Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
TV & Film
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/c5/8c/54/c58c5490-e30b-a104-d3ff-91b87c0c8f0a/mza_7009397206772167834.jpg/600x600bb.jpg
Root Causes: A PKI and Security Podcast
Tim Callan and Jason Soroko
500 episodes
2 days ago
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.
Show more...
Technology
RSS
All content for Root Causes: A PKI and Security Podcast is the property of Tim Callan and Jason Soroko and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.
Show more...
Technology
Episodes (20/500)
Root Causes: A PKI and Security Podcast
Root Causes 548: AI 1000 Days from Now - Emotional Intelligence
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.
Show more...
3 days ago
17 minutes 43 seconds

Root Causes: A PKI and Security Podcast
Root Causes 547: Should We Do Mass Revocation Fire Drills?
In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.
Show more...
5 days ago
12 minutes 32 seconds

Root Causes: A PKI and Security Podcast
Root Causes 546: New Research Codifies Arguments for and Against QWACs
We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates.
Show more...
1 week ago
43 minutes 26 seconds

Root Causes: A PKI and Security Podcast
Root Causes 545: What Is MOSH?
The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.
Show more...
1 week ago
8 minutes 18 seconds

Root Causes: A PKI and Security Podcast
Root Causes 543: AI Finds a Zero Day
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.
Show more...
2 weeks ago
17 minutes 45 seconds

Root Causes: A PKI and Security Podcast
Root Causes 544: What Is Chain of Lure?
Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs. Jason explains this attack and its implications.
Show more...
2 weeks ago
10 minutes 2 seconds

Root Causes: A PKI and Security Podcast
Root Causes 542: Use Cases for HQC
In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.
Show more...
2 weeks ago
10 minutes 34 seconds

Root Causes: A PKI and Security Podcast
Root Causes 541: Introducing the HQC PQC Algorithm
NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. We explain this code-based algorithm.
Show more...
2 weeks ago
6 minutes 52 seconds

Root Causes: A PKI and Security Podcast
Root Causes 540: Contextual CBOM
We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.
Show more...
3 weeks ago
11 minutes 3 seconds

Root Causes: A PKI and Security Podcast
Root Causes 539: What Is the Two-QWAC Architecture?
A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The "two-QWAC architecture" introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain. We explain what's coming and why.
Show more...
4 weeks ago
20 minutes 2 seconds

Root Causes: A PKI and Security Podcast
Root Causes 538: What Is an Entropy Desert?
An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.
Show more...
1 month ago
9 minutes 2 seconds

Root Causes: A PKI and Security Podcast
Root Causes 537: The Thermodynamics of Privacy
In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.
Show more...
1 month ago
13 minutes 34 seconds

Root Causes: A PKI and Security Podcast
Root Causes 536: Patent Blocker on ML-KEM
A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations. We explain.
Show more...
1 month ago
11 minutes 51 seconds

Root Causes: A PKI and Security Podcast
Root Causes 535: The CPS Is a Superset of Actual Practices
The CPS must always be a superset of actual practices in a properly running CA. We explain why this is a product of good design.
Show more...
1 month ago
10 minutes 22 seconds

Root Causes: A PKI and Security Podcast
Root Causes 534: Signing the Machines That Think
Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime. How do you know? Jason proposes that, the same way we sign our code, we should be signing our AI models as well.
Show more...
1 month ago
8 minutes 56 seconds

Root Causes: A PKI and Security Podcast
Root Causes 533: Flexibility Through Multi-CA Trust Models
We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.
Show more...
1 month ago
9 minutes 25 seconds

Root Causes: A PKI and Security Podcast
Root Causes 532: Introducing Offline PKI
In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.
Show more...
1 month ago
11 minutes 4 seconds

Root Causes: A PKI and Security Podcast
Root Causes 531: Benefits of Single-purpose Root Hierarchies
Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones. We discuss why.
Show more...
1 month ago
16 minutes 36 seconds

Root Causes: A PKI and Security Podcast
Root Causes 530: Introducing the AI Iceberg
We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.
Show more...
1 month ago
18 minutes 46 seconds

Root Causes: A PKI and Security Podcast
Root Causes 529: What Is a Common Mark Certificate?
Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.
Show more...
1 month ago
7 minutes 32 seconds

Root Causes: A PKI and Security Podcast
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.