Épisodes

  • #4 : This enemy who wants to do you good
    Jun 2 2025

    This episode delves into the invisible but crucial world of digital authentication, starting with the everyday frustration of managing passwords. It explains that passwords exist to prove our identity, yet they are often weak, reused, or easy to guess, making them vulnerable to attacks. The episode uses the example of airport customs to illustrate how identity is verified through documents and biometrics, and draws parallels with digital methods. It highlights the risks of relying solely on passwords, even when hashed, as they can still be cracked through sophisticated techniques like brute force or rainbow tables. Physical keys and biometric data offer additional layers of security but are not immune to cloning or manipulation. The message is clear: no single method is enough to guarantee safety, and combining strong, varied methods is essential to protect our digital identities, which have very real implications in our lives.


    Hosted by Ausha. See ausha.co/privacy-policy for more information.

    Voir plus Voir moins
    28 min
  • #3 : Encrypting is not encoding
    May 19 2025

    This episode will explain you the major topics about cryptography :

    • Hiding ≠ Protecting

      • Steganography conceals a message’s existence (wax tablets, watermarked films).

      • Coding just changes symbols (Morse, CD error-correction).

      • Cryptography actually locks the content.

    • Early & Perfect Ciphers

      • Caesar shift is weak; a one-time pad is unbreakable but impractical because the key must match the message length.

    • Kerckhoffs’ rule: everything about a system can be public—only the key must stay secret.

    • Enigma showed strong design (159 quadrillion settings) yet fell to Turing owing to predictable message parts.

    • Modern crypto

      • Symmetric keys are fast but need a safe key swap.

      • RSA (public/private keys) solves that, enabling HTTPS, digital signatures, and secure web traffic.

      • Hashes act as digital fingerprints; signing = encrypting a hash with the private key.

    • Future challenges

      • 2048-bit RSA is safe now, but quantum computers could break it.

      • Post-quantum and homomorphic encryption aim to keep data secure—even while processed in the cloud.

    Bottom line: robust math plus open scrutiny—not secrecy—keeps our digital world safe, but we must adapt as computing power grows.


    Hosted by Ausha. See ausha.co/privacy-policy for more information.

    Voir plus Voir moins
    29 min
  • #2 : Why is so mean ?
    May 5 2025

    The history of hackers from the dawn of humanity to the present day.

    • Hackers ≠ villains
      “Hacker” simply means someone who pushes a system beyond its intended use; ethics split them into white hats(defenders) and black hats (attackers).

    • Flaws are human, not machine
      Bugs stem from programming mistakes; early example: 1950s “bugs” were literal moths in tube computers. Hackers exploit such flaws just as lock-pickers exploit bad locks.

    • First big hack (1834)
      The Blanc brothers bribed operators on France’s optical-telegraph network to slip stock tips through the error-correction mechanism, beating the market by days.

    • Phone-phreak era (1950s-1970s)
      Captain Crunch’s 2600 Hz whistle fooled switches into granting free calls; Jobs & Wozniak sold “blue boxes” doing the same.

    • Internet dawn & celebrity hackers
      Kevin Poulsen rerouted radio contests; Robert Morris’s worm crashed 10 % of the fledgling Internet; Kevin Mitnick mixed technical hacks with social engineering, landing on the FBI’s “Most Wanted.”

    • Hacker collectivism

      • Cypherpunks (1992): privacy, decentralization, crypto manifesto (free access, distrust authority).

      • Anonymous: leaderless “digital flock” coordinating online protests.

      • Chaos Computer Club (Berlin): white-hat research and public audits (e.g., Germany’s COVID app).

    • Four modern tribes

      1. White hats / researchers – find and disclose bugs, defend privacy.

      2. Criminal crews – profit-driven ransomware, card theft, etc.

      3. Mercenaries – vendors of spyware like Pegasus, sold to states.

      4. Nation-states – build cyber-armies; Stuxnet showed state-grade sabotage.

    • Why the bad reputation?
      Cyber-crime now out-earns all other transnational crime combined; 83 % of SMEs still lack basic defenses. As stakes rise—from personal data to national security—every hacker action feels existential.

    Bottom line: Hackers can be guardians or predators; their tools are neutral, but in a hyper-connected world the consequences—and the fear—have never been bigger.


    Hosted by Ausha. See ausha.co/privacy-policy for more information.

    Voir plus Voir moins
    32 min
  • #1 : Introduction
    May 4 2025

    First episode to introduce the aim of this podcast.


    Hosted by Ausha. See ausha.co/privacy-policy for more information.

    Voir plus Voir moins
    17 min