do a simple exercise you can try with your friends to see who picks the most "random" number of all. Resources:How Slot Machines WorkRAND FunctionBritons most likely to pick 7 as "random" numberSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
23:47
--------
23:47
Random Number Generators Pt 2: Unsecure Devices
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world.ResourcesSecuring the IoT Ecosystem: Challenges & SolutionsData security of IoT devices with limited resources: challenges and potential solutionsWhat Is IoT Security? Challenges and RequirementsApple Platform Security GuideHardware Accelerated CryptoSend us a textSupport the showJoin our Patreon to listen ad-free!
--------
24:25
--------
24:25
Random Number Generators Pt 1: Cheating at Video Games
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption.Resources:How Many People Play Minecraft 2025 (Active Players)Pre-determined RNG? (Reddit post)Diablo II Seeded Category - Rule / General Discussion10 Perfect Minecraft Seeds You'll Want To Play FOREVER (YouTube video)Send us a textSupport the showJoin our Patreon to listen ad-free!