← All Tags

#cryptography

11 episodes

#2376: Iran’s Crypto Sanctions Workaround

How Iran turns cheap electricity into cryptocurrency to bypass sanctions—and the tradeoffs of this digital alchemy.

cryptographyirangpu-acceleration

#2375: Monero: The Digital Cash That Hides Everything

How Monero’s privacy tech makes every transaction untraceable—and why that’s becoming essential in a world of financial surveillance.

privacycryptographyfinancial-privacy

#2226: When Quantum Breaks Everything

Quantum computers will shatter RSA and elliptic-curve encryption—but the real danger is data being stolen and stored right now, waiting to be decry...

post-quantum-cryptographycryptographycybersecurity

#2224: Why AI Can't Crack the Voynich Manuscript

A fifteenth-century text has defeated cryptanalysts, linguists, and AI models alike. What does its resistance tell us about language, encoding, and...

cryptographylinguisticsai-reasoning

#2088: Quantum's First Real Benchmarks Are Here

From drug discovery to logistics, quantum computing is finally delivering measurable speedups over classical systems.

semiconductorscryptographydata-integrity

#1796: The Encryption Mirage: Are Your Keys Really Safe?

End-to-end encryption promises privacy, but hidden backdoors and metadata leaks can betray your trust.

cryptographydata-securitydigital-privacy

#1772: PGP vs. Gmail: Who Really Holds Your Keys?

You see a padlock icon and think your email is safe. But does end-to-end encryption actually protect you, or just create a false sense of security?

privacydigital-privacycryptography

#1771: PGP vs GPG: The Key to Docker & Hugging Face

PGP or GPG? We break down the alphabet soup of signing Docker images and AI models, and why it matters for supply chain security.

cryptographyopen-sourcedata-integrity

#1551: From Pixels to Projection: The Tech Behind the Big Screen

Forget film reels. Modern movies are 600GB encrypted "shipping containers" delivered by satellite. Discover the tech behind the big screen.

display-technologybroadcast-technologycryptography

#943: Unbreakable: One-Time Pads and the Mystery of V-32

Discover why the one-time pad is the only unbreakable code and go inside the eerie world of shortwave number station V-32.

cryptographyelectronic-warfaresecurity-logistics

#404: Beyond the Screenshot: Proving Your Digital Evidence

Can a thumbs-up be a binding contract? Learn how to authenticate digital messages and protect your legal rights in the age of AI forgeries.

digital-evidencecryptographylegal-technology