Logo

    protocols

    Explore " protocols" with insightful episodes like "Compassion Behind Compliance By Celia Sandhya Daniels (PART 2)", "Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted", "Blind quantum computing. An interview with Harold Ollivier.", "Keynote: 2024 Predictions in Future-Hindsight View - Get Ready! | A SecTor Event Coverage Conversation with Laura Payne" and "Episode 233: Exploring the Science of Intermittent Fasting with Dr. Matthew Stratton" from podcasts like ""Breakfast With Tiffany Show", "Security Cryptography Whatever", "The Quantum Divide", "ITSPmagazine" and "Flex Diet Podcast"" and more!

    Episodes (100)

    Compassion Behind Compliance By Celia Sandhya Daniels (PART 2)

    Compassion Behind Compliance By Celia Sandhya Daniels (PART 2)

    Welcome back to the Breakfast With Tiffany Show, where host Tiffany Rossdale continues in her compelling and enlightening conversation with trans entrepreneur and non-binary advocate Celia Sandhya Daniels.

    In this second part of the interview, Tiffany opens up about her experiences, particularly addressing challenges faced by the trans community during her visits to the Philippines. Tiffany and Celia delve into the intricacies of societal perceptions, language dynamics, and the empowering decision to educate others about personal identity.

    The episode takes a closer look at the significance of pronouns, extending the discussion beyond gender to encompass culturally diverse communities. Celia shares valuable insights into the nuances of language and communication, showcasing the impact of respectful terminology in various regions such as Japan and India.

    Listeners are treated to Celia's wealth of knowledge as she discusses the trajectory of gender in the next five to ten years. Highlighting the notable rise in gender non-binary identification among youth, she underlines the essential role of compassionate allyship and the continuous dismantling of discriminatory practices.

    Celia concludes the episode by providing actionable tips for allies, encouraging them to acknowledge their privilege, actively listen, engage in continuous learning, and participate in challenging conversations.

    Join Tiffany Rossdale and her inspiring guests on the Breakfast With Tiffany Show for an extended exploration of diverse stories, resilience, and the triumph of the human spirit over adversity. Tune in for a thought-provoking, inspiring, and educational journey through the tapestry of unique life experiences.

    ---

    Celia Sandhya Daniels (She/They) is an entrepreneur, motivational speaker, D&I champion, blogger, composer, musician, photographer, hiker, and filmmaker. She currently resides in southern California with her family. She is an Asian Indian who identifies as gender non-binary, trans femme. Celia is a management consultant with over 20+ years of success in media, health care, and life science engagements for over 100 companies. Celia has received several awards, such as the 2019 Human Rights Campaign Equality Award for Outstanding Commitment and Service to the Community.

    You can follow or contact Celia below:

    Website:
    https://www.rebekon.com 

    Support the show

    Breakfast With Tiffany Show Official Facebook Page ~ https://www.facebook.com/breakfastwithtiffanyshow

    Tiffany's Instagram Account ~ https://www.instagram.com/tiffanyrossdaleofficial/

    For coaching sessions & programs with Tiffany, check out her official page ~ https://www.tiffanyrossdale.com

    Breakfast With Tiffany Show Youtube Channel ~ https://bit.ly/3vIVzhE

    Breakfast With Tiffany Show Official Page ~ https://www.tiffanyrossdale.com/podcast

    For questions, requests, collaborations and comments, feel free to reach us via our e-mail ~ breakfastwithtiffanyshow@outlook.com

    Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted

    Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted

    We're back! Signal rolled out a protocol change to be post-quantum resilient! Someone was caught intercepting Jabber TLS via certificate transparency! Was the same-origin policy in web browers just a dirty hack all along? Plus secure message format formalisms, and even more beating of the dead horse that is E2EE in the browser.

    Transcript: https://securitycryptographywhatever.com/2023/11/07/PQXDH-etc

    Links:

    - https://zfnd.org/so-you-want-to-build-an-end-to-end-encrypted-web-app/
    - https://github.com/superfly/macaroon
    - https://cryspen.com/post/pqxdh/
    - https://eprint.iacr.org/2023/1390.pdf


    "Security Cryptography Whatever" is hosted by Deirdre Connolly (@durumcrustulum), Thomas Ptacek (@tqbf), and David Adrian (@davidcadrian)

    Blind quantum computing. An interview with Harold Ollivier.

    Blind quantum computing. An interview with Harold Ollivier.

    Join us as we explore the intricate world of quantum technology with our guest, Harold Ollivier, from Inria, a public research institute in France. Harold gives us an insightful look into his work on verification of quantum computation, error correction, and error mitigation. We also get a unique perspective on Inria's strong focus on computer science and its important contributions to various aspects within the quantum ecosystem. 

    We tackle the challenges of developing quantum technologies and their impact on the market and user needs. Discover the current state of quantum computing and how companies are grappling with moving their hardware to specialized data centers. Learn about the complexities of installing a quantum computer in a data center, including cooling system requirements and potential vibration disruptions. 

    We further examine the necessity of physical considerations for data centers hosting quantum machines, the practicality of dilution fridge technologies, and the relationship between these topics and privacy and security. Hear about the growing trend of privacy-preserving laws, the evolution of classical cryptography, and the French banking regulator's exploration of solutions for stress tests on the banking system. Lastly, we discuss the verification methodology for quantum computing and how it can ensure that computations are not tampered with, even without full knowledge of the computation details. Tune in for this and more on our enlightening journey through quantum technology.


    --------- EPISODE CHAPTERS WITH FULL SUMMARIES ---------

    (0:00:12) - Quantum Technology Research in France (18 Minutes)

    We discuss the divide between classical IT and quantum technology and the fact that these two domains need to work closely together. We are joined by Harold Olivier Right from Inria, a public research institute in France, to talk about his research on verification of quantum computation and its implications for error correction and error mitigation. We learn about Inria's focus on computer science and their work on various topics within the quantum ecosystem. We also explore the link between INRIA and the French national quantum strategy, and the strong collaborations with startups and companies.

    (0:17:45) - Challenges of Developing Quantum Technologies (4 Minutes)

    We explore the challenges of developing quantum technologies and how it affects the market and user needs. We look at the current state of quantum computing and how companies are dealing with the need to move their hardware to specialized data centers. We discuss the complications of bringing a quantum computer to a data center, including the cooling system requirements and the vibration that can disrupt the machine. We discuss how public money is used to research and explore these issues and how this can benefit the private sector.

    (0:21:53) - Quantum Machines and Remote Execution (17 Minutes)

    We discuss the need for physical aspects to be considered for data centers to host quantum machines, the practicality of dilution fridge technologies, the abundance of coaching, and the link between this topic and privacy and security. We then explore the growing trend of privacy-preserving laws, the evolution of classical cryptography, and the French banking regulator's exploration of solutions for stress tests on the banking system. Finally, we look at the requirement for developing a healthy quantum ecosystem and how it affects the market and user needs.

    (0:38:41) - Approaches and Challenges in Quantum Networking (13 Minutes)

    We explore the various approaches to sending qubits from a client to a server and the advances being made in quantum networking. We examine the possibilities of obfuscating the instructions sent classically, the pros and cons of these approaches, and the research and development being done on a quantum long-range backbone. We also discuss the quantum advantage in terms of space and the overhead needed to produce a secure qubit. Finally, we consider how to simplify protocols and bring them to a level where they can be implemented.

    (0:52:11) - Verification Methodology for Blind Computations (5 Minutes)

    I discuss the verification methodology for quantum computing and how it is possible to verify that a server is not tampering with a computation without knowing the full details of the computation. We look at how blind computation can be used to delegate a task to a server, and how it is possible to verify the server's results by providing known 'clipboard' computations and comparing the result. Technical considerations behind this methodology and the importance of proving that the class of clipboard computations is large enough to catch any malicious behaviour from the server are discussed. Finally, the implications of this approach for the future of quantum computing are considered.

    (0:56:47) - Quantum Networking (1 Minutes)

    We {discuss} the need for physical infrastructure to support quantum machines, the advances being made in quantum networking and the verification methods used to ensure secure communication between servers and clients. The challenges of developing quantum technologies and the impact this has on the market and user needs are also {considered}. Finally, we {reflect} on our conversation and consider the possibilities for the future.

    Keynote: 2024 Predictions in Future-Hindsight View - Get Ready! | A SecTor Event Coverage Conversation with Laura Payne

    Keynote: 2024 Predictions in Future-Hindsight View - Get Ready! | A SecTor Event Coverage Conversation with Laura Payne

    Guest: Laura Payne, Chief Enablement Officer & VP Security Consulting at White Tuque [@WhiteTuque]

    On Linkedin | https://www.linkedin.com/in/laura-l-payne/?originalSubdomain=ca

    ____________________________

    Hosts: 

    Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

    Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli

    ____________________________

    Episode Notes

    In this Chats on the Road episode of the ITSPmagazine Podcast Network, hosts Marco Ciappelli and Sean Martin embark on a road trip to the SecTor cybersecurity conference in Toronto, Canada. Along the way, they engage in playful banter about using a time machine or an autonomous car to reach their destination. Once they arrive, they sit down with Laura Payne, this year's keynote speaker at SecTor.

    Laura shares her journey in the cybersecurity field and her experience working with various organizations. The conversation delves into the future of cybersecurity and the impact of artificial intelligence. They discuss the importance of resilience, the adoption of AI in small businesses, and the challenges of regulating AI. They also touch on the skills that security practitioners need to develop, such as understanding protocols and APIs.

    Throughout the conversation, they emphasize the need to build security into new technologies from the start and to maintain a focus on the basics of cybersecurity. They also reflect on the recurring nature of cybersecurity challenges and the importance of learning from history to predict the future. Overall, this thought-provoking episode dives into the future of technology, cybersecurity, and society, providing insights and perspectives from industry experts. The conversation is a mix of playful banter, practical advice, and philosophical reflections, offering listeners a well-rounded and engaging discussion.

    About Laura's Keynote Session: If 2023 was the year of AI exploding into popular use, what is on the horizon for 2024? There are a lot of predictions for what is coming, but what should we be preparing for as security professionals? We'll look at some of the most popular predictions, view them as if they've already happened and see if history is just repeating itself with past lessons to learn from.

    ____________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    ITSPmagazine YouTube Channel:

    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ____________________________

    Resources

    Keynote: 2024 Predictions in Future-Hindsight View - Get Ready!: https://www.blackhat.com/sector/2023/briefings/schedule/#keynote--predictions-in-future-hindsight-view---get-ready-36117

    Learn more about SecTor 2023: https://www.blackhat.com/sector/2023/

    ____________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Are you interested in sponsoring an ITSPmagazine Channel?

    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    Episode 233: Exploring the Science of Intermittent Fasting with Dr. Matthew Stratton

    Episode 233: Exploring the Science of Intermittent Fasting with Dr. Matthew Stratton

    On today's episode of the Flex Diet Podcast, Dr. Matthew Statton and I delve deep into the science of intermittent fasting, providing valuable insights and practical tips on how to incorporate it into your lifestyle effectively. From understanding the various types of intermittent fasting protocols to the intriguing intersections between nutrition and performance, this episode promises to enhance your knowledge and ensure your fitness journey is optimally fueled.

    If you enjoyed this podcast, you can get more from me at MikeTNelson.com/podcast. You can see all the other podcasts and guest episodes I’ve done. And then, if you scroll down, you can subscribe to my Fitness Daily Newsletter.

    Episode notes:

    • [3:15] How Dr. Stratton began studying intermittent fasting
    • [11:12] His definition of intermittent fasting
    • [23:14] Origins of the 16:8 eating window and research limitations
    • [33:44] Research on caffeine and pre-workout
    • [43:31] Dr. Stratton's top 3 pre-workout formulations
    • [48:49] Thoughts on 16:8 for body composition
    • [1:05:12} Is breakfast the most important meal of the day?

    Connect with Dr. Stratton:

    • Email: MatthewStratton@southalabama.edu 

    About Dr. Stratton:

    Dr. Matthew Stratton is an Assistant Professor of Exercise Science at the University of South Alabama. His research centers on examining both the applied and molecular responses to various supplementation and nutritional interventions, with a focus on muscular strength, power, and body composition.

     

    The Tudor Dixon Podcast: Buckets Over Bullying: Fighting Back Against Cyberbullying

    The Tudor Dixon Podcast: Buckets Over Bullying: Fighting Back Against Cyberbullying

    In this episode, Tudor interviews Rob and Rose Bronstein, founders of the organization "Buckets Over Bullying." They discuss the heartbreaking story of losing their son to cyberbullying and the need for schools to prioritize student safety. The Bronsteins emphasize the importance of consequences for bullies and the need for parents to be informed about incidents involving their children. They also highlight the recent change in the law requiring schools to notify parents about bullying incidents. The Tudor Dixon Podcast is part of the Clay Travis & Buck Sexton Podcast Network - new episodes debut every Monday, Wednesday, & Friday. For more information visit TudorDixonPodcast.com

    See omnystudio.com/listener for privacy information.

    The Tudor Dixon Podcast: Buckets Over Bullying: Fighting Back Against Cyberbullying

    The Tudor Dixon Podcast: Buckets Over Bullying: Fighting Back Against Cyberbullying

    In this episode, Tudor interviews Rob and Rose Bronstein, founders of the organization "Buckets Over Bullying." They discuss the heartbreaking story of losing their son to cyberbullying and the need for schools to prioritize student safety. The Bronsteins emphasize the importance of consequences for bullies and the need for parents to be informed about incidents involving their children. They also highlight the recent change in the law requiring schools to notify parents about bullying incidents. The Tudor Dixon Podcast is part of the Clay Travis & Buck Sexton Podcast Network - new episodes debut every Monday, Wednesday, & Friday. For more information visit TudorDixonPodcast.com

    See omnystudio.com/listener for privacy information.

    Long-Acting Lipoglycopeptides for Skin and Soft Tissue Infections : Implementation Into Practice

    Long-Acting Lipoglycopeptides for Skin and Soft Tissue Infections : Implementation Into Practice

    In this episode, Kyle Molina, PharmD, BCIDP, discusses key considerations for successful implementation of long-acting lipoglycopeptides into clinical practice. Listen as he gives perspectives on:

    • Reasons to consider use of long-acting lipoglycopeptides (eg, poor adherence to oral antibiotics, PICC-related costs and complications)
    • Data supporting and challenging cost effectiveness of long-acting lipoglycopeptides 
    • Identifying the target patient population
    • Selecting the right location to provide long-acting lipoglycopeptides 
    • Strategies to maximize institutional impact with key stakeholders (eg, hospital avoidance, reduced ED and hospital length of stay) 
    • Key characteristics of available long-acting lipoglycopeptides 
    • Addressing logistical challenges, including navigating the reimbursement process

     

    Faculty:

    Kyle Molina, PharmD, BCIDP
    Infectious Diseases Clinical Pharmacist
    Scripps Green Hospital
    La Jolla, California

    Link to full program: 

    Resilience, Routine, and Discipline

    Resilience, Routine, and Discipline
    In the enthralling third episode of Constructing Success titled "Resilience, Routine, and Discipline," host Derek Baer welcomes the esteemed guest, John Chapman, on a journey of inspiration and innovation. Join us as we delve into John's incredible story and groundbreaking project, medic copilot. John Chapman shares his remarkable journey, from his military career to becoming a successful entrepreneur. Drawing inspiration from technology giants like Microsoft and GitHub, John's project, medic copilot, aims to revolutionize access to essential medical information. Unlike solely relying on artificial intelligence, his project incorporates decision trees and other methods, making it a game-changer in the medical field. Through candid conversations, John explores the challenges and opportunities in healthcare and discusses the risks of relying solely on AI applications like chat GPT. He reveals the innovative approach taken in the first phase of medic copilot, ensuring reliable and auditable information within approved medical guidelines for medics. John's dedication to the niche market of prehospital care, from injury to higher levels of care, is commendable. Not one to shy away from challenging environments, he also aims to extend the benefits of his project to combat medics and communities with limited access to medical specialists. But John's journey doesn't begin with medic copilot; he takes us back to his military career and transition into defense contracting. We learn about pivotal moments that led to the birth of his own company and how personal growth and dedication played crucial roles in his success. Tune in as John shares his thoughts on passion, purpose, and money in business, revealing his desire to make a difference while also seeking personal wealth and a desired lifestyle. He reflects on the impact of routine, discipline, and physical fitness in his life, drawing lessons from his military experience. As the episode unfolds, John leaves us with a powerful reminder to persevere and continue learning, emphasizing the importance of utilizing the abundance of available resources. Join Derek Baer and John Chapman for an inspiring and insightful discussion on resilience, routine, and discipline. This episode of "Constructing Success" promises to leave you motivated and empowered to construct your own path to success.

    Understanding Private Equity - Different Investment Strategies and Time Horizons

    Understanding Private Equity - Different Investment Strategies and Time Horizons
    On this episode of Family Business With Purdeep Sangha, we dive into the world of private equity investment. Our guest shares insights into the regulation and protocols followed by private equity firms and how they ensure transparency and responsible management of investor money. We also take a closer look at how private equity firms acquire and structure businesses effectively, the key metrics involved in making a business a good acquisition opportunity, and the potential benefits of long-term private equity investment. In addition, we discuss the most successful ways for private equity firms to access deals and the traditional methods for introducing private equity to small and medium enterprises. Tune in to discover more about private equity investment and how it can be a valuable asset in a diversified investment portfolio.

    Mason Institute Investigates Episode 7: Longevity for me, but not for thee? Longevity protocols and the ethics of healthy ageing.

    Mason Institute Investigates Episode 7: Longevity for me, but not for thee? Longevity protocols and the ethics of healthy ageing.

    Welcome to a new season of the Mason Institute Investigates podcast. Starting off this season, we have Dr Ilke Turkmendag, Senior Lecturer in Law, Innovation and Society from the University of Newcastle. In this episode, Dr Turkmendag talks her recent research into longevity protocols and the ethics of healthy ageing

    Fostering a Better Understanding of Networking Within the Information Security Community to Build Stronger Cyber Defenses | A Conversation with Justin Elze and Mick Douglas | Redefining CyberSecurity Podcast With Sean Martin

    Fostering a Better Understanding of Networking Within the Information Security Community to Build Stronger Cyber Defenses | A Conversation with Justin Elze and Mick Douglas | Redefining CyberSecurity Podcast With Sean Martin

    Guests: 

    Justin Elze, CTO at TrustedSec [@TrustedSec]

    On LinkedIn | https://www.linkedin.com/in/justinelze/

    On Twitter | https://twitter.com/HackingLZ

    Mick Douglas, Founder and Managing Partner at InfoSec Innovations [@ISInnovations]

    On LinkedIn | https://linkedin.com/in/mick-douglas

    On Twitter | https://twitter.com/bettersafetynet

    ____________________________

    Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

    On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin
    ____________________________

    This Episode’s Sponsors

    Imperva | https://itspm.ag/imperva277117988

    Edgescan | https://itspm.ag/itspegweb

    ___________________________

    Episode Notes

    In this new Redefining Cybersecurity Podcast episode, Justin Elze, Mick Douglas, and Sean Martin delve into the importance of understanding networking concepts in the realm of cybersecurity. They discuss the misconceptions surrounding networking knowledge and how it often becomes cumbersome for people to learn. They highlight the underappreciated areas of networking that are frequently encountered in enterprise environments, such as DNS issues, virtual machines, VLANs, and more. The conversation also touches on the OSI model and the need for a structured approach to learning and adapting to various enterprise environments.

    The episode highlights how the shift to cloud-based solutions and remote work has made certain aspects of networking easier while also changing the landscape of network security. The discussion examines the importance of understanding and implementing effective security controls based on the organization's needs and threat surface rather than relying on outdated or ritualistic practices. The trio further explores the concept of abstraction versus understanding the intricate details of IT security policy and controls.

    Justin and Mick also talk about the need for a standard body of knowledge for cybersecurity professionals when it comes to networking concepts. They emphasize that while it's not necessary to be a networking expert, a deeper understanding of core concepts can significantly improve the effectiveness of network defense. By fostering a better understanding of networking within the information security community, professionals can better identify and address potential vulnerabilities and misconfigurations within their environments.

    ____________________________

    Watch this and other videos on ITSPmagazine's YouTube Channel

    Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllQZ9kSG7X7grrP_PsH3q3T3

    ITSPmagazine YouTube Channel
    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    ____________________________

    Resources

     

    ____________________________

    To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
    https://www.itspmagazine.com/redefining-cybersecurity-podcast

    Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    פרק 32: מפתחים במהירות הקול עם עידו מגור

    פרק 32: מפתחים במהירות הקול עם עידו מגור

    אין אחד שלא ביצע שיחה קולית או וידאו בפלטפורמות כמו סקייפ, סלאק, טימס ואחרות. אבל איך זה עובד ? ממה מורכב המנגנון  ומאיזה פרוטוקולים?
    ומה זה בכלל אומר peer to peer communication?

    אירחנו את עידו מגור לפרק על עולמות ה VOIP , ה WebRTC וכל מה שבנייהם.


    לכל מי שרוצה לקרוא עוד קצת על הנושאים האלו, יש לעידו מדיום מעולה שדן בכך.
    https://idomagor.medium.com/

    Warming Up Your Body, Warming Up Your Mind

    Warming Up Your Body, Warming Up Your Mind
    Guest: Shawnee Harle, MA - This course explores mental toughness and emotional intelligence as it relates to athletes and sports concussion management, however, these strategies are also for SLPs and AuDs to help them ignite the leader within. Helping student-athletes manage the fear behind concussions, which may lead to reducing the stigma, increased reporting of signs and symptoms, and decreased fear of isolation during protocols and repercussions, such as losing playing time and scholarships will be discussed. In addition, being unafraid of post-concussion cognitive-communication difficulties may lead to increased advocacy of accommodations. Shawnee highlights what is lacking within the sports community, which is a lack of addressing the athletes’ overall well-being. Steps to incorporate before, during, and after warming up the body and the mind, as well as preparing to deal with the “storms” from playing the sport by applying the social-emotional pillars and cognitive-communication strategies to athletic training, brain health, and the everyday physical exercises will be provided.

    116. Our New Toy (January)

    116. Our New Toy (January)

    **WARNING: YOU MUST BE 18 YEARS OF AGE OR OLDER TO ENJOY THIS CONTENT**

    On this episode, we received our Kink Starter cards from Dan and Dawn at Erotic Awakening! Let's check them out!!

    Remember.. we're Travel Advisors!
    BOOK YOUR VACATION WITH US at either kinkyintroverts.com/travel or kihomeandaway.com/erotic-travel.

    If you want to hear the behind the scenes afterthoughts on this episode, join us on Patreon for weekly About that Episode discussions.

    And remember, Patrons get Perks!  Patreon is automatically sending out merch!  Depending on which tier you select, you could get stickers, small prints, a coffee mug, or a t-shirt.  Also, if patron donations are used to fund any of the products on our Etsy page, patrons at the $5+ tiers will receive that product for free after up to 1 year of patronage (sooner, depending on production costs).

    ·         Check out our website at kinkyintroverts.com  

    ·         You can also find us on Spotify, Stitcher, iTunes, Castbox, Google Podcasts, iHeartRadio, Podbay, Listen Notes, and more.  

    ·         Primary podcast: Kinky Introverts - BDSM at Home  

    ·         Vanilla podcast: Wanderlust (Travel Podcast)  

    ·         Email us at kitten@kinkyintroverts.com  

    ·         Or leave us a voicemail at *67-203-807-KINK (5465)  

    ·         Our socials are FetLife, Twitter, Instagram, and Reddit  

    Support the show

    110. Getting back to Protocols

    110. Getting back to Protocols

    **WARNING: YOU MUST BE 18 YEARS OF AGE OR OLDER TO ENJOY THIS CONTENT**

    On this episode, Brian and I discuss our old protocols and what still applies, what needs to be added, and what we can do without.  A lot has changed over this past year, so with being back home and trying to do things right, I felt like I needed a little bit of a check-in.  The dungeon is ALMOST back to being play ready.  We just have to clear up a couple of potential hazards.  Enjoy!!

    Remember.. we're Travel Advisors!
    BOOK YOUR VACATION WITH US at either kinkyintroverts.com/travel or kihomeandaway.com/erotic-travel.

    If you want to hear the behind the scenes afterthoughts on this episode, join us on Patreon for weekly About that Episode discussions.

    And remember, Patrons get Perks!  Patreon is automatically sending out merch!  Depending on which tier you select, you could get stickers, small prints, a coffee mug, or a t-shirt.  Also, if patron donations are used to fund any of the products on our Etsy page, patrons at the $5+ tiers will receive that product for free after up to 1 year of patronage (sooner, depending on production costs).

    ·         Check out our website at kinkyintroverts.com  

    ·         You can also find us on Spotify, Stitcher, iTunes, Castbox, Google Podcasts, iHeartRadio, Podbay, Listen Notes, and more.  

    ·         Primary podcast: Kinky Introverts - BDSM at Home  

    ·         Vanilla podcast: Wanderlust (Travel Podcast)  

    ·         Email us at kitten@kinkyintroverts.com  

    ·         Or leave us a voicemail at *67-203-807-KINK (5465)  

    ·         Our socials are FetLife, Twitter, Instagram, and Reddit  

    ·         Creative Commons Music by Jason Shaw on Audionautix.com and modified by Kitten

    Support the show

    Bridge Hack, Wallet Hack

    Bridge Hack, Wallet Hack

    with @mg_486662 @riyazdf @nassyweazy and @smc90

    This week’s all-new episode digs into recent high-profile hacks that took place in the crypto space over the last week -- we not only dig into what happened, including a more technical breakdown of the how and how we know -- but also cover the categories and issues specific to (and not specific to!) web3 security; as well as solutions and advice for builders.

    We also touch on related trends and topics such as the role of open source; communications around hacks, as well as social media status signaling; and much more. Throughout, we try to help tease apart what’s hype/ what’s real, as well as the signal vs. the noise, in the narratives out there...  

    Joining host Sonal Chokshi this week are experts from the a16z crypto security team, including: security engineer Matt Gleason; CTO Riyaz Faizullabhoy; and CISO Nassim Eddequiouaq -- both of whom previously worked at Facebook, Anchorage, and Docker [Nass also appeared on an earlier episode of this show, on evolving NFTs & security, available here].

    But for this episode, just to quickly recap for your context, the hacks we’re specifically covering are:

    • The hack of the Nomad bridge -- which connects several different blockchains including Avalanche, Ethereum, Evmos, Moonbeam, and others – with reported range of between $185-$190M stolen; 
    • The hack of the Slope wallet -- a non-custodial, browser-based wallet that was reported to affect nearly 8000 users on Solana as well as other ecosystems -- with reported range of between $4.5-8M stolen. It occurred a week ago and Slope just posted their latest update today confirming some of the details in this episode (which was recorded a few days earlier).

    As a reminder: None of the following is investment, business, tax, or legal advice; please see a16z.com/disclosures for more important information, including a link to a list of our investments. 

    DeFI for beginners with Jasmine Xu - Genius Call 4

    DeFI for beginners with Jasmine Xu - Genius Call 4

    Jasmine is a product manager at META by day and a moderate DeFi degen by night! She fell into the crypto rabbithole and since then has gained a store of knowledge on DeFI chains and protocols. She has been sharing her DeFi journey via Twitter, with a focus on beginner DeFI content.

    Connect with Jasmine on Twitter https://twitter.com/jasminexu888

    Follow Club CPG at https://twitter.com/CPGCLUB

    To learn move about Crypto Packages Goods, visit https://www.cryptopackagedgoods.com/

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io