Search Transcripts

PGP and Me
...n verify? Anyone with a cryptographic or mathematical background, or who uses cryptography in industry, should have this expectation. If anyone ever asserts to be me, wha...

Quantum Computers. Midnight, and DARPA's QBI
...a drop-in replacement so that the engine of Midnight—how it does zero-knowledge cryptography and the cryptography around that—will be post-quantum. This means Midnight will...

Post-Quantum Cardano
...point where we really have to start thinking about updating and modernizing our cryptography. It turns out that it's not just my belief; it's also the belief of the United...

Majorana (Brief Discussion)
...s that make these super useful to society. For example, you might want to break cryptography, simulate biochemistry, or predict weather. The long and short of it is that if...

Ross is Free
... Nelson Mandela. The Silk Road won’t go away. Those who are knowledgeable about cryptography and the nature of the internet will cite technology like OpenBazaar and other s...

Authenticating Charles Hoskinson
...nnel; almost certainly, it's a scam. Let's talk a little bit about public key cryptography because I do have a means of sharing information and authenticating that it is ...

Security Foundations: How to Secure Your Wallet Recovery Phrase for Cryptocurrency Wallets
... that allow you to construct what's called uh public keys uh public key cryptography and so it's based on something called the pgp standard and this is call...