<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Open Source Security</title>
    <link>https://opensourcesecurity.io/</link>
    <description>Recent content on Open Source Security</description>
    <generator>Hugo -- 0.139.4</generator>
    <language>en</language>
    <lastBuildDate>Mon, 13 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://opensourcesecurity.io/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Open Source Malware with Paul McCarty</title>
      <link>https://opensourcesecurity.io/2026/2026-04-open-source-malware-paul-mccarty/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-04-open-source-malware-paul-mccarty/</guid> 
      <description>&lt;p&gt;Josh talks to Paul McCarty of Open Source Malware about &amp;hellip; open source malware. Paul explains why there aren&amp;rsquo;t many good open source malware datasets. We discuss why the existing data is lacking for many use cases. We of course touch on AI and the malware in skills problems and challenges. It&amp;rsquo;s a fun discussion with a lot of new and interesting problems we all have to deal with.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/mccartypaul/&#34;&gt;Paul McCarty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcemalware.com/&#34;&gt;Open Source Malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcemalware.com/blog&#34;&gt;Open Source Malware Blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open source was never about trust</title>
      <link>https://opensourcesecurity.io/2026/04-never-about-trust/</link>
      <pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/04-never-about-trust/</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s been a rough couple of weeks for open source&lt;/p&gt;
&lt;p&gt;There have been some high profile attacks like the TeamPCP events. Anthropic has a new model that&amp;rsquo;s going to create more security vulnerabilities than anyone can count. The number of security bug reports is going through the roof. AI slop is running rampant through GitHub. And let&amp;rsquo;s not even try to count all the hot takes from the LinkedInIstas.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s clear we should never trust open source again, but we should trust someone on linkedin whose company is built on top of all open source and uses AI to do everything. This feels like animal farm but the animals have all been replaced with frozen burritos. All burritos are equal, but some burritos like my linkedin posts!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Package management challenges with Andrew Nesbitt</title>
      <link>https://opensourcesecurity.io/2026/2026-04-ecosystems-andrew/</link>
      <pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-04-ecosystems-andrew/</guid> 
      <description>&lt;p&gt;Josh welcomes back Andrew Nesbitt to discuss some recent blog posts he wrote about the challenges of new ecosystems as well as challenges of no ecosystems like C. There aren&amp;rsquo;t very many people who look at multiple ecosystems in the way Andrew does. He has thoughts on why it&amp;rsquo;s so hard to create a new ecosystem as well as some of the reasons we don&amp;rsquo;t see a C language ecosystem. Andrew has a ton of interesting ideas and insight for us about both existing, new, and nonexistent ecosystems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source Security at scale with Michael Winser</title>
      <link>https://opensourcesecurity.io/2026/2026-03-michael-winser/</link>
      <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-03-michael-winser/</guid> 
      <description>&lt;p&gt;Josh talks to Michael Winser about a talk he gave at FOSDEM as well as his work on Alpha Omega at the Linux Foundation. Michael is approaching open source security in a way that nobody has ever tried before. What if we could fund some really big, really hard projects? It&amp;rsquo;s not cheap or easy, but he&amp;rsquo;s getting it done. We spend a lot of the time discussing package registries, which are a huge topic. Michael is doing some amazing work helping package registries which is the first step in a very long journey.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Eulogy for open source</title>
      <link>https://opensourcesecurity.io/2026/03-open-source-eulogy/</link>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/03-open-source-eulogy/</guid> 
      <description>&lt;p&gt;Thank you for clicking on the clickbait!&lt;/p&gt;
&lt;p&gt;What a year it&amp;rsquo;s been. It seems like open source is under constant attack. The security people don&amp;rsquo;t know what&amp;rsquo;s going on anymore. What day is it? It doesn&amp;rsquo;t matter.&lt;/p&gt;
&lt;p&gt;The latest open source mess is the popular open source scanner Trivy being compromised, for a month, then other open source projects downstream in the &amp;ldquo;chain&amp;rdquo; getting compromised, which will probably lead to more things getting compromised until we get back to Trivy someday. Then I think we have to call it a supply wheel. I&amp;rsquo;m not sure how these rules work.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2026 State of the Software Supply Chain with Brian Fox</title>
      <link>https://opensourcesecurity.io/2026/2026-03-SOTSSC-Brian-Fox/</link>
      <pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-03-SOTSSC-Brian-Fox/</guid> 
      <description>&lt;p&gt;Josh chats with Brian Fox from Sonatype about their 2026 State of the Software Supply Chain report. Most of the number continue to grow at alarming rates, but there&amp;rsquo;s some new interesting findings in this one. We discuss end of life and open source which is tough to define. We touch on what using AI with open source dependencies looks like (and why it&amp;rsquo;s broken), and we discuss the challenge of upgrading your open source dependencies in a way that doesn&amp;rsquo;t break everything. It&amp;rsquo;s a great report and great discussion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>MCP and Agent security with Luke Hinds</title>
      <link>https://opensourcesecurity.io/2026/2026-03-mcp-agent-luke/</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-03-mcp-agent-luke/</guid> 
      <description>&lt;p&gt;Josh talks to Luke Hinds, CEO of Always Further, about MCP and agent security. We start out talking about Luke&amp;rsquo;s new tool, nono which is a sandboxing tool that has AI agents in mind as a use case. We explain what MCP and agents are doing as well as why it&amp;rsquo;s so hard to secure them. It&amp;rsquo;s not impossible, but it&amp;rsquo;s not simple either. We end the show by discussing some of the more human aspects to security and how history may be repeating itself with security folks laughing at new users who don&amp;rsquo;t know any better.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The State of OpenSSL for pyca/cryptography with Alex Gaynor and Paul Kehrer</title>
      <link>https://opensourcesecurity.io/2026/2026-03-cryptography-alex-paul/</link>
      <pubDate>Mon, 09 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-03-cryptography-alex-paul/</guid> 
      <description>&lt;p&gt;Josh talks to Paul Kehrer and Alex Gaynor, from the Python Cryptographic Authority. Alex and Paul recently published a statement discuss the challenges posed by modern OpenSSL. We discuss the statement and their relationship with OpenSSL. We chat about some of the current features in cryptography, as well as some of what&amp;rsquo;s coming in the future. It&amp;rsquo;s a fun conversation that hits on a lot of great points.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://alexgaynor.net/&#34;&gt;Alex&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://langui.sh/&#34;&gt;Paul&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cryptography.io/en/latest/&#34;&gt;pyca/cryptography&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cryptography.io/en/latest/statements/state-of-openssl/&#34;&gt;The State of OpenSSL for pyca/cryptography&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x509-limbo.com/&#34;&gt;x509-limbo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/C2SP/C2SP&#34;&gt;Community Cryptography Specification Project&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rust coreutils with Sylvestre Ledru</title>
      <link>https://opensourcesecurity.io/2026/2026-03-rust-coreutils-sylvestre-ledru/</link>
      <pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-03-rust-coreutils-sylvestre-ledru/</guid> 
      <description>&lt;p&gt;Josh talks to Sylvestre Ledru about the Rust coreutils project. We&amp;rsquo;ve been using GNU coreutils for decades now, and the goal of Rust coreutils is to rewrite these utilities in Rust. The primary reason isn&amp;rsquo;t security, it&amp;rsquo;s to modernize the code and attract new contributors. Sylvestre discusses with quite pleasant relationship with the GNU coreutils developers, some of the challenges in the project. What Ubuntu using this by default meant, and also gives us some things to watch for in the future. It&amp;rsquo;s a super fun discussion about why Rust is not only awesome, but also the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Goose and the Agentic AI Foundation with Brad Axen</title>
      <link>https://opensourcesecurity.io/2026/2026-02-goose-aaif-brad-axen/</link>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-02-goose-aaif-brad-axen/</guid> 
      <description>&lt;p&gt;Josh chats with Brad Axen from Block about his creation Goose as well as the Agentic AI Foundation (AAIF). I am quite skeptical of many AI claims, but Brad has a very pragmatic view about where things are today and where we might see them head. Donating Goose to the AAIF is great news as well as seeing MCP and AGENTS.MD in the foundation. We discuss how to deal with the problem of raising up junior developers, challenges of AI PRs, and some thoughts on how to get started if you&amp;rsquo;re interested in AI development.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Global Vulnerability Intelligence Platform with Olle E. Johansson</title>
      <link>https://opensourcesecurity.io/2026/2026-02-GVIP-olle-johansson/</link>
      <pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-02-GVIP-olle-johansson/</guid> 
      <description>&lt;p&gt;Josh chats with Olle E. Johansson about the Global Vulnerability Intelligence Platform (GVIP). It&amp;rsquo;s no secret the current vulnerability systems are reaching a breaking point. Olle is one of the few people with a long term vision instead of trying to just fix the short term problems. His GVIP ideas are very good, but it&amp;rsquo;s a community effort and needs our help. Give it a listen and if it sounds interesting, come help us out!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Digital Sovereignty and Nextcloud with Frank Karlitschek</title>
      <link>https://opensourcesecurity.io/2026/2026-02-nextcloud-frank-karlitschek/</link>
      <pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-02-nextcloud-frank-karlitschek/</guid> 
      <description>&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/frankkarlitschek/&#34;&gt;Frank&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nextcloud.com/&#34;&gt;Nextcloud&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/nextcloud/all-in-one#how-to-use-this&#34;&gt;Nextcloud getting started&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dsi.nextcloud.com/&#34;&gt;Digital Sovereignty Index&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;
&lt;h2 id=&#34;hahahugoshortcode67s0hbhb&#34;&gt;
    &lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;
      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&#34; allowfullscreen=&#34;allowfullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/0QKt5EzyT9M?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;
    &lt;/div&gt;
&lt;/h2&gt;
&lt;h2 id=&#34;episode-transcript&#34;&gt;Episode Transcript&lt;/h2&gt;
&lt;p&gt;Josh Bressers (00:00)
Today, open source securities talking to Frank Kolichek, the founder and CEO of Nextcloud. I am holy cow. I&amp;rsquo;m excited to have Frank here because I feel like European digital sovereignty and Nextcloud have been just like on the top of the headlines for months now. So Frank, welcome so much.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Art of Crisis Management with David Bernstein</title>
      <link>https://opensourcesecurity.io/2026/2026-02-crisis-management-david-bernstein/</link>
      <pubDate>Mon, 02 Feb 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-02-crisis-management-david-bernstein/</guid> 
      <description>&lt;p&gt;Josh talks to David Bernstein about the world of crisis management and business continuity. David is a certified emergency manager and tell us about preparing for both digital and physical disruptions. Everything is IT now, so the way we think about disaster preparedness is changing. We talk about understanding risks, creating plans, and the role of practice in the world of crisis management. This is a super interesting universe and Dave was very patient and kind. I learned a lot and can&amp;rsquo;t wait for Dave to come back.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is software ever done?</title>
      <link>https://opensourcesecurity.io/2026/01-is-software-ever-done/</link>
      <pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/01-is-software-ever-done/</guid> 
      <description>&lt;p&gt;I posted a graph on LinkedIn. It showed that of the 10 million open source projects tracked by &lt;a href=&#34;https://ecosyste.ms/&#34;&gt;ecosyste.ms&lt;/a&gt;, more than half haven&amp;rsquo;t been updated in two years. I didn’t suggest old was bad or good, but I got a number of replies about most of this software is &amp;ldquo;done&amp;rdquo; so it’s fine. We don&amp;rsquo;t have any evidence either way, I&amp;rsquo;m unwilling to make any claims about the numbers (yet, I&amp;rsquo;m working on it). This got me wondering what it would mean for software to be &amp;ldquo;done&amp;rdquo;. Which then led to the question is anything ever done? It&amp;rsquo;s a lot harder to figure this out than I had expected.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WTF is a passkey with William Brown</title>
      <link>https://opensourcesecurity.io/2026/2026-01-passkey-william-brown/</link>
      <pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-01-passkey-william-brown/</guid> 
      <description>&lt;p&gt;William Brown is back! This time Josh chats with him about Passkeys. WTF are they? A Passkey is a form of multi factor authentication, but it&amp;rsquo;s not super obvious what that really means. William does a fantastic job explaining what a Passkey is, how we got to where we are today with Passkeys. He shares a ton of explanations about the whole world of authentication along the way. Some of this stuff is basically magic.&lt;/p&gt;</description>
    </item>
    <item>
      <title>All about Suricata with Victor Julien</title>
      <link>https://opensourcesecurity.io/2026/2026-01-suricata-victor-julien/</link>
      <pubDate>Mon, 19 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-01-suricata-victor-julien/</guid> 
      <description>&lt;p&gt;Josh discusses Suricata with Victor Julien, the founder and lead developer of the Suricata project. Victor explains the history of Suricata, its impact on cybersecurity, and the community that keeps it all running. Challenges like encrypted traffic and the evolution of open-source projects. Victor even gives us a glimpse into what he sees as the future of the project. There&amp;rsquo;s a lot to learn about Suricata in this one.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@inliniac@mastodon.social&#34;&gt;Victor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://suricata.io/&#34;&gt;Suricata&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2025/2025-03-oss_foundations_kelley_misata/&#34;&gt;Kelley episode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/OISF/suricata&#34;&gt;Suricata github&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Cathedral, the Megachurch, and the Bazaar</title>
      <link>https://opensourcesecurity.io/2026/01-cathedral-megachurch-bazaar/</link>
      <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/01-cathedral-megachurch-bazaar/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;re of a certain age, you probably remember the essay &lt;a href=&#34;https://en.wikipedia.org/wiki/The_Cathedral_and_the_Bazaar&#34;&gt;The Cathedral and the Bazaar&lt;/a&gt;. The TL;DR was that old open source was the cathedral of exclusive developers and groups. Then the Bazaar showed up (which was the Linux Kernel for example) and that freed us from the shackles of the cathedral.&lt;/p&gt;
&lt;p&gt;Except if we look at how things evolved, it wasn&amp;rsquo;t actually a bazaar. It was a bunch of roadside churches that are now megachurches. But there is still a bazaar, and it&amp;rsquo;s holding up our modern infrastructure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Iocaine poisons bots with Gergely Nagy</title>
      <link>https://opensourcesecurity.io/2026/2026-01-iocaine-algernon/</link>
      <pubDate>Mon, 12 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-01-iocaine-algernon/</guid> 
      <description>&lt;p&gt;Josh talks to Gergely Nagy (algernon) about his tool Iocaine. Iocaine creates a maze to trap scraping bots in a world a fake pages they cannot escape. algernon tells us how Iocaine effectively traps bots by serving them endless loops of nonsensical URLs and web pages. It&amp;rsquo;s an extremely clever tool that&amp;rsquo;s designed to be completely hidden from normal users, but not hidden to the scrapers.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gergo.csillger.hu/&#34;&gt;Gergely&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://iocaine.madhouse-project.org/&#34;&gt;Iocaine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://come-from.mad-scientist.club/@algernon&#34;&gt;algernon on Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://3.nam-shub-of-enki.iocaine.madhouse-project.org/index.html&#34;&gt;Nam-Shub of Enki&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://come-from.mad-scientist.club/@iocaine&#34;&gt;Iocaine on mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://poison.madhouse-project.org/&#34;&gt;Iocaine example site&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Anubis with Xe Iaso</title>
      <link>https://opensourcesecurity.io/2026/2026-01-anubis-xe/</link>
      <pubDate>Mon, 05 Jan 2026 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2026/2026-01-anubis-xe/</guid> 
      <description>&lt;p&gt;Josh chats with Xe Iaso, the creator of Anubis the web AI firewall. We discuss how Anubis is tackling bots and scrapers. The discussion around the scrapers is fascinating and challenging, these things are everywhere and don&amp;rsquo;t behave very nicely. There&amp;rsquo;s also discussion about running a successful open source project. Xe has a lot of experience to share with us, you&amp;rsquo;re going to learn something new with this one.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://pony.social/@cadey&#34;&gt;Xe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://anubis.techaro.lol/&#34;&gt;Anubis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xeiaso.net/&#34;&gt;Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://anubis.techaro.lol/blog/2025/cpu-core-odd/&#34;&gt;Odd number of cores blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://commoncrawl.org/&#34;&gt;Common Crawl&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Rustls with Dirkjan and Joe</title>
      <link>https://opensourcesecurity.io/2025/2025-12-rustls-dirkjan-joe/</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-12-rustls-dirkjan-joe/</guid> 
      <description>&lt;p&gt;Josh talk to Dirkjan and Joe about Rustls (pronounced rustles), a Rust-based TLS library. Dirkjan and Joe are developers on Rustls. We talk about the history that got us to this point. The many many challenges in writing a TLS library (Rust or not). We also chat about some of what&amp;rsquo;s to come. Rustls has an OpenSSL compatibility layer which makes is a really interesting project.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hachyderm.io/@djc&#34;&gt;Dirkjan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@ctz&#34;&gt;Joe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rustls.dev/&#34;&gt;Rustls&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Daniel Thompson answers: Does the CRA apply to Santa?</title>
      <link>https://opensourcesecurity.io/2025/2025-12-daniel-cra-santa/</link>
      <pubDate>Mon, 22 Dec 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-12-daniel-cra-santa/</guid> 
      <description>&lt;p&gt;Josh welcomes back Daniel Thompson explore the rather silly question of whether Santa Claus needs to be compliant with the Cyber Resilience Act (CRA). This episode was intended to be silly, but it ended up being an incredibly interesting conversation. Daniel explained a great deal about how the CRA works and how it could apply to Santa Claus. The TL;DR is even if he&amp;rsquo;s giving out free stuff, the CRA almost certainly applies. Daniel also fills us in on his book (you can email Josh to enter into a drawing for a copy), and his work on web browsers for the CRA. It&amp;rsquo;s an incredibly informative discussion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Foundation Europe with Gabriele Columbro</title>
      <link>https://opensourcesecurity.io/2025/2025-12-lfeu-gab/</link>
      <pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-12-lfeu-gab/</guid> 
      <description>&lt;p&gt;Josh has a chat with Gabriele Columbro, Executive Director of the Fintech Open Source Foundation and General Manager of Linux Foundation Europe. We of course discuss the Cyber Resilience Act (CRA), the evolving landscape of open source regulation, and the collaborative efforts of major foundations. Open source is everywhere, but there&amp;rsquo;s also a ton of work to do now. Gabriele has really good insight into where things are today and where they are heading in the future for open source and regulation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Updating open source dependencies with Jamie Tanna</title>
      <link>https://opensourcesecurity.io/2025/2025-12-renovate-jamie/</link>
      <pubDate>Mon, 08 Dec 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-12-renovate-jamie/</guid> 
      <description>&lt;p&gt;Josh discusses updating open source dependencies with Jamie Tanna. Jamie works on Renovate which gives them a lot of insight into the challenges of keeping your open source updated. We discuss the challenges of semantic versioning, supply chain security, and AI-generated code. If you&amp;rsquo;re new or old to the world of open source dependencies, there&amp;rsquo;s something to learn from this chat.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.jvt.me/&#34;&gt;Jamie Tanna&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://podcasts.apple.com/ge/podcast/versioning-we-did-it-to-ourselves/id1783181295?i=1000718105307&#34;&gt;Versioning: We Did It To Ourselves&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1172/&#34;&gt;XKCD Workflow&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>TARmageddon with Alex Zenla</title>
      <link>https://opensourcesecurity.io/2025/2025-12-tarmageddon-alex/</link>
      <pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-12-tarmageddon-alex/</guid> 
      <description>&lt;p&gt;Josh discusses the TARmageddon vulnerability with Alex Zenla, CTO of Edera. In this episode, we explore the discovery of the TARmageddon vulnerability. It&amp;rsquo;s especially interesting because it&amp;rsquo;s Rust, but also involves multiple end of life crates. Alex shares the story of how Edera managed to figure all this out (it was not simple). Hard problems are still hard, but there&amp;rsquo;s a lot of lessons in this one.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://bsky.app/profile/alex.zenla.io&#34;&gt;Alex Zenla&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.edera.dev/stories/tarmageddon&#34;&gt;TARmageddon&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Can AI replace our dependencies?</title>
      <link>https://opensourcesecurity.io/2025/11-ai-replace-deps/</link>
      <pubDate>Wed, 26 Nov 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/11-ai-replace-deps/</guid> 
      <description>&lt;p&gt;I keep seeing commentary about AI making open source dependencies obsolete. The idea is that instead of using an open source dependency, the AI will just write all the code you need. No more need for that random person in Nebraska. They can finally take a well deserved break!&lt;/p&gt;
&lt;p&gt;Some people think this is inevitable, some think it&amp;rsquo;s hogwash. I like to take the stance of disliking everything equally. But to better understand all of this, let&amp;rsquo;s break it up into a few possible outcomes. There are 4 basic things that could happen if we take these arguments to their ridiculous extremes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Python Security with Seth Larson</title>
      <link>https://opensourcesecurity.io/2025/2025-11-python-security-seth-larson/</link>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-11-python-security-seth-larson/</guid> 
      <description>&lt;p&gt;In this episode Seth Larson gives us a cornucopia of topics relating to Python security. Seth discusses the Python Software Foundation&amp;rsquo;s decision to reject a significant grant NSF. Diversity is a big deal to python, so this was a no brainier. We discuss the upcoming PyCon US conference, featuring a new security track that fosters collaboration between developers and security experts. Josh is a huge fan of having a security track at developer conferences. And we close on a paper about zip and tar archives Seth wrote. It seems like we should have zip and tar security figured out by now, but we don&amp;rsquo;t. Thankfully Seth is working on it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Vendor Firmware Service with Richard Hughes</title>
      <link>https://opensourcesecurity.io/2025/2025-11-lvfs-richard-hughes/</link>
      <pubDate>Mon, 17 Nov 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-11-lvfs-richard-hughes/</guid> 
      <description>&lt;p&gt;Josh talks to Richard Hughes about the world of firmware. We cover how Richard&amp;rsquo;s journey from developing the ColorHug led to the creation of the Linux Vendor Firmware Service (LVFS), changing how firmware updates are managed for nearly every Linux user. Updating firmware has always been dicey, and on Linux it used to be impossible. Richard helps us understand how this all works and how we can all help out.&lt;/p&gt;</description>
    </item>
    <item>
      <title>NPM supply chain attacks with Charlie Eriksen</title>
      <link>https://opensourcesecurity.io/2025/2025-11-npm-charlie/</link>
      <pubDate>Mon, 10 Nov 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-11-npm-charlie/</guid> 
      <description>&lt;p&gt;Josh chats with Charlie Eriksen, a security researcher at Aikido Security. We discuss the recent NPM supply chain attacks that affect hundreds of packages. Charlie shares his experiences dealing with recent security breaches, the challenges of maintaining trust in open source software, and the importance of proactive measures to safeguard open source. The rapid pace of change is impacting our security practices and what steps can be taken to foster resilience in the face of evolving threats.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Detecting XZ in Debian with Otto Kekäläinen</title>
      <link>https://opensourcesecurity.io/2025/2025-11-xz-debian-otto/</link>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-11-xz-debian-otto/</guid> 
      <description>&lt;p&gt;In this episode, Josh and Otto dive into the world of Debian packaging, exploring the challenges of supply chain security and the importance of transparency in open source projects. They discuss Otto&amp;rsquo;s blog post about the XZ backdoor and how it&amp;rsquo;s a nearly impossible attack to detect. Otto does a great job breaking down an incredibly complex problem into understandable pieces.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://optimizedbyotto.com/about/&#34;&gt;Otto&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://optimizedbyotto.com/post/xz-backdoor-debian-git-detection/&#34;&gt;Could the XZ backdoor have been detected with better Git and Debian packaging practices?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Eclipse Foundation SBOMs with Mikael Barbero</title>
      <link>https://opensourcesecurity.io/2025/2025-10-eclipse-sbom-mikael-barbero/</link>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-10-eclipse-sbom-mikael-barbero/</guid> 
      <description>&lt;p&gt;In this conversation, Josh speaks with Mikael Barbero, head of security at the Eclipse Foundation. They discuss the foundation&amp;rsquo;s role in enhancing the security posture of open source projects, the importance of Software Bill of Materials (SBOMs), and the various security services provided to projects. Mikael explains the challenges and strategies involved in implementing security best practices across a diverse range of projects, as well as the foundation&amp;rsquo;s proactive approach to navigating security regulations and compliance. This is some great security work happening for open source projects.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Actually finding vulnerabilities using AI with Joshua Rogers</title>
      <link>https://opensourcesecurity.io/2025/2025-10-ai-joshua-rogers/</link>
      <pubDate>Mon, 13 Oct 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-10-ai-joshua-rogers/</guid> 
      <description>&lt;p&gt;I chat with Joshua Rogers about a blog post he wrote as well as some bugs he submitted to the curl project. Joshua explains how he went searching for some AI tools to help find security bugs, and found out they can work, if you&amp;rsquo;re a competent human. We discuss the challenges of finding effective tools, the importance of human oversight in triaging vulnerabilities, and how to submit those bugs to open source projects responsibly. It&amp;rsquo;s a very sane and realistic conversation about what AI tools can and can&amp;rsquo;t do, and how humans should be interacting with these things.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Sustaining Package Repositories with Brian Fox</title>
      <link>https://opensourcesecurity.io/2025/2025-10-sustaining-repos-brian-fox/</link>
      <pubDate>Mon, 06 Oct 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-10-sustaining-repos-brian-fox/</guid> 
      <description>&lt;p&gt;Brian Fox discusses the challenges and future of open source package repository infrastructure. We discuss the complexities of managing public registries, the impact of overconsumption, and the importance of sustainable practices in the open source community. Brian tells us how organizations can reduce their footprint and contribute to a more balanced ecosystem. The package repositories cannot continue to be the world&amp;rsquo;s CDN.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/brianefox/&#34;&gt;Brian Fox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openssf.org/blog/2025/09/23/open-infrastructure-is-not-free-a-joint-statement-on-sustainable-stewardship/&#34;&gt;Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sonatype.com/blog/from-abuse-to-alignment-why-we-need-sustainable-open-source-infrastructure&#34;&gt;Brian&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/&#34;&gt;Atlantic Council - Avoiding the success trap: Toward policy for open-source software as infrastructure&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Arch Linux Security with Foxboron and Anthraxx</title>
      <link>https://opensourcesecurity.io/2025/2025-09-arch-foxboron-anthraxx/</link>
      <pubDate>Mon, 29 Sep 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-09-arch-foxboron-anthraxx/</guid> 
      <description>&lt;p&gt;Join us for a conversation with Foxboron (Morten Linderud) and Anthraxx (Levente Polyak), members of the Arch Linux security team. We talk about the difficulties of maintaining a Linux distribution, the challenges of handling CVEs, and the dedication of volunteers who keep the open-source community working (and how overworked those volunteers are). We explain what makes Arch a little different, how they approach their security process, and what sort of help they would love to see in the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OpenSSL with Hana Andersen and Anton Arapov</title>
      <link>https://opensourcesecurity.io/2025/2025-09-openssl-hana-anton/</link>
      <pubDate>Mon, 22 Sep 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-09-openssl-hana-anton/</guid> 
      <description>&lt;p&gt;I discuss all things OpenSSL with Hana Andersen and Anton Arapov from the OpenSSL Corporation. Discover the intricacies of organizing the first-ever OpenSSL conference in Prague, the importance of post-quantum cryptography, and the evolution of OpenSSL from a small team to a global community. Whether you&amp;rsquo;re a seasoned cryptographer or just curious about the future of secure communications, this episode offers insights and stories. Don&amp;rsquo;t miss out on learning how OpenSSL is still shaping the future of cryptography.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Python Software Foundation with Deb Nicholson</title>
      <link>https://opensourcesecurity.io/2025/2025-09-psf-deb-nicholson/</link>
      <pubDate>Mon, 15 Sep 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-09-psf-deb-nicholson/</guid> 
      <description>&lt;p&gt;In this episode I discuss the Python Software Foundation with Deb Nicholson. We discuss their contributions to the Python programming community. Learn how this dedicated organization supports the growth and innovation of Python, fostering an ecosystem for developers worldwide. Everything funding open-source projects to organizing community events, discover the initiatives that make the Python Software Foundation a force for positive change in the tech world.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/denicholson/&#34;&gt;Deb&amp;rsquo;s Linkedin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=wfDngUP-GEw&#34;&gt;Python Core Devs talk about the GIL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=J6VVXFKOoyM&#34;&gt;Whither Python?&lt;/a&gt; Dr. Russell Keith Mcgee talks about Python&amp;rsquo;s history, including how the shift from 2 to 3 went.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=GfH4QL4VqJ0&#34;&gt;Python: The Documentary, an origin story&lt;/a&gt; the recently released documentary about the origins of Python&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.python.org/psf/donations/&#34;&gt;Donate to the PSF as an individual&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.python.org/psf/sponsorship/&#34;&gt;Donate to PSF as a company&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using Mercator to map assets with Didier Barzin</title>
      <link>https://opensourcesecurity.io/2025/2025-09-mercator-didier-barzin/</link>
      <pubDate>Mon, 08 Sep 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-09-mercator-didier-barzin/</guid> 
      <description>&lt;p&gt;In this episode, we the information system mapping tool Mercator with Didier Barzin, a CISO at a hospital in Luxembourg. Discover how Mercator revolutionizes the way organizations map their complex information systems. From hospitals to universities and even the banking sector. Mercator helps manage and protect vast networks by creating dynamic, comprehensive maps that replace outdated Excel sheets. Join us as we explore the challenges and innovations in information security and the impact of Mercator on various industries.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Talos Linux security with Andrey Smirnov</title>
      <link>https://opensourcesecurity.io/2025/2025-09-talos-andrey-smirnov/</link>
      <pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-09-talos-andrey-smirnov/</guid> 
      <description>&lt;p&gt;In this episode, I discuss into the security features of Talos Linux with Andrey Smirnov. Andrey explains how Talos focuses on its immutability and minimal attack surface. Discover how these enhancements fortify your systems against vulnerabilities, ensuring a secure and resilient infrastructure. Join us as we explore the security advancements that make Talos Linux not only a super easy way to run Kubernetes, but also a very secure way.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.talos.dev/&#34;&gt;Talos Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/smirnovandrey/&#34;&gt;Andrey&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source is one person</title>
      <link>https://opensourcesecurity.io/2025/08-oss-one-person/</link>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/08-oss-one-person/</guid> 
      <description>&lt;p&gt;The Register recently published a story titled &lt;a href=&#34;https://www.theregister.com/2025/08/27/popular_nodejs_utility_used_by/&#34;&gt;Putin on the code: DoD reportedly relies on utility written by Russian dev&lt;/a&gt;. They should be ashamed of this story. This poor open source developer is getting beat up now to score some internet points. It&amp;rsquo;s very upsetting.&lt;/p&gt;
&lt;p&gt;But anyway, let&amp;rsquo;s look at some receipts.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re not real smrt, it seems like pointing out an open source project is written by one person in a country you don&amp;rsquo;t like is a bad thing. It could be. But it also could be the software running THE WHOLE F*CKING PLANET is written by one person. In a country. But we have no idea which country. It&amp;rsquo;s not the same person mind you, but it&amp;rsquo;s one person.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Discussing the Open Source, Open Threats? paper with Behzad and Ali</title>
      <link>https://opensourcesecurity.io/2025/2025-08-oss-threats-ali-behzad/</link>
      <pubDate>Mon, 25 Aug 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-08-oss-threats-ali-behzad/</guid> 
      <description>&lt;p&gt;In this episode I chat with the authors of a recent paper on open source security: Open Source, Open Threats? Investigating Security Challenges in Open-Source Software. I chat with Ali Akhavani and Behzad Ousat about their findings. There are interesting data points in the paper such as a 98% increase in reported vulnerabilities compared to a 25% growth in open source ecosystems. We discuss the challenges of maintaining security in a rapidly expanding digital landscape, and learn about the role of community engagement and automated tools in addressing these discrepancies. It&amp;rsquo;s a great paper and a fantastic discussion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>crates.io trusted publishing with Tobias Bieniek</title>
      <link>https://opensourcesecurity.io/2025/2025-08-cratesio-trusted-publishing-tobias/</link>
      <pubDate>Mon, 18 Aug 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-08-cratesio-trusted-publishing-tobias/</guid> 
      <description>&lt;p&gt;In this episode we discuss crates.io trusted publishing with Tobias Bieniek. We cover the steps crates.io is taking to enhance supply chain security through trusted publishing, a method that leverages short-lived tokens and GitHub actions to safeguard against unauthorized access. Tobias shares insights into the challenges of managing a large-scale open-source repository, offering a glimpse into the future of secure software distribution. Tune in to learn how these advancements are shaping the landscape of open-source development.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE update with Patrick Garrity</title>
      <link>https://opensourcesecurity.io/2025/2025-08-cve-patrick-garrity/</link>
      <pubDate>Mon, 11 Aug 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-08-cve-patrick-garrity/</guid> 
      <description>&lt;p&gt;In this episode I chat with Patrick Garrity from VulnCheck. We discuss the chaos that has enveloped the CVE and NVD programs over the past two years. We cover some of the transparency and communication challenges with the existing program. What some of the new things that have started to emerge as well as why they seem to be struggling. We end on the note that the last 3 months haven&amp;rsquo;t been confidence inspiring. It&amp;rsquo;s likely in 6 months everyone will be scrambling to deal with a difficult situation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>GCVE with Cédric Bonhomme and Alexandre Dulaunoy</title>
      <link>https://opensourcesecurity.io/2025/2025-08-gcve-cedric-alex/</link>
      <pubDate>Mon, 04 Aug 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-08-gcve-cedric-alex/</guid> 
      <description>&lt;p&gt;In this episode I discuss GCVE and Vulnerability-Lookup with Alex and Cedric from CIRCL. GCVE offers a decentralized approach, allowing organizations to assign their own IDs and publish vulnerabilities independently. Vulnerability-Lookup is the tool that makes GCVE a reality. The flexibility addresses many of the limitations we see today with a single centralized ID system. The work happening by CIRCL on GCVE is very impressive, with all the current CVE turmoil, this is a project we should all be paying attention to.&lt;/p&gt;</description>
    </item>
    <item>
      <title>EU Regulations will change everything with Daniel Thompson</title>
      <link>https://opensourcesecurity.io/2025/2025-07-eu-regulations-daniel-thompson/</link>
      <pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-07-eu-regulations-daniel-thompson/</guid> 
      <description>&lt;p&gt;In this episode, we dive into the Product Liability Directive and Cyber Resilience Act with Daniel Thompson, CEO of Crab Nebula. The EU&amp;rsquo;s new legislative framework impacts manufacturers in ways we don&amp;rsquo;t totally understand, but are going to bring substantial changes to how companies use and develop open source. Daniel explains the broader implications for software security and the future of digital products in the European market.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/daniel-thompson-yvetot-a98301222/&#34;&gt;Daniel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://crabnebula.dev/&#34;&gt;Crab Nebula&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open source microprocessors with Jan Pleskac</title>
      <link>https://opensourcesecurity.io/2025/2025-07-open-source-microprocessors/</link>
      <pubDate>Mon, 21 Jul 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-07-open-source-microprocessors/</guid> 
      <description>&lt;p&gt;In this episode Jan Pleskac, CEO and co-founder of Tropic Square, shares insights on the challenges and innovations in creating open and auditable hardware. While most hardware is very closed, Tropic Square is working to change this. WE discuss how open source can enhance security, the complexities of integrating third-party technologies, and the future of secure computing devices.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/pleskacj/&#34;&gt;Jan Pleskac&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tropicsquare.com/&#34;&gt;Tropic Square&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/tropicsquare&#34;&gt;Tropic Square GitHub&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Package URLs with Philippe Ombredanne</title>
      <link>https://opensourcesecurity.io/2025/2025-06-purl-philippe-ombredanne/</link>
      <pubDate>Mon, 23 Jun 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-06-purl-philippe-ombredanne/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;m joined by Philippe Ombredanne, creator of the Package URL (PURL), to discuss the surprisingly complex and messy problem of simply identifying open source software packages. We dive into how PURLs provide a universal, common-sense standard that is becoming essential for the future of SBOMs and securing the software supply chain.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/philippeombredanne/&#34;&gt;Philippe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://aboutcode.org/&#34;&gt;AboutCode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/package-url/purl-spec&#34;&gt;PURL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ai-gen-code-search.readthedocs.io/en/latest/&#34;&gt;AI-Generated Code Search&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hobbyist Maintainers with Thomas DePierre</title>
      <link>https://opensourcesecurity.io/2025/2025-06-hobbyist-thomas-depierre/</link>
      <pubDate>Mon, 16 Jun 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-06-hobbyist-thomas-depierre/</guid> 
      <description>&lt;p&gt;Thomas DePierre joins Open Source Security to discuss the central idea from his blog post, &amp;ldquo;You are all on the hobbyist maintainers turf now,&amp;rdquo; exploring the massive disconnect between the corporate world that consumes open source and the hobbyist community that actually produces it. The conversation reveals this isn&amp;rsquo;t a new problem, but a long-standing reality whose consequences for security, stability, and the future of software we are only now beginning to truly confront.&lt;/p&gt;</description>
    </item>
    <item>
      <title>STIG automation with Aaron Lippold</title>
      <link>https://opensourcesecurity.io/2025/2025-06-stig-automation-aaron-lippold/</link>
      <pubDate>Mon, 09 Jun 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-06-stig-automation-aaron-lippold/</guid> 
      <description>&lt;p&gt;I chat with Aaron Lippold, creator of MITRE&amp;rsquo;s Security Automation Framework (SAF), to discuss how to escape the pain of manual STIG compliance. We explore the technical details of open-source tools like InSpec, Heimdall, and Vulcan that automate validation, normalize diverse security data, and streamline the entire security authoring process.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/aaronlippold/&#34;&gt;Aaron&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://saf.mitre.org/&#34;&gt;MITRE SAF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ecosyste.ms with Andrew Nesbitt</title>
      <link>https://opensourcesecurity.io/2025/2025-06-ecosystems_andrew_nesbitt/</link>
      <pubDate>Mon, 02 Jun 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-06-ecosystems_andrew_nesbitt/</guid> 
      <description>&lt;p&gt;I recently chatted with Andrew Nesbitt about his project, Ecosyste.ms. Ecosyste.ms catalogs open source projects by tracking packages, dependencies, repositories, and more. With this dataset Andrew is able to incredible insights into the world of open source. We chat all about how Ecosyste.ms works and how he manages to wrangle all this data.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.social/@andrewnez&#34;&gt;Andrew&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ecosyste.ms/&#34;&gt;Ecosyste.ms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opencollective.com/&#34;&gt;Open Collective&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/tac/issues/101&#34;&gt;OpenSSF Issue 101&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Curl vs AI with Daniel Stenberg</title>
      <link>https://opensourcesecurity.io/2025/2025-05-curl_vs_ai_with_daniel_stenberg/</link>
      <pubDate>Mon, 26 May 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-05-curl_vs_ai_with_daniel_stenberg/</guid> 
      <description>&lt;p&gt;Daniel Stenberg, the maintainer of Curl, discusses the increase in AI security reports that are wasting the time of maintainers. We discuss Curl&amp;rsquo;s new policy of banning the bad actors while establishing some pretty sane AI usage guidelines. We chat about how this low-effort, high-impact abuse pattern is a denial-of-service attack on the curl project (and other open source projects too).&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://daniel.haxx.se/&#34;&gt;Daniel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://curl.se/&#34;&gt;Curl&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2025/05/07/curl_ai_bug_reports/&#34;&gt;Curl project founder snaps over deluge of time-sucking AI slop bug reports&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://curl.se/dev/contribute.html#on-ai-use-in-curl&#34;&gt;Curl AI usage guide&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Repository signing with Kairo De Araujo</title>
      <link>https://opensourcesecurity.io/2025/2025-05-rstuf-with-kairo-de-araujo/</link>
      <pubDate>Mon, 19 May 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-05-rstuf-with-kairo-de-araujo/</guid> 
      <description>&lt;p&gt;I recently had a chat with Kairo about a project he maintains called Repository Service for TUF (RSTUF). We explain why TUF is tough (har har har), what RSTUF can do, and some of the challenges around securing repositories.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/kairoaraujo/&#34;&gt;Kairo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/repository-service-tuf&#34;&gt;RSTUF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://theupdateframework.io/&#34;&gt;TUF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://repository-service-tuf.readthedocs.io/en/stable/#slack-channel&#34;&gt;RSTUF OpenSSF Slack Channel&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;
&lt;h2 id=&#34;hahahugoshortcode29s0hbhb&#34;&gt;
    &lt;div style=&#34;position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;&#34;&gt;
      &lt;iframe allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&#34; allowfullscreen=&#34;allowfullscreen&#34; loading=&#34;eager&#34; referrerpolicy=&#34;strict-origin-when-cross-origin&#34; src=&#34;https://www.youtube.com/embed/c9SyCE6KsTo?autoplay=0&amp;amp;controls=1&amp;amp;end=0&amp;amp;loop=0&amp;amp;mute=0&amp;amp;start=0&#34; style=&#34;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;&#34; title=&#34;YouTube video&#34;&gt;&lt;/iframe&gt;
    &lt;/div&gt;
&lt;/h2&gt;
&lt;h2 id=&#34;the-update-framework-tuf-fundamentals&#34;&gt;The Update Framework (TUF) Fundamentals&lt;/h2&gt;
&lt;p&gt;TUF has been around for a long time now, starting out as research at New York University. At its core, TUF has a goal of letting clients securely fetch artifacts from package repositories. This sounds simple, or at least not super hard, but it&amp;rsquo;s actually a really hard problem. TUF provides a framework for signing packages that enables much stronger security guarantees than the traditional approach of curl piped to bash.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Securing GitHub Actions with William Woodruff</title>
      <link>https://opensourcesecurity.io/2025/2025-05-securing-github-actions-william-woodruff/</link>
      <pubDate>Mon, 12 May 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-05-securing-github-actions-william-woodruff/</guid> 
      <description>&lt;p&gt;William Woodruff discussed his project, Zizmor, a security linter designed to help developers identify and fix vulnerabilities within their GitHub Actions workflows. This tool addresses inherent security risks in GitHub Actions, such as injection vulnerabilities, permission issues, and mutable tags, by providing static analysis and remediation guidance. Fresh off the heels of the tj-actions/changed-files backdoor, this is a great topic with some things everyone can do right away.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://yossarian.net/&#34;&gt;William&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.zizmor.sh/&#34;&gt;Zizmor&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Embedded Security with Paul Asadoorian</title>
      <link>https://opensourcesecurity.io/2025/2025-05-embedded-security-with-paul-asadoorian/</link>
      <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-05-embedded-security-with-paul-asadoorian/</guid> 
      <description>&lt;p&gt;Recently, I had the pleasure of chatting with Paul Asadoorian, Principal Security Researcher at Eclypsium and the host of the legendary Paul&amp;rsquo;s Security Weekly podcast. Our conversation dove into the often-murky waters of embedded systems and the Internet of Things (IoT), sparked by a specific vulnerability discussion on Paul&amp;rsquo;s show concerning reference code for the popular ESP32 microcontroller.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://securitypodcaster.com/&#34;&gt;Paul&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://eclypsium.com/&#34;&gt;Eclypsium&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://eclypsium.com/podcasts/&#34;&gt;Below the surface podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rvasec.com/&#34;&gt;RVAsec&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>tj-actions with Endor Lab&#39;s Dimitri Stiliadis</title>
      <link>https://opensourcesecurity.io/2025/2025-04-tjactions_with_dimitri_stiliadis/</link>
      <pubDate>Mon, 28 Apr 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-04-tjactions_with_dimitri_stiliadis/</guid> 
      <description>&lt;p&gt;Dimitri Stiliadis, CTO from Endor Labs, discusses the recent tj-actions/changed-files supply chain attack, where a compromised GitHub Action exposed CI/CD secrets. We explore the impressive multi-stage attack vector and the broader often-overlooked vulnerabilities in our CI/CD pipelines, emphasizing the need to treat these build systems with production-level security rigor instead of ignoring them.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/stiliadis/&#34;&gt;Dimitri&amp;rsquo;s Linkedin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.endorlabs.com/&#34;&gt;Endor Labs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised&#34;&gt;Harden-Runner detection: tj-actions/changed-files action is compromised&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/&#34;&gt;Unit 42 tj-actions analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What&#39;s happening with CVE</title>
      <link>https://opensourcesecurity.io/2025/04-cve-status/</link>
      <pubDate>Wed, 23 Apr 2025 20:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/04-cve-status/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;m not a super expert in all this, but I know enough to be dangerous. If I make any mistakes, please let me know (there are many ways to contact me listed in the &amp;ldquo;Contact&amp;rdquo; menu). I will clearly mark any changes to the post due to errors, feel free to check back and see what I got wrong. Since the CVE people won&amp;rsquo;t tell us anything useful, let&amp;rsquo;s use &lt;a href=&#34;https://en.wikipedia.org/wiki/Ward_Cunningham#%22Cunningham&#39;s_Law%22&#34;&gt;Cunningham&amp;rsquo;s Law&lt;/a&gt; to our advantage.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Syft, Grype, and Grant with Alan Pope</title>
      <link>https://opensourcesecurity.io/2025/2025-04-syft-grype-grant-alan-pope/</link>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-04-syft-grype-grant-alan-pope/</guid> 
      <description>&lt;p&gt;I chat with Alan Pope about the open source security tools Syft, Grype, and Grant. These tools help create Software Bills of Materials (SBOMs) and scan for vulnerabilities. Learn why generating and storing SBOMs is crucial for understanding your software supply chain and quickly responding to new threats like Log4Shell.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://popey.com/&#34;&gt;Alan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/syft/&#34;&gt;Syft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/grype&#34;&gt;Grype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/grant&#34;&gt;Grant&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://linuxmatters.sh/&#34;&gt;Linux Matters podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://anchore.com/opensource/&#34;&gt;https://anchore.com/opensource/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Can we trust CVE?</title>
      <link>https://opensourcesecurity.io/2025/04-can-we-trust-cve/</link>
      <pubDate>Sat, 19 Apr 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/04-can-we-trust-cve/</guid> 
      <description>&lt;p&gt;If you are a security nerd, and even if you&amp;rsquo;re not, you probably heard about the epic CVE mess that happened. It&amp;rsquo;s a very long story and was covered in many places, but the TL;DR was the funding for CVE fell through, panic ensued, then CISA found some temporary funds to keep the lights, so everything is fine and we can all go back to normal.&lt;/p&gt;
&lt;p&gt;Well, some of us won&amp;rsquo;t go back to normal because the CISA funding is good for 11 months. Will there be more funding in 11 months? Will an asteroid destroy the Earth in 2032? Will society still exists at Christmas? Nobody really knows. Well that asteroid one, we sort of know that. We&amp;rsquo;ll be fine. Yay science!&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE for EOL with Aaron Frost</title>
      <link>https://opensourcesecurity.io/2025/2025-04-cve_eol_aaron_frost/</link>
      <pubDate>Mon, 14 Apr 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-04-cve_eol_aaron_frost/</guid> 
      <description>&lt;p&gt;Aaron Frost explores the overly complex world of vulnerability identifiers for end of life software. We discuss how incomplete CVE reporting creates blind spots for users while arming attackers with knowledge. The conversation uncovers the ethical tensions between resource constraints and security transparency, highlighting why the &amp;ldquo;vulnerable until proven otherwise&amp;rdquo; approach is the best path forward for end of life software.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode Links&lt;/h2&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why I didn&#39;t go to VulnCon</title>
      <link>https://opensourcesecurity.io/2025/04-why-i-didnt-go-to-vulncon/</link>
      <pubDate>Fri, 11 Apr 2025 12:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/04-why-i-didnt-go-to-vulncon/</guid> 
      <description>&lt;p&gt;VulnCon 2025 is over. I didn’t go. A bunch of people have asked me why, and rather than keep my answer to a small group, I thought it would make sense to write something public about it all.&lt;/p&gt;
&lt;p&gt;The TL;DR is I went to a different conference that I thought was a better use of my time.&lt;/p&gt;
&lt;p&gt;The conference I went to was &lt;a href=&#34;https://cyphercon.com/&#34;&gt;Cyphercon&lt;/a&gt; and &lt;a href=&#34;https://www.bsidesmke.org/&#34;&gt;BSides Milwaukee&lt;/a&gt;. They are regional conferences in Wisconsin. Good people, great shows, a lot of fun and learning. Yeah, it was technically the week before VulnCon, but I lack the fortitude to do two conferences back to back. Some people can, I tip my hat to those folks. I’m not one of them. I should be clear though, this isn’t the only reason. I also don’t think VulnCon should exist (more on that at the end).&lt;/p&gt;</description>
    </item>
    <item>
      <title>cargo-semver-checks with Predrag Gruevski</title>
      <link>https://opensourcesecurity.io/2025/2025-04-cargo-semver-checks-predrag-gruevski/</link>
      <pubDate>Mon, 07 Apr 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-04-cargo-semver-checks-predrag-gruevski/</guid> 
      <description>&lt;p&gt;Cargo Semver Checks is a Rust tool by Predrag Gruevski that is tackling the problem of broken dependencies that cost developers time when trying to upgrade dependencies. Predrag&amp;rsquo;s work shows how automated checks can catch breaking changes before they&amp;rsquo;re released, potentially saving projects from unexpected failures and making dependency updates less painful across the entire Rust ecosystem.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hachyderm.io/@predrag&#34;&gt;Predrag&amp;rsquo;s Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://predr.ag/blog/&#34;&gt;Predrag&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://predr.ag/blog/cargo-semver-checks-2024-year-in-review/&#34;&gt;&amp;ldquo;We never update unless forced to&amp;rdquo; — cargo-semver-checks 2024 Year in Review&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/obi1kenobi/cargo-semver-checks/issues/5&#34;&gt;cargo-semver-checks issue 5&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Distributed CI and Git with Lars Wirzenius</title>
      <link>https://opensourcesecurity.io/2025/2025-03-ambient-radicle-lars-wirzenius/</link>
      <pubDate>Mon, 31 Mar 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-03-ambient-radicle-lars-wirzenius/</guid> 
      <description>&lt;p&gt;I got to chat with Lars about a new CI/CD system he&amp;rsquo;s been working on called Ambient. It sounds really cool and does some very clever things today, with even more things planned in the future. We also spend some time discussing a project he works on called Radicle, a distributed Git forge. It feels like having decentralized infrastructure might be more important than it&amp;rsquo;s ever been, for some reason.&lt;/p&gt;</description>
    </item>
    <item>
      <title>FIDO authentication with William Brown</title>
      <link>https://opensourcesecurity.io/2025/2025-03-fido_auth_william_brown/</link>
      <pubDate>Mon, 24 Mar 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-03-fido_auth_william_brown/</guid> 
      <description>&lt;p&gt;When William Brown posted a &lt;a href=&#34;https://infosec.exchange/@firstyear/114006421914755626&#34;&gt;rant&lt;/a&gt; on Mastodon about the FIDO Metadata Service, it sounded like exactly the sort of thing I wanted to learn more about. So that&amp;rsquo;s what I did! It&amp;rsquo;s a fun conversation, William is really good at explaining insanely complicated topics in a way that&amp;rsquo;s easy to understand. This one is dense, but it&amp;rsquo;s really interesting, you&amp;rsquo;re going to learn a ton.&lt;/p&gt;
&lt;h2 id=&#34;episode-links&#34;&gt;Episode links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@firstyear&#34;&gt;William&amp;rsquo;s Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.yubico.com/&#34;&gt;Yubico&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ftsafe.com/Products/FIDO&#34;&gt;FEITIAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.token2.com/&#34;&gt;Token2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This episode is also available as a podcast, search for &amp;ldquo;Open Source Security&amp;rdquo; on your favorite podcast player.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CRA with Luis Villa</title>
      <link>https://opensourcesecurity.io/2025/2025-03-CRA_luis_villa/</link>
      <pubDate>Mon, 17 Mar 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-03-CRA_luis_villa/</guid> 
      <description>&lt;p&gt;When Luis Villa said he was willing to talk to me about the CRA I knew it would be a great conversation. The number of actual lawyers who also work on open source issues isn&amp;rsquo;t a large number. Luis is one of those people and he has a ton of knowledge and insight he&amp;rsquo;s willing to share. Open source legal issues are especially weird because the very nature of the open source license was to hack copyright to give us more rights instead of less. So what did Luis have to tell us about the CRA?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source Malware with Brian Fox</title>
      <link>https://opensourcesecurity.io/2025/2025-03-oss_malware_brian_fox/</link>
      <pubDate>Mon, 10 Mar 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-03-oss_malware_brian_fox/</guid> 
      <description>&lt;p&gt;I recently sat down with &lt;a href=&#34;https://www.linkedin.com/in/brianefox/&#34;&gt;Brian Fox&lt;/a&gt;, CTO and co-founder of &lt;a href=&#34;https://www.sonatype.com/&#34;&gt;Sonatype&lt;/a&gt;, about a report they recently published about malware in open source ecosystems. This is something that&amp;rsquo;s not a surprise to anyone paying attention, but there are some things Sonatype is doing in this space that&amp;rsquo;s very clever. I&amp;rsquo;ve known Brian for a long time so it was a treat to catch up and see what they found, and what it means for the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source Foundations with Kelley Misata of Suricata</title>
      <link>https://opensourcesecurity.io/2025/2025-03-oss_foundations_kelley_misata/</link>
      <pubDate>Mon, 03 Mar 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-03-oss_foundations_kelley_misata/</guid> 
      <description>&lt;p&gt;In the world of open source software, we often celebrate the code, the contributors, and the collaboration. But beneath the surface lies a world unknown to most. It&amp;rsquo;s not a secret, it&amp;rsquo;s just not something most of us pay attention to, the foundations that drive some of the open source projects. I had the opportunity to discuss this with &lt;a href=&#34;https://www.linkedin.com/in/kelley-misata-ph-d-38475636/&#34;&gt;Dr. Kelly Masada&lt;/a&gt;, who has served as president of the &lt;a href=&#34;https://oisf.net/&#34;&gt;Open Information Security Foundation (OISF)&lt;/a&gt; for over 12 years. OISF is the organization behind &lt;a href=&#34;https://suricata.io/&#34;&gt;Suricata&lt;/a&gt;, the very capable and well known open source network analysis and threat detection software.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Forking Open Source Projects with Sheogorath</title>
      <link>https://opensourcesecurity.io/2025/2025-02-fork_open_source_sheogorath/</link>
      <pubDate>Mon, 24 Feb 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-02-fork_open_source_sheogorath/</guid> 
      <description>&lt;p&gt;If you use GitHub, you probably have &amp;ldquo;forked&amp;rdquo; a repo more times than you can count. It&amp;rsquo;s super common and the ideal way you can interact with a git repository you don&amp;rsquo;t control. But the idea of forking in open source can have another meaning, a far more interesting meaning. It&amp;rsquo;s when you take the open source project, and create a new open source project based on the first. It&amp;rsquo;s not as simple as clicking a button. The process is complicated and is a ton of corner cases.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Patching EOL Open Source with Aaron Frost</title>
      <link>https://opensourcesecurity.io/2025/2025-02-patching_EOL_OSS_aaron_frost/</link>
      <pubDate>Mon, 17 Feb 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-02-patching_EOL_OSS_aaron_frost/</guid> 
      <description>&lt;p&gt;When I started Open Source Security &lt;a href=&#34;https://www.herodevs.com/&#34;&gt;HeroDevs&lt;/a&gt; reached out and asked if I wanted to have a chat. I was pretty interested in this discussion because the work HeroDevs does today is very similar to the work I did at Red Hat for a decade. While what they work on is a bit different than the sort of things we shipped in a Linux distribution, the basic idea is still the same.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why do we keep ignoring CI security with François Proulx</title>
      <link>https://opensourcesecurity.io/2025/2025-02-ignoring_ci_security_francois_proulx/</link>
      <pubDate>Mon, 10 Feb 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-02-ignoring_ci_security_francois_proulx/</guid> 
      <description>&lt;p&gt;When I started Open Source Security I knew one of those topics that could use more attention was the security of CI/CD systems. All the talk about securing the supply chain seems to almost exclusively focus on the development stage as well as the deployment stage. It seems like there&amp;rsquo;s not enough attention happening to the build stage (spoiler: most of the successful attacks have happened at this stage). When &lt;a href=&#34;https://www.linkedin.com/in/francoisp/&#34;&gt;François Proulx&lt;/a&gt; reached out to chat about CD/CD systems, I couldn&amp;rsquo;t say yes fast enough.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Modern day authentication with Marc Boorshtein</title>
      <link>https://opensourcesecurity.io/2025/2025-02-modern_day_authentication_with_marc_boorshtein/</link>
      <pubDate>Mon, 03 Feb 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/2025-02-modern_day_authentication_with_marc_boorshtein/</guid> 
      <description>&lt;p&gt;When I thought doing an episode about authentication would be a good idea, &lt;a href=&#34;https://www.linkedin.com/in/marc-boorshtein-5979a82/&#34;&gt;Marc Boorshtein&lt;/a&gt; was the first person who came to mind for me. Marc knows more about authentication than anyone I know, and he&amp;rsquo;s really good at talking about it in a coherent way. Marc is the CTO of &lt;a href=&#34;https://www.tremolo.io/&#34;&gt;Tremolo Security&lt;/a&gt;, he&amp;rsquo;s been doing authentication for more than 20 years, long before many of us even knew this whole identity and authentication thing was something we should care about.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVEs for End of Life?</title>
      <link>https://opensourcesecurity.io/2025/01-cve-for-end-of-life/</link>
      <pubDate>Tue, 28 Jan 2025 12:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/01-cve-for-end-of-life/</guid> 
      <description>&lt;p&gt;Very recently the Node.js project filed a few &lt;a href=&#34;https://nodejs.org/en/blog/vulnerability/upcoming-cve-for-eol-versions&#34;&gt;CVE IDs for end of life products&lt;/a&gt;. For vulnerability nerds this is exciting because historically EOL things didn&amp;rsquo;t get CVE IDs just for being EOL. And as one would expect, there are plenty of folks who think this is the best idea ever, and a bunch worried this will be the event that destroys modern civilized society.&lt;/p&gt;
&lt;p&gt;Today there&amp;rsquo;s not really a good place to track what is or isn&amp;rsquo;t end of life software. There are some datasets being worked on but they&amp;rsquo;re very new, and it&amp;rsquo;s &amp;ldquo;yet another dataset&amp;rdquo; we will all have to figure out. CVE could be a place to track details like this, but it&amp;rsquo;s not a simple conversation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source Maintenance with Gary Kramlich</title>
      <link>https://opensourcesecurity.io/2025/01-open_source_maintenance_with_gary_kramlich/</link>
      <pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/01-open_source_maintenance_with_gary_kramlich/</guid> 
      <description>&lt;p&gt;I met Gary Kramlich a few years ago at the &lt;a href=&#34;https://cyphercon.com/&#34;&gt;CypherCon&lt;/a&gt; security conference and we now chat on signal about open source things. When I started Open Source Security I knew he was one of the people I wanted to talk to about what it looks like to keep a project, codebase, and community alive for more than a decade.&lt;/p&gt;
&lt;p&gt;Gary is the lead developer of the Pidgin chat program. You can find him at &lt;a href=&#34;https://reaperworld.com/&#34;&gt;reaperworld.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Safety vs Security with Thomas Depierre</title>
      <link>https://opensourcesecurity.io/2025/01-safety_vs_security_with_thomas_depierre/</link>
      <pubDate>Mon, 13 Jan 2025 08:00:00 -0600</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025/01-safety_vs_security_with_thomas_depierre/</guid> 
      <description>&lt;p&gt;I had a discussion with &lt;a href=&#34;https://hachyderm.io/@Di4na&#34;&gt;Thomas Depierre&lt;/a&gt; about his experience with safety and how safety concepts can apply to the field of security.&lt;/p&gt;
&lt;p&gt;Thomas is an experienced SRE with a background in safety, he has thoughts into how people prevent disasters constantly, often without realizing it. You can find his blog at &lt;a href=&#34;https://www.softwaremaxims.com/&#34;&gt;Software Maxims&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;An audio version of this disucssion is also available in podcast format. Look for &amp;ldquo;Open Source Security&amp;rdquo; wherever you get your podcasts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Future of Open Source Security</title>
      <link>https://opensourcesecurity.io/2025-01-the_future_of_open_source_security/</link>
      <pubDate>Wed, 01 Jan 2025 08:00:00 -0600</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2025-01-the_future_of_open_source_security/</guid> 
      <description>&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/2025-01-the_future_of_open_source_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/2025-01-the_future_of_open_source_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/2025-01-the_future_of_open_source_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;It’s a new year and time for some changes to the opensourcesecurity.io website.&lt;/p&gt;
&lt;p&gt;This site initially was meant to be the home of general open source security content, and has carried the name &amp;ldquo;Open Source Security&amp;rdquo; since 2018. Much of the content hosted here has been from the Open Source Security Podcast, it&amp;rsquo;s time to wrap up the podcast to put the focus back on Open Source Security (dot io).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 461 - The new NIST password guidance</title>
      <link>https://opensourcesecurity.io/2024/12/29/episode-461-the-new-nist-password-guidance/</link>
      <pubDate>Mon, 30 Dec 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3637</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about new NIST password guidance. There&amp;rsquo;s some really good stuff in this new document. Ideas like usability and equity show up (which is amazing). There&amp;rsquo;s more strict guidance against rotating passwords and complex passwords. This new guidance gives us a lot to look forward to.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_461_The_new_NIST_password_guidance.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_461_The_new_NIST_password_guidance.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_461_The_new_NIST_password_guidance.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/@UsagiElectric&#34;&gt;Usagi Electric&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/09/nist-proposes-barring-some-of-the-most-nonsensical-password-rules/&#34;&gt;NIST proposes barring some of the most nonsensical password rules&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pages.nist.gov/800-63-4/sp800-63b.html&#34;&gt;NIST SP 800-63(B)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/STRIDE_model&#34;&gt;STRIDE threat model&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Threat_model#PASTA&#34;&gt;PASTA threat model&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 460 - Santa&#39;s Supply Chain Security</title>
      <link>https://opensourcesecurity.io/2024/12/22/episode-460-santas-supply-chain-security/</link>
      <pubDate>Mon, 23 Dec 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3632</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the supply chain of Santa. Does he purchase all those things? Are they counterfeit goods? Are they acquired some other way? And once he has all the stuff, the logistics of getting it to the sleigh is mind boggling. It&amp;rsquo;s all very complex&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_460_Santas_Supply_Chain_Security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_460_Santas_Supply_Chain_Security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_460_Santas_Supply_Chain_Security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=TXR0oPO0LL4&#34;&gt;Project Gunman&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 459 - CWE Top 25 List</title>
      <link>https://opensourcesecurity.io/2024/12/15/episode-459-cwe-top-25-list/</link>
      <pubDate>Mon, 16 Dec 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3627</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a CWE Top 25 list from MITRE. The list itself is fine, but we discuss why the list looks the way it does (it&amp;rsquo;s because of WordPress). We also discuss why Josh hates lists like this (because they never create any actions). We finish up running through the whole list with a few comments about the findings.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_459_CWE_Top_25_List.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_459_CWE_Top_25_List.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_459_CWE_Top_25_List.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cwe.mitre.org/top25/archive/2024/2024_cwe_top25.html&#34;&gt;2024 CWE Top 25 Most Dangerous Software Weaknesses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/gp/product/B078BRNTQR/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&amp;amp;psc=1&#34;&gt;Set of 9 Unusual Odd Sided dice - D3, D5, D7, D9, D11, D13, D15, D17 &amp;amp; D19&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 458 - FBI endorses E2E encryption</title>
      <link>https://opensourcesecurity.io/2024/12/08/episode-458-fbi-endorses-e2e-encryption/</link>
      <pubDate>Mon, 09 Dec 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3623</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the FBI telling everyone to use end to end encrypted messengers. This is a pretty drastic deviation from messages in the past. The reason for this is it appears the US telephone networks are pwnt beyond repair at this point, which is concerning. The only real solution now is to treat the phone network as untrusted and encrypt all the traffic.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_458_FBI_endorses_E2E_encryption.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_458_FBI_endorses_E2E_encryption.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_458_FBI_endorses_E2E_encryption.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.axios.com/2024/12/03/salt-typhoon-china-phone-hacks&#34;&gt;Salt Typhoon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694&#34;&gt;U.S. officials urge Americans to use encrypted apps amid unprecedented cyberattack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=wVyu7NB7W6Y&amp;amp;t=663s&#34;&gt;LTT Hacked phone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://securitycryptographywhatever.com/2024/09/06/telegram/&#34;&gt;Security Cryptography Whatever Telegram&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.securemessagingapps.com/&#34;&gt;Secure Messaging Apps Comparison&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 457 - The D-Link D-bacle</title>
      <link>https://opensourcesecurity.io/2024/12/01/episode-457-the-d-link-d-bacle/</link>
      <pubDate>Mon, 02 Dec 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3619</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a serious D-Link security vulnerability in a bunch of end of life products. The crux of the discussion focuses on D-Link, but the reality is almost all consumer gear you plug into the internet is terrible. And there&amp;rsquo;s little hope it will get better anytime soon.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_457_The_D-Link_D-bacle.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_457_The_D-Link_D-bacle.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_457_The_D-Link_D-bacle.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/11/25/salt_typhoon_mark_warner_warning/&#34;&gt;China has utterly pwned &amp;rsquo;thousands and thousands&amp;rsquo; of devices at US telcos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/11/20/dlink_rip_replace_router/&#34;&gt;D-Link tells users to trash old VPN routers over bug too dangerous to identify&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=-vpGswuYVg8&#34;&gt;D-Link YouTube explainer video&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 456 - What if XZ happened to a company? The openness of open source</title>
      <link>https://opensourcesecurity.io/2024/11/24/episode-456-what-if-xz-happened-to-a-company-the-openness-of-open-source/</link>
      <pubDate>Mon, 25 Nov 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3615</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; embark on a thought experiment to discuss how a commercial entity would handle something like the xz incident. It was very specific and difficult to understand. It&amp;rsquo;s easy to claim just because source code being available doesn&amp;rsquo;t matter. But the reality is when source code is needed, it can make a huge difference for everyone working together, just like we saw with xz.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_456_What_if_XZ_happened_to_a_company_The_openness_of_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_456_What_if_XZ_happened_to_a_company_The_openness_of_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_456_What_if_XZ_happened_to_a_company_The_openness_of_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.msn.com/en-us/money/companies/lindt-admits-chocolate-may-not-be-expertly-crafted-in-class-action-lawsuit-battle/ar-AA1u7901&#34;&gt;Lindt admits chocolate may not be ‘expertly crafted’ in class-action lawsuit battle&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=U6cake3bwnY&#34;&gt;Mitchell &amp;amp; Webb - Needlessly ambiguous terms&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 455 - Wordpress plugin security</title>
      <link>https://opensourcesecurity.io/2024/11/17/episode-455-wordpress-plugin-security/</link>
      <pubDate>Mon, 18 Nov 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3610</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the way Wordpress vets their plugins. While Wordpress has been in the news lately, they do some clever things to get plugins approved. There&amp;rsquo;s a static analyzer that runs against new submissions. We discuss using static analysis, securing open source, contributing and more.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_455_Wordpress_plugin_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_455_Wordpress_plugin_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_455_Wordpress_plugin_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.phoronix.com/news/Linus-2.6p-Faster-Scale-Patch&#34;&gt;Linus Torvalds Lands A 2.6% Performance Improvement With Minor Linux Kernel Patch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/kurtseifried/wordpress-plugin-sitemap2rss&#34;&gt;Kurt&amp;rsquo;s Plugin&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 454 - The state of open source with Brian Fox from Sonatype and Donald Fischer from Tidelift</title>
      <link>https://opensourcesecurity.io/2024/11/10/episode-454-the-state-of-open-source-with-brian-fox-from-sonatype-and-donald-fischer-from-tidelift/</link>
      <pubDate>Mon, 11 Nov 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3603</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Brian Fox from Sonatype and Donald Fischer from Tidelift about their recent reports as well as open source. There are really interesting connections between the two reports. The overall theme seems to be open source is huge, everywhere, and needs help. But all is no lost! There&amp;rsquo;s some great ideas on what the future needs to look like.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_454_The_state_of_open_source_with_Brian_Fox_from_Sonatype_and_Donald_Fischer_from_Tidelift.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_454_The_state_of_open_source_with_Brian_Fox_from_Sonatype_and_Donald_Fischer_from_Tidelift.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_454_The_state_of_open_source_with_Brian_Fox_from_Sonatype_and_Donald_Fischer_from_Tidelift.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/donaldfischer/&#34;&gt;Donald Fischer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/brianefox/&#34;&gt;Brian Fox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/&#34;&gt;Tidelift&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sonatype.com/&#34;&gt;Sonatype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/open-source-maintainer-survey-2024&#34;&gt;The 2024 Tidelift state of the open source maintainer report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sonatype.com/state-of-the-software-supply-chain/introduction&#34;&gt;Sonatype State of the Software Supply Chain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://get.anchore.com/2024-software-supply-chain-security-report/&#34;&gt;Anchore 2024 Software Supply Chain Security Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/tac/issues/101&#34;&gt;OpenSSF TAC issue 101&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 453 - Software Liability</title>
      <link>https://opensourcesecurity.io/2024/11/03/episode-453-software-liability/</link>
      <pubDate>Mon, 04 Nov 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3599</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about three government activities happening around security. CISA has a request for comment, and an international strategic plan around cybersecurity. These are both good ideas, and hopefully will help drive change. But we also discuss an EU proposal that brings liability rules to software which sounds like a great way to force change to happen.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_453_Software_Liability.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_453_Software_Liability.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_453_Software_Liability.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.federalregister.gov/documents/2024/10/16/2024-23869/request-for-comment-on-product-security-bad-practices-guidance&#34;&gt;Request for Comment on Product Security Bad Practices Guidance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/2025-2026-cisa-international-strategic-plan&#34;&gt;FY2025-2026 CISA International Strategic Plan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.consilium.europa.eu/en/press/press-releases/2024/10/10/eu-brings-product-liability-rules-in-line-with-digital-age-and-circular-economy/&#34;&gt;EU brings product liability rules in line with digital age and circular economy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cloudsecurityalliance.org/research/cloud-controls-matrix&#34;&gt;CSA Cloud Controls Matrix&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 452 - All about Meshtastic</title>
      <link>https://opensourcesecurity.io/2024/10/27/episode-452-all-about-meshtastic/</link>
      <pubDate>Mon, 28 Oct 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3586</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Meshtastic open source project. It&amp;rsquo;s a really slick mesh radio system that runs on very cheap radio equipment. This episode isn&amp;rsquo;t very security related (there are a few things), but it is very open source.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_452_All_about_Meshtastic.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_452_All_about_Meshtastic.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_452_All_about_Meshtastic.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://meshtastic.org/&#34;&gt;Meshtastic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://heltec.org/project/wifi-lora-32-v3/&#34;&gt;Heltec LoRa 32(V3) Radio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=EAQI2ZSmxPU&#34;&gt;465 Rutgers University Confirmed: Meshtastic and LoRa are dangerous&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=htjwtnjQkkE&#34;&gt;Meshtastic Routing Issues &amp;amp; Deployment Scenarios&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/TheCommsChannel/TC2-BBS-mesh&#34;&gt;TC2-BBS-mesh&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/@The_Comms_Channel&#34;&gt;The Comms Channel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/joshbressers/meshbbs&#34;&gt;Josh&amp;rsquo;s BBS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/meshtastic/firmware/issues/4723#issuecomment-2369336696&#34;&gt;Heltec T114 bug&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 451 - Python security with Seth Larson</title>
      <link>https://opensourcesecurity.io/2024/10/20/episode-451-python-security-with-seth-larson/</link>
      <pubDate>Mon, 21 Oct 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3578</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Seth Larson from the Python Software Foundation about security the Python ecosystem. Seth is an employee of the PSF and is doing some amazing work. Seth is showing what can be accomplished when we pay open source developers to do some of the tasks a volunteer might consider boring, but is super important work.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_451_Python_security_with_Seth_Larson.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_451_Python_security_with_Seth_Larson.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_451_Python_security_with_Seth_Larson.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://fosstodon.org/@sethmlarson&#34;&gt;Seth Larson&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1181/&#34;&gt;XKCD PGP Signature&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sethmlarson.dev/blog&#34;&gt;Seth&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sethmlarson.dev/python-and-sigstore&#34;&gt;Python and Sigstore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://peps.python.org/pep-0761/&#34;&gt;Deprecating PGP - PEP 761&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.python.org/downloads/metadata/sbom/&#34;&gt;Python SBOMs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The useful uselessness of SBOMs</title>
      <link>https://opensourcesecurity.io/2024/10/15/the-useful-uselessness-of-sboms/</link>
      <pubDate>Tue, 15 Oct 2024 12:49:36 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3542</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s once again time for the outrage generators on social media to ask if SBOMs have any value. This seems to happen a few times a year. Probably lines up with the pent up excitement while we wait for the McRib to return. I could dig up a few examples of these articles but I can&amp;rsquo;t be bothered, and it doesn&amp;rsquo;t matter. I&amp;rsquo;d rather spend my time searching for a McRib &amp;hellip; I mean, writing this blog post.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 450 - What&#39;s Wrong With WordPress</title>
      <link>https://opensourcesecurity.io/2024/10/13/episode-450-whats-wrong-with-wordpress/</link>
      <pubDate>Mon, 14 Oct 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3548</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the current Wordpress / WP Engine mess. In what is certainly a supply chain attack, the Advanced Custom Fields forking. This whole saga is weird and filled with chaos and stupidity. We have no idea how it will end, but we do know that the blog platform you use shouldn&amp;rsquo;t be this exciting. The bad sort of exciting.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_450_Whats_Wrong_With_Wordpress.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_450_Whats_Wrong_With_Wordpress.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_450_Whats_Wrong_With_Wordpress.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2024/10/12/24268637/wordpress-org-matt-mullenweg-acf-fork-secure-custom-fields-wp-engine&#34;&gt;WordPress.org’s latest move involves taking control of a WP Engine plugin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://duerrenberger.dev/blog/2024/10/08/timeline-of-the-wordpress-drama/&#34;&gt;Wordpress / WP Engine timeline&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.knorr.com/de/suchen.html?query=mexikan&#34;&gt;Knorr German Recipes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 449 - The CUPSpocalypse</title>
      <link>https://opensourcesecurity.io/2024/10/06/episode-449-the-cupspocalypse/</link>
      <pubDate>Mon, 07 Oct 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3537</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent CUPS issue. The vulnerability itself wasn&amp;rsquo;t all that exciting, but the whole disclosure process was wild. There&amp;rsquo;s a lot to talk about, many things didn&amp;rsquo;t quite go as planned and it all leaked early. Let&amp;rsquo;s talk about why and what it all means.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_449_The_CUPSpocalypse.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_449_The_CUPSpocalypse.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_449_The_CUPSpocalypse.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/&#34;&gt;CUPS vulnerability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.akamai.com/blog/security-research/october-cups-ddos-threat&#34;&gt;Akamai report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wilwheaton.net/2013/04/being-a-nerd-is-not-about-what-you-love-its-about-how-you-love-it/&#34;&gt;Wil Wheaton: being a nerd is not about what you love; it’s about how you love it&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 448 - What&#39;s wrong with CISA?</title>
      <link>https://opensourcesecurity.io/2024/09/29/episode-448-whats-wrong-with-cisa/</link>
      <pubDate>Mon, 30 Sep 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3533</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a few things that have recently come out of CISA. They seem to be blaming the vendors for a lot of the problems, but there&amp;rsquo;s also not any actionable advice telling the vendors what they should be doing. This feels like the classic case of &amp;ldquo;just security harder&amp;rdquo;. We need CISA to be leading the way funding and defining security, not blaming vendors for giving the market what it demands.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 447 - The Tidelift 2024 open source maintainer report</title>
      <link>https://opensourcesecurity.io/2024/09/22/episode-447-the-tidelift-2024-open-source-maintainer-report/</link>
      <pubDate>Mon, 23 Sep 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3529</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the 2024 Tidelift maintainer report. The report is pretty big and covers a ton of ground. We focus in a few of the statistics that should worry anyone who uses open source. We&amp;rsquo;ve known for a while developers are struggling, and the numbers back that up. This one feels like the old &amp;ldquo;we&amp;rsquo;ve tried nothing and we&amp;rsquo;re all out of ideas&amp;rdquo;.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_447_The_Tidelift_2024_open_source_maintainer_report.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_447_The_Tidelift_2024_open_source_maintainer_report.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_447_The_Tidelift_2024_open_source_maintainer_report.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://explore.tidelift.com/2024-tidelift-survey&#34;&gt;THE 2024 TIDELIFT STATE OF THE OPEN SOURCE MAINTAINER REPORT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.canada.ca/en/immigration-refugees-citizenship/services/canadian-passports/new-passport-features.html&#34;&gt;Canadian passport&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://changelog.com/news/open-source-not-open-contribution-QRO8&#34;&gt;Changelog Interviews #433&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/thanhh23/CVE-2024-42992&#34;&gt;Pandas CVE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 446 - Researchers took over .MOBI TLD</title>
      <link>https://opensourcesecurity.io/2024/09/15/episode-446-researchers-took-over-mobi-tld/</link>
      <pubDate>Mon, 16 Sep 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3525</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some security researchers sort of taking over the .MOBI whois server. The story is a bit sensational, but we ask if it really matters? There are a lot of interesting possible attacks, but turning something like this into a good attack is really hard, maybe impossible. The researchers presented the findings in a very reasonable way.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_446_Researchers_took_over_MOBI_TLD.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_446_Researchers_took_over_MOBI_TLD.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_446_Researchers_took_over_MOBI_TLD.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/&#34;&gt;We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/technology/2015/jun/19/heinz-ketchup-qr-code-links-porn&#34;&gt;Heinz says sorry for ketchup QR code that links to porn site&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 445 - EPSS with Jay Jacobs</title>
      <link>https://opensourcesecurity.io/2024/09/08/episode-445-epss-with-jay-jacobs/</link>
      <pubDate>Mon, 09 Sep 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3507</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Jay Jacobs about Exploit Prediction Scoring System (EPSS). EPSS is a new way to view vulnerabilities. It&amp;rsquo;s a metric for the likelyhood that a vulnerability will be exploited in the next 30 days. Jay explains how EPSS got to where it is today, how the scoring works, and how we can start to think about including it in our larger risk equations. It&amp;rsquo;s a really fun discussion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 444 - Open Source and End of Life</title>
      <link>https://opensourcesecurity.io/2024/09/01/episode-444-open-source-and-end-of-life/</link>
      <pubDate>Mon, 02 Sep 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3502</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Chrome unexpectedly going EOL on Ubuntu 18. Keeping old things alive is really hard to do, and in open source it&amp;rsquo;s becoming more common to just run the latest version rather than trying to keep old versions alive for long periods of time.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_444_Open_Source_and_End_of_Life.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_444_Open_Source_and_End_of_Life.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_444_Open_Source_and_End_of_Life.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/08/22/chrome_dropped_support_for_ubuntu/?td=rt-3a&#34;&gt;Chrome dumped support for Ubuntu 18.04 – but it&amp;rsquo;ll be back&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/linus-torvalds-talks-ai-rust-adoption-and-why-the-linux-kernel-is-the-only-thing-that-matters/&#34;&gt;Linus Torvalds talks AI, Rust adoption, and why the Linux kernel is &amp;rsquo;the only thing that matters&amp;rsquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pidgin.im/posts/2024-08-malicious-plugin/&#34;&gt;Pidgin backdoor&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 443 - The Supply Chain Security Crisis</title>
      <link>https://opensourcesecurity.io/2024/08/25/episode-443-the-supply-chain-security-crisis/</link>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3498</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a story that discusses a story from Black Hat that references supply chains. There&amp;rsquo;s a ton of doom and gloom around our software supply chains and much of the advice isn&amp;rsquo;t realistic. If we want to take this seriously we need to stop obsessing over the little problems and focus on some big problems.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_443_The_Supply_Chain_Security_Crisis.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_443_The_Supply_Chain_Security_Crisis.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_443_The_Supply_Chain_Security_Crisis.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://securityboulevard.com/2024/08/black-hat-usa-2024-key-takeaways-from-the-premier-cybersecurity-event/&#34;&gt;Black Hat USA 2024: Key Takeaways from the Premier Cybersecurity Event&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=1EsC0nzptRI&#34;&gt;The Reason Train Design Changed After 1948&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 442 - The foundation of society, TLS certificates are a mess</title>
      <link>https://opensourcesecurity.io/2024/08/18/episode-442-the-foundation-of-society-tls-certificates-are-a-mess/</link>
      <pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3493</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a few stories around the TLS CA certificate world. It&amp;rsquo;s all pretty dire sounding. There&amp;rsquo;s not a lot of organization or process in the space, and the root CAs are literally the foundation of modern society, everything needs them to function. There&amp;rsquo;s not a lot of positive ideas here, it&amp;rsquo;s mostly a show where Kurt explains to Josh what&amp;rsquo;s going on, because Josh doesn&amp;rsquo;t want to care (and will continue to ignore all of this going forward).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 441 - Is CWE useful?</title>
      <link>https://opensourcesecurity.io/2024/08/11/episode-441-is-cwe-useful/</link>
      <pubDate>Mon, 12 Aug 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3489</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about CWE. What is it, and why does it matter. We cover some history, some shortcomings, and some ideas on how CWE could be used to make security a lot better. We frame the future discussion around the OWASP top 10 list. We should be putting more effort into removing removing entire classes of vulnerabilities.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_441_Is_CWE_useful.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_441_Is_CWE_useful.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_441_Is_CWE_useful.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cwe.mitre.org/&#34;&gt;CWE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2023/01/29/episode-360-memory-safety-and-the-nsa/&#34;&gt;Episode 360 – Memory safety and the NSA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://daniel.haxx.se/blog/2024/06/20/inside-22734-steam-games/&#34;&gt;Inside 22,734 Steam games&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 440 - &#34;What is open source&#34; talk Josh gave</title>
      <link>https://opensourcesecurity.io/2024/08/04/episode-440-what-is-open-source-talk-josh-gave/</link>
      <pubDate>Mon, 05 Aug 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3485</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a presentation Josh recently gave that was supposed to be about how open source works. The talk was the wrong topic for a security crowd, but there&amp;rsquo;s a lot of interesting details in the questions and comments that emerged. It&amp;rsquo;s clear a lot of security people don&amp;rsquo;t really care about the fine details about what open source is, their primary goal is to help keep development secure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 439 - Where are all the youth in open source?</title>
      <link>https://opensourcesecurity.io/2024/07/28/episode-439-where-are-all-the-youth-in-open-source/</link>
      <pubDate>Mon, 29 Jul 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3481</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a story talking about the &amp;ldquo;graying&amp;rdquo; of open source. There doesn&amp;rsquo;t seem to be many young people working on open source, but we don&amp;rsquo;t really know why that is. There are many thoughts, but a better question is why should anyone get involved in open source anymore? The world has changed quite a lot since open source was created.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_439_Where_are_all_the_youth_in_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_439_Where_are_all_the_youth_in_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_439_Where_are_all_the_youth_in_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/07/15/opinion_open_source_attract_devs/&#34;&gt;The graying open source community needs fresh blood&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;OSPOs for Good 2024
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://webtv.un.org/en/asset/k1m/k1ma4k9rff&#34;&gt;Day 1 Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://webtv.un.org/en/asset/k1u/k1uvv0xd6d&#34;&gt;Day 1 Part 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://webtv.un.org/en/asset/k1q/k1qmxhno3c&#34;&gt;Day 2 Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://webtv.un.org/en/asset/k15/k1517v486n&#34;&gt;Day 2 Part 2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://trac.ffmpeg.org/ticket/10341#comment:4&#34;&gt;FFmpeg bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://jsoneditoronline.org/&#34;&gt;JSON Editor Online&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://rfc3339.com/&#34;&gt;https://rfc3339.com/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 438 - CISA&#39;s bad OSS advice vs the Whitehouse good advice</title>
      <link>https://opensourcesecurity.io/2024/07/21/episode-438-cisas-bad-oss-advice-vs-the-whitehouse-good-advice/</link>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3476</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about two documents from the US government that discuss open source in very different ways. The CISA document lays out a way to measure open source, but we take issue with the idea of trying to measure which open source projects are &amp;ldquo;good&amp;rdquo;. The Whitehouse on the other hand takes an approach that is very open source, get involved. Trying to measure open source isn&amp;rsquo;t producing anything actionable, but getting involved is very actionable, and very much how open source works.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 437 - CocoPods and proper funding for open source</title>
      <link>https://opensourcesecurity.io/2024/07/14/episode-437-cocopods-and-proper-funding-for-open-source/</link>
      <pubDate>Mon, 15 Jul 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3472</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a pretty big bug found in CocoPods ownership. We also touch on a paper that discusses the technical debt that open source should have. We discuss what the long term sustainability of open source. There aren&amp;rsquo;t any good solutions for open source today, but talking about these problems is important, we have to start to understand what&amp;rsquo;s going on before we can plausibly discuss solutions. If you&amp;rsquo;re an open source project that needs to put things on pause, or even walk way, that&amp;rsquo;s OK.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 436 - OpenSSH and node-ip - it&#39;s all exponential growth</title>
      <link>https://opensourcesecurity.io/2024/07/07/episode-436-openssh-and-node-ip-its-all-exponential-growth/</link>
      <pubDate>Mon, 08 Jul 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3468</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent OpenSSH vulnerability and the node-ip project owner taking their project private. They&amp;rsquo;re quasi related in the context of two open source projects handled bugs very differently. The OpenSSH bug isn&amp;rsquo;t really as serious as it seems, but you still want to patch.&lt;/p&gt;
&lt;p&gt;The node-ip bug is a very different story. The relationship between users and open source developers is one experiencing more strain now than we&amp;rsquo;ve ever seen. It&amp;rsquo;s a weird conversation and we don&amp;rsquo;t have good answers. Security in general is a collection of unsolvable problems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 435 - polyfill.io - open source is too big to fix</title>
      <link>https://opensourcesecurity.io/2024/06/30/episode-435-polyfill-io-open-source-is-too-big-to-fix/</link>
      <pubDate>Mon, 01 Jul 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3463</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the latest polyfill.io mess. Apparently someone took over a very popular project and started to serve malware. First XZ, now this. What does it mean for open source? We don&amp;rsquo;t have any answers, and it&amp;rsquo;s hard to even talk about this problem because it&amp;rsquo;s so big. The thing is though, even if we can&amp;rsquo;t fix open source, it&amp;rsquo;s here to stay.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_435_polyfill_io_open_source_is_too_big_to_fix.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_435_polyfill_io_open_source_is_too_big_to_fix.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_435_polyfill_io_open_source_is_too_big_to_fix.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://sansec.io/research/polyfill-supply-chain-attack&#34;&gt;Polyfill supply chain attack hits 100K+ sites&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://scorecard.dev/&#34;&gt;OpenSSF Scorecard&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 434 - Unreported vulnerabilities and everyone is getting hacked</title>
      <link>https://opensourcesecurity.io/2024/06/23/episode-434-unreported-vulnerabilities-and-everyone-is-getting-hacked/</link>
      <pubDate>Mon, 24 Jun 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3459</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about three wangles of responsibility. We start with a story about a bike theft ring, bike theft doesn&amp;rsquo;t usually get any attention, but this one is special. Then we ask why it seems like everyone is getting hacked, it&amp;rsquo;s because they have to tell us now. And finally we have a story about the huge number of unreported vulnerabilities in open source projects. This statistic probably affects all software, but there&amp;rsquo;s some numbers for open source specifically.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 433 - Should OpenSSH block misbehaving clients?</title>
      <link>https://opensourcesecurity.io/2024/06/16/episode-433-should-openssh-block-misbehaving-clients/</link>
      <pubDate>Mon, 17 Jun 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3455</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new proposal from OpenSSH to add a timeout to penalize clients misbehaving. But this then brings up the typical security conversation of &amp;ldquo;if it&amp;rsquo;s not perfect we shouldn&amp;rsquo;t do it&amp;rdquo;. Trying new things is a good thing, even if something fails, we learn a lesson that we can use in the future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_433_Should_OpenSSH_block_misbehaving_clients.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_433_Should_OpenSSH_block_misbehaving_clients.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_433_Should_OpenSSH_block_misbehaving_clients.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://undeadly.org/cgi?action=article;sid=20240607042157&#34;&gt;OpenSSH introduces options to penalize undesirable behavior&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=40610621&#34;&gt;Hacker News comments&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 432 - Flipper Zero with Alex Kulagin</title>
      <link>https://opensourcesecurity.io/2024/06/09/episode-432-flipper-zero-with-alex-kulagin/</link>
      <pubDate>Mon, 10 Jun 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3451</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Alex Kulagin from Flipper about the Flipper Zero. It&amp;rsquo;s one of the coolest hacker devices that exists on the market. We talk about what it is, how it started, what it can (and can&amp;rsquo;t) do. It&amp;rsquo;s a really fun conversation.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_432_Flipper_Zero_with_Alex_Kulagin.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_432_Flipper_Zero_with_Alex_Kulagin.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_432_Flipper_Zero_with_Alex_Kulagin.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://flipperzero.one/&#34;&gt;Flipper Zero Website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://x.com/flipper_zero/status/1770459769452589468&#34;&gt;Headphone jack radio capture&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.tiktok.com/tag/flipperzero?lang=en&#34;&gt;Flipper Zero on Tik Tok&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Why are vulnerabilities out of control in 2024?</title>
      <link>https://opensourcesecurity.io/2024/06/03/why-are-vulnerabilities-out-of-control-in-2024/</link>
      <pubDate>Mon, 03 Jun 2024 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3397</guid> 
      <description>&lt;p&gt;&lt;em&gt;Updated 2025-01-16: Since writing this post, there&amp;rsquo;s now a vulnerability focused discord you can join to discuss vulnerabilities. You can join with this &lt;a href=&#34;https://discord.gg/gSCrXxMuPx&#34;&gt;link&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;If you follow the vulnerability world, 2024 is starting to feel like we&amp;rsquo;ve become trapped in the mirror universe. NVD collapsed, the Linux kernel is generating a huge number of CVE IDs, CISA is maybe enriching the CVE data, and the growth rate of CVE is higher than its ever been. It feels like we&amp;rsquo;re careening off a cliff in the clown car where half the people are trapped inside trying to get out, and the other half are laughing at the clown honking its nose.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 431 - Redirecting HTTP to HTTPS</title>
      <link>https://opensourcesecurity.io/2024/06/02/episode-431-redirecting-http-to-https/</link>
      <pubDate>Mon, 03 Jun 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3447</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post titled &amp;ldquo;Your API Shouldn&amp;rsquo;t Redirect HTTP to HTTPS&amp;rdquo;. It&amp;rsquo;s an interesting idea, and probably a good one. There is however a lot of baggage in this space as you&amp;rsquo;ll hear in the discussion. There&amp;rsquo;s no a simple solution, but this is certainly something to discuss.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_431_Redirecting_HTTP_to_HTTPS.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_431_Redirecting_HTTP_to_HTTPS.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_431_Redirecting_HTTP_to_HTTPS.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://jviide.iki.fi/http-redirects&#34;&gt;Your API Shouldn&amp;rsquo;t Redirect HTTP to HTTPS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=40504756&#34;&gt;Hacker News discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc6797#section-5.1&#34;&gt;HSTS Section 5.1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 430 - Frozen kernel security</title>
      <link>https://opensourcesecurity.io/2024/05/26/episode-430-frozen-kernel-security/</link>
      <pubDate>Mon, 27 May 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3393</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post about frozen kernels being more secure. We cover some of the history and how a frozen kernel works and discuss why they would be less secure. A frozen kernel is from when things worked very differently. What sort of changes will we see in the future?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_430_Frozen_kernel_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_430_Frozen_kernel_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_430_Frozen_kernel_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@kurtseifried/112473890296299657&#34;&gt;Kurt&amp;rsquo;s strange coffee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ciq.com/blog/why-a-frozen-linux-kernel-isnt-the-safest-choice-for-security/&#34;&gt;Why a &amp;lsquo;frozen&amp;rsquo; distribution Linux kernel isn&amp;rsquo;t the safest choice for security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 429 - The autonomy of open source developers</title>
      <link>https://opensourcesecurity.io/2024/05/19/episode-429-the-autonomy-of-open-source-developers/</link>
      <pubDate>Mon, 20 May 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3388</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about open source and autonomy. This is even related to some recent return to office news. The conversation weaves between a few threads, but fundamentally there&amp;rsquo;s some questions about why do people do what they do, especially in the world of open source. This also is a problem we see in security, security people love to tell developers what to do. Developers don&amp;rsquo;t like being told what to do.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 428 - GitHub artifact attestation</title>
      <link>https://opensourcesecurity.io/2024/05/12/episode-428-github-artifact-attestation/</link>
      <pubDate>Mon, 13 May 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3382</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new to sign artifacts on GitHub. It&amp;rsquo;s in beta, it&amp;rsquo;s not going to be easy to use, it will have bugs. But that&amp;rsquo;s all OK. This is how we start. We need infrastructure like this to enable easier to use features in the future. Someday, everything will be signed by default.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_428_GitHub_artifact_attestation.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_428_GitHub_artifact_attestation.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_428_GitHub_artifact_attestation.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/&#34;&gt;GitHub artifact attestation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 427 - Will run0 replace sudo?</title>
      <link>https://opensourcesecurity.io/2024/05/05/episode-427-will-run0-replace-sudo/</link>
      <pubDate>Mon, 06 May 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3377</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a sudo replacement going into systemd called run0. It sounds like it&amp;rsquo;ll get a lot right, but systemd is a pretty big attack surface and not everyone is a fan. We shall have to see if this ends up replacing sudo.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_427_Will_run0_replace_sudo.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_427_Will_run0_replace_sudo.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_427_Will_run0_replace_sudo.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=FALlhXl6CmA&#34;&gt;Conan O&amp;rsquo;Brien on Hot Ones&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.social/@pid_eins/112353324518585654&#34;&gt;Lennart&amp;rsquo;s Mastodon thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1205/&#34;&gt;xkcd automation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 426 - Automatically exploiting CVEs with AI</title>
      <link>https://opensourcesecurity.io/2024/04/28/episode-426-automatically-exploiting-cves-with-ai/</link>
      <pubDate>Mon, 29 Apr 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3372</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a paper describing using a LLM to automatically create exploits for CVEs. The idea is probably already happening in many spaces such as pen testing and intelligence services. We can&amp;rsquo;t keep up with the number of vulnerabilities we have, there&amp;rsquo;s no way we can possibly keep up with a glut of LLM generated vulnerabilities. We really need to rethink how we handle vulnerabilities.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_426_Automatically_exploiting_CVEs_with_AI.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_426_Automatically_exploiting_CVEs_with_AI.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_426_Automatically_exploiting_CVEs_with_AI.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/04/17/gpt4_can_exploit_real_vulnerabilities/&#34;&gt;OpenAI&amp;rsquo;s GPT-4 can exploit real vulnerabilities by reading security advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arxiv.org/abs/2404.08144&#34;&gt;paper: LLM Agents can Autonomously Exploit One-day Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=19507225&#34;&gt;Cisco Fixes RV320/RV325 Vulnerability by Banning “curl” in User-Agent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/CloudSecurityAlliance/webfinger.io.git&#34;&gt;Episode 219 – Chat with Larry Cashdollar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://locusmag.com/2023/12/commentary-cory-doctorow-what-kind-of-bubble-is-ai/&#34;&gt;Cory Doctorow: What Kind of Bubble is AI?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 425 - Video game cheaters, also pretendo</title>
      <link>https://opensourcesecurity.io/2024/04/21/episode-425-video-game-cheaters-also-pretendo/</link>
      <pubDate>Mon, 22 Apr 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3367</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a database of game cheaters. Cheating in games has many similarities to security problems. Anti cheat rootkits are also terrible. The clever thing however is using statistics to identify cheaters. Statistics don&amp;rsquo;t lie. Also, we discuss the Pretendo project sitting on a vulnerability for a year, is this ethical?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_425_Video_game_cheaters_also_pretendo.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_425_Video_game_cheaters_also_pretendo.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_425_Video_game_cheaters_also_pretendo.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=40017918&#34;&gt;Hacker News searchable database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Benford%27s_law&#34;&gt;Benford&amp;rsquo;s law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=bVIsnOfNfCo&#34;&gt;John Oliver Medicaid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=YsXCVsDFiXA&#34;&gt;Mario64 invisible walls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pretendo.network/&#34;&gt;Pretendo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.pretendo.network/@pretendo/112238381209517548&#34;&gt;Pretendo exploit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 424 - The Notepad&#43;&#43; Parasite Website</title>
      <link>https://opensourcesecurity.io/2024/04/14/episode-424-the-notepad-parasite-website/</link>
      <pubDate>Mon, 15 Apr 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3363</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a Notepad++ fake website. It&amp;rsquo;s possibly not illegal, but it&amp;rsquo;s certainly ethically wrong. We also end up discussing why it seems like all these weird and wild things keep happening. It&amp;rsquo;s probably due to the massive size of open source (and everything) now. Things have gotten gigantic and we didn&amp;rsquo;t really notice.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_424_The_Notepad_Parasite_Website.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_424_The_Notepad_Parasite_Website.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_424_The_Notepad_Parasite_Website.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://notepad-plus-plus.org/news/help-to-take-down-parasite-site/&#34;&gt;Help us to take down the parasite website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.google.com/presentation/d/1exE08fUUra34FtlGaAk_kD4GSFuOftxej7DtQib_lus/edit#slide=id.g249ebc07193_0_20&#34;&gt;Open Source is bigger than you can imagine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Toronto_Pearson_International_Airport_heist&#34;&gt;Toronto Pearson International Airport heist&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 423 - FCC cybersecurity label for consumer devices</title>
      <link>https://opensourcesecurity.io/2024/04/07/episode-423-fcc-cybersecurity-label-for-consumer-devices/</link>
      <pubDate>Mon, 08 Apr 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3355</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new FCC program to provide a cybersecurity certification mark. Similar to other consumer safety marks such as UL or CE. We also tie this conversation into GrapheneOS, and what trying to claim a consumer device is secure really means. Some of our compute devices have an infinite number of possible states. It&amp;rsquo;s a really weird and hard problem.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_423_FCC_cybersecurity_label_for_consumer_devices.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_423_FCC_cybersecurity_label_for_consumer_devices.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_423_FCC_cybersecurity_label_for_consumer_devices.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://grapheneos.org/&#34;&gt;GrapheneOS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyberscoop.com/fcc-cyber-trust-mark/?utm_source=tldrinfosec&#34;&gt;FCC approves cybersecurity label for consumer devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fcc.gov/cybersecurity-certification-mark&#34;&gt;Cyber Trust Mark Logo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>XZ Bonus Spectacular Episode</title>
      <link>https://opensourcesecurity.io/2024/04/01/xz-bonus-spectacular-episode/</link>
      <pubDate>Mon, 01 Apr 2024 12:03:26 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3359</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent events around XZ. It&amp;rsquo;s only been a few days, and it&amp;rsquo;s amazing what we already know. We explain a lot of the basics we currently know with the attitude much of these details will change quickly over the coming week. We can&amp;rsquo;t fix this problem as it stands, we don&amp;rsquo;t know where to start yet. But that&amp;rsquo;s not a reason to lose hope. We can fix this if we want to, but it won&amp;rsquo;t be flashy, it&amp;rsquo;ll be hard work.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 422 - Do you have a security.txt file?</title>
      <link>https://opensourcesecurity.io/2024/03/31/episode-422-do-you-have-a-security-txt-file/</link>
      <pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3351</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security.txt file. It&amp;rsquo;s not new, but it&amp;rsquo;s not something we&amp;rsquo;ve discussed before. It&amp;rsquo;s a great idea, an easy format, and well defined. It&amp;rsquo;s not high on many of our todo lists, but it&amp;rsquo;s something worth doing.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_422_Do_you_have_a_securitytxt_file.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_422_Do_you_have_a_securitytxt_file.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_422_Do_you_have_a_securitytxt_file.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc9116&#34;&gt;RFC 9116&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 421 - CISA&#39;s new SSDF attestation form</title>
      <link>https://opensourcesecurity.io/2024/03/24/episode-421-cisas-new-ssdf-attestation-form/</link>
      <pubDate>Mon, 25 Mar 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3345</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new SSDF attestation form from CISA. The current form isn&amp;rsquo;t very complicated, and the SSDF has a lot of room for interpretation. But this is the start of something big. It&amp;rsquo;s going to take a long time to see big changes in supply chain security, but we&amp;rsquo;re confident they will come.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_421_CISA_new_SSDF_attestation_form.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_421_CISA_new_SSDF_attestation_form.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_421_CISA_new_SSDF_attestation_form.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/resources-tools/resources/secure-software-development-attestation-form&#34;&gt;Secure Software Development Attestation Form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nationalinterest.org/blog/reboot/us-military-missing-six-nuclear-weapons-180032&#34;&gt;The U.S. Military Is Missing Six Nuclear Weapons&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/pubs/sp/800/218/final&#34;&gt;NIST 800-218&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 420 - What&#39;s going on at NVD</title>
      <link>https://opensourcesecurity.io/2024/03/17/episode-420-whats-going-on-at-nvd/</link>
      <pubDate>Mon, 18 Mar 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3341</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what&amp;rsquo;s going on at the National Vulnerability Database. NVD suddenly stopped enriching vulnerabilities, and it&amp;rsquo;s sent shock-waves through the vulnerability management space. While there are many unknowns right now, the one thing we can count on is things won&amp;rsquo;t go back to the way they were.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_420_Whats_going_on_at_NVD.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_420_Whats_going_on_at_NVD.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_420_Whats_going_on_at_NVD.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://anchore.com/blog/national-vulnerability-database-opaque-changes-and-unanswered-questions/&#34;&gt;Anchore&amp;rsquo;s Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/grype/&#34;&gt;Grype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cyphercon.com/presentation/open-source-security-is-bigger-than-you-can-imagine/&#34;&gt;Josh&amp;rsquo;s Cyphercon Talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ecosyste.ms/&#34;&gt;Ecosyste.ms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2021/04/11/episode-266-the-future-of-security-scanning-with-debricked/&#34;&gt;Episode 266 – The future of security scanning with Debricked&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 419 - Malicious GitHub repositories</title>
      <link>https://opensourcesecurity.io/2024/03/10/episode-419-malicious-github-repositories/</link>
      <pubDate>Mon, 11 Mar 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3336</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about an attack against GitHub where attackers are creating malicious repositories then artificially inflating the number of stars and forks. This is really a discussion about how can we try to find signal in all the noise of a massive ecosystem like GitHub.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_419_Malicious_GitHub_repositories.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_419_Malicious_GitHub_repositories.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_419_Malicious_GitHub_repositories.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/02/github-besieged-by-millions-of-malicious-repositories-in-ongoing-attack/&#34;&gt;GitHub besieged by millions of malicious repositories in ongoing attack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 418 - Being right all the time is hard</title>
      <link>https://opensourcesecurity.io/2024/03/03/episode-418-being-right-all-the-time-is-hard/</link>
      <pubDate>Mon, 04 Mar 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3331</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about recent stories about data breaches, flipper zero banning, and realistic security. We have a lot of weird challenges in the world of security, but hard problems aren&amp;rsquo;t impossible problems. Sometimes we forget that.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_418_Being_right_all_the_time_is_hard.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_418_Being_right_all_the_time_is_hard.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_418_Being_right_all_the_time_is_hard.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2024/02/12/infosec_news_roundup/&#34;&gt;Mon Dieu! Nearly half the French population have data nabbed in massive breach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://globalnews.ca/video/10300516/feds-move-to-ban-auto-theft-tech-device-flipper-zero&#34;&gt;Feds move to ban auto theft tech device ‘Flipper Zero’&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mailgun.com/blog/deliverability/gmail-and-yahoo-inbox-updates-2024/&#34;&gt;Gmail and Yahoo’s 2024 inbox protections and what they mean for your email program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2024/02/vending-machine-error-reveals-secret-face-image-database-of-college-students/&#34;&gt;Vending machine error reveals secret face image database of college students&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 417 - Linux Kernel security with Greg K-H</title>
      <link>https://opensourcesecurity.io/2024/02/25/episode-417-linux-kernel-security-with-greg-k-h/</link>
      <pubDate>Mon, 26 Feb 2024 00:10:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3325</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to GregKH about Linux Kernel security. We most focus on the topic of vulnerabilities in the Linux Kernel, and what being a CNA will mean for the future of Linux Kernel security vulnerabilities. The future of Linux Kernel security vulnerabilities is going to be very interesting.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_417_Linux_Kernel_security_with_Greg_K-H.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_417_Linux_Kernel_security_with_Greg_K-H.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_417_Linux_Kernel_security_with_Greg_K-H.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://social.kernel.org/users/gregkh&#34;&gt;Greg K-H&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.kroah.com/log/blog/2024/02/13/linux-is-a-cna/&#34;&gt;Linux Kernel is a CNA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lwn.net/Articles/764647/&#34;&gt;Machine learning and stable kernels&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.kernel.org/admin-guide/reporting-issues.html&#34;&gt;Bug reporting for Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 416 - Thomas Depierre on open source in Europe</title>
      <link>https://opensourcesecurity.io/2024/02/18/episode-416-thomas-depierre-on-open-source-in-europe/</link>
      <pubDate>Mon, 19 Feb 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3321</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Thomas Depierre about some of the European efforts to secure software. We touch on the CRA, MDA, FOSDEM, and more. As expected Thomas drops a huge amount of knowledge on what&amp;rsquo;s happening in open source. We close the show with a lot of ideas around how to move the needle for open source. It&amp;rsquo;s not easy, but it is possible.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_416_Thomas_Depierre_on_open_source_in_Europe.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_416_Thomas_Depierre_on_open_source_in_Europe.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_416_Thomas_Depierre_on_open_source_in_Europe.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hachyderm.io/@Di4na&#34;&gt;Thomas Depierre&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.softwaremaxims.com/blog/not-a-supplier&#34;&gt;I am not a supplier&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fosdem.org/2024/schedule/track/eu-policy/&#34;&gt;Open Source In The European Legislative Landscape devroom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act&#34;&gt;Cyber Resilience Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/open-source-maintainer-survey-2023&#34;&gt;The 2023 Tidelift state of the open source maintainer report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 415 - Reducing attack surface for less security</title>
      <link>https://opensourcesecurity.io/2024/02/11/episode-415-reducing-attack-surface-for-less-security/</link>
      <pubDate>Mon, 12 Feb 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3316</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post explaining how to create a very very small container image. Generally in the world of security less is more, but it&amp;rsquo;s possible to remove too much. A lot of today&amp;rsquo;s security tooling relies on certain things to exist in a container image, if we remove them we could actually result in worse security than leaving it in. It&amp;rsquo;s a weird topic, but probably pretty important.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 414 - The exploited ecosystem of open source</title>
      <link>https://opensourcesecurity.io/2024/02/04/episode-414-the-exploited-ecosystem-of-open-source/</link>
      <pubDate>Mon, 05 Feb 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3310</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about open source projects proving builds, and things nobody wants to pay for in open source. It&amp;rsquo;s easy to have unrealistic expectations for open source projects, but we have the open source that capitalism demands.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_414_The_exploited_ecosystem_of_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_414_The_exploited_ecosystem_of_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_414_The_exploited_ecosystem_of_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://codeengineered.com/blog/2024/open-source-not-builds/&#34;&gt;Open Source Doesn&amp;rsquo;t Require Providing Builds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lwn.net/SubscriberLink/959069/24c0b18e9fc1b073/&#34;&gt;The things nobody wants to pay for&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/news/audacity-fans-are-absolutely-furious-right-now-heres-why&#34;&gt;Audacity privacy policy update has caused an outcry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/R-N-fgKWYGU?si=ntvTOBKTyC0cJcqu&#34;&gt;The History of X11&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 413 - PyTorch and NPM get attacked, but it&#39;s OK</title>
      <link>https://opensourcesecurity.io/2024/01/28/3303/</link>
      <pubDate>Mon, 29 Jan 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3303</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about an attack against PyTorch and NPM. The PyTorch attack shows the difficulty of operating a large open source project. The NPM situation continues to show the difficulty in trying to backdoor open source. Many people are watching, and it only takes one person to notice a problem and report it, and we all benefit.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_413_PyTorch_and_NPM_get_attacked_but_its_OK.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_413_PyTorch_and_NPM_get_attacked_but_its_OK.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_413_PyTorch_and_NPM_get_attacked_but_its_OK.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/wwP5N44Lcd8?si=FJ0uIrDWgXLvtZlc&#34;&gt;Peanut Butter the dog plays Gyromite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/The_Wizard_(1989_film)&#34;&gt;The Wizard movie&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/&#34;&gt;PyTorch supply chain attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.phylum.io/npm-package-found-delivering-sophisticated-rat/&#34;&gt;npm Package Found Delivering Sophisticated RAT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.aquasec.com/deceptive-deprecation-the-truth-about-npm-deprecated-packages&#34;&gt;Deceptive Deprecation: The Truth About npm Deprecated Packages&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=AbSehcT19u0&#34;&gt;Changing a lightbulb&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=Ud9jWbXq4aQ&#34;&gt;Spelunking the Bitcoin Blockchain with Josh Bressers | CypherCon 4.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://media.ccc.de/v/37c3-11859-operation_triangulation_what_you_get_when_attack_iphones_of_researchers&#34;&gt;Operation Triangulation - What You Get When Attack iPhones of Researchers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sonatype.com/state-of-the-software-supply-chain/introduction&#34;&gt;9th Annual State of the Software Supply Chain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 412 - Blame the users for bad passwords!</title>
      <link>https://opensourcesecurity.io/2024/01/21/episode-412-blame-the-users-for-bad-passwords/</link>
      <pubDate>Mon, 22 Jan 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3298</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the 23andMe compromise and how they are blaming the users. It&amp;rsquo;s obviously the the fault of the users, but there&amp;rsquo;s still a lot of things to discuss on this one. Every company has to care about cybersecurity now, even if they don&amp;rsquo;t want to.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_412_Blame_the_users_for_bad_passwords.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_412_Blame_the_users_for_bad_passwords.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_412_Blame_the_users_for_bad_passwords.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.securitymagazine.com/articles/100299-security-leaders-weigh-in-on-23andme-hack&#34;&gt;Security leaders weigh in on 23andme hack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=ufDTDUPZrag&#34;&gt;Don&amp;rsquo;t need a gun when you have a Donk - Crocodile Dundee 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/&#34;&gt;Hackers can infect network-connected wrenches to install ransomware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/5d5NJgO38AE?si=X81l5hOHKKBkFoRg&amp;amp;t=360&#34;&gt;My disappointment is immeasurable, and my day is ruined&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 411 - The security tools that started it all</title>
      <link>https://opensourcesecurity.io/2024/01/14/episode-411-the-security-tools-that-started-it-all/</link>
      <pubDate>Mon, 15 Jan 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3292</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a grab bag of old technologies that defined the security industry. Technology like SELinux, SSH, Snort, ModSecurity and more all started with humble beginnings, and many of them created new security industries.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_411_The_security_tools_that_started_it_all.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_411_The_security_tools_that_started_it_all.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_411_The_security_tools_that_started_it_all.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.redhat.com/en/topics/linux/what-is-selinux&#34;&gt;SELinux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apparmor.net/&#34;&gt;AppArmor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Secure_Shell&#34;&gt;SSH&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/SpiderLabs/ModSecurity&#34;&gt;ModSecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.snort.org/&#34;&gt;Snort&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nmap.org/&#34;&gt;Nmap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.tenable.com/products/nessus&#34;&gt;Nessus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2023/12/27/bruce_perens_post_open/&#34;&gt;What comes after open source&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 410 - Package identifiers are really hard</title>
      <link>https://opensourcesecurity.io/2024/01/07/episode-410-package-identifiers-are-really-hard/</link>
      <pubDate>Mon, 08 Jan 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3289</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about package identifiers. We break this down in the context of an OpenSSF response to a CISA paper on software identifications. The identifiers that get all the air time are purl, CPE, SWID, and OmniBOR. This is a surprisingly complex problem space. It feels easy, but it&amp;rsquo;s not.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_410_Package_identifiers_are_really_hard.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_410_Package_identifiers_are_really_hard.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_410_Package_identifiers_are_really_hard.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://openssf.org/blog/2023/12/11/openssf-responds-to-the-cisa-rfc-on-software-identification-ecosystem-analysis/&#34;&gt;OpenSSF CISA response&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/package-url/purl-spec&#34;&gt;purl&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvd.nist.gov/products/cpe&#34;&gt;CPE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://omnibor.io/&#34;&gt;OmniBOR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://csrc.nist.gov/projects/software-identification-swid&#34;&gt;SWID&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 409 - You wouldn&#39;t hack a train?</title>
      <link>https://opensourcesecurity.io/2023/12/31/episode-409-you-wouldnt-hack-a-train/</link>
      <pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3285</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how some hackers saved the day with a Polish train. We delve into a discussion about how we don&amp;rsquo;t really own anything anymore if you look around. There&amp;rsquo;s a great talk from the Blender Conference about this and how GPL makes a difference in the world of software ownership. It&amp;rsquo;s sort of a dire conversation, but not all hope is lost.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_409_You_wouldnt_hack_a_train_fixed.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_409_You_wouldnt_hack_a_train_fixed.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_409_You_wouldnt_hack_a_train_fixed.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://notesfrompoland.com/2023/12/06/polish-manufacturer-accused-of-programming-failures-into-its-trains-to-gain-more-servicing-business/&#34;&gt;Polish manufacturer accused of programming failures into its trains to gain more servicing business&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.404media.co/polish-hackers-repaired-trains-the-manufacturer-artificially-bricked-now-the-train-company-is-threatening-them/?ref=daily-stories-newsletter&#34;&gt;Polish Hackers Repaired Trains the Manufacturer Artificially Bricked. Now The Train Company Is Threatening Them&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://conference.blender.org/2023/presentations/1906/&#34;&gt;Blender Conference Keynote&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pluralistic.net/&#34;&gt;Corey Doctorow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=4l16zI0sYRs&#34;&gt;Chicago has a problem until the year 2083 | Stand-up Maths&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=fDx6no-7HZE&#34;&gt;Chicago Doesn’t Own Its Own Streets | Climate Town&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 408 - Does Kubernetes need long term support?</title>
      <link>https://opensourcesecurity.io/2023/12/24/episode-408-does-kubernetes-need-long-term-support/</link>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3280</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a story asking for a Kubernetes LTS. Should open source projects have LTS versions? What does LTS even mean? Why is maintaining software so hard? It&amp;rsquo;s a lively discussion all about the past, present, and future of open source LTS.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_408_Does_Kubernetes_need_long_term_support_fixed.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_408_Does_Kubernetes_need_long_term_support_fixed.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_408_Does_Kubernetes_need_long_term_support_fixed.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://matduggan.com/why-kubernetes-needs-an-lts/&#34;&gt;Why Kubernetes needs an LTS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/gadgets/2023/09/linux-gives-up-on-6-year-lts-thats-fine-for-pcs-bad-for-android/&#34;&gt;Linux gives up on 6-year LTS kernels, says they’re too much work&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 407 - Should Santa use AI?</title>
      <link>https://opensourcesecurity.io/2023/12/17/episode-407-should_santa-use-ai/</link>
      <pubDate>Mon, 18 Dec 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3272</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s the 2023 Christmas Spectacular! &lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what would happen if Santa starts using AI to judge which children are naughty and nice. There&amp;rsquo;s some fun in this one, but it does get pretty real. While we tried to discuss Santa using AI, the reality is this sort of AI is coming for many of us. AI will be making decisions for all of us in the near future (if it isn&amp;rsquo;t already). While less fun than we had hoped for, it&amp;rsquo;s an important conversation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 406 - The security of radio</title>
      <link>https://opensourcesecurity.io/2023/12/10/episode-406-the-security-of-radio/</link>
      <pubDate>Mon, 11 Dec 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3268</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a few security stories about radio. The TETRA:BURST attack on police radios, spoofing GPS for airplanes near Iran, and Apple including cellular radios in the macbooks. The common thread between all these stories is looking at the return on investment for security. Sometimes good enough security is fine, sometimes it&amp;rsquo;s not worth fixing certain security problems because the risk vs reward doesn&amp;rsquo;t work out.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_406_The_security_of_radio.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_406_The_security_of_radio.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_406_The_security_of_radio.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2023/07/tetraburst-5-new-vulnerabilities.html&#34;&gt;TETRA:BURST&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vice.com/en/article/m7bk3v/commercial-flights-are-experiencing-unthinkable-gps-attacks-and-nobody-knows-what-to-do&#34;&gt;GPS spoofing attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.macrumors.com/2023/11/20/macbook-integrated-cellular-modem-2028/&#34;&gt;Apple MacBooks cellular radio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.usenix.org/system/files/1401_08-12_mickens.pdf&#34;&gt;Mossad vs Not Mossad&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 405 - Modding games isn&#39;t cheating and security isn&#39;t fair</title>
      <link>https://opensourcesecurity.io/2023/12/03/episode-405-modding-games-isnt-cheating-and-security-isnt-fair/</link>
      <pubDate>Mon, 04 Dec 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3263</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Capcom claiming modding a game is akin to cheating. The arguments used are fundamentally one of equity vs equality. Humans love to focus on equality instead of equity when we deal with most problems. This is especially true in the world of security. Rather than doing something that has a net positive, we ignore the details and focus on doing something that feels &amp;ldquo;right&amp;rdquo;.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_405_Modding_games_isnt_cheating_and_security_isnt_fair.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_405_Modding_games_isnt_cheating_and_security_isnt_fair.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_405_Modding_games_isnt_cheating_and_security_isnt_fair.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/gaming/2023/11/no-capcom-modding-pc-games-isnt-the-same-as-cheating/&#34;&gt;Why Capcom thinks PC game modding is akin to “cheating”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.benheck.com/&#34;&gt;Ben Heck&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 403 - Does the government banning apps work?</title>
      <link>https://opensourcesecurity.io/2023/11/26/episode-403-does-the-government-banning-apps-work/</link>
      <pubDate>Mon, 27 Nov 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3258</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Canadian Government banning WeChat and Kaspersky. There&amp;rsquo;s a lot of weird little details in this conversation. It fundamentally comes down to a conversation about risk. It&amp;rsquo;s easy to spout nonsense about risk, but having an honest discussion about it is REALLY complicated. But the government plays by a very different set of rules.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_403_Does_the_government_banning_apps_work.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_403_Does_the_government_banning_apps_work.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_403_Does_the_government_banning_apps_work.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/technology/canada-bans-wechat-kaspersky-applications-government-devices-statement-2023-10-30/&#34;&gt;Canada bans WeChat, Kaspersky applications on government devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases&#34;&gt;Fitness tracking app Strava gives away location of secret US army bases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://betanews.com/2023/10/30/phishing-emails-increase-over-1200-percent-since-chatgpt-launch/&#34;&gt;Phishing emails increase over 1,200 percent since ChatGPT launch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fedramp.gov/blog/2023-05-30-rev-5-baselines-have-been-approved-and-released/&#34;&gt;FedRAMP Rev 5&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fairinstitute.org/&#34;&gt;FAIR Institute&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 402 - The EU&#39;s eIDAS regulation is a terrible idea</title>
      <link>https://opensourcesecurity.io/2023/11/19/episode-402-the-eus-eidas-regulation-is-a-terrible-idea/</link>
      <pubDate>Mon, 20 Nov 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3254</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new EU eIDAS regulation. This is a bill that will force web browsers to add root certificates based on law instead of technical merits, which is how it&amp;rsquo;s currently done. This is concerning for a number of reasons that we discuss on the show. This proposal is not a good idea.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_402_The_EUs_eIDAS_regulation_is_a_terrible_idea.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_402_The_EUs_eIDAS_regulation_is_a_terrible_idea.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_402_The_EUs_eIDAS_regulation_is_a_terrible_idea.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://last-chance-for-eidas.org/update-151123&#34;&gt;Mozilla site&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://groups.google.com/a/ccadb.org/g/public?pli=1&#34;&gt;Root CA mailing list&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ico.org.uk/for-organisations/guide-to-eidas/what-is-the-eidas-regulation/&#34;&gt;UK eIDAS regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2023/11/article-45-will-roll-back-web-security-12-years&#34;&gt;EFF statement on eIDAS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers/111093190022883790&#34;&gt;Fixed XKCD comic&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 401 - Security skills shortage - We&#39;ve tried nothing and the same thing keeps happening</title>
      <link>https://opensourcesecurity.io/2023/11/12/episode-401-security-skills-shortage-weve-tried-nothing-and-the-same-thing-keeps-happening/</link>
      <pubDate>Mon, 13 Nov 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3250</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about security skills shortage. We start out on the topic of cybersecurity skills and weave our way around a number of human related problems in this space. The world of tech has a lot of weird problems and there&amp;rsquo;s not a lot of movement to fix many of them. Tech is weird and hard, and with the almost complete lack of regulation creates some of these challenges. In the world of security we need a better talent pipeline, but that takes actual efforts, not just complaining on the internet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 400 - When can the government hack a victim?</title>
      <link>https://opensourcesecurity.io/2023/11/05/episode-400-when-can-the-government-hack-a-victim/</link>
      <pubDate>Mon, 06 Nov 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3246</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a proposed Dutch proposal that would allow the intelligence services to hack victims of adversaries they are in the process of infiltrating. The purpose of this discussion isn&amp;rsquo;t to focus on the Dutch specifically, but rather to discuss the larger topic of government oversight. These are all very new concepts and nobody knows how things should work.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_400_When_can_the_government_hack_a_victim.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_400_When_can_the_government_hack_a_victim.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_400_When_can_the_government_hack_a_victim.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://aboutintel.eu/nl-government-wants-to-abandon-key-safeguards-for-hacking-of-non-targets/&#34;&gt;Dutch hacking proposal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=asze0zaTcGc&#34;&gt;Give Me Toilet Paper! by Asuka424 in 9:54 - Summer Games Done Quick 2023&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=36253591&#34;&gt;Flipper Zero Smart Meter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=N-w3VM4NbH0&#34;&gt;Frequency Hopping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://law-and-politics.online/@Teri_Kanefield&#34;&gt;Teri Kanfield&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 399 - Curl, Security, and Daniel Stenberg</title>
      <link>https://opensourcesecurity.io/2023/10/29/episode-399-curl-security-and-daniel-stenberg/</link>
      <pubDate>Mon, 30 Oct 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3241</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Daniel Stenberg about curl. Daniel is the creator of curl, we chat with him about the security of curl. Daniel tells us how curl is kept secure, we learn about some of the historical reasons curl works the way it does. We hear the story about the curl CVE situation firsthand. We also touch on the importance of curating the community of a popular open source project.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 398 - Is only 11% of open source maintained?</title>
      <link>https://opensourcesecurity.io/2023/10/22/episode-398-is-only-11-of-open-source-mainted/</link>
      <pubDate>Mon, 23 Oct 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3236</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Sonatype&amp;rsquo;s 9th Annual State of the Software Supply Chain. There&amp;rsquo;s a ton of data in the report, but the thing we want to talk about is the statistic that only 11% of open source is actually being maintained. Do we think that&amp;rsquo;s true? Does it really matter?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_398_Is_only_11_of_open_source_mainted.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_398_Is_only_11_of_open_source_mainted.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_398_Is_only_11_of_open_source_mainted.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sonatype.com/hubfs/9th-Annual-SSSC-Report.pdf&#34;&gt;Sonatype report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ecosyste.ms/&#34;&gt;ecosyste.ms&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2023/10/libcue-library-flaw-opens-gnome-linux.html&#34;&gt;GNOME libcue flaw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reality2cast.com/152&#34;&gt;Reality 2.0 supply chain episode&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 397 - The curl and glibc vulnerabilities</title>
      <link>https://opensourcesecurity.io/2023/10/15/episode-397-the-curl-and-glibc-vulnerabilities/</link>
      <pubDate>Mon, 16 Oct 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3232</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a curl and glibc bug. The bugs themselves aren&amp;rsquo;t super interesting, but there are other conversations around the bugs that are interesting. Why don&amp;rsquo;t we just rewrite everything in Rust? Why can&amp;rsquo;t we just train developers to stop writing insecure code. How can AI solve this problem? It&amp;rsquo;s a marvelous conversation that ends on the very basic idea: we already have the security the market demands. Unless we change that demand, security won&amp;rsquo;t change.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 396 - CLAs are bad, Mkay?</title>
      <link>https://opensourcesecurity.io/2023/10/08/episode-396-clas-are-bad-mkay/</link>
      <pubDate>Mon, 09 Oct 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3228</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about contributor license agreements (CLAs). CLAs used to be seen as a necessary evil, but they&amp;rsquo;re almost certainly bad now. We&amp;rsquo;re seeing CLAs being abused, it&amp;rsquo;s clear now anything controlled by a CLA won&amp;rsquo;t be open source forever.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_396_CLAs_are_bad_Mkay.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_396_CLAs_are_bad_Mkay.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_396_CLAs_are_bad_Mkay.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2999185&#34;&gt;A Theory of Joint Authorship for Free and Open Source Software Projects&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=vTsc1m78BUk&#34;&gt;Bruce Perens: What Comes After Open Source&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 395 - Uncertainty, trust, and security</title>
      <link>https://opensourcesecurity.io/2023/10/01/episode-395-uncertainty-trust-and-security/</link>
      <pubDate>Mon, 02 Oct 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3223</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about uncertainty. There are a bunch of stories in the news lately that really just boil down to uncertainty. Uncertainty is incredibly dangerous for everyone. We are afraid of uncertainty, and often don&amp;rsquo;t really understand why it is. Trust is like a currency and uncertainty erodes trust faster than almost anything else.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_395_Uncertainty_trust_and_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_395_Uncertainty_trust_and_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_395_Uncertainty_trust_and_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.geekwire.com/2023/unity-exec-marc-whitten-shares-apology-letter-following-backlash-to-controversial-licensing-policies/&#34;&gt;Unity&amp;rsquo;s license mess&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://godotengine.org/&#34;&gt;Godot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.indiatoday.in/technology/news/story/meta-and-salesforce-want-to-re-hire-employees-they-fired-earlier-this-year-2440598-2023-09-26&#34;&gt;Meta and Salesforce want to re-hire people they fired earlier this year&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://budget.house.gov/resources/staff-working-papers/us-debt-credit-rating-downgraded-only-second-time-in-nations-history&#34;&gt;U.S. Debt Credit Rating Downgraded, Only Second Time In Nation’s History&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 394 - The lie anyone can contribute to open source</title>
      <link>https://opensourcesecurity.io/2023/09/24/episode-394-the-lie-anyone-can-contribute-to-open-source/</link>
      <pubDate>Mon, 25 Sep 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3216</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about filing bugs for software. There&amp;rsquo;s the old saying that anyone can file bugs and submit patches for open source, but the reality is most people can&amp;rsquo;t. Filing bugs for both closed and open source is nearly impossible in many instances. Even if you want to file a bug for an open source project, there are a lot of hoops before it&amp;rsquo;s something that can be actionable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 393 - Can you secure something you don&#39;t own?</title>
      <link>https://opensourcesecurity.io/2023/09/17/episode-393-can-you-secure-something-you-dont-own/</link>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3212</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the weird world we live in how where we can&amp;rsquo;t control a lot of our hardware. We don&amp;rsquo;t really have control over most devices we interact with on a daily basis. The conversation shifts into a question of how can we decide what to trust and where. It&amp;rsquo;s a very strange problem we experience now.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_393_Can_you_secure_something_you_dont_own.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_393_Can_you_secure_something_you_dont_own.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_393_Can_you_secure_something_you_dont_own.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Boots_theory&#34;&gt;Boots theory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2023/9/11/23869020/mgm-resorts-hacked-casino-shut-down-las-vegas&#34;&gt;MGM cybersecurity issue shuts down slot machines and ATMs in Las Vegas casinos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://archive.org/stream/FDNYforcibleEntryReferenceGuide/FDNY_Forcible_entry_reference_guide_djvu.txt&#34;&gt;New York Fire Department Forcible Entry Reference Guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/wp-content/uploads/2023/08/OS3I-RFI-Embargoed-Until-08102023-0500EST.pdf&#34;&gt;Request for Information on Open-Source Software Security: Areas of Long-Term Focus&lt;br&gt;
and Prioritization&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 392 - Curl and the calamity of CVE</title>
      <link>https://opensourcesecurity.io/2023/09/10/episode-392-curl-and-the-calamity-of-cve/</link>
      <pubDate>Mon, 11 Sep 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3208</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about why CVE is making the news lately. Things are not well in the CVE program, and it&amp;rsquo;s not looking like anything will get fixed anytime soon. Josh and Kurt have a unique set of knowledge around CVE. There&amp;rsquo;s a lot of confusion and difficulty in understanding how CVE works.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_392_Curl_and_the_calamity_of_CVE.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_392_Curl_and_the_calamity_of_CVE.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_392_Curl_and_the_calamity_of_CVE.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://daniel.haxx.se/blog/2023/09/05/bogus-cve-follow-ups/&#34;&gt;Curl blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcewatch.beehiiv.com/p/now-postgresqls-turn-bogus-cve&#34;&gt;Now it&amp;rsquo;s PostgreSQL&amp;rsquo;s turn to have a bogus CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/github/advisory-database&#34;&gt;GitHub Advisory Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers/110968734125211326&#34;&gt;Josh&amp;rsquo;s &amp;ldquo;CVE tried to get me fired&amp;rdquo; story&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 391 - The Wordpress 100 year disaster recovery problem</title>
      <link>https://opensourcesecurity.io/2023/09/03/episode-391-the-wordpress-100-year-disaster-recovery-problem/</link>
      <pubDate>Mon, 04 Sep 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3204</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about wordpress selling web services with a 100 year lifespan. Will WordPress still be around in 100 years? What would 100 years of disaster recovery look like? Most of us will never need to think about 100 years of disaster recovery.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_391_The_Wordpress_100_year_disaster_recovery_problem.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_391_The_Wordpress_100_year_disaster_recovery_problem.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_391_The_Wordpress_100_year_disaster_recovery_problem.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2023/08/28/wordpress-is-now-selling-100-year-domains/&#34;&gt;WordPress is now selling 100-year domains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cpomagazine.com/cyber-security/ransomware-attack-on-danish-hosting-providers-causes-almost-complete-data-loss-for-customers/&#34;&gt;Danish ransomware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.15minutecity.com/&#34;&gt;15-Minute City&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://scottberkun.com/yearwithoutpants/&#34;&gt;The Year Without Pants&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 390 - Rust shipping binaries doesn&#39;t matter</title>
      <link>https://opensourcesecurity.io/2023/08/27/episode-390-rust-shipping-binaries-doesnt-matter/</link>
      <pubDate>Mon, 28 Aug 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3200</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post that explains how C and C++ compilers prioritize performance over correctness. This is the class story of security vs usability. Security is never the primary goal. If a security requirement doesn&amp;rsquo;t also enable other business goals it will fail. We also touch on the news of a Rust package containing binary files. It doesn&amp;rsquo;t really have anything to do with security, it&amp;rsquo;s all about convenience.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 389 - What would HashiCorp do?</title>
      <link>https://opensourcesecurity.io/2023/08/20/episode-389-what-would-hashicorp-do/</link>
      <pubDate>Mon, 21 Aug 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3196</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the HashiCorp license change and copyright problems in open source. This isn&amp;rsquo;t the first and won&amp;rsquo;t be the last time we see this, but it&amp;rsquo;s very likely open source developers and communities will view any project that has a contributor license agreement as a problem moving forward.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_389_What_would_HashiCorp_do.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_389_What_would_HashiCorp_do.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_389_What_would_HashiCorp_do.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=H9YqJ1Ry1l8&amp;amp;t=27969s&#34;&gt;Josh&amp;rsquo;s BSidesLV talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=37086814&#34;&gt;Hacker News marked site as malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hashicorp.com/license-faq#What-did-HashiCorp-announce-today-(Aug-10)&#34;&gt;HashiCorp license change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2999185&#34;&gt;A Theory of Joint Authorship for Free and Open Source Software Projects&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 388 - Video game vulnerabilities</title>
      <link>https://opensourcesecurity.io/2023/08/13/episode-388-video-game-vulnerabilities/</link>
      <pubDate>Mon, 14 Aug 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3192</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; ask the question what is a vulnerability, but in the framing of video games. Security loves to categorize all bugs as security vulnerabilities or not security vulnerabilities. But the reality nothing is so simple. Everything is a question of risk, not vulnerability. The discussion about video games can help us to better have this discussion.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_388_Video_game_vulnerabilities.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_388_Video_game_vulnerabilities.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_388_Video_game_vulnerabilities.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=tlGuw4xWfsw&#34;&gt;Colossus bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=Xg9uF9MFEi4&#34;&gt;Minecraft Heist&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 387 - Enterprise open source is different</title>
      <link>https://opensourcesecurity.io/2023/08/06/episode-387-enterprise-open-source-is-different/</link>
      <pubDate>Mon, 07 Aug 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3188</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the difference between what we think of as traditional open source, and enterprise software projects that have an open source license. They are both technically open source, but how the projects work is very very different.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_387_Enterprise_open_source_is_different.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_387_Enterprise_open_source_is_different.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_387_Enterprise_open_source_is_different.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gitlab.com/redhat/centos-stream/rpms/iperf3/-/merge_requests/5#note_1476778724&#34;&gt;CentOS Stream PR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.phoronix.com/news/Alpine-Linux-Prolific-Packager&#34;&gt;The Most Prolific Packager For Alpine Linux Is Stepping Away&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 386 - We are watching web 2.0 burn</title>
      <link>https://opensourcesecurity.io/2023/07/30/episode-386-we-are-watching-web-2-0-burn/</link>
      <pubDate>Mon, 31 Jul 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3182</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new Google proposal that would add DRM for the web. All the ad driven companies seem to be acting very strangely, there&amp;rsquo;s probably a reason for this. The way ads used to pay for content is changing, but a lot of these giant companies don&amp;rsquo;t know how to adapt. It&amp;rsquo;s going to be very interesting times in the near future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_386_We_are_watching_web_2_0_burn.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_386_We_are_watching_web_2_0_burn.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_386_We_are_watching_web_2_0_burn.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/RupertBenWiser/Web-Environment-Integrity/&#34;&gt;Web Environment Integrity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=36857676&#34;&gt;Hacker News Thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.island.io/&#34;&gt;Island Browser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20040604194346/http://bash.org/?244321&#34;&gt;hunter2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 385 - Is open source an insider threat?</title>
      <link>https://opensourcesecurity.io/2023/07/23/episode-385-is-open-source-an-insider-threat/</link>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3176</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about insider threats, but not quite in the way one would expect. The potential for insider threats is possibly higher than usual right now, but what about open source? Are open source developers insider threats for your organization? Have you ever thought about this before?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_385_Is_open_source_an_insider_threat.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_385_Is_open_source_an_insider_threat.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_385_Is_open_source_an_insider_threat.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats&#34;&gt;CISA insider threats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@hacks4pancakes/110458032018997985&#34;&gt;hacks4pancakes toot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://analyticsindiamag.com/dont-trust-a-programmer-who-knows-c/&#34;&gt;Don’t Trust a Programmer Who Knows C++&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/topics/physical-security/insider-threat-mitigation&#34;&gt;CISA Insider Threat Mitigation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 384 - What&#39;s next for open source?</title>
      <link>https://opensourcesecurity.io/2023/07/16/episode-384-whats-next-for-open-source/</link>
      <pubDate>Mon, 17 Jul 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3172</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some of the efforts to measure and understand open source. There are projects like the OpenSSF Scorecard. We want to measure open source for some idea of quality. Is AI generated code better than a random open source project found on GitHub? Can we track the countries contributors are from? These are all interesting problems that everyone will have to deal with soon.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_384_Whats_next_for_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_384_Whats_next_for_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_384_Whats_next_for_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/scorecard&#34;&gt;OpenSSF Scorecard&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 383 - Is open source dying?</title>
      <link>https://opensourcesecurity.io/2023/07/09/episode-383-is-open-source-dying/</link>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3167</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://infosec.exchange/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the notion that open source is somehow dying. What&amp;rsquo;s actually happening is corporate open source is changing, which some are trying to deform into something wrong with open source. Open source is doing great, probably better than ever.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_383_Is_open_source_dying.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_383_Is_open_source_dying.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_383_Is_open_source_dying.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=68FkIwCc_eo&amp;amp;t=3s&#34;&gt;Open Source isn&amp;rsquo;t sustainable anymore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://vorondesign.com/&#34;&gt;VORON Design&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=djB9oK6pkbA&#34;&gt;Video of the first lathe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.imdb.com/title/tt0164814/&#34;&gt;Plane Crazy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=36609641&#34;&gt;Evernote layoffs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 382 - Red Hat, you were the chosen one!</title>
      <link>https://opensourcesecurity.io/2023/07/02/episode-382-red-hat-you-were-the-chosen-one/</link>
      <pubDate>Mon, 03 Jul 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3163</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Red Hat closing up the RHEL source code. Kurt and Josh both worked at Red Hat in the past. This isn&amp;rsquo;t a show that bashes Red Hat, and it&amp;rsquo;s not a show praising them. We take an honest look at the past, present, and future of Linux. There&amp;rsquo;s a lot to talk about in this one. TL;DR, Red Hat was the chosen on, and we all feel betrayed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 381 - WTF Reddit, APIs and risk</title>
      <link>https://opensourcesecurity.io/2023/06/25/episode-381-wtf-reddit-apis-and-risk/</link>
      <pubDate>Mon, 26 Jun 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3158</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the incredible Reddit debacle. At the center of it all is an API. What does it mean to be using an API and how does this relate itself back to our own risk. Many of us rely on APIs for countless things, and if a company decides to cut off that API somehow, it could create a mess.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_381_WTF_Reddit_APIs_and_risk.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_381_WTF_Reddit_APIs_and_risk.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_381_WTF_Reddit_APIs_and_risk.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://grimacesbirthday.com/&#34;&gt;Grimace&amp;rsquo;s Birthday&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/gadgets/2023/06/reddits-new-api-pricing-will-kill-off-apollo-on-june-30/&#34;&gt;Reddit’s new API pricing will kill off Apollo on June 30&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pluralistic.net/2023/01/21/potemkin-ai/#hey-guys&#34;&gt;Cory Doctorow enshitification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fastcompany.com/47593/wal-mart-you-dont-know-2&#34;&gt;Wal Mart pickle story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/business-65981876&#34;&gt;Elon Musk and Mark Zuckerberg agree to hold cage fight&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 380 - A new Sovereign Tech Fund program and the BBC on destroying hard drives</title>
      <link>https://opensourcesecurity.io/2023/06/18/episode-380-a-new-sovereign-tech-fund-program-and-the-bbc-on-destroying-hard-drives/</link>
      <pubDate>Mon, 19 Jun 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3154</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new program from the Sovereign Tech Fund to fund open source work. It&amp;rsquo;s a great looking program with an acceptable amount of money behind the program. We also talk about a story claiming millions of perfectly good hard drives are destroyed per year. They&amp;rsquo;re probably not OK at all.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_380_A_new_Sovereign_Tech_Fund_program_and_the_BBC_on_destroying_hard_drives.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_380_A_new_Sovereign_Tech_Fund_program_and_the_BBC_on_destroying_hard_drives.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_380_A_new_Sovereign_Tech_Fund_program_and_the_BBC_on_destroying_hard_drives.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://sovereigntechfund.de/en/challenges/&#34;&gt;Sovereign Tech Fund Challenges&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/business-65669537&#34;&gt;Why millions of usable hard drives are being destroyed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=XSkRGMeqh2o&#34;&gt;LTT Buys Storage Array&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 379 - Will open source save the world, again?</title>
      <link>https://opensourcesecurity.io/2023/06/11/episode-379-will-open-source-save-the-world-again/</link>
      <pubDate>Mon, 12 Jun 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3150</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some new open source projects that aim to start taking back some of our privacy and rights. It&amp;rsquo;s a huge hill to climb, but it seems like there is some hope. Open source doesn&amp;rsquo;t care about growth, or numbers, or anything really, so it can&amp;rsquo;t ever lose.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_379_Will_open_source_save_the_world_again.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_379_Will_open_source_save_the_world_again.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_379_Will_open_source_save_the_world_again.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://codeberg.org/&#34;&gt;Codeberg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackers.town/@thegibson/110461083476320551&#34;&gt;Veilid&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.cheezies.com/index3.htm&#34;&gt;Hawkins Cheezies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/gadgets/2023/05/reddits-api-pricing-results-in-shocking-20-million-a-year-bill-for-apollo/&#34;&gt;Apollo&amp;rsquo;s Reddit API costs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Rocket ships and radishes</title>
      <link>https://opensourcesecurity.io/2023/06/06/rocket-ships-and-radishes/</link>
      <pubDate>Wed, 07 Jun 2023 01:08:58 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3134</guid> 
      <description>&lt;p&gt;There&amp;rsquo;s been something in the back of my brain that&amp;rsquo;s been bothering me about talks at the big conferences lately but I just couldn&amp;rsquo;t figure out how to talk about it. Until I listed to this episode of &lt;a href=&#34;https://thehackermind.com/&#34;&gt;The Hacker Mind Podcast&lt;/a&gt; on &lt;a href=&#34;https://thehackermind.com/ep-69-self-healing-operating-systems&#34;&gt;Self Healing Operating Systems&lt;/a&gt; (it&amp;rsquo;s a great podcast, like and subscribe). The episode was all about this incredibly bizarre way to store operating system state in a SQL database (yeah, you read that right). The guest made no excuses that this is a pretty wild idea and it&amp;rsquo;s not going to happen anytime soon. But we need weird research like this, it&amp;rsquo;s part of the forward march of progress.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 378 - Naming things is harder than security</title>
      <link>https://opensourcesecurity.io/2023/06/04/episode-378-naming-things-is-harder-than-security/</link>
      <pubDate>Mon, 05 Jun 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3130</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about namespaces. They were a topic in the last podcast, and resulted in a much much larger discussion for us. We decided to hash out some of our thinking in an episode. This is a much harder problem than either of us expected. We don&amp;rsquo;t have any great answers, but we do have a lot of questions.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_378_Naming_things_is_harder_than_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_378_Naming_things_is_harder_than_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_378_Naming_things_is_harder_than_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/redhat&#34;&gt;Not Red Hat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.npmjs.com/package/hash&#34;&gt;NPM hash package&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/01/14/episode-129-the-eu-bug-bounty-program/&#34;&gt;Episode 129 – The EU bug bounty program&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 377 - The world is changing too fast for humans to understand</title>
      <link>https://opensourcesecurity.io/2023/05/28/episode-377-the-world-is-changing-too-fast-for-humans-to-understand/</link>
      <pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3126</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about PyPI suspending new accounts and packages for a day, and a 60 minutes story about deepfakes. The problems are mostly the same, but for very different reasons. The world is changing faster than we can keep up, so what is a human to do?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_377_The_world_is_changing_too_fast_for_humans_to_understand.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_377_The_world_is_changing_too_fast_for_humans_to_understand.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_377_The_world_is_changing_too_fast_for_humans_to_understand.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2023/05/pypi-repository-under-attack-user-sign.html&#34;&gt;PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted&lt;/a&gt;]( &lt;a href=&#34;https://thehackernews.com/2023/05/pypi-repository-under-attack-user-sign.html&#34;&gt;https://thehackernews.com/2023/05/pypi-repository-under-attack-user-sign.html&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@racheltobac/110415331029231207&#34;&gt;60 minutes reporter voice clone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.corridordigital.com/season/11&#34;&gt;Cooridor Crew deepfakes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=27728287&#34;&gt;Certificate bit flip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.penny-arcade.com/comic/2006/07/12/a-wider-perspective-on-flavor&#34;&gt;Candy is delicious&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 376 - Open Source Summit, who built your open source, and AI</title>
      <link>https://opensourcesecurity.io/2023/05/21/episode-376-open-source-summit-who-built-your-open-source-and-ai/</link>
      <pubDate>Mon, 22 May 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3122</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Open Source Summit in Vancouver. Josh was there and we pick on two observations. Firstly that security keeps trying to use fear as a feature, except it doesn&amp;rsquo;t work. Secondly we discuss AI and how people are talking about it. It is changing things, how much is yet to be seen.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_376_Open_Source_Summit_who_built_your_open_source_and_AI.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_376_Open_Source_Summit_who_built_your_open_source_and_AI.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_376_Open_Source_Summit_who_built_your_open_source_and_AI.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://slsa.dev/&#34;&gt;SLSA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://buildsec.github.io/frsca/&#34;&gt;FRSCA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/s2c2f&#34;&gt;S2C2F&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2023/05/leak-of-msi-uefi-signing-keys-stokes-concerns-of-doomsday-supply-chain-attack/&#34;&gt;MSI leak&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pcworld.com/article/1917169/mysterious-new-intel-patch-surfaces-for-virtually-all-core-chips.html&#34;&gt;Intel microcode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=jPhJbKBuNnA&#34;&gt;Tom Scott AI Video&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 375 - The market forces of left-pad, Episode 77 remaster part 2</title>
      <link>https://opensourcesecurity.io/2023/05/14/episode-375-the-market-forces-of-left-pad-episode-77-remaster-part-2/</link>
      <pubDate>Mon, 15 May 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3119</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; finish up the leftpad discussion. We spent a lot of time talking about how the market will respond to these sort of events, and the market did indeed speak; very little has changed. There is an aspect of all these security events where we need to understand the cost vs benefit just isn&amp;rsquo;t there. it may never be there. Rather than whine and complain, we need to work with our constraints.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 374 - The event we called left-pad, Episode 77 remaster part 1</title>
      <link>https://opensourcesecurity.io/2023/05/07/episode-374-the-event-we-called-left-pad-episode-77-remaster-part-1/</link>
      <pubDate>Mon, 08 May 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3114</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; revisit Episode 77, which was named &amp;ldquo;npm and the supply chain&amp;rdquo; but was a discussion about the incident we all know now as &amp;ldquo;leftpad&amp;rdquo;. We didn&amp;rsquo;t understand what was happening at the time, but this would become an event we talk about for years to come. It&amp;rsquo;s shocking how many of the things we discuss are still completely valid five years later.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_374_The_event_we_called_left-pad_Episode_77_remaster_part_1.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_374_The_event_we_called_left-pad_Episode_77_remaster_part_1.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_374_The_event_we_called_left-pad_Episode_77_remaster_part_1.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2018/01/11/episode-77-npm-and-the-supply-chain/&#34;&gt;Episode 77 – npm and the supply chain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 373 – HHGG security, Episode 42 remaster part 2</title>
      <link>https://opensourcesecurity.io/2023/04/30/episode-373-hhgg-security-episode-42-remaster-part-2/</link>
      <pubDate>Mon, 01 May 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3110</guid> 
      <description>&lt;p&gt;This is the second part of remastering Episode 42 which is all about the security in the Hitchhiker’s Guide to the Galaxy movie. It&amp;rsquo;s a fun show and it&amp;rsquo;s shocking how many of these security themes are still relevant today.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_373_HHGG_security_Episode_42_remaster_part_2.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_373_HHGG_security_Episode_42_remaster_part_2.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_373_HHGG_security_Episode_42_remaster_part_2.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2017/04/13/episode-42-hitchhikers-guide-to-security/&#34;&gt;Original Episode 42&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2023/04/23/episode-372-hhgg-security-episode-42-remaster-part-1/&#34;&gt;Part 1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 372 - HHGG security, Episode 42 remaster part 1</title>
      <link>https://opensourcesecurity.io/2023/04/23/episode-372-hhgg-security-episode-42-remaster-part-1/</link>
      <pubDate>Mon, 24 Apr 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3105</guid> 
      <description>&lt;p&gt;The podcast is on a hiatus for a little while due to some personal matters, but that creates an opportunity to remaster some fun old episodes. These shows are REALLY hard to listen to at the current quality (tools and talent has come a long way in the last few years).&lt;/p&gt;
&lt;p&gt;This is a remaster of Episode 42 which is all about the security in the Hitchhiker’s Guide to the Galaxy movie. It&amp;rsquo;s a fun show and it&amp;rsquo;s shocking how many of these security themes are still relevant today.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 371 - pip install is the tool we deserve but not the tool we need</title>
      <link>https://opensourcesecurity.io/2023/04/16/episode-371-pip-install-is-the-tool-we-deserve-but-not-the-tool-we-need/</link>
      <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3099</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post about pip and virtual environments. This eventually turns into a larger conversation around packaging tools and how we see incremental changes over time. The package ecosystems were what we needed a few years ago, but our needs have changed.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_371_-_pip_install_is_the_tool_we_deserve_but_not_the_tool_we_need.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_371_-_pip_install_is_the_tool_we_deserve_but_not_the_tool_we_need.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_371_-_pip_install_is_the_tool_we_deserve_but_not_the_tool_we_need.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ianwootten.co.uk/2023/02/17/one-does-not-simply-pip-install/&#34;&gt;One Does Not Simply &amp;lsquo;pip install&amp;rsquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://dag.wiee.rs/rpm/FAQ.php&#34;&gt;Dag Wieers RPM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cloudsecurityalliance/webfinger.io&#34;&gt;Webfinger GitHub repo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 370 - Open Source is bigger than you can imagine</title>
      <link>https://opensourcesecurity.io/2023/04/09/episode-370-open-source-is-bigger-than-you-can-imagine/</link>
      <pubDate>Mon, 10 Apr 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3094</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some data on the size of NPM. Josh wrote a blog post and a report about the amount of SEO spam in NPM was released. Open source is enormous, and it&amp;rsquo;s mostly one person. It&amp;rsquo;s hard to imagine how this all works sometimes and this lack of understanding can create challenges.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_370_Open_Source_is_bigger_than_you_can_imagine.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_370_Open_Source_is_bigger_than_you_can_imagine.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_370_Open_Source_is_bigger_than_you_can_imagine.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://anchore.com/blog/open-source-is-bigger-than-you-imagine/&#34;&gt;Josh&amp;rsquo;s blog on the size of NPM&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.sandworm.dev/one-in-two-new-npm-packages-is-seo-spam-right-now&#34;&gt;One In Two New Npm Packages Is SEO Spam Right Now&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers/110152485026133923&#34;&gt;Linux Kernel power distribution graph&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 369 - OpenAI broke ChatGPT then tried to blame open source</title>
      <link>https://opensourcesecurity.io/2023/04/02/episode-369-openai-broke-chatgpt-then-tried-to-blame-open-source/</link>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3089</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about OpenAI having a bug in ChatGPT, then they tried to blame open source. It didn&amp;rsquo;t go very well. In this episode Josh and Kurt argue a lot, maybe someday we&amp;rsquo;ll know who was the least wrong.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_369_OpenAI_broke_ChatGPT_then_tried_to_blame_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_369_OpenAI_broke_ChatGPT_then_tried_to_blame_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_369_OpenAI_broke_ChatGPT_then_tried_to_blame_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/sama/status/1638635717462200320&#34;&gt;ChatGPT Tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openai.com/blog/march-20-chatgpt-outage&#34;&gt;ChatGPT Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/redis/redis-py/issues/2624&#34;&gt;redis bug&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 368 - The Sovereign Tech Fund with Fiona Krakenbürger</title>
      <link>https://opensourcesecurity.io/2023/03/26/episode-368-the-sovereign-tech-fund-with-fiona-krakenburger/</link>
      <pubDate>Mon, 27 Mar 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3085</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Fiona Krakenbürger about the Sovereign Tech Fund. This is a fund created by Germany to fund important open source projects. Fiona has amazing insight into how this fund was created, what it&amp;rsquo;s doing today to help fund open source. She discusses where we go from here and what the future will look like. The Sovereign Tech Fund is a forward thinking program to fund open source across the world. This episode is a window into the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 367 - Open source will never be the same</title>
      <link>https://opensourcesecurity.io/2023/03/19/episode-367-open-source-will-never-be-the-same/</link>
      <pubDate>Mon, 20 Mar 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3081</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about GitHub enforcing sanctions against an open source developer and Docker changing how their registry works. There&amp;rsquo;s a lot to unpack in this one. There&amp;rsquo;s a lot of happenings going on in the world of open source. We are seeing governments paying attention to open source like never before, change is coming and everything is going to change.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_367_Open_source_will_never_be_the_same.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_367_Open_source_will_never_be_the_same.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_367_Open_source_will_never_be_the_same.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.phoronix.com/news/ipmitool-GitHub-Suspended&#34;&gt;ipmitool Repository Archived, Developer Suspended By GitHub&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=35166579&#34;&gt;Elixir: Docker now charges open source orgs $300&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 366 - Software liability is coming</title>
      <link>https://opensourcesecurity.io/2023/03/12/episode-366-software-liability-is-coming/</link>
      <pubDate>Mon, 13 Mar 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3077</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the number of dependencies that is now normal. Keeping track of thousands of dependencies used to be impressive, now it&amp;rsquo;s normal. In what instances should we know everything about our open source? The days of being able to ignore your software liability is looking like it&amp;rsquo;s coming to an end.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_366_Software_liability_is_coming.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_366_Software_liability_is_coming.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_366_Software_liability_is_coming.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=7XPmPax60bA&#34;&gt;LTT millenial pause&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2023/01/03/the-perverse-incentive-of-vulnerability-counting/&#34;&gt;The perverse incentive of vulnerability counting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf&#34;&gt;National Cybersecurity Strategy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 365 - &#34;I am not your supplier&#34; with Thomas Depierre</title>
      <link>https://opensourcesecurity.io/2023/03/05/episode-365-i-am-not-your-supplier-with-thomas-depierre/</link>
      <pubDate>Mon, 06 Mar 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3073</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Thomas Depierre about his &amp;ldquo;I am not a supplier&amp;rdquo; blog post. We drink from the firehose on this one. Thomas describes the realities and challenges of being an open source maintainer. What open source and society owe each other. How safety can help describe what we see. There&amp;rsquo;s too many topics to even list. The whole episode is an epic adventure through modern open source.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_365_I_am_not_your_supplier_with_Thomas_Depierre.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_365_I_am_not_your_supplier_with_Thomas_Depierre.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_365_I_am_not_your_supplier_with_Thomas_Depierre.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hachyderm.io/@Di4na&#34;&gt;Thomas on Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.softwaremaxims.com/blog/not-a-supplier&#34;&gt;I am not a supplier&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/The_Treachery_of_Images&#34;&gt;The Treachery of Images (Ceci n&amp;rsquo;est pas une pipe)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/&#34;&gt;Atlantic Council report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Field-Guide-Understanding-Human-Error-dp-1472439058/dp/1472439058/ref=mt_other?_encoding=UTF8&amp;amp;me=&amp;amp;qid=1590643989&#34;&gt;The Field Guide to Understanding &amp;lsquo;Human Error&amp;rsquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/open-source-google-wants-new-rules-for-developers-working-on-critical-projects/&#34;&gt;Google wants new rules for developers working on &amp;lsquo;critical&amp;rsquo; projects&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fordfoundation.org/media/2976/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure.pdf&#34;&gt;Roads and Bridges:The Unseen Labor Behind Our Digital Infrastructure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sovereigntechfund.de/en&#34;&gt;Sovereign Tech Fund&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 364 - Using SBOMs is hard</title>
      <link>https://opensourcesecurity.io/2023/02/26/episode-364-using-sboms-is-hard/</link>
      <pubDate>Mon, 27 Feb 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3068</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about SBOMs. Quite a bit has happened in the world of SBOMs in the last year or so. There are going to be different types of SBOMs, like build, source, or runtime. Each will tell us different things depending on what we need to know. We also cover some of the community efforts happening around SBOMs. They&amp;rsquo;re still not easy to use, but it&amp;rsquo;s better better.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_364_Using_SBOMs_is_hard.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_364_Using_SBOMs_is_hard.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_364_Using_SBOMs_is_hard.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.google.com/document/d/1PsUhUQ_L-lNymD9p613zP0_MiT1Boag68TP3aiwZ4R8/edit&#34;&gt;SBOM Types draft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenewstack.io/fast-and-furious-doubling-down-on-sbom-drift/&#34;&gt;SBOM Drift&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/sbom-everywhere&#34;&gt;OpenSSF SBOM Everywhere&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 363 - Joylynn Kirui from Microsoft on DevSecOps</title>
      <link>https://opensourcesecurity.io/2023/02/19/episode-363-joylynn-kirui-from-microsoft-on-devsecops/</link>
      <pubDate>Mon, 20 Feb 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3063</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Joylynn Kirui about DevSecOps in the Microsoft universe. Joylynn gives us an overview of the current state of devops and tells us about some of the tools Microsoft has made available to the open source universe.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_363_Joylynn_Kirui_from_Microsoft_on_De_SecOps.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_363_Joylynn_Kirui_from_Microsoft_on_De_SecOps.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_363_Joylynn_Kirui_from_Microsoft_on_De_SecOps.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://developer.microsoft.com/en-us/advocates/joylynn-kirui&#34;&gt;Joylynn Kirui&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=V3YVnt-9ayM&#34;&gt;Joylynn on DVT Tech Insights&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/12/16/episode-174-github-turns-security-up-to-11-a-discussion-with-rob-schultheis/&#34;&gt;Episode 174 - a chat with GitHub about CodeQL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/s2c2f&#34;&gt;S2C2F&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://info.microsoft.com/ww-landing-azure-open-source-day.html?ocid=cmmz8tf3u3p&#34;&gt;Azure Open Source Day&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 362 - A lesson in Rust from Carol Nichols</title>
      <link>https://opensourcesecurity.io/2023/02/12/episode-362-a-lesson-in-rust-from-carol-nichols/</link>
      <pubDate>Mon, 13 Feb 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3059</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Carol Nichols about Rust. Carol is an authority on Rust and helps us understand how Rust works, why it&amp;rsquo;s different. Why Rust doesn&amp;rsquo;t have the same problems C and C++ have, and what the future of it all could look like. It&amp;rsquo;s a really fun show with some great questions from Carol along the way.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_362_A_lesson_in_Rust_from_Carol_Nichols.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_362_A_lesson_in_Rust_from_Carol_Nichols.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_362_A_lesson_in_Rust_from_Carol_Nichols.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://crabby.fyi/@carol&#34;&gt;Carol Nichols on Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nostarch.com/rust-programming-language-2nd-edition&#34;&gt;The Rust Programming Language, 2nd Edition&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://doc.rust-lang.org/stable/book/&#34;&gt;Rust book online&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://netflixtechblog.com/seeing-through-hardware-counters-a-journey-to-threefold-performance-increase-2721924a2822&#34;&gt;Netflix tech blog on Java performance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=A3AdN7U24iU&#34;&gt;Rust in the context of Railroad Brakes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://people.kernel.org/kees/bounded-flexible-arrays-in-c&#34;&gt;Kees Cook blog - Bounded Flexible Arrays in C&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://digital-lab-wp.consumerreports.org/2023/01/23/new-report-future-of-memory-safety/&#34;&gt;Consumer Reports on memory safety&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://google.github.io/oss-fuzz/getting-started/new-project-guide/rust-lang/&#34;&gt;OSS-Fuzz and Rust&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 361 - GitHub got pwnt, but it wasn&#39;t very exciting</title>
      <link>https://opensourcesecurity.io/2023/02/05/episode-361-github-got-pwnt-but-it-wasnt-very-exciting/</link>
      <pubDate>Mon, 06 Feb 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3054</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent GitHub breach. It wasn&amp;rsquo;t terribly exciting, but there are some interesting conversations to have around securing certificates, source code, and hardware security modules. In general GitHub did most things right on this one.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_361_GitHub_got_pwnt_but_it_wasnt_very_exciting.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_361_GitHub_got_pwnt_but_it_wasnt_very_exciting.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_361_GitHub_got_pwnt_but_it_wasnt_very_exciting.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2023-01-30-action-needed-for-github-desktop-and-atom-users/&#34;&gt;GitHub blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackerhistory.com/podcast/the-history-of-robert-reif/&#34;&gt;Hacker History Podcast episode with Robert&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/n64decomp/sm64&#34;&gt;Super Mario 64 decompile&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=NKlbE2eROC0&#34;&gt;Mario 64 built without optimization&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nintendolife.com/news/2023/01/zelda-a-link-to-the-pasts-code-has-been-reverse-engineered-and-unofficially-enhanced&#34;&gt;Link to the Past source code&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 360 - Memory safety and the NSA</title>
      <link>https://opensourcesecurity.io/2023/01/29/episode-360-memory-safety-and-the-nsa/</link>
      <pubDate>Mon, 30 Jan 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3049</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the NSA guidance on using memory safety issues. The TL;DR is to stop using C. We discuss why C has so many problem, why we can&amp;rsquo;t fix C, and what some alternatives looks like. Even the alternatives have their own set of issues and there are many options, but the one thing we can agree on is we have to stop using C.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_360_Memory_safety_and_the_NSA.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_360_Memory_safety_and_the_NSA.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_360_Memory_safety_and_the_NSA.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3215760/nsa-releases-guidance-on-how-to-protect-against-software-memory-safety-issues/&#34;&gt;NSA Releases Guidance on How to Protect Against Software Memory Safety Issues&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.catb.org/jargon/html/story-of-mel.html&#34;&gt;Drum memory and the story of Mel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://netflixtechblog.com/seeing-through-hardware-counters-a-journey-to-threefold-performance-increase-2721924a2822&#34;&gt;Netflix performance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://discord.com/blog/why-discord-is-switching-from-go-to-rust&#34;&gt;Discord Go vs Rust&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developers.slashdot.org/story/22/11/13/010222/nvidia-security-team-what-if-we-just-stopped-using-c?utm_source=feedly1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;NVIDIA switch to Spark&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 359 - The NOTAM outage and other legacy technology</title>
      <link>https://opensourcesecurity.io/2023/01/22/episode-359-the-notam-outage-and-other-legacy-technology/</link>
      <pubDate>Mon, 23 Jan 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3044</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent FAA NOTAM outage. Keeping legacy things running for long periods of time is really hard to do, this system is no different. It&amp;rsquo;s also really hard to upgrade many of these due to corner cases and institutional knowledge. There aren&amp;rsquo;t any great answers here, but we do ask a lot of questions about long running tech.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_359_The_NOTAM_outage_and_other_legacy_technology.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_359_The_NOTAM_outage_and_other_legacy_technology.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_359_The_NOTAM_outage_and_other_legacy_technology.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nbcnews.com/news/us-news/us-flights-grounded-faa-outage-rcna65243&#34;&gt;NOTAM outage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developers.slashdot.org/story/23/01/16/2324215/ibm-shifts-remaining-us-based-aix-dev-jobs-to-india&#34;&gt;AIX is not dead&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developers.slashdot.org/story/23/01/16/2324215/ibm-shifts-remaining-us-based-aix-dev-jobs-to-india&#34;&gt;IBM Linux commercial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=nwrTTXOg-KI&#34;&gt;Apple A/UX&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=BOeku3hDzrM&#34;&gt;How NOT To Implement the POSIX Standard, Featuring Windows NT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ish.app/&#34;&gt;iSH&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=EzyXMEpq4qw&#34;&gt;Hand Made Vacuum Tubes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 358 - Furby vs Alexa</title>
      <link>https://opensourcesecurity.io/2023/01/15/episode-358-furby-vs-alexa/</link>
      <pubDate>Mon, 16 Jan 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3039</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Furby source code going public. This is an opportunity to discuss what&amp;rsquo;s changed in our attitude in devices that record our audio? Our devices today are vastly more powerful and dangerous than a Furby, what does your risk appetite look like?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_358_Furby_vs_Alexa.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_358_Furby_vs_Alexa.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_358_Furby_vs_Alexa.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://archive.org/details/furby-source/mode/2up&#34;&gt;Furby source code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbsnews.com/news/talking-toy-or-spy/&#34;&gt;Talking Toy Or Spy?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=-AFn7MiJz_s&#34;&gt;Adam Ruins Everything - Why Jaywalking Is a Crime&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 357 - Is open source being overexploited?</title>
      <link>https://opensourcesecurity.io/2023/01/08/episode-357-is-open-source-being-overexploited/</link>
      <pubDate>Mon, 09 Jan 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3035</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to think about open source in the context of society. Open source is more like a natural resource than a supplier. It&amp;rsquo;s common to think of open source projects as delivered to us, but it&amp;rsquo;s more like acquiring raw materials from the forest. The problem is we&amp;rsquo;re harvesting the raw materials in an unsustainable manner at the moment.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_357_Is_open_source_being_overexploited.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_357_Is_open_source_being_overexploited.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_357_Is_open_source_being_overexploited.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.softwaremaxims.com/blog/not-a-supplier&#34;&gt;I am not a supplier&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers/109617167958945067&#34;&gt;Josh&amp;rsquo;s question about the environment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenewstack.io/gorilla-toolkit-open-source-project-becomes-abandonware/&#34;&gt;sjvn Gorilla toolkit article&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/gorilla#gorilla-toolkit&#34;&gt;Gorilla Web Toolkit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=aV2VuWleEeY&#34;&gt;Awesome Games Done Quick GeoGuessr&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gamesdonequick.com/schedule&#34;&gt;Awesome Games Done Quick 2023&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The perverse incentive of vulnerability counting</title>
      <link>https://opensourcesecurity.io/2023/01/03/the-perverse-incentive-of-vulnerability-counting/</link>
      <pubDate>Tue, 03 Jan 2023 15:16:05 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3005</guid> 
      <description>&lt;p&gt;It seems like every few years the topic of counting vulnerabilities in products shows up. Last time the focus seemed to be around vulnerabilities in Linux distributions, which made distroless and very small container images popular. Today it seems to be around the vulnerabilities in open source dependencies. The general idea is you want to have as few vulnerabilities in the open source you&amp;rsquo;re using, so logically zero is the goal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 356 - LastPass ducked up, now what?</title>
      <link>https://opensourcesecurity.io/2023/01/01/episode-356-lastpass-ducked-up-now-what/</link>
      <pubDate>Mon, 02 Jan 2023 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3027</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the LastPass saga. There&amp;rsquo;s a lot of great explanations about what happened, but there hasn&amp;rsquo;t been a lot of info on how to start cleaning up this mess. We rehash some of the existing details then try to untangle what existing users can do to try to start recovering. The real problem is how LastPass is dealing with this, not the technical details.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_356_LastPass_ducked_up_now_what.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_356_LastPass_ducked_up_now_what.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_356_LastPass_ducked_up_now_what.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/&#34;&gt;Great writeup of LastPass&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@epixoip/109585049354200263&#34;&gt;Jeremi M Gosney Mastodon explanation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lock.cmpxchg8b.com/passmgrs.html&#34;&gt;Tavis writeup on password managers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.useapassphrase.com/&#34;&gt;Use a Passphrase&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 355 - Security Boxing Day</title>
      <link>https://opensourcesecurity.io/2022/12/25/episode-355-security-boxing-day/</link>
      <pubDate>Mon, 26 Dec 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=3001</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some security gifts for boxing day. We start out with the idea of the security poverty line and discuss a few ideas for how a low resource group can make their open source more secure. There are no simple answers unfortunately.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_355_Security_Boxing_Day.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_355_Security_Boxing_Day.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_355_Security_Boxing_Day.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@wendynather&#34;&gt;Wendy Nather&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=hB77h9OPxiA&#34;&gt;Security Poverty Line&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Boots_theory&#34;&gt;Boots Theory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 354 - Jerry Bell tells us why Mastodon is awesome and MFA is hard</title>
      <link>https://opensourcesecurity.io/2022/12/18/episode-354-jerry-bell-tells-us-why-mastodon-is-awesome-and-mfa-is-hard/</link>
      <pubDate>Mon, 19 Dec 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2996</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how hard multi factor authentication is. This all starts from a Mastodon thread, and &lt;a href=&#34;https://infosec.exchange/@jerry&#34;&gt;Jerry Bell&lt;/a&gt;, the administrator of infosec.exchange joins us to discuss password security and all things Mastodon. Infosec.exchange is an incredible story and Jerry weaves a thrilling tale.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_354_Jerry_Bell_tells_us_why_Mastodon_is_awesome_and_MFA_is_hard.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_354_Jerry_Bell_tells_us_why_Mastodon_is_awesome_and_MFA_is_hard.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_354_Jerry_Bell_tells_us_why_Mastodon_is_awesome_and_MFA_is_hard.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@jerry/109490211451015872&#34;&gt;infosec.exchange MFA discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@jerry/109492278319641849&#34;&gt;Jerry&amp;rsquo;s 2FA advice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://escapingtech.com/tech/opinions/i-was-wrong-about-mastodon-moderation.html&#34;&gt;MalwareTech retracts Mastodon statements&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 353 - Jill Moné-Corallo on GitHub&#39;s bug bounty program</title>
      <link>https://opensourcesecurity.io/2022/12/11/episode-353-jill-mone-corallo-on-githubs-bug-bounty-program/</link>
      <pubDate>Mon, 12 Dec 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2990</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Jill Moné-Corallo about GitHub&amp;rsquo;s bug bounty and product security team. It&amp;rsquo;s a treat to discuss bug bounties with someone who is managing a very large bug bounty for one of the most important web sites in the world of software today.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_353_Jill_Mone-Corallo_on_GitHubs_bug_bounty_program.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_353_Jill_Mone-Corallo_on_GitHubs_bug_bounty_program.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_353_Jill_Mone-Corallo_on_GitHubs_bug_bounty_program.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/thejillboss&#34;&gt;Jill&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://infosec.exchange/@thejillboss&#34;&gt;Jill&amp;rsquo;s Mastodon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bounty.github.com/&#34;&gt;GitHub Bug Bounty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bounty.github.com/#scope&#34;&gt;Bug bounty scope&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2022-05-23-eight-years-of-the-github-security-bug-bounty-program/&#34;&gt;Eight years of the GitHub Security Bug Bounty program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2021-11-15-githubs-commitment-to-npm-ecosystem-security/&#34;&gt;GitHub NPM bug bounty find&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 352 - Stylometry removes anonymity</title>
      <link>https://opensourcesecurity.io/2022/12/04/episode-352-stylometry-removes-anonymity/</link>
      <pubDate>Mon, 05 Dec 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2985</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new tool that can do Stylometry analysis of Hacker News authors. The availability of such tools makes anonymity much harder on the Internet, but it&amp;rsquo;s also not unexpected. The amount of power and tooling available now is incredible. We also discuss some of the future challenges we will see from all this technology.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_352_Stylometry_removes_anonymity.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_352_Stylometry_removes_anonymity.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_352_Stylometry_removes_anonymity.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://stylometry.net/&#34;&gt;Hacker News Stylometry Analyzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.npr.org/2017/08/22/545122205/fbi-profiler-says-linguistic-work-was-pivotal-in-capture-of-unabomber&#34;&gt;FBI Profiler on the Unabomber&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=wUmIubcIkt8&#34;&gt;Impersonate Eli Lilly for $8&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=K-aAUwAFZlQ&#34;&gt;Shakespeare Stylometry&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 351 - Is security or usability a law of the universe?</title>
      <link>https://opensourcesecurity.io/2022/11/27/episode-351-is-security-or-usability-a-law-of-the-universe/</link>
      <pubDate>Mon, 28 Nov 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2978</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://mastodon.social/@kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about end to end encrypted messages. This has been a popular topic lately due to the Mastodon popularity. Mastodon has a uniquely insecure messaging system, but they aren&amp;rsquo;t the only one. The eternal debate of can security and usability exist together? We suspect it can&amp;rsquo;t be, but it&amp;rsquo;s a very complicated topic.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_351_Is_security_or_usability_a_law_of_the_universe.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_351_Is_security_or_usability_a_law_of_the_universe.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_351_Is_security_or_usability_a_law_of_the_universe.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2022/11/mastodon-private-and-secure-lets-take-look&#34;&gt;EFF on Mastodon DM privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://soatok.blog/2022/11/22/towards-end-to-end-encryption-for-direct-messages-in-the-fediverse/&#34;&gt;Towards End-to-End Encryption for Direct Messages in the Fediverse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pluralistic.net/2022/11/14/luxury-surveillance/&#34;&gt;Pluralistic: 14 Nov 2022 Even if you&amp;rsquo;re paying for the product, you&amp;rsquo;re still the product&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 350 - Spam, Email, Content Moderation, and Infrastructure Oh My</title>
      <link>https://opensourcesecurity.io/2022/11/20/episode-350-spam-email-content-moderation-and-infrastructure-oh-my/</link>
      <pubDate>Mon, 21 Nov 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2974</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about email security and the perils of trying to run your own mail infrastructure. We then get into discussing the value and danger of trying to run your own infrastructure, email, blogs, or most anything. There&amp;rsquo;s a lot to juggle about all this these days, it&amp;rsquo;s complicated.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_350_Spam_Email_Content_Moderation_and_Infrastructure_Oh_My.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_350_Spam_Email_Content_Moderation_and_Infrastructure_Oh_My.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_350_Spam_Email_Content_Moderation_and_Infrastructure_Oh_My.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://powerdmarc.com/&#34;&gt;PowerDMARC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/wdormann&#34;&gt;Will Dormann&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GossiTheDog/status/1575865934429900801&#34;&gt;GossiTheDog upgrades Exchange&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lcamtuf.blogspot.com/&#34;&gt;lcamtuf&amp;rsquo;s blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/SwiftOnSecurity/status/1584119842562457600&#34;&gt;I like Ice Cream&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 349 - The cyber is coming from inside the house - the UK is scanning itself</title>
      <link>https://opensourcesecurity.io/2022/11/13/episode-349-the-cyber-is-coming-from-inside-the-house-the-uk-is-scanning-itself/</link>
      <pubDate>Mon, 14 Nov 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2969</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the UK plan to scan their country&amp;rsquo;s IP space. The purpose and outcome of this isn&amp;rsquo;t completely clear at this point, but we are hopeful the data can be used as a positive force. We are only going to see more programs like this as all the governments are told they have to cyber harder.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_349_The_cyber_is_coming_from_inside_the_house_the_UK_is_scanning_itself.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_349_The_cyber_is_coming_from_inside_the_house_the_UK_is_scanning_itself.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_349_The_cyber_is_coming_from_inside_the_house_the_UK_is_scanning_itself.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ncsc.gov.uk/information/ncsc-scanning-information&#34;&gt;NCSC Scanning information&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/inside-the-tool-the-us-military-is-using-to/id1441708044?i=1000580232797&#34;&gt;Motherboard podcast about NCIS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 348 - OpenSSL is the new lead paint</title>
      <link>https://opensourcesecurity.io/2022/11/06/episode-348-openssl-is-the-new-lead-paint/</link>
      <pubDate>Mon, 07 Nov 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2963</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent OpenSSL nothingburger. OpenSSL got everyone whipped into a frenzy over a critical vulnerability, then changed the severity to high. The correct solution to this whole problem is to stop using a TLS library written in C, we need to be using memory safe languages. Don&amp;rsquo;t migrate from OpenSSL 1 to 3, migrate from OpenSSL 1 to Rustls.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_348_OpenSSL_is_the_new_lead_paint.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_348_OpenSSL_is_the_new_lead_paint.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_348_OpenSSL_is_the_new_lead_paint.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/&#34;&gt;OpenSSL Blog Post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mta.openssl.org/pipermail/openssl-announce/2022-October/000238.html&#34;&gt;OpenSSL pre-announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/iamamoose/status/1584908434855628800&#34;&gt;Mark Cox Tweet 3.0 only affected&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GossiTheDog/status/15860315723267973130&#34;&gt;GossiTheDog NDA Tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GossiTheDog/status/1586054681159430144&#34;&gt;Claims of a name and logo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.memorysafety.org/initiative/rustls/&#34;&gt;Rustls&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 347 - Airtags in luggage and weasel security - two peas in a suitcase</title>
      <link>https://opensourcesecurity.io/2022/10/30/episode-347-airtags-in-luggage-and-weasel-security-two-peas-in-a-suitcase/</link>
      <pubDate>Mon, 31 Oct 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2957</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Lufthansa trying to ban Airtags. This has a similar feel to all the security events where a company tries to hand waive away a security problem then having to walk back all their previous statements. There is almost always a massive imbalance between the large companies and consumers.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_347_Airtags_in_luggage_and_weasel_security_two_peas_in_a_suitcase.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_347_Airtags_in_luggage_and_weasel_security_two_peas_in_a_suitcase.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_347_Airtags_in_luggage_and_weasel_security_two_peas_in_a_suitcase.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/lufthansa/status/1578879849577385984&#34;&gt;Lufthansa bans airtags&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vice.com/en/article/y3vj3y/apple-airtags-police-reports-stalking-harassment&#34;&gt;Airtag stalking problems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://airwaysmag.com/lufthansa-not-bannig-airtags/&#34;&gt;Lufthansa unbans airtags&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Cult-Dead-Cow-Original-Supergroup/dp/154176238X&#34;&gt;Cult of the Dead Cow book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.catb.org/jargon/html/tv-typewriters.html&#34;&gt;TV Typewriter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/historyinpics/status/1514058190467452930?lang=en&#34;&gt;Andre the Giant on an airplane&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Harvey_Washington_Wiley#Government_career&#34;&gt;Poison Squad&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=rrNI-FEXS14&#34;&gt;Bagtracker&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 346 - Security and working from home have terrible things in common</title>
      <link>https://opensourcesecurity.io/2022/10/23/episode-346-security-and-working-from-home-have-terrible-things-in-common/</link>
      <pubDate>Mon, 24 Oct 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2952</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about stories detailing tech working with multiple jobs. This raises some questions about fairness, accountability, and the future of work. As an industry we are very bad at measuring what we do, which is a problem shared with many jobs currently working from home.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_346_Security_and_working_from_home_have_terrible_things_in_common.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_346_Security_and_working_from_home_have_terrible_things_in_common.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_346_Security_and_working_from_home_have_terrible_things_in_common.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2022/10/equifax-surveilled-1000-remote-workers-fired-24-found-juggling-two-jobs/&#34;&gt;Equifax surveilled 1,000 remote workers, fired 24 found juggling two jobs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.businessinsider.com/ceo-viral-linkedin-post-engineers-working-two-jobs-overemployment-theft-2022-10&#34;&gt;Business Insider 2 jobs story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://skeptics.stackexchange.com/questions/43800/did-the-creator-of-unix-say-one-of-my-most-productive-days-was-throwing-away-10&#34;&gt;Ken Thompson lines of code&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 345 - Cheap hacking devices turn security upside down</title>
      <link>https://opensourcesecurity.io/2022/10/16/episode-345-cheap-hacking-devices-turn-security-upside-down/</link>
      <pubDate>Mon, 17 Oct 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2948</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about ineffective security from the past we still use today. There has been a great deal of progress in the last few decades bringing us amazing products like the Flipper Zero, cameras that can peer inside locks, and even software defined radio. A great deal of security relies on people not having easy access to these cheap devices. What does this mean for the future of security?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 344 - Python tarfile - 2022 is nothing like 2007</title>
      <link>https://opensourcesecurity.io/2022/10/09/episode-344-python-tarfile-2022-is-nothing-like-2007/</link>
      <pubDate>Mon, 10 Oct 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2944</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a newly rediscovered old python vulnerability. It raises a lot of questions about what was OK in 2007 vs what&amp;rsquo;s OK in 2022. The issue is very complicated and has a wild story surrounding it. There is no reason to not fix this in 2022.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_344_Python_tarfile_2022_is_nothing_like_2007.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_344_Python_tarfile_2022_is_nothing_like_2007.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_344_Python_tarfile_2022_is_nothing_like_2007.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2007-4559&#34;&gt;CVE-2007-4559&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugzilla.redhat.com/show_bug.cgi?id=263261&#34;&gt;Red Hat Bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2022/09/22/python_vulnerability_tarfile/&#34;&gt;Register story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/python/cpython/issues/45385&#34;&gt;Response from upstream&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.python.org/file8339/insecure_pathnames.diff&#34;&gt;Upstream patch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://main.zippslip.com/&#34;&gt;ZippSlip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/python/cpython/issues/73974&#34;&gt;Current upstream bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/expressjs/csurf&#34;&gt;CSURF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 343 - Stop trying to fix the open source software supply chain</title>
      <link>https://opensourcesecurity.io/2022/10/02/episode-343-stop-trying-to-fix-the-open-source-software-supply-chain/</link>
      <pubDate>Mon, 03 Oct 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2935</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a blog post that explains there isn&amp;rsquo;t really an open source software supply chain. The whole idea of open source being one thing is incorrect, open source is really a lot of little things put together. A lot of companies and organizations get this wrong.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_343_Stop_trying_to_fix_the_open_source_software_supply_chain.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_343_Stop_trying_to_fix_the_open_source_software_supply_chain.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_343_Stop_trying_to_fix_the_open_source_software_supply_chain.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/ilianathewitch&#34;&gt;Iliana&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://iliana.fyi/blog/software-supply-chain/&#34;&gt;There is no “software supply chain”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://iliana.fyi/blog/software-supply-chain/&#34;&gt;Google supply chain blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/advisories/GHSA-74w3-p89x-ffgh&#34;&gt;GitHub ansi_term advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://p.datadoghq.com/sb/7dc8b3250-389f47d638b967dbb8f7edfd4c46acb1?from_ts=1663203512414&amp;amp;to_ts=1663808312414&amp;amp;live=true&#34;&gt;PyPI 2FA Dashboard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.trellix.com/en-us/about/newsroom/stories/research/tarfile-exploiting-the-world.html&#34;&gt;tarfile issue rediscovered in 2022&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 342 - Programming languages are the new operating system</title>
      <link>https://opensourcesecurity.io/2022/09/25/episode-342-programming-languages-are-the-new-operating-system/</link>
      <pubDate>Mon, 26 Sep 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2904</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about programming language ecosystems tracking and publishing security advisory details. We are at a point in the language ecosystems where they are giving us services that have historically been reserved for operating systems.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_342_Programming_languages_are_the_new_operating_system.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_342_Programming_languages_are_the_new_operating_system.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_342_Programming_languages_are_the_new_operating_system.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kelseyhightower/status/1569802485505859585&#34;&gt;Kelsey Hightower tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/google/oss-fuzz&#34;&gt;OSS-Fuzz&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Holding open source to a higher standard</title>
      <link>https://opensourcesecurity.io/2022/09/25/holding-open-source-to-a-higher-standard/</link>
      <pubDate>Sun, 25 Sep 2022 23:54:17 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2902</guid> 
      <description>&lt;p&gt;Open source has always been held to a higher standard. It has always surpassed this standard.&lt;/p&gt;
&lt;p&gt;I ran across a story recently about a proposed &lt;a href=&#34;https://news.slashdot.org/story/22/09/23/2357254/senators-introduce-a-bill-to-protect-open-source-software?utm_source=feedly1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;bill&lt;/a&gt; in the US Congress that is meant to &amp;ldquo;help&amp;rdquo; open source software. The bill lays out steps CISA should take to help secure open source software. This post isn&amp;rsquo;t meant to argue if open source needs to be fixed (it doesn&amp;rsquo;t), but rather let&amp;rsquo;s consider the standards and expectations open source is held to.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 341 - Time till open source alternative</title>
      <link>https://opensourcesecurity.io/2022/09/18/episode-341-time-till-open-source-alternative/</link>
      <pubDate>Mon, 19 Sep 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2897</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Time Till Open Source Alternative blog post. The numbers probably don&amp;rsquo;t mean what we think they mean anymore. A lot of modern open source is really corporate controlled. Just because something carries an open source license doesn&amp;rsquo;t mean you can contribute to it.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_341_Time_till_open_source_alternative.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_341_Time_till_open_source_alternative.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_341_Time_till_open_source_alternative.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://staltz.com/time-till-open-source-alternative.html&#34;&gt;Time Till Open Source Alternative&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/desktop/desktop/issues/78&#34;&gt;GitHub Desktop issue 78&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://imgur.com/a/A8vF2&#34;&gt;The Reddit Safe&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 340 - Let&#39;s chat about Let&#39;s Encrypt with Josh Aas</title>
      <link>https://opensourcesecurity.io/2022/09/11/episode-340-lets-chat-about-lets-encrypt-with-josh-aas/</link>
      <pubDate>Mon, 12 Sep 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2891</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk with Josh Aas from the Internet Security Research Group about Let&amp;rsquo;s Encrypt, Prossimo, and Divvi Up. A lot has changed since the last time we spoke with Josh. Let&amp;rsquo;s Encrypt won, and the ISG are working on some really cool new projects.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_340_Lets_chat_about_Lets_Encrypt_with_Josh_Aas.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_340_Lets_chat_about_Lets_Encrypt_with_Josh_Aas.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_340_Lets_chat_about_Lets_Encrypt_with_Josh_Aas.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/0xjosh&#34;&gt;Josh Aas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.abetterinternet.org/&#34;&gt;Internet Security Research Group (ISRG)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/letsencrypt&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/stats/&#34;&gt;Let&amp;rsquo;s Encrypt stats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2018/03/11/episode-87-chat-with-lets-encrypt-co-founder-josh-aas/&#34;&gt;Episode 87 – Chat with Let’s Encrypt co-founder Josh Aas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/2022/02/25/ford-foundation.html&#34;&gt;New Major Funding from the Ford Foundation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.abetterinternet.org/annual-reports/&#34;&gt;ISRG annual reports&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Why has software supply chain security exploded?</title>
      <link>https://opensourcesecurity.io/2022/09/06/why-has-software-supply-chain-security-exploded/</link>
      <pubDate>Tue, 06 Sep 2022 13:39:46 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2862</guid> 
      <description>&lt;p&gt;I take a bike ride every morning, it&amp;rsquo;s a nice way to think about topics of the day. I&amp;rsquo;ve been wondering lately why software supply chain security has exploded in popularity in the last year or so. Nothing happens by accident, so there must be some series of events we can point at that has led to everyone suddenly making this a priority. Software supply chain security is not new, I&amp;rsquo;ve been doing it since about 2002 when I was helping track and coordinate security vulnerabilities in Linux distributions. We didn&amp;rsquo;t call it a supply chain back then, and nobody really paid attention to it. So what changed between then and now?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 339 - Is a network problem a security vulnerability</title>
      <link>https://opensourcesecurity.io/2022/09/04/episode-339-is-a-network-problem-a-security-vulnerability/</link>
      <pubDate>Mon, 05 Sep 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2874</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about really weird networking bugs. Josh tells a story about his home network problems that made no sense. There was also a qt5 bug that affected wireless networks that made virtually no sense. What should count as a security vulnerability?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_339_Is_a_network_problem_a_security_vulnerability.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_339_Is_a_network_problem_a_security_vulnerability.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_339_Is_a_network_problem_a_security_vulnerability.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.ando.fyi/posts/diagnosing-an-unsual-wifi-issue/&#34;&gt;Resolving an unusual wifi issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.ando.fyi/posts/diagnosing-an-unsual-wifi-issue/&#34;&gt;Hacker News thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://globalsecuritydatabase.org/&#34;&gt;Global Security Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://psref.lenovo.com/syspool/Sys/PDF/IdeaPad/IdeaPad_5_14ARE05/IdeaPad_5_14ARE05_Spec.pdf&#34;&gt;IdeaPad 5 14ARE05&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 338 - The government didn&#39;t make vulnerabilities illegal. Yet.</title>
      <link>https://opensourcesecurity.io/2022/08/28/episode-338-the-government-didnt-make-vulnerabilities-illegal-yet/</link>
      <pubDate>Mon, 29 Aug 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2858</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent National Defense Authorization Act that requires security vulnerabilities to be fixed. What does this mean for us, is it as bad as some people are claiming it is? It&amp;rsquo;s actually not a huge deal, for most of us it&amp;rsquo;s really just time to deal with product security.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_338_The_government_didnt_make_vulnerabilities_illegal_Yet.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_338_The_government_didnt_make_vulnerabilities_illegal_Yet.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_338_The_government_didnt_make_vulnerabilities_illegal_Yet.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackermind.com/&#34;&gt;The Hacker Mind&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://podcast.linuxfoundation.org/&#34;&gt;The Untold Stories of Open Source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.congress.gov/bill/117th-congress/house-bill/7900&#34;&gt;H.R.7900 - National Defense Authorization Act for Fiscal Year 2023&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cloudsecurityalliance.org/blog/2022/08/22/writing-good-legislation-is-hard/&#34;&gt;Kurt&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 337 - Security patches are getting worse - Dustin Childs from ZDI tells us why</title>
      <link>https://opensourcesecurity.io/2022/08/21/episode-337-security-patches-are-getting-worse-dustin-childs-from-zdi-tells-us-why/</link>
      <pubDate>Mon, 22 Aug 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2853</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Dustin Childs about the recent ZDI Black Hat talk where they discovered the current trend of security patches not actually fixing the security problem. We talk about what this problem means. Why is it happening, and what ZDI is doing to try nudge the industry in the right direction.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_337_Security_patches_are_getting_worse_Dustin_Childs_from_ZDI_tells_us_why.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_337_Security_patches_are_getting_worse_Dustin_Childs_from_ZDI_tells_us_why.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_337_Security_patches_are_getting_worse_Dustin_Childs_from_ZDI_tells_us_why.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/dustin_childs&#34;&gt;Dustin Childs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zerodayinitiative.com/&#34;&gt;ZDI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/software-patch-flaw-uptick-zdi/&#34;&gt;Sloppy Software Patches Are a ‘Disturbing Trend’&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techtarget.com/searchsecurity/news/252523732/Zero-Day-Initiative-launches-new-bug-disclosure-timelines&#34;&gt;Zero Day Initiative launches new bug disclosure timelines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.iso.org/standard/72311.html&#34;&gt;ISO 28147&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 336 - We don&#39;t have data, we have security biases</title>
      <link>https://opensourcesecurity.io/2022/08/14/episode-336-we-dont-have-data-data-we-have-security-biases/</link>
      <pubDate>Mon, 15 Aug 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2848</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about our lack of security and some of the data bias problems that can emerge. A lot of what we think is security data is really just biased data. This is OK as long as we understand the data is broken and know this is the first step in a longer journey.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_336_We_dont_have_data_data_we_have_security_biases.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_336_We_dont_have_data_data_we_have_security_biases.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_336_We_dont_have_data_data_we_have_security_biases.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/arekfurt/status/1555822761821577217&#34;&gt;Tweet about data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.metabase.com/blog/6-most-common-type-of-data-bias-in-data-analysis&#34;&gt;The 6 most common types of bias when working with data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://star-history.com/#anchore/syft&amp;amp;anchore/grype&amp;amp;Date&#34;&gt;Syft and Grype stars graph&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7150208/&#34;&gt;John Snow, Cholera, the Broad Street Pump&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/boblord/status/1557359072218734593&#34;&gt;Bob Lord tweet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 335 - Bull*&amp;amp;$% security ideas</title>
      <link>https://opensourcesecurity.io/2022/08/07/episode-335-bull-security-ideas/</link>
      <pubDate>Mon, 08 Aug 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2844</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a tweet from &lt;a href=&#34;https://twitter.com/kmcquade3&#34;&gt;@kmcquade3&lt;/a&gt; asking the question &amp;ldquo;What&amp;rsquo;s a concept in security that is generally accepted as true but is actually bull%$#*?&amp;rdquo; How many of the replies make sense? Most of them do. We go over some of the best replies as fast as we can.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_335_Bull_security_ideas.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_335_Bull_security_ideas.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_335_Bull_security_ideas.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kmcquade3/status/1553417306742693889?s=11&amp;amp;t=ZuLWUsWxa96bYnQRRVI9KA&#34;&gt;The tweet that started it all&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/simplenomad/status/1553836154763501568&#34;&gt;Mark Loveless&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/antitree/status/1553432167006584834&#34;&gt;Mark Manning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/rjb4standards/status/1553739692948045835&#34;&gt;Richard (Dick) Brooks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/ImbecillicusRex/status/1553781594686644225&#34;&gt;@ImbecillicusRex&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/WhatTrainToday/status/1553825456692002820&#34;&gt;What Train Have We Got?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/bltjetpack/status/1553911126886436865&#34;&gt;Dan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/Alex91dotar/status/1553749694278508546&#34;&gt;Alejo 🏳️‍🌈&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/postmodern_mod3/status/1553480048396537856&#34;&gt;postmodern&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/RCS/status/1553502092475736064&#34;&gt;🇺🇸 Robert C. Seacord 🇺🇦&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/waipeng/status/1553992275390504960&#34;&gt;Yip Wai Peng&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/sachinshahi/status/1554074034593079302&#34;&gt;Sachin Shahi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 334 - Leap seconds break everything</title>
      <link>https://opensourcesecurity.io/2022/07/31/episode-334-leap-seconds-break-everything/</link>
      <pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2837</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about leap seconds. Every time there&amp;rsquo;s a leap second, things break. Facebook wants to get rid of them because they break computers, but Google found a clever way to keep leap seconds without breaking anything. Corner cases are hard, security is often just one huge corner case. There are lessons we can learn here.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_334_Leap_seconds_break_everything.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_334_Leap_seconds_break_everything.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_334_Leap_seconds_break_everything.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/how-and-why-the-leap-second-affected-cloudflare-dns/&#34;&gt;How and why the leap second affected Cloudflare DNS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://engineering.fb.com/2022/07/25/production-engineering/its-time-to-leave-the-leap-second-in-the-past/&#34;&gt;Facebook wants to get rid of leap seconds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developers.google.com/time/smear&#34;&gt;Leap Smear&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gist.github.com/timvisee/fcda9bbdff88d45cc9061606b4b923ca&#34;&gt;Falsehoods programmers believe about time&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 333 - Open Source is unfair</title>
      <link>https://opensourcesecurity.io/2022/07/24/episode-333-open-source-is-unfair/</link>
      <pubDate>Mon, 25 Jul 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2833</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Microsoft creating a policy of not allowing anyone to charge for open source in their app store. This policy was walked back quickly, but it raises some questions about how fair or unfair open source really is. It&amp;rsquo;s mostly unfair to developers if you look at the big picture.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_333_Open_Source_is_unfair.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_333_Open_Source_is_unfair.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_333_Open_Source_is_unfair.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/syft&#34;&gt;Syft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/anchore/grype&#34;&gt;Grype&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2022/07/19/microsoft-u-turns-on-policy-that-wouldve-banned-commercial-open-source-apps/&#34;&gt;Microsoft bans and unbans open source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/about/press-releases/survey-finds-many-open-source-maintainers-are-stressed-out-and-underpaid-but-persist-so-they-can-make-a-positive-impact&#34;&gt;Tidelift survey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=vTsc1m78BUk&#34;&gt;Bruce Perens - What comes after open source&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 332 - PyPI: 2FA or not 2FA, that is the question</title>
      <link>https://opensourcesecurity.io/2022/07/17/episode-332-pypi-2fa-or-not-2fa-that-is-the-question/</link>
      <pubDate>Mon, 18 Jul 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2829</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about PyPI mandating two factor authentication for the top 1% of projects. It feels like a simple idea, but it&amp;rsquo;s not when you start to think about it. What problems does 2FA solve? How common are these attacks? What are the second and third order effects of mandating 2FA? This episode should have something for everyone on all sides of this discussion to violently disagree with.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_332_PyPI_2FA_or_not_2FA_that_is_the_question.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_332_PyPI_2FA_or_not_2FA_that_is_the_question.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_332_PyPI_2FA_or_not_2FA_that_is_the_question.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://pypi.org/security-key-giveaway/&#34;&gt;PyPI announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://therecord.media/thousands-of-npm-accounts-use-email-addresses-with-expired-domains/&#34;&gt;NPM expired domains&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/MortenLinderud/status/1545919583760142336&#34;&gt;Morten Linderud Tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lucumr.pocoo.org/2022/7/9/congratulations/&#34;&gt;Congratulations: We Now Have Opinions on Your Open Source Contributions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 331 - GPG, but nothing makes sense</title>
      <link>https://opensourcesecurity.io/2022/07/10/episode-331-gpg-but-nothing-makes-sense/</link>
      <pubDate>Mon, 11 Jul 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2824</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about their very silly GPG key management from the past. This is sadly a very true story that details how both Kurt and Josh protected their GPG keys. Josh&amp;rsquo;s setup is like something out of a very bad spy novel. It was very over the top for a key that really didn&amp;rsquo;t matter.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_331_GPG_but_nothing_makes_sense.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_331_GPG_but_nothing_makes_sense.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_331_GPG_but_nothing_makes_sense.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1181/&#34;&gt;XKCD signed email&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tolkiengateway.net/wiki/Shire_Calendar&#34;&gt;Shire calendar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/uk-news/2014/jan/31/footage-released-guardian-editors-snowden-hard-drives-gchq&#34;&gt;Guardian editors destroy Snowden laptop&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 330 - The sliding scale of risk: seeing the forest for the trees</title>
      <link>https://opensourcesecurity.io/2022/07/03/episode-330-the-sliding-scale-of-risk-seeing-the-forest-for-the-trees/</link>
      <pubDate>Mon, 04 Jul 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2819</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the challenge of dealing with vulnerabilities at a large scale. We tend to treat every vulnerability equally when they are not equal at all. Some are trees we have to pay very close attention to, and some are part of a larger forest that can&amp;rsquo;t be treated as individual vulnerabilities. We often treat risk as a binary measurement instead of a sliding scale.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_330_The_sliding_scale_of_risk_seeing_the_forest_for_the_trees.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_330_The_sliding_scale_of_risk_seeing_the_forest_for_the_trees.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_330_The_sliding_scale_of_risk_seeing_the_forest_for_the_trees.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gsd.id&#34;&gt;gsd.id&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2022/06/27/openssl_304_memory_corruption_bug/&#34;&gt;The Register OpenSSL story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/openssl/openssl/issues/18625&#34;&gt;OpenSSL bug&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 329 - Signing (What is it good for)</title>
      <link>https://opensourcesecurity.io/2022/06/26/episode-329-signing-what-is-it-good-for/</link>
      <pubDate>Mon, 27 Jun 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2814</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what the actual purpose of signing artifacts is. This is one of those spaces where the chain of custody for signing content is a lot more complicated than it sometimes seems to be. Is delivering software over https just as good as using a detached signature? How did we end up here, what do we think the future looks like? This episode will have something for everyone to complain about!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 328 - The Security of Jobs or Job Security</title>
      <link>https://opensourcesecurity.io/2022/06/19/episode-328-the-security-of-jobs-or-job-security/</link>
      <pubDate>Mon, 20 Jun 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2809</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security of employees leaving jobs. Be it a voluntary departure or in the context of the current layoffs we see, what are the security implications of having to remove access for one or more people departing their job?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_328_The_Security_of_Jobs_or_Job_Security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_328_The_Security_of_Jobs_or_Job_Security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_328_The_Security_of_Jobs_or_Job_Security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.businessinsider.com/tesla-elon-musk-layoffs-10-percent-staff-have-begun-2022-6&#34;&gt;Tesla Layoffs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.businessinsider.com/coinbase-layoffs-1100-employees-amid-crypto-bloodbath-2022-6&#34;&gt;Coinbase layoffs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 327 - The security of alert fatigue</title>
      <link>https://opensourcesecurity.io/2022/06/12/episode-327-the-security-of-alert-fatigue/</link>
      <pubDate>Mon, 13 Jun 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2803</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a funny GitHub reply that notified 400,000 people. It&amp;rsquo;s fun to laugh at this, but it&amp;rsquo;s an easy open to discussing alert fatigue and why it&amp;rsquo;s important to be very mindful of our communications.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_327_The_security_of_alert_fatigue.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_327_The_security_of_alert_fatigue.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_327_The_security_of_alert_fatigue.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=31627061&#34;&gt;GitHub 400K notifications Hacker News thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/mildlyinfuriating/comments/v5wlqw/idiot_neighbour_keeps_trying_to_connect_to_my_tv/&#34;&gt;Reddit user TV Bluetooth&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 326 - Big fat containers</title>
      <link>https://opensourcesecurity.io/2022/06/05/episode-326-big-fat-containers/</link>
      <pubDate>Mon, 06 Jun 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2797</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about containers. There are a lot of opinions around what type of containers is best. Back when it all started there were only huge distro sized containers. Now we have a world with many different container types and sizes. Is one better?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_326_Big_fat_containers.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_326_Big_fat_containers.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_326_Big_fat_containers.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://matduggan.com/programming-in-the/&#34;&gt;Programming in the Apocalypse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/MayhemDayOne&#34;&gt;Bob Diachenko&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.yahooinc.com/technology/paranoids-podcast/&#34;&gt;Paranoids Podcast&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 325 - Is one open source maintainer enough?</title>
      <link>https://opensourcesecurity.io/2022/05/29/episode-325-is-one-open-source-maintainer-enough/</link>
      <pubDate>Mon, 30 May 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2791</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a recent OpenSSF issue that asks the question how many open source maintainers should a project have that&amp;rsquo;s &amp;ldquo;healthy&amp;rdquo;? Josh did some research that shows the overwhelming majority of packages have one maintainer. What does that mean?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_325_Is_one_open_source_maintainer_enough.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_325_Is_one_open_source_maintainer_enough.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_325_Is_one_open_source_maintainer_enough.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/tac/issues/101&#34;&gt;OpenSSF TAC Issue 101&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 324 - WTF is up with WFH</title>
      <link>https://opensourcesecurity.io/2022/05/22/episode-324-wtf-is-up-with-wfh/</link>
      <pubDate>Mon, 23 May 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2786</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the whole work from home debate. It seems like there are a lot of very silly excuses why working from home is bad. We&amp;rsquo;ve both been working from home for a long time and have a chat about the topic. There&amp;rsquo;s not much security in this one, but it is a fun discussion.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_324_WTF_is_up_with_WFH.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_324_WTF_is_up_with_WFH.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_324_WTF_is_up_with_WFH.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/politics/2022/may/14/boris-johnson-urges-more-people-to-return-to-office-working&#34;&gt;Boris Johnson blames cheese&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.computerworld.com/article/3660773/apple-is-the-latest-example-of-how-the-remote-work-fight-has-gone-lunatic.html&#34;&gt;Apple and WFH&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 323 - The fake 7-Zip vulnerability and SBOM</title>
      <link>https://opensourcesecurity.io/2022/05/15/episode-323-the-fake-7-zip-vulnerability-and-sbom/</link>
      <pubDate>Mon, 16 May 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2780</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a fake 7-Zip security report. It&amp;rsquo;s pretty clear that everyone is running open source all the time. We end on some thoughts around what SBOM is good for, and who should be responsible for them.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_323_The_fake_7Zip_vulnerability_and_SBOM.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_323_The_fake_7Zip_vulnerability_and_SBOM.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_323_The_fake_7Zip_vulnerability_and_SBOM.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/wdormann/status/1521237068336316417?s=11&amp;amp;t=BRDFrWT6Odu9Vc7kMKx4GQ&#34;&gt;Probably fake 7-Zip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 322 - Adam Shostack on the security of Star Wars</title>
      <link>https://opensourcesecurity.io/2022/05/08/episode-322-adam-shostack-on-the-security-of-star-wars/</link>
      <pubDate>Mon, 09 May 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2773</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Adam Shostack about his new book &amp;ldquo;Threats: What Every Engineer Should Learn From Star Wars&amp;rdquo;. We discuss some of the lessons and threats in the Star Wars universe, it&amp;rsquo;s an old code I hear. We also discuss if Star Wars is a better than Star Trek for teaching security (it probably is). It&amp;rsquo;s a fun conversation and sounds like an amazing book.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_322_Adam_Shostack_on_the_security_of_Star_Wars.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_322_Adam_Shostack_on_the_security_of_Star_Wars.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_322_Adam_Shostack_on_the_security_of_Star_Wars.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/adamshostack&#34;&gt;Adam Shostack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://shostack.org/&#34;&gt;Adam&amp;rsquo;s Website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatsbook.com/&#34;&gt;The book&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 321 - Relativistic Security: Project Zero on 0day</title>
      <link>https://opensourcesecurity.io/2022/05/01/episode-321-relativistic-security-project-zero-on-0day/</link>
      <pubDate>Mon, 02 May 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2768</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Google Project Zero blog post about 0day vulnerabilities in 2021. There were a lot more than ever before, but why? Part of the challenge is the whole industry is expanding while a lot of our security technologies are not. When the universe around you is expanding but you&amp;rsquo;re staying the same size, you are actually shrinking.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_321_Relativistic_Security_Project_Zero_on_0day.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_321_Relativistic_Security_Project_Zero_on_0day.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_321_Relativistic_Security_Project_Zero_on_0day.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html&#34;&gt;Google Project Zero blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://support.apple.com/en-ca/HT201222&#34;&gt;Apple 0days&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://media.defense.gov/2022/Apr/27/2002984949/-1/-1/1/JOINT_CSA_2021_ROUTINELY_EXPLOITED_CVES_20220427.PDF&#34;&gt;Joint cyber advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 320 - Security Twitter is not the real world</title>
      <link>https://opensourcesecurity.io/2022/04/24/episode-320-security-twitter-is-not-the-real-world/</link>
      <pubDate>Mon, 25 Apr 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2764</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a survey about a TuxCare patch management and vulnerability detection. Sometimes our security bubble makes us forget what it&amp;rsquo;s like in the real world for the people who keep our infrastructure running. Patching isn&amp;rsquo;t always immediate, automation doesn&amp;rsquo;t fix everything, and accepting risk is very important.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_320_Security_Twitter_is_not_the_real_world.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_320_Security_Twitter_is_not_the_real_world.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_320_Security_Twitter_is_not_the_real_world.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://meet.tuxcare.com/state-of-enterprise-vulnerability-detection-and-patch-management-report#&#34;&gt;State of Enterprise Vulnerability Detection and Patch Management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&#34;&gt;CISA Known Exploited Vulnerabilities Catalog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2022/04/20/google_zero_days/&#34;&gt;Google 0days&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 319 - Patch Tuesday with a capital T</title>
      <link>https://opensourcesecurity.io/2022/04/17/episode-319-patch-tuesday-with-a-capital-t/</link>
      <pubDate>Mon, 18 Apr 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2760</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a lot of security vulnerabilities in this month&amp;rsquo;s Patch Tuesday. There&amp;rsquo;s also a new Git vulnerability. This sparks the age old question of how fast to patch? The answer isn&amp;rsquo;t binary, the right answer is whatever works best for you, not what someone tells you is best.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_319_Patch_Tuesday_with_a_capital_T.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_319_Patch_Tuesday_with_a_capital_T.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_319_Patch_Tuesday_with_a_capital_T.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2022/04/microsoft-issues-patches-for-2-windows.html&#34;&gt;Patch Tuesday&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2022-04-12-git-security-vulnerability-announced/&#34;&gt;Git security update&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 318 - Social engineering and why zlib got a 2018 CVE ID</title>
      <link>https://opensourcesecurity.io/2022/04/10/episode-318-social-engineering-and-why-zlib-got-a-2018-cve-id/</link>
      <pubDate>Mon, 11 Apr 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2755</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about hackers using emergency data requests to gain access to sensitive data. The argument that somehow backdoors can be protected falls under this problem. We don&amp;rsquo;t yet have the technical or policy protections in place to actually protect this data. We also explain why this zlib issue got a 2018 CVE ID in 2022.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_318_Social_engineering_and_why_zlib_got_a_2018_CVE_ID.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_318_Social_engineering_and_why_zlib_got_a_2018_CVE_ID.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_318_Social_engineering_and_why_zlib_got_a_2018_CVE_ID.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/&#34;&gt;Hackers using fake emergency data requests&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-25032&#34;&gt;CVE-2018-25032&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://globalsecuritydatabase.org/&#34;&gt;Global Security Database&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 317 - The lack of compromise in security</title>
      <link>https://opensourcesecurity.io/2022/04/03/episode-317-the-lack-of-compromise-in-security/</link>
      <pubDate>Mon, 04 Apr 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2749</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the binary nature of security. Many of our ideas are yes or no, there&amp;rsquo;s not much in the middle. The conversation ends up derailed due to a Twitter thread about pinning dependencies. This gives you an idea how contentious of a topic pinning is. The final takeaway is not to let security turn into your identity, it ends up making a mess.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_317_The_lack_of_compromise_in_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_317_The_lack_of_compromise_in_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_317_The_lack_of_compromise_in_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/joshbressers/status/1505921306704887812&#34;&gt;Josh&amp;rsquo;s Twitter thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/MylesBorins/status/1506327513236180992&#34;&gt;How to install week old npm packages&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 316 - You have to use open source</title>
      <link>https://opensourcesecurity.io/2022/03/27/episode-316-you-have-to-use-open-source/</link>
      <pubDate>Mon, 28 Mar 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2744</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the latest NPM backdoored package. It feels like this keeps happening. We talk about why this is and why it&amp;rsquo;s probably OK. Kurt fixes Linus&amp;rsquo; Law, in open source the superpower isn&amp;rsquo;t bugs are shallow (they&amp;rsquo;re not), the superpower is security bugs in open source can&amp;rsquo;t be ignored.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_316_You_have_to_use_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_316_You_have_to_use_open_source.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_316_You_have_to_use_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2022/03/18/protestware_javascript_node_ipc/&#34;&gt;node-ipc protestware&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Facts vs Feelings</title>
      <link>https://opensourcesecurity.io/2022/03/21/facts-vs-feelings/</link>
      <pubDate>Mon, 21 Mar 2022 22:07:21 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2733</guid> 
      <description>&lt;p&gt;Earlier today I asked a &lt;a href=&#34;https://twitter.com/joshbressers/status/1505921306704887812&#34;&gt;question&lt;/a&gt; on Twitter&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2022/03/image.png?w=597&#34;&gt;&lt;/p&gt;
&lt;p&gt;Holy cow that thread took on a life of its own. The question is easy enough, do we have any security data on pinning vs not pinning dependencies? We don&amp;rsquo;t, I know this, but I was hoping someone was working on something (I don&amp;rsquo;t think they are). But during the thread I also think I figured how to be start collecting this data. That&amp;rsquo;s a post for the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 315 - Who even makes all these terrible decisions?</title>
      <link>https://opensourcesecurity.io/2022/03/20/episode-315-who-even-makes-all-these-terrible-decisions/</link>
      <pubDate>Mon, 21 Mar 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2728</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Microsoft accidentally letting us find out about ads in file explorer. Changing your clocks sucks. And touch on some of the security implications of the Russian invasion and sanctions. There are a lot of security lessons we can all learn. Mostly what not to do.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_315_Who_even_makes_all_these_terrible_decisions.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_315_Who_even_makes_all_these_terrible_decisions.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_315_Who_even_makes_all_these_terrible_decisions.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/microsoft-is-testing-ads-in-the-windows-11-file-explorer/&#34;&gt;Ads in Windows Filemanager&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/worldnews/comments/teuurn/russia_faces_it_crisis_with_just_two_months_of/&#34;&gt;Russia running out of storage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/worldnews/comments/tf2rmu/russia_threatens_to_nationalize_microsoft_and/&#34;&gt;Russia threatens to nationalize industry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Onagawa_Nuclear_Power_Plant&#34;&gt;Onagawa Nuclear Power Plant&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/uk-england-cumbria-29803990&#34;&gt;Cockcroft&amp;rsquo;s Follies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/worldnews/comments/tewbzc/germany_advises_citizens_to_uninstall_kaspersky/&#34;&gt;German government advises citizens to uninstall Kaspersky&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 314 - The Linux Dirty Pipe vulnerability</title>
      <link>https://opensourcesecurity.io/2022/03/13/episode-314-the-linux-dirty-pipe-vulnerability/</link>
      <pubDate>Mon, 14 Mar 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2723</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Linux Kernel Dirty Pipe security vulnerability. This bug is an amazing combination of amazing complexity, incredible simplicity, and a little bit of luck. The discovery is amazing, the analysis is enlightening. There&amp;rsquo;s almost no way a bug like this could be found outside of open source.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_314_The_Linux_Dirty_Pipe_vulnerability.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_314_The_Linux_Dirty_Pipe_vulnerability.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_314_The_Linux_Dirty_Pipe_vulnerability.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dirtypipe.cm4all.com/&#34;&gt;Dirty Pipe Writeup&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 313 - Insecurity at scale</title>
      <link>https://opensourcesecurity.io/2022/03/06/episode-313-insecurity-at-scale/</link>
      <pubDate>Mon, 07 Mar 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2719</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the challenges of security at scale. Specifically we focus on why a lot of security starts to fall apart once you have to do something more than a few times. There&amp;rsquo;s a lot of new thinking we need to push security forward.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_313_Insecurity_at_scale.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_313_Insecurity_at_scale.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_313_Insecurity_at_scale.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://lwn.net/Articles/764647/&#34;&gt;Stable Linux Kernel and Machine Learning&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 312 - The Legend of the SBOM</title>
      <link>https://opensourcesecurity.io/2022/02/27/episode-312-the-legend-of-the-sbom/</link>
      <pubDate>Mon, 28 Feb 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2712</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about SBOMs. Not what they are, there&amp;rsquo;s plenty about that. We talk about why everyone keeps claiming they&amp;rsquo;re super important, and why we&amp;rsquo;re starting to see some people question if we really need them. SBOMs are part of a future that&amp;rsquo;s still being invented.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_312_The_Legend_of_the_SBOM.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_312_The_Legend_of_the_SBOM.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_312_The_Legend_of_the_SBOM.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.csoonline.com/article/3649794/drop-the-sbom.html&#34;&gt;Questioning SBOMs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rezilion.com/blog/log4j-blindspots-what-your-scanner-is-still-missing/&#34;&gt;Rezilion Log4j diagram&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2016/11/22/episode-14-david-a-wheeler-cii-badges/&#34;&gt;David A Wheeler on CII Badges&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.flickr.com/photos/daviderickson/718933691/&#34;&gt;Using open source is communism&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 311 - Did you scan the QR code?</title>
      <link>https://opensourcesecurity.io/2022/02/20/episode-311-did-you-scan-the-qr-code/</link>
      <pubDate>Mon, 21 Feb 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2706</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Coinbase Super Bowl ad. It was a QR code, lots of security people were aghast at how many people scanned the QR code. The reality is scanning QR codes isn&amp;rsquo;t dangerous. What other security advice just won&amp;rsquo;t go away?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_311_Did_you_scan_the_QR_code.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_311_Did_you_scan_the_QR_code.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_311_Did_you_scan_the_QR_code.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.msn.com/en-us/sports/nfl/coinbase-super-bowl-commercial/vi-AATOqBZ&#34;&gt;Coinbase Ad&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1493448162861727746&#34;&gt;Kurt&amp;rsquo;s Twitter question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2022/1/12/22879728/phishing-scam-parking-meter-qr-code-austin-san-antonio&#34;&gt;QR code parking scam&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.usenix.org/system/files/1401_08-12_mickens.pdf&#34;&gt;Mossad or not Mossad&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.brighttalk.com/webcast/10415/527523?utm_source=Twitter&amp;amp;utm_medium=Post&#34;&gt;Kurt&amp;rsquo;s talk&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 310 - Hayley Tsukayama from the EFF talks about privacy</title>
      <link>https://opensourcesecurity.io/2022/02/13/episode-310-hayley-tsukayama-from-the-eff-talks-about-privacy/</link>
      <pubDate>Mon, 14 Feb 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2701</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Hayley Tsukayama from the EFF about privacy. We all know privacy in the modern age is very complicated and difficult. Normal people don&amp;rsquo;t have many allies when it comes to privacy. The EFF has been blazing the trail for digital rights for more than 30 years! This episode has a ton of amazing details, it&amp;rsquo;s easy to see how the EFF became the jewel of the Internet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 309 - The bright future of open source secuirty</title>
      <link>https://opensourcesecurity.io/2022/02/06/episode-309-the-bright-future-of-open-source-secuirty/</link>
      <pubDate>Mon, 07 Feb 2022 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2697</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about NPM requiring 2FA for the top 100 packages. We discuss the new Alpha and Omega projects from the OpenSSF and what it could mean for the future of open source security. Then we end on a note about the new Samba critical vulnerability.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_309_The_bright_future_of_open_source_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_309_The_bright_future_of_open_source_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_309_The_bright_future_of_open_source_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2022-02-01-top-100-npm-package-maintainers-require-2fa-additional-security/&#34;&gt;NPM requires 2FA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openssf.org/press-release/2022/02/01/openssf-announces-the-alpha-omega-project-to-improve-software-supply-chain-security-for-10000-oss-projects/&#34;&gt;OpenSSF Alpha and Omega&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2021/11/21/episode-298-david-a-wheeler-discusses-the-openssf/&#34;&gt;David A. Wheeler episode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lfx.linuxfoundation.org/&#34;&gt;Linux Foundation LFX&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.samba.org/samba/security/CVE-2021-44142.html&#34;&gt;Samba Advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 308 - Welcome to the jungle - How to talk about open source security</title>
      <link>https://opensourcesecurity.io/2022/01/30/episode-308-welcome-to-the-jungle-how-to-talk-about-open-source-security/</link>
      <pubDate>Mon, 31 Jan 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2693</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to get attention for security problems. Recent research around Twitter credentials checked into GitHub showed us how to get a lot of attention when compared to a problem like Log4Shell which took years before anyone really picked up on the problem. It&amp;rsquo;s hard to talk about security sometimes.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_308_Welcome_to_the_jungle_How_to_talk_about_open_source_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_308_Welcome_to_the_jungle_How_to_talk_about_open_source_security.mp3&#34;&gt;https://traffic.libsyn.com/opensourcesecuritypodcast/Episode_308_Welcome_to_the_jungle_How_to_talk_about_open_source_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/joshbressers/Live-Streaming-using-OpenCV-Flask&#34;&gt;Josh&amp;rsquo;s computer vision code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://incognitatech.medium.com/using-twitter-to-notify-careless-developers-the-unorthodox-way-d71478ad367a&#34;&gt;Twitter secrets&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt&#34;&gt;Qualys pwnkit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 307 - Got vulnerabilities? Introducing GSD</title>
      <link>https://opensourcesecurity.io/2022/01/23/episode-307-got-vulnerabilities-introducing-gsd/</link>
      <pubDate>Mon, 24 Jan 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2689</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Global Security Database (GSD) project. This is a Cloud Security Alliance (CSA) effort to build community around vulnerability identifiers.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_307_Got_vulnerabilities_Introducing_GSD.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_307_Got_vulnerabilities_Introducing_GSD.mp3&#34;&gt;https://traffic.libsyn.com/secure/forcedn/opensourcesecuritypodcast/Episode_307_Got_vulnerabilities_Introducing_GSD.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/dog_rates&#34;&gt;We rate dogs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/heaIwithraccoon/status/1480816006448627712&#34;&gt;Racoons that heal your sadness&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://globalsecuritydatabase.org/&#34;&gt;Global Security Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2021/03/07/episode-261-dwf-is-back-welcome-to-community-powered-cve/&#34;&gt;Episode 261 – DWF is back! Welcome to community powered CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://groups.google.com/a/groups.cloudsecurityalliance.org/g/gsd&#34;&gt;GSD mailing list&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://circle.cloudsecurityalliance.org/community-home1?CommunityKey=c4811e28-4a39-4eb0-b003-99408a5a5ec6&#34;&gt;GSD Circle group&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cloudsecurityalliance/gsd-database&#34;&gt;GSD Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cloudsecurityalliance/gsd-project-plans&#34;&gt;GSD Project Plan&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 306 - Open source isn&#39;t broken, it&#39;s an experience</title>
      <link>https://opensourcesecurity.io/2022/01/16/episode-306-open-source-isnt-broken-its-an-experience/</link>
      <pubDate>Mon, 17 Jan 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2685</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the faker and colors NPM events. There is a lot of discussion around open source being broken or somehow failing because of these events. The real answer is open source is an experience. How we interact with our dependencies determines what the experience looks like.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_306_Open_source_isnt_broken_its_an_experience.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_306_Open_source_isnt_broken_its_an_experience.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_306_Open_source_isnt_broken_its_an_experience.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/&#34;&gt;Developer corrupts colors and faker&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.penny-arcade.com/comic/2005/05/27/e32k5-request-granted&#34;&gt;Will Wright Pee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.penny-arcade.com/comic/2004/03/19&#34;&gt;Internet Anonymity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 305 - Norton, Ethereum, NFT, and Apes</title>
      <link>https://opensourcesecurity.io/2022/01/09/episode-305-norton-ethereum-nft-and-apes/</link>
      <pubDate>Mon, 10 Jan 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2681</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Norton creating an Ethereum mining pool. This is almost certainly a bad idea, we explain why. We then discuss the reality of NFTs and the case of stolen apes. NFTs can be very confusing. The whole world of cryptocurrency is very confusing for normal people. None of this is new, there have always been con artists, there will always be con artists.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_305_Norton_Ethereum_NFT_and_Apes.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_305_Norton_Ethereum_NFT_and_Apes.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_305_Norton_Ethereum_NFT_and_Apes.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://community.norton.com/en/forums/faq-norton-crypto&#34;&gt;Norton Crypto FAQ&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://decrypt.co/89540/opensea-freezes-stolen-bored-apes-worth-2-2m&#34;&gt;Stolen Ape&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/the-crypto-plot-to-buy-the-constitution-was/id1441708044?i=1000544599707&#34;&gt;Smart contract to buy the constitution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/cat5749/status/1476813266462539779&#34;&gt;YEAR token&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 304 - Will we ever fix all the vulnerabilities?</title>
      <link>https://opensourcesecurity.io/2022/01/02/episode-304-will-we-ever-fix-all-the-vulnerabilities/</link>
      <pubDate>Mon, 03 Jan 2022 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2675</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the question will we ever fix all the vulnerabilities? The question came from Reddit and is very reasonable, but it turns out this is REALLY hard to discuss. The answer is of course &amp;ldquo;no&amp;rdquo;, but why it is no is very complicated. Far more complicated than either of us thought it would be.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_304_Will_we_ever_fix_all_the_vulnerabilities.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_304_Will_we_ever_fix_all_the_vulnerabilities.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_304_Will_we_ever_fix_all_the_vulnerabilities.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/cybersecurity/comments/rpqpbf/will_cyber_security_vulnerabilities_ever_stop/&#34;&gt;Will cyber security vulnerabilities ever &amp;ldquo;stop existing&amp;rdquo; ?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 303 - Log4j Christmas Spectacular!</title>
      <link>https://opensourcesecurity.io/2021/12/26/episode-303-log4j-christmas-spectacular/</link>
      <pubDate>Mon, 27 Dec 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2670</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; start the show with the reading of a security themed Christmas poem. We then discuss some of the new happenings around Log4j. The basic theme is that even if we were over-investing in Log4j, it probably wouldn&amp;rsquo;t have caught this. There are still a lot of things to unpack with this event. We are sure we&amp;rsquo;ll be talking about it well into the future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_303_Log4j_Christmas_Spectacular.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_303_Log4j_Christmas_Spectacular.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_303_Log4j_Christmas_Spectacular.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;log-before-christmas-poem&#34;&gt;&lt;strong&gt;Log before Christmas poem&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&amp;lsquo;Twas the night before Christmas, when all through the stack&lt;br&gt;
Not a scanner was scanning, not even a rack,&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 302 - Log4j is a mess</title>
      <link>https://opensourcesecurity.io/2021/12/19/episode-302-log4j-is-a-mess/</link>
      <pubDate>Mon, 20 Dec 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2665</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the same topic everyone is talking about, Log4j. This episode was recorded on the Wednesday after the first Log4j issue. We point out all the gaps and difficulties for the defenders. The situation has gotten worse since then.&lt;/p&gt;
&lt;p&gt;Good luck to everyone dealign with this thing&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_302_Log4j_is_a_mess.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_302_Log4j_is_a_mess.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_302_Log4j_is_a_mess.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/cloudsecurityalliance/gsd-database/blob/main/2021/1002xxx/GSD-2021-1002352.json&#34;&gt;Log4j GSD entry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hypixel.net/threads/psa-there-is-a-fatal-remote-code-execution-exploit-in-minecraft-and-its-by-typing-in-chat.4703238/&#34;&gt;Minecraft server discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/apache/logging-log4j2/pull/608&#34;&gt;Log4j GitHub issue 608&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 301 - You&#39;re holding it wrong: the importance of unlearning</title>
      <link>https://opensourcesecurity.io/2021/12/12/episode-301-youre-holding-it-wrong-the-importance-of-unlearning/</link>
      <pubDate>Mon, 13 Dec 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2636</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the epic failure that was episode 300. But this ties nicely into the topic of the day which is new ways to do things. The example is a new way to hold a controller when playing Tetris. There are always new tools and new ideas in security. Sometimes we have to abandon the old way because the new way to too good to ignore.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_301_Youre_holding_it_wrong_the_importance_of_unlearning.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_301_Youre_holding_it_wrong_the_importance_of_unlearning.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_301_Youre_holding_it_wrong_the_importance_of_unlearning.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lawfareblog.com/lawfare-podcast-orin-kerr-and-asaf-lubin-apple-v-nso-group&#34;&gt;Lawfare Apple NSO podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vice.com/en/article/akgd7b/a-new-way-to-press-nes-controller-buttons-is-shaking-up-competitive-tetris&#34;&gt;New way to play Tetris&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>log4j is hard to find and harder to fix</title>
      <link>https://opensourcesecurity.io/2021/12/12/log4j-is-hard-to-find-and-harder-to-fix/</link>
      <pubDate>Sun, 12 Dec 2021 19:45:08 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2641</guid> 
      <description>&lt;p&gt;If you pay attention to tech news, you know what&amp;rsquo;s going on with log4j right now. It&amp;rsquo;s being called &lt;a href=&#34;https://www.lunasec.io/docs/blog/log4j-zero-day/&#34;&gt;Log4Shell&lt;/a&gt; which is a great name. I&amp;rsquo;ll spare you repeating the details of the issue, there are many many stories about it at this point.&lt;/p&gt;
&lt;p&gt;What I&amp;rsquo;ve not seen is a good explanation about why knowing if you are using log4j is hard, and fixing it will be even harder than finding it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 300 - Apple vs NSO: What can copyright do for you?</title>
      <link>https://opensourcesecurity.io/2021/12/05/episode-300-apple-vs-nso-what-can-copyright-do-for-you/</link>
      <pubDate>Mon, 06 Dec 2021 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2619</guid> 
      <description>&lt;p&gt;This episode need a huge disclaimer: we got almost all of the details of this wrong, the lawsuit is based on CFAA, not on copyright. We apologize for this enormous oversight.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Apple suing NSO using a copyright claim as their vehicle. Copyright is often used as a reason to bring lawsuits, even when it doesn&amp;rsquo;t always make sense. Copyright has been used by open source to expand rights, and many companies to restrict rights. It&amp;rsquo;s a very odd law sometimes. At the end of the day it seems the only real path forward for a problem like NSO is up to governments to protect their citizens.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 299 - Experts From A World That No Longer Exists</title>
      <link>https://opensourcesecurity.io/2021/11/28/episode-299-experts-from-a-world-that-no-longer-exists/</link>
      <pubDate>Mon, 29 Nov 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2614</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about an article about how expertise has a limited lifetime. We are all experts in something, but some of us will find our expert knowledge to be outdated eventually. We discuss what that means in the context of security and tech and disagree about how to best keep your skills up to date.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_299_Experts_From_A_World_That_No_Longer_Exists.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_299_Experts_From_A_World_That_No_Longer_Exists.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_299_Experts_From_A_World_That_No_Longer_Exists.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.collaborativefund.com/blog/experts/&#34;&gt;Experts From A World That No Longer Exists&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Neuroplasticity&#34;&gt;Neuroplasticity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=hShY6xZWVGE&#34;&gt;Scotty and the mouse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.blog/2021-11-15-highlights-from-git-2-34/&#34;&gt;Git 2.34&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://4h.unl.edu/public-speaking#:~:text=The%204%2DH%20Public%20Speaking%20Contest%20helps%20youth%20develop%20skills,%2C%20and%20develop%20self%2Dconfidence.&#34;&gt;4H Public Speaking&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 298 - David A Wheeler discusses the OpenSSF</title>
      <link>https://opensourcesecurity.io/2021/11/21/episode-298-david-a-wheeler-discusses-the-openssf/</link>
      <pubDate>Mon, 22 Nov 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2608</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to David A. Wheeler about everything OpenSSF. The Open Source Security Foundation is part of the Linux Foundation, and there are 6 OpenSSF working groups. David does a great job explaining how the OpenSSF works and what the 6 working groups are doing. The working group are (in no particular order): Identifying Security Threats, Security Tooling, Best Practices, Vulnerability Disclosures, Digital Identity Attestation, Securing Critical Projects.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_298_David_A_Wheeler_discusses_the_OpenSSF.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_298_David_A_Wheeler_discusses_the_OpenSSF.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_298_David_A_Wheeler_discusses_the_OpenSSF.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://dwheeler.com/&#34;&gt;David A Wheeler&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2016/11/22/episode-14-david-a-wheeler-cii-badges/&#34;&gt;Episode 14 – David A Wheeler: CII Badges&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.sigstore.dev/sigstore-the-openssf-315d09f135f2&#34;&gt;Sigstore joins the OpenSSF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openssf.org/getinvolved/&#34;&gt;OpenSSF Technical Working Groups&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.helpnetsecurity.com/2021/11/17/npm-registry-vulnerability/&#34;&gt;NPM requires MFA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lish.harvard.edu/&#34;&gt;LISH&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arxiv.org/abs/2005.09535&#34;&gt;Backstabber&amp;rsquo;s Knife Collection: A Review of Open Source Software Supply Chain Attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 297 - 25 years of smashing stacks, fun, and profit</title>
      <link>https://opensourcesecurity.io/2021/11/14/episode-297-25-years-of-smashing-stacks-fun-and-profit/</link>
      <pubDate>Mon, 15 Nov 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2604</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the famous Phrack 49 article &amp;ldquo;Smashing the Stack for Fun and Profit&amp;rdquo; turning 25 years old. This paper created a massive amount of change in the industry, possibly more than any other paper ever written. Everything from making exploiting stack overflows easier, to defenders creating technologies such as stack canaries are the direct result of this work.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_297_25_years_of_smashing_stacks_fun_and_profit.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_297_25_years_of_smashing_stacks_fun_and_profit.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_297_25_years_of_smashing_stacks_fun_and_profit.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://phrack.org/issues/49/1.html&#34;&gt;Phrack 49&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://seifried.org/security/articles/20011015-elias-levy-interview.html&#34;&gt;Kurt&amp;rsquo;s Interview with Elias Levi aka Aleph One&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 296 - Is Trojan Source a vulnerability?</title>
      <link>https://opensourcesecurity.io/2021/11/07/episode-296-is-trojan-source-a-vulnerability/</link>
      <pubDate>Mon, 08 Nov 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2598</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new Trojan Source bug. We don&amp;rsquo;t always agree on if this is a vulnerability (it&amp;rsquo;s not), but by the end we come to an agreement that ASCII is out, Unicode is in. We don&amp;rsquo;t live in a world where you can make a realistic suggestion to return to using only ASCII. There are a lot of weird moving parts with this one.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_296_Is_Trojan_Source_a_vulnerability.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_296_Is_Trojan_Source_a_vulnerability.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_296_Is_Trojan_Source_a_vulnerability.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://trojansource.codes/&#34;&gt;Trojan Source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openwall.com/lists/oss-security/2021/11/02/5&#34;&gt;oss-security message&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/nickboucher/trojan-source/blob/main/Python/early-return.py&#34;&gt;GitHub example&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 295 - Open source security isn&#39;t free</title>
      <link>https://opensourcesecurity.io/2021/10/31/episode-295-open-source-security-isnt-free/</link>
      <pubDate>Mon, 01 Nov 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2592</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Josh&amp;rsquo;s electric car and new job. We then talk about the recent UAParser.js malware incident. There have been a lot of calls to do more to secure open source, but nobody seems to have any concrete proposals or suggestions to fund any of these activities.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_295_Open_source_security_isnt_free.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_295_Open_source_security_isnt_free.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_295_Open_source_security_isnt_free.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.npmjs.com/package/ua-parser-js&#34;&gt;UAParser.js&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://us-cert.cisa.gov/ncas/current-activity/2021/10/22/malware-discovered-popular-npm-package-ua-parser-js&#34;&gt;CISA announcement&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 294 - Chris Wysopal on the state of security education</title>
      <link>https://opensourcesecurity.io/2021/10/24/episode-294-chris-wysopal-on-the-state-of-security-education/</link>
      <pubDate>Mon, 25 Oct 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2584</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Chris Wysopal, AKA Weld Pond, about security education. We talk about the current state of how we are learning about security as students and developers. What the best way to get developers interested in learning more about security? We end the show with fantastic advice from Chris for anyone new to the field of technology or security.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_294_Chris_Wysopal_on_the_state_of_security_education.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_294_Chris_Wysopal_on_the_state_of_security_education.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_294_Chris_Wysopal_on_the_state_of_security_education.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/WeldPond&#34;&gt;Chris Wysopal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.veracode.com/&#34;&gt;Veracode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gitlab.com/l0phtcrack/l0phtcrack&#34;&gt;l0phtcrack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 293 - Scoring OpenSSF Security Scoring</title>
      <link>https://opensourcesecurity.io/2021/10/17/episode-293-scoring-openssf-security-scoring/</link>
      <pubDate>Mon, 18 Oct 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2579</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the release of OpenSSF Security Scorecards version 3. This is a great project that will probably make a huge difference. Most of the things the scorecards are measuring are no brainier activities. We go through the list of metrics being measured. There are only a few that we don&amp;rsquo;t think are fantastic.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_293_Scoring_OpenSSF_Security_Scoring.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_293_Scoring_OpenSSF_Security_Scoring.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_293_Scoring_OpenSSF_Security_Scoring.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=UN3W4d-5RPo&#34;&gt;4 of spades&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openssf.org/&#34;&gt;OpenSSF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xiph.org/video/&#34;&gt;Chris Montgomery audio explanation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/scorecard/releases/tag/v3.0.0&#34;&gt;Scorecard 3.0.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ossf/scorecard#checks-1&#34;&gt;Scoring criteria&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/joshbressers/python-skeleton&#34;&gt;Python Skeleton&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 292 - Apache RCE and Twitch epic pwn</title>
      <link>https://opensourcesecurity.io/2021/10/10/episode-292-apache-rce-and-twitch-epic-pwn/</link>
      <pubDate>Mon, 11 Oct 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2574</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent Twitch hack and how in the modern age leaking source code almost certainly doesn&amp;rsquo;t matter. The leaked data however is a big deal. We also discuss a recent Apache httpd update. Some things went right, some things went wrong. Dealing with vulnerabilities is hard.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_292_Apache_RCE_and_Twitch_epic_pwn.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_292_Apache_RCE_and_Twitch_epic_pwn.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_292_Apache_RCE_and_Twitch_epic_pwn.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=22yoaiLYb7M&#34;&gt;Parasocial Relationship&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/twitch-source-code-business-data-gamer-payouts-leaked-in-massive-hack/&#34;&gt;Twitch Hack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://aviationhumor.net/soviet-b-29-clone-the-tupolev-tu-4-with-a-very-small-unnecessary-hole/&#34;&gt;Soviet B-29 Clone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773&#34;&gt;Apache CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://httpd.apache.org/security/vulnerabilities_24.html&#34;&gt;Apache Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GossiTheDog/status/1445508829483986945&#34;&gt;GossiTheDog Tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/hackerfantastic/status/1445531829985968137&#34;&gt;Hacker Fantastic exploit&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 291 - Everyone sucks at vulnerability disclosure</title>
      <link>https://opensourcesecurity.io/2021/10/03/episode-291-everyone-sucks-at-vulnerability-disclosure/</link>
      <pubDate>Mon, 04 Oct 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2569</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about recent events around Apple and Microsoft disclosing security vulnerabilities. Microsoft usually does a good job, but Apple has a long history of not having a great bug bounty or vulnerability disclosure policy. None of this is simple, but hopefully you&amp;rsquo;ll have some fun and learn a bit about the whole vulnerability disclosure process.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_291_Everyone_sucks_at_vulnerability_disclosure.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_291_Everyone_sucks_at_vulnerability_disclosure.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_291_Everyone_sucks_at_vulnerability_disclosure.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://apple.slashdot.org/story/21/09/24/1515243/researcher-dumps-three-ios-zero-days-after-apple-failed-to-fix-issues-for-months&#34;&gt;Apple 0days&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2021/09/27/microsoft_exchange_autodiscover/&#34;&gt;Microsoft Exchange flaw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thisishowtheytellmetheworldends.com/&#34;&gt;THIS IS HOW THEY TELL ME THE WORLD ENDS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linuxfoundation.org/blog/how-to-report-security-vulnerabilities-to-the-linux-foundation/&#34;&gt;Linux Foundation Vulnerability Disclosure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.joda.org/2021/09/big-problems-at-timezone-database.html&#34;&gt;Timezone problem&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 290 - The security of the Matrix</title>
      <link>https://opensourcesecurity.io/2021/09/26/episode-290-the-security-of-the-matrix/</link>
      <pubDate>Mon, 27 Sep 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2563</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security of the Matrix movie series. There was a new Matrix trailer that made us want to discuss some of the security themes. We talk about how the movie is very focused on computing in the 90s. How Neo probably ran Linux and they used a real ssh exploit. How a lot of the plot is a bit silly. It&amp;rsquo;s a really fun episode.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_290_The_security_of_the_Matrix.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_290_The_security_of_the_Matrix.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_290_The_security_of_the_Matrix.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=9ix7TUGVYIo&#34;&gt;Matrix 4 trailer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=0PxTAn4g20U&#34;&gt;nmap in the Matrix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=2Wmocp4iHvA&#34;&gt;VFX Artists react to the Mandalorian&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Glasshouse_(novel)&#34;&gt;Glasshouse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.decisionproblem.com/paperclips/&#34;&gt;Universal Paperclips&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 289 - Who left this 0day on the floor?</title>
      <link>https://opensourcesecurity.io/2021/09/19/episode-289-who-left-this-0day-on-the-floor/</link>
      <pubDate>Mon, 20 Sep 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2557</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about an unusual number of really bad security updates. We even recorded this before the Azure OMIGOD vulnerability was disclosed. It&amp;rsquo;s certainly been a wild week with Apple and Chrome 0days, and a Travis CI secret leak. Maybe this is the new normal.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_289_Who_left_this_0day_on_the_floor.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_289_Who_left_this_0day_on_the_floor.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_289_Who_left_this_0day_on_the_floor.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=9ix7TUGVYIo&#34;&gt;Matrix 4 trailer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://travis-ci.community/t/security-bulletin/12081&#34;&gt;Travis CI issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/&#34;&gt;Apple 0day patches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/google-patches-two-chrome-zero-days/&#34;&gt;Chrome 0day patches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=O37yJBFRrfg&#34;&gt;CGP Grey Where is the European Union&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 288 - Linux Kernel compiler warnings considered dangerous</title>
      <link>https://opensourcesecurity.io/2021/09/12/episode-288-linux-kernel-compiler-warnings-considered-dangerous/</link>
      <pubDate>Mon, 13 Sep 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2552</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some happenings in the Linux Kernel. There are some new rules around how to submit patches that goes against how GitHub works. They&amp;rsquo;re also turning all compiler warnings into errors. It&amp;rsquo;s really interesting to understand what these steps mean today, and what they could mean in the future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_288_Linux_Kernel_compiler_warnings_considered_dangerous.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_288_Linux_Kernel_compiler_warnings_considered_dangerous.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_288_Linux_Kernel_compiler_warnings_considered_dangerous.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2021/09/06/github_merges_useless_garbage_says/&#34;&gt;The Register Linux story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/blog/blog/2021/09/07/OpenSSL3.Final/&#34;&gt;OpenSSL Release Notes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 287 - Is GitHub&#39;s Copilot the new Clippy?</title>
      <link>https://opensourcesecurity.io/2021/09/05/episode-287-is-githubs-copilot-the-new-clippy/</link>
      <pubDate>Mon, 06 Sep 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2548</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about GitHub Copilot. What can we learn from a report claiming 40% of code generated by Copilot has security vulnerabilities? Is this the future or just some sort of strange new thing that will be gone as fast as it came?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_287_Is_GitHubs_Copilot_the_new_Clippy.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_287_Is_GitHubs_Copilot_the_new_Clippy.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_287_Is_GitHubs_Copilot_the_new_Clippy.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://copilot.github.com/&#34;&gt;GitHub Copilot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developers.slashdot.org/story/21/08/29/015213/40-of-githubs-copilots-suggestions-had-security-vulnerabilties-study-finds&#34;&gt;Copilot research paper&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 286 - Open source supply chain with Google&#39;s Dan Lorenc</title>
      <link>https://opensourcesecurity.io/2021/08/29/episode-286-open-source-supply-chain-with-googles-dan-lorenc/</link>
      <pubDate>Mon, 30 Aug 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2538</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Dan Lorenc from Google about supply chain security. What&amp;rsquo;s currently going on in this space and what sort of new thing scan we look forward to? We discuss Google&amp;rsquo;s open source use, Project Sigstore, the SLSA framework and more.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_286_Open_source_supply_chain_with_Googles_Dan_Lorenc.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_286_Open_source_supply_chain_with_Googles_Dan_Lorenc.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_286_Open_source_supply_chain_with_Googles_Dan_Lorenc.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/lorenc_dan&#34;&gt;Dan&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sigstore.dev/&#34;&gt;Sigstore&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://slsa.dev/&#34;&gt;SLSA Framework&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 285 - Open source owes you nothing!</title>
      <link>https://opensourcesecurity.io/2021/08/22/episode-285-open-source-owes-you-nothing/</link>
      <pubDate>Mon, 23 Aug 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2528</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about open source bugs. What happens if a project decides to close most of their bugs? Nothing really. Bug trackers aren&amp;rsquo;t a help desk.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_285_Open_source_owes_you_nothing.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_285_Open_source_owes_you_nothing.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_285_Open_source_owes_you_nothing.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=28181575&#34;&gt;Emacs closes 45% of bugs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://universalvulnerabilityidentifier.org/&#34;&gt;UVI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dailybulletin.com/2021/08/16/765000-tesla-vehicles-under-nhta-investigation-over-autopilot-problems/&#34;&gt;Tesla investigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/technology-54423988&#34;&gt;UK COVID spreadsheet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 284 - What happens when we DRM power tools?</title>
      <link>https://opensourcesecurity.io/2021/08/15/episode-284-what-happens-when-we-drm-power-tools/</link>
      <pubDate>Mon, 16 Aug 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2523</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a Home Depot plan to put DRM on power tools. Anyone can add a computer to anything for a few dollars now. How secure is any of this. What does it mean when the things we buy start to acquire DRM? There are a lot of new questions we don&amp;rsquo;t have any real answers for.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_284_What_happens_when_we_DRM_power_tools.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_284_What_happens_when_we_DRM_power_tools.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_284_What_happens_when_we_DRM_power_tools.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.slashgear.com/home-depot-power-tools-wont-work-unless-you-pay-for-them-02685065/&#34;&gt;Home Depot power tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=28051005&#34;&gt;Ray Ozzie&amp;rsquo;s IoT board&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/First-sale_doctrine&#34;&gt;First-sale doctrine&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 283 - When vulnerability disclosure becomes dangerous</title>
      <link>https://opensourcesecurity.io/2021/08/08/episode-283-when-vulnerability-disclosure-becomes-dangerous/</link>
      <pubDate>Sun, 08 Aug 2021 18:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2517</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a very difficult disclosure problem. What happens when you have to report a vulnerability to an ethically questionable company? It&amp;rsquo;s less simple than it sounds, many of the choices could end up harming victims.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_283_When_vulnerability_disclosure_becomes_dangerous.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_283_When_vulnerability_disclosure_becomes_dangerous.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_283_When_vulnerability_disclosure_becomes_dangerous.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.immersivelabs.com/resources/blog/disclosure-dilemmas-vulnerable-stalkerware/&#34;&gt;Disclosure Dilemmas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/evacide&#34;&gt;@evacide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/MayhemDayOne&#34;&gt;Bob Diachenko&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thisishowtheytellmetheworldends.com/&#34;&gt;This Is How They Tell Me The World Ends&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 282 - The security of Rust: who left all this awesome in here?</title>
      <link>https://opensourcesecurity.io/2021/08/01/episode-282-the-security-of-rust-who-left-all-this-awesome-in-here/</link>
      <pubDate>Mon, 02 Aug 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2502</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a story from Microsoft declaring Rust the future of safe programming, replacing C and C++. We discuss how tooling affects progress and why this isn&amp;rsquo;t always obvious when you&amp;rsquo;re in the middle of progress.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_282_The_security_of_Rust_who_left_all_this_awesome_in_here.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_282_The_security_of_Rust_who_left_all_this_awesome_in_here.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_282_The_security_of_Rust_who_left_all_this_awesome_in_here.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thenewstack.io/microsoft-rust-is-the-industrys-best-chance-at-safe-systems-programming/&#34;&gt;Microsoft: Rust Is the Industry’s ‘Best Chance’ at Safe Systems Programming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://devopsdays.org/events/2017-madison/program/josh-bressers/&#34;&gt;Josh&amp;rsquo;s devopsdays talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://petri.com/microsoft-quietly-moved-font-parsing-appcontainer-anniversary-update&#34;&gt;Microsoft moved font handling out of the kernel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=5nViIUfDMJg&#34;&gt;Atari 2600 emulator in Minecraft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://steemit.com/bitcoin/@cryptokate/bitcoin-goes-mainstream-s-curve-of-technological-adoption&#34;&gt;Rate of technology adoption&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 281 - If you spy on journalists, you&#39;re the bad guys</title>
      <link>https://opensourcesecurity.io/2021/07/25/episode-281-if-you-spy-on-journalists-youre-the-bad-guys/</link>
      <pubDate>Mon, 26 Jul 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2498</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the news that the NSO Group is widely distributing spyware onto a large number of devices. This news should be a wake up call for anyone creating devices and systems that could be attacked, it&amp;rsquo;s time to segment services. There&amp;rsquo;s not a lot individuals can do at this point, but we have some ideas at the end of the episode.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_281_If_you_spy_on_journalists_youre_the_bad_guys.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_281_If_you_spy_on_journalists_youre_the_bad_guys.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_281_If_you_spy_on_journalists_youre_the_bad_guys.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/news/2021/jul/18/huge-data-leak-shatters-lie-innocent-need-not-fear-surveillance&#34;&gt;NSO Group spying&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/billmarczak/status/1416801514685796352&#34;&gt;Technical details Twitter thread&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=hn1VxaMEjRU&#34;&gt;Are we the Baddies?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 280 - The perils of Single Sign On</title>
      <link>https://opensourcesecurity.io/2021/07/18/episode-280-the-perils-of-single-sign-on/</link>
      <pubDate>Mon, 19 Jul 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2493</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what happens when you lose access to your Single Sign On provider. These providers have become critical to many of us, if we lose access to our SSO account we will lose access to many services.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_280_The_perils_of_Single_Sign_On.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_280_The_perils_of_Single_Sign_On.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_280_The_perils_of_Single_Sign_On.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Postbank&#34;&gt;Postbank&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The future of DWF</title>
      <link>https://opensourcesecurity.io/2021/07/15/the-future-of-dwf/</link>
      <pubDate>Thu, 15 Jul 2021 18:08:36 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2487</guid> 
      <description>&lt;p&gt;TL;DR - The future of community identifier is going to be the Cloud Security Alliance. See this &lt;a href=&#34;https://cloudsecurityalliance.org/blog/2021/07/15/got-vulnerability-cloud-security-alliance-wants-to-identify-it/&#34;&gt;blog&lt;/a&gt; post for more details.&lt;/p&gt;
&lt;p&gt;A few months ago the Distributed Weakness Filing project (DWF), announced it was coming back to work with some new ideas around how we work with vulnerability identifiers. The initial &lt;a href=&#34;https://opensourcesecurity.io/2021/03/30/its-time-to-fix-cve/&#34;&gt;blog post&lt;/a&gt; defines some of the reasons, we won’t rehash them here.&lt;/p&gt;
&lt;p&gt;It should surprise nobody that the DWF project did not grow to an enormous size in a few short months. Vulnerability identification is a complex and hard problem. We were looking to try out some new ideas and see which were effective and which were not effective. It was to start to build the structure to deal with a future community. Most importantly it was to help figure out what we don’t know we don’t know.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 279 - The audacity of Audacity: When open source goes rogue</title>
      <link>https://opensourcesecurity.io/2021/07/11/episode-279-the-audacity-of-audacity-when-open-source-goes-rogue/</link>
      <pubDate>Mon, 12 Jul 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2483</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the events happening to the Audacity audio editor. What happens if a popular open source application is acquired by an unknown entity? Can this happen to other open source projects? What can we do about it?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_279_The_audacity_of_Audacity_When_open_source_goes_rogue.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_279_The_audacity_of_Audacity_When_open_source_goes_rogue.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_279_The_audacity_of_Audacity_When_open_source_goes_rogue.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=HhH-UsSz69M&#34;&gt;SGDQ Paper Mario&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=O9dTmzRAL_4&amp;amp;t=1s&#34;&gt;Paper Mario Arbitrary Code Execution explained&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/news/major-open-source-projects-abandon-freenode-following-hostile-takeover&#34;&gt;Freenode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.radioworld.com/news-and-business/business-and-law/audacity-acquired-by-muse-group&#34;&gt;Audacity acquired by Muse Group&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/tenacityteam/tenacity&#34;&gt;Audacity fork&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 278 - Could SELinux have stopped SolarWinds?</title>
      <link>https://opensourcesecurity.io/2021/07/04/episode-278-could-selinux-have-stopped-solarwinds/</link>
      <pubDate>Mon, 05 Jul 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2479</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a listener provided question. Could SELinux have stopped the SolarWinds attack? Given what we know, the answer is technically yes, but practically no. SELinux is awesome, but it&amp;rsquo;s very difficult to sandbox something like a build system.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_278_Could_SELinux_have_stopped_SolarWinds.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_278_Could_SELinux_have_stopped_SolarWinds.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_278_Could_SELinux_have_stopped_SolarWinds.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=YZ058hmLuv0&#34;&gt;Gone in 60 milliseconds&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 277 - Privacy and activism with Chris Weiland</title>
      <link>https://opensourcesecurity.io/2021/06/27/episode-277-privacy-and-activism-with-chris-weiland/</link>
      <pubDate>Mon, 28 Jun 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2474</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Chris Weiland from Restore the Fourth Minnesota. Restore The Fourth Minnesota is nonprofit dedicated to restoring the Fourth Amendment to the U.S. Constitution and ending unconstitutional mass government surveillance. Chris drops a ton of knowledge about how to be an effective tech activist, what his group is doing, and most importantly we get actionable advice!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_277_Privacy_and_activism_with_Chris_Weiland.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_277_Privacy_and_activism_with_Chris_Weiland.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_277_Privacy_and_activism_with_Chris_Weiland.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://rt4.mn/about/#&#34;&gt;Restore the Fourth Minnesota&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/rt4mn&#34;&gt;Restore the Fourth Minnesota on Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Writ_of_assistance&#34;&gt;Writ of assistance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf&#34;&gt;Carpenter vs United States&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blogs.loc.gov/law/2013/03/frequent-reference-question-how-many-federal-laws-are-there/&#34;&gt;How many US federal laws are there?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://restorethe4th.com/&#34;&gt;Restore the Fourth&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2018/09/17/episode-114-review-of-click-here-to-kill-everybody/&#34;&gt;Episode 114 – Review of &amp;ldquo;Click Here to Kill Everybody&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/fight&#34;&gt;EFF EFA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.aclu.org/about/affiliates&#34;&gt;ACLU affiliates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ted.com/talks/glenn_greenwald_why_privacy_matters?language=en&#34;&gt;Glenn Greenwald TED talk&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 276 - Security, behavior, and the environment</title>
      <link>https://opensourcesecurity.io/2021/06/20/episode-276-security-behavior-and-the-environment/</link>
      <pubDate>Mon, 21 Jun 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2469</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how our environment affects our behavior, and in turn our level of security. We often ignore what&amp;rsquo;s happening around us when everything is related.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_276_Security_behavior_and_the_environment.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_276_Security_behavior_and_the_environment.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_276_Security_behavior_and_the_environment.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/law/2011/apr/11/judges-lenient-break&#34;&gt;Judges more lenient after a break&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/library/blog/role-playing-an-incident-except-its-fun&#34;&gt;Dungeons and Data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.marketwatch.com/story/poverty-can-change-our-dna-study-finds-2019-04-11&#34;&gt;Poverty changes your DNA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 275 - What in the @#$% is going on with ransomware?</title>
      <link>https://opensourcesecurity.io/2021/06/13/episode-275-what-in-the-is-going-on-with-ransomware/</link>
      <pubDate>Mon, 14 Jun 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2464</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about why it seems like the world of ransomware has gotten out of control in the last few weeks. Every day there&amp;rsquo;s some new and more bizarre ransomware story than we had yesterday.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_275_What_in_the_is_going_on_with_ransomware.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_275_What_in_the_is_going_on_with_ransomware.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_275_What_in_the_is_going_on_with_ransomware.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://tylervigen.com/spurious-correlations&#34;&gt;Spurious Correlations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnn.com/2021/06/07/politics/colonial-pipeline-ransomware-recovered/index.html&#34;&gt;Ransom recovered&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://beta.darkreading.com/attacks-breaches/ransomware-is-not-the-problem&#34;&gt;Adam Shostack Ransomware is not the problem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.citynews1130.com/2021/06/04/latvian-woman-charged-in-us-with-role-in-cybercrime-group/&#34;&gt;Latvian Woman charged for writing ransomware&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 274 - Mr. Amazon&#39;s Neighborhood</title>
      <link>https://opensourcesecurity.io/2021/06/06/episode-274-mr-amazons-neighborhood/</link>
      <pubDate>Mon, 07 Jun 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2459</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Amazon sidewalk. There is a lot of attention, but how is this any different than the surveillance networks Apple and Google have built?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_274_Mr_Amazons_Neighborhood.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_274_Mr_Amazons_Neighborhood.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_274_Mr_Amazons_Neighborhood.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Amazon-Sidewalk/b?ie=UTF8&amp;amp;node=21328123011&#34;&gt;Amazon Sidewalk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/robertgreeve/status/1397032784703655938&#34;&gt;Ads and toothpaste&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/technology/2021/05/05/apple-airtags-stalking/?fbclid=IwAR3weAzyL9Kw5W9uh6Ss1Q2RcjX75bPKIUWsPDSF8Ws_2YR1MXSneht2WV4&#34;&gt;Airtags and stalking&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 273 - Can we stop the coming artificial unintelligence deluge?</title>
      <link>https://opensourcesecurity.io/2021/05/30/episode-273-can-we-stop-the-coming-artificial-unintelligence-deluge/</link>
      <pubDate>Mon, 31 May 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2453</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about AI driven comments. We live in a world of massive confusion and disruption where what is true and false, real and fake, are often widely debated. As AI grows and evolves what does it mean for this future? We don&amp;rsquo;t really have any answers, but we ask a lot of questions. This isn&amp;rsquo;t easy, nor will it be solved quickly, but solving it is not optional.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 272 - The Biden Cybersecurity Executive Order</title>
      <link>https://opensourcesecurity.io/2021/05/23/episode-272-the-biden-cybersecurity-executive-order/</link>
      <pubDate>Mon, 24 May 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2448</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Biden Administration new cybersecurity executive order. There are some good ideas in there, but at the end of the day it&amp;rsquo;s an unfunded mandate. Unfunded mandates are difficult to implement.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_272_The_Biden_Cybersecurity_Executive_Order.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_272_The_Biden_Cybersecurity_Executive_Order.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_272_The_Biden_Cybersecurity_Executive_Order.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&#34;&gt;Biden Executive Order&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/briefing-room/statements-releases/2021/05/12/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks/&#34;&gt;Fact Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/eo-13636&#34;&gt;Obama&amp;rsquo;s cyber EO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 271 - Pipeline security: There is no problem humans can&#39;t make worse</title>
      <link>https://opensourcesecurity.io/2021/05/16/episode-271-pipeline-security-there-is-no-problem-humans-cant-make-worse/</link>
      <pubDate>Mon, 17 May 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2443</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how people handle problems. We open with the story of the Colonial Pipeline hack, but then go into some of the ways people tend to make problems worse.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_271_Pipeline_security_There_is_no_problem_humans_cant_make_worse.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_271_Pipeline_security_There_is_no_problem_humans_cant_make_worse.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_271_Pipeline_security_There_is_no_problem_humans_cant_make_worse.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/canada/windsor/male-trees-winning-battle-of-the-sexes-in-canada-1.1254869&#34;&gt;Male vs Female trees&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.npr.org/2021/05/11/995751028/what-the-ransomware-attack-on-colonial-pipeline-means-for-the-industry&#34;&gt;Pipeline hack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1649/&#34;&gt;XKCD Pipelines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/robknake/status/1392102295035424773&#34;&gt;TSA Pipeline Security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 270 - Hello dark patterns my old friend</title>
      <link>https://opensourcesecurity.io/2021/05/09/episode-270-hello-dark-patterns-my-old-friend/</link>
      <pubDate>Mon, 10 May 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2438</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about dark patterns. A dark pattern is when a service tries to confuse a user into doing something they don&amp;rsquo;t want to, like unknowingly purchasing a monthly subscription to something you don&amp;rsquo;t need or want. The US Federal Trade Commission is starting to discuss dark patterns in webs sites and apps.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_270_Hello_dark_patterns_my_old_friend.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_270_Hello_dark_patterns_my_old_friend.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_270_Hello_dark_patterns_my_old_friend.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.darkpatterns.org&#34;&gt;Dark Patterns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.darkpatterns.org/types-of-dark-pattern&#34;&gt;Types of Dark Patterns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ftc.gov/news-events/events-calendar/bringing-dark-patterns-light-ftc-workshop&#34;&gt;FTC Bringing Dark Patterns to Light&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://linustechtips.com/topic/1331597-dell-with-a-subscription-of-10-a-month-option-hidden-on-prebuilt-system-page/&#34;&gt;LTT Dell Warranty&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 269 - Do not experiment on the Linux Kernel</title>
      <link>https://opensourcesecurity.io/2021/05/02/episode-269-do-not-experiment-on-the-linux-kernel/</link>
      <pubDate>Mon, 03 May 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2432</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the University of Minnesota experimenting on the Linux Kernel. There&amp;rsquo;s a lot to unpack in this one, but the TL;DR is you probably don&amp;rsquo;t want to experiment on the kernel.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_269_Do_not_experiment_on_the_Linux_Kernel.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_269_Do_not_experiment_on_the_Linux_Kernel.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_269_Do_not_experiment_on_the_Linux_Kernel.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://linux.slashdot.org/story/21/04/21/1521248/linux-bans-university-of-minnesota-for-sending-buggy-patches-in-the-name-of-research&#34;&gt;Linux Bans University of Minnesota for Sending Buggy Patches in the Name of Research&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/university-of-minnesota-security-researchers-apologize-for-deliberately-buggy-linux-patches/&#34;&gt;University of Minnesota security researchers apologize for deliberately buggy Linux patches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ioccc.org/&#34;&gt;The International Obfuscated C Code Contest&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 268 - Can we trust any 3rd parties?</title>
      <link>https://opensourcesecurity.io/2021/04/25/episode-268-can-we-trust-any-3rd-parties/</link>
      <pubDate>Mon, 26 Apr 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2426</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what 3rd party means in the current world. From 5G suppliers, to the Codecov and Solarwinds breaches. Is there anyone we can trust?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_268_Can_we_trust_any_3rd_parties.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_268_Can_we_trust_any_3rd_parties.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_268_Can_we_trust_any_3rd_parties.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=26843068&#34;&gt;Europe and 5G&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mobile.twitter.com/_fel1x/status/1383050036397871108&#34;&gt;Codecov&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/technology/codecov-hackers-breached-hundreds-restricted-customer-sites-sources-2021-04-19/&#34;&gt;Codecov Reuters story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyberciti.biz/tips/red-hat-fedora-linux-servers-compromised.html&#34;&gt;Red Hat OpenSSH advisory&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 267 - Does 0day still mean 0day?</title>
      <link>https://opensourcesecurity.io/2021/04/18/episode-267-does-0day-still-mean-0day/</link>
      <pubDate>Mon, 19 Apr 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2421</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about 0day security vulnerabilities. What are they? What were they? And why the name has taken on a new meaning, and that&amp;rsquo;s OK.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_267_Does_0day_still_mean_0day.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_267_Does_0day_still_mean_0day.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_267_Does_0day_still_mean_0day.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hackerhistory.com/&#34;&gt;Hacker History Podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/r4j0x00/exploits/blob/master/chrome-0day/exploit.js&#34;&gt;Chrome 0day&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://ntfs.com/ntfs-mft.htm&#34;&gt;NTFS Documentation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 266 - The future of security scanning with Debricked</title>
      <link>https://opensourcesecurity.io/2021/04/11/episode-266-the-future-of-security-scanning-with-debricked/</link>
      <pubDate>Mon, 12 Apr 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2414</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Emil Wåreus from Debricked about the future of security scanners. Debricked is doing some incredibly cool things to avoid relying on humans for vulnerability identification and cataloging. Learn what the future of security scanning is going to look like.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_266_The_future_of_security_scanning_with_Debricked.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_266_The_future_of_security_scanning_with_Debricked.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_266_The_future_of_security_scanning_with_Debricked.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://debricked.com/&#34;&gt;Debricked&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/emilwareus/&#34;&gt;Emil&amp;rsquo;s Linkedin&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 265 - The lies closed source can tell, open source can&#39;t</title>
      <link>https://opensourcesecurity.io/2021/04/04/episode-265-the-lies-closed-source-can-tell-open-source-cant/</link>
      <pubDate>Mon, 05 Apr 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2407</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the PHP backdoor and the Ubiquity whistleblower. The key takeaway is to note how an open source project cannot cover up an incident, but closed source can and will cover up damaging information.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_265_The_lies_closed_source_can_tell_open_source_cant.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_265_The_lies_closed_source_can_tell_open_source_cant.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_265_The_lies_closed_source_can_tell_open_source_cant.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/php-infiltrated-backdoor-malware/165061/&#34;&gt;PHP backdoor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/&#34;&gt;Ubiquity coverup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://gizmodo.com/you-can-now-3d-print-your-own-tsa-master-keys-1730134042&#34;&gt;3D printed TSA keys&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ&#34;&gt;LockPickingLaywer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2021/03/determining-key-shape-from-sound.html&#34;&gt;Determining Key Shape from Sound&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=DGdsIrAjp3k&#34;&gt;Lock camera&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>It&#39;s time to fix CVE</title>
      <link>https://opensourcesecurity.io/2021/03/30/its-time-to-fix-cve/</link>
      <pubDate>Tue, 30 Mar 2021 14:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2346</guid> 
      <description>&lt;p&gt;The late, great, John Lewis is well known for a quote about getting into trouble.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Never, ever be afraid to make some noise and get in good trouble, necessary trouble.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s time to start some good trouble.&lt;/p&gt;
&lt;p&gt;Anyone who knows me, reads this blog, or follows me on &lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Twitter&lt;/a&gt;, is well aware I have been a proponent of CVE Identifiers for a very long time. I once assigned CVE IDs to most open source security vulnerabilities. I&amp;rsquo;ve helped more than one company and project adopt CVE IDs for their advisories. I encourage anyone who will listen to adopt CVE IDs. I&amp;rsquo;ve even talked about it on the &lt;a href=&#34;https://opensourcesecurity.io/?s=cve&#34;&gt;podcast&lt;/a&gt; many times.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 264 - DevSecOps with GitLab&#39;s Mark Loveless</title>
      <link>https://opensourcesecurity.io/2021/03/28/episode-264-devsecops-with-gitlabs-mark-loveless/</link>
      <pubDate>Mon, 29 Mar 2021 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2341</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Mark Loveless from GitLab. We touch on DevSecOps, what GitLab is doing, threat modeling, and the time Mark tested positive for TNT at the airport. It&amp;rsquo;s a great conversation.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_264_DevSecOps_with_GitLabs_Mark_Loveless.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_264_DevSecOps_with_GitLabs_Mark_Loveless.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_264_DevSecOps_with_GitLabs_Mark_Loveless.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/simplenomad&#34;&gt;Mark Loveless Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.gitlab.com/&#34;&gt;GitLab&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.gitlab.com/handbook/&#34;&gt;GitLab Handbook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.gitlab.com/blog/2020/04/10/open-source-security/&#34;&gt;How we approach open source security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Threat_model#P.A.S.T.A.&#34;&gt;PASTA threat modeling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.gitlab.com/solutions/dev-sec-ops/&#34;&gt;GitLab security features&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.markloveless.net/blog/2019/2/22/p24ekffvg7zyv4usvt1xshev5h1o8z&#34;&gt;Tales from the Past - &amp;ldquo;You Tested Positive for TNT&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 263 - GitHub pulls exploits, LinuxFoundation sign all the things</title>
      <link>https://opensourcesecurity.io/2021/03/21/episode-263-github-pulls-exploits-linuxfoundation-sign-all-the-things/</link>
      <pubDate>Mon, 22 Mar 2021 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2336</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how terrible daylight savings is. GitHub yanking some exploit code. And the Linux Foundation new project to sign all the things.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_263_GitHub_pulls_exploits_LinuxFoundation_sign_all_the_things.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_263_GitHub_pulls_exploits_LinuxFoundation_sign_all_the_things.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_263_GitHub_pulls_exploits_LinuxFoundation_sign_all_the_things.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.vice.com/en/article/n7vpaz/researcher-publishes-code-to-exploit-microsoft-exchange-vulnerabilities-on-github&#34;&gt;Researcher Publishes Code to Exploit Microsoft Exchange Vulnerabilities on Github&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://docs.github.com/en/github/site-policy/github-acceptable-use-policies#2-content-restrictions&#34;&gt;GitHub content restrictions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.praetorian.com/blog/reproducing-proxylogon-exploit/&#34;&gt;Reproducing the Microsoft Exchange Proxylogon Exploit Chain&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 262 - A discussion with Loris and Pop from Sysdig</title>
      <link>https://opensourcesecurity.io/2021/03/14/episode-262-a-discussion-with-loris-and-pop-from-sysdig/</link>
      <pubDate>Mon, 15 Mar 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2330</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Loris Degioanni and Dan from Sysdig. Sysdig are the minds behind Falco, an amazing open source runtime security engine. We talk about where their technology came from, they huge code donation to the CNCF and what securing a modern infrastructure looks like today.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_262_A_discussion_with_Loris_and_Pop_from_Sysdig.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_262_A_discussion_with_Loris_and_Pop_from_Sysdig.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_262_A_discussion_with_Loris_and_Pop_from_Sysdig.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://sysdig.com/&#34;&gt;Sysdig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://falco.org/&#34;&gt;Falco&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/lorisdegio&#34;&gt;Loris&amp;rsquo; Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/danpopnyc&#34;&gt;Dan &amp;ldquo;Pop&amp;rdquo; Popandrea&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sysdig.com/blog/sysdig-contributes-falco-kernel-ebpf-cncf/&#34;&gt;Sysdig contributes Falco’s kernel module, eBPF probe, and libraries to the CNCF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/falcosecurity/pdig&#34;&gt;pdig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://sysdig.com/blog/sysdig-2021-container-security-usage-report/&#34;&gt;Sysdig 2021 container security and usage report: Shifting left is not enough&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 261 - DWF is back! Welcome to community powered CVE</title>
      <link>https://opensourcesecurity.io/2021/03/07/episode-261-dwf-is-back-welcome-to-community-powered-cve/</link>
      <pubDate>Mon, 08 Mar 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2325</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about DWF. It&amp;rsquo;s back and the intention is to have real community driven security identifiers!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_261_DWF_is_back_Welcome_to_community_powered_CVE.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_261_DWF_is_back_Welcome_to_community_powered_CVE.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_261_DWF_is_back_Welcome_to_community_powered_CVE.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2020/12/14/committee-or-community-slowing-down-the-future/&#34;&gt;Committee vs Community&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/distributedweaknessfiling/dwflist&#34;&gt;dwflist repo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/distributedweaknessfiling/dwf-request&#34;&gt;dwf-request tooling repo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/distributedweaknessfiling/dwf-workflow&#34;&gt;dwf-workflow policy repo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/joshbressers/status/1367636841227288577&#34;&gt;CVE plateua graph&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://iwantacve.org/&#34;&gt;iwantacve.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 260 - Dave Jevans tells us what CipherTrace is up to</title>
      <link>https://opensourcesecurity.io/2021/02/28/episode-260-dave-jevans-tells-us-what-ciphertrace-is-up-to/</link>
      <pubDate>Mon, 01 Mar 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/?p=2317</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk with Dave Jevans CEO of CipherTrace and chairman of the anti-phishing working group about the challenges of keeping track of cryptocurrency in the modern age.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_260_Dave_Jevans_tells_us_what_CipherTrace_is_up_to.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_260_Dave_Jevans_tells_us_what_CipherTrace_is_up_to.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_260_Dave_Jevans_tells_us_what_CipherTrace_is_up_to.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/davejevans&#34;&gt;Dave&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ciphertrace.com/&#34;&gt;CipherTrace&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://apwg.org/&#34;&gt;Anti Phishing Working Group&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 259 - What even is open source anymore?</title>
      <link>https://opensourcesecurity.io/2021/02/21/episode-259-what-even-is-open-source-anymore/</link>
      <pubDate>Mon, 22 Feb 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2313</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the question &amp;ldquo;what is open source?&amp;rdquo; Why do we think it&amp;rsquo;s broken today, and what sort of ideas about what should come next.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_259_What_even_is_open_source_anymore.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_259_What_even_is_open_source_anymore.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_259_What_even_is_open_source_anymore.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensource.org/&#34;&gt;OSI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://perens.com/2020/10/06/post-open-source-license-early-draft/&#34;&gt;Bruce Perens Post Open Source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2021/02/01/its-the-community-stupid/&#34;&gt;Josh&amp;rsquo;s community blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/doctorow/status/1361685471454093316&#34;&gt;Corey Doctorow Uber Twitter thread&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The Titanic of security</title>
      <link>https://opensourcesecurity.io/2021/02/15/the-titanic-of-security/</link>
      <pubDate>Mon, 15 Feb 2021 15:13:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2283</guid> 
      <description>&lt;p&gt;I listen to a lot of podcasts. A lot of podcasts. I was listening to the &lt;a href=&#34;https://dgshow.org/&#34;&gt;Dave and Gunnar Show&lt;/a&gt; podcast &lt;a href=&#34;https://dgshow.org/212&#34;&gt;episode 212&lt;/a&gt; with guest &lt;a href=&#34;https://twitter.com/drdavidawheeler&#34;&gt;David A. Wheeler&lt;/a&gt;. The Titanic was used as an example of changing process after a security incident. This opened up a flood of thoughts to me, but not for the reasons intended in the conversation. The point of the suggestion was the Titanic sinking created changes to international requirements to help avoid a similar disaster next time, and we should be viewing SolarWinds in a similar way. The idea being we should use the SolarWinds event to drive meaningful change to make security better. Why no change will come of this is a different conversation: TL;DR it&amp;rsquo;s because nobody important died from SolarWinds, the Titanic killed a lot of important people. But I think this is an interesting way to talk about how we tend to deal with problems in software and how we deal with them in real life.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 258 - Stop using C</title>
      <link>https://opensourcesecurity.io/2021/02/14/episode-258-stop-using-c/</link>
      <pubDate>Mon, 15 Feb 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2299</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Google Project Zero report titled &amp;ldquo;A Year in Review of 0-days Exploited In-The-Wild in 2020&amp;rdquo;. It&amp;rsquo;s a cool report but we don&amp;rsquo;t agree on the conclusion. The answer isn&amp;rsquo;t to security harder, it&amp;rsquo;s to stop using C.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_258_Stop_using_C.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_258_Stop_using_C.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_258_Stop_using_C.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://googleprojectzero.blogspot.com/2021/02/deja-vu-lnerability.html&#34;&gt;Google Project Zero Year of 0-days&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1358821567032033290&#34;&gt;Kurt&amp;rsquo;s CUPS tweet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 257 - The sudo and libgcrypt vulnerabilities</title>
      <link>https://opensourcesecurity.io/2021/02/07/episode-257-the-sudo-and-libgcrypt-vulnerabilities/</link>
      <pubDate>Mon, 08 Feb 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2278</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent sudo and libgcrypt security vulnerabilities. What&amp;rsquo;s the deal with these buffer overflows and TOCTU bugs?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_257_The_sudo_and_libgcrypt_vulnerabilities.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_257_The_sudo_and_libgcrypt_vulnerabilities.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_257_The_sudo_and_libgcrypt_vulnerabilities.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt&#34;&gt;Sudo buffer overflow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sudo.ws/alerts/sudoedit_selinux.html&#34;&gt;Sudo SELinux bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2145&#34;&gt;libgcrypt buffer overflow&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>It&#39;s the community, stupid</title>
      <link>https://opensourcesecurity.io/2021/02/01/its-the-community-stupid/</link>
      <pubDate>Tue, 02 Feb 2021 01:23:36 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2265</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve been thinking about what open source is a lot lately. I mean A LOT, probably more than is healthy. There have been a ton of open source happenings in the world and the discussions around open source licenses have been numerous. There are even a lot of discussions around the very idea of open source itself. What we once thought was simple and clear is not simple or clear it would seem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 256 - 9 bits of podcast, 8 bits of computing</title>
      <link>https://opensourcesecurity.io/2021/01/31/episode-256-9-bits-of-podcast-8-bits-of-computing/</link>
      <pubDate>Mon, 01 Feb 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2261</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about 8 bit computing. What sort of security lessons can we learn from the 8 bit world? More than you think.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_256_9_bits_of_podcast_8_bits_of_computing.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_256_9_bits_of_podcast_8_bits_of_computing.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_256_9_bits_of_podcast_8_bits_of_computing.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=qTjA9cDry2Y&#34;&gt;Legend of Zelda Random Number Generation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techradar.com/news/spacex-starship-sn8-explosion-video&#34;&gt;Green rocket flame&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nodum.org/was-sr-71-blackbird-leaking-fuel/&#34;&gt;SR71 leaked fuel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.gondwana-collection.com/blog/how-do-namibian-himbas-see-colour/&#34;&gt;How do Namibian Himbas see colour?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Septuple_meter&#34;&gt;Suptuple meter music&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>You cannot manage your supply chain</title>
      <link>https://opensourcesecurity.io/2021/01/29/you-cannot-manage-your-supply-chain/</link>
      <pubDate>Sat, 30 Jan 2021 02:19:17 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2245</guid> 
      <description>&lt;p&gt;What a year it&amp;rsquo;s been! I feel like 2021 went by like a &amp;hellip; it&amp;rsquo;s still January???&lt;/p&gt;
&lt;p&gt;So it&amp;rsquo;s pretty much impossible to ignore any of the events of the last month. I want to talk about something that&amp;rsquo;s near and dear to my heart, and in the news, not for a good reason. Software supply chains. This is probably a dreadful topic to most, but I love software supply chains. I was talking about them before anyone was even thinking about them. I&amp;rsquo;m not going to pull a &amp;ldquo;get off my lawn&amp;rdquo; here, I think it&amp;rsquo;s cool everyone is starting to care. I want to talk about how to be realistic about your supply chain. Almost all advice I&amp;rsquo;ve seen of the last month has been terrible, so I&amp;rsquo;m going to also give some terrible advice.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 255 - What if security wasn&#39;t joyless?</title>
      <link>https://opensourcesecurity.io/2021/01/24/episode-255-what-if-security-wasnt-joyless/</link>
      <pubDate>Mon, 25 Jan 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2240</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what we can stop doing. We take a position of asking &amp;ldquo;does it spark joy&amp;rdquo; for tools and infrastructure. Everyone is doing something they should stop.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_255_What_if_security_wasnt_joyless.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_255_What_if_security_wasnt_joyless.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_255_What_if_security_wasnt_joyless.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://konmari.com/marie-kondo-rules-of-tidying-sparks-joy/&#34;&gt;Does it spark joy?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 254 - Right to Repair Security</title>
      <link>https://opensourcesecurity.io/2021/01/17/episode-254-right-to-repair-security/</link>
      <pubDate>Mon, 18 Jan 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2236</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new right to repair rules in the EU. There&amp;rsquo;s a strange line between loving the idea of right to repair, but also being horrified as security people at the idea of a device being on the Internet for 30 years.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_254_Right_to_Repair_Security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_254_Right_to_Repair_Security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_254_Right_to_Repair_Security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://reasonstobecheerful.world/europe-guarantee-right-to-repair-ifixit/&#34;&gt;EU right to repair&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://repair.eu/&#34;&gt;repair.eu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 253 - Defenders only need to be right once</title>
      <link>https://opensourcesecurity.io/2021/01/10/episode-253-defenders-only-need-to-be-right-once/</link>
      <pubDate>Mon, 11 Jan 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2232</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about this idea that seems to exist in security of &amp;ldquo;attackers only need to be right once&amp;rdquo; which is silly. The reality is attackers have to get everything right, defenders really only need to get it right once. But &amp;ldquo;defenders only need to be right once&amp;rdquo; isn&amp;rsquo;t going to sell any products.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_253_Defenders_only_need_to_be_right_once.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_253_Defenders_only_need_to_be_right_once.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_253_Defenders_only_need_to_be_right_once.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://sellsbrothers.com/12395&#34;&gt;Richard Feynman and manhole covers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sciencealert.com/watch-richard-feynman-on-why-he-can-t-tell-you-how-magnets-work&#34;&gt;Richard Feynman on Why He Can&amp;rsquo;t Tell You How Magnets Work&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.huffpost.com/entry/what-israeli-airport-secu_b_4978149&#34;&gt;Israeli airport security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.cnn.com/2001/TRAVEL/NEWS/12/17/flight.fake.grenade/index.html&#34;&gt;FAA stolen sweater&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1205/&#34;&gt;XKCD Is it worth the time&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=nQHBAdShgYI&#34;&gt;CGP Grey The trouble with transporters&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 252 - Is open source dangerous? Open source won, who cares, shut up!</title>
      <link>https://opensourcesecurity.io/2021/01/03/episode-252-is-open-source-dangerous-open-source-won-who-cares-shut-up/</link>
      <pubDate>Mon, 04 Jan 2021 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2228</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a report on open source security from the Canadian Centre for Cyber Security. The title pretty much sums it up.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_252_Is_open_source_dangerous_Open_source_won_who_cares_shut_up.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_252_Is_open_source_dangerous_Open_source_won_who_cares_shut_up.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_252_Is_open_source_dangerous_Open_source_won_who_cares_shut_up.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cyber.gc.ca/sites/default/files/publications/ITSAP10059-e.pdf&#34;&gt;Security Considerations for Open Source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://eater.net/8bit/&#34;&gt;Build an 8 bit computer from scratch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 251 - Communication is hard, security communication is more hard</title>
      <link>https://opensourcesecurity.io/2020/12/27/episode-251-communication-is-hard-security-communication-is-more-hard/</link>
      <pubDate>Mon, 28 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2222</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about communication. It&amp;rsquo;s really hard to talk about a lot of what we do. How do we know if a device is secure? How do we know our knowledge is correct?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_251_Communication_is_hard_security_communication_is_more_hard.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_251_Communication_is_hard_security_communication_is_more_hard.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_251_Communication_is_hard_security_communication_is_more_hard.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnn.com/2009/HEALTH/08/14/cocaine.traces.money/&#34;&gt;90 percent of U.S. bills carry traces of cocaine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/videos/comments/j1ajj2/qvc_hosts_argue_if_the_moon_is_a_planet_or_star/&#34;&gt;Is the moon a star or planet?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://what-if.xkcd.com/4/&#34;&gt;A mole of moles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/business/security-system-app-homeowner-stranger-1.5733444&#34;&gt;New homeowner &amp;lsquo;freaked out&amp;rsquo; when stranger took control of her security system&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2020/09/how-a-hacker-turned-a-250-coffee-maker-into-ransom-machine/&#34;&gt;Coffee maker ransomware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.msspalert.com/cybersecurity-services-and-products/nist-phish-scale-tool/&#34;&gt;NIST Phish Scale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=hid7EJkwDNk&#34;&gt;The metric system&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Operation_Paperclip&#34;&gt;Operation Paperclip&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 250 - Door 25: Why do we do the things we do? Question everything</title>
      <link>https://opensourcesecurity.io/2020/12/24/episode-250-door-25-why-do-we-do-the-things-we-do-question-everything/</link>
      <pubDate>Fri, 25 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2196</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about why we do the things we do. Sometimes we have to question everything&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_250_Door_25_Why_do_we_do_the_things_we_do_Question_everything.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_250_Door_25_Why_do_we_do_the_things_we_do_Question_everything.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_250_Door_25_Why_do_we_do_the_things_we_do_Question_everything.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Supersonic_Low_Altitude_Missile&#34;&gt;SLAM missile&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 249 - Door 24: Information wants to be free</title>
      <link>https://opensourcesecurity.io/2020/12/23/episode-249-door-24-information-wants-to-be-free/</link>
      <pubDate>Thu, 24 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2192</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the idea of information wanting to be free. It&amp;rsquo;s Christmas, we should give it what it wants!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_249_Door_24_Information_wants_to_be_free.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_249_Door_24_Information_wants_to_be_free.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_249_Door_24_Information_wants_to_be_free.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hacker_Manifesto&#34;&gt;Hacker Manifesto&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 248 - Door 23: How to report 1000 security flaws</title>
      <link>https://opensourcesecurity.io/2020/12/22/episode-248-door-23-how-to-report-1000-security-flaws/</link>
      <pubDate>Wed, 23 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2188</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to file 1000 security flaws. One is easy, scale is hard.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_248_Door_23_How_to_report_1000_security_flaws.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_248_Door_23_How_to_report_1000_security_flaws.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_248_Door_23_How_to_report_1000_security_flaws.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 247 - Door 22: How to report one security flaw</title>
      <link>https://opensourcesecurity.io/2020/12/21/episode-247-door-22-how-to-report-one-security-flaw/</link>
      <pubDate>Tue, 22 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2184</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to report one security flaw&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_247_Door_22_How_to_report_one_security_flaw.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_247_Door_22_How_to_report_one_security_flaw.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_247_Door_22_How_to_report_one_security_flaw.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 246 - Door 21: Bug bounties</title>
      <link>https://opensourcesecurity.io/2020/12/20/episode-246-door-21-bug-bounties/</link>
      <pubDate>Mon, 21 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2179</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about bug bounties&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_246_Door_21_Bug_bounties.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_246_Door_21_Bug_bounties.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_246_Door_21_Bug_bounties.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 245 - Door 20: Is SMS 2FA better than no 2FA?</title>
      <link>https://opensourcesecurity.io/2020/12/19/episode-245-door-20-is-sms-2fa-better-than-no-2fa/</link>
      <pubDate>Sun, 20 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2174</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about if SMS 2 factor auth is better than no 2FA&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_245_Door_20_Is_SMS_2FA_better_than_no_2FA.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_245_Door_20_Is_SMS_2FA_better_than_no_2FA.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_245_Door_20_Is_SMS_2FA_better_than_no_2FA.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/we-deepfaked-our-podcast-host/id1441708044?i=1000493214149&#34;&gt;Cyber deepfaked their host&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 244 - Door 19: TLS certificate trust</title>
      <link>https://opensourcesecurity.io/2020/12/18/episode-244-door-19-tls-certificate-trust/</link>
      <pubDate>Sat, 19 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2169</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about modern TLS certificate trust&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_244_Door_19_TLS_certificate_trust.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_244_Door_19_TLS_certificate_trust.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_244_Door_19_TLS_certificate_trust.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 243 - Door 18: Don&#39;t roll your own crypto or auth</title>
      <link>https://opensourcesecurity.io/2020/12/17/episode-243-door-18-dont-roll-your-own-crypto-or-auth/</link>
      <pubDate>Fri, 18 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2164</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about why it&amp;rsquo;s a horrible idea to roll your own crypto or auth&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_243_Door_18_Dont_roll_your_own_crypto_or_auth.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_243_Door_18_Dont_roll_your_own_crypto_or_auth.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_243_Door_18_Dont_roll_your_own_crypto_or_auth.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 242 - Door 17: Vulnerability response</title>
      <link>https://opensourcesecurity.io/2020/12/16/episode-242-door-17-vulnerability-response/</link>
      <pubDate>Thu, 17 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2160</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about vulnerability response. What is it, what does it mean, how does it work&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_242_Door_17_Vulnerability_response.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_242_Door_17_Vulnerability_response.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_242_Door_17_Vulnerability_response.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 241 - Door 16: 16 bits of change</title>
      <link>https://opensourcesecurity.io/2020/12/15/episode-241-door-16-16-bits-of-change/</link>
      <pubDate>Wed, 16 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2156</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the switch from 16 to 32 to 64 bit and even the changes from Intel to ARM&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_241_Door_16_16_bits_of_change.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_241_Door_16_16_bits_of_change.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_241_Door_16_16_bits_of_change.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 240 - Door 15: Supplier compliance</title>
      <link>https://opensourcesecurity.io/2020/12/14/episode-240-door-15-supplier-compliance/</link>
      <pubDate>Tue, 15 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2152</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about supplier compliance&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_240_Door_15_Supplier_compliance.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_240_Door_15_Supplier_compliance.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_240_Door_15_Supplier_compliance.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.isms.online/iso-27001/annex-a-15-supplier-relationships/&#34;&gt;Annex A.15.1 of ISO 27001:2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/09/23/episode-162-sbom-with-allan-friedman/&#34;&gt;Episode 162 – SBOM with Allan Friedman&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Committee or Community: Slowing down the future</title>
      <link>https://opensourcesecurity.io/2020/12/14/committee-or-community-slowing-down-the-future/</link>
      <pubDate>Mon, 14 Dec 2020 15:02:41 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2074</guid> 
      <description>&lt;p&gt;I wrote a blog &lt;a href=&#34;https://opensourcesecurity.io/2020/11/19/we-cant-move-forward-by-looking-back/&#34;&gt;post&lt;/a&gt; about looking back, and I have a bit of snark in there where I talk about slowing down the future. I wanted to explain this a bit more and give everyone some food for thought around how we used to do things and how we should do them moving forward. There are groups and people that exist to slow things down. Sometimes that&amp;rsquo;s on purpose for good reasons, sometimes it&amp;rsquo;s on purpose for bad reasons, sometimes it&amp;rsquo;s not on purpose at all.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 239 - Door 14: Backdoors</title>
      <link>https://opensourcesecurity.io/2020/12/13/episode-239-door-14-backdoors/</link>
      <pubDate>Mon, 14 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2148</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about backdoors in open source software&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_239_Door_14_Backdoors.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_239_Door_14_Backdoors.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_239_Door_14_Backdoors.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 238 - Door 13: Unlucky or survivor bias?</title>
      <link>https://opensourcesecurity.io/2020/12/12/episode-238-door-13-unlucky-or-survivor-bias/</link>
      <pubDate>Sun, 13 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2144</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the unluckiest man in the world and survivor bias&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_238_Door_13_Unlucky_or_survivor_bias.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_238_Door_13_Unlucky_or_survivor_bias.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_238_Door_13_Unlucky_or_survivor_bias.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://chatnewstoday.ca/2018/08/22/luckiest-or-unluckiest-man-in-the-world/&#34;&gt;Unluckiest man in the world&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 237 - Door 12: Video game hacking</title>
      <link>https://opensourcesecurity.io/2020/12/11/episode-237-door-12-video-game-hacking/</link>
      <pubDate>Sat, 12 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2141</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about video game hacking. The speedrunners are doing the best security research today&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_237_Door_12_Video_game_hacking.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_237_Door_12_Video_game_hacking.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_237_Door_12_Video_game_hacking.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=vAHXK2wut_I&#34;&gt;Super Mario World RCE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 236 - Door 11: Should you get on a 737?</title>
      <link>https://opensourcesecurity.io/2020/12/10/episode-236-door-11-should-you-get-on-a-737/</link>
      <pubDate>Fri, 11 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2134</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the safety of a 737&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_236_Door_11_Should_you_get_on_a_737.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_236_Door_11_Should_you_get_on_a_737.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_236_Door_11_Should_you_get_on_a_737.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://yro.slashdot.org/story/20/11/18/1556243/faa-chief-100-confident-of-737-max-safety-as-flights-to-resume&#34;&gt;FAA says 737 is safe&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 235 - Door 10: Deciding what information matters</title>
      <link>https://opensourcesecurity.io/2020/12/09/episode-235-door-10-deciding-what-information-matters/</link>
      <pubDate>Thu, 10 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2130</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Apple leaking internal IP addresses. Sometimes we create our own emergencies over things that don&amp;rsquo;t matter.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_235_Door_10_Deciding_what_information_matters.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_235_Door_10_Deciding_what_information_matters.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_235_Door_10_Deciding_what_information_matters.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://apple.slashdot.org/story/20/11/07/0519220/apples-internal-ips-leaked-by-its-search-bot&#34;&gt;Apple&amp;rsquo;s internal IP addresses&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 234 - Door 09: public key cryptography</title>
      <link>https://opensourcesecurity.io/2020/12/08/episode-234-door-09-public-key-cryptography/</link>
      <pubDate>Wed, 09 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2126</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about public key cryptography&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_234_Door_09_public_key_cryptography.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_234_Door_09_public_key_cryptography.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_234_Door_09_public_key_cryptography.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 233 - Door 08: man 8 security</title>
      <link>https://opensourcesecurity.io/2020/12/07/episode-233-door-08-man-8-security/</link>
      <pubDate>Tue, 08 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2121</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the OpenBSD security(8) man page and the importance of automating security&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_233_Door_08_man_8_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_233_Door_08_man_8_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_233_Door_08_man_8_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://man.openbsd.org/security&#34;&gt;OpenBSD security(8) page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 232 - Door 07: 7 is the best prime, 2 is the dumbest</title>
      <link>https://opensourcesecurity.io/2020/12/06/episode-232-door-07-7-is-the-best-prime-2-is-the-dumbest/</link>
      <pubDate>Mon, 07 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2116</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about prime numbers&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_232_Door_07_7_is_the_best_prime_2_is_the_dumbest.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_232_Door_07_7_is_the_best_prime_2_is_the_dumbest.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_232_Door_07_7_is_the_best_prime_2_is_the_dumbest.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 231 - Door 06: 6 wifi risks ... that don&#39;t actually matter</title>
      <link>https://opensourcesecurity.io/2020/12/05/episode-231-door-06-6-wifi-risks-that-dont-actually-matter/</link>
      <pubDate>Sun, 06 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2112</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the non problems with public wifi we love to pretend matter&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_231_Door_06_6_wifi_risks_that_dont_actually_matter.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_231_Door_06_6_wifi_risks_that_dont_actually_matter.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_231_Door_06_6_wifi_risks_that_dont_actually_matter.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://byos.io/blog/half-dozen-risks-of-using-dirty-public-wi-fi-networks&#34;&gt;The Half Dozen Risks of Using Dirty Public Wi-Fi Networks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 230 - Door 05: 5 reasons you need 24/7 robot monitoring</title>
      <link>https://opensourcesecurity.io/2020/12/04/episode-230-door-05-5-reasons-you-need-24-7-robot-monitoring/</link>
      <pubDate>Sat, 05 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2108</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about why you need 24/7 monitoring of all the things&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_230_Door_05_5_reasons_you_need_247_robot_monitoring.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_230_Door_05_5_reasons_you_need_247_robot_monitoring.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_230_Door_05_5_reasons_you_need_247_robot_monitoring.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/world/shortcuts/2014/feb/19/swiss-air-force-ethiopian-airlines-hijacking-office-hours&#34;&gt;Swiss air force office hours&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/McDonnell_Douglas_DC-10#Cargo_door_problem_and_other_major_accidents&#34;&gt;DC-10 cargo door&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 229 - Door 04: EFF&#39;s Cover Your Tracks</title>
      <link>https://opensourcesecurity.io/2020/12/03/episode-229-door-04-effs-cover-your-tracks/</link>
      <pubDate>Fri, 04 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2103</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how the EFF is helping us prevent Internet tracking&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_229_Door_04_EFFs_Cover_Your_Tracks.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_229_Door_04_EFFs_Cover_Your_Tracks.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_229_Door_04_EFFs_Cover_Your_Tracks.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2020/11/introducing-cover-your-tracks&#34;&gt;EFF Cover Your Tracks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 228 - Door 03: Do all vulnerabilities matter equally?</title>
      <link>https://opensourcesecurity.io/2020/12/02/episode-228-door-03-do-all-vulnerabilities-matter-equally/</link>
      <pubDate>Thu, 03 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2099</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how many security vulnerabilities matter enough to fix?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_228_Door_03_Do_all_vulnerabilities_matter_equally.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_228_Door_03_Do_all_vulnerabilities_matter_equally.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_228_Door_03_Do_all_vulnerabilities_matter_equally.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://247wallst.com/technology-3/2019/08/23/a-third-of-known-computer-security-flaws-have-no-solution/&#34;&gt;A Third of Known Computer Security Flaws Have No Solution&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/09/23/episode-162-sbom-with-allan-friedman/&#34;&gt;Episode 162 – SBOM with Allan Friedman&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 227 - Door 02: Marketing department or selection bias?</title>
      <link>https://opensourcesecurity.io/2020/12/01/episode-227-door-02-marketing-department-or-selection-bias/</link>
      <pubDate>Wed, 02 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2095</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about cybersecurity statistics and the value of the data we have.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_227_Door_02_Marketing_department_or_selection_bias.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_227_Door_02_Marketing_department_or_selection_bias.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_227_Door_02_Marketing_department_or_selection_bias.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;links&#34;&gt;Links&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://preyproject.com/blog/en/24-cybersecurity-statistics-that-matter-in-2019/&#34;&gt;24 Cybersecurity Statistics That Matter In 2020&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 226 - Door 01: Advent calendars</title>
      <link>https://opensourcesecurity.io/2020/11/30/episode-226-door-01-advent-calendars/</link>
      <pubDate>Tue, 01 Dec 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2092</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about advent calendars. We are publishing 25 5 minute episodes in 25 days. Also portable X-ray machines.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_226_Door_01_Advent_calendars.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_226_Door_01_Advent_calendars.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_226_Door_01_Advent_calendars.mp3&lt;/a&gt;
&lt;/audio&gt;</description>
    </item>
    <item>
      <title>Episode 225 - Who is responsible if IoT burns down your house?</title>
      <link>https://opensourcesecurity.io/2020/11/22/episode-225-who-is-responsible-if-iot-burns-down-your-house/</link>
      <pubDate>Mon, 23 Nov 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2077</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the safety and liability of new devices. What happens when your doorbell can burn down your house? What if it&amp;rsquo;s your fault the doorbell burned down your house? There isn&amp;rsquo;t really any prior art for where our devices are taking us, who knows what the future will look like.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_225_Who_is_responsible_if_IoT_burns_down_your_house.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_225_Who_is_responsible_if_IoT_burns_down_your_house.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_225_Who_is_responsible_if_IoT_burns_down_your_house.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cpsc.gov/Recalls/2020/ring-recalls-video-doorbells-2nd-generation-due-to-fire-hazard#&#34;&gt;Ring Doorbell recall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://support.ring.com/hc/en-us/articles/360050949611-Ring-Video-Doorbell-2nd-Generation-Recall&#34;&gt;Ring incorrect screw diagram&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=zHG_FEkZUsg&#34;&gt;Punctured battery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/05/13/episode-145-what-do-security-and-fire-have-in-common/&#34;&gt;Episode 145 – What do security and fire have in common?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=R-mDqKtivuI&#34;&gt;Phillips vs Robertson screws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/wendyck&#34;&gt;wendy knox everette&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www2.slideshare.net/WendyKnoxEverette/security-vulnerabilities-the-current-state-of-consumer-protection-law-how-iot-might-change-it&#34;&gt;Wendy&amp;rsquo;s presentation on legal liability&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnet.com/news/tim-berners-lee-startup-launches-privacy-focused-service-to-secure-your-data/&#34;&gt;Tim Burners-Lee privacy company&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>We can&#39;t move forward by looking back</title>
      <link>https://opensourcesecurity.io/2020/11/19/we-cant-move-forward-by-looking-back/</link>
      <pubDate>Thu, 19 Nov 2020 15:24:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2032</guid> 
      <description>&lt;p&gt;For the last few weeks &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; and I have been having a lively conversation about security ratings scales. Is CVSS good enough? What about the Microsoft scale? Are there other scales we should be looking at? What&amp;rsquo;s good, what&amp;rsquo;s missing, what should we be talking about.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s been a lot of back and forth and different ideas, over the course of our discussions I&amp;rsquo;ve come to realize an important aspect of security which is we don&amp;rsquo;t look forward very often. What I mean by this is there is a very strong force in the world of security to use prior art to drive our future decisions. Except all of that prior art is comically out of date in the world of today.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 224 - Are old Android devices dangerous?</title>
      <link>https://opensourcesecurity.io/2020/11/15/episode-224-are-old-android-devices-dangerous/</link>
      <pubDate>Mon, 16 Nov 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2038</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what happens when important root certificates expire on old Android devices? Who should be responsible? How can we fix this? Is this even something we can or should fix? How devices should age is a really hard problem that needs a lot of discussion.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_224_Are_old_Android_devices_dangerous.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_224_Are_old_Android_devices_dangerous.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_224_Are_old_Android_devices_dangerous.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCxD98GXG8opPMHA6-JJSyJg&#34;&gt;Unboxing coins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.engadget.com/old-android-phones-lose-many-secure-websites-in-2021-224728196.html&#34;&gt;Old Android devices certificate store&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UC2I6Et1JkidnnbWgJFiMeHA&#34;&gt;Steve1989MREInfo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 223 - Full disclosure won, deal with it</title>
      <link>https://opensourcesecurity.io/2020/11/08/episode-223-full-disclosure-won-deal-with-it/</link>
      <pubDate>Mon, 09 Nov 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2027</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the idea behind the full disclosure of security vulnerability details. There have been discussions about this topic for decades with many people on all sides of the issue. The reality is however, if you look at the current state of things, this discussion is settled, full disclosure won.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_223_Full_disclosure_won_deal_with_it.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_223_Full_disclosure_won_deal_with_it.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_223_Full_disclosure_won_deal_with_it.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hackerone.com/press-release/hackers-earn-record-breaking-100-million-hackerone-0&#34;&gt;Hacker One 100 million payout&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=2104&#34;&gt;Project Zero bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.upi.com/Top_News/US/2018/10/24/Remington-settles-class-action-suit-to-replace-faulty-gun-triggers/3461540388654/&#34;&gt;Remington gun trigger class action lawsuit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/De_Havilland_Comet&#34;&gt;Square windows on a plane&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 222 - HashiCorp Boundary with Jeff Mitchell</title>
      <link>https://opensourcesecurity.io/2020/11/01/episode-222-hashicorp-boundary-with-jeff-mitchell/</link>
      <pubDate>Mon, 02 Nov 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2023</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Jeff Mitchell about the new HashiCorp project Boundary. We discuss what Boundary is, why it&amp;rsquo;s cooler than a VPN, and how you can get involved.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_222_HashiCorp_Boundary_with_Jeff_Mitchell.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_222_HashiCorp_Boundary_with_Jeff_Mitchell.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_222_HashiCorp_Boundary_with_Jeff_Mitchell.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/jefferai&#34;&gt;Jeff Mitchell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hashicorp.com/blog/hashicorp-boundary&#34;&gt;HashiCorp Boundary announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://discuss.hashicorp.com/&#34;&gt;Discuss forum&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.boundaryproject.io/&#34;&gt;Boundary Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/hashicorp/boundary&#34;&gt;Boundary GitHub&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 221 - Security, magic, and FaceID</title>
      <link>https://opensourcesecurity.io/2020/10/25/episode-221-security-magic-and-faceid/</link>
      <pubDate>Mon, 26 Oct 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2019</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to get started in security. It&amp;rsquo;s like the hero&amp;rsquo;s journey, but with security instead of magic. We then talk about what Webkit bringing Face ID and Touch ID to the browsers will mean.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_221_Security_magic_and_FaceID.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_221_Security_magic_and_FaceID.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_221_Security_magic_and_FaceID.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hero%27s_journey&#34;&gt;Hero&amp;rsquo;s Journey&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/dotMudge/status/1318350683830091778&#34;&gt;Mudge&amp;rsquo;s Tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=VVJldn_MmMY&#34;&gt;L0pht at Congress&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/user/BobRossInc&#34;&gt;Bob Ross&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://webkit.org/blog/11312/meet-face-id-and-touch-id-for-the-web/&#34;&gt;Webkit Face ID and Touch ID for the Web&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 220 - Securing network time and IoT</title>
      <link>https://opensourcesecurity.io/2020/10/18/episode-220-securing-network-time-and-iot/</link>
      <pubDate>Mon, 19 Oct 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2014</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Network Time Security (NTS) how it works and what it means for the world (probably not very much). We also talk about Singapore&amp;rsquo;s Cybersecurity Labelling Scheme (CLS). It probably won&amp;rsquo;t do a lot in the short term, but we hope it&amp;rsquo;s a beacon of hope for the future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_220_Securing_network_time_and_IoT.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_220_Securing_network_time_and_IoT.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_220_Securing_network_time_and_IoT.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.apnic.net/2019/11/08/network-time-security-new-ntp-authentication-mechanism/&#34;&gt;Network Time Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse#Netgear_and_the_University_of_Wisconsin%E2%80%93Madison&#34;&gt;NTP and the University of Wisconsin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.csa.gov.sg/programmes/cybersecurity-labelling/about-cls&#34;&gt;Cybersecurity Labelling Scheme (CLS)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 219 - Chat with Larry Cashdollar</title>
      <link>https://opensourcesecurity.io/2020/10/11/episode-219-chat-with-larry-cashdollar/</link>
      <pubDate>Mon, 12 Oct 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2010</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; have a chat with Larry Cashdollar. The three of us go way back. Larry has done some amazing things and he tells us all about it!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_219_Chat_with_Larry_Cashdollar.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_219_Chat_with_Larry_Cashdollar.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_219_Chat_with_Larry_Cashdollar.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.akamai.com/&#34;&gt;Akamai&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.vapidlabs.com/index.php&#34;&gt;Larry&amp;rsquo;s website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.vapidlabs.com/advisory.php?v=37&#34;&gt;Larry&amp;rsquo;s First CVE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 218 - The past was a terrible place</title>
      <link>https://opensourcesecurity.io/2020/10/04/episode-218-the-past-was-a-terrible-place/</link>
      <pubDate>Mon, 05 Oct 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=2005</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about change. Specifically we discuss how the past was a terrible place. Never believe anyone who tells you it was better. Part of a career now is learning how to learn. The things you learn today won&amp;rsquo;t be useful skills in a few years. The future is is always better than the past. Even in 2020.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_218_The_past_was_a_terrible_place.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_218_The_past_was_a_terrible_place.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_218_The_past_was_a_terrible_place.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=24541964&#34;&gt;I no longer build software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=LtlyeDAJR7A&#34;&gt;Temple OS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://topgear.fandom.com/wiki/Geoff&#34;&gt;Top Gear electric car&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=fPF4fBGNK0U&#34;&gt;1959 Bel Air crash test&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>A bug by any other name</title>
      <link>https://opensourcesecurity.io/2020/10/01/a-bug-by-any-other-name/</link>
      <pubDate>Thu, 01 Oct 2020 14:37:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1972</guid> 
      <description>&lt;p&gt;This &lt;a href=&#34;https://twitter.com/manicode/status/1310634217219391488&#34;&gt;tweet&lt;/a&gt; from Jim Manico really has me thinking about why we like to consider security bugs special. There are a lot of tools on the market today to scan your github repos, containers, operating systems, web pages &amp;hellip; pick something, for security vulnerabilities. I&amp;rsquo;ve &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;written&lt;/a&gt; a very very long series about these scanners and why they&amp;rsquo;re generally terrible today but will get better, but only if we demand it. I&amp;rsquo;m now wondering why we want to consider security special. Why do we have an entire industry focused just on security bugs?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 217 - How to tell your story with Travis Murdock</title>
      <link>https://opensourcesecurity.io/2020/09/27/episode-217-how-to-tell-your-story-with-travis-murdock/</link>
      <pubDate>Mon, 28 Sep 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1968</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://twitter.com/travismurdock&#34;&gt;Travis Murdock&lt;/a&gt; about how to tell your story. Travis explains how to talk to the press and how to tell our story in a way that helps get our message across and lets the reporter do their job better.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_217_How_to_tell_your_story_with_Travis_Murdock.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_217_How_to_tell_your_story_with_Travis_Murdock.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_217_How_to_tell_your_story_with_Travis_Murdock.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.ruderfinn.com/&#34;&gt;Ruder Finn&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555&#34;&gt;CVE-2009-3555&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0160&#34;&gt;Heartbleed&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 216 - Security didn&#39;t find life on Venus</title>
      <link>https://opensourcesecurity.io/2020/09/20/episode-216-security-didnt-find-life-on-venus/</link>
      <pubDate>Mon, 21 Sep 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1957</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how we talk about what we do in the context of life on Venus. We didn&amp;rsquo;t really discover life on Venus, we discovered a gas that could be created by life on Venus. The world didn&amp;rsquo;t hear that though. We have a similar communication problem in security. How often are your words misunderstood?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_216_Security_didnt_find_life_on_Venus.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_216_Security_didnt_find_life_on_Venus.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_216_Security_didnt_find_life_on_Venus.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;&lt;strong&gt;Show Notes&lt;/strong&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nationalgeographic.com/science/2020/09/possible-sign-of-life-found-on-venus-phosphine-gas/?cmpid=org=ngp::mc=crm-email::src=ngp::cmp=editorial::add=BreakingNews_20200914&amp;amp;rid=E3B8FB742239ADEDFFD2801269C70074&#34;&gt;Phosphine on Venus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://physicscentral.com/explore/writers/will.cfm&#34;&gt;GPS and relativity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 215 - Real security is boring</title>
      <link>https://opensourcesecurity.io/2020/09/13/episode-215-real-security-is-boring/</link>
      <pubDate>Mon, 14 Sep 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1923</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about attacking open source. How serious is the threat of developers being targeted or a git repo being watched for secret security fixes? The reality of it all is there are many layers in a security journey, the most important things you can do are also the least exciting.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_215_Real_security_is_boring.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_215_Real_security_is_boring.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_215_Real_security_is_boring.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2020/09/04/disclosure_developer_targeting/&#34;&gt;Targeting developers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/2347/&#34;&gt;XKCD Infrastructure comic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.com/2020/09/04/linux_kernel_flaw_detection/&#34;&gt;Hiding security flaws in git&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.usenix.org/system/files/1401_08-12_mickens.pdf&#34;&gt;Mossad vs Not-Mossad (PDF warning)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 213 - Security Signals: What are you telling the world</title>
      <link>https://opensourcesecurity.io/2020/09/06/episode-213-security-signals-what-are-you-telling-the-world/</link>
      <pubDate>Mon, 07 Sep 2020 01:57:40 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1918</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how your actions can tell the world if you actually take security seriously. We frame the discussion in the context of Slack paying a very low bug bounty and discover some ways we can look at Slack and decide if they do indeed take our security very seriously.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_213_Security_Signals_What_are_you_telling_the_world.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_213_Security_Signals_What_are_you_telling_the_world.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_213_Security_Signals_What_are_you_telling_the_world.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Reddit carbon monoxide &lt;a href=&#34;https://np.reddit.com/r/legaladvice/comments/34l7vo/ma_postit_notes_left_in_apartment/&#34;&gt;Part 1&lt;/a&gt; &lt;a href=&#34;https://www.reddit.com/r/legaladvice/comments/34m92h/update_ma_postit_notes_left_in_apartment/?utm_source=reddit&amp;amp;utm_medium=usertext&amp;amp;utm_name=legaladvice&amp;amp;utm_content=t1_cqw5osh&#34;&gt;Part 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=SVmEXdGqO-s&#34;&gt;GCP Grey minus infinity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2020/08/31/we-take-security-seriously-very-srsly/&#34;&gt;Josh&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>We take security seriously, VERY SRSLY!</title>
      <link>https://opensourcesecurity.io/2020/08/31/we-take-security-seriously-very-srsly/</link>
      <pubDate>Mon, 31 Aug 2020 12:54:10 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1893</guid> 
      <description>&lt;p&gt;Every company tells you they take security seriously. Some even take it very seriously. But do they? I started to think about this because of a recent Slack bug. I think there are a lot of interesting things we can look at to decide if a company is taking security seriously or if the company thinks security is just a PR problem. I&amp;rsquo;m going to call the behavior we want to look at &amp;ldquo;security signals&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 212 - Grab Bag: The Security We Deserve Edition</title>
      <link>https://opensourcesecurity.io/2020/08/30/episode-212-grab-bag-the-security-we-deserve-edition/</link>
      <pubDate>Mon, 31 Aug 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1911</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Chromium sending traffic to root DNS servers. Telemetry watching what we do. Cryptocurrency scams and a few other random topics. Also pandas.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_212_Grab_Bag_The_Security_We_Deserve_Edition.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_212_Grab_Bag_The_Security_We_Deserve_Edition.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_212_Grab_Bag_The_Security_We_Deserve_Edition.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.google.com/search?client=firefox-b-1-d&amp;amp;q=blanket+rack&#34;&gt;Blanket rack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tech.slashdot.org/story/20/08/24/0336252/chromiums-dns-hijacking-tests-accused-of-causing-half-of-all-root-queries&#34;&gt;Chromium DNS traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ma.ttias.be/what-exactly-being-sent-ubuntu-motd/&#34;&gt;Ubuntu MOTD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/microsoft/windows-10-hosts-file-blocking-telemetry-is-now-flagged-as-a-risk/&#34;&gt;Microsoft telemetry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coindesk.com/defi-meme-coin-yam-succumbs-to-fatal-rebase-bug&#34;&gt;YAM coin implodes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nationalzoo.si.edu/news/giant-panda-cub-born-smithsonians-national-zoo-0&#34;&gt;Panda Cubs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>2020 CWE Top 25 I mean 10 or maybe 4.5</title>
      <link>https://opensourcesecurity.io/2020/08/24/2020-cwe-top-25-i-mean-10-or-maybe-4-5/</link>
      <pubDate>Mon, 24 Aug 2020 13:16:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1850</guid> 
      <description>&lt;p&gt;A few days ago I ran across &lt;a href=&#34;https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html&#34;&gt;this&lt;/a&gt; report from MITRE. It&amp;rsquo;s titled &amp;ldquo;2020 CWE Top 25 Most Dangerous Software Weaknesses&amp;rdquo;. I found the report lacking the sort of details I was hoping for, so I&amp;rsquo;m going rogue and adding those details myself because it&amp;rsquo;s a topic I care about and I like seeing conclusions. Think of this as a sort of modern graffiti.&lt;/p&gt;
&lt;p&gt;Firstly, all of my data and graphs come from the NVD CVE json data. You can find my project to put this data into Elasticsearch then doing interesting things with it on GitHub &lt;a href=&#34;https://github.com/joshbressers/cve-analysis&#34;&gt;here&lt;/a&gt;. All graphs are screenshots from Kibana.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 211 - The only thing harder than signing files is managing users</title>
      <link>https://opensourcesecurity.io/2020/08/23/episode-211-the-only-thing-harder-than-signing-files-is-managing-users/</link>
      <pubDate>Mon, 24 Aug 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1885</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Microsoft 2 year old signature bug and GitLab no longer processing MFA resets for free users. Signing things is hard, but trying to manage users and infrastructure at scale is even harder.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_211_The_only_thing_harder_than_signing_files_is_managing_users.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_211_The_only_thing_harder_than_signing_files_is_managing_users.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_211_The_only_thing_harder_than_signing_files_is_managing_users.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2020/08/microsoft-put-off-fixing-zero-day-for-2-years/&#34;&gt;Microsoft signed jar bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.gitlab.com/blog/2020/08/04/gitlab-support-no-longer-processing-mfa-resets-for-free-users/&#34;&gt;GitLab Support is no longer processing MFA resets for free users&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.technadu.com/someone-hijacking-tor-exit-nodes-conduct-mitm-attacks/173089/&#34;&gt;Someone Is Hijacking Tor Exit Nodes to Conduct MITM Attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 210 - Cult of Information Security</title>
      <link>https://opensourcesecurity.io/2020/08/16/episode-210-cult-of-information-security/</link>
      <pubDate>Mon, 17 Aug 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1844</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the current state of information security. There are aspects that resemble a cult more than we would like. It&amp;rsquo;s not all bad though, there are some things we can do to help move things forward. This episode shouldn&amp;rsquo;t be taken too seriously.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_210_Cult_of_Information_Security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_210_Cult_of_Information_Security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_210_Cult_of_Information_Security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;Show Notes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.google.com/search?q=%22cult+of+information+security%22&#34;&gt;&amp;ldquo;cult of information security&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wikihow.com/Start-a-Cult&#34;&gt;How to start a cult&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 209 - Secure Boot isn&#39;t Secure</title>
      <link>https://opensourcesecurity.io/2020/08/09/episode-209-secure-boot-isnt-secure/</link>
      <pubDate>Mon, 10 Aug 2020 00:02:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1839</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Secure Boot. The conversation uses the recent &amp;ldquo;Boot Hole&amp;rdquo; vulnerability to frame a conversation about what Secure Boot is and isn&amp;rsquo;t. Why the Boot Hole flaw doesn&amp;rsquo;t really matter, and why Secure Boot was very scary for Linux users back when it came out.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_209_Secure_Boot_isnt_Secure.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_209_Secure_Boot_isnt_Secure.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_209_Secure_Boot_isnt_Secure.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;Show Notes&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/&#34;&gt;Boot Hole&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 208 - Passwords are pollution</title>
      <link>https://opensourcesecurity.io/2020/08/02/episode-208-passwords-are-pollution/</link>
      <pubDate>Mon, 03 Aug 2020 00:02:50 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1833</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some of the necessary evils of security. There are challenges we face like passwords and resource management. Sometimes the problem is old ideas, sometimes it&amp;rsquo;s we don&amp;rsquo;t have metrics. Can you measure not getting hacked?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_208_Passwords_are_pollution.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_208_Passwords_are_pollution.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_208_Passwords_are_pollution.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coindesk.com/85-of-italian-banks-are-exchanging-interbank-transfer-data-on-corda&#34;&gt;Clearing checks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fairinstitute.org/&#34;&gt;FAIR Institute&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://factorio.com/&#34;&gt;Factorio&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 207 - Weaponized attention</title>
      <link>https://opensourcesecurity.io/2020/07/26/episode-207-weaponized-attention/</link>
      <pubDate>Mon, 27 Jul 2020 00:03:48 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1827</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; start this one by explaining how the Twitter hacker was just a dumb criminal (most criminals are dumb). We then discuss the new GPT-3 AI that can create text. How we create, and how social media is doing everything it can to weaponize our attention. It&amp;rsquo;s not a fight humanity is winning.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_207_Weaponized_attention.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_207_Weaponized_attention.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_207_Weaponized_attention.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://maraoz.com/2020/07/18/openai-gpt3/&#34;&gt;GPT-3 AI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=ekg45ub8bsk&#34;&gt;Blipverts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#weaponizedattention&lt;/li&gt;
&lt;li&gt;#GPT-3 #GPT3&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 206 - Confidential Virtual Machines; The future of cloud computing</title>
      <link>https://opensourcesecurity.io/2020/07/19/episode-206-confidential-virtual-machines-the-future-of-cloud-computing/</link>
      <pubDate>Mon, 20 Jul 2020 00:03:16 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1821</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Google&amp;rsquo;s new confidential VMs. The AMD Secure Encrypted Virtualization is the technology that makes it all possible. What is SEV, how does it work, and why should you care? This technology is going to be the future of the cloud.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_206_Confidential_Virtual_Machines_The_future_of_cloud_computing.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_206_Confidential_Virtual_Machines_The_future_of_cloud_computing.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_206_Confidential_Virtual_Machines_The_future_of_cloud_computing.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cloud.google.com/blog/products/identity-security/introducing-google-cloud-confidential-computing-with-confidential-vms&#34;&gt;Google confidential VMs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developer.amd.com/sev/&#34;&gt;AMD SEV&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lwn.net/Articles/686808/&#34;&gt;SEV vs SGX&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#confidentialcomputing&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 205 - The State of Open Source Security with Alyssa Miller from Snyk</title>
      <link>https://opensourcesecurity.io/2020/07/12/episode-205-the-state-of-open-source-security-with-alyssa-miller-from-snyk/</link>
      <pubDate>Mon, 13 Jul 2020 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1809</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Alyssa Miller from Snyk about the State of Open Source Security 2020 report. Alyssa was the report author and has some great insight into the current trends we&amp;rsquo;re seeing in open source security. Some of the challenges developers face. We discuss the difficulty static and composition analysis scanners face. It&amp;rsquo;s a great conversation!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_205_The_State_of_Open_Source_Security_with_Alyssa_Miller_from_Snyk.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_205_The_State_of_Open_Source_Security_with_Alyssa_Miller_from_Snyk.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_205_The_State_of_Open_Source_Security_with_Alyssa_Miller_from_Snyk.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://snyk.io/open-source-security-report/&#34;&gt;The State of Open Source Security 2020&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/AlyssaM_InfoSec&#34;&gt;Alyssa&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#opensourcesecurity&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 204 - What Would Apple Do?</title>
      <link>https://opensourcesecurity.io/2020/07/05/episode-204-what-would-apple-do/</link>
      <pubDate>Mon, 06 Jul 2020 00:03:01 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1803</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some recent security actions Apple has taken. Not all are good, but in general Apple is doing things to benefit their customers (their customers are not advertisers). We also discuss some of the challenges when your customers are advertisers.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_204_What_Would_Apple_Do.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_204_What_Would_Apple_Do.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_204_What_Would_Apple_Do.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thesslstore.com/blog/ssl-certificate-validity-will-be-limited-to-one-year-by-apples-safari-browser/&#34;&gt;Apple one year certificates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/apple-declined-to-implement-16-web-apis-in-safari-due-to-privacy-concerns/&#34;&gt;Apple declines to implement 16 new APIs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lapcatsoftware.com/articles/catalina-executables.html&#34;&gt;Apple is tracking unsigned executables&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 203 - Humans, conferences, and security: let me think and get back to you in a bit</title>
      <link>https://opensourcesecurity.io/2020/06/28/episode-203-humans-conferences-and-security-let-me-think-and-get-back-to-you-in-a-bit/</link>
      <pubDate>Mon, 29 Jun 2020 00:04:55 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1796</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about human behavior. The conversation makes its way to conferences and the perpetual question of if a conference is useful or not. We come to the agreement the big shows aren&amp;rsquo;t what they used to be, but things like BSides are great experiences.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_203_Humans_conferences_and_security_let_me_think_and_get_back_to_you_in_a_bit.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_203_Humans_conferences_and_security_let_me_think_and_get_back_to_you_in_a_bit.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_203_Humans_conferences_and_security_let_me_think_and_get_back_to_you_in_a_bit.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2020/06/security_and_hu_9.html&#34;&gt;Security and Human Behaviour&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2020/06/23/the-ineffective-ciso/&#34;&gt;Josh&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/dotMudge/status/1274699456433225731&#34;&gt;Mudge&amp;rsquo;s Twitter thread&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>The ineffective CISO</title>
      <link>https://opensourcesecurity.io/2020/06/23/the-ineffective-ciso/</link>
      <pubDate>Tue, 23 Jun 2020 14:20:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1775</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve been thinking about this one for a while. I&amp;rsquo;ve seen some CISOs who are amazing at what they do, and I&amp;rsquo;ve seen plenty that can&amp;rsquo;t get anything done. After working with one that I think is particularly good lately, I&amp;rsquo;ve made some observations that has changed my mind about the modern day CISO reporting structure.&lt;/p&gt;
&lt;p&gt;The TL;DR of this post is if you have a CISO that claims they can only get their job done if they report to the board or CEO, you have an ineffective CISO.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 202 - The convergence of application security</title>
      <link>https://opensourcesecurity.io/2020/06/21/episode-202-the-convergence-of-application-security/</link>
      <pubDate>Mon, 22 Jun 2020 00:01:25 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1781</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security of applications. We talk about the security of infrastructure all the time, but what happens when we combine infrastructure into an application or solution?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_202_The_convergence_of_application_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_202_The_convergence_of_application_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_202_The_convergence_of_application_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/06/83921733-3fe3ee00-a73c-11ea-9459-35f3a42510ef.png&#34;&gt;Picture of Kurt&amp;rsquo;s security check-up&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://uxdesign.cc/simple-beautiful-interfaces-are-the-future-9f77e33af5c4&#34;&gt;Dragon controls&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 201 - We broke CVSSv3, now how do we fix it?</title>
      <link>https://opensourcesecurity.io/2020/06/14/episode-201-we-broke-cvssv3-now-how-do-we-fix-it/</link>
      <pubDate>Mon, 15 Jun 2020 00:01:42 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1770</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about CVSSv3 and how it&amp;rsquo;s broken. We started with a blog post to explain why the NVD CVSS scores are so wrong, and we ended up researching CVSSv3 and found out it&amp;rsquo;s far more broken than any of us expected in ways we didn&amp;rsquo;t expect. NVD isn&amp;rsquo;t broken, CVSSv3 is. How did we get here? Are there any options that work today? Where should we go next?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 200 - Talking Container Security with Liz Rice</title>
      <link>https://opensourcesecurity.io/2020/06/07/episode-200-talking-container-security-with-liz-rice/</link>
      <pubDate>Mon, 08 Jun 2020 00:01:17 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1706</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://twitter.com/lizrice&#34;&gt;Liz Rice&lt;/a&gt; from &lt;a href=&#34;https://www.aquasec.com/&#34;&gt;Aqua Security&lt;/a&gt; about container security and her new book on the same topic. What does container security look like today? What are some things you can do now? What will container security look like in the future?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_200_Talking_Container_Security_with_Liz_Rice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_200_Talking_Container_Security_with_Liz_Rice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_200_Talking_Container_Security_with_Liz_Rice.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://info.aquasec.com/container-security-book&#34;&gt;Container Security download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blogs.getty.edu/iris/the-implausible-medieval-elephant/&#34;&gt;Pictures of elephants&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://learning.oreilly.com/library/view/kubernetes-security/9781492039075/&#34;&gt;Kubernetes Security book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/aquasecurity/starboard&#34;&gt;Starboard project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.aquasec.com/dynamic-container-analysis&#34;&gt;Dynamic threat analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Episode 199 - Special cases are special: DNS, Websockets, and CSV</title>
      <link>https://opensourcesecurity.io/2020/05/31/episode-199-special-cases-are-special-dns-websockets-and-csv/</link>
      <pubDate>Mon, 01 Jun 2020 00:01:22 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1641</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a grab bag of topics. A DNS security flaw, port scanning your machine from a web browser, and CSV files running arbitrary code. All of these things end up being the result of corner cases. Letting a corner case be part of a default setup is always a mistake. Yes always, not even that one time.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_199_Special_cases_are_special_DNS_Websockets_and_CSV.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_199_Special_cases_are_special_DNS_Websockets_and_CSV.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_199_Special_cases_are_special_DNS_Websockets_and_CSV.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h2 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kb.isc.org/docs/cve-2020-8616&#34;&gt;Bind advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Robustness_principle&#34;&gt;Robustness Principal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2020/05/26/ebay_port_scans_your_pc/&#34;&gt;eBay port scanning localhost&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://owasp.org/www-community/attacks/CSV_Injection&#34;&gt;OWASP CSV injection&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
    <item>
      <title>Broken vulnerability severities</title>
      <link>https://opensourcesecurity.io/2020/05/27/broken-vulnerability-severities/</link>
      <pubDate>Wed, 27 May 2020 14:37:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=582</guid> 
      <description>&lt;p&gt;This blog post originally started out as a way to point out why the NVD CVSS scores are usually wrong. One of the amazing things about having easy access to data is you can ask a lot of questions, questions you didn&amp;rsquo;t even know you had, and find answers right away. If you haven&amp;rsquo;t read it yet, I wrote a very long series on &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;security scanners&lt;/a&gt;. One of my struggles I have is there are often many &amp;ldquo;critical&amp;rdquo; findings in those scan reports that aren&amp;rsquo;t actually critical. I wanted to write something that explained why that was, but because my data took me somewhere else, this is the post you get. I knew CVSSv3 wasn&amp;rsquo;t perfect (even the CVSS folks know this), but I found some really interesting patterns in the data. The TL;DR of this post is: It may be time to start talking about CVSSv4.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 198 - Good advice or bad advice? Hang up, look up, and call back</title>
      <link>https://opensourcesecurity.io/2020/05/24/episode-198-good-advice-or-bad-advice-hang-up-look-up-and-call-back/</link>
      <pubDate>Mon, 25 May 2020 00:54:19 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=1572</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Krebs blog post titled &amp;ldquo;When in Doubt: Hang Up, Look Up, &amp;amp; Call Back&amp;rdquo;. In the world of security there isn&amp;rsquo;t a lot of actionable advice, it&amp;rsquo;s worth discussing if something like this will work, or ever if it&amp;rsquo;s the right way to handle these situations.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_198_-_Good_advice_or_bad_advice_Hang_up_look_up_and_call_back.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_198_-_Good_advice_or_bad_advice_Hang_up_look_up_and_call_back.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_198_-_Good_advice_or_bad_advice_Hang_up_look_up_and_call_back.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2020/04/when-in-doubt-hang-up-look-up-call-back/&#34;&gt;When in Doubt: Hang Up, Look Up, &amp;amp; Call Back&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Tech Support Scam podcast: &lt;a href=&#34;https://gimletmedia.com/shows/reply-all/6nh3wk/102-long-distance&#34;&gt;Part 1&lt;/a&gt;, &lt;a href=&#34;https://gimletmedia.com/shows/reply-all/76h5gl/103-long-distance-part-ii&#34;&gt;Part 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/STIR/SHAKEN&#34;&gt;STIR/SHAKEN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nytimes.com/2019/07/19/business/safe-deposit-box-theft.html&#34;&gt;Drill the wrong safe deposit box&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/2009_Bank_of_Ireland_robbery&#34;&gt;2009 Bank of Ireland robbery&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 197 - Beer, security, and consistency; the newer, better, triad</title>
      <link>https://opensourcesecurity.io/2020/05/17/episode-197-beer-security-and-consistency-the-newer-better-triad/</link>
      <pubDate>Sun, 17 May 2020 23:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-196-beer-or-something.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what beer and reproducible builds have in common. It&amp;rsquo;s a lot more than you think, and it mostly comes down to quality control. If you can&amp;rsquo;t reproduce what you do, you&amp;rsquo;re not a mature organization and you need maturity to have quality.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_197_Beer_security_and_consistency_the_newer_better_triad.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_197_Beer_security_and_consistency_the_newer_better_triad.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_197_Beer_security_and_consistency_the_newer_better_triad.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Reinheitsgebot&#34;&gt;Reinheitsgebot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2016/05/trusting-trusting-trust.html&#34;&gt;Josh&amp;rsquo;s Blog Post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf&#34;&gt;Ken Thompson&amp;rsquo;s reflections on trusting trust&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.torproject.org/category/tags/deterministic-builds&#34;&gt;Tor Browser Deterministic Builds&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=22979245&#34;&gt;One line package broke npm create&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=zhaOaHHFzLQ&#34;&gt;Donkey Kong 64 memory leak&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 196 - Pounding square solutions into round holes: forced updates from Ubuntu</title>
      <link>https://opensourcesecurity.io/2020/05/11/episode-196-pounding-square-solutions-into-round-holes-forced-updates-from-ubuntu/</link>
      <pubDate>Mon, 11 May 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/05/episode-196-pounding-square-solutions.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about automatic updates. Specifically we discuss a recent decision by Ubuntu to enable forced automatic updates. There are lessons here for the security community. We have a history of jumping to solutions rather than defining and understanding problems. Sometimes our solutions aren&amp;rsquo;t the best. Also murder bees.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_196_Pounding_square_solutions_into_round_holes_forced_updates_from_Ubuntu.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_196_Pounding_square_solutions_into_round_holes_forced_updates_from_Ubuntu.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_196_Pounding_square_solutions_into_round_holes_forced_updates_from_Ubuntu.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://theoatmeal.com/comics/running5&#34;&gt;The Oatmeal giant bee comic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=awoV5Wj9Iys&#34;&gt;Honeybees cook giant hornet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://jatan.blog/2020/05/02/ubuntu-snap-obsession-has-snapped-me-off-of-it/&#34;&gt;Ubuntu 20.04 LTS’ snap obsession has snapped me off of it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://discourse.ubuntu.com/t/is-ubuntu-software-going-to-be-remove-for-snap-snap-store/14542/25?u=uncertainquark&#34;&gt;Forum discussion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 195 - Is BGP actually insecure?</title>
      <link>https://opensourcesecurity.io/2020/05/04/episode-195-is-bgp-actually-insecure/</link>
      <pubDate>Mon, 04 May 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/05/episode-195-is-bpg-actually-insecure.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the uproar around Cloudflare&amp;rsquo;s &amp;ldquo;Is BGP safe yet&amp;rdquo; site. It&amp;rsquo;s always interesting watching how much people will push back on new things, even if the new things is probably a step in the right direction. The clever thing Cloudflare is doing in this instance is they are making the BGP problem something anyone can understand. Also send us your funny dog stories.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_195_Is_BGP_actually_insecure.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_195_Is_BGP_actually_insecure.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_195_Is_BGP_actually_insecure.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://isbgpsafeyet.com/&#34;&gt;Is BGP safe yet?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/netsec/comments/g45vdt/check_if_your_isp_uses_basic_security_measures/?utm_medium=android_app&amp;amp;utm_source=share&#34;&gt;Reddit BGP conversation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=22899546&#34;&gt;Hacker News BGP conversation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://dyn.com/blog/bgp-hijack-of-amazon-dns-to-steal-crypto-currency/&#34;&gt;Stealing cryptocurrency with BGP&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#BGP&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 194 - Working from home security: resistance is futile</title>
      <link>https://opensourcesecurity.io/2020/04/27/episode-194-working-from-home-security-resistance-is-futile/</link>
      <pubDate>Mon, 27 Apr 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-194-working-from-home-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new normal that&amp;rsquo;s working away from an office. It&amp;rsquo;s not exactly working from home as there are some unforeseen challenges that we just took for granted in the past. There are a lot of new and strange security problems we have to adapt to, everyone is doing amazing work with very little right now.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_194_Working_from_home_security_resistance_is_futile.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_194_Working_from_home_security_resistance_is_futile.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_194_Working_from_home_security_resistance_is_futile.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2020/04/microsoft-buys-corp-com-so-bad-guys-cant/&#34;&gt;Microsoft buys corp.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://samy.pl/poisontap/&#34;&gt;Hijack computer network traffic with a Pi Zero&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 193 - Security lessons from space: Apollo 13 edition</title>
      <link>https://opensourcesecurity.io/2020/04/20/episode-193-security-lessons-from-space-apollo-13-edition/</link>
      <pubDate>Mon, 20 Apr 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-193-security-lessons-from-space.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about space. We intended to focus on Apollo 13 but as usual we have no ability to stay on topic. There is a lot of fun space discussions in this one though. Do you think you can hack Voyager 1? Only if you have a big enough satellite dish.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_193_Security_lessons_from_space_Apollo_13_edition.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_193_Security_lessons_from_space_Apollo_13_edition.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_193_Security_lessons_from_space_Apollo_13_edition.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.arrl.org/eavesdropping-on-apollo-11&#34;&gt;Eavesdropping on Apollo 11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nro.gov/News/News-Articles/Article/1906117/the-rescue-of-apollo-11/&#34;&gt;Apollo 11 classified weather satellite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://abcnews.go.com/Politics/50-years-pen-saved-apollo-11/story?id=64228723&#34;&gt;The pen that saved Apollo 11&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 192 - Work without progress - what Infosec can learn from treadmills</title>
      <link>https://opensourcesecurity.io/2020/04/13/episode-192-work-without-progress-what-infosec-can-learn-from-treadmills/</link>
      <pubDate>Mon, 13 Apr 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-192-work-without-progress-what.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Kurt&amp;rsquo;s recent treadmill purchase and the lessons we can lean in security from the consumer market. The consumer market has learned a lot about how to interact with their customers in the last few decades, the security industry is certainly behind in this space today. Once again we display our ability to tie even the seemingly mundane things back to a discussion about security.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_192_Work_without_progress_what_Infosec_can_learn_from_treadmills.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_192_Work_without_progress_what_Infosec_can_learn_from_treadmills.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_192_Work_without_progress_what_Infosec_can_learn_from_treadmills.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=cXFwfi9emXc&#34;&gt;Eating goldfish off the treadmill&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 191 - Security scanners are all terrible</title>
      <link>https://opensourcesecurity.io/2020/04/08/episode-191-security-scanners-are-all-terrible/</link>
      <pubDate>Wed, 08 Apr 2020 19:54:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-191-security-scanners-are-all.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about security scanners. They&amp;rsquo;re all pretty bad today, but there are some things we can do to make them better. Step one is to understand the problem. Do you know why you&amp;rsquo;re running the scanner and what the reports mean?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_191_Security_scanners_are_all_terrible.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_191_Security_scanners_are_all_terrible.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_191_Security_scanners_are_all_terrible.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1237429532283396096&#34;&gt;Edmonton freeze thaw cycles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;Josh&amp;rsquo;s security scanner blog series&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8d618-eye-2771171.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f466d-eye-2771171.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Who are the experts</title>
      <link>https://opensourcesecurity.io/2020/04/07/who-are-the-experts/</link>
      <pubDate>Tue, 07 Apr 2020 14:18:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=560</guid> 
      <description>&lt;p&gt;These are certainly strange times we are living in. None of us will ever forget what&amp;rsquo;s happening and we will all retell stories for the rest of our days. Many of us asked &amp;ldquo;tell me about the depression grandma&amp;rdquo;, similar questions will be asked of us someday.&lt;/p&gt;
&lt;p&gt;The whirlwind of confusion and chaos got me thinking about advice and who we listen to. Most of us know a staggering number of people who are apparently experts in immunology. I have no intention of talking about the politics of the current times, goodness knows nobody in their right mind should care what I think. What all this does have me pondering is what are experts and how can we decide who we should listen to?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 190 - Building a talent &amp;quot;ecosystem&amp;quot;</title>
      <link>https://opensourcesecurity.io/2020/04/05/episode-190-building-a-talent-ecosystem/</link>
      <pubDate>Sun, 05 Apr 2020 23:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/04/episode-190-building-talent-ecosystem.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about building a talent ecosystem. What starts out as an attempt by Kurt to talk about Canada evolves into a discussion about how talent can evolve, or be purposely grown. Canada&amp;rsquo;s entertainment industry and Unit 8200 are good examples of this.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_190_Building_a_talent_ecosystem.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_190_Building_a_talent_ecosystem.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_190_Building_a_talent_ecosystem.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/results?search_query=sctv&#34;&gt;SCTV&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://redteamproject.org/&#34;&gt;Red Team Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Moon-Shot-Inside-Americas-Landings/dp/1453258264&#34;&gt;Moon Shot book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UChWv6Pn_zP0rI6lgGt3MyfA&#34;&gt;AvE channel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=-qb0NU2qNZQ&#34;&gt;Turning a tree root into a bowl&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://about.usps.com/who-we-are/postal-history/hope-diamond.pdf&#34;&gt;Mailing the Hope Diamond&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=UoZCzQ5jcbk&#34;&gt;The Ecosystem&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#securitytalent&lt;/li&gt;
&lt;li&gt;#talentecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 189 - Video game hackers - speedrunning</title>
      <link>https://opensourcesecurity.io/2020/03/30/episode-189-video-game-hackers-speedrunning/</link>
      <pubDate>Mon, 30 Mar 2020 00:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/03/episode-189-video-game-hackers.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about video games and hacking. Specifically how speed runners are really just video game hackers.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_189_Video_game_hackers_speedrunning.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_189_Video_game_hackers_speedrunning.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_189_Video_game_hackers_speedrunning.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gdqvods.com/category/developer-commentaries/&#34;&gt;Developer speedrun commentary&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=vAHXK2wut_I&#34;&gt;Super Mario World end credits glitch explained&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/eM8Z9e-WoFs?t=426&#34;&gt;Mario 3 RCE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.speedrun.com/botw&#34;&gt;Breath of the Wild speedrun&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://youtu.be/9VH-NWMezEo?t=577&#34;&gt;Super Metroid reverse boss order&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kotaku.com/after-three-years-speedrunner-finally-beats-all-714-nes-1792763769&#34;&gt;TMR beats every NES game&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c82f9-background-3311042.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e9824-background-3311042.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 6: What do we do now?</title>
      <link>https://opensourcesecurity.io/2020/03/26/part-6-what-do-we-do-now/</link>
      <pubDate>Thu, 26 Mar 2020 16:46:25 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=455</guid> 
      <description>&lt;p&gt;Well, we&amp;rsquo;ve made it to the end. What started out as a short blog post ended up being 7 posts long. If you made it this far I commend you for your mental fortitude.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m going to sum everything up with these 4 takeaways.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Understand the problem we want to solve&lt;/li&gt;
&lt;li&gt;Push back on scanner vendors&lt;/li&gt;
&lt;li&gt;Work with your vendors&lt;/li&gt;
&lt;li&gt;Get involved in open source&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;understand-the-problem-we-want-to-solve&#34;&gt;Understand the problem we want to solve&lt;/h2&gt;
&lt;p&gt;In security it&amp;rsquo;s sometimes easy to lose sight of what we&amp;rsquo;re really trying to do. Running a scanner isn&amp;rsquo;t a goal in itself, the goal is to improve security, or it should be if it isn&amp;rsquo;t. Make sure you never forget what&amp;rsquo;s really happening. Sometimes in the excitement of security, the real reason we&amp;rsquo;re doing what we do can be lost.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 5: Which of these security problems do I need to care about?</title>
      <link>https://opensourcesecurity.io/2020/03/25/part-5-which-of-these-security-problems-do-i-need-to-care-about/</link>
      <pubDate>Wed, 25 Mar 2020 13:01:27 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=453</guid> 
      <description>&lt;p&gt;If you just showed up here, go back and start at the &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;intro post&lt;/a&gt;, you&amp;rsquo;ll want the missing context before reading this article. Or not, I mean, whatever.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve spent the last few posts going over the challenges of security scanners. I think the most important takeaway is we need to temper our expectations. Even a broken clock is right twice a day. So assuming some of the security flaws reported are real, how can we figure out what we should be paying attention to?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 4: Application scanning</title>
      <link>https://opensourcesecurity.io/2020/03/24/part-4-application-scanning/</link>
      <pubDate>Tue, 24 Mar 2020 14:40:38 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=438</guid> 
      <description>&lt;p&gt;We&amp;rsquo;ve already discussed the perils of code and composition scanning. If you&amp;rsquo;ve not already read those, you should go back to the &lt;a href=&#34;https://opensourcesecurity.io/2020/02/13/the-security-scanner-problem&#34;&gt;beginning&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Now we&amp;rsquo;re going to discuss application scanning. The basic idea here is we have a scanner that interacts with a running application and looks for bugs. The other two scanners run against static content. A running application is dynamic and ever changing. If we thought code scanning was hard, this is even harder. Well it can be harder, it can also be easier. Sometimes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 188 - Depressing news sucks, we&#39;re talking about cheating in video games</title>
      <link>https://opensourcesecurity.io/2020/03/23/episode-188-depressing-news-sucks-were-talking-about-cheating-in-video-games/</link>
      <pubDate>Mon, 23 Mar 2020 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/03/episode-188-depressing-news-sucks-were.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about video games. Yeah, video games. Specifically about cheating in video games. There&amp;rsquo;s a lot of other security themes in the discussion. With the news being horrible these days, we needed to talk about something fun.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_188_Depressing_news_sucks_were_talking_about_cheating_in_video_games.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_188_Depressing_news_sucks_were_talking_about_cheating_in_video_games.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_188_Depressing_news_sucks_were_talking_about_cheating_in_video_games.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.penny-arcade.com/comic/2010/09/15/dotage&#34;&gt;Penny Arcade&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=iN3ttHug-BU&amp;amp;feature=youtu.be&#34;&gt;Banned from Fortnite&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=6wTeQ2ly6Uw&#34;&gt;Apollo Robbins, world&amp;rsquo;s best pickpocket&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8f355-video-game-1294541.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9271f-video-game-1294541.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 187 - Wireguard vs IPsec: the OK Boomer of security</title>
      <link>https://opensourcesecurity.io/2020/03/15/episode-187-wireguard-vs-ipsec-the-ok-boomer-of-security/</link>
      <pubDate>Sun, 15 Mar 2020 23:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/03/episode-187-wireguard-vs-ipsec-ok.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Wireguard. There have been a lot of recent conversations about it and if it&amp;rsquo;s better or worse than other VPN solutions. It&amp;rsquo;s safe to say in our modern age, less is usually more, especially when it comes to security. Wireguard has a lot going for it, it can&amp;rsquo;t be ignored.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_187_Wireguard_vs_IPsec_the_OK_Boomer_of_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_187_Wireguard_vs_IPsec_the_OK_Boomer_of_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_187_Wireguard_vs_IPsec_the_OK_Boomer_of_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sosav.com/guides/game-consoles/nintendo/nintendo-home/nintendo-switch/fan/&#34;&gt;Replacing a Nintendo Switch fan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wireguard.com/&#34;&gt;WireGuard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=21741133&#34;&gt;Hacker News discussion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#wireguard&lt;/li&gt;
&lt;li&gt;#IPSec&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 3: Composition scanning</title>
      <link>https://opensourcesecurity.io/2020/03/12/part-3-composition-scanning/</link>
      <pubDate>Thu, 12 Mar 2020 12:49:05 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=407</guid> 
      <description>&lt;p&gt;If you just showed up here, go back and start at the &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;intro post&lt;/a&gt;, you&amp;rsquo;ll want the missing context before reading this article.&lt;/p&gt;
&lt;p&gt;In this post we&amp;rsquo;re going to talk about a newer type of scanner called a composition scanner. The idea here is when you build an application today it&amp;rsquo;s never just what you wrote. It also includes source code from a large number of other sources. Usually these other sources are open source.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 2: Scanning the code</title>
      <link>https://opensourcesecurity.io/2020/03/11/part-2-scanning-the-code/</link>
      <pubDate>Wed, 11 Mar 2020 13:07:13 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=384</guid> 
      <description>&lt;p&gt;If you just showed up here, go back and start at the &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;intro post&lt;/a&gt;, you&amp;rsquo;ll want the missing context before reading this article.&lt;/p&gt;
&lt;p&gt;The first type of scanner we&amp;rsquo;re going to cover are source code scanners. It seems fitting to start at the bottom with the code that drives everything. Every software project has source code. It doesn&amp;rsquo;t matter what language you use. Some is compiled, some interpreted, it&amp;rsquo;s all still source code. The idea behind a source code scanner is to review the code a human wrote and find potential security problems with it. This sounds easy enough in theory, but it&amp;rsquo;s extremely difficult in practice.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Part 1: Is your security scanner running? You better go catch it!</title>
      <link>https://opensourcesecurity.io/2020/03/10/part-1-is-your-security-scanner-running-you-better-go-catch-it/</link>
      <pubDate>Tue, 10 Mar 2020 13:13:46 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=413</guid> 
      <description>&lt;p&gt;This post is the first part in a series on automated security scanners. I explain some of the ideas and goals in the &lt;a href=&#34;https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/&#34;&gt;intro post&lt;/a&gt;, rather than rehashing that post as filler, just go read it, rehashing content isn&amp;rsquo;t exciting.&lt;/p&gt;
&lt;p&gt;There are different kinds of security scanners, but the problem with all of them is basically the same. The results returned by the scanners are not good in the same way catching poison ivy is not good. The more you have, the worse it is. The most important thing to understand, and the whole reason I&amp;rsquo;m writing this series, is that scanners will get better in the future. How they get better will be driven by all of us. If we do nothing, they will get better in a way that might not make our lives easier. If we can understand the current shortcomings of these systems, we can better work with the vendors to improve them in ways that will benefit everyone.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Security Scanner Problem</title>
      <link>https://opensourcesecurity.io/2020/03/10/the-security-scanner-problem/</link>
      <pubDate>Tue, 10 Mar 2020 13:13:41 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=364</guid> 
      <description>&lt;p&gt;Are you running a security scanner? It seems like everyone is doing it, maybe it&amp;rsquo;s time to get with it. It&amp;rsquo;s looking like automated security scanning is the next stage in the long winding history of the security industry. If you&amp;rsquo;ve never run one of these scanners that&amp;rsquo;s OK. I&amp;rsquo;m going to explain what they are, how they work, how we&amp;rsquo;re not using them correctly, and most importantly, what you can do about it. If you are running a scanner I&amp;rsquo;m either going to tell you why you&amp;rsquo;re doing it wrong, or why you&amp;rsquo;re doing it REALLY wrong. If you&amp;rsquo;re a vendor who builds a security scanner I assure you I understand there is a high probability I am indeed an idiot and don&amp;rsquo;t know what I&amp;rsquo;m talking about. I&amp;rsquo;m sure everything will be fine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 186 - Endpoint security with Tony Meehan</title>
      <link>https://opensourcesecurity.io/2020/03/08/episode-186-endpoint-security-with-tony-meehan/</link>
      <pubDate>Sun, 08 Mar 2020 23:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/03/episode-186-endpoint-security-with-tony.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Tony Meehan from Elastic (formerly Endgame) about endpoint detection, response, protection, and even SIEM. Tony has a great history coming from the NSA and has a number of great stories to help understand the topics.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_186_Endpoint_security_with_Tony_Meehan.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_186_Endpoint_security_with_Tony_Meehan.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_186_Endpoint_security_with_Tony_Meehan.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/snowboardvstree&#34;&gt;Tony Meehan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=bDJb8WOJYdA&#34;&gt;Rob Joyce on Disrupting Nation State Hackers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elastic.co/blog/discovering-anomalous-patterns-based-on-parent-child-process-relationships&#34;&gt;Bobby Filar living off the land blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/sawaba/status/1231016184981655554&#34;&gt;Dwell time graph&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://medium.com/@snowboardvstree/snowboarder-vs-tree-c33995d014a5&#34;&gt;Snowboarder vs Tree&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#EndpointSecurity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 185 - Is it even possible to fix open source security?</title>
      <link>https://opensourcesecurity.io/2020/03/02/episode-185-is-it-even-possible-to-fix-open-source-security/</link>
      <pubDate>Mon, 02 Mar 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/03/episode-185-is-it-even-possible-to-fix.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Linux Foundation Census 2. There is a lot of talk around how to fix open source security, but the reality is we can&amp;rsquo;t fix it. We need to stop trying to fix what isn&amp;rsquo;t broken and engineering around the system we have, not the system we want.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_185_Is_it_even_possible_to_fix_open_source_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_185_Is_it_even_possible_to_fix_open_source_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_185_Is_it_even_possible_to_fix_open_source_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/the-linux-foundation-identifies-the-most-important-open-source-software-components-and-their-problems/&#34;&gt;Linux Foundation Census 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coreinfrastructure.org/&#34;&gt;Core Infrastructure Initiative&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/69036-tools-2423826.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/96570-tools-2423826.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 184 - It’s DNS. It&#39;s always DNS</title>
      <link>https://opensourcesecurity.io/2020/02/24/episode-184-its-dns-its-always-dns/</link>
      <pubDate>Mon, 24 Feb 2020 00:10:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/02/episode-184-its-dns-its-always-dns.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the sale of the corp.com domain. Is it going to be the end of the world, or a non event? We disagree on what should happen with it. Josh hopes an evildoer buys it, Kurt hopes for Microsoft. We also briefly discuss the CIA owning Crypto AG.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode200s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_184_Its_DNS_Its_always_DNS.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_184_Its_DNS_Its_always_DNS.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_184_Its_DNS_Its_always_DNS.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2020/02/dangerous-domain-corp-com-goes-up-for-sale/&#34;&gt;corp.com is for sale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/&#34;&gt;CIA owned Crypto AG&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 183 - The great working from home experiment</title>
      <link>https://opensourcesecurity.io/2020/02/17/episode-183-the-great-working-from-home-experiment/</link>
      <pubDate>Mon, 17 Feb 2020 00:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/02/episode-183-great-working-from-home.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a huge working from home experiment because of the the Coronavirus. We also discuss some of the advice going on around the outbreak, as well as how humans are incredibly good at ignoring good advice, often to their own peril. Also an airplane wheel falls off.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode206s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_183_The_great_working_from_home_experiment.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_183_The_great_working_from_home_experiment.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_183_The_great_working_from_home_experiment.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=22221507&#34;&gt;Work from home Hacker News discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public&#34;&gt;CDC advice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=sJfsyhQ0oBs&#34;&gt;How to wash your hands&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/investigates/no-running-water-on-air-canada-flight-from-china-during-worsening-coronavirus-outbreak-1.5448946&#34;&gt;Air Canada flight without running wather&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=h4Oi0BtvZps&#34;&gt;Airplane wheel falling off&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 182 - Does open source owe us anything?</title>
      <link>https://opensourcesecurity.io/2020/02/10/episode-182-does-open-source-owe-us-anything/</link>
      <pubDate>Mon, 10 Feb 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/02/episode-182-does-open-source-owe-us.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about open source maintainers and building communities. While an open source maintainer doesn&amp;rsquo;t owe anyone anything, there are some difficult conversations around holding back a community rather than letting it flourish.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode199s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_182_Does_open_source_owe_us_anything.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_182_Does_open_source_owe_us_anything.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_182_Does_open_source_owe_us_anything.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://words.steveklabnik.com/a-sad-day-for-rust&#34;&gt;Actix-web story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/lodash/lodash&#34;&gt;Lodash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/lodash/lodash/pull/4518&#34;&gt;Possible Lodash security issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/javascript-libraries-are-almost-never-updated/&#34;&gt;Javascript libraries are almost never updated&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.ularn.org/&#34;&gt;Ularn&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f2891-scaffold-3578310.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/16aeb-scaffold-3578310.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 181 - The security of SIM swapping</title>
      <link>https://opensourcesecurity.io/2020/02/03/episode-181-the-security-of-sim-swapping/</link>
      <pubDate>Mon, 03 Feb 2020 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/02/episode-181-security-of-sim-swapping.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about SIM swapping. What is it, how does it work. Why should you care? There&amp;rsquo;s not a ton you can do to protect yourself, but we go over some of the basic concepts and what to watch out for. It&amp;rsquo;s unfortunate this is still a problem.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode198s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_181_The_security_of_SIM_swapping.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_181_The_security_of_SIM_swapping.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_181_The_security_of_SIM_swapping.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://hotforsecurity.bitdefender.com/blog/five-major-us-wireless-carriers-are-vulnerable-to-sim-swapping-22085.html?cid=soc%7Cc%7ctw%7CH4S&#34;&gt;Five Major US Wireless Carriers Are Vulnerable to SIM Swapping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.edmontonpolice.ca/CrimePrevention/PersonalFamilySafety/OnlineSafety/TechSafety&#34;&gt;Edmonton Police SIM swap website&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#SIMSwap&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 180 - A Tale of Two Vulnerabilities</title>
      <link>https://opensourcesecurity.io/2020/01/27/episode-180-a-tale-of-two-vulnerabilities/</link>
      <pubDate>Mon, 27 Jan 2020 01:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/01/episode-180-tale-of-two-vulnerabilities.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about two recent vulnerabilities that have had very different outcomes. One was the Citrix remote code execution flaw. While the flaw is bad, the handling of the flaw was possibly worse than the flaw itself. The other was the Microsoft ECC encryption flaw. It was well handled even though it was hard to understand and it is a pretty big deal. As all these things go, fixing and disclosing vulnerabilities is hard.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 179 - Google Project Zero and the 90 day clock</title>
      <link>https://opensourcesecurity.io/2020/01/20/episode-179-google-project-zero-and-the-90-day-clock/</link>
      <pubDate>Mon, 20 Jan 2020 00:34:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/01/episode-179-google-project-zero-and-90.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the updated Google Project Zero disclosure policy. What&amp;rsquo;s the new policy, what does it mean, and will it really matter? We suspect it will improve some things, but won&amp;rsquo;t drastically change much.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode195s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_179_Google_Project_Zero_and_the_90_day_clock.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_179_Google_Project_Zero_and_the_90_day_clock.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_179_Google_Project_Zero_and_the_90_day_clock.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/google-ditches-patch-disclosure-90-day-policy/151626/&#34;&gt;Google and 90 day patch disclosure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=PH1BKPSGcxQ&#34;&gt;Upgrading all Windows versions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#GoogleProject0&lt;/li&gt;
&lt;li&gt;#CoordinatedDisclosure&lt;/li&gt;
&lt;li&gt;#ResponsibleDisclosure&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e93f0-time-machine-1974990.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/897ea-time-machine-1974990.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 178 - Are CVEs important and will ransomware put you out of business?</title>
      <link>https://opensourcesecurity.io/2020/01/13/episode-178-are-cves-important-and-will-ransomware-put-you-out-of-business/</link>
      <pubDate>Mon, 13 Jan 2020 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/01/episode-178-are-cves-important-and-will.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a discussion on Twitter about if discovering CVE IDs is important for a resume? We don&amp;rsquo;t think it is. We also discuss the idea of ransomware putting a company out of business. Did it really? Possibly but it probably won&amp;rsquo;t create any substantial change in the industry.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode192s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_178_Are_CVEs_important_and_will_ransomware_put_you_out_of_busines.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_178_Are_CVEs_important_and_will_ransomware_put_you_out_of_busines.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_178_Are_CVEs_important_and_will_ransomware_put_you_out_of_busines.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/user/gamesdonequick/featured&#34;&gt;Games Done Quick&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/ransomware-attack-topples-telemarketing-firm/151530/&#34;&gt;Ransomware puts company out of business&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnet.com/news/malwarebytes-state-of-ransomware-shutting-down-1-in-5-affected-small-businesses/&#34;&gt;1 in 5 companies shut down due to ransomware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://unchainedpodcast.com/how-i-got-sim-swapped-and-how-to-protect-yourself/&#34;&gt;Laura Shin SIM Swap Podcast&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 177 - Fake or real? The security of counterfeit goods</title>
      <link>https://opensourcesecurity.io/2020/01/06/episode-177-fake-or-real-the-security-of-counterfeit-goods/</link>
      <pubDate>Mon, 06 Jan 2020 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2020/01/episode-177-fake-or-real-security-of.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about marketplace safety and security. Will we ever see an end to the constant flow of counterfeit goods? The security industry has the same problem the marketplace industry has, without substantial injury we don&amp;rsquo;t see movement towards meaningful change.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode193s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_177_Fake_or_real_The_security_of_counterfeit_goods.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_177_Fake_or_real_The_security_of_counterfeit_goods.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_177_Fake_or_real_The_security_of_counterfeit_goods.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bricklink.com/&#34;&gt;BrickLink&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/canada/ottawa/smart-vehicles-recall-engine-fire-1.4657669&#34;&gt;Cars in Canada lighting on fire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forgottenhistoryblog.com/president-roosevelt-used-to-ride-around-in-al-capones-limousine/&#34;&gt;President Roosevelt used Al Capone&amp;rsquo;s Limo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnn.com/2019/12/20/tech/amazon-fake-kids-products/index.html&#34;&gt;Dangerous car seats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/funny/comments/47c2qe/when_you_buy_a_1tb_hard_disk_from_china_but_its/&#34;&gt;Fake external hard drive&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 176 - The &#39;predictions are stupid&#39; prediction episode</title>
      <link>https://opensourcesecurity.io/2019/12/30/episode-176-the-predictions-are-stupid-prediction-episode/</link>
      <pubDate>Mon, 30 Dec 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/12/episode-176-predictions-are-stupid.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about security predictions for 2020. None of the predictions are even a bit controversial or unexpected. We&amp;rsquo;re in a state of slow change, without disruptive technology next year will look a lot like this year.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode191s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_176_The_predictions_are_stupid_prediction_episode.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_176_The_predictions_are_stupid_prediction_episode.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_176_The_predictions_are_stupid_prediction_episode.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.visualcapitalist.com/rising-speed-technological-adoption/&#34;&gt;The Rising Speed of Technological Adoption&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.slackcertified.com/&#34;&gt;Slack Certified&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/GDPR_fines_and_notices&#34;&gt;GDPR Fines and Notices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9d0f6-tarot-1775322.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/78c7c-tarot-1775322.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 175 - Defenders will always be one step behind</title>
      <link>https://opensourcesecurity.io/2019/12/23/episode-175-defenders-will-always-be-one-step-behind/</link>
      <pubDate>Mon, 23 Dec 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/12/episode-175-defenders-will-always-be.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the opportunistic nature of crime. Defenders have to defend, which means the adversaries are by definition always a step ahead. We use the context of automobile crimes to frame the discussion.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode190s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_175_Defenders_will_always_be_one_step_behind.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_175_Defenders_will_always_be_one_step_behind.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_175_Defenders_will_always_be_one_step_behind.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://driving.ca/toyota/auto-news/news/thieves-stealing-toyota-lexus-vehicles-using-key-fob-relay-technique-police-warn&#34;&gt;Stealing cars with radio relays&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://spectrum.ieee.org/geek-life/hands-on/a-40-softwaredefined-radio&#34;&gt;RTL Software Defined Radio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/canada/calgary/most-stolen-vehicle-insurance-bureau-canada-ford-f350-1.5383065&#34;&gt;Canada most stolen car&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1a235-stairs-3958661.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fbdbc-stairs-3958661.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 174 - GitHub turns security up to 11; A discussion with Rob Schultheis</title>
      <link>https://opensourcesecurity.io/2019/12/16/episode-174-github-turns-security-up-to-11-a-discussion-with-rob-schultheis/</link>
      <pubDate>Mon, 16 Dec 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/12/episode-174-github-turns-security-up-to.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://github.com/rschultheis&#34;&gt;Rob Schultheis&lt;/a&gt; from GitHub about some of the amazing projects GitHub is working on. We discuss GitHub security advisories, getting a CVE from GitHub, and what the new GitHub Security Lab is doing. It&amp;rsquo;s a great conversation about how GitHub is working to make security better for all of us.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode189s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_174_GitHub_turns_security_up_to_11_A_discussion_with_Rob_Schultheis.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_174_GitHub_turns_security_up_to_11_A_discussion_with_Rob_Schultheis.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_174_GitHub_turns_security_up_to_11_A_discussion_with_Rob_Schultheis.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://help.github.com/en/github/managing-security-vulnerabilities/about-github-security-advisories&#34;&gt;GitHub Security Advisories&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://help.github.com/en/github/managing-security-vulnerabilities/about-github-security-advisories#cve-identification-numbers&#34;&gt;GitHub CVE requests&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://securitylab.github.com/&#34;&gt;GitHub Security Lab&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GHSecurityLab/status/1199054576927686657&#34;&gt;GitHub Security Lab Slack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/GHSecurityLab&#34;&gt;GitHub Security Lab Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#CodeQL&lt;/li&gt;
&lt;li&gt;#GitHub&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 173 - Ho Ho Homeland Security</title>
      <link>https://opensourcesecurity.io/2019/12/09/episode-173-ho-ho-homeland-security/</link>
      <pubDate>Mon, 09 Dec 2019 00:10:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/12/episode-173-ho-ho-homeland-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; Santa and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk the border nightmare Santa Clause has to deal with as he traverses the globe. Questions we explore include: Are the reindeer farm animals? Is the North Pole a farm? Is Santa an intellectual property thief? Does Krampus eat politicians? Does Santa have a passport? Does Santa have an emergency radio?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode188s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_173_Ho_Ho_Homeland_Security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_173_Ho_Ho_Homeland_Security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_173_Ho_Ho_Homeland_Security.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Pirate_Joe%27s&#34;&gt;Pirate Joes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/09bcc-christmas-4618045.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/72ef4-christmas-4618045.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 172 - The security of planned obsolescence</title>
      <link>https://opensourcesecurity.io/2019/12/02/episode-172-the-security-of-planned-obsolescence/</link>
      <pubDate>Mon, 02 Dec 2019 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/12/episode-172-security-of-planned.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security implications of planned obsolescence. We use Intel&amp;rsquo;s recent decision to remove old drivers from their website as the start of the conversation. By the end we realize this is more of a decision society needs to understand and make more than anything. Is constantly throwing out technology OK?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode187s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_172_The_security_of_planned_obsolescence.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_172_The_security_of_planned_obsolescence.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_172_The_security_of_planned_obsolescence.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/intel-to-remove-old-drivers-and-bios-updates-from-its-site-by-the-end-of-the-week/&#34;&gt;Intel removes old drivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=PH1BKPSGcxQ&#34;&gt;Upgrading all versions of Windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=8mHXwmULOvk&#34;&gt;Sniffing your Smart TV&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 171 - Measuring cybersecurity with Kathryn Waldron</title>
      <link>https://opensourcesecurity.io/2019/11/25/episode-171-measuring-cybersecurity-with-kathryn-waldron/</link>
      <pubDate>Mon, 25 Nov 2019 01:44:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/11/episode-171-measuring-cybersecurity.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Kathryn Waldron of the R Street Institute about a paper she recently published that collects a number of cybersecurity measuring devices in one place.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode186s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_171_Measuring_cybersecurity_with_Kathryn_Waldron.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_171_Measuring_cybersecurity_with_Kathryn_Waldron.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_171_Measuring_cybersecurity_with_Kathryn_Waldron.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rstreet.org/team/kathryn-waldron/&#34;&gt;Kathryn Waldron&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/WaldronKathryn&#34;&gt;Kathryn&amp;rsquo;s Twitter account&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rstreet.org/2019/10/29/resources-for-measuring-cybersecurity/&#34;&gt;Resources for Measuring Cybersecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/927/&#34;&gt;There are 14 standards&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#Regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e29bd-measure-1509707.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9a815-measure-1509707.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 170 - Until that quantum computer is cracking RSA keys, go sit back down!</title>
      <link>https://opensourcesecurity.io/2019/11/18/episode-170-until-that-quantum-computer-is-cracking-rsa-keys-go-sit-back-down/</link>
      <pubDate>Mon, 18 Nov 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/11/episode-170-until-that-quantum-computer.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about banking and privacy. It&amp;rsquo;s very likely nothing will get better anytime soon, humans will continue to be terrible at understanding certain risks. We also discuss what quantum supremacy means (or doesn&amp;rsquo;t  mean) for security.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode185s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_170_Until_that_quantum_computer_is_cracking_RSA_keys_go_sit_back_down.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_170_Until_that_quantum_computer_is_cracking_RSA_keys_go_sit_back_down.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_170_Until_that_quantum_computer_is_cracking_RSA_keys_go_sit_back_down.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbc.ca/news/canada/nova-scotia/national-bank-canada-customer-banking-privacy-1.5334059&#34;&gt;National Bank Privacy Issues&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/2019/10/24/ibm-tears-into-googles-quantum-supremacy-claim/&#34;&gt;Quantum Supremecy Claims&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Hype_cycle&#34;&gt;Hype Cycle&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=SGxKhUuZ0Rc&amp;amp;feature=emb_logo&#34;&gt;Scottish person talking to Siri&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.smbc-comics.com/comic/the-talk-3&#34;&gt;SMBC Quantum Comic&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d9d26-physics-4524966.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/7c250-physics-4524966.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 169 - What happens when leadership doesn&#39;t care about security?</title>
      <link>https://opensourcesecurity.io/2019/11/11/episode-169-what-happens-when-leadership-doesnt-care-about-security/</link>
      <pubDate>Mon, 11 Nov 2019 01:19:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/11/episode-169-what-happens-when.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about government security incidents. The security concerns at the government level often have real life and death consequences. What happens when the leadership knowingly disregards security policy?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode181s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_169_What_happens_when_leadership_doesnt_care_about_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_169_What_happens_when_leadership_doesnt_care_about_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_169_What_happens_when_leadership_doesnt_care_about_security.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.marketwatch.com/story/republicans-barge-into-scif-and-sideline-deposition-of-pentagons-laura-cooper-2019-10-23&#34;&gt;Breaking into a SCIF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cpomagazine.com/cyber-security/exodus-of-cyber-security-team-could-expose-white-house-to-cyber-attacks/&#34;&gt;Whitehouse cybersecurity team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cryptomuseum.com/covert/bugs/selectric/&#34;&gt;Bugged typewriter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0c4e5-house-2308799.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0ab58-house-2308799.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 168 - The draconian draconians of DRM</title>
      <link>https://opensourcesecurity.io/2019/11/04/episode-168-the-draconian-draconians-of-drm/</link>
      <pubDate>Mon, 04 Nov 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/11/episode-168-draconian-draconians-of-drm.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the social norms of security. We also discuss security coprocessors and the reasons behind adding them to hardware. Is DRM a draconian security measure or do we need it to secure the future? We also touch on the story of NordVPN getting hacked. The real story isn&amp;rsquo;t they got hacked, the story is they responded like clowns. The actual problem was one of leadership, there are certain leadership skills you can&amp;rsquo;t be taught, you can only learn.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 167 - Security is terrible because digital literacy is terrible</title>
      <link>https://opensourcesecurity.io/2019/10/28/episode-167-security-is-terrible-because-digital-literacy-is-terrible/</link>
      <pubDate>Mon, 28 Oct 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/10/episode-167-security-is-terrible.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the horrid state of digital literacy in the US. We start out talking about broken Phillips Hue light bulbs, then discuss research from Pew on the digital literacy of Americans. We may have accidentally discovered a use for all the cookie warnings every web site has.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode183s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_167_Security_is_terrible_because_digital_literacy_is_terrible.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_167_Security_is_terrible_because_digital_literacy_is_terrible.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_167_Security_is_terrible_because_digital_literacy_is_terrible.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pewinternet.org/2019/10/09/americans-and-digital-knowledge/&#34;&gt;Pew Research on American&amp;rsquo;s Digitcal Literacy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/49f30-letters-3704026.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/134b7-letters-3704026.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 166 - Every day should be cybersecurity awareness month!</title>
      <link>https://opensourcesecurity.io/2019/10/21/episode-166-every-day-should-be-cybersecurity-awareness-month/</link>
      <pubDate>Mon, 21 Oct 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/10/episode-166-every-day-should-be.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; about cybersecurity awareness month. What&amp;rsquo;s our actionable advice we can give out? There isn&amp;rsquo;t much which is a fundamental part of the problem.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode194s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_166_Every_day_should_be_cybersecurity_awareness_month.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_166_Every_day_should_be_cybersecurity_awareness_month.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_166_Every_day_should_be_cybersecurity_awareness_month.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://niccs.us-cert.gov/national-cybersecurity-awareness-month-2019&#34;&gt;Cybersecurity awareness month&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/news/articles/2019-10-06/china-is-breeding-giant-pigs-the-size-of-polar-bears&#34;&gt;Polar bear sized pigs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b5e4d-calendar-660670.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/53511-calendar-660670.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 165 - Grab Bag of Microsoft Security News</title>
      <link>https://opensourcesecurity.io/2019/10/13/episode-165-grab-bag-of-microsoft-security-news/</link>
      <pubDate>Sun, 13 Oct 2019 23:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/10/episode-165-grab-bag-of-microsoft.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; about a number of Microsoft security news items. They&amp;rsquo;ve changed how they are handling encrypted disks and are now forcing cloud logins on Windows users.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode180s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_165_Grab_Bag_of_Microsoft_Security_News.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_165_Grab_Bag_of_Microsoft_Security_News.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_165_Grab_Bag_of_Microsoft_Security_News.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://support.microsoft.com/en-us/help/4516071/windows-10-update-kb4516071&#34;&gt;Microsoft KB 4516071&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2007/04/a_security_mark.html&#34;&gt;A Security Market for Lemons&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://seifried.org/security/advisories/kssa-003.html&#34;&gt;Kurt&amp;rsquo;s file wiping advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=XqsAFdFsQmQ&#34;&gt;Lock Picking Lawyer vs Consumer Reports&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Sun_Ray&#34;&gt;Sun Ray&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/bgolus/status/1080213166116597760&#34;&gt;Linux Gamers: 20% of auto reported crashes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/594fc-equipment-3293047.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6ff8e-equipment-3293047.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 164 - DNS over HTTPS: Probably not the end of the world</title>
      <link>https://opensourcesecurity.io/2019/10/07/episode-164-dns-over-https-probably-not-the-end-of-the-world/</link>
      <pubDate>Mon, 07 Oct 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/10/episode-164-dns-over-https-probably-not.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; about DNS over HTTPS and how it may or may not destroy civilization. We also discuss the disruption of cloud in the context of security and touch on the news that GitHub is now a CVE CNA!&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode179s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_164_DNS_over_HTTPS_Probably_not_the_end_of_the_world.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_164_DNS_over_HTTPS_Probably_not_the_end_of_the_world.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_164_DNS_over_HTTPS_Probably_not_the_end_of_the_world.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/&#34;&gt;DNS over HTTPS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act&#34;&gt;California Privacy Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://defensivesecurity.org/&#34;&gt;Defensive Security Podcast&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/news/archives/2019/news.html#September182019_GitHub_Added_as_CVE_Numbering_Authority_CNA&#34;&gt;GitHub is a CNA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#DoH&lt;/li&gt;
&lt;li&gt;#DNSOverHTTPS&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0e7a9-city-2444516.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/14a4a-city-2444516.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 163 - Death to Python 2</title>
      <link>https://opensourcesecurity.io/2019/09/30/episode-163-death-to-python-2/</link>
      <pubDate>Mon, 30 Sep 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/09/episode-163-death-to-python-2.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; about the upcoming Python 2 EOL. What does it mean, why does it matter, and what you can you do?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode178s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_163_Death_to_python_2.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_163_Death_to_python_2.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_163_Death_to_python_2.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://pythonclock.org/&#34;&gt;Python Clock&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.python.org/doc/sunset-python-2/&#34;&gt;Python&amp;rsquo;s statement about sunsetting Python 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wi-fi.org/discover-wi-fi/wi-fi-certified-6&#34;&gt;wifi 6&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c555b-grave-2036220.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c297e-grave-2036220.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 162 - SBOM with Allan Friedman</title>
      <link>https://opensourcesecurity.io/2019/09/23/episode-162-sbom-with-allan-friedman/</link>
      <pubDate>Mon, 23 Sep 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/09/episode-162-sbom-with-allan-friedman.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and Kurt speak with Allan Friedman of the US National Telecommunications and Information Administration about Software Bill of Materials. Where are we today, where are things going, and how you can help.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode177s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_162_SBOM_with_Allan_Friedman.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_162_SBOM_with_Allan_Friedman.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_162_SBOM_with_Allan_Friedman.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/allanfriedman&#34;&gt;Allan Friedman&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ntia.doc.gov/&#34;&gt;NTIA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ntia.doc.gov/SoftwareTransparency&#34;&gt;NTIA Software Component Transparency&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9cc1e-assortment-1868297.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8893a-assortment-1868297.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 161 - Human nature and ad powered open source</title>
      <link>https://opensourcesecurity.io/2019/09/16/episode-161-human-nature-and-ad-powered-open-source/</link>
      <pubDate>Mon, 16 Sep 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/09/episode-161-human-nature-and-ad-powered.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; start out discussing human nature and how it affects how we view security. A lot of things that look easy are actually really hard. We also talk about the npm library Standard showing command line ads. Are ads part of the future of open source?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode175s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_161_Human_nature_and_ad_powered_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_161_Human_nature_and_ad_powered_open_source.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_161_Human_nature_and_ad_powered_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/thegrugq/status/1168983377082572803?lang=en&#34;&gt;thegrugq secure android&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.clearancejobs.com/2019/07/18/dods-jedi-cloud-contract-in-the-home-stretch-with-aws-or-microsoft-award-imminent/&#34;&gt;DoD JEDI program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.mozilla.org/blog/2019/09/03/todays-firefox-blocks-third-party-tracking-cookies-and-cryptomining-by-default/&#34;&gt;Firefox privacy settings&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/popular-javascript-library-starts-showing-ads-in-its-terminal/&#34;&gt;Standard ads&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Max_Headroom_(character)&#34;&gt;Max Headroom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 160 - Disclosing security issues is insanely complicated: Part 2</title>
      <link>https://opensourcesecurity.io/2019/09/09/episode-160-disclosing-security-issues-is-insanely-complicated-part-2/</link>
      <pubDate>Mon, 09 Sep 2019 00:06:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/09/episode-160-disclosing-security-issues.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about disclosing security flaws in open source. This is part two of a discussion around how to disclose security issues. This episode focuses on some expectations and behaviors for open source projects as well as researchers trying to disclose a problem to a project.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode174s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_160_Disclosing_security_issues_is_insanely_complicated_Part_2.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_160_Disclosing_security_issues_is_insanely_complicated_Part_2.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_160_Disclosing_security_issues_is_insanely_complicated_Part_2.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://thehackernews.com/2019/08/webmin-vulnerability-hacking.html&#34;&gt;webmin backdoor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://help.github.com/en/articles/about-maintainer-security-advisories&#34;&gt;Github security advisories&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/59b67-rails-3309912.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d26c3-rails-3309912.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 159 - Disclosing security issues is insanely complicated: Part 1</title>
      <link>https://opensourcesecurity.io/2019/09/02/episode-159-disclosing-security-issues-is-insanely-complicated-part-1/</link>
      <pubDate>Mon, 02 Sep 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/09/episode-159-disclosing-security-issues.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about disclosing security flaws. It&amp;rsquo;s a topic that&amp;rsquo;s come up a few times in the last few weeks and it&amp;rsquo;s more complicated than it&amp;rsquo;s ever been. We certainly ask more questions than we answer in this episode, there will be a part 2 that focuses on open source disclosure.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode173s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_159_Disclosing_security_issues_is_insanely_complicated_Part_1.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_159_Disclosing_security_issues_is_insanely_complicated_Part_1.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_159_Disclosing_security_issues_is_insanely_complicated_Part_1.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ&#34;&gt;Lock Picking Lawyer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html&#34;&gt;Tavis&amp;rsquo; Windows flaw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Backdoors in open source are here to stay</title>
      <link>https://opensourcesecurity.io/2019/08/28/backdoors-in-open-source-are-here-to-stay/</link>
      <pubDate>Wed, 28 Aug 2019 14:20:17 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=349</guid> 
      <description>&lt;p&gt;Unless you&amp;rsquo;ve been living under a rock for the past few &amp;hellip; forever, you may have noticed that open source is taking took over the world. If software ate the world, open source is the dessert course. As of late there have been an uptick in stories about backdoors in open source software. These backdoors were put there by what is assumed to be &amp;ldquo;bad people&amp;rdquo; which is probably accurate since everyone is a villain in some way.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 158 - The mess that we call credit agencies in the US</title>
      <link>https://opensourcesecurity.io/2019/08/26/episode-158-the-mess-that-we-call-credit-agencies-in-the-us/</link>
      <pubDate>Mon, 26 Aug 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/08/episode-158-mess-that-we-call-credit.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the current state of credit security freezes in the US. We recount a thrilling tale of all the things Josh had to do to get new Internet service. It was all quite silly really.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode172s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_158_The_mess_that_we_call_credit_agencies_in_the_US.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_158_The_mess_that_we_call_credit_agencies_in_the_US.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_158_The_mess_that_we_call_credit_agencies_in_the_US.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/information-technology/2017/09/equifax-moves-to-fix-weak-pins-for-security-freeze-on-consumer-credit-reports/&#34;&gt;Weak security freeze pins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/null-license-plate-landed-one-hacker-ticket-hell/&#34;&gt;&amp;rsquo;null&amp;rsquo; license plate&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e2450-chaos-627218.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/39602-chaos-627218.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 157 - Backdoors and snake oil in our cryptography</title>
      <link>https://opensourcesecurity.io/2019/08/19/episode-157-backdoors-and-snake-oil-in-our-cryptography/</link>
      <pubDate>Mon, 19 Aug 2019 01:37:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/08/episode-157-backdoors-and-snake-oil-in.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about snakeoil cryptography at Black Hat and the new backdoored cryptography fight. Both of these problems will be with us for a very long time. These are fights worth fighting because it&amp;rsquo;s the right thing to do.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode171s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_157_Backdoors_and_snake_oil_in_our_cryptography.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_157_Backdoors_and_snake_oil_in_our_cryptography.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_157_Backdoors_and_snake_oil_in_our_cryptography.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dropbox.com/s/llp24loq5odvyhk/Crown%20Sterling%20CEO%20-%20BH%2008.07.19.mov?dl=0&#34;&gt;Time AI video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1160951422537437185&#34;&gt;Kurt&amp;rsquo;s Tweet about technical explanations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/08/13/appsec-isnt-people/&#34;&gt;Josh&amp;rsquo;s blog post about bug training&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2019/08/attorney_genera.html&#34;&gt;Schneier on Barr&amp;rsquo;s encryption discussion&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Appsec isn&#39;t people</title>
      <link>https://opensourcesecurity.io/2019/08/13/appsec-isnt-people/</link>
      <pubDate>Tue, 13 Aug 2019 13:10:44 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=338</guid> 
      <description>&lt;p&gt;Recently there was a &lt;a href=&#34;https://twitter.com/joshbressers/status/1160959011027656706&#34;&gt;thread&lt;/a&gt; on Twitter I stuck my nose into about appsec and why it doesn&amp;rsquo;t work.&lt;/p&gt;
&lt;p&gt;I have a response in there that I believe is a nice way to explain my biggest problem with appsec. I would sum it up as &amp;ldquo;Appsec isn&amp;rsquo;t people&amp;rdquo;. Here is a clever image to help.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;appsec-isnt-people&#34; loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2019/08/appsec-isnt-people.jpg&#34;&gt;&lt;/p&gt;
&lt;p&gt;You know you can take it seriously because the text is green.&lt;/p&gt;
&lt;p&gt;The best way to think about this is to ask a different but related question. Why don&amp;rsquo;t we have training for developers to write code with fewer bugs? Even the suggestion of this would be ridiculed by every single person in the software world. I can only imagine the university course &amp;ldquo;CS 107: Error free development&amp;rdquo;. Everyone would fail the course. It would probably be a blast to teach, you could spend the whole semester yelling at the students for being stupid and not just writing code with fewer bugs. You don&amp;rsquo;t even have to grade anything, just fail them all because you know the projects have bugs.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 156 - What if we MitM a whole country?</title>
      <link>https://opensourcesecurity.io/2019/07/29/episode-156-what-if-we-mitm-a-whole-country/</link>
      <pubDate>Mon, 29 Jul 2019 00:25:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/07/episode-156-what-if-we-mitm-whole.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Kazakhstan requiring citizens to place a government controlled root CA certificate on their computers. How does this work. What does it mean for the citizens of Kazakhstan, and why we all should be paying attention.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode170s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_156_What_if_we_MitM_a_whole_country.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_156_What_if_we_MitM_a_whole_country.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_156_What_if_we_MitM_a_whole_country.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/technology-49071222&#34;&gt;Kazakhstan MitM all TLS traffic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugzilla.mozilla.org/show_bug.cgi?id=1567114&#34;&gt;Mozilla bug&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c661c-sculpture-2209152.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f3769-sculpture-2209152.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why you can&#39;t backdoor cryptography</title>
      <link>https://opensourcesecurity.io/2019/07/26/why-you-cant-backdoor-cryptography/</link>
      <pubDate>Fri, 26 Jul 2019 13:10:24 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=301</guid> 
      <description>&lt;p&gt;Once again the topic of backdooring cryptography is in the news. The same people will fight the same fight. Again. So far sanity has prevailed every time we do this, but that doesn&amp;rsquo;t mean anyone should sit this one out. Make sure you tell everyone to pay attention and care. Trustworthy cryptography is too important.&lt;/p&gt;
&lt;p&gt;Given the language used it sounds a lot like what&amp;rsquo;s really being discussed is having the ability to view chat apps, view emails, and unlock phones. All things with a consumer focus. They&amp;rsquo;ve lost this fight more times than we can count now, no doubt this direction change is an attempt to spread confusion.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 155 - Stealing cars and ransomware</title>
      <link>https://opensourcesecurity.io/2019/07/22/episode-155-stealing-cars-and-ransomware/</link>
      <pubDate>Mon, 22 Jul 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/07/episode-155-stealing-cars-and-ransomware.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new way to steal cars because a service didn&amp;rsquo;t do proper background checks. We also discuss how this relates to working with criminals, such as ransomware, and what it means for the future of the ransomware industry.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode169s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_155_Stealing_cars_and_ransomware.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_155_Stealing_cars_and_ransomware.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_155_Stealing_cars_and_ransomware.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=20434719&#34;&gt;Car2go theft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.alberta.ca/drivers-licence-security-features.aspx&#34;&gt;Alberta driver&amp;rsquo;s license security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Albertosaurus&#34;&gt;Albertosaurus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenevadaindependent.com/article/as-hackers-target-u-s-cities-las-vegas-signs-on-to-resolution-not-to-pay-future-ransoms&#34;&gt;Las Vegas won&amp;rsquo;t pay a ransom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/cc16b-car-1590508.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f5902-car-1590508.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 154 - Chat with the authors of the book &amp;quot;The Fifth Domain&amp;quot;</title>
      <link>https://opensourcesecurity.io/2019/07/16/episode-154-chat-with-the-authors-of-the-book-the-fifth-domain/</link>
      <pubDate>Tue, 16 Jul 2019 00:10:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/07/episode-154-chat-with-authors-of-book.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to the authors of a new book &lt;em&gt;The Fifth Domain.&lt;/em&gt; Dick Clarke and Rob Knake join us to discuss the book, cybersecurity, US policy, how we got where we are today and what the future holds for cybersecurity.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode167s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_154_Chat_with_the_authors_of_the_book_The_Fifth_Domain.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_154_Chat_with_the_authors_of_the_book_The_Fifth_Domain.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_154_Chat_with_the_authors_of_the_book_The_Fifth_Domain.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Fifth-Domain-Defending-Companies-Ourselves/dp/052556196X&#34;&gt;The Fifth Domain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/richardclarke&#34;&gt;Dick Clarke&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/robknake&#34;&gt;Rob Knake&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://futurestatepodcast.com/&#34;&gt;Future State Podcast&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#FifthDomain&lt;/li&gt;
&lt;li&gt;#Cybersecurity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a3e07-img_20190711_153620.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f1740-img_20190711_153620.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 153 - The unexpected security of AI, photographs, and VPN</title>
      <link>https://opensourcesecurity.io/2019/07/08/episode-153-the-unexpected-security-of-ai-photographs-and-vpn/</link>
      <pubDate>Mon, 08 Jul 2019 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/07/episode-153-unexpected-security-of-ai.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about user expectations around Facebook&amp;rsquo;s AI. Normal people are starting to see the capabilities and potential risk with all these services. We also cover the topic of China owning a number of VPN services.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode166s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_153_The_unexpected_security_of_AI_photographs_and_VPN.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_153_The_unexpected_security_of_AI_photographs_and_VPN.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_153_The_unexpected_security_of_AI_photographs_and_VPN.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/alexstamos/status/1146486510906007553&#34;&gt;Facebook&amp;rsquo;s AI descriptions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.computerweekly.com/news/252466203/Top-VPNs-secretly-owned-by-Chinese-firms?amp=1&#34;&gt;China owns a lot of VPNs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thatoneprivacysite.net/&#34;&gt;VPN comparison&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/33870-calculator-695084.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a6896-calculator-695084.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 152 - Tavis breaks the world ... again</title>
      <link>https://opensourcesecurity.io/2019/07/01/episode-152-tavis-breaks-the-world-again/</link>
      <pubDate>Mon, 01 Jul 2019 01:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/06/episode-152-tavis-breaks-world-again.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the disclosure of security vulnerabilities. It&amp;rsquo;s still not a settled topic, we frame the conversation around a recent disclosure from Tavis Ormandy of Google Project Zero.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode165s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_152_Tavis_breaks_the_world_again.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_152_Tavis_breaks_the_world_again.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_152_Tavis_breaks_the_world_again.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/taviso&#34;&gt;Tavis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/thegrugq/status/1139118905601871874&#34;&gt;Tavis ruins everything&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Cult-Dead-Cow-Original-Supergroup/dp/154176238X&#34;&gt;cDc book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.artificiallawyer.com/2019/06/04/france-bans-judge-analytics-5-years-in-prison-for-rule-breakers/&#34;&gt;France Bans Judge Analytics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elastic.co/about/our-source-code&#34;&gt;Elastic Source Code&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bd997-fantasy-4101146.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fdd93-fantasy-4101146.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 151 - The DARPA Cyber Grand Challenge with David Brumley</title>
      <link>https://opensourcesecurity.io/2019/06/24/episode-151-the-darpa-cyber-grand-challenge-with-david-brumley/</link>
      <pubDate>Mon, 24 Jun 2019 02:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/06/episode-151-darpa-cyber-grand-challenge.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to David Brumley. The CEO of ForAllSecure and professor at CMU. We discuss when David&amp;rsquo;s team won the Cyber Grand Challenge, what the future of automated security looks like, and what ForAllSecure is doing. It&amp;rsquo;s a fascinating window into the future of the industry.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode164s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_151_The_Darpa_Cyber_Grand_Challenge_with_David_Brumley.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_151_The_Darpa_Cyber_Grand_Challenge_with_David_Brumley.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_151_The_Darpa_Cyber_Grand_Challenge_with_David_Brumley.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/thedavidbrumley&#34;&gt;David Brumley&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://forallsecure.com/&#34;&gt;ForAllSecure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.darpa.mil/program/cyber-grand-challenge&#34;&gt;Cyber Grand Challenge&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d7cd3-cybergrandchallenge_619x316.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9fef1-cybergrandchallenge_619x316.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 150 - Our ad funded dystopian present</title>
      <link>https://opensourcesecurity.io/2019/06/17/episode-150-our-ad-funded-dystopian-present/</link>
      <pubDate>Mon, 17 Jun 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/06/episode-150-our-ad-funded-dystopian.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the future Chrome and ad blockers. There is a lot of nuance to unpack around this one. There are two versions of the Internet today. One with an ad blocker and one without. The Internet without an ad blocker is a dystopian nightmare. The actionable advice at the end of this one is to use Firefox.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode161s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_150_Our_ad_funded_dystopian_present.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_150_Our_ad_funded_dystopian_present.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_150_Our_ad_funded_dystopian_present.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnet.com/news/google-holds-firm-on-chrome-changes-that-may-break-ad-blockers/&#34;&gt;Chrome ad blocking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mozilla.org/en-US/firefox/new/?redirect_source=firefox-com&#34;&gt;Firefox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Mozilla_Foundation&#34;&gt;Mozilla funding&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://donate.mozilla.org/en-US/?test=ost&amp;amp;test=htl&#34;&gt;Donate to Firefox&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 149 - Chat with Michael Coates about data security</title>
      <link>https://opensourcesecurity.io/2019/06/10/episode-149-chat-with-michael-coates-about-data-security/</link>
      <pubDate>Mon, 10 Jun 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/06/episode-149-chat-with-michael-coates.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; have a chat with Michael Coates from Altitude Networks. We cover what Altitude is up to as well as general trends we&amp;rsquo;re seeing around data security in the cloud. Michael lays out his vision for &amp;ldquo;data first security&amp;rdquo;.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode162s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_149_Chat_with_Michael_Coates_about_data_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_149_Chat_with_Michael_Coates_about_data_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_149_Chat_with_Michael_Coates_about_data_security.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/_mwc&#34;&gt;Michael Coates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://altitudenetworks.com/&#34;&gt;Altitude Networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=yvxE6wMX3Hs&#34;&gt;Michael&amp;rsquo;s Keynote&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3b829-matterhorn-425134.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6dc7f-matterhorn-425134.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 148 - You just got pwnt, what now?</title>
      <link>https://opensourcesecurity.io/2019/06/03/episode-148-you-just-got-pwnt-what-now/</link>
      <pubDate>Mon, 03 Jun 2019 00:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/06/episode-148-you-just-got-pwnt-what-now.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about public disclosure of a security incident. We start out with a story about Canva, then discuss what do you do if you have a security incident? Who do you tell, what do you tell them. How do you tell your story? It&amp;rsquo;s a really hard problem even if it&amp;rsquo;s something you&amp;rsquo;ve done many times in the past.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode168s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_148_You_just_got_pwnt_what_now.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_148_You_just_got_pwnt_what_now.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_148_You_just_got_pwnt_what_now.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/skwashd&#34;&gt;Dave Hall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/skwashd/status/1132258055767281664&#34;&gt;First Canva message&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/skwashd/status/1132479160268480512&#34;&gt;Second Canva message&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Forklift_Driver_Klaus_%E2%80%93_The_First_Day_on_the_Job&#34;&gt;Forklift safety&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.premiumbeat.com/blog/how-pixar-saved-toy-story-2/&#34;&gt;Pixar Toy Story 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://success.docker.com/article/docker-hub-user-notification&#34;&gt;Non financial database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=CJLY1eoHB04&#34;&gt;Eating Crow&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 147 - Scams and operations as part of the supply chain</title>
      <link>https://opensourcesecurity.io/2019/05/27/episode-147-scams-and-operations-as-part-of-the-supply-chain/</link>
      <pubDate>Mon, 27 May 2019 01:46:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/05/episode-147-scams-and-operations-as.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a new type of lockbox scams. We also discuss Slack being a target for nation state attacks. Do you consider your operations part of your supply chain?It&amp;rsquo;s totally part of your supply chain.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode159s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_147_Scams_and_operations_as_part_of_the_supply_chain.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_147_Scams_and_operations_as_part_of_the_supply_chain.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_147_Scams_and_operations_as_part_of_the_supply_chain.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbs46.com/investigations/better_call_harry/better-call-harry-exposing-lockbox-rental-scam/article_d9a7242a-6ae4-11e9-bad4-b3ba30648147.html&#34;&gt;Lock Box Scam&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://yro.slashdot.org/story/19/04/27/2340200/slack-warns-investors-its-a-target-for-nation-state-hacking?utm_source=rss1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;Slack nation state hacker target&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4312f-cabinet-3104612.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/13888-cabinet-3104612.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 146 - What the @#$% happened to Microsoft?</title>
      <link>https://opensourcesecurity.io/2019/05/20/episode-146-what-the-happened-to-microsoft/</link>
      <pubDate>Mon, 20 May 2019 00:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/05/episode-146-what-happened-to-microsoft.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Microsoft. They&amp;rsquo;re probably not the bad guys anymore, which is pretty wild. They&amp;rsquo;re adding a Linux kernel to Window. Can we declare open source the unquestionable winner now?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode158s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_146_What_the_happened_to_Microsoft.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_146_What_the_happened_to_Microsoft.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_146_What_the_happened_to_Microsoft.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://octoverse.github.com/&#34;&gt;Github contribution report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=hn1VxaMEjRU&#34;&gt;Are we the baddies?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ff52e-question-4101953.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/af673-question-4101953.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 145 - What do security and fire have in common?</title>
      <link>https://opensourcesecurity.io/2019/05/13/episode-145-what-do-security-and-fire-have-in-common/</link>
      <pubDate>Mon, 13 May 2019 00:42:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/05/episode-145-what-do-security-and-fire.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about fire. We discuss the history of fire prevention and how it mirrors many of things we see in security. There are lessons there for us, we just hope it doesn&amp;rsquo;t take 2000 years like it did for proper fire prevention to catch on.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode157s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_145_What_do_security_and_fire_have_in_common.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_145_What_do_security_and_fire_have_in_common.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_145_What_do_security_and_fire_have_in_common.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/History_of_firefighting&#34;&gt;History of firefighting&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ed072-fire-truck-2683877.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ab4fe-fire-truck-2683877.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 144 - The security of money, which one is best?</title>
      <link>https://opensourcesecurity.io/2019/05/06/episode-144-the-security-of-money-which-one-is-best/</link>
      <pubDate>Mon, 06 May 2019 00:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/05/episode-144-security-of-money-which-one.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security of money. Not how to keep it secure, but the security issues around using cash, credit, and bitcoin. We also talk about Banksy&amp;rsquo;s clever method for proving something is original.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode156s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_144_The_security_of_money_which_one_is_best.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_144_The_security_of_money_which_one_is_best.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_144_The_security_of_money_which_one_is_best.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bbc.com/news/uk-england-bristol-47097361&#34;&gt;Banksy ten pound note&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.bitcoin.com/researchers-find-hundreds-of-ethereum-wallets-at-risk-due-to-weak-key-pairs/&#34;&gt;Ethereum bad wallets&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/24f72-chest-2.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/df705-chest-2.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 143 - Security lessons from the phone book</title>
      <link>https://opensourcesecurity.io/2019/04/29/episode-143-security-lessons-from-the-phone-book/</link>
      <pubDate>Mon, 29 Apr 2019 00:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/04/episode-143-security-lessons-from-phone.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the phone book (yeah, the big paper book people used to use). Kurt got one in the mail. While it&amp;rsquo;s certainly a relic from another time, there were security tips in it among other wild things.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode155s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_143_Security_lessons_from_the_phone_book.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_143_Security_lessons_from_the_phone_book.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_143_Security_lessons_from_the_phone_book.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/chadloder&#34;&gt;Chad Loder&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/19bca-phone-booth-203492.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ded9e-phone-booth-203492.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 142 - Hypothetical security: what if you find a USB flash drive?</title>
      <link>https://opensourcesecurity.io/2019/04/21/episode-142-hypothetical-security-what-if-you-find-a-usb-flash-drive/</link>
      <pubDate>Sun, 21 Apr 2019 23:48:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/04/episode-142-hypothetical-security-what.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about what one could do if you find a USB drive. The context is based on the story where the Secret Service was rumored to have plugged a malicious USB drive into a computer. The purpose of discussion is to explore how to handle a situation like this in the real world. We end the episode with a fantastic comparison of swim safety and security.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode154s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_142_Hypothetical_security_what_if_you_find_a_USB_flash_drive.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_142_Hypothetical_security_what_if_you_find_a_USB_flash_drive.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_142_Hypothetical_security_what_if_you_find_a_USB_flash_drive.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2019/04/08/secret-service-mar-a-lago/&#34;&gt;Secret service flash drive story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://syncstop.com/&#34;&gt;Syncstop&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show Tags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#ImpossibleSecurity&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 141 - Timezones are hard, security is harder</title>
      <link>https://opensourcesecurity.io/2019/04/15/episode-141-timezones-are-hard-security-is-harder/</link>
      <pubDate>Mon, 15 Apr 2019 00:18:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/04/episode-141-timezones-are-hard-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the difficulty of security. We look at the difficulty of the EU not observing daylight savings time, which is probably magnitudes easier than getting security right. We also hit on a discussion on Reddit about U2F that shows the difficulty. Security today is too hard, even for the experts.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode160s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_141_Timezones_are_hard_security_is_harder.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_141_Timezones_are_hard_security_is_harder.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_141_Timezones_are_hard_security_is_harder.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://codeblog.jonskeet.uk/2019/03/27/storing-utc-is-not-a-silver-bullet/&#34;&gt;Storing time in UTC is hard&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=kAxGAIFbqu4&#34;&gt;How strong are nails and screws?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/gadgets/comments/b7xmss/googles_most_secure_logon_system_now_works_on/&#34;&gt;Reddit U2F comments&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The security of dependencies</title>
      <link>https://opensourcesecurity.io/2019/04/09/the-security-of-dependencies/</link>
      <pubDate>Wed, 10 Apr 2019 01:47:34 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=262</guid> 
      <description>&lt;p&gt;So you&amp;rsquo;ve written some software. It&amp;rsquo;s full of open source dependencies. These days all software is full of open source, there&amp;rsquo;s no way around it at this point. I explain the background in my &lt;a href=&#34;https://opensourcesecurity.io/2019/04/02/supplying-the-supply-chain/&#34;&gt;previous post&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Now that we have all this open source, how do we keep up with it? If you&amp;rsquo;re using a lot of open source in your code there could be one or more updated dependencies per day!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 140 - Good enough security is a pretty high bar</title>
      <link>https://opensourcesecurity.io/2019/04/08/episode-140-good-enough-security-is-a-pretty-high-bar/</link>
      <pubDate>Mon, 08 Apr 2019 00:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/04/episode-140-good-enough-security-is.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about identity. It&amp;rsquo;s a nice example we can generally understand in the context of how much security is enough security? When we deal with identity the idea of good enough is often acceptable for the vast majority of uses. Perfect identity tracking isn&amp;rsquo;t really a thing nor is it practical.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode153s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_140_Good_enough_security_is_a_pretty_high_bar.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_140_Good_enough_security_is_a_pretty_high_bar.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_140_Good_enough_security_is_a_pretty_high_bar.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=7vLDCJk3wNk&#34;&gt;Firefighters breaking through a door&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thelocal.de/20140625/fake-engineer-di-mauro-designed-berlin-airport-fire-system&#34;&gt;Fake engineer at the Berlin Airport&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Supplying the supply chain</title>
      <link>https://opensourcesecurity.io/2019/04/02/supplying-the-supply-chain/</link>
      <pubDate>Tue, 02 Apr 2019 23:53:10 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=261</guid> 
      <description>&lt;p&gt;A long time ago Marc Andreessen said &amp;ldquo;software is eating the world&amp;rdquo;. This statement ended up being quite profound in hindsight, as most profound statements are. At the time nobody really understood what he meant and it probably wasn&amp;rsquo;t until the public cloud caught on that it became something nobody could ignore. The future of technology was less about selling hardware as it is about building software.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;re at a point now where it&amp;rsquo;s time to rethink software. Well, the rethinking happened quite some time ago, now everyone has to catch up. Today it&amp;rsquo;s a pretty safe statement to declare open source is eating the world. Open source won, it&amp;rsquo;s everywhere, you can&amp;rsquo;t not use it. It&amp;rsquo;s not always well understood. And it&amp;rsquo;s powering your supply chain, even if you don&amp;rsquo;t know it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 139 - Secure voting, firefox send, and toxic comments on the internet</title>
      <link>https://opensourcesecurity.io/2019/04/01/episode-139-secure-voting-firefox-send-and-toxic-comments-on-the-internet/</link>
      <pubDate>Mon, 01 Apr 2019 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/03/episode-139-secure-voting-firefox-send.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Brexit, voting, Firefox send, and toxic comments. Is there anything we can do to slow the current trend of conversation on the Internet always seeming to spiral out of control? The answer is maybe with a lot of asterisks.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode150s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_139_secure_voting_firefox_send_and_toxic_comments_on_the_internet.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_139_secure_voting_firefox_send_and_toxic_comments_on_the_internet.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_139_secure_voting_firefox_send_and_toxic_comments_on_the_internet.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2019/03/12/swiss_evoting_system_vulnerability/&#34;&gt;Swiss evoting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://motherboard.vice.com/en_us/article/yw84q7/darpa-is-building-a-dollar10-million-open-source-secure-voting-system&#34;&gt;Darpa $10 million secure voting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://send.firefox.com/&#34;&gt;Firefox Send&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://yro.slashdot.org/story/19/03/13/0543249/alphabets-ai-powered-chrome-extension-hides-toxic-comments?utm_source=rss1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;Jigsaw and toxic comments&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bd07a-toxic-waste-2089779.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/75c79-toxic-waste-2089779.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 138 - Information wants to be free</title>
      <link>https://opensourcesecurity.io/2019/03/25/episode-138-information-wants-to-be-free/</link>
      <pubDate>Mon, 25 Mar 2019 00:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/03/episode-138-information-wants-to-be-free.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a prank gone wrong, the reality of when your data ends up public. Once it&amp;rsquo;s public you can&amp;rsquo;t ever put it back. We also discuss Notepad++ no longer signing releases and what signing releases means for the world in general.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode149s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_138_Information_wants_to_be_free.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_138_Information_wants_to_be_free.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_138_Information_wants_to_be_free.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://fossbytes.com/girl-arrested-japan-infinite-loop-code/&#34;&gt;Japanese girl arrested&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/seldo/status/1105153287718723584&#34;&gt;Publish package to the npm  registry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/study-shows-programmers-will-take-the-easy-way-out-and-not-implement-proper-password-security/&#34;&gt;University study on developers and passwords&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/opencpes/&#34;&gt;Kurt&amp;rsquo;s blockchain project - OpenCPEs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://notepad-plus-plus.org/news/notepad-7.6.4-released.html&#34;&gt;Notepad++ stops signing releases&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1104518292020981760&#34;&gt;What is a photocopier?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://tasvideos.org/TASBot.html&#34;&gt;TASBot&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 137.5 - Holy cow Beto was in the cDc, this is awesome!</title>
      <link>https://opensourcesecurity.io/2019/03/18/episode-137-5-holy-cow-beto-was-in-the-cdc-this-is-awesome/</link>
      <pubDate>Mon, 18 Mar 2019 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/03/episode-1375-holy-cow-beto-was-in-cdc.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Beto being in the Cult of the Dead Cow (cDc). This is a pretty big deal in a very good way. We hit on some history, why it&amp;rsquo;s a great thing, what we can probably expect from opponents. There&amp;rsquo;s even some advice at the end how we can all help. We need more politicians with backgrounds like this.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode147s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_5_Holy_cow_Beto_was_in_the_cDc_this_is_awesome.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_5_Holy_cow_Beto_was_in_the_cDc_this_is_awesome.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_5_Holy_cow_Beto_was_in_the_cDc_this_is_awesome.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow&#34;&gt;Cult of the Dead Cow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.phrack.org/&#34;&gt;Phrack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/investigates/special-report/usa-politics-beto-orourke/&#34;&gt;Beto in the cDc&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.2600.com/node/17585&#34;&gt;2600 Off the Hook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=g2cF4-tHvqI&#34;&gt;Stallman Hacker Song&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 137 - When the IoT attacks!</title>
      <link>https://opensourcesecurity.io/2019/03/11/episode-137-when-the-iot-attacks/</link>
      <pubDate>Mon, 11 Mar 2019 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/03/episode-137-when-iot-attacks.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about when devices attack! It&amp;rsquo;s not quite that exciting, but there have been a slew of news about physical devices causing problems for humans. We end on the note that we&amp;rsquo;re getting closer to a point when lawyers and regulators will start to pay attention. We&amp;rsquo;re not there yet, so we still have a horrible insecure future on the horizon.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode148s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_When_the_IoT_attacks.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_When_the_IoT_attacks.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_137_When_the_IoT_attacks.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/gadgets/2019/02/my-left-shoe-wont-even-reboot-faulty-app-bricks-nike-smart-sneakers/&#34;&gt;Bricking a shoe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2019/2/25/18240489/lime-sudden-excessive-braking-firmware-bug-scooter&#34;&gt;Lime scooters throwing passengers off&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackaday.com/2019/02/18/wifi-hides-inside-a-usb-cable/&#34;&gt;Malicious USB cables&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 136 - How people feel is more important than being right</title>
      <link>https://opensourcesecurity.io/2019/03/04/episode-136-how-people-feel-is-more-important-than-being-right/</link>
      <pubDate>Mon, 04 Mar 2019 01:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/03/episode-136-how-people-feel-is-more.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about github blocking the Deepfakes repository. There&amp;rsquo;s a far bigger discussion about how people feel, and sometimes security fails to understand that making people feel happy or safer is more important than being right.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode146s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_136_How_people_feel_is_more_important_than_being_right.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_136_How_people_feel_is_more_important_than_being_right.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_136_How_people_feel_is_more_important_than_being_right.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=19182956&#34;&gt;Github Deepfakes discussion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/sockmap-tcp-splicing-of-the-future/&#34;&gt;Cloudflare&amp;rsquo;s SOCKMAP blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f247d-zebras-606867.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/19df5-zebras-606867.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 135 - Passwords, AI, and cloud strategy</title>
      <link>https://opensourcesecurity.io/2019/02/25/episode-135-passwords-ai-and-cloud-strategy/</link>
      <pubDate>Mon, 25 Feb 2019 01:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/02/episode-135-passwords-ai-and-cloud.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about change your password day (what a terrible day). Google&amp;rsquo;s password checkup (not a terrible idea), an AI finding new spice flavors we expect will one day take over the world, and we finish up on a new DoD cloud strategy. Also Josh burnt his finger, but is going to be OK.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode152s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_135_Passwords_AI_and_cloud_strategy.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_135_Passwords_AI_and_cloud_strategy.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_135_Passwords_AI_and_cloud_strategy.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.infosecurity-magazine.com/news/why-all-users-should-change/&#34;&gt;Change your password day&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2019/02/protect-your-accounts-from-data.html&#34;&gt;Google password checkup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tech.slashdot.org/story/19/02/05/1521249/the-worlds-biggest-spice-company-is-using-ai-to-find-new-flavors?utm_source=rss1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;AI finds new flavors&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://media.defense.gov/2019/Feb/04/2002085866/-1/-1/1/DOD-CLOUD-STRATEGY.PDF&#34;&gt;DoD cloud strategy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 134 - What&#39;s up with the container runc security flaw?</title>
      <link>https://opensourcesecurity.io/2019/02/18/episode-134-whats-up-with-the-container-runc-security-flaw/</link>
      <pubDate>Mon, 18 Feb 2019 01:23:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/02/episode-134-whats-up-with-container.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new runc container security flaw. How does the flaw work, what can you do about it, what should you do about it, and what the future of container security may look like.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode145s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_134_Whats_up_with_the_container_runc_security_flaw.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_134_Whats_up_with_the_container_runc_security_flaw.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_134_Whats_up_with_the_container_runc_security_flaw.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openwall.com/lists/oss-security/2019/02/11/2&#34;&gt;runc security flaw - CVE-2019-5736&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/43390-emergency-309727.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/84c3f-emergency-309727.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 133 - Smart locks and the government hacking devices</title>
      <link>https://opensourcesecurity.io/2019/02/11/episode-133-smart-locks-and-the-government-hacking-devices/</link>
      <pubDate>Mon, 11 Feb 2019 00:49:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/02/episode-133-smart-locks-and-government.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the fiasco hacks4pancakes described on Twitter and what the future of smart locks will look like. We then discuss what it means if the Japanese government starts hacking consumer IoT gear, is it ethical? Will it make anything better?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode144s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_133_Smart_locks_and_the_government_hacking_devices.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_133_Smart_locks_and_the_government_hacking_devices.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_133_Smart_locks_and_the_government_hacking_devices.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/hacks4pancakes/status/1086000837615382529&#34;&gt;@hacks4pancakes smart lock fiasco&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ&#34;&gt;LockPickingLawyer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tech.slashdot.org/story/19/01/28/1432259/japanese-government-plans-to-hack-into-citizens-iot-devices?utm_source=rss1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;Japanese government hacking devices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/26f42-door-1587863.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6ae87-door-1587863.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 132 - Bird Scooter: 0, Cory Doctorow: 1</title>
      <link>https://opensourcesecurity.io/2019/02/04/episode-132-bird-scooter-0-cory-doctorow-1/</link>
      <pubDate>Mon, 04 Feb 2019 01:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/02/episode-132-bird-scooter-0-cory.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Bird Scooter vs Corey Doctorow incident. We then get into some of the social norms around new technology and what lessons the security industry can take from something new like shared scooters.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode143s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_132_Bird_Scooter_0_Cory_Doctorow_1.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_132_Bird_Scooter_0_Cory_Doctorow_1.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_132_Bird_Scooter_0_Cory_Doctorow_1.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://boingboing.net/2019/01/11/flipping-the-bird.html&#34;&gt;Bird vs Corey Doctorow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2019/01/15/security-isnt-a-feature/&#34;&gt;Josh&amp;rsquo;s CES blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b2734-mistake-1966448.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0335b-mistake-1966448.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 131 - Windows micropatches, Google&#39;s privacy fine, and Mastercard fixes trial abuse</title>
      <link>https://opensourcesecurity.io/2019/01/28/episode-131-windows-micropatches-googles-privacy-fine-and-mastercard-fixes-trial-abuse/</link>
      <pubDate>Mon, 28 Jan 2019 01:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/01/episode-131-windows-micropatches.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about non-Microsoft Windows micropatches. The days of pretending closed source matters are long gone. Google gets hit with a privacy fine, that probably won&amp;rsquo;t matter. And Mastercard makes it easier for consumers to not accidentally sign up for services they don&amp;rsquo;t want.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode142s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_131_Windows_micropatches_Googles_privacy_fine_and_Mastercard_fixes_trial_abuse.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_131_Windows_micropatches_Googles_privacy_fine_and_Mastercard_fixes_trial_abuse.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_131_Windows_micropatches_Googles_privacy_fine_and_Mastercard_fixes_trial_abuse.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.0patch.com/2019/01/one-two-three-micropatches-for-three.html&#34;&gt;3 Windows micropatches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tech.slashdot.org/story/19/01/21/235242/google-fined-57-million-by-french-data-privacy-body-for-failing-to-comply-with-eus-gdpr-regulations?utm_source=rss1.0mainlinkanon&amp;amp;utm_medium=feed&#34;&gt;Google fined $57 million&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://newsroom.mastercard.com/2019/01/16/free-trials-without-the-hassle/&#34;&gt;Mastercard free trial abuse&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b7e0d-cubes-677092.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fe448-cubes-677092.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 130 - Chat with Snyk co-founder Danny Grander</title>
      <link>https://opensourcesecurity.io/2019/01/21/episode-130-chat-with-snyk-co-founder-danny-grander/</link>
      <pubDate>Mon, 21 Jan 2019 01:12:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/01/episode-130-chat-with-snyk-co-founder.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Danny Grander one of the co-founders of Snyk about Zip Slip, what it is, how to fix it, and how they disclosed everything. We also touch on plenty of other open source security topics as Danny is involved in many aspects of open source security.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode141s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_130_Chat_with_Snyk_cofounder_Danny__Grander.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_130_Chat_with_Snyk_cofounder_Danny__Grander.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_130_Chat_with_Snyk_cofounder_Danny__Grander.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/grander&#34;&gt;Danny&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/grander/&#34;&gt;Danny&amp;rsquo;s LinkedIn&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://snyk.io/&#34;&gt;Snyk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://snyk.io/research/zip-slip-vulnerability&#34;&gt;Zip Slip&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://snyk.io/stateofossecurity/&#34;&gt;Snyk state of open source security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security isn&#39;t a feature</title>
      <link>https://opensourcesecurity.io/2019/01/15/security-isnt-a-feature/</link>
      <pubDate>Tue, 15 Jan 2019 15:48:31 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=272</guid> 
      <description>&lt;p&gt;As CES draws to a close, I&amp;rsquo;ve seen more than one security person complain that nobody at the show was talking about security. There were an incredible number of consumer devices unveiled, no doubt there is no security in any of them. I think we get caught up in the security world sometimes so we forget that the VAST majority of people don&amp;rsquo;t care if something has zero security. People want interesting features that amuse them or make their lives easier. Security is rarely either of these, generally it makes their lives worse so it&amp;rsquo;s an anti-feature to many.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 129 - The EU bug bounty program</title>
      <link>https://opensourcesecurity.io/2019/01/14/episode-129-the-eu-bug-bounty-program/</link>
      <pubDate>Mon, 14 Jan 2019 00:58:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/01/episode-129-eu-bug-bounty-program.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the EU bug bounty program. There have been a fair number of people complaining it&amp;rsquo;s solving the wrong problem, but it&amp;rsquo;s the only way the EU has to spend money on open source today. If that doesn&amp;rsquo;t change this program will fail.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode139s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_129_The_EU_bug_bounty_program.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_129_The_EU_bug_bounty_program.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_129_The_EU_bug_bounty_program.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2018/12/30/misguided-misguidings-over-the-eu-bug-bounty/&#34;&gt;Josh&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://juliareda.eu/2018/12/eu-fossa-bug-bounties/&#34;&gt;Julia Reda EU bug bounty site&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/&#34;&gt;Tidelift&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://ed.ted.com/featured/LT8oQQTo&#34;&gt;What motivates us&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 128 - Australia&#39;s encryption backdoor bill</title>
      <link>https://opensourcesecurity.io/2019/01/07/episode-128-australias-encryption-backdoor-bill/</link>
      <pubDate>Mon, 07 Jan 2019 00:41:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2019/01/episode-128-australias-encryption.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Australia&amp;rsquo;s recently passed encryption bill. What is the law that was passed, what does it mean, and what are the possible outcomes? The show notes contain a flow chart of possible outcomes.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode138s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-128_Australias_encryption_backdoor_bill.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-128_Australias_encryption_backdoor_bill.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-128_Australias_encryption_backdoor_bill.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://drive.google.com/file/d/1M-pR7HGXXdjWWzUG_WWRaWnb47XNDniE/view?usp=sharing&#34;&gt;Josh&amp;rsquo;s flow chart&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2018/12/7/18130806/australia-access-and-assistance-encryption-bill-2018-facebook-google-apple-respond&#34;&gt;Australia Access and Assistance Encryption Bill 2018&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3358f-koala-446876.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/2f3e9-koala-446876.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Misguided misguidings over the EU bug bounty</title>
      <link>https://opensourcesecurity.io/2018/12/30/misguided-misguidings-over-the-eu-bug-bounty/</link>
      <pubDate>Sun, 30 Dec 2018 15:03:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=269</guid> 
      <description>&lt;p&gt;The EU recently &lt;a href=&#34;https://www.zdnet.com/article/eu-to-fund-bug-bounty-programs-for-14-open-source-projects-starting-january-2019/&#34;&gt;announced&lt;/a&gt; they are going to sponsor a security bug bounty program for 14 open source projects in 2019. There has been quite a bit of buzz about this program in all the usual places. The opinions are all over the place. Some people wonder why those 14, some wonder why not more. Some think it&amp;rsquo;s great. Some think it&amp;rsquo;s a horrible idea.&lt;/p&gt;
&lt;p&gt;I don&amp;rsquo;t want to focus too much on the details as they are unimportant in the big picture. Which applications are part of the program don&amp;rsquo;t really matter. What matters is why are we here today and where should this go in the future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>2018 Christmas Special - Is Santa GDPR compliant?</title>
      <link>https://opensourcesecurity.io/2018/12/24/2018-christmas-special-is-santa-gdpr-compliant/</link>
      <pubDate>Mon, 24 Dec 2018 01:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/12/2018-christmas-special-is-santa-gdpr.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about which articles of the GDPR apply to Santa, and if he&amp;rsquo;s following the rules the way he should be (spoiler, he&amp;rsquo;s probably not). Should Santa be on his own naughty list? We also create a new holiday character - George the DPO Elf!&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d02eb-george.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/697db-george.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode82s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/2018_Christmas_Special_Is_Santa_GDPR_compliant.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/2018_Christmas_Special_Is_Santa_GDPR_compliant.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/2018_Christmas_Special_Is_Santa_GDPR_compliant.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.npr.org/2016/12/23/506475364/a-holiday-tradition-david-sedaris-reads-santaland-diaries&#34;&gt;David Sedaris Santaland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=iulYJuSFqwo&#34;&gt;Canadian Tire Ice Truck&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 127 - Walled gardens, appstores, and more</title>
      <link>https://opensourcesecurity.io/2018/12/17/episode-127-walled-gardens-appstores-and-more/</link>
      <pubDate>Mon, 17 Dec 2018 00:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/12/episode-127-walled-gardens-appstores.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Mozilla pulling a paywall bypassing extension. We then turn our attention to talking about walled gardens. Are they good, are they bad? Something in the middle? There is a lot of prior art to draw on here, everything from Windows, Android, iOS, even Linux distributions.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode137s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_127_Walled_gardens_appstores_and_more.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_127_Walled_gardens_appstores_and_more.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_127_Walled_gardens_appstores_and_more.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=18567578&#34;&gt;Mozilla blocks a paywall bypass extension&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=-qb0NU2qNZQ&#34;&gt;Turning a root ball&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 126 - The not so dire future of supply chain security</title>
      <link>https://opensourcesecurity.io/2018/12/10/episode-126-the-not-so-dire-future-of-supply-chain-security/</link>
      <pubDate>Mon, 10 Dec 2018 01:15:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/12/episode-126-not-so-dire-future-of.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; continue the discussion from episode 125. We look at the possible future of software supply chains. It&amp;rsquo;s far less dire than previously expected. It&amp;rsquo;s likely there will be some change in the near future.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode136s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_126_The_not_so_dire_future_of_supply_chain_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_126_The_not_so_dire_future_of_supply_chain_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_126_The_not_so_dire_future_of_supply_chain_security.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.opensourcesecuritypodcast.com/2018/12/episode-125-open-source-supply-chains.html&#34;&gt;Episode 125&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/11310-new-brighton-1239724.jpg&#34;&gt;&lt;img alt=&#34;crystal ball&#34; loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/054e1-new-brighton-1239724.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 125 - Open Source, supply chains, npm, and you</title>
      <link>https://opensourcesecurity.io/2018/12/03/episode-125-open-source-supply-chains-npm-and-you/</link>
      <pubDate>Mon, 03 Dec 2018 01:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/12/episode-125-open-source-supply-chains.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how open source deals with malicious events. It&amp;rsquo;s probably impossible to stop these from happening, but the open source universe deals with it in its own unique way. We start to discuss what you can do, since everyone is using open source everywhere now. There will be a second part to this episode where we discuss what the future holds for these sort of problems.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode135s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_125_Open_Source_supply_chains_npm_and_you.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_125_Open_Source_supply_chains_npm_and_you.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_125_Open_Source_supply_chains_npm_and_you.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/11/26/npm_repo_bitcoin_stealer/&#34;&gt;NPM event-stream backdoor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/2018/11/26/whats-up-with-backdoored-npm-packages/&#34;&gt;Josh&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>What&#39;s up with backdoored npm packages?</title>
      <link>https://opensourcesecurity.io/2018/11/26/whats-up-with-backdoored-npm-packages/</link>
      <pubDate>Tue, 27 Nov 2018 02:45:16 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=266</guid> 
      <description>&lt;p&gt;A story broke recently about a backdoor added to a Node Package Manager (NPM) package called event-stream. This package is downloaded about two million times a week by developers. That&amp;rsquo;s a pretty impressive amount, many projects would be happy with two million downloads a year.&lt;/p&gt;
&lt;p&gt;The Register did a pretty good &lt;a href=&#34;https://www.theregister.co.uk/2018/11/26/npm_repo_bitcoin_stealer/&#34;&gt;writeup&lt;/a&gt;, I don&amp;rsquo;t want to recap the details here, I have a different purpose and that&amp;rsquo;s really to look at how does this happen and can we stop it?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 124 - Cloudflare&#39;s service workers and the economics of security</title>
      <link>https://opensourcesecurity.io/2018/11/26/episode-124-cloudflares-service-workers-and-the-economics-of-security/</link>
      <pubDate>Mon, 26 Nov 2018 01:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/11/episode-124-cloudflares-service-workers.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Cloudflare&amp;rsquo;s new Workers service. We spend a lot of time discussing how economics drives technology, not security. It&amp;rsquo;s quite likely this new service is less secure than existing alternatives, but it will be cheaper and faster which will matter more than security.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode134s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_124_Cloudflares_service_workers_and_the_economics_of_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_124_Cloudflares_service_workers_and_the_economics_of_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_124_Cloudflares_service_workers_and_the_economics_of_security.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/introducing-cloudflare-workers/&#34;&gt;Cloudflare Workers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/joshbressers/status/1063145380299374592&#34;&gt;AV vs Whitelisting tweets&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3743e-forklift-835340.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fc63e-forklift-835340.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Dependencies in open source</title>
      <link>https://opensourcesecurity.io/2018/11/19/dependencies-in-open-source/</link>
      <pubDate>Mon, 19 Nov 2018 23:41:27 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=223</guid> 
      <description>&lt;p&gt;The topic of securing your open source dependencies just seems to keep getting bigger and bigger. I always expect it to get less attention for some reason, and every year I&amp;rsquo;m wrong about what&amp;rsquo;s happening out there. I remember when I first started talking about this topic, nobody really cared about it. It&amp;rsquo;s getting a lot more traction these days, especially as we see stories about open source dependencies being wildly out of date and some even being malicious backdoors.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 123 - Talking about Kubernetes and container security with Liz Rice</title>
      <link>https://opensourcesecurity.io/2018/11/19/episode-123-talking-about-kubernetes-and-container-security-with-liz-rice/</link>
      <pubDate>Mon, 19 Nov 2018 01:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/11/episode-123-talking-about-kubernetes.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://twitter.com/lizrice&#34;&gt;Liz Rice&lt;/a&gt; about Kubernetes and container security. How did we get where we are today, what&amp;rsquo;s new and exciting today, and where do we think things are going.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode133s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_123_Talking_about_Kubernetes_and_container_security_with_Liz_Rice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_123_Talking_about_Kubernetes_and_container_security_with_Liz_Rice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_123_Talking_about_Kubernetes_and_container_security_with_Liz_Rice.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lizrice.com/&#34;&gt;Liz Rice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://info.aquasec.com/kubernetes-security&#34;&gt;Operating Kubernetes Clusters and Applications Safely book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.aquasec.com/&#34;&gt;Aqua Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://coreos.com/clair/docs/latest/&#34;&gt;Clair container scanner&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fa3ca-sea-3121435.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/87123-sea-3121435.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 122 - What will Apple&#39;s T2 chip mean for the rest of us?</title>
      <link>https://opensourcesecurity.io/2018/11/12/episode-122-what-will-apples-t2-chip-mean-for-the-rest-of-us/</link>
      <pubDate>Mon, 12 Nov 2018 04:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/11/episode-122-what-will-apples-t2-chip.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Apple&amp;rsquo;s new T2 security chip. It&amp;rsquo;s not open source but we expect it to change the security landscape in the coming years.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode131s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_122_What_will_Apples_T2_chip_mean_for_the_rest_of_us.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_122_What_will_Apples_T2_chip_mean_for_the_rest_of_us.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_122_What_will_Apples_T2_chip_mean_for_the_rest_of_us.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.apple.com/mac/docs/Apple_T2_Security_Chip_Overview.pdf&#34;&gt;T2 Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://securitywatch.pcmag.com/malware/318835-poker-shark-s-laptop-pwned-by-evil-maid-attack&#34;&gt;Evil maid poker attack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4d4b5-trekking-299000.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6a3de-trekking-299000.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 121 - All about the security of voting</title>
      <link>https://opensourcesecurity.io/2018/11/05/episode-121-all-about-the-security-of-voting/</link>
      <pubDate>Mon, 05 Nov 2018 01:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/11/episode-121-all-about-security-of-voting.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about voting security. What does it mean, how does it work. What works, what doesn&amp;rsquo;t work, and most importantly why we may not see secure electronic voting anytime soon.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode132s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_121_All_about_the_security_of_voting.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_121_All_about_the_security_of_voting.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_121_All_about_the_security_of_voting.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Canadian_electoral_system&#34;&gt;Canadian electoral system&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Vote-by-mail_in_Oregon&#34;&gt;Oregon mail voting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Commonwealth_of_Nations&#34;&gt;Commonwealth of Nations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Voter_impersonation_(United_States)#Estimates_of_frequency&#34;&gt;Voter fraud in the US&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5d746-ballot_boxes.jpg&#34;&gt;&lt;img alt=&#34;https://commons.wikimedia.org/wiki/File:Ballot_boxes.jpg&#34; loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5d746-ballot_boxes.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 120 - Bloomberg and hardware backdoors - it&#39;s already happening</title>
      <link>https://opensourcesecurity.io/2018/10/29/episode-120-bloomberg-and-hardware-backdoors-its-already-happening/</link>
      <pubDate>Mon, 29 Oct 2018 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/10/episode-120-bloomberg-and-hardware.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Bloomberg&amp;rsquo;s story about backdoors and motherboards. The story is probably false, but this is almost certainly happening already with hardware. What does it mean if your hardware is already backdoored by one or more countries?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode130s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_120_Bloomberg_and_hardware_backdoors_its_already_happening.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_120_Bloomberg_and_hardware_backdoors_its_already_happening.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_120_Bloomberg_and_hardware_backdoors_its_already_happening.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies&#34;&gt;Bloomberg Story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/authors/AQrv1y2ieI0/jordan-robertson&#34;&gt;Jordan Robertson&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/authors/AQMXAPROTO8/michael-riley&#34;&gt;Michael Riley&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=ljOoGyCso8s&amp;amp;feature=youtu.be&amp;amp;t=104&#34;&gt;PCB Factory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.malwaretech.com/2015/04/hard-disk-firmware-hacking-part-1.html&#34;&gt;Hard Disk Firmware Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://motherboard.vice.com/en_us/article/xykkkd/why-american-farmers-are-hacking-their-tractors-with-ukrainian-firmware&#34;&gt;Farmers hacking their tractors&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fb3a2-mother-board-581597.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0c9cf-mother-board-581597.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Targeted vs General purpose security</title>
      <link>https://opensourcesecurity.io/2018/10/23/targeted-vs-general-purpose-security/</link>
      <pubDate>Tue, 23 Oct 2018 13:13:34 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=240</guid> 
      <description>&lt;p&gt;There seems to be a lot of questions going around lately about how to best give out simple security advice that is actionable. Goodness knows I&amp;rsquo;ve talked about this more than I can even remember at this point. The security industry is really bad at giving out actionable advice. It&amp;rsquo;s common someone will ask what&amp;rsquo;s good advice. They&amp;rsquo;ll get a few morsels, them someone will point out whatever corner case makes that advice bad and the conversation will spiral into nonsense where we find ourselves trying to defend someone mostly concerned about cat pictures from being kidnapped by a foreign nation. Eventually whoever asked for help quit listening a long time ago and decided to just keep their passwords written on a sticky note under the keyboard.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 119 - The Google&#43; and Facebook incidents, it&#39;s not your data anymore</title>
      <link>https://opensourcesecurity.io/2018/10/22/episode-119-the-google-and-facebook-incidents-its-not-your-data-anymore/</link>
      <pubDate>Mon, 22 Oct 2018 00:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/10/episode-119-google-and-facebook.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Google+ and Facebook data incidents. We don&amp;rsquo;t have any control over this data anymore. The incidents didn&amp;rsquo;t really affect the users because we have no idea who has access to it. We also touch on GDPR and what it could mean in this context.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode127s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_119_the_google_and_facebook_incidents_its_not_your_data_anymore.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_119_the_google_and_facebook_incidents_its_not_your_data_anymore.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_119_the_google_and_facebook_incidents_its_not_your_data_anymore.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.businessinsider.com/facebook-hack-shows-again-the-downside-of-move-fast-and-break-things-2018-10&#34;&gt;Facebook hack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2018/10/08/google-plus-hack/&#34;&gt;Google+ hack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f3aef-living-room-3035878.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/edd4b-living-room-3035878.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 118 - Cloudflare&#39;s IPFS and onion service</title>
      <link>https://opensourcesecurity.io/2018/10/15/episode-118-cloudflares-ipfs-and-onion-service/</link>
      <pubDate>Mon, 15 Oct 2018 01:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/10/episode-118-cloudflares-ipfs-and-onion.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Cloudflare&amp;rsquo;s new IPFS and Onion services. One brings distributed blockchain files to the masses, the other lets you host your site on tor easily.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode128s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_118_cloudflares_ipfs_and_onion_service.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_118_cloudflares_ipfs_and_onion_service.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_118_cloudflares_ipfs_and_onion_service.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/distributed-web-gateway/&#34;&gt;IPFS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/cloudflare-onion-service/&#34;&gt;Onion service&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/2bef6-market-3466906.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ec990-market-3466906.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 117 - Will security follow Linus&#39; lead on being nice?</title>
      <link>https://opensourcesecurity.io/2018/10/08/episode-117-will-security-follow-linus-lead-on-being-nice/</link>
      <pubDate>Mon, 08 Oct 2018 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/10/episode-117-will-security-follow-linus.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Linus&amp;rsquo; effort to work on his attitude. What will this mean for security and IT in general?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode126s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_117_Will_security_follow_Linus_lead_on_being_nice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_117_Will_security_follow_Linus_lead_on_being_nice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_117_Will_security_follow_Linus_lead_on_being_nice.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.newyorker.com/science/elements/after-years-of-abusive-e-mails-the-creator-of-linux-steps-aside&#34;&gt;Linus steps aside&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.contributor-covenant.org/&#34;&gt;Contributor Covenant&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/2ca30-cat-1647775.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/26959-cat-1647775.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Millions of unfixed security flaws is a lie</title>
      <link>https://opensourcesecurity.io/2018/10/01/millions-of-unfixed-security-flaws-is-a-lie/</link>
      <pubDate>Mon, 01 Oct 2018 13:26:08 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=244</guid> 
      <description>&lt;p&gt;On a pretty regular basis I see claims that the public CVE dataset is missing some large number of security issues. I&amp;rsquo;ve seen ranges from tens of thousands all the way up to millions. The purpose behind such statements is to show that the CVE data is woefully incomplete. Of course almost everyone making that claim has a van filled with security issues and candy they&amp;rsquo;re trying very hard to lure us into. It&amp;rsquo;s a pretty typical sales tactic as old as time itself. Whatever you have today isn&amp;rsquo;t good enough, but what I have, holy cow it&amp;rsquo;s better. It&amp;rsquo;s so much better you better come right over and see for yourself. After you pay me of course.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 116 - The future of the CISO with Michael Piacente</title>
      <link>https://opensourcesecurity.io/2018/10/01/episode-116-the-future-of-the-ciso-with-michael-piacente/</link>
      <pubDate>Mon, 01 Oct 2018 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/09/episode-116-future-of-ciso-with-michael.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Michael Piacente from Hitch Partners about the past, present, and future role of the CISO in the industry.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode125s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_116_The_future_of_the_CISO_with_Michael_Piacente.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_116_The_future_of_the_CISO_with_Michael_Piacente.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_116_The_future_of_the_CISO_with_Michael_Piacente.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.hitchpartners.com/&#34;&gt;Hitch Partners&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/securitysearchbayarea/&#34;&gt;Michael Piacente&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e2b26-telescope-187472.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d7352-telescope-187472.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 115 - Discussion with Brian Hajost from SteelCloud</title>
      <link>https://opensourcesecurity.io/2018/09/24/episode-115-discussion-with-brian-hajost-from-steelcloud/</link>
      <pubDate>Mon, 24 Sep 2018 00:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/09/episode-115-discussion-with-brian.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Brian Hajost from SteelCloud about public sector compliance. The world of public sector compliance can be confusing and strange, but it&amp;rsquo;s not that bad when it&amp;rsquo;s explained by someone with experience.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode124s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_115_Discussion_with_Brian_Hajost_from_SteelCloud.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_115_Discussion_with_Brian_Hajost_from_SteelCloud.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_115_Discussion_with_Brian_Hajost_from_SteelCloud.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.steelcloud.com/&#34;&gt;SteelCloud&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://iase.disa.mil/stigs/Pages/index.aspx&#34;&gt;DISA STIG&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3872d-sunset-1988076.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/45e9b-sunset-1988076.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 114 - Review of &amp;quot;Click Here to Kill Everybody&amp;quot;</title>
      <link>https://opensourcesecurity.io/2018/09/17/episode-114-review-of-click-here-to-kill-everybody/</link>
      <pubDate>Mon, 17 Sep 2018 00:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/09/episode-114-review-of-click-here-to.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; review Bruce Schneier&amp;rsquo;s new book Click Here to Kill Everybody. It&amp;rsquo;s a book everyone could benefit from reading. It does a nice job explaining many existing security problems in a simple manner.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode123s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_114_review_of_click_here_to_kill_everybody.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_114_review_of_click_here_to_kill_everybody.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_114_review_of_click_here_to_kill_everybody.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/books/click_here/&#34;&gt;Click Here to Kill Everybody&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.goodreads.com/book/show/25736625-there-will-be-cyberwar&#34;&gt;There Will Be Cyberwar&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/osha&#34;&gt;Reddit OSHA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/70035-banner-1000935.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6668f-banner-1000935.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 113 - Actual real security advice</title>
      <link>https://opensourcesecurity.io/2018/09/10/episode-113-actual-real-security-advice/</link>
      <pubDate>Mon, 10 Sep 2018 00:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/09/episode-113-actual-real-security-advice.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about actual real world advice. Based on a story about trying to secure political campaigns, if we had to give some security help what should it look like, who should we give it to?&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode122s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_113_actual_real_security_advice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_113_actual_real_security_advice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_113_actual_real_security_advice.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/?utm_term=.78928c095c10&#34;&gt;Security advice to Democrats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Our actual advice
&lt;ul&gt;
&lt;li&gt;Don’t run your own services&lt;/li&gt;
&lt;li&gt;Email - Google or Microsoft&lt;/li&gt;
&lt;li&gt;Don&amp;rsquo;t’ use GPG&lt;/li&gt;
&lt;li&gt;Use a trusted device&lt;/li&gt;
&lt;li&gt;Use a password manager on a secure device&lt;/li&gt;
&lt;li&gt;Use 2FA&lt;/li&gt;
&lt;li&gt;Backups&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 112 - Google&#39;s Titan Key and the latest Struts issue</title>
      <link>https://opensourcesecurity.io/2018/09/03/episode-112-googles-titan-key-and-the-latest-struts-issue/</link>
      <pubDate>Mon, 03 Sep 2018 00:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/09/episode-112-googles-titan-key-and.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new Google Titan security key. There are some in the industry uneasy about the supply chain for the devices. We also discuss the latest Struts security issue. Struts is old and scary now, stop using it.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode121s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-112_googles_titan_key_and_the_latest_struts_issue.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-112_googles_titan_key_and_the_latest_struts_issue.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-112_googles_titan_key_and_the_latest_struts_issue.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://motherboard.vice.com/en_us/article/mb4zy3/transparency-google-titan-security-keys-china&#34;&gt;Google&amp;rsquo;s security key security questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bankinfosecurity.com/apache-struts-issues-emergency-patch-to-fix-critical-flaw-a-11412&#34;&gt;Struts security issue&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/38444-titanic-1669873.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/18d43-titanic-1669873.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security reviews and microservices</title>
      <link>https://opensourcesecurity.io/2018/08/28/security-reviews-and-microservices/</link>
      <pubDate>Tue, 28 Aug 2018 12:57:31 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=219</guid> 
      <description>&lt;p&gt;We love to do security reviews on the projects, products, and services our companies use. Security reviews are one of those ways we can show how important security is. If those reviews didn&amp;rsquo;t get done we might end up using a service that could put our users and data at risk. Every good horror story involving dinosaurs starts with bad security reviews! It&amp;rsquo;s a lesson too few of us really take to heart.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 111 - The TLS 1.3 and DNS episode</title>
      <link>https://opensourcesecurity.io/2018/08/27/episode-111-the-tls-1-3-and-dns-episode/</link>
      <pubDate>Mon, 27 Aug 2018 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/08/episode-111-tls-13-and-dns-episode.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about TLS 1.3 and DNS. What can we expect from the future for these, how are they related (or not related). We touch on DNSSEC and why it probably won&amp;rsquo;t matter. DNS over TLS is looking pretty great though. There is also a guest appearance from quantum crypto.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode120s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_111_The_TLS_1_3_and_DNS_episode.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_111_The_TLS_1_3_and_DNS_episode.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_111_The_TLS_1_3_and_DNS_episode.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/rfc-8446-aka-tls-1-3/&#34;&gt;Cloudflare TLS 1.3 blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nist.gov/news-events/news/2017/12/candidate-quantum-resistant-cryptographic-algorithms-publicly-available&#34;&gt;NIST post quantum crypto&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Actionable Advice</title>
      <link>https://opensourcesecurity.io/2018/08/22/actionable-advice/</link>
      <pubDate>Wed, 22 Aug 2018 20:38:27 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/?p=206</guid> 
      <description>&lt;p&gt;I gave a talk at OSCON 20 about security. It’s not a typical security talk though. I’ve given and attended a lot of what I would call “typical” security presentations. It’s generally about some big security idea, there’s likely some amount of blaming everyone except the security industry itself. We should make sure we throw in some analogies, maybe comparing cars to buggies or bridge safety. Blockchain is pretty hip now so that can probably solve the problem, maybe with AI. In general these presentation aren’t overly exciting and tend to play to the audience. They are fun, but that’s not the point this time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 110 - Review of Black Hat, Defcon, and the effect of security policies</title>
      <link>https://opensourcesecurity.io/2018/08/20/episode-110-review-of-black-hat-defcon-and-the-effect-of-security-policies/</link>
      <pubDate>Mon, 20 Aug 2018 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/08/episode-110-review-of-black-hat-defcon.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Black Hat and Defcon and how unexciting they have become. What happened with hotels at Defcon, and more importantly how many security policies have 2nd and 3rd level effects we often can&amp;rsquo;t foresee. We end with important information about pizza, bananas, and can openers.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode119s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_110_review_of_black_hat_defcon_and_the_effect_of_security_policies.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_110_review_of_black_hat_defcon_and_the_effect_of_security_policies.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_110_review_of_black_hat_defcon_and_the_effect_of_security_policies.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.kcra.com/article/kids-as-young-as-7-hack-into-election-systems-at-defcon-event/22748250&#34;&gt;Kids hacking voting machines&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.the-parallax.com/2018/08/09/black-hat-lax-encryption/&#34;&gt;Black Hat plaintext email&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.the-parallax.com/2018/08/12/vegas-hotel-room-security-privacy-defcon/&#34;&gt;Defcon hotel shenanigans&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pizzaexpo.com/&#34;&gt;International Pizza Expo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=mFmllVIZrQs&#34;&gt;How to use a can opener&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=xklMqXP8UHo&#34;&gt;How to open a banana&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 109 - OSCon and actionable advice</title>
      <link>https://opensourcesecurity.io/2018/08/13/episode-109-oscon-and-actionable-advice/</link>
      <pubDate>Mon, 13 Aug 2018 00:11:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/08/episode-109-oscon-and-actionable-advice.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about phishing training and how it doesn&amp;rsquo;t really matter. Josh spoke at OSCon and comes back with some fun observations and advice. People want practical actionable advice and we&amp;rsquo;re not good at that.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode117s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_109_OSCon_and_actionable_advice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_109_OSCon_and_actionable_advice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_109_OSCon_and_actionable_advice.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.latimes.com/local/lanow/la-me-ln-deputy-traffic-cone-costume-sting-20140814-story.html&#34;&gt;Traffic cone costume&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linux.com/blog/os-summit-elc/2018/4/azure-sphere-makes-microsoft-arm-linux-player-iot&#34;&gt;Azure Linux&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.masterlock.com/personal-use/product/1500iD&#34;&gt;Masterlock Speed Dial&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8e837-newtons-cradle-256213.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/af6f9-newtons-cradle-256213.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 108 - Bluetooth, phishing, airgaps, and eating soup off the floor</title>
      <link>https://opensourcesecurity.io/2018/08/06/episode-108-bluetooth-phishing-airgaps-and-eating-soup-off-the-floor/</link>
      <pubDate>Mon, 06 Aug 2018 01:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/08/episode-108-bluetooth-phishing-airgaps.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the latest attack on bluetooth and discuss phishing in the modern world. U2F is a great way to stop phishing, training is not. We also discuss airgaps in response to attacks on airgapped power utilities.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode115s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_108_bluetooth_phishing_airgaps_and_eating_soup_off_the_floor.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_108_bluetooth_phishing_airgaps_and_eating_soup_off_the_floor.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_108_bluetooth_phishing_airgaps_and_eating_soup_off_the_floor.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.kb.cert.org/vuls/id/304725&#34;&gt;ECDH in Bluetooth&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=YEBfamv-_do&#34;&gt;Diffie-Hellman with paint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2018/07/google-security-keys-neutered-employee-phishing/&#34;&gt;Google Phishing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/07/24/russia_us_energy_grid_hackers/&#34;&gt;Hackers jumped air gaps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pscpower.com/what-we-do/enclosures-shelters/portable-data-centers/secure-tactical-data-center/&#34;&gt;Portable secure data center&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 107 - The year of the Linux Desktop and other hardware stories</title>
      <link>https://opensourcesecurity.io/2018/07/30/episode-107-the-year-of-the-linux-desktop-and-other-hardware-stories/</link>
      <pubDate>Mon, 30 Jul 2018 03:42:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/07/episode-107-year-of-linux-desktop-and.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about modern hardware, how security relates to devices and actions. Everything from secure devices, to the cables we use, to thermal cameras and coat hangers. We end the conversation discussing the words we use and how they affect the way people see us and themselves.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode114s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_107_the_year_of_the_linux_desktop_and_other_hardware_stories.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_107_the_year_of_the_linux_desktop_and_other_hardware_stories.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_107_the_year_of_the_linux_desktop_and_other_hardware_stories.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.zdnet.com/article/linux-comes-to-chromebooks/&#34;&gt;Linux on Chromebooks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/07/10/touchscreen_secrets/&#34;&gt;Touchscreen and secrets&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://consumerist.com/2008/03/03/do-coat-hangers-sound-as-good-monster-cables/index.html&#34;&gt;Coat hanger vs Monster cables&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ted.com/talks/thomas_thwaites_how_i_built_a_toaster_from_scratch&#34;&gt;Build a toaster&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 106 - Data isn&#39;t oil, it&#39;s nuclear waste</title>
      <link>https://opensourcesecurity.io/2018/07/23/episode-106-data-isnt-oil-its-nuclear-waste/</link>
      <pubDate>Mon, 23 Jul 2018 01:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/07/episode-106-data-isnt-oil-its-nuclear.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Cory Doctorow&amp;rsquo;s piece on Facebook data privacy. It&amp;rsquo;s common to call data the new oil but it&amp;rsquo;s more like nuclear waste. How we fix the data problem in the future is going to require solutions we can&amp;rsquo;t yet imagine as well as new ways of thinking about the problems.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode113s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_106_data_isnt_oil_its_nuclear_waste.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_106_data_isnt_oil_its_nuclear_waste.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_106_data_isnt_oil_its_nuclear_waste.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://boingboing.net/2018/07/02/low-yield-crude.html&#34;&gt;Mark Zuckerberg and his empire of oily rags&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/07/09/fitness_app_polar_data_leak/&#34;&gt;Fitness app leak&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Operation-Mincemeat-Bizarre-Fooled-Assured/dp/0307453286&#34;&gt;Operation Mincemeat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coindesk.com/token-platform-bancor-goes-offline-following-security-breach/&#34;&gt;Bancor cryptocurrency theft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cryptokitties.co/&#34;&gt;CryptoKitties&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 105 - More backdoors in open source</title>
      <link>https://opensourcesecurity.io/2018/07/16/episode-105-more-backdoors-in-open-source/</link>
      <pubDate>Mon, 16 Jul 2018 01:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/07/episode-105-more-backdoors-in-open.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about some recent backdoor problems in open source packages. We touch on is open source secure, how that security works, and what it should look like in the future. This problem is never going to go away or get better, and that&amp;rsquo;s probably OK.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode112s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_105_more_backdoors_in_open_source.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_105_more_backdoors_in_open_source.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_105_more_backdoors_in_open_source.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/eslint/eslint-scope/issues/39&#34;&gt;eslint-scope issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/07/11/someone_modified_arch_linuxs_acrobat_reader_adds_security_warning/&#34;&gt;Arch Linux Acrobat Reader issue&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The father of modern security: B. F. Skinner</title>
      <link>https://opensourcesecurity.io/2018/07/11/the-father-of-modern-security-b-f-skinner/</link>
      <pubDate>Wed, 11 Jul 2018 13:43:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2018/07/11/the-father-of-modern-security-b-f-skinner/</guid> 
      <description>&lt;p&gt;A lot of what we call security is voodoo. Most of it actually.&lt;/p&gt;
&lt;p&gt;What I mean with that statement is our security process is often based on ideas that don&amp;rsquo;t really work. As an industry we have built up a lot of ideas and processes that aren&amp;rsquo;t actually grounded in facts and science. We don&amp;rsquo;t understand why we do certain things, but we know that if we don&amp;rsquo;t do those things something bad will happen! Will it really happen? I heard something will happen. I suspect the answer is no, but it&amp;rsquo;s very difficult to explain this concept sometimes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 104 - The Gentoo security incident</title>
      <link>https://opensourcesecurity.io/2018/07/09/episode-104-the-gentoo-security-incident/</link>
      <pubDate>Mon, 09 Jul 2018 00:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/07/episode-104-gentoo-security-incident.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Gentoo security incident. Gentoo did a really good job being open and dealing with the incident quickly. The basic takeaway from all this is make sure your organization is forcing users to use 2 factor authentication. The long term solution is going to be all identity providers forcing everyone to use 2FA.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode111s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_104_the_gentoo_security_incident.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_104_the_gentoo_security_incident.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_104_the_gentoo_security_incident.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://wiki.gentoo.org/wiki/Github/2018-06-28&#34;&gt;Gentoo incident timeline&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.troyhunt.com/tag/cloudflare/&#34;&gt;Have I Been Pwned Cloudflare&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 103 - The Seven Properties of Highly Secure Devices</title>
      <link>https://opensourcesecurity.io/2018/07/02/episode-103-the-seven-properties-of-highly-secure-devices/</link>
      <pubDate>Mon, 02 Jul 2018 02:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/07/episode-103-seven-properties-of-highly.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a Microsoft Research paper titled &amp;ldquo;The Seven Properties of Highly Secure Devices&amp;rdquo;. We take a real world view into how to secure our devices. What works, what doesn&amp;rsquo;t work, and why this list is actually really good.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode116s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_103_the_seven_properties_of_highly_secure_devices.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_103_the_seven_properties_of_highly_secure_devices.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_103_the_seven_properties_of_highly_secure_devices.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.microsoft.com/en-us/research/wp-content/uploads/2017/03/SevenPropertiesofHighlySecureDevices.pdf&#34;&gt;7 Properties of Highly Secure Devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Pwn2Own&#34;&gt;Pwn2Own&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1011300509410455552&#34;&gt;Kurt&amp;rsquo;s dryer vent tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.extremetech.com/extreme/56932-nasa-dos-glitch-nearly-killed-mars-rover&#34;&gt;Mars rover filesystem bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://theupdateframework.github.io/&#34;&gt;The Update Framework (TUF)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 102 - Michael Feiertag from tCell</title>
      <link>https://opensourcesecurity.io/2018/06/25/episode-102-michael-feiertag-from-tcell/</link>
      <pubDate>Mon, 25 Jun 2018 00:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/06/episode-102-michael-feiertag-from-tcell.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Michael Feiertag, the CEO of tCell. We talk about what a Web Application Firewall is, what it does and doesn&amp;rsquo;t do, and what the future of this technology looks like. We touch on how this affects a DevOps environment. Security has to fit into the existing model, not try to change it.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode110s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_102_michael_feiertag_from_tcell.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_102_michael_feiertag_from_tcell.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_102_michael_feiertag_from_tcell.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/in/mfeiertag/&#34;&gt;Michael&amp;rsquo;s LinkedIn&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/michaelfeiertag&#34;&gt;Michael&amp;rsquo;s Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.tcell.io/&#34;&gt;tCell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Web_application_firewall&#34;&gt;Web Application Firewall (WAF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Runtime_application_self-protection&#34;&gt;Runtime Application Self Protection (RASP)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 101 - Our unregulated future is here to stay</title>
      <link>https://opensourcesecurity.io/2018/06/17/episode-101-our-unregulated-future-is-here-to-stay/</link>
      <pubDate>Sun, 17 Jun 2018 23:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/06/episode-101-our-unregulated-future-is.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Bird scooters. The implications of the scooters on the city, segways, bicycles. The topic of how these vehicles interact with pedestrians on the road and trails. It&amp;rsquo;s an example of humans not wanting to follow the rules and generally making the situation annoying for everyone. It&amp;rsquo;s the old security story of new technology without clear rules. The show ends with some horrifying numbers behind how bad things get before  people really care.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 100 - You&#39;re bad at buying security, we can help!</title>
      <link>https://opensourcesecurity.io/2018/06/11/episode-100-youre-bad-at-buying-security-we-can-help/</link>
      <pubDate>Mon, 11 Jun 2018 01:30:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/06/episode-100-youre-bad-buying-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about how to be a smart security buyer. We have guest &lt;a href=&#34;https://twitter.com/smayzak&#34;&gt;Steve Mayzak&lt;/a&gt; walk us through how a the buying process works as well as giving out a ton of great advice. Even if you&amp;rsquo;re experienced with how to buy security technology you should give this a listen.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode107s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_100_your_bad_at_buying_solutions_we_can_help.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_100_your_bad_at_buying_solutions_we_can_help.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_100_your_bad_at_buying_solutions_we_can_help.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.nationalseminarstraining.com/SeminarTopics/Purchasing/Better_Buyer/KVS/index.html&#34;&gt;Buyer training&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/378f5-shaking-hands-2499612.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/569e2-shaking-hands-2499612.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security ROI isn&#39;t impossible, we suck at measuring</title>
      <link>https://opensourcesecurity.io/2018/06/05/security-roi-isnt-impossible-we-suck-at-measuring/</link>
      <pubDate>Tue, 05 Jun 2018 16:11:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2018/06/05/security-roi-isnt-impossible-we-suck-at-measuring/</guid> 
      <description>&lt;p&gt;As of late I&amp;rsquo;ve been seeing a lot of grumbling that security return on investment (ROI) is impossible. This is of course nonsense. Understanding your ROI is one of the most important things you can do as a business leader. You have to understand if what you&amp;rsquo;re doing makes sense. By the very nature of business, some of the things we do have more value than other things. Some things even have negative value. If we don&amp;rsquo;t know which things are the most important, we&amp;rsquo;re just doing voodoo security.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 99 - Consumer security is too broken to fix, and it doesn&#39;t matter</title>
      <link>https://opensourcesecurity.io/2018/06/04/episode-99-consumer-security-is-too-broken-to-fix-and-it-doesnt-matter/</link>
      <pubDate>Mon, 04 Jun 2018 01:53:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/06/episode-99-consumer-security-is-too.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about a number of consumer security issues. The FBI told everyone to reboot their routers which they won&amp;rsquo;t do. The .app top level domain is a cesspool of malware. Everyone has a cell phone and won&amp;rsquo;t update them properly. None of this probably matters though. Unless there are real measurable tragedies caused by this tech, people tend not to really care.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode567s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_99_consumer_security_is_too_broken_to_fix_and_it_doesnt_matter.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_99_consumer_security_is_too_broken_to_fix_and_it_doesnt_matter.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_99_consumer_security_is_too_broken_to_fix_and_it_doesnt_matter.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2018/05/fbi-kindly-reboot-your-router-now-please/&#34;&gt;FBI says reboot your routers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/1000950064724901888&#34;&gt;.app cesspool&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 98 - When IT decisions kill people</title>
      <link>https://opensourcesecurity.io/2018/05/28/episode-98-when-it-decisions-kill-people/</link>
      <pubDate>Mon, 28 May 2018 00:30:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/05/episode-98-when-it-decisions-kill-people.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the NTSB report from the fatal Uber crash and what happened with Amazon&amp;rsquo;s Alexa recording then emailing a private conversation. IT decisions now have real world consequences like never before.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode563s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_98_when_it_decisions_kill_people.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_98_when_it_decisions_kill_people.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_98_when_it_decisions_kill_people.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ntsb.gov/investigations/AccidentReports/Pages/HWY18MH010-prelim.aspx&#34;&gt;Uber NTSB report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.productbeautiful.com/2007/11/01/did-powerpoint-crash-the-space-shuttle/&#34;&gt;Powerpoint and the space shuttle&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://money.cnn.com/2018/05/24/technology/alexa-secret-recording/index.html&#34;&gt;Alexa secret recording&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/2016/09/22/siri-opens-smart-lock-to-let-neighbor-walk-into-a-locked-house/&#34;&gt;Siri unlocks the door&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cbsnews.com/news/ex-houston-911-operator-guilty-of-hanging-up-on-thousands-of-callers/&#34;&gt;911 operator hangs up&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/73b9b-board-2084777.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bf915-board-2084777.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 97 - Automation: Humans are slow and dumb</title>
      <link>https://opensourcesecurity.io/2018/05/20/episode-97-automation-humans-are-slow-and-dumb/</link>
      <pubDate>Sun, 20 May 2018 23:18:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/05/episode-97-automation-humans-are-slow.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security of automation as well as automating security. The only way automation will really work long term is full automation. Humans can&amp;rsquo;t be trusted enough to rely on them to do things right.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_97_automation_humans_are_slow_and_dumb.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_97_automation_humans_are_slow_and_dumb.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_97_automation_humans_are_slow_and_dumb.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mercurynews.com/2018/01/22/tesla-on-autopilot-slams-into-parked-fire-truck-on-freeway/&#34;&gt;Tesla hits a firetruck&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theverge.com/2018/4/29/17298750/tesla-autopilot-british-driver-charged-driving-sleeping&#34;&gt;British Tesla passenger&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c8871-robot-2791671.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1c6ac-robot-2791671.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Helicopter security</title>
      <link>https://opensourcesecurity.io/2018/05/17/helicopter-security/</link>
      <pubDate>Thu, 17 May 2018 14:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2018/05/17/helicopter-security/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/08/40fd8-aiga-heliport-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/08/40fd8-aiga-heliport-2400px.png?w=300&#34;&gt;&lt;/a&gt; After my last post about &lt;a href=&#34;http://sobersecurity.blogspot.com/2017/08/spend-until-youre-secure.html&#34;&gt;security spending&lt;/a&gt;, I was thinking about how most security teams integrate into the overall business (hint: they don&amp;rsquo;t). As part of this thought experiment I decided to compare traditional security to something that in modern times has come to be called helicopter parenting.&lt;/p&gt;
&lt;p&gt;A helicopter parent is someone who won&amp;rsquo;t let their kids do anything on their own. These are the people you hear about who follow their child to college, to sports practice. They yell at teachers and coaches for not respecting how special the child is. The kids are never allowed to take any risks because risk is dangerous and bad. If they climb the tree, while it could be a life altering experience, they could also fall and get hurt. Skateboarding is possibly the most dangerous thing anyone could ever do! We better make sure nothing bad can ever happen.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 96 - Are legal backdoors a good idea?</title>
      <link>https://opensourcesecurity.io/2018/05/14/episode-96-are-legal-backdoors-a-good-idea/</link>
      <pubDate>Mon, 14 May 2018 06:43:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/05/episode-96-are-legal-backdoors-good-idea.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about backdoors in code and products that have been put there on purpose. We talk about unlocking phones. Encryption backdoors with a focus on why they won&amp;rsquo;t work.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode561s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_96_all_about_backdoors.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_96_all_about_backdoors.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_96_all_about_backdoors.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act&#34;&gt;CALEA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2018/02/27/cellebrite-may-have-found-a-way-to-unlock-iphones-running-ios-11/&#34;&gt;Cellebrite unlocking phones&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2018/05/ray_ozzies_encr.html&#34;&gt;Schneier on Ray Ozzie&amp;rsquo;s proposal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Regulation_of_Investigatory_Powers_Act_2000&#34;&gt;UK RIP act&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d9156-door-1741310.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bf297-door-1741310.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 95 - Twitter passwords and npm backdoors</title>
      <link>https://opensourcesecurity.io/2018/05/07/episode-95-twitter-passwords-and-npm-backdoors/</link>
      <pubDate>Mon, 07 May 2018 00:40:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/05/episode-95-twitter-passwords-and-npm.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Twitter doing the right thing when they logged a lot of passwords, the npm malicious getcookies package, and how backdoors work in code.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_95_twitter_passwords_and_npm_backdoors.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_95_twitter_passwords_and_npm_backdoors.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_95_twitter_passwords_and_npm_backdoors.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.twitter.com/official/en_us/topics/company/2018/keeping-your-account-secure.html&#34;&gt;Twitter password logging&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.npmjs.org/post/173526807575/reported-malicious-module-getcookies&#34;&gt;npm getcookies&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.explainxkcd.com/wiki/index.php/1988&#34;&gt;xkcd gluing things together&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/77605-screen2bshot2b2018-05-042bat2b10.19.262bpm.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5a636-screen2bshot2b2018-05-042bat2b10.19.262bpm.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 94 - DNSSEC, BGP, and reality</title>
      <link>https://opensourcesecurity.io/2018/04/30/episode-94-dnssec-bgp-and-reality/</link>
      <pubDate>Mon, 30 Apr 2018 00:40:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/04/episode-94-dnssec-bgp-and-reality.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Amazon Route 53 incident and what it really means for the modern infrastructure. Complaining nobody is using DNSSEC or securing BGP aren&amp;rsquo;t the right conversations to be having. Reality must be considered in any honest conversation about these topics.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_94_dns_bgp_and_reality.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_94_dns_bgp_and_reality.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_94_dns_bgp_and_reality.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.thousandeyes.com/amazon-route-53-dns-and-bgp-hijack/&#34;&gt;Route 53 attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/&#34;&gt;Cloudflare&amp;rsquo;s 1.1.1.1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f812c-compass-429772.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f3634-compass-429772.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 93 - Security flaws in beep and patch, how did we get here?</title>
      <link>https://opensourcesecurity.io/2018/04/23/episode-93-security-flaws-in-beep-and-patch-how-did-we-get-here/</link>
      <pubDate>Mon, 23 Apr 2018 00:36:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/04/episode-93-security-flaws-in-beep-and.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about security flaws in beep and patch. How on earth were there security flaws in beep and patch?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_93-Security_flaws_in_beep_and_patch_how_did_we_get_here.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_93-Security_flaws_in_beep_and_patch_how_did_we_get_here.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_93-Security_flaws_in_beep_and_patch_how_did_we_get_here.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667&#34;&gt;beep security flaw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156&#34;&gt;patch security flaw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5e860-patch-2328289.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b7481-patch-2328289.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 92 - Chat with Rami Saas the CEO of WhiteSource</title>
      <link>https://opensourcesecurity.io/2018/04/15/episode-92-chat-with-rami-saas-the-ceo-of-whitesource/</link>
      <pubDate>Sun, 15 Apr 2018 23:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/04/episode-92-chat-with-rami-saas-ceo-of.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to Rami Saas, the CEO of WhiteSource about 3rd party open source security as well as open source licensing.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-92_chat_with_rami_saas.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-92_chat_with_rami_saas.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-92_chat_with_rami_saas.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.whitesourcesoftware.com/&#34;&gt;WhiteSource&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/RamiSaaS&#34;&gt;Rami Saas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensource.org/licenses/alphabetical&#34;&gt;Open Source Licenses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://moba.i.daimler.com/bai-cars/ba/foss/content/en/pdfs/FOSS_License_C-Class_205.pdf&#34;&gt;Mercedes C-Class 205 Open Source Licenses&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/75e0a-coding-1841550.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d3e14-coding-1841550.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 91 - Security lessons from a 7 year old</title>
      <link>https://opensourcesecurity.io/2018/04/08/episode-91-security-lessons-from-a-7-year-old/</link>
      <pubDate>Sun, 08 Apr 2018 22:51:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/04/episode-91-security-lessons-from-7-year.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to a 7 year old about security. We cover Minecraft security, passwords, hacking, and many many other nuggets of wisdom.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-91_security_lessons_from_a_7_year_old.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-91_security_lessons_from_a_7_year_old.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-91_security_lessons_from_a_7_year_old.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://minecraft.net/en-us/&#34;&gt;Minecraft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wattpad.com/386472210-the-truth-behind-hackers-in-roblox-john-doe&#34;&gt;John Doe Roblox&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.roblox.com/&#34;&gt;Roblox&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Keywords: passwords, minecraft&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/40dcd-toy-1158899.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6bba6-toy-1158899.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Spend until you&#39;re secure</title>
      <link>https://opensourcesecurity.io/2018/04/04/spend-until-youre-secure/</link>
      <pubDate>Thu, 05 Apr 2018 01:55:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/08/23/spend-until-youre-secure/</guid> 
      <description>&lt;p&gt;I was watching a few Twitter conversations about purchasing security last week and had yet another conversation about security ROI. This has me thinking about what we spend money on. In many industries we can spend our way out of problems, not all problems, but a lot of problems. With security if I gave you a blank check and said &amp;ldquo;fix it&amp;rdquo;, you couldn&amp;rsquo;t. Our problem isn&amp;rsquo;t money, it&amp;rsquo;s more fundamental than that.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 90 - Humans and misinformation</title>
      <link>https://opensourcesecurity.io/2018/04/02/episode-90-humans-and-misinformation/</link>
      <pubDate>Mon, 02 Apr 2018 01:24:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/04/episode-90-humans-and-misinformation.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about all the current misinformation, how humans react to it, and what it means for security.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-90_humans_and_misinformation.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-90_humans_and_misinformation.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-90_humans_and_misinformation.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.iflscience.com/technology/theres-a-rather-adult-reason-computer-virus-infections-in-the-us-drop-off-during-lent/&#34;&gt;Virus infections during lent&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Circular_reporting&#34;&gt;Wikipedia circular reporting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://thehill.com/policy/technology/379866-government-knows-dnc-hacker-was-russian-intel-officer-report&#34;&gt;Guccifer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/joshbressers/status/977163552137019392&#34;&gt;Bad Twitter VPN advice&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/08d6c-social-media-3271590.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e83e1-social-media-3271590.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 89 - Short selling AMD security flaws</title>
      <link>https://opensourcesecurity.io/2018/03/25/episode-89-short-selling-amd-security-flaws/</link>
      <pubDate>Sun, 25 Mar 2018 21:04:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/03/episode-89-short-selling-amd-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent AMD flaws and the events surrounding the disclosure.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-89_short_selling_amd_security_flaws.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-89_short_selling_amd_security_flaws.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode-89_short_selling_amd_security_flaws.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://amdflaws.com/&#34;&gt;AMD flaws&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sec.gov/news/speech/activism-short-termism-and-the-sec.html&#34;&gt;Activist investing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://technet.microsoft.com/en-us/mt846432.aspx&#34;&gt;Microsoft side channel bounty&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/fcb59-pins-564775.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/48073-pins-564775.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 88 - Chat with Chris Rosen from IBM about Container Security</title>
      <link>https://opensourcesecurity.io/2018/03/18/episode-88-chat-with-chris-rosen-from-ibm-about-container-security/</link>
      <pubDate>Sun, 18 Mar 2018 20:34:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/03/episode-88-chat-with-chris-rosen-from.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about container security with IBM&amp;rsquo;s Chris Rosen.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_88_chat_with_chris_rosen_from_ibm_about_container_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_88_chat_with_chris_rosen_from_ibm_about_container_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_88_chat_with_chris_rosen_from_ibm_about_container_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/ChrisRosen188&#34;&gt;Chris Rosen&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kubernetes.io/&#34;&gt;Kubernetes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ibm.com/blogs/bluemix/2017/05/ibm-google-lyft-give-microservices-ride-istio-service-mesh/&#34;&gt;Istio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://grafeas.io/&#34;&gt;Grafeas&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9fcad-chest-1710071.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/602f1-chest-1710071.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 87 - Chat with Let&#39;s Encrypt co-founder Josh Aas</title>
      <link>https://opensourcesecurity.io/2018/03/11/episode-87-chat-with-lets-encrypt-co-founder-josh-aas/</link>
      <pubDate>Sun, 11 Mar 2018 23:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/03/episode-87-chat-with-lets-encrypt-co.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Let&amp;rsquo;s Encrypt with co-founder Josh Aas. We discuss the past, present, and future of the project.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_87_Chat_with_lets_encrypt_co-founder_josh_aas.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_87_Chat_with_lets_encrypt_co-founder_josh_aas.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_87_Chat_with_lets_encrypt_co-founder_josh_aas.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/0xjosh?lang=en&#34;&gt;Josh Aas&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/86130-le-logo-standard.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/7c95a-le-logo-standard.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>But that&#39;s not my job!</title>
      <link>https://opensourcesecurity.io/2018/03/07/but-thats-not-my-job/</link>
      <pubDate>Wed, 07 Mar 2018 20:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/08/13/but-thats-not-my-job/</guid> 
      <description>&lt;p&gt;This week I&amp;rsquo;ve been thinking about how security people and non security people interact. Various conversations I have often end up with someone suggesting everyone needs some sort of security responsibility. My suspicion is this will never work.
&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/08/73ee5-nmj-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/08/73ee5-nmj-2400px.png?w=300&#34;&gt;&lt;/a&gt;
First some background to think about. In any organization there are certain responsibilities everyone has. Without using security as our specific example just yet, let&amp;rsquo;s consider how a typical building functions. You have people who are tasked with keeping the electricity working, the plumbing, the heating and cooling. Some people keep the building clean, some take care of the elevators. Some work in the building to accomplish some other task. If the company that inhabits the building is a bank you can imagine the huge number of tasks that take place inside.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 86 - What happens when 23 thousand certificates leak?</title>
      <link>https://opensourcesecurity.io/2018/03/05/episode-86-what-happens-when-23-thousand-certificates-leak/</link>
      <pubDate>Mon, 05 Mar 2018 22:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/03/episode-86-what-happens-when-23.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Trustico certificate incident and Let&amp;rsquo;s Encrypt.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_86_What_happens_when_23_thousand_certificates_leak.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_86_What_happens_when_23_thousand_certificates_leak.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_86_What_happens_when_23_thousand_certificates_leak.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://searchsecurity.techtarget.com/news/252436120/23000-Symantec-certificates-revoked-following-leak-of-private-keys&#34;&gt;Certificate revocation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.hackbusters.com/news/stories/2717650-trustico-shuts-down-website-over-alert-of-serious-flaw&#34;&gt;Trustico website incident&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://community.letsencrypt.org/t/acmev2-and-wildcard-launch-delay/53654&#34;&gt;Let&amp;rsquo;s Encrypt ACME v2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1181/&#34;&gt;XKCD PGP verification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.freeipa.org/page/Main_Page&#34;&gt;FreeIPA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1b63b-ssl-2890762.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5a74a-ssl-2890762.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 85 - NPM ate my files</title>
      <link>https://opensourcesecurity.io/2018/02/28/episode-85-npm-ate-my-files/</link>
      <pubDate>Wed, 28 Feb 2018 14:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/02/episode-85-npm-ate-my-files.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about npm 5.7.0 breaking Linux systems.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_85_npm_ate_my_files.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_85_npm_ate_my_files.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_85_npm_ate_my_files.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/npm/npm/issues/19883&#34;&gt;NPM 5.7.0 issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=16435305&#34;&gt;Hacker News thread&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c3663-package-2072221.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/30bde-package-2072221.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 84 - Have I been pwned?</title>
      <link>https://opensourcesecurity.io/2018/02/25/episode-84-have-i-been-pwned/</link>
      <pubDate>Sun, 25 Feb 2018 20:09:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/02/episode-84-have-i-been-pwned.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new data dump from Have I been pwned?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_84_Have_I_been_pwned.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_84_Have_I_been_pwned.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_84_Have_I_been_pwned.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;Have I been pwned?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/&#34;&gt;Pwned passwords version 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/936/&#34;&gt;XKCD password strength&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/71773-padlock-166882.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/7eff4-padlock-166882.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 83 - XKCD &#43; CVE = XKCVE</title>
      <link>https://opensourcesecurity.io/2018/02/21/episode-83-xkcd-cve-xkcve/</link>
      <pubDate>Wed, 21 Feb 2018 00:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/02/episode-83-xkcd-cve-xkcve.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the XKCD CVE comic and a flight simulator stealing credentials.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_83_XKCD_CVE_XKCVE.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_83_XKCD_CVE_XKCVE.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_83_XKCD_CVE_XKCVE.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d8b80-2018_cve_list_2x.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/0716f-2018_cve_list_2x.png&#34;&gt;&lt;/a&gt;&lt;a href=&#34;https://xkcd.com/1957/&#34;&gt;https://xkcd.com/1957/&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1957/&#34;&gt;XKCD CVE comic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.pcworld.com/article/3256281/storage/samsung-30tb-ssd-pm1643.html&#34;&gt;Samsung huge SSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/Games/comments/7ymy8y/flight_sim_labs_uses_password_extractor_targeted/&#34;&gt;Flight sim stealing credentials&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 82 - RSA, TLS, Chrome HTTP, and PCI</title>
      <link>https://opensourcesecurity.io/2018/02/13/episode-82-rsa-tls-chrome-http-and-pci/</link>
      <pubDate>Tue, 13 Feb 2018 23:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/02/episode-82-rsa-tls-chrome-http-and-pci.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about problems of textbook RSA implementations, the upcoming TLS changes in TLS, and the insecurity of http in Chrome.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_82_-_RSA_TLS_Chrome_HTTP_and_PCI.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_82_-_RSA_TLS_Chrome_HTTP_and_PCI.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_82_-_RSA_TLS_Chrome_HTTP_and_PCI.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arxiv.org/pdf/1802.03367.pdf&#34;&gt;Textbook RSA paper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)&#34;&gt;Wikipedia ECB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.pcisecuritystandards.org/migrating-from-ssl-and-early-tls&#34;&gt;PCI and TLS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/02/08/google_chrome_http_shame/&#34;&gt;Google Chrome and insecure http&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6f540-data-key-571156.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8f4ff-data-key-571156.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 81 - Autosploit, bug bounties, and the future of security</title>
      <link>https://opensourcesecurity.io/2018/02/07/episode-81-autosploit-bug-bounties-and-the-future-of-security/</link>
      <pubDate>Wed, 07 Feb 2018 00:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/02/episode-81-autosploit-bug-bounties-and.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about AutoSploit, bug bounties and fixing flaws, market forces in security, future expectations, and how humans perceive threats.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_81-Autosploit_bug_bounties_and_the_future_of_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_81-Autosploit_bug_bounties_and_the_future_of_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_81-Autosploit_bug_bounties_and_the_future_of_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/NullArray/AutoSploit&#34;&gt;AutoSploit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Security_Administrator_Tool_for_Analyzing_Networks&#34;&gt;SATAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2016/01/gm-asks-friendly-hackers-to-report-its-cars-security-flaws/&#34;&gt;GM Promises not to sue researchers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/article/us-usa-equifax-cfpb/exclusive-u-s-consumer-protection-official-puts-equifax-probe-on-ice-sources-idUSKBN1FP0IZ&#34;&gt;Equifax probe put on ice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/&#34;&gt;Mozilla strips referer path&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://svencharleer.com/blog/2018/02/02/family-fun-with-deepfakes-or-how-i-got-my-wife-onto-the-tonight-show/&#34;&gt;Face swap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/investigations/a-woman-approached-the-post-with-dramatic--and-false--tale-about-roy-moore-sje-appears-to-be-part-of-undercover-sting-operation/2017/11/27/0c2e335a-cfb6-11e7-9d3a-bcbe2af58c3a_story.html?utm_term=.a184a4f3c487&#34;&gt;Washington post fake story&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6b9cd-light-bulb-3104355.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/058a2-light-bulb-3104355.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 80 - GPS tracking and jamming</title>
      <link>https://opensourcesecurity.io/2018/01/31/episode-80-gps-tracking-and-jamming/</link>
      <pubDate>Wed, 31 Jan 2018 00:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/01/episode-80-gps-tracking-and-jamming.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about GPS metadata giving away military bases and GPS jamming as part of testing.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_80_-_GPS_tracking_and_jamming.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_80_-_GPS_tracking_and_jamming.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_80_-_GPS_tracking_and_jamming.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/news/comments/7tmjlg/fitness_tracking_app_gives_away_location_of/&#34;&gt;Fitness tracking secret locations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.thedrive.com/the-war-zone/17987/usaf-is-jamming-gps-in-the-western-u-s-for-largest-ever-red-flag-air-war-exercise&#34;&gt;Jamming GPS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/dff11-map-525349.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/7a24d-map-525349.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 79 - Skyfall: please don&#39;t yell &#39;fire&#39;</title>
      <link>https://opensourcesecurity.io/2018/01/24/episode-79-skyfall-please-dont-yell-fire/</link>
      <pubDate>Wed, 24 Jan 2018 00:11:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/01/episode-79-skyfall-please-dont-yell-fire.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3ef24-scotland-737636.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c977e-scotland-737636.jpg&#34;&gt;&lt;/a&gt;Skyfall Scotland&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Skyfall, fake reports, risk, logging, and how a civilized society functions.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_79_-_skyfall_please_dont_yell_fire.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_79_-_skyfall_please_dont_yell_fire.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_79_-_skyfall_please_dont_yell_fire.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20180122135521/http://skyfallattack.com&#34;&gt;Skyfall attack (via archive.org)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://httpoxy.org/&#34;&gt;httpoxy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/news/to-your-health/wp/2018/01/13/teens-are-daring-each-other-to-eat-tide-pods-we-dont-need-to-tell-you-thats-a-bad-idea/?utm_term=.5155eb25b211&#34;&gt;Tide pod challenge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.colgatecommercial.com/brands.aspx?brand=Fabuloso&#34;&gt;Fabuloso&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Parable_of_the_broken_window&#34;&gt;Broken Window Parable&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.telegraph.co.uk/news/2018/01/19/british-15-year-old-gained-access-intelligence-operations-afghanistan/&#34;&gt;15 year old head of CIA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/however-improbable-the-story-of-a-processor-bug/&#34;&gt;Cloudflare core dumps&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 78 - Risk lessons from Hawaii</title>
      <link>https://opensourcesecurity.io/2018/01/16/episode-78-risk-lessons-from-hawaii/</link>
      <pubDate>Tue, 16 Jan 2018 22:40:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/01/episode-78-risk-lessons-from-hawaii.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the accidental missile warning in Hawaii. We also discuss general preparedness and risk.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_78_-_Risk_lessons_from_Hawaii.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_78_-_Risk_lessons_from_Hawaii.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_78_-_Risk_lessons_from_Hawaii.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://lh4.googleusercontent.com/hydp6KVqJVqmdsqm2abuULD2feQV67VXZsYMPfZ6AEdxYJHbSOHjllxe7fd7YQjskpEROnLzg4MxZ8O8ktk6wHmfemyd4K9ar2ElfQGuUQ6yad8vYK1I-LEzbGZrtsWGUCPAUcn_&#34;&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/news/post-nation/wp/2018/01/14/hawaii-missile-alert-how-one-employee-pushed-the-wrong-button-and-caused-a-wave-of-panic/?utm_term=.905049405106&#34;&gt;Hawaii missile incident&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/970/&#34;&gt;XKCD&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1bb10-banner-1559395.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b0202-banner-1559395.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 77 - npm and the supply chain</title>
      <link>https://opensourcesecurity.io/2018/01/11/episode-77-npm-and-the-supply-chain/</link>
      <pubDate>Thu, 11 Jan 2018 02:42:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/01/episode-77-npm-and-supply-chain.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the recent npm happenings. What it means for the supply chain, and we end with some thoughts on how maybe none of this matters.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_77_-_npm_and_the_supply_chain.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_77_-_npm_and_the_supply_chain.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_77_-_npm_and_the_supply_chain.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://blog.npmjs.org/post/141577284765/kik-left-pad-and-npm&#34;&gt;npm and kik&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5&#34;&gt;Harvesting credit card numbers story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tidelift.com/&#34;&gt;Tidelift&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/IBM_3270&#34;&gt;TN3270&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/94abe-gear-2291916.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b7d4c-gear-2291916.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 76 - Meltdown aftermath</title>
      <link>https://opensourcesecurity.io/2018/01/07/episode-76-meltdown-aftermath/</link>
      <pubDate>Sun, 07 Jan 2018 21:11:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2018/01/episode-76-meltdown-aftermath.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the aftermath of Meltdown. The details of the flaw are probably less interesting than what happens now.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://seclists.org/fulldisclosure/2018/Jan/12&#34;&gt;AMD certificate flaw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fail0verflow.com/blog/2017/ps4-crashdump-dump/&#34;&gt;Dumping the PS4 kernel in 6 days&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/&#34;&gt;Raspberry Pi not vulnerable to Meltdown&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.kb.cert.org/vuls/id/584653&#34;&gt;CERT says get a new CPU&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2018/01/04/microsoft_windows_patch_meltdown/&#34;&gt;Windows A/V registry key&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5ede3-meltdown-text.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f3f8a-meltdown-text.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security and privacy are the same thing</title>
      <link>https://opensourcesecurity.io/2018/01/02/security-and-privacy-are-the-same-thing/</link>
      <pubDate>Wed, 03 Jan 2018 01:36:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/07/23/security-and-privacy-are-the-same-thing/</guid> 
      <description>&lt;p&gt;Earlier today I ran across this post on Reddit
&lt;a href=&#34;https://www.reddit.com/r/cybersecurity/comments/6ox9ye/security_but_not_privacy_am_i_doing_this_right/&#34;&gt;Security but not Privacy (Am I doing this right?)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The poster basically said &amp;ldquo;I care about security but not privacy&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;It got me thinking about security and privacy. There&amp;rsquo;s not really a difference between the two. They are two faces of the same coin but why isn&amp;rsquo;t always obvious in today&amp;rsquo;s information universe. If a site like Facebook or Google knows everything about you it doesn&amp;rsquo;t mean you don&amp;rsquo;t care about privacy, it means you&amp;rsquo;re putting your trust in those sites. The same sort of trust that makes passwords private.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 75 - Security Planner review</title>
      <link>https://opensourcesecurity.io/2017/12/19/episode-75-security-planner-review/</link>
      <pubDate>Tue, 19 Dec 2017 19:49:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/12/episode-75-security-planner-review.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Security Planner website. It&amp;rsquo;s pretty good all things considered.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_76_-_Meltdown_aftermath.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://securityplanner.org/&#34;&gt;Security Planner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twofactorauth.org/&#34;&gt;https://twofactorauth.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=KUOD8SaNblE&#34;&gt;Minecraft streamer house fire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.twitch.tv/sp00k13z&#34;&gt;Tor livestream&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ac6d6-ticked-off-1166601.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bae3b-ticked-off-1166601.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 74 - Facial recognition and physical security</title>
      <link>https://opensourcesecurity.io/2017/12/13/episode-74-facial-recognition-and-physical-security/</link>
      <pubDate>Wed, 13 Dec 2017 02:21:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/12/episode-74-facial-recognition-and.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about facial recognition, physical security, banking, and Amazon Alexa.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_74_-_Facial_recognition_and_physical_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_74_-_Facial_recognition_and_physical_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_74_-_Facial_recognition_and_physical_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bbc.com/news/av/world-asia-china-42248056/in-your-face-china-s-all-seeing-state&#34;&gt;Facial recognition&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/news/worldviews/wp/2017/10/09/austria-wanted-to-ban-burqas-now-it-also-fines-mascots-and-stops-cyclists-who-wear-scarves/&#34;&gt;Anti shark mask law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://nationalpost.com/pmn/news-pmn/nevada-dmv-nabs-criminal-with-facial-recognition-technology&#34;&gt;Nevada driver&amp;rsquo;s license&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=DufnT2LnHWk&#34;&gt;Windows 1.0 to Windows 10 upgrade&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3fab8-smiley-2979107.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e66f8-smiley-2979107.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 73 - Security from Santa</title>
      <link>https://opensourcesecurity.io/2017/12/06/episode-73-security-from-santa/</link>
      <pubDate>Wed, 06 Dec 2017 01:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/12/episode-73-security-from-santa.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/71fe5-jolly-old-saint-nick.gif&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/89bd4-jolly-old-saint-nick.gif&#34;&gt;&lt;/a&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about basic security metrics and security &lt;strong&gt;from&lt;/strong&gt; Santa. Is Santa GDPR compliant?&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_73_-_Security_from_Santa.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_73_-_Security_from_Santa.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_73_-_Security_from_Santa.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/12/needless_panic_.html&#34;&gt;Schneier airplane access point&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.opensourcesecuritypodcast.com/2016/12/episode-18-security-of-santa.html&#34;&gt;Security of Santa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Santa_Claus_Bank_Robbery&#34;&gt;Santa Claus Bank Robbers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.polygon.com/2017/12/4/16733386/ufc-pay-per-view-streamed-on-twitch-by-a-guy-pretending-it-was-a-video-game&#34;&gt;Streaming PPV&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.montereyherald.com/article/NF/20150106/NEWS/150109913&#34;&gt;Santa distributing marijuana&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theguardian.com/uk-news/2015/dec/21/knife-wielding-santa-claus-robs-kfc?CMP=twt_gu&#34;&gt;Santa KFC robbery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.msnbc.msn.com/id/28157154/ns/technology_and_science-security/%20&#34;&gt;Stolen Baby Jesus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/G%C3%A4vle_goat&#34;&gt;Gävle goat&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.digitaljournal.com/article/67155&#34;&gt;Holiday float driver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.ozy.com/opinion/how-many-crimes-would-santa-be-guilty-of-if-he-were-real/74235&#34;&gt;Crimes Santa commits&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 72 - Bitcoin: It&#39;s over 9000</title>
      <link>https://opensourcesecurity.io/2017/11/28/episode-72-bitcoin-its-over-9000/</link>
      <pubDate>Tue, 28 Nov 2017 20:47:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/11/episode-72-bitcoin-its-over-9000.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Bitcoin, blockchain, and other cryptocurrencies.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_72_-_Bitcoin_its_over_9000.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_72_-_Bitcoin_its_over_9000.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_72_-_Bitcoin_its_over_9000.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Guarding_Tess&#34;&gt;Car power outlet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://knowyourmeme.com/memes/its-over-9000&#34;&gt;Over 9000&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.businessinsider.com/electricity-required-for-single-bitcoin-trade-could-power-a-house-for-a-month-2017-10&#34;&gt;Bitcoin power use&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blockchain.info/charts/n-transactions?timespan=2years&amp;amp;scale=1&#34;&gt;Bitcoin transaction chart&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.datacenterknowledge.com/archives/2014/11/06/fire-bitcoin-mine-destroys-equipment&#34;&gt;Bitcoin mining fire&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.fool.com/investing/2017/11/21/bitcoin-is-15-times-more-expensive-to-keep-safe-th.aspx&#34;&gt;Bitcoin is 15 times more expensive to keep secure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2017/11/21/company-raises-347k-ico-vanishes/&#34;&gt;ICO takes $347K and leaves&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Bre-X&#34;&gt;Bre-X&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f9c1f-bitcoin-2921930.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/204c4-bitcoin-2921930.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 71 - GitHub&#39;s Security Scanner</title>
      <link>https://opensourcesecurity.io/2017/11/21/episode-71-githubs-security-scanner/</link>
      <pubDate>Tue, 21 Nov 2017 15:47:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/11/episode-71-githubs-security-scanner.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about GitHub&amp;rsquo;s security scanner and Linus&amp;rsquo; security email. We clarify the esoteric difference between security bugs and non security bugs.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_71_-_GitHubs_security_scanner.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_71_-_GitHubs_security_scanner.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_71_-_GitHubs_security_scanner.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/blog/2470-introducing-security-alerts-on-github&#34;&gt;GitHub&amp;rsquo;s security scanner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lkml.org/lkml/2017/11/17/423&#34;&gt;Linus&amp;rsquo; security email&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/68d7d-programming-1857236.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/42718-programming-1857236.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 70 - The security of Intel ME</title>
      <link>https://opensourcesecurity.io/2017/11/14/episode-70-the-security-of-intel-me/</link>
      <pubDate>Tue, 14 Nov 2017 23:54:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/11/episode-70-security-of-intel-me.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Intel ME, Equifax salary history, and IoT.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_70_-_The_security_of_Intel_ME.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_70_-_The_security_of_Intel_ME.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_70_-_The_security_of_Intel_ME.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.tomshardware.com/news/minix-creator-letter-intel-management-engine,35900.html&#34;&gt;MINUX and Intel ME&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/11/09/chipzilla_come_closer_closer_listen_dump_ime/&#34;&gt;Dumping the IME&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://schd.ws/hosted_files/osseu17/84/Replace%20UEFI%20with%20Linux.pdf&#34;&gt;Replacing firmware with Linux (PDF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.extremetech.com/mobile/258998-1-billion-android-devices-two-years-date&#34;&gt;1 billion android devices 2 years out of date&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mjg59.dreamwidth.org/47803.html&#34;&gt;Matthew Garrett and Ikea lightbulbs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2017/11/how-to-opt-out-of-equifax-revealing-your-salary-history/&#34;&gt;Equifax salary history&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://debatereport.com/business/paypal-receives-federal-court-order-to-disclose-personal-information-to-the-canada-revenue-agency/4417&#34;&gt;Canada and Paypal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/23/arm_platform_security_architecture/&#34;&gt;ARM BIOS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/5fe57-gears-1236578.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/23fa9-gears-1236578.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 69 - Actionable security advice</title>
      <link>https://opensourcesecurity.io/2017/11/07/episode-69-actionable-security-advice/</link>
      <pubDate>Tue, 07 Nov 2017 20:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/11/episode-69-actionable-security-advice.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Amazon Key and actionable advice.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_69_-_Actionable_security_advice.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_69_-_Actionable_security_advice.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_69_-_Actionable_security_advice.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/926985108749299712&#34;&gt;Amazon Key&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=2xBcOFX02EI&#34;&gt;Shotgun shell in a box&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://akstech.en.alibaba.com/product/60553790296-219302200/Tiltwatch_XTR_Tiltwatch_Plus_Tilt_Sensor_Tip_Indicator_for_Precise_Instrument_Shipping.html&#34;&gt;Tilt sensor for shipping&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ&#34;&gt;Lock Picking Lawyer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Antwerp_diamond_heist&#34;&gt;Antwerp diamond heist&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/99c89-detour-1180794.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a0fd0-detour-1180794.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 68 - Ruining the Internet</title>
      <link>https://opensourcesecurity.io/2017/11/01/episode-68-ruining-the-internet/</link>
      <pubDate>Wed, 01 Nov 2017 14:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/11/episode-68-ruining-internet.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Facebook listening to your microphone, Google Chrome certificate pinning, CAs, 152 ways to stay safe, and Kubernetes.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_68_-_Ruining_the_Internet.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_68_-_Ruining_the_Internet.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_68_-_Ruining_the_Internet.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a63b2-computer-2049019.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/da26e-computer-2049019.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.miamiherald.com/news/nation-world/national/article181947111.html&#34;&gt;Facebook listens to your microphone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.zdnet.com/article/google-chrome-is-backing-away-from-public-key-pinning-and-heres-why/&#34;&gt;Google Chrome certificate pinning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/30/mozilla_mistrust_dutch_ca/&#34;&gt;Dutch CA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/24/googles_security_advice_we_dunno/&#34;&gt;152 security things to stay safe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2017/10/17/docker-gives-into-invevitable-and-offers-native-kubernetes-support/&#34;&gt;Docker and Kubernetes&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 67 - Cyber won</title>
      <link>https://opensourcesecurity.io/2017/10/24/episode-67-cyber-won/</link>
      <pubDate>Tue, 24 Oct 2017 18:19:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/10/episode-67-cyber-won.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about hacking back, passwords, honeypots, and conspiracies.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_67_-_Cyber_won.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_67_-_Cyber_won.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_67_-_Cyber_won.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.slate.com/articles/technology/future_tense/2017/10/hacking_back_the_worst_idea_in_cybersecurity_rises_again.html&#34;&gt;Hacking back&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lesslethal.com/products/12-gauge/als12skymi-5-detail&#34;&gt;SKYNET Mi-5 net shotgun shell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://news.bbc.co.uk/2/hi/technology/3639679.stm&#34;&gt;Give up your password for chocolate&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/23/illusive_networks_decoy_server_software/&#34;&gt;Honeypot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://developer.atlassian.com/blog/2017/10/project-spacecrab-breach-detection/&#34;&gt;Project Spacecrab AWS honeypot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/local/trump-plans-to-release-of-jfk-assassination-documents-despite-concerns-from-federal-agencies/2017/10/21/d036cf36-b65d-11e7-9e58-e6288544af98_story.html?tid=pm_pop&#34;&gt;JFK documents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=P6MOnehCOUw&#34;&gt;That Mitchell and Webb Look - Moon Landing Sketch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/bab03-ransomware-2321110_1920.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/36744-ransomware-2321110_1920.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 66 - Objects in mirror are less terrible than they appear</title>
      <link>https://opensourcesecurity.io/2017/10/16/episode-66-objects-in-mirror-are-less-terrible-than-they-appear/</link>
      <pubDate>Mon, 16 Oct 2017 15:59:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/10/episode-66-objects-in-mirror-are-less.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Equifax again, Kaspersky, TLS CAs, coming change, social security numbers, and Minecraft.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_66_-_Objects_in_mirror_are_less_terrible_than_they_appear.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_66_-_Objects_in_mirror_are_less_terrible_than_they_appear.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_66_-_Objects_in_mirror_are_less_terrible_than_they_appear.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/news/features/2017-09-29/the-equifax-hack-has-all-the-hallmarks-of-state-sponsored-pros&#34;&gt;Equifax state sponsored?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.mirror.co.uk/tech/facebooks-creepy-friend-suggestion-feature-11071860&#34;&gt;Facebook finds relatives&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.washingtonpost.com/world/national-security/israel-hacked-kaspersky-then-tipped-the-nsa-that-its-tools-had-been-breached/2017/10/10/d48ce774-aa95-11e7-850e-2bdd1236be5d_story.html?hpid=hp_rhp-top-table-main_kaspersky-735pm%3Ahomepage%2Fstory&amp;amp;utm_term=.150b3caec8d6&#34;&gt;Kaspersky&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/joshbressers/containerzoo&#34;&gt;Container Zoo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.csoonline.com/article/3232988/cyber-attacks-espionage/cybersecurity-why-is-it-so-hard-to-get-anything-right.html&#34;&gt;Josh&amp;rsquo;s blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.nytimes.com/2016/03/26/world/europe/belgium-fears-nuclear-plants-are-vulnerable.html&#34;&gt;Belgian power plant attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f1549-2044614463_f7a4ada4c7_o.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/94f0d-2044614463_f7a4ada4c7_o.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 65 - Will aliens overthrow us before AI?</title>
      <link>https://opensourcesecurity.io/2017/10/09/episode-65-will-aliens-overthrow-us-before-ai/</link>
      <pubDate>Mon, 09 Oct 2017 00:47:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/10/episode-65-will-aliens-overthrow-us.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Apple, Equifax, passwords, AI, and aliens.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_65_-_Will_aliens_overthrow_us_before_AI.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_65_-_Will_aliens_overthrow_us_before_AI.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_65_-_Will_aliens_overthrow_us_before_AI.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/&#34;&gt;Apple password problems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/10/04/sole_security_worker_at_fault_for_equifax_fail_says_former_ceo/&#34;&gt;1 person blamed for Equifax&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;Have I been pwned?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.datagenetics.com/blog/september32012/&#34;&gt;PIN heat maps&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c39ed-alien-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1341f-alien-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 64 - Networks and Dnsmasq and IoT oh my</title>
      <link>https://opensourcesecurity.io/2017/10/03/episode-64-networks-and-dnsmasq-and-iot-oh-my/</link>
      <pubDate>Tue, 03 Oct 2017 19:18:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/10/episode-64-networks-and-dnsmasq-and-iot.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about networks, Dnsmasq, IoT, and our coming security dystopian future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_64_-_Networks_and_Dnsmasq_and_IoT_oh_my.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_64_-_Networks_and_Dnsmasq_and_IoT_oh_my.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_64_-_Networks_and_Dnsmasq_and_IoT_oh_my.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html&#34;&gt;Dnsmasq security issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://theintercept.com/2015/08/26/way-gchq-obliterated-guardians-laptops-revealed-intended/&#34;&gt;Glen Greenwald&amp;rsquo;s laptop destruction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/user/arduinoversusevil&#34;&gt;Cheap product reviews&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f9296-1280913718-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/17d86-1280913718-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 63 - Shoot, Shovel, and Bury</title>
      <link>https://opensourcesecurity.io/2017/09/26/episode-63-shoot-shovel-and-bury/</link>
      <pubDate>Tue, 26 Sep 2017 12:52:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/09/episode-63-shoot-shovel-and-bury.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Equifax breach (again) and what it will mean for all of us. Blueborne comes up, as well as #TrevorForget.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_63_-_Shoot_Shovel_and_Bury.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_63_-_Shoot_Shovel_and_Bury.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_63_-_Shoot_Shovel_and_Bury.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/equifax-releases-new-information-about-security-breach-as-top-execs-step-down/&#34;&gt;More Equifax&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://beta.theglobeandmail.com/report-on-business/economy/housing/mortgage-fraud-on-the-rise-among-brokers-trying-to-help-clients-qualify/article27051297/&#34;&gt;Mortgage Fraud&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/09/bluetooth_vulne.html&#34;&gt;Blueborne&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.imdb.com/title/tt2085059/&#34;&gt;Black Mirror&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.csoonline.com/article/3227910/security/hackers-create-memorial-for-a-cockroach-named-trevor.html&#34;&gt;#TrevorForget&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.buzzfeed.com/craigsilverman/people-in-toronto-created-a-memorial-to-a-dead-raccoon-after?utm_term=.wplJp7MZP#.qtvlev5Qg&#34;&gt;Raccoon Memorial&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/235e6-let-help-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/909ce-let-help-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 62 - All about the Equifax hack</title>
      <link>https://opensourcesecurity.io/2017/09/11/episode-62-all-about-the-equifax-hack/</link>
      <pubDate>Mon, 11 Sep 2017 14:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/09/episode-62-all-about-equifax-hack.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the Equifax breach and what it will mean for all of us.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_62_-_All_about_the_Equifax_hack.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_62_-_All_about_the_Equifax_hack.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_62_-_All_about_the_Equifax_hack.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://globalnews.ca/news/3727677/equifax-data-hack-canada/&#34;&gt;Equifax affects Canadians&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax&#34;&gt;Struts Equifax statement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bloomberg.com/news/articles/2017-09-07/three-equifax-executives-sold-stock-before-revealing-cyber-hack&#34;&gt;Equifax stock sales&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnbc.com/2017/09/08/suspect-trading-in-equifax-options-before-breach-might-have-generated-millions-in-profit.html&#34;&gt;Equifax stock options&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4d8fd-stockup-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1fae7-stockup-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 61 - Market driven security</title>
      <link>https://opensourcesecurity.io/2017/09/05/episode-61-market-driven-security/</link>
      <pubDate>Tue, 05 Sep 2017 12:17:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/09/episode-61-market-driven-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about our lack of progress in security, economics, and how to interact with peers.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_61_-_Market_driven_security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_61_-_Market_driven_security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_61_-_Market_driven_security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2017/09/the-father-of-modern-security-b-f.html&#34;&gt;Josh&amp;rsquo;s B.F. Skinner Blog Post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://gizmodo.com/the-guy-who-invented-those-annoying-password-rules-now-1797643987&#34;&gt;Password apology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnbc.com/2017/09/04/alibaba-launches-smile-to-pay-facial-recognition-system-at-kfc-china.html&#34;&gt;Smile to pay&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://globalnews.ca/news/3639735/woman-receives-11k-power-bill-for-condo-as-if-paying-for-the-whole-building/&#34;&gt;Whole condo power bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2015/10/the-third-group.html&#34;&gt;The third group&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/465b9-antiflash-icons-graphs-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b2b24-antiflash-icons-graphs-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 60 - The official blockchain episode</title>
      <link>https://opensourcesecurity.io/2017/08/30/episode-60-the-official-blockchain-episode/</link>
      <pubDate>Wed, 30 Aug 2017 13:30:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/08/episode-60-official-blockchain-episode.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the eclipse and blockchain.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_60_-_The_official_blockchain_episode.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_60_-_The_official_blockchain_episode.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_60_-_The_official_blockchain_episode.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=qc7MfcKF1-s&#34;&gt;Smarter Every Day Eclipse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://eclipse2017.nasa.gov/eclipse-ballooning-project&#34;&gt;Eclipse balloon project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/pulse/blockchain-solution-industry-credentialing-jim-reavis&#34;&gt;CSA Blockchain CPE Effort&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coindesk.com/sell-short-bitcoin-traders-preparing-possible-fork/&#34;&gt;Short selling bitcoin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.antipope.org/charlie/blog-static/2013/12/why-i-want-bitcoin-to-die-in-a.html&#34;&gt;Charlie Stross on Bitcoin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://money.cnn.com/2017/01/04/news/india/india-cash-crisis-rupee/index.html&#34;&gt;India&amp;rsquo;s cash problem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.npr.org/sections/money/2013/04/12/177051690/most-100-bills-live-outside-the-u-s&#34;&gt;Most 100 dollar bills are outside the US&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6986b-blockchain_illustration.jpg&#34;&gt;&lt;img alt=&#34;https://commons.wikimedia.org/wiki/File:Blockchain_Illustration.jpg&#34; loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9c9a7-blockchain_illustration.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 59 - The VPN Episode</title>
      <link>https://opensourcesecurity.io/2017/08/15/episode-59-the-vpn-episode/</link>
      <pubDate>Tue, 15 Aug 2017 15:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/08/episode-59-vpn-episode.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about VPNs and the upcoming eclipse.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_59_-_The_VPN_Episode.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_59_-_The_VPN_Episode.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_59_-_The_VPN_Episode.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.torproject.org/docs/faq.html.en#AmITotallyAnonymous&#34;&gt;Tor FAQ on not being anonymous&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2016/07/using-hootoo-nano-as-magic-vpn-box.html&#34;&gt;HooToo Nano as a VPN box&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://vpnreport.org/&#34;&gt;VPN Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://panopticlick.eff.org/&#34;&gt;Panopticlick&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wireguard.com/&#34;&gt;WireGuard&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/7169e-eclipsevpn.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ec1c0-eclipsevpn.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 58 - Backwards compatibility to the point of insanity</title>
      <link>https://opensourcesecurity.io/2017/08/09/episode-58-backwards-compatibility-to-the-point-of-insanity/</link>
      <pubDate>Wed, 09 Aug 2017 13:21:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/08/episode-58-backwards-compatibility-to.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about MalwareTech, Debian killing off TLS 1.0 and 1.1, auto safety, HBO, and npm not typo squatting.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_58_-_Backwards_compatibility_to_the_point_of_insanity.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_58_-_Backwards_compatibility_to_the_point_of_insanity.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_58_-_Backwards_compatibility_to_the_point_of_insanity.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/wannacry-malwaretech-arrest/&#34;&gt;MalwareTech arrest&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lists.debian.org/debian-devel-announce/2017/08/msg00004.html&#34;&gt;Debian killing off TLS 1.0 and 1.1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://t.co/x31clLBkNp&#34;&gt;Becky Bace auto safety talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=joMK1WZjP7g&#34;&gt;New car crashing into an old car&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.slate.com/blogs/future_tense/2017/08/08/hbo_hackers_want_7_5_million_to_stop_leaking_game_of_thrones.html&#34;&gt;HBO Hackers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/attackers-use-typo-squatting-to-steal-npm-credentials/127235/&#34;&gt;npm credential stealing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://thehackernews.com/2017/07/chrome-extention-hacking-adware.html&#34;&gt;Chrome extension hijack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.macrumors.com/2017/05/07/handbrake-app-security-warning-servers-hacked/&#34;&gt;Handbrake mirror hacked&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/ChALkeR/notes/blob/master/Gathering-weak-npm-credentials.md&#34;&gt;Weak npm credentials&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b9505-high_five.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/617f7-high_five.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 57 - We may never see amazing security research ever again</title>
      <link>https://opensourcesecurity.io/2017/08/01/episode-57-we-may-never-see-amazing-security-research-ever-again/</link>
      <pubDate>Tue, 01 Aug 2017 13:37:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/08/episode-57-we-may-never-see-amazing.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Black Hat and Defcon, safes, banks, voting machines, SMBv1 DoS attack, Flash, liability, and password masking.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_57_-_We_may_never_see_amazing_security_research_ever_again.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_57_-_We_may_never_see_amazing_security_research_ever_again.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_57_-_We_may_never_see_amazing_security_research_ever_again.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/watch-robot-crack-safe/&#34;&gt;Safe cracking robot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/technology/2017/jul/27/russian-criminal-mastermind-4bn-bitcoin-laundering-scheme-arrested-mt-gox-exchange-alexander-vinnik&#34;&gt;Mt. Gox arrest&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/voting-machine-hacks-defcon/&#34;&gt;Defcon Voting Village&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.improbable.com/airchives/paperair/volume6/v6i4/postal-6-4.html&#34;&gt;Mailing strange things&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/07/30/slow_loris_smbv1_attack/&#34;&gt;SMBLoris attack against SMBv1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://techcrunch.com/2017/07/25/get-ready-to-say-goodbye-to-flash-in-2020/&#34;&gt;Flash dies in 2020&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://rasteri.blogspot.com/2011/03/chain-of-fools-upgrading-through-every.html&#34;&gt;Upgrading every version of windows&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/DevOps#History&#34;&gt;DevOps history&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.smithsonianmag.com/smart-news/ingenious-brick-helped-wine-industry-survive-prohibition-180956412/&#34;&gt;Prohibition grape juice warning&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/07/27/killer_car_wash/&#34;&gt;Killer Car Wash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/07/password_maskin.html&#34;&gt;Password Masking&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Summer is coming</title>
      <link>https://opensourcesecurity.io/2017/07/20/summer-is-coming/</link>
      <pubDate>Thu, 20 Jul 2017 12:24:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/07/20/summer-is-coming/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;m getting ready to attend Black Hat. I will miss BSides and Defcon this year unfortunately due to some personal commitments. And as I&amp;rsquo;m packing up my gear, I started thinking about what these conferences have really changed. We&amp;rsquo;ve been doing this every summer for longer than many of us can remember now. We make our way to the desert, we attend talks by what we consider the brightest minds in our industry. We meet lots of people. Everyone has a great time. But what is the actionable events that come from these things.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 56 - Devil&#39;s Advocate and other fuzzy topics</title>
      <link>https://opensourcesecurity.io/2017/07/18/episode-56-devils-advocate-and-other-fuzzy-topics/</link>
      <pubDate>Tue, 18 Jul 2017 20:50:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/07/episode-56-devils-advocate-and-other.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about forest fires, fuzzing, old time Internet, and Net Neutrality. Listen to Kurt play the Devil&amp;rsquo;s Advocate and manage to change Josh&amp;rsquo;s mind about net neutrality.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_56_-_Devils_advocate_and_other_fuzzy_topics.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_56_-_Devils_advocate_and_other_fuzzy_topics.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/Episode_56_-_Devils_advocate_and_other_fuzzy_topics.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://animal0day.blogspot.ca/2017/07/from-fuzzing-apache-httpd-server-to-cve.html&#34;&gt;Fuzzing httpd&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://freeradius.org/security/fuzzer-2017.html&#34;&gt;Fuzzing Freeradius&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://lcamtuf.coredump.cx/afl/&#34;&gt;AFL Fuzzer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/dxa4481/truffleHog&#34;&gt;TruffleHog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Archie_search_engine&#34;&gt;Archie search engine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://history.nasa.gov/computers/Ch4-5.html&#34;&gt;Space shuttle code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/article/us-usa-internet-idUSKBN1A20W0&#34;&gt;Net Neutrality&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e84f1-remigho-demon-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e75cb-remigho-demon-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 55 - Good docs ruin my story</title>
      <link>https://opensourcesecurity.io/2017/07/12/episode-55-good-docs-ruin-my-story/</link>
      <pubDate>Wed, 12 Jul 2017 13:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/07/episode-55-good-docs-ruin-my-story.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Let&amp;rsquo;s Encrypt, certificates, Kaspersky, A/V, code signing, Not Petya, self driving cars, and failures that become security problems.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/332865562-opensourcesecuritypodcast-episode-55-good-docs-ruin-my-story.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/332865562-opensourcesecuritypodcast-episode-55-good-docs-ruin-my-story.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/332865562-opensourcesecuritypodcast-episode-55-good-docs-ruin-my-story.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/2017/07/06/wildcard-certificates-coming-jan-2018.html&#34;&gt;Let&amp;rsquo;s Encrypt Wildcard Certificates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/repository/&#34;&gt;Let&amp;rsquo;s Encrypt Audit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/google-to-fully-distrust-wosignstartcom-ssl-certs-in-chrome-61/126729/&#34;&gt;Chrome 61 to distrust WoSign and StartCom&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.npr.org/sections/parallels/2017/07/05/535651597/congress-casts-a-suspicious-eye-on-russias-kaspersky-lab&#34;&gt;Kaspersky Story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bankinfosecurity.com/notpetya-patient-zero-ukrainian-accounting-software-vendor-a-10080&#34;&gt;Ukrain Account Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Bloomberg_Terminal&#34;&gt;Bloomberg Terminals&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://msdn.microsoft.com/en-us/library/ms537361(v=vs.85).aspx&#34;&gt;Microsoft Code Signing Documents&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a68f5-paper-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f675b-paper-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Who&#39;s got your hack back?</title>
      <link>https://opensourcesecurity.io/2017/07/09/whos-got-your-hack-back/</link>
      <pubDate>Sun, 09 Jul 2017 00:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/07/09/whos-got-your-hack-back/</guid> 
      <description>&lt;p&gt;The topic of hacking back keeps coming up these days. There&amp;rsquo;s an attempt to pass a bill in the US that would legalize hacking back. There are many opinions on this topic, I&amp;rsquo;m generally not one to take a hard stand against what someone else thinks. In this case though, if you think hacking back is a good idea, you&amp;rsquo;re wrong. Painfully wrong.&lt;/p&gt;
&lt;p&gt;Everything I&amp;rsquo;ve seen up to this point tells me the people who think hacking back is a good idea are either mistaken about the issue or they&amp;rsquo;re misleading others on purpose. Hacking back isn&amp;rsquo;t self defense, it&amp;rsquo;s not about being attacked, it&amp;rsquo;s not about protection. It&amp;rsquo;s a terrible idea that has no place in a modern society. Hacking back is some sort of stone age retribution tribal law. It has no place in our world.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 54 - Turning into an old person</title>
      <link>https://opensourcesecurity.io/2017/07/04/episode-54-turning-into-an-old-person/</link>
      <pubDate>Tue, 04 Jul 2017 21:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/07/episode-54-turning-into-old-person.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Canada Day, Not Petya, Interac goes down, Minecraft, airport security and books, then GDPR.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/331564004-opensourcesecuritypodcast-episode-54-turning-into-an-old-person.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/331564004-opensourcesecuritypodcast-episode-54-turning-into-an-old-person.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/331564004-opensourcesecuritypodcast-episode-54-turning-into-an-old-person.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2017/06/petya-outbreak-was-a-chaos-sowing-wiper-not-profit-seeking-ransomware/&#34;&gt;Not Petya&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2017/06/petya-outbreak-was-a-chaos-sowing-wiper-not-profit-seeking-ransomware/&#34;&gt;Interac goes down&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://thehill.com/policy/transportation/tsa/339349-tsa-considers-forcing-airline-passengers-to-remove-books-from-carry&#34;&gt;Remove books at airport security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/General_Data_Protection_Regulation&#34;&gt;GDPR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/9f508-caution-old-dude-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/14eb0-caution-old-dude-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 53 - A plane isn&#39;t like a car</title>
      <link>https://opensourcesecurity.io/2017/06/28/episode-53-a-plane-isnt-like-a-car/</link>
      <pubDate>Wed, 28 Jun 2017 12:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/06/episode-53-plane-isnt-like-car.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about security through obscurity, airplanes, the FAA, the Windows source code leak, and chicken sandwiches.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/330513530-opensourcesecuritypodcast-episode-53-a-plane-isnt-like-a-car.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/330513530-opensourcesecuritypodcast-episode-53-a-plane-isnt-like-a-car.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/330513530-opensourcesecuritypodcast-episode-53-a-plane-isnt-like-a-car.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/06/the_faa_is_argu.html&#34;&gt;FAA Security Through Obscurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/06/26/new_windows_defender_vulernability_found_patched/&#34;&gt;Tavis Ormandy Windows Defender&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Linus%27s_Law&#34;&gt;Linus&amp;rsquo;s Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=--xITOqlBCM&#34;&gt;Tesla Autopoilot Predicts Crashes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/2010_Polish_Air_Force_Tu-154_crash&#34;&gt;2010 Polish Air Force Tu-154 crash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/06/23/windows_10_leak/&#34;&gt;Windows 10 leak&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/lifeandstyle/2015/sep/23/1500-sandwich-from-scratch-andy-george-youtube-food-supply-chain&#34;&gt;$1500 Chicken Sandwich&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=5ODzO7Lz_pw&#34;&gt;Build a toaster from scratch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt; &lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b3b17-aiga-air-transportation-bg-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/895e9-aiga-air-transportation-bg-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>When in doubt, blame open source</title>
      <link>https://opensourcesecurity.io/2017/06/26/when-in-doubt-blame-open-source/</link>
      <pubDate>Mon, 26 Jun 2017 00:54:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/06/26/when-in-doubt-blame-open-source/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;ve not read my previous post on &lt;a href=&#34;http://sobersecurity.blogspot.com/2017/06/thought-leaders-arent-leaders.html&#34;&gt;thought leadership&lt;/a&gt;, go do that now, this one builds on it. The thing that really kicked off my thinking on these matters was this article:&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://techbeacon.com/software-security-liability-coming-are-your-engineers-ready&#34;&gt;Security liability is coming for software: Is your engineering team ready?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The whole article is pretty silly, but the bit about liability and open source is the real treat. There&amp;rsquo;s some sort of special consideration when you use open source apparently, we&amp;rsquo;ll get back to that. Right now there is basically no liability of any sort when you use software. I doubt there will be anytime soon. Liability laws are tricky, but the lawyers I&amp;rsquo;ve spoken with have been clear that software isn&amp;rsquo;t currently covered in most instances. The whole article is basically nonsense from that respect. The people they interview set the stage for liability and responsibility then seem to discuss how open source should be treated special in this context.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 52 - You could have done it right, but you didn&#39;t</title>
      <link>https://opensourcesecurity.io/2017/06/20/episode-52-you-could-have-done-it-right-but-you-didnt/</link>
      <pubDate>Tue, 20 Jun 2017 02:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/06/episode-52-you-could-have-done-it-right.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the new Stack Clash flaw, Grenfell Tower, risk management, and backwards compatibility.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/328927519-opensourcesecuritypodcast-episode-52-you-could-have-done-it-right-but-you-didnt.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/328927519-opensourcesecuritypodcast-episode-52-you-could-have-done-it-right-but-you-didnt.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/328927519-opensourcesecuritypodcast-episode-52-you-could-have-done-it-right-but-you-didnt.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash&#34;&gt;Qualys Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt&#34;&gt;Qualys Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://insecure.org/stf/smashstack.html&#34;&gt;Smashing The Stack For Fun And Profit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.thetimes.co.uk/article/grenfell-tower-fire-resistant-cladding-is-just-5-000-more-expensive-6gjqkg98g&#34;&gt;Grenfell Tower&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1065a-block.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4fbcd-block.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thought leaders aren&#39;t leaders</title>
      <link>https://opensourcesecurity.io/2017/06/18/thought-leaders-arent-leaders/</link>
      <pubDate>Sun, 18 Jun 2017 02:15:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/06/18/thought-leaders-arent-leaders/</guid> 
      <description>&lt;p&gt;For the last few weeks I&amp;rsquo;ve seen news &lt;a href=&#34;http://www.csoonline.com/article/3200024/security/cybersecurity-labor-crunch-to-hit-35-million-unfilled-jobs-by-2021.html&#34;&gt;stories&lt;/a&gt; and much &lt;a href=&#34;https://twitter.com/Maliciouslink/status/872489662895534080&#34;&gt;lamenting&lt;/a&gt; on twitter about the security skills shortage. Some say there is no shortage, some say it&amp;rsquo;s horrible beyond belief. Basically there&amp;rsquo;s someone arguing every possible side of this. I&amp;rsquo;m not going to debate if there is or isn&amp;rsquo;t a worker shortage, that&amp;rsquo;s not really the point. A lot of complaining was done by people who would call themselves leaders in the security universe. I then read the below article and change my thinking up a bit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 51 - All about CVE</title>
      <link>https://opensourcesecurity.io/2017/06/12/episode-51-all-about-cve/</link>
      <pubDate>Mon, 12 Jun 2017 12:44:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/06/episode-51-all-about-cve.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://twitter.com/pkdan14850&#34;&gt;Dan Adinolfi&lt;/a&gt; about CVE. Most anything you ever wanted to know about CVE is discussed.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/327688703-opensourcesecuritypodcast-episode-51-all-about-cve.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/327688703-opensourcesecuritypodcast-episode-51-all-about-cve.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/327688703-opensourcesecuritypodcast-episode-51-all-about-cve.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://cve.mitre.org/cve/&#34;&gt;CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.mitre.org/&#34;&gt;The MITRE Corporation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://mikko.hypponen.com/&#34;&gt;Mikko Hypponen&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cveform.mitre.org/&#34;&gt;CVE Form&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://cve.mitre.org/cve/cna/CNA_Rules_v1.1.pdf&#34;&gt;CVE CNA Rules&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b5d32-cve-logo-600.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6a01c-cve-logo-600.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Humanity isn&#39;t proactive</title>
      <link>https://opensourcesecurity.io/2017/06/11/humanity-isnt-proactive/</link>
      <pubDate>Sun, 11 Jun 2017 21:51:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/06/11/humanity-isnt-proactive/</guid> 
      <description>&lt;p&gt;I ran across this article about IoT security the other day&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://motherboard.vice.com/en_us/article/senator-mark-warner-us-iot-security-wannacry&#34;&gt;The US Needs to Get Serious About Securing the Internet of Hackable Things&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I find articles like this frustrating for the simple fact everyone keeps talking about security, but nobody is going to do anything. If you look at the history of humanity, we&amp;rsquo;ve never been proactive when dealing with problems. We wait until things can&amp;rsquo;t get worse and the only actual option is to fix the problem. If you look at every problem there are at least two options. Option #1 is always &amp;ldquo;fix it&amp;rdquo;. Option #2 is ignore it. There could be more options, but generally we pick #2 because it&amp;rsquo;s the least amount of work in the short term. Humanity rarely cares about the long term implications of anything.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 50 - This is a security podcast after all</title>
      <link>https://opensourcesecurity.io/2017/06/06/episode-50-this-is-a-security-podcast-after-all/</link>
      <pubDate>Tue, 06 Jun 2017 21:25:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/06/episode-50-this-is-security-podcast.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss Futurama, tornadoes, sudo, encryption, hacking back, and something called an ombudsman. Also episode 50!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/326788036-opensourcesecuritypodcast-episode-50-this-is-a-security-podcast-after-all.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/326788036-opensourcesecuritypodcast-episode-50-this-is-a-security-podcast-after-all.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/326788036-opensourcesecuritypodcast-episode-50-this-is-a-security-podcast-after-all.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Star_Trek:_Discovery&#34;&gt;Star Trek Discovery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.cbc.ca/news/canada/calgary/three-hill-tornado-lawn-mower-1.4145466&#34;&gt;Mowing lawn with a tornado&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Edmonton_tornado&#34;&gt;Edmonton Tornado&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.zdnet.com/article/why-you-must-patch-the-new-linux-sudo-security-hole/&#34;&gt;Sudo flaw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.newscientist.com/article/2133644-theresa-mays-repeated-calls-to-ban-encryption-still-wont-work/&#34;&gt;Encryption ban&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://thehill.com/policy/cybersecurity/335294-rep-hacking-back-bill-not-the-wild-west&#34;&gt;Hacking Back&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Ombudsman&#34;&gt;Ombudsman&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/b4394-img_20170603_124531.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/91fb8-img_20170603_124531.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Free Market Security</title>
      <link>https://opensourcesecurity.io/2017/06/04/free-market-security/</link>
      <pubDate>Sun, 04 Jun 2017 21:04:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/06/04/free-market-security/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/06/fea5a-market-575842_1280.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/06/fea5a-market-575842_1280.png?w=238&#34;&gt;&lt;/a&gt; I&amp;rsquo;ve been thinking about the concept of free market forces this weekend. The basic idea here is that the price of a good is decided by the supply and demand of the market. If the market demands something, the price will go up if there it&amp;rsquo;s in short supply. This is basically why the Nintendo Switch is still selling on eBay for more than it would cost in the store. There is a demand but there isn&amp;rsquo;t a supply. But back to security. Let&amp;rsquo;s think about something I&amp;rsquo;m going to call &amp;ldquo;free market security&amp;rdquo;. What if demand and supply was driving security? Or we can flip the question around, what if the market will never drive security?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 49 - Testing software is impossible</title>
      <link>https://opensourcesecurity.io/2017/05/30/episode-49-testing-software-is-impossible/</link>
      <pubDate>Tue, 30 May 2017 22:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/05/episode-49-testing-software-is.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss Samba, FTP sites, MSDOS, regulation, and the airplane laptop travel ban.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/325265404-opensourcesecuritypodcast-episode-49-testing-software-is-impossible.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/325265404-opensourcesecuritypodcast-episode-49-testing-software-is-impossible.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/325265404-opensourcesecuritypodcast-episode-49-testing-software-is-impossible.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.zdnet.com/article/its-not-just-windows-anymore-samba-has-a-major-smb-bug/&#34;&gt;Samba Bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://benkowlab.blogspot.com/2017/05/feedback-on-how-to-build-smb-honeypot.html&#34;&gt;Wannacry Honeypot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/05/ransomware_and_.html&#34;&gt;Schneier and regulating IoT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://cyber-itl.org/about-us/&#34;&gt;Cyber ITL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Refrigerator_death&#34;&gt;Refrigerator death&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/05/extending_the_a.html&#34;&gt;Airplane laptop ban&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.huffingtonpost.com/daniel-wagner/what-israeli-airport-secu_b_4978149.html&#34;&gt;Israeli airport security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/18b78-rca_indian_head_test_pattern.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d13e8-rca_indian_head_test_pattern.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stealing from customers</title>
      <link>https://opensourcesecurity.io/2017/05/29/stealing-from-customers/</link>
      <pubDate>Mon, 29 May 2017 21:59:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/05/29/stealing-from-customers/</guid> 
      <description>&lt;p&gt;I was having some security conversations last week and cybersecurity insurance came up as a topic. This isn&amp;rsquo;t overly unusual as it&amp;rsquo;s a pretty popular topic, but someone said something that really got me thinking.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;What if the insurance covered the customers instead of the companies?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Now I understand that many cybersecurity insurance policies can cover some amount of customer damage and loss, but fundamentally the coverage is for the company that is attacked, customers who have data stolen will maybe get a year of free credit monitoring or some other token service. That&amp;rsquo;s all well and good, but I couldn&amp;rsquo;t help myself from thinking about this problem from another angle. Let&amp;rsquo;s think about insurance in the context of shoplifting. For this thought exercise we&amp;rsquo;re going to use a real store in our example, which won&amp;rsquo;t be exactly correct, but the point is to think about the problem, not get all the minor details correct.&lt;/p&gt;</description>
    </item>
    <item>
      <title>You know how to fix enterprise patching? Please tell me more!!!</title>
      <link>https://opensourcesecurity.io/2017/05/22/you-know-how-to-fix-enterprise-patching-please-tell-me-more/</link>
      <pubDate>Mon, 22 May 2017 00:54:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/05/22/you-know-how-to-fix-enterprise-patching-please-tell-me-more/</guid> 
      <description>&lt;p&gt;If you pay attention to Twitter at all, you&amp;rsquo;ve probably seen people arguing about patching your enterprise after the WannaCry malware. The short story is that Microsoft fixed a very serious security flaw a few months before the malware hit. That means there are quite a few machines on the Internet that haven&amp;rsquo;t applied a critical security update. Of course as you imagine there is plenty of back and forth about updates. There are two basic arguments I keep seeing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 48 - Machine Learning: Not actually magic</title>
      <link>https://opensourcesecurity.io/2017/05/21/episode-48-machine-learning-not-actually-magic/</link>
      <pubDate>Sun, 21 May 2017 19:53:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/05/episode-48-machine-learning-not.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; have a guest! &lt;a href=&#34;https://twitter.com/Paquette413&#34;&gt;Mike Paquette&lt;/a&gt; from Elastic discusses the fundamentals and basics of Machine Learning. We also discuss how ML could have helped with WannaCry.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/323810101-opensourcesecuritypodcast-episode-48-machine-learning-not-actually-magic.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/323810101-opensourcesecuritypodcast-episode-48-machine-learning-not-actually-magic.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/323810101-opensourcesecuritypodcast-episode-48-machine-learning-not-actually-magic.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.cbc.ca/news/canada/newfoundland-labrador/randell-earle-air-canada-ticket-conflict-1.4115596&#34;&gt;Canadians stranded in Portgual&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elastic.co/products/x-pack/machine-learning&#34;&gt;Elastic Machine Learning&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4b38b-erp-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/faacc-erp-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 47 - WannaCry: Everything is basically broken</title>
      <link>https://opensourcesecurity.io/2017/05/14/episode-47-wannacry-everything-is-basically-broken/</link>
      <pubDate>Sun, 14 May 2017 17:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/05/episode-47-wannacry-everything-is.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss the WannaCry worm.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/322577205-opensourcesecuritypodcast-episode-47-wannacry-everything-is-basically-broken.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/322577205-opensourcesecuritypodcast-episode-47-wannacry-everything-is-basically-broken.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/322577205-opensourcesecuritypodcast-episode-47-wannacry-everything-is-basically-broken.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://technet.microsoft.com/en-us/library/security/ms17-010.aspx&#34;&gt;MS17-010&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html&#34;&gt;How to accidentally stop a global cyber attack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/d7592-wana_decrypt0r_screenshot.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/2b989-wana_decrypt0r_screenshot.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 46 - Turns out I&#39;m not a bad guy</title>
      <link>https://opensourcesecurity.io/2017/05/04/episode-46-turns-out-im-not-a-bad-guy/</link>
      <pubDate>Thu, 04 May 2017 20:38:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/05/episode-46-turns-out-im-not-bad-guy.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss the recent Google phish attack.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320997006-opensourcesecuritypodcast-episode-46-turns-out-im-not-a-bad-guy.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320997006-opensourcesecuritypodcast-episode-46-turns-out-im-not-a-bad-guy.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320997006-opensourcesecuritypodcast-episode-46-turns-out-im-not-a-bad-guy.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://motherboard.vice.com/en_us/article/massive-gmail-google-doc-phishing-email&#34;&gt;Google phish spam&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ietf.org/mail-archive/web/oauth/current/msg07625.html&#34;&gt;Mail from 2011 detailing attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Links to OAuth permissions on major services
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://myaccount.google.com/permissions&#34;&gt;https://myaccount.google.com/permissions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/settings/applications&#34;&gt;https://twitter.com/settings/applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.facebook.com/settings?tab=applications&#34;&gt;https://www.facebook.com/settings?tab=applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.linkedin.com/psettings/third-party-applications&#34;&gt;https://www.linkedin.com/psettings/third-party-applications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://account.live.com/Consent/Manage&#34;&gt;https://account.live.com/Consent/Manage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/gp/mas/your-account/myapps&#34;&gt;https://www.amazon.com/gp/mas/your-account/myapps&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/22da4-yves-guillou-fish-sheleton-2400px.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/62f48-yves-guillou-fish-sheleton-2400px.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security like it&#39;s 2005!</title>
      <link>https://opensourcesecurity.io/2017/05/03/security-like-its-2005/</link>
      <pubDate>Wed, 03 May 2017 12:29:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/05/03/security-like-its-2005/</guid> 
      <description>&lt;p&gt;I was reading the newspaper the other day (the real dead tree newspaper) and I came across an op-ed from my congressperson.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.greenbaypressgazette.com/story/money/2017/04/27/gallagher-cybersecurity-small-business/100928638/&#34;&gt;Gallagher: Cybersecurity for small business&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s about what you&amp;rsquo;d expect but comes with some actionable advice! Well, not really. Here it is so you don&amp;rsquo;t have to read the whole thing.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Businesses can start by taking some simple and relatively inexpensive steps to protect themselves, such as:&lt;br&gt;
» Installing antivirus, threat detection and firewall software and systems.&lt;br&gt;
» Encrypting company data and installing security patches to make sure computers and servers are up to date.&lt;br&gt;
» Strengthening password practices, including requiring the use of strong passwords and two-factor authentication.&lt;br&gt;
» Educating employees on how to recognize an attempted attack, including preparing rapid response measures to mitigate the damage of an attack in progress or recently completed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 45 - Trust is more important now than the truth</title>
      <link>https://opensourcesecurity.io/2017/05/02/episode-45-trust-is-more-important-now-than-the-truth/</link>
      <pubDate>Tue, 02 May 2017 01:52:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/05/episode-45-trust-is-more-important-now.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss not-counterfeit MTG cards, antivirus, squirrelmail, unroll.me, grsecurity, baby monitors, and trust.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320432805-opensourcesecuritypodcast-episode-45-trust-is-more-important-now-than-the-truth.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320432805-opensourcesecuritypodcast-episode-45-trust-is-more-important-now-than-the-truth.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/320432805-opensourcesecuritypodcast-episode-45-trust-is-more-important-now-than-the-truth.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://kotaku.com/mom-apologizes-for-trying-to-sell-sons-rare-magic-card-1794246260&#34;&gt;Mom Apologizes For Trying To Sell Son&amp;rsquo;s Rare Magic Card&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/no-fix-for-squirrelmail-remote-code-execution-vulnerability/125151/&#34;&gt;Squirrelmail security issue&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.labnol.org/internet/gmail-unsubscribe/28806/&#34;&gt;Stealing all your mail&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://grsecurity.net/passing_the_baton_faq.php&#34;&gt;grsecurity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://kidsaversnetwork.com/newborn/preventing-hacked-baby-monitors/&#34;&gt;Baby monitor security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/72a16-trust-1418901_1920.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/93018-trust-1418901_1920.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security fail is people</title>
      <link>https://opensourcesecurity.io/2017/04/30/security-fail-is-people/</link>
      <pubDate>Sun, 30 Apr 2017 17:16:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/04/30/security-fail-is-people/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/04/81072-img_20170426_184506.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/04/81072-img_20170426_184506.jpg?w=211&#34;&gt;&lt;/a&gt; The other day I ran across someone trying to keep their locker secured by using a combination lock. As you can see in the picture, the lock is on the handle of the locker, not on the loop that actually locks the door. When I saw this I had a good chuckle, took a picture, and put out a &lt;a href=&#34;https://twitter.com/joshbressers/status/857382168359837696&#34;&gt;snarky tweet&lt;/a&gt;. I then started to think about this quite a bit. Is this the user&amp;rsquo;s fault or is this bad design? I&amp;rsquo;m going to blame bad design on this one. It&amp;rsquo;s easy to blame users, we do it often, but I think in most instances, the problem is the design, not the user. If nothing is ever our fault, we will never improve anything. I suspect this is part of the problem we see across the cybersecurity universe.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 44 - Bug Bounties vs Pen Testing</title>
      <link>https://opensourcesecurity.io/2017/04/25/episode-44-bug-bounties-vs-pen-testing/</link>
      <pubDate>Tue, 25 Apr 2017 12:06:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/04/episode-44-bug-bounties-vs-pen-testing.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss Lego, bug bounties, pen testing, thought leadership, cars, lemons, entropy, and CVE.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/319388588-opensourcesecuritypodcast-episode-44-bug-bounties-vs-pen-testing.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/319388588-opensourcesecuritypodcast-episode-44-bug-bounties-vs-pen-testing.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/319388588-opensourcesecuritypodcast-episode-44-bug-bounties-vs-pen-testing.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2017/04/i-have-seen-future-and-it-is-bug.html&#34;&gt;Josh&amp;rsquo;s Blog on Bug Bounties&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2007/04/a_security_mark.html&#34;&gt;A Security Market for Lemons&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a89c2-1024px-st._aug_hms_bounty06.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e0790-1024px-st._aug_hms_bounty06.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>I have seen the future, and it is bug bounties</title>
      <link>https://opensourcesecurity.io/2017/04/24/i-have-seen-the-future-and-it-is-bug-bounties/</link>
      <pubDate>Mon, 24 Apr 2017 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/04/24/i-have-seen-the-future-and-it-is-bug-bounties/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/04/585e1-1024px-st-_aug_hms_bounty06.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/04/585e1-1024px-st-_aug_hms_bounty06.jpg?w=300&#34;&gt;&lt;/a&gt; Every now and then I see something on a blog or Twitter about how you can&amp;rsquo;t replace a pen test with a bug bounty. For a long time I agreed with this, but I&amp;rsquo;ve recently changed my mind. I know this isn&amp;rsquo;t a super popular opinion (yet), and I don&amp;rsquo;t think either side of this argument is exactly right. Fundamentally the future of looking for issues will not be a pen test. They won&amp;rsquo;t really be bug bounties either, but I&amp;rsquo;m going to predict pen testing will evolve into what we currently call bug bounties.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 43 - We are totally immature</title>
      <link>https://opensourcesecurity.io/2017/04/19/episode-43-we-are-totally-immature/</link>
      <pubDate>Wed, 19 Apr 2017 12:52:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/04/episode-43-we-are-totally-immature.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss Shadow Brokers, pronouncing GIF, Atlanta&amp;rsquo;s road problems, browser phishing, warning sirens, IoT, and fake Magic the Gathering cards.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/318438805-opensourcesecuritypodcast-episode-43-we-are-totally-immature.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/318438805-opensourcesecuritypodcast-episode-43-we-are-totally-immature.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/318438805-opensourcesecuritypodcast-episode-43-we-are-totally-immature.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c735e-antiaircraft_warning_siren.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/58c1f-antiaircraft_warning_siren.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/&#34;&gt;Shadow Brokers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://gizmodo.com/the-creator-of-the-gif-says-its-pronounced-jif-he-is-509179289&#34;&gt;How to pronounce GIF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.businessinsider.com/atlanta-interstate-20-freeway-buckled-gas-leak-2017-4&#34;&gt;Atlanta gas leak breaks road&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wordfence.com/blog/2017/04/chrome-firefox-unicode-phishing/&#34;&gt;New browser location phishing attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://news.slashdot.org/story/17/04/09/032221/us-hacker-sets-off-156-sirens-at-midnight?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29&#34;&gt;Hacked warning sirens&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thenextweb.com/insider/2017/04/10/iot-devices-are-intentionally-getting-bricked-by-malware-and-maybe-thats-okay/&#34;&gt;IoT bricking malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/kurtseifried/status/853742367580577793&#34;&gt;Fake MTG cards&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Crawl, Walk, Drive</title>
      <link>https://opensourcesecurity.io/2017/04/17/crawl-walk-drive/</link>
      <pubDate>Mon, 17 Apr 2017 00:16:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/04/17/crawl-walk-drive/</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s that time of year again. I don&amp;rsquo;t mean when all the government secrets are leaked onto the Internet by some unknown organization. I mean the time of year when it&amp;rsquo;s unsafe to cross streets or ride your bike. At least in the United States. It&amp;rsquo;s possible more civilized countries don&amp;rsquo;t have this problem. I enjoy getting around without a car, but I feel like the number of near misses has gone up a fair bit, and it&amp;rsquo;s always a person much younger than me with someone much older than them in the passenger seat. At first I didn&amp;rsquo;t think much about this and just dreamed of how self driving cars will rid us of the horror that is human drivers. After the last near fatality while crossing the street it dawned on me that now is the time all the kids have their driving learner&amp;rsquo;s permit. I do think I preferred not knowing this since now I know my adversary. It has a name, and that name is &amp;ldquo;youth&amp;rdquo;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 42 - Hitchhiker&#39;s Guide to Security</title>
      <link>https://opensourcesecurity.io/2017/04/13/episode-42-hitchhikers-guide-to-security/</link>
      <pubDate>Thu, 13 Apr 2017 12:13:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/04/episode-42-hitchhikers-guide-to-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss the security themes and events in the context of the HHGG movie.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/317490724-opensourcesecuritypodcast-episode-42-hitchhikers-guide-to-security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/317490724-opensourcesecuritypodcast-episode-42-hitchhikers-guide-to-security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/317490724-opensourcesecuritypodcast-episode-42-hitchhikers-guide-to-security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;wp-contentuploads20200558f70-hhggpngwp-contentuploads202005a8e54-hhggpng-show-notes&#34;&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a8e54-hhgg.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/58f70-hhgg.png&#34;&gt;&lt;/a&gt; Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.imdb.com/title/tt0371724/&#34;&gt;HHGG Movie (2005)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The obvious answer is never the secure answer</title>
      <link>https://opensourcesecurity.io/2017/04/10/the-obvious-answer-is-never-the-secure-answer/</link>
      <pubDate>Mon, 10 Apr 2017 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/04/10/the-obvious-answer-is-never-the-secure-answer/</guid> 
      <description>&lt;p&gt;One of the few themes that comes up time and time again when we talk about security is how bad people tend to be at understanding what&amp;rsquo;s actually going on. This isn&amp;rsquo;t really anyone&amp;rsquo;s fault, we&amp;rsquo;re expecting people to go against what is essentially millions of years of evolution that created our behaviors. Most security problems revolve around the human being the weak link and doing something that is completely expected and completely wrong.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 41 - All your money are belong to us</title>
      <link>https://opensourcesecurity.io/2017/04/10/episode-41-all-your-money-are-belong-to-us/</link>
      <pubDate>Mon, 10 Apr 2017 00:32:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/04/episode-41-all-your-money-are-belong-to.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss airplane laptop bans, ATM hacking, pointing at things, and Certificate Authorities.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/316915938-opensourcesecuritypodcast-episode-41-all-your-money-are-belong-to-us.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/316915938-opensourcesecuritypodcast-episode-41-all-your-money-are-belong-to-us.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/316915938-opensourcesecuritypodcast-episode-41-all-your-money-are-belong-to-us.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;wp-contentuploads20200544641-vandalized-atm-14870126809n1jpgwp-contentuploads2020054591d-vandalized-atm-14870126809n1jpg-show-notes&#34;&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4591d-vandalized-atm-14870126809n1.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/44641-vandalized-atm-14870126809n1.jpg&#34;&gt;&lt;/a&gt; Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.economist.com/blogs/gulliver/2017/03/complimentary-computers&#34;&gt;Loaner laptops on planes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2017/04/hackers-emptying-atms-drill-15-worth-gear/&#34;&gt;ATM hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.atlasobscura.com/articles/pointing-and-calling-japan-trains&#34;&gt;Japanese rail safety point and call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization&#34;&gt;Certificate Authority Authorization in DNS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The expectation of security</title>
      <link>https://opensourcesecurity.io/2017/04/02/the-expectation-of-security/</link>
      <pubDate>Sun, 02 Apr 2017 22:04:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/04/02/the-expectation-of-security/</guid> 
      <description>&lt;p&gt;If you listen to my &lt;a href=&#34;http://www.opensourcesecuritypodcast.com/2017/04/episode-40-lets-fork-bitcoin-again.html&#34;&gt;podcast&lt;/a&gt; (which you should be doing already), I had a bit of a rant at the start this week about an assignment my son had over the weekend. He wasn&amp;rsquo;t supposed to use any &amp;ldquo;screens&amp;rdquo; which is part of a drug addiction lesson. I get where this lesson is going, but I&amp;rsquo;ve really been thinking about the bigger idea of expectations and reality. This assignment is a great example of someone failing to understand the world has changed around them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 40 - Let&#39;s fork bitcoin, again</title>
      <link>https://opensourcesecurity.io/2017/04/02/episode-40-lets-fork-bitcoin-again/</link>
      <pubDate>Sun, 02 Apr 2017 21:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/04/episode-40-lets-fork-bitcoin-again.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss Verizon spyware, FCC privacy, Smart TVs, Tor&amp;rsquo;s rewrite, Google&amp;rsquo;s new operating system, bitcoin, and NanoCore.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/315737179-opensourcesecuritypodcast-episode-40-lets-fork-bitcoin-again.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/315737179-opensourcesecuritypodcast-episode-40-lets-fork-bitcoin-again.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/315737179-opensourcesecuritypodcast-episode-40-lets-fork-bitcoin-again.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8a0fd-bitcoin-fork.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/c4477-bitcoin-fork.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29&#34;&gt;Verizon Spyware Story&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.businessinsider.com/house-republicans-kill-fcc-broadband-privacy-rules-2017-3&#34;&gt;FCC Broadband Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/71834/isps-are-now-adding-unique-header-identifiers-to-web-traffic-can-this-be-avoide&#34;&gt;Inserting tracking headers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/about-90-percent-of-smart-tvs-vulnerable-to-remote-hacking-via-rogue-tv-signals/&#34;&gt;Smart TVs run Flash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lists.torproject.org/pipermail/tor-dev/2017-March/012088.html&#34;&gt;Tor rewrite in safer language&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lwn.net/SubscriberLink/718267/206c8a5fbf0ee2ea/&#34;&gt;Fuchsia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.zerohedge.com/news/2017-03-19/bitcoins-fork-road&#34;&gt;Bitcoin fork&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.thedailybeast.com/articles/2017/03/31/fbi-arrests-hacker-who-hacked-no-one.html&#34;&gt;NanoCore&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Remember kids, if you&#39;re going to disclose, disclose responsibly!</title>
      <link>https://opensourcesecurity.io/2017/03/28/remember-kids-if-youre-going-to-disclose-disclose-responsibly/</link>
      <pubDate>Tue, 28 Mar 2017 02:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/03/28/remember-kids-if-youre-going-to-disclose-disclose-responsibly/</guid> 
      <description>&lt;p&gt;If you pay any attention to the security universe, you&amp;rsquo;re aware that &lt;a href=&#34;https://twitter.com/taviso&#34;&gt;Tavis Ormandy&lt;/a&gt; is basically on fire right now with his security research. He found the Cloudflare data leak issue a few weeks back, and is currently going to town on LastPass. The LastPass crew seems to be dealing with this pretty well, I&amp;rsquo;m not seeing a lot of complaining, mostly just info and fixes which is the right way to do these things.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 39 - Flash on your dishwasher</title>
      <link>https://opensourcesecurity.io/2017/03/28/episode-39-flash-on-your-dishwasher/</link>
      <pubDate>Tue, 28 Mar 2017 01:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/03/episode-39-flash-on-your-dishwasher.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss certificates, OpenSSL, dishwashers, Flash, and laptop travel bans.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/314794586-opensourcesecuritypodcast-episode-39-flash-on-your-dishwasher.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/314794586-opensourcesecuritypodcast-episode-39-flash-on-your-dishwasher.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/314794586-opensourcesecuritypodcast-episode-39-flash-on-your-dishwasher.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/efc8b-dishwasher.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8d8a7-dishwasher.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Wireless-Bluetooth-Controller-Classic-Joystick/dp/B014QP2H1E&#34;&gt;SNES bluetooth remake&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.darkreading.com/endpoint/authentication/symantec-seeks-to-quell-ca-customer-concerns-over-google-warning/d/d-id/1328495&#34;&gt;Symantec vs Google&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/blog/blog/2017/03/22/license/&#34;&gt;OpenSSL license change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/03/26/miele_joins_internetofst_hall_of_shame/&#34;&gt;Dishwasher directory traversal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theverge.com/2017/3/24/15052286/fedex-adobe-flash-five-dollar-discount-print-orders&#34;&gt;Fedex $5 for Flash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/03/the_tsas_select.html&#34;&gt;Laptop and iPad airline ban&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Inverse Law of CVEs</title>
      <link>https://opensourcesecurity.io/2017/03/23/inverse-law-of-cves/</link>
      <pubDate>Thu, 23 Mar 2017 23:26:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/03/23/inverse-law-of-cves/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve started a project to put the CVE data into Elasticsearch and see if there is anything clever we can learn about it. Ever if there isn&amp;rsquo;t anything overly clever, it&amp;rsquo;s fun to do. And I get to make pretty graphs, which everyone likes to look at.&lt;/p&gt;
&lt;p&gt;I stuck a few of my early results on Twitter because it seemed like a fun thing to do. One of the graphs I put up was comparing the 3 BSDs. The image is below.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 38 - We Ruin Everything</title>
      <link>https://opensourcesecurity.io/2017/03/22/episode-38-we-ruin-everything/</link>
      <pubDate>Wed, 22 Mar 2017 01:34:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/03/episode-38-we-ruin-everything.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss disclosing your password, pwn2own, wikileaks, Back Orifice, HTTPS inspection, and antivirus.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/313701429-opensourcesecuritypodcast-episode-38-we-ruin-everything.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/313701429-opensourcesecuritypodcast-episode-38-we-ruin-everything.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/313701429-opensourcesecuritypodcast-episode-38-we-ruin-everything.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/29086-newark_castle2_ruin_st_monans_fife.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a7367-newark_castle2_ruin_st_monans_fife.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/538/&#34;&gt;xkcd comic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/&#34;&gt;Defendant refusing to give up password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.nytimes.com/2001/08/06/business/compressed-data-password-protection-with-prison-stripes.html&#34;&gt;Prisoner ID Password&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2017/03/judge-oks-warrant-to-reveal-who-searched-a-fraud-victims-name-on-google/&#34;&gt;Fraud Victim&amp;rsquo;s Google Warrant&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pcworld.com/article/3182816/security/pwn2own-hacking-contest-ends-with-two-virtual-machine-escapes.html&#34;&gt;pwn2own VM escape&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/mozilla-patches-pwn2own-zero-day-in-firefox/124415/&#34;&gt;pwn2own Mozilla 22 hour fix&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2017/03/wikileaks_not_d.html&#34;&gt;Wikileaks non disclosure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Back_Orifice&#34;&gt;Back Orifice&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.csoonline.com/article/3182704/security/some-https-inspection-tools-might-weaken-security.html&#34;&gt;HTTPS inspection tools may be unsafe&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security, Consumer Reports, and Failure</title>
      <link>https://opensourcesecurity.io/2017/03/12/security-consumer-reports-and-failure/</link>
      <pubDate>Sun, 12 Mar 2017 21:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/03/12/security-consumer-reports-and-failure/</guid> 
      <description>&lt;p&gt;Last week there was a story about Consumer Reports doing security testing of products.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.consumerreports.org/privacy/consumer-reports-to-begin-evaluating-products-services-for-privacy-and-data-security/&#34;&gt;Consumer Reports to Begin Evaluating Products, Services for Privacy and Data Security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As one can imagine there were a fair number of “they’ll get it wrong” sort of comments. They will get it wrong, at first, but that’s not a reason to pick on these guys. They’re quite brave to take this task on, it’s nearly impossible if you think about the state of security (especially consumer security). But this is how things start. There is no industry that has gone from broken to perfect in one step. It’s a long hard road when you have to deal with systemic problems in an industry. Consumer product security problems may be larger and more complex than any other industry has ever had to solve thanks to things such as globalization and how inexpensive tiny computers have become.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 37 - Your bathtub is more dangerous than a shark</title>
      <link>https://opensourcesecurity.io/2017/03/09/episode-37-your-bathtub-is-more-dangerous-than-a-shark/</link>
      <pubDate>Thu, 09 Mar 2017 00:40:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/03/episode-37-your-bathtub-is-more.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss how the Vault 7 leaks shows we live in the Neuromancer world, and this is likely the new normal.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/311442678-opensourcesecuritypodcast-episode-37-your-bathtub-is-more-dangerous-than-a-shark.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/311442678-opensourcesecuritypodcast-episode-37-your-bathtub-is-more-dangerous-than-a-shark.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/311442678-opensourcesecuritypodcast-episode-37-your-bathtub-is-more-dangerous-than-a-shark.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a88bd-134610871_a3ad9262b7_o.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/6329c-134610871_a3ad9262b7_o.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ycombinator.com/item?id=13810721&#34;&gt;Hacker News Writeup about Vault 7&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Security_Administrator_Tool_for_Analyzing_Networks&#34;&gt;SATAN&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.rtl-sdr.com/&#34;&gt;RTL-SDR&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/White_House_Reconstruction&#34;&gt;White House Reconstruction&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://readwrite.com/2011/01/17/baseband_hacking_a_new_frontier_for_smartphone_break_ins/&#34;&gt;Baseband Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=niKblgZupOc&#34;&gt;CGA Graphics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.chromium.org/Home/chromium-security/brag-sheet&#34;&gt;Chromium Security Brag Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theguardian.com/world/2017/mar/07/rhino-shot-dead-by-poachers-at-french-zoo&#34;&gt;French Zoo Poacher&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 36 - A Good Enough Podcast</title>
      <link>https://opensourcesecurity.io/2017/03/05/episode-36-a-good-enough-podcast/</link>
      <pubDate>Sun, 05 Mar 2017 18:48:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/03/episode-36-good-enough-podcast.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss an IoT bear, Alexa and Siri, Google&amp;rsquo;s E2Email and S/MIME.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/310851037-opensourcesecuritypodcast-episode-36-a-good-enough-podcast.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/310851037-opensourcesecuritypodcast-episode-36-a-good-enough-podcast.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/310851037-opensourcesecuritypodcast-episode-36-a-good-enough-podcast.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;wp-contentuploads202005f2d36-hand-1209591_960_720jpgwp-contentuploads20200596225-hand-1209591_960_720jpg-show-notes&#34;&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/96225-hand-1209591_960_720.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/f2d36-hand-1209591_960_720.jpg&#34;&gt;&lt;/a&gt; Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/security/2017/02/creepy-iot-teddy-bear-leaks-2-million-parents-and-kids-voice-messages/&#34;&gt;IoT Bear&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2017/02/murder-case-tests-alexas-devotion-privacy/&#34;&gt;Alexa murder evidence&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/google-releases-e2email-to-open-source/123923/&#34;&gt;Google E2Email&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.tomshardware.com/news/google-hosted-smime-gmail-encryption,33582.html&#34;&gt;Google S/MIME&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>What the Oscars can teach us about security</title>
      <link>https://opensourcesecurity.io/2017/03/02/what-the-oscars-can-teach-us-about-security/</link>
      <pubDate>Thu, 02 Mar 2017 19:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/03/02/what-the-oscars-can-teach-us-about-security/</guid> 
      <description>&lt;p&gt;If you watched the 89th Academy Awards you saw a pretty big mistake at the end of the show, the short story is Warren Beatty was handed the wrong envelope, he opened it, looked at it, then gave it to Faye Dunaway to read, which she did. The wrong people came on stage and started giving speeches, confused scrambling happened, and the correct winner was brought on stage. No doubt this will be talked about for many years to come as one of the most interesting and exciting events in the history of the awards ceremony.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 35 - Crazy Cosmic Accident</title>
      <link>https://opensourcesecurity.io/2017/02/28/episode-35-crazy-cosmic-accident/</link>
      <pubDate>Tue, 28 Feb 2017 03:04:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/02/episode-35-crazy-cosmic-accident.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss SHA-1 and cloudbleed. Bug bounties come up, we compare security to the Higgs boson, and IPv6 comes up at the end.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309898784-opensourcesecuritypodcast-episode-35-crazy-cosmic-accident.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309898784-opensourcesecuritypodcast-episode-35-crazy-cosmic-accident.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309898784-opensourcesecuritypodcast-episode-35-crazy-cosmic-accident.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8bc15-cosmic_25e225802598winter25e225802599_wonderland.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/486da-cosmic_25e225802598winter25e225802599_wonderland.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://shattered.io/&#34;&gt;SHA-1 attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html&#34;&gt;Google Security Blog about SHA-1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://z.cash/technology/history-of-hash-function-attacks.html&#34;&gt;Zcash hash algorithm analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.webkit.org/show_bug.cgi?id=168774#c27&#34;&gt;Webkit SVN Collision&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bugs.chromium.org/p/project-zero/issues/detail?id=1139&#34;&gt;Google bug about cloudbleed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/&#34;&gt;Cloudflare Blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/pirate/sites-using-cloudflare&#34;&gt;Known cloudbleed sites&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4900&#34;&gt;SHA-1 CVE-2005-4900&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://whitewoodsecurity.com/&#34;&gt;Whitewood Entropy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>SHA-1 is dead, long live SHA-1!</title>
      <link>https://opensourcesecurity.io/2017/02/24/sha-1-is-dead-long-live-sha-1/</link>
      <pubDate>Fri, 24 Feb 2017 01:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/02/24/sha-1-is-dead-long-live-sha-1/</guid> 
      <description>&lt;p&gt;Unless you’ve been living under a rock, you heard that some researchers managed to create a SHA-1 collision. The short story as to why this matters is the whole purpose of a hashing algorithm is to make it impossible to generate collisions on purpose. Unfortunately though impossible things are usually also impossible so in reality we just make sure it’s really really hard to generate a collision. Thanks to Moore’s Law, hard things don’t stay hard forever. This is why MD5 had to go live on a farm out in the country, and we’re not allowed to see it anymore … because it’s having too much fun. SHA-1 will get to join it soon.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 34 - Bathing in Ebola Virus</title>
      <link>https://opensourcesecurity.io/2017/02/22/episode-34-bathing-in-ebola-virus/</link>
      <pubDate>Wed, 22 Feb 2017 21:26:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/02/episode-34-bathing-in-ebola-virus.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss RSA, the cryptographer&amp;rsquo;s panel and of course, AI.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309062655-opensourcesecuritypodcast-episode-34-bathing-in-ebola-virus.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309062655-opensourcesecuritypodcast-episode-34-bathing-in-ebola-virus.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/309062655-opensourcesecuritypodcast-episode-34-bathing-in-ebola-virus.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/58ad6-450px-nineteenth_century_bathtub_grayscale.jpg&#34;&gt;&lt;img alt=&#34;https://commons.wikimedia.org/wiki/File:Nineteenth_century_bathtub_grayscale.jpg&#34; loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/46531-450px-nineteenth_century_bathtub_grayscale.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/02/21/java_python_ftp_code_vulnerable/&#34;&gt;FTP Firewall Problem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/events/us17/agenda/sessions/7580-the-cryptographers-panel&#34;&gt;RSA Cryptographer&amp;rsquo;s Panel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.networkworld.com/article/3170103/security/rsa-elite-cryptographers-scoff-at-idea-that-law-enforcement-can-overcome-encryption.html&#34;&gt;&amp;lsquo;Overcome&amp;rsquo; encryption&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Harvey&#39;s_Resort_Hotel_bombing&#34;&gt;Casino bombing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://openparliament.ca/bills/42-1/C-23/&#34;&gt;Bill C-23&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.scmagazine.com/cryptography-experts-cast-doubt-on-ais-role-in-cybersecurity/article/638701/&#34;&gt;Security and AI&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/2016/07/18/darpa-to-stage-an-ai-hacking-tournament-at-def-conblack-hat/&#34;&gt;DARPA AI challenge&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/s/ref=nb_sb_noss_2?url=search-alias%3Daps&amp;amp;field-keywords=eggs&#34;&gt;Amazon sells eggs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://readwrite.com/2017/02/21/ford-level-5-autonomy-tl4/&#34;&gt;Ford sleepy drivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/CaughtinProvidence/&#34;&gt;Judge Caprio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.logojoy.com/&#34;&gt;Logojoy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 33 - Everybody who went to the circus is in the circus (RSA 2017)</title>
      <link>https://opensourcesecurity.io/2017/02/15/episode-33-everybody-who-went-to-the-circus-is-in-the-circus-rsa-2017/</link>
      <pubDate>Wed, 15 Feb 2017 06:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/02/episode-33-everybody-who-went-to-circus.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; are at the same place at the same time! We discuss our RSA sessions and how things went. Talk of CVE IDs, open source libraries, Wordpress, and early morning sessions.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/307825712-opensourcesecuritypodcast-episode-33-everybody-who-went-to-the-circus-is-in-the-circus-rsa-2017.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/307825712-opensourcesecuritypodcast-episode-33-everybody-who-went-to-the-circus-is-in-the-circus-rsa-2017.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/307825712-opensourcesecuritypodcast-episode-33-everybody-who-went-to-the-circus-is-in-the-circus-rsa-2017.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;wp-contentuploads2020051392a-howard_broscircusjpgwp-contentuploads202005ad232-howard_broscircusjpg-show-notes&#34;&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ad232-howard_bros.circus.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/1392a-howard_bros.circus.jpg&#34;&gt;&lt;/a&gt; Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Bradley_M._Kuhn&#34;&gt;Bradley Kuh&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://web.archive.org/web/20160801161807/http://incolumitas.com/2016/06/08/typosquatting-package-managers/&#34;&gt;Typosquatting package managers (mirror)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2017/01/looks-like-you-have-bad-case-of.html&#34;&gt;zlib embedded library problem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.openwall.com/lists/oss-security/2017/02/10/16&#34;&gt;Wordpress CVE ID&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/events/us17/agenda/sessions/7892-How-to-Best-Measure-the-Cost-of-Security&#34;&gt;Josh&amp;rsquo;s 7am BoF session&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/events/us17/agenda/sessions/7347-internet-of-insecurity-can-industry-solve-it-or-is&#34;&gt;Bruce Schneier RSA talk&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reality Based Security</title>
      <link>https://opensourcesecurity.io/2017/02/12/reality-based-security/</link>
      <pubDate>Sun, 12 Feb 2017 15:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/02/12/reality-based-security/</guid> 
      <description>&lt;p&gt;If I demand you jump off the roof and fly, and you say no, can I call you a defeatist? What would you think? To a reasonable person it would be insane to associate this attitude with being a defeatist. There are certain expectations that fall within the confines of reality. Expecting things to happen outside of those rules is reckless and can often be dangerous.&lt;/p&gt;
&lt;p&gt;Yet in the universe of cybersecurity we do this constantly. Anyone who doesn’t pretend we can fix problems is a defeatist and part of the problem. We just have to work harder and not claim something can’t be done, that’s how we’ll fix everything! After being called a defeatist during a discussion, I decided to write some things down. We spend a lot of time trying to fly off of roofs instead of looking for practical realistic solutions for our security problems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 32 - Gambling as a Service</title>
      <link>https://opensourcesecurity.io/2017/02/08/episode-32-gambling-as-a-service/</link>
      <pubDate>Wed, 08 Feb 2017 01:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/02/episode-32-gambling-as-service.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss random numbers, a lot. Also slot machines, gambling, and dice.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/306639696-opensourcesecuritypodcast-episode-32-gambling-as-a-service.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/306639696-opensourcesecuritypodcast-episode-32-gambling-as-a-service.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/306639696-opensourcesecuritypodcast-episode-32-gambling-as-a-service.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/ff5d3-slot_machines_being_destroyed_252822529.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e4bdd-slot_machines_being_destroyed_252822529.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://dilbert.com/strip/2001-10-25&#34;&gt;Dilbert Random Numbers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2017/02/russians-engineer-brilliant-slot-machine-cheat-casinos-no-fix/?utm_source=dlvr.it&amp;amp;utm_medium=twitter&#34;&gt;Slot Machine Cheats&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.phy.duke.edu/~rgb/General/dieharder.php&#34;&gt;dieharder&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2011/01/ff_lottery/&#34;&gt;Cracking the Scratch Lottery&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.theregister.co.uk/2017/02/06/cisco_intel_decline_to_link_product_warning_to_faulty_chip/&#34;&gt;Intel Atom 2000&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Lavarand&#34;&gt;Lavarand&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://gamesbyemail.com/news/diceomatic&#34;&gt;diceomatic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.technologyreview.com/s/603556/neuroscience-explains-why-we-get-hacked-so-easily/&#34;&gt;Google security neuroscience&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2017/02/there-are-no-militant-moderates-in.html&#34;&gt;Militant moderates&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;show-tags&#34;&gt;Show tags:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;#random&lt;/li&gt;
&lt;li&gt;#prng&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 31 - XML is never the solution</title>
      <link>https://opensourcesecurity.io/2017/02/01/episode-31-xml-is-never-the-solution/</link>
      <pubDate>Wed, 01 Feb 2017 01:37:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-31-xml-is-never-solution.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss door locks, Ikea, chair testing sounds, electrical safety, autonomous cars, and XML vs JSON.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/305513722-opensourcesecuritypodcast-episode-31-xml-is-never-the-solution.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/305513722-opensourcesecuritypodcast-episode-31-xml-is-never-the-solution.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/305513722-opensourcesecuritypodcast-episode-31-xml-is-never-the-solution.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Mersenne_prime&#34;&gt;Mersenne Prime&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.thelocal.at/20170128/hotel-ransomed-by-hackers-as-guests-locked-in-rooms&#34;&gt;Door Lock Ransomware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=FVAOl334s5k&#34;&gt;Ikea Chair Testing Machine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://abcnews.go.com/GMA/story?id=128251&amp;amp;page=1&#34;&gt;Costume Safety&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.daviddarling.info/encyclopedia/T/tesseract.html&#34;&gt;Tesseract&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.frys.com/product/8760451?source=google&amp;amp;gclid=CNuxzvKi7dECFYK2wAodEi8KBw&#34;&gt;Roost WiFi battery&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/3cce1-xmlvsjson.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/83736-xmlvsjson.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Everything you know about security is wrong, stop protecting your empire!</title>
      <link>https://opensourcesecurity.io/2017/01/30/everything-you-know-about-security-is-wrong-stop-protecting-your-empire/</link>
      <pubDate>Mon, 30 Jan 2017 00:01:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2017/01/30/everything-you-know-about-security-is-wrong-stop-protecting-your-empire/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/01/e46d7-austrian_imperial_crown_dsc02787.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/01/e46d7-austrian_imperial_crown_dsc02787.jpg?w=215&#34;&gt;&lt;/a&gt; Last week I kept running into old school people trying to justify why something that made sense in the past still makes sense today. Usually I ignore these sort of statements, but I feel like I’m seeing them often enough it’s time to write something up. We’re in the middle of disruptive change. That means that the way security used to work doesn’t work anymore (some people think it does) and in the near future, it won’t work at all. In some instances will actually be harmful if it’s not already.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 30 - I&#39;m not an expert but I&#39;ve been yelled at by experts</title>
      <link>https://opensourcesecurity.io/2017/01/26/episode-30-im-not-an-expert-but-ive-been-yelled-at-by-experts/</link>
      <pubDate>Thu, 26 Jan 2017 14:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-30-im-not-expert-but-ive-been.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss security automation. Machine learning, AI, and a bunch of moral and philosophical boundaries that new future will bring. You&amp;rsquo;ve been warned.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/304449487-opensourcesecuritypodcast-episode-30-im-not-an-expert-but-ive-been-yelled-at-by-experts.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/304449487-opensourcesecuritypodcast-episode-30-im-not-an-expert-but-ive-been-yelled-at-by-experts.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/304449487-opensourcesecuritypodcast-episode-30-im-not-an-expert-but-ive-been-yelled-at-by-experts.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/1205/&#34;&gt;XKCD Is It Worth the Time?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.wall.org/~larry/&#34;&gt;Larry Wall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.newscientist.com/article/2114748-google-translate-ai-invents-its-own-language-to-translate-with/&#34;&gt;Google Translate AI invents its own language to translate with&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Nosedive&#34;&gt;Black Mirror Social Media Episode&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/st-louis-public-library-recovers-from-ransomware-attack/123297/&#34;&gt;St. Louis Public Library Ransomware&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Return on Risk Investment</title>
      <link>https://opensourcesecurity.io/2017/01/23/return-on-risk-investment/</link>
      <pubDate>Mon, 23 Jan 2017 15:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/01/23/return-on-risk-investment/</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/01/e9acc-at_your_own_risk-svg.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2017/01/e9acc-at_your_own_risk-svg.png?w=300&#34;&gt;&lt;/a&gt; I found myself in a discussion earlier this week that worked its way into return on investment topics. Of course nobody could really agree on what the return was which is sort of how these conversations often work out. It’s really hard to decide what the return on investment is for security features and products. It can be hard to even determine cost sometimes, which should be the easy number to figure out.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 29 - The Security of Rogue One</title>
      <link>https://opensourcesecurity.io/2017/01/22/episode-29-the-security-of-rogue-one/</link>
      <pubDate>Sun, 22 Jan 2017 23:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-29-security-of-rogue-one.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss the security of the movie Rogue One! Spoiler: Security in the Star Wars universe is worse than security in our universe.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303899056-opensourcesecuritypodcast-episode-29-the-security-of-rogue-one.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303899056-opensourcesecuritypodcast-episode-29-the-security-of-rogue-one.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303899056-opensourcesecuritypodcast-episode-29-the-security-of-rogue-one.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/user/CinemaSins&#34;&gt;CinemaSins&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Tupolev_Tu-4&#34;&gt;Soviet Tupolev Tu-4&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/eb953-img_20161227_113831.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/8babf-img_20161227_113831.jpg&#34;&gt;&lt;/a&gt;Mechanical Computer&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 28 - RSA Conference 2017</title>
      <link>https://opensourcesecurity.io/2017/01/19/episode-28-rsa-conference-2017/</link>
      <pubDate>Thu, 19 Jan 2017 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-28-rsa-conference-2017.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss their involvement in the upcoming 2017 RSA conference: Open Source, CVEs, and Open Source CVE. Of course IoT and encryption manage to come up as topics.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303432626-opensourcesecuritypodcast-episode-28-rsa-conference-2017.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303432626-opensourcesecuritypodcast-episode-28-rsa-conference-2017.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/303432626-opensourcesecuritypodcast-episode-28-rsa-conference-2017.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/events/us17/agenda/sessions/5648-Saving-CVE-with-OpenSource&#34;&gt;Kurt&amp;rsquo;s talk - Saving CVE wtih open source&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.rsaconference.com/events/us17/agenda/sessions/7117-managing-your-open-source&#34;&gt;Josh&amp;rsquo;s P2P session - Managing Your Open Source&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/38df4-img_20160229_185324.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e18bf-img_20160229_185324.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>What does security and USB-C have in common?</title>
      <link>https://opensourcesecurity.io/2017/01/16/what-does-security-and-usb-c-have-in-common/</link>
      <pubDate>Mon, 16 Jan 2017 18:26:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/01/16/what-does-security-and-usb-c-have-in-common/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve decided to create yet another security analogy! You can’t tell, but I’m very excited to do this. One of my long standing complaints about security is there are basically no good analogies that make sense. We always try to talk about auto safety, or food safety, or maybe building security, how about pollution. There’s always some sort of existing real world scenario we try warp and twist in a way so we can tell a security story that makes sense. So far they’ve all failed. The analogy always starts out strong, then something happens that makes everything fall apart. I imagine a big part of this is because security is really new, but it’s also really hard to understand. It’s just not something humans are good at understanding.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 27 - Prove to me you are human</title>
      <link>https://opensourcesecurity.io/2017/01/16/episode-27-prove-to-me-you-are-human/</link>
      <pubDate>Mon, 16 Jan 2017 15:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-27-prove-to-me-you-are-human.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss NTP, authentication issues, network security, airplane security, AI, and Minecraft.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302981179-opensourcesecuritypodcast-episode-27-prove-to-me-you-are-human.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302981179-opensourcesecuritypodcast-episode-27-prove-to-me-you-are-human.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302981179-opensourcesecuritypodcast-episode-27-prove-to-me-you-are-human.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://news.ntppool.org/2016/12/load/&#34;&gt;NTP &amp;ldquo;Attack&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://fidoalliance.org/specifications/overview/&#34;&gt;U2F Tokens&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.consumer.ftc.gov/blog/scammers-push-people-pay-itunes-gift-cards&#34;&gt;Paying ransoms with iTunes giftcards&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.cloudflare.com/the-porcupine-attack-investigating-millions-of-junk-requests/&#34;&gt;Cloudflare Porcupine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cloud.google.com/security/security-design/&#34;&gt;Google Security Design Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.airlive.net/breaking-lam-tm136-boeing-737-700-collided-with-a-drone-on-approach-to-tete-mozambique/&#34;&gt;Drone collides with a plane&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.huffingtonpost.com/daniel-wagner/what-israeli-airport-secu_b_4978149.html&#34;&gt;Israeli Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.harvest.ai/&#34;&gt;Harvest.ai&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.curse.com/games/minecraft&#34;&gt;Minecraft Mod installer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.minecraftmaps.com/survival-maps/skyblock&#34;&gt;Skyblock&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://www.facebook.com/groups/osspodcast/&#34;&gt;Join our Facebook Group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/e28f2-human-robot.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/aa830-human-robot.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 26 - Tell your sister, Stallman was right</title>
      <link>https://opensourcesecurity.io/2017/01/12/episode-26-tell-your-sister-stallman-was-right/</link>
      <pubDate>Thu, 12 Jan 2017 14:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-26-tell-your-sister-stallman.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; end up discussing video game speed running, which is really just hacking. We also end up discussing the pitfalls of the modern world where you don&amp;rsquo;t own your software or services. Stallman was right!&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302260581-opensourcesecuritypodcast-episode-26-tell-your-sister-stallman-was-right.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302260581-opensourcesecuritypodcast-episode-26-tell-your-sister-stallman-was-right.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/302260581-opensourcesecuritypodcast-episode-26-tell-your-sister-stallman-was-right.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://gamesdonequick.com/&#34;&gt;Games Done Quick&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=j8CHsUFsi1A&#34;&gt;Super Mario Brother Speedrun&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=Hv_h_R3o9r8&#34;&gt;Super Mario Brother Minus World Explanation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.speedrun.com/&#34;&gt;speedrun.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=fj9u00PMkYU&amp;amp;t=6s&#34;&gt;Legend of Zelda Ghost Buffer Overflow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.openwall.com/articles/JPEG-COM-Marker-Vulnerability&#34;&gt;Double Free&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://scarybeastsecurity.blogspot.ca/2016/11/0day-exploit-compromising-linux-desktop.html&#34;&gt;Chris Evans NES audio exploit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pwsafe.org/&#34;&gt;pwsafe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml&#34;&gt;Bad Ham Review&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://stallman.org/&#34;&gt;Richard Stallman&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/149d6-stallman.jpg&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4a271-stallman.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 25 - The future is now</title>
      <link>https://opensourcesecurity.io/2017/01/10/episode-25-the-future-is-now/</link>
      <pubDate>Tue, 10 Jan 2017 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-25-future-is-now.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; end up discussing CES, IoT, WiFi everywhere, and the future.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/301707567-opensourcesecuritypodcast-episode-25-the-future-is-now.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/301707567-opensourcesecuritypodcast-episode-25-the-future-is-now.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/301707567-opensourcesecuritypodcast-episode-25-the-future-is-now.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.ces.tech/&#34;&gt;CES&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.co.uk/gadgets/2017/01/lg-wi-fi-in-everything/&#34;&gt;WiFi Everywhere&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theverge.com/ces/2017/1/3/14128510/withings-loreal-smart-wifi-hair-brush-announcedces-2017&#34;&gt;WiFi Hairbrush&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.nydailynews.com/news/world/german-man-finds-expired-ketchup-qr-code-leads-porn-article-1.2264526&#34;&gt;Ketchup QR Code Expired Domain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.com/security/2016/02/using-ipv6-with-linux-youve-likely-been-visited-by-shodan-and-other-scanners/&#34;&gt;Shodan uses NTP to gain IPv6 addresses&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ftc.gov/iot-home-inspector-challenge&#34;&gt;FTC prize for securing IoT&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pcworld.com/article/3154608/security/https-scanning-in-kaspersky-antivirus-exposed-users-to-mitm-attacks.html&#34;&gt;Antivirus MITM problems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://web.archive.org/web/20010405041220/http://www.rootshell.com/beta/news.html&#34;&gt;Rootshell&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.consumerreports.org/laptops/macbook-pros-fail-to-earn-consumer-reports-recommendation/&#34;&gt;Consumer Reports MacBook Pro&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/4a6a8-logo-2.png&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://opensourcesecurity.io/wp-content/uploads/2020/05/a68f4-logo-2.png&#34;&gt;&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Advice: Bad, Terrible, or Awful</title>
      <link>https://opensourcesecurity.io/2017/01/09/security-advice-bad-terrible-or-awful/</link>
      <pubDate>Mon, 09 Jan 2017 15:30:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/01/09/security-advice-bad-terrible-or-awful/</guid> 
      <description>&lt;p&gt;As an industry, we suck at giving advice. I don’t mean this in some negative hateful way, it’s just the way it is. It’s human nature really. As a species most of us aren’t very good at giving or receiving advice. There’s always that vision of the wise old person dropping wisdom on the youth like it’s candy. But in reality they don’t like the young people much more than the young people like them. Ever notice the contempt the young and old have for each other? It’s just sort of how things work. If you find someone older and wiser than you who is willing to hand out good advice, stick close to that person. You won’t find many more like that.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Looks like you have a bad case of embedded libraries</title>
      <link>https://opensourcesecurity.io/2017/01/03/looks-like-you-have-a-bad-case-of-embedded-libraries/</link>
      <pubDate>Tue, 03 Jan 2017 15:30:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/01/03/looks-like-you-have-a-bad-case-of-embedded-libraries/</guid> 
      <description>&lt;p&gt;A long time ago pretty much every application and library carried around its own copy of zlib. zlib is a library that does really fast and really good compression and decompression. If you’re storing data or transmitting data, it’s very likely this library is in use. It’s easy to use and is public domain. It’s no surprise it became the industry standard.&lt;/p&gt;
&lt;p&gt;Then one day, CVE-2002-0059 happened. CVE-2002-0059 was a security flaw that was easy to trigger and easy to exploit. It affected network listening applications that used zlib (which was most of them). Today if this came out, it would make heartbleed look like a joke. This was long long ago though, most people didn’t know anything about security (or care in many instances). If you look at the updates that came out because of this flaw, they were huge because literally hundreds of software applications and libraries had to be patched. This affected Windows and Linux, which was most everything back then. Today it would affect every device on the planet. This isn’t an exaggeration. Every. Single. Device.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 24 - The 2016 prediction edition! (yeah, that&#39;s right, 2016)</title>
      <link>https://opensourcesecurity.io/2017/01/03/episode-24-the-2016-prediction-edition-yeah-thats-right-2016/</link>
      <pubDate>Tue, 03 Jan 2017 13:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2017/01/episode-24-2016-prediction-edition-yeah.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; discuss 2016 predictions in 2017, what they got right, what they got wrong, and a bunch of other random things.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/300679437-opensourcesecuritypodcast-episode-24-the-2016-prediction-edition.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/300679437-opensourcesecuritypodcast-episode-24-the-2016-prediction-edition.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/300679437-opensourcesecuritypodcast-episode-24-the-2016-prediction-edition.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.csoonline.com/article/3013060/security/top-15-security-predictions-for-2016.html&#34;&gt;CSO Online - Top 15 security predictions for 2016&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/&#34;&gt;Gartner 2016 predictions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.trendmicro.com/vinfo/us/security/research-and-analysis/predictions/2016&#34;&gt;Trend Micro 2016 predictions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.darkreading.com/threat-intelligence/boldest-cybersecurity-predictions-for-2016/d/d-id/1323740?image_number=2&#34;&gt;Dark Reading 2016 predictions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Future Proof Security</title>
      <link>https://opensourcesecurity.io/2017/01/02/future-proof-security/</link>
      <pubDate>Mon, 02 Jan 2017 16:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2017/01/02/future-proof-security/</guid> 
      <description>&lt;p&gt;If you’ve ever written code, even a few lines of it, you know there is always some sort of tradeoff between doing it “right” and doing it &amp;ldquo;now&amp;rdquo;. This is basically the reality of any industry, there is always the right way, and then there’s the way it’s going to get done. If you’ve ever done any sort of home remodeling project you’re well aware of uncovering the sins of the past as soon as that wall gets opened up.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 23 - We can&#39;t patch people</title>
      <link>https://opensourcesecurity.io/2016/12/28/episode-23-we-cant-patch-people/</link>
      <pubDate>Wed, 28 Dec 2016 15:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-23-we-cant-patch-people.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about scareware, malware, and how hard this stuff is to stop, and how the answer isn&amp;rsquo;t fixing people.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299913768-opensourcesecuritypodcast-episode-23-we-cant-patch-people.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299913768-opensourcesecuritypodcast-episode-23-we-cant-patch-people.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299913768-opensourcesecuritypodcast-episode-23-we-cant-patch-people.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://dinaburg.org/bitsquatting.html&#34;&gt;Bitsquatting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nakedsecurity.sophos.com/typosquatting/&#34;&gt;Typosquatting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/12/19/los_angeles_charges_man_phishing/&#34;&gt;L.A. Phishing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://eng.uber.com/custom-email-ids/&#34;&gt;Uber Email IDS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/wheredidthesodago/&#34;&gt;Infomercial subreddit (Where did the soda go?)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://betanews.com/2016/12/21/super-mario-run-bad-news-malware/&#34;&gt;Super Mario Run Malware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/results?search_query=booba&#34;&gt;Booba&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/12/report-3-5m-in-ad-fraud-daily-from-methbot/&#34;&gt;Methbot&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Sumitomo_copper_affair&#34;&gt;Sumitomo copper affair&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The art of cutting edge, Doom 2 vs the modern Security Industry</title>
      <link>https://opensourcesecurity.io/2016/12/25/the-art-of-cutting-edge-doom-2-vs-the-modern-security-industry/</link>
      <pubDate>Sun, 25 Dec 2016 18:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/12/25/the-art-of-cutting-edge-doom-2-vs-the-modern-security-industry/</guid> 
      <description>&lt;p&gt;During the holiday, I started playing Doom 2. I bet I’ve not touched this game in more than ten years. I can&amp;rsquo;t even remember the last time I played it. My home directory was full of garbage and it was time to clean it up when I came across doom2.wad. I’ve been carrying this file around in my home directory for nearly twenty years now. It’s always there like an old friend you know you can call at any time, day or night. I decided it was time to install one of the doom engines and give it a go. I picked prboom, it’s something I used a long time ago and doesn’t have any fancy features like mouselook or jumping. Part of the appeal is to keep the experience close to the original. Plus if you could jump a lot of these levels would be substantially easier. The game depends on not having those features.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 22 - IoT Wild West</title>
      <link>https://opensourcesecurity.io/2016/12/25/episode-22-iot-wild-west/</link>
      <pubDate>Sun, 25 Dec 2016 13:36:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-22-iot-wild-west.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about planned obsolescence and IoT devices. Should manufacturers brick devices? We also have a crazy discussion about the ethics of hacking back.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299448186-opensourcesecuritypodcast-episode-22-iot-wild-west.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299448186-opensourcesecuritypodcast-episode-22-iot-wild-west.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/299448186-opensourcesecuritypodcast-episode-22-iot-wild-west.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/History_of_coffee#First_use&#34;&gt;First Uses of Coffee&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.huffingtonpost.com/peter-diamandis/from-beer-to-caffeine_b_5538535.html&#34;&gt;Did coffee cause the enlightenment?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bizjournals.com/sanjose/news/2016/04/05/nest-to-brick-revolv-smart-home-devices.html&#34;&gt;Nest bricks Revolv devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Phoebus_cartel&#34;&gt;Phoebus Cartel&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://gizmodo.com/verizon-will-brick-the-galaxy-note-7-after-all-1790158297&#34;&gt;Verizon will brick the Note 7&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Trolley_problem&#34;&gt;Trolley Problem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://incrediblethings.com/tech/toaster-toasts-weather-on-your-toast/&#34;&gt;Toaster toasts the weather&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.selectusa.gov/medical-technology-industry-united-states&#34;&gt;80% of medical device companies have less than 50 employees&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.wired.com/2016/03/future-wi-fi-10000-times-energy-efficient/&#34;&gt;Passive wifi chips&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Crystal_radio&#34;&gt;Crystal radio&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/The_Thing_(listening_device)&#34;&gt;Great Seal Bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Embassy_of_the_United_States,_Moscow&#34;&gt;Moscow Embassy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 21 - CVE 10K Extravaganza</title>
      <link>https://opensourcesecurity.io/2016/12/21/episode-21-cve-10k-extravaganza/</link>
      <pubDate>Wed, 21 Dec 2016 14:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-21-cve-10k-extravaganza.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about CVE 10K. CVE IDs have finally crossed the line, we need 5 digits to display them. This has never happened before now.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298898472-opensourcesecuritypodcast-episode-21-cve-10k-extravaganza.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298898472-opensourcesecuritypodcast-episode-21-cve-10k-extravaganza.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298898472-opensourcesecuritypodcast-episode-21-cve-10k-extravaganza.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.openwall.com/lists/oss-security/2016/12/19/5&#34;&gt;OpenSSH CVE10K assignments&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10005&#34;&gt;CVE-2016-10005&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cve/identifiers/syntaxchange.html#new&#34;&gt;CVE syntax change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cve/cna.html&#34;&gt;CVE Numbering Authorities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.openwall.com/lists/oss-security/2016/12/19/2&#34;&gt;OpenSSH Security Advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/C_to_HDL&#34;&gt;C to HDL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.engadget.com/2015/05/01/boeing-787-dreamliner-software-bug/&#34;&gt;Reboot Boeing Dreamliner&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theinquirer.net/inquirer/news/1047633/one-writes-linux-drivers-235-usb-webcams&#34;&gt;One person writes most Linux video camera drivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Donald_Becker&#34;&gt;Donald Becker&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/China_Airlines_Flight_120&#34;&gt;China Airlines Flight 120&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Does &amp;quot;real&amp;quot; security matter?</title>
      <link>https://opensourcesecurity.io/2016/12/19/does-real-security-matter/</link>
      <pubDate>Mon, 19 Dec 2016 18:45:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/12/19/does-real-security-matter/</guid> 
      <description>&lt;p&gt;As the dumpster fire that is 2016 crawls to the finish line, we had another story about a massive Yahoo breach. 1 billion user accounts had data stolen. Just to give some context here, that has to be hundreds of gigabytes at an absolute minimum. That&amp;rsquo;s a crazy amount of data.&lt;/p&gt;
&lt;p&gt;And nobody really cares.&lt;/p&gt;
&lt;p&gt;Sure, there is some noise about all this, but in a week or two nobody will even remember. There has been a similar story to this about every month all year long. Can you even remember any of them? The stock market doesn&amp;rsquo;t, basically everyone who has ever had a crazy breach hasn&amp;rsquo;t seen a long term problem with their stock. Sure there will be a blip where everyone panics for a few days, then things go back to normal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 20 - The Death of PGP</title>
      <link>https://opensourcesecurity.io/2016/12/19/episode-20-the-death-of-pgp/</link>
      <pubDate>Mon, 19 Dec 2016 13:43:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-20-death-of-pgp.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the death of PGP, and how it&amp;rsquo;s not actually dead at all. It&amp;rsquo;s still really hard to use though.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298557680-opensourcesecuritypodcast-episode-20-the-death-of-pgp.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298557680-opensourcesecuritypodcast-episode-20-the-death-of-pgp.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/298557680-opensourcesecuritypodcast-episode-20-the-death-of-pgp.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.filippo.io/giving-up-on-long-term-pgp/&#34;&gt;I&amp;rsquo;m giving up on PGP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.yubico.com/2015/11/4th-gen-yubikey-4/&#34;&gt;Yubikey 4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bress.net/blog/archives/203-How-to-use-a-cryptostick-with-Gnu-Privacy-Guard.html&#34;&gt;Josh&amp;rsquo;s PGP setup blog post&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://pgpkeys.mit.edu/pks/lookup?op=vindex&amp;amp;fingerprint=on&amp;amp;search=0x160D45535E267993&#34;&gt;Kurt&amp;rsquo;s key with multiple signatures&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lkml.org/lkml/2016/8/15/445&#34;&gt;PGP short ID collisons&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://web-beta.archive.org/web/19980212175216/http://www.icq.com:80/&#34;&gt;ICQ website from the late 90&amp;rsquo;s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://whispersystems.org/&#34;&gt;Signal Secure Messaging&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.cbc.ca/news/canada/edmonton/massive-unreported-security-breach-2-million-alleged-fraud-at-norquest-college-1.3747077&#34;&gt;$2 million fraud at NorQuest College&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.symantec.com/connect/blogs/scammers-pose-company-execs-wire-transfer-spam-campaign&#34;&gt;Scammers pose as company exec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.ssl.com/faqs/ssl-ev-validation-requirements/&#34;&gt;EV certificate requirements&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 19 - A field full of razor blades and monsters</title>
      <link>https://opensourcesecurity.io/2016/12/14/episode-19-a-field-full-of-razor-blades-and-monsters/</link>
      <pubDate>Wed, 14 Dec 2016 15:55:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-19-field-full-of-razor-blades.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the bricking devices (on purpose).&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297769068-opensourcesecuritypodcast-episode-19-a-field-full-of-razor-blades-and-monsters.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297769068-opensourcesecuritypodcast-episode-19-a-field-full-of-razor-blades-and-monsters.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297769068-opensourcesecuritypodcast-episode-19-a-field-full-of-razor-blades-and-monsters.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnet.com/news/samsung-software-update-will-brick-the-few-remaining-note-7s-left-in-the-wild/&#34;&gt;Samsung will brick the Note 7s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cnet.com/news/verizon-wont-push-samsung-galaxy-note-7-death-update/&#34;&gt;Verizon won&amp;rsquo;t brick the phones&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://gizmodo.com/us-officially-bans-hoverboard-imports-1765273203&#34;&gt;Hoverboard imports banned&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Firestone_and_Ford_tire_controversy&#34;&gt;Firestone tire recall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://abcnews.go.com/Technology/wireStory/denmark-apple-loses-court-case-refurbished-phone-44085476&#34;&gt;Denmark Apple refurbished phone case&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html&#34;&gt;Deprecating SHA1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://blog.mozilla.org/gen/2007/02/27/the-cost-of-monoculture/&#34;&gt;South Korean Banking Encryption&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Canada&#39;s_Worst_Driver&#34;&gt;Canada&amp;rsquo;s Worst Driver&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://bgr.com/2016/12/07/pebble-kickstarter-refund-time-2/&#34;&gt;Fitbit bought Pebble&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20%23osspodcast&#34;&gt;Comment on Twitter with the #osspodcast hashtag&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 18 - The Security of Santa</title>
      <link>https://opensourcesecurity.io/2016/12/11/episode-18-the-security-of-santa/</link>
      <pubDate>Sun, 11 Dec 2016 21:48:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-18-security-of-santa.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about the security concerns and logistics of Santa, elves, and the North Pole.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297112068-opensourcesecuritypodcast-episode-18-the-security-of-santa.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297112068-opensourcesecuritypodcast-episode-18-the-security-of-santa.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/297112068-opensourcesecuritypodcast-episode-18-the-security-of-santa.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.elfontheshelf.com/&#34;&gt;Elf on the Shelf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://s-media-cache-ak0.pinimg.com/564x/a8/98/b7/a898b7c9737c46e9cde21346efd794bc.jpg&#34;&gt;Furby without fur&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.norad.mil/About-NORAD/NORAD-Tracks-Santa/&#34;&gt;Norad Tracks Santa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://futurama.wikia.com/wiki/Xmas&#34;&gt;Futurama Xmas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.stnicholascenter.org/pages/who-is-st-nicholas/&#34;&gt;St. Nicholas&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.npr.org/2011/12/23/144136439/david-sedaris-reads-from-his-santaland-diaries&#34;&gt;David Sedaris on Santa&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Candy_Desk&#34;&gt;US Senate Candy Desk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://techland.time.com/2012/03/06/youd-need-76-work-days-to-read-all-your-privacy-policies-each-year/&#34;&gt;You need 76 days to read all privacy statements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.crimemuseum.org/crime-library/leonardo-da-vinci-mona-lisa-theft/&#34;&gt;Mona Lisa Theft&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Aero_Spacelines_Super_Guppy&#34;&gt;Super Guppy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://dm.lsst.org/&#34;&gt;LSST Data Management&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Back of the envelope&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3589 x1.32large instances (1952 gigs ram)&lt;/p&gt;
&lt;p&gt;holds 7 petabytes of data in memory&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 17 - Cyphercon Interview with Korgo</title>
      <link>https://opensourcesecurity.io/2016/12/06/episode-17-cyphercon-interview-with-korgo/</link>
      <pubDate>Tue, 06 Dec 2016 14:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-17-cyphercon-interview-with.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk to &lt;a href=&#34;https://twitter.com/Goetzman&#34;&gt;Michael Goetzman&lt;/a&gt; about Cyphercon&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/296503873-opensourcesecuritypodcast-episode-17-cyphercon-interview-with-korgo.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/296503873-opensourcesecuritypodcast-episode-17-cyphercon-interview-with-korgo.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/296503873-opensourcesecuritypodcast-episode-17-cyphercon-interview-with-korgo.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cyphercon.com/&#34;&gt;Cyphercon&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://cyphercon.com/cyphercon-20/&#34;&gt;Cyphercon 2.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://i.cyphercon.com/&#34;&gt;Cyphercon 1.0&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.meetup.com/920_Sec/&#34;&gt;920 Sec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://tools.cisco.com/security/center/viewAlert.x?alertId=7696&#34;&gt;Korgo Virus&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.safe-house.com/&#34;&gt;SafeHouse Spy Restaurant&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.discoveryworld.org/&#34;&gt;Discovery World&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.midwestgamingclassic.com/&#34;&gt;Midwest Gaming Classic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://milwaukeehistoryblog.wordpress.com/2013/07/07/summerfest-cold-war-battleground/&#34;&gt;Summerfest: Cold War Battleground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/LIM-49_Nike_Zeus&#34;&gt;Nike Zeus Missile&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Poutine&#34;&gt;Poutine&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Ghost-Fleet-Novel-Next-World/dp/054470505X&#34;&gt;Ghost Fleet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/George_Stroumboulopoulos&#34;&gt;George Stroumboulopoulos&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Airports, Goats, Computers, and Users</title>
      <link>https://opensourcesecurity.io/2016/12/04/airports-goats-computers-and-users/</link>
      <pubDate>Sun, 04 Dec 2016 17:17:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/12/04/airports-goats-computers-and-users/</guid> 
      <description>&lt;p&gt;Last week I had the joy traveling through airports right after the United States Thanksgiving holiday. Now I don&amp;rsquo;t know how many of you have ever tried to travel the week after Thanksgiving but it&amp;rsquo;s kind of crazy, there are a lot of people, way more than usual, and a significant number of them have probably never been on an airplane or if they travel by air they don&amp;rsquo;t do it very often. The joke I like to tell people is that there are folks at the airport wondering why they can&amp;rsquo;t bring their goat onto the airplane. I’m not going to use this post to discuss the merits of airport security (that’s a whole different conversation), it’s really about coexisting with existing security systems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 16 - Cat and mouse</title>
      <link>https://opensourcesecurity.io/2016/12/02/episode-16-cat-and-mouse/</link>
      <pubDate>Fri, 02 Dec 2016 20:50:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/12/episode-16-cat-and-mouse.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about cybercrime and regulation.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295920212-opensourcesecuritypodcast-episode-16-cat-and-mouse.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295920212-opensourcesecuritypodcast-episode-16-cat-and-mouse.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295920212-opensourcesecuritypodcast-episode-16-cat-and-mouse.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/12/avalanche-global-fraud-ring-dismantled/&#34;&gt;Avalanche Global Fraud Ring&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Spam_King&#34;&gt;Spam King&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://lacrossetribune.com/stories/news/beware-of-rosendale-but-buy-a-t-shirt-when-you/article_8ac18df3-a5dc-577a-8cff-b76582bd7050.html&#34;&gt;Rosendale Speed Trap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/11/28/router_flaw_exploited_in_massive_attack/&#34;&gt;Attacking Broadband Routers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://thatoneprivacysite.net/vpn-comparison-chart/&#34;&gt;Spreadsheet of VPN providers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/&#34;&gt;DNSSEC Root Signing Ceremony&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Chicago_Tylenol_murders&#34;&gt;Chicago Tylenol Murders&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Psychoactive_Substances_Act_2016&#34;&gt;Psychoactive Substances Act 2016&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act&#34;&gt;Computer Fraud and Abuse Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://calvinandhobbes.wikia.com/wiki/Calvinball&#34;&gt;Calvinball&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.sophos.com/en-us/press-office/press-releases/2000/09/va_cihauthor.aspx&#34;&gt;CIH Virus Author&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/&#34;&gt;Firefox 0day&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 15 - Cyber Black Monday</title>
      <link>https://opensourcesecurity.io/2016/11/29/episode-15-cyber-black-monday/</link>
      <pubDate>Tue, 29 Nov 2016 06:12:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/11/episode-15-cyber-black-monday.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about Cyber Monday security tips.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295266221-opensourcesecuritypodcast-episode-15-cyber-black-monday.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295266221-opensourcesecuritypodcast-episode-15-cyber-black-monday.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/295266221-opensourcesecuritypodcast-episode-15-cyber-black-monday.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://edmontonjournal.com/opinion/columnists/paula-simons-mary-and-mariama-parallels-between-deaths-of-bus-accident-victims-should-inspire-us-to-act&#34;&gt;Edmonton Bus Accidents&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://research.google.com/pubs/pub43231.html&#34;&gt;BeyondCorp: A New Approach to Enterprise Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://motherboard.vice.com/read/surprise-scans-suggest-hackers-put-imsi-catchers-all-over-defcon&#34;&gt;Black Hat Cell Towers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://searchengineland.com/google-to-begin-to-index-https-pages-first-before-http-pages-when-possible-238811&#34;&gt;Google ranks https results first&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Domain_tasting&#34;&gt;Domain Tasting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.gnucash.org/&#34;&gt;GnuCash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bleepingcomputer.com/news/security/android-malware-used-to-hack-and-steal-a-tesla-car/&#34;&gt;Tesla Credentials&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/taviso/status/676415513270968321&#34;&gt;Tavis Ormandy strcpy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://pwsafe.org/&#34;&gt;pwsafe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/cryptography/comments/31b3dm/is_mashing_on_the_keyboard_cryptographically/&#34;&gt;Is mashing the keyboard cryptographically secure?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Economics of stealing a Tesla with a phone</title>
      <link>https://opensourcesecurity.io/2016/11/28/the-economics-of-stealing-a-tesla-with-a-phone/</link>
      <pubDate>Mon, 28 Nov 2016 00:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/11/28/the-economics-of-stealing-a-tesla-with-a-phone/</guid> 
      <description>&lt;p&gt;A few days ago there was a &lt;a href=&#34;http://www.bleepingcomputer.com/news/security/android-malware-used-to-hack-and-steal-a-tesla-car/&#34;&gt;story&lt;/a&gt; about how to steal a Tesla by installing malware on the owner&amp;rsquo;s phone. If you look at the big picture view of this problem it&amp;rsquo;s not all that bad, but our security brains want to make a huge deal out of this. Now I&amp;rsquo;m not saying that Tesla shouldn&amp;rsquo;t fix this problem, especially since it&amp;rsquo;s going to be a trivial fix. What we want to think about is how all these working parts have to fit together. This is something we&amp;rsquo;re not very good at in the security universe; there can be one single horrible problem, but when we paint the full picture, it&amp;rsquo;s not what it seems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 14 - David A Wheeler: CII Badges</title>
      <link>https://opensourcesecurity.io/2016/11/22/episode-14-david-a-wheeler-cii-badges/</link>
      <pubDate>Tue, 22 Nov 2016 20:54:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/11/episode-14-david-wheeler-cii-badges.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; have a guest! &lt;a href=&#34;https://twitter.com/drdavidawheeler&#34;&gt;David A. Wheeler&lt;/a&gt; talks about open source security and the CII Badges project.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/294303517-opensourcesecuritypodcast-episode-14-david-a-wheeler-cii-badges.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/294303517-opensourcesecuritypodcast-episode-14-david-a-wheeler-cii-badges.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/294303517-opensourcesecuritypodcast-episode-14-david-a-wheeler-cii-badges.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://bestpractices.coreinfrastructure.org/&#34;&gt;CII Badge Program&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://bestpractices.coreinfrastructure.org/projects&#34;&gt;Badges Project Database&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/linuxfoundation/cii-best-practices-badge/issues&#34;&gt;Badges GitHub Project Page&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fast security is the best security</title>
      <link>https://opensourcesecurity.io/2016/11/21/fast-security-is-the-best-security/</link>
      <pubDate>Mon, 21 Nov 2016 01:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/11/21/fast-security-is-the-best-security/</guid> 
      <description>&lt;p&gt;DevOps security is a bit like developing without a safety net. This is meant to be a reference to a trapeze act at the circus for those of you who have never had the joy of witnessing the heart stopping excitement of the circus trapeze. The idea is that when you watch a trapeze act with a net, you know that if something goes wrong, they just land in a net. The really exciting and scary trapeze acts have no net. If these folks fall, that&amp;rsquo;s pretty much it for them. &lt;a href=&#34;https://twitter.com/iamjkeating/status/797852889196527616&#34;&gt;Someone&lt;/a&gt; pointed out to me that the current DevOps security is a bit like taking away the net.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 13 - CVE: The metric system of security</title>
      <link>https://opensourcesecurity.io/2016/11/18/episode-13-cve-the-metric-system-of-security/</link>
      <pubDate>Fri, 18 Nov 2016 20:43:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/11/episode-13-cve-metric-system-of-security.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; talk about CVE, DWF, and the future of flaw reporting.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/293693983-opensourcesecuritypodcast-episode-13-cve-the-metric-system-of-security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/293693983-opensourcesecuritypodcast-episode-13-cve-the-metric-system-of-security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/293693983-opensourcesecuritypodcast-episode-13-cve-the-metric-system-of-security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://cve.mitre.org/&#34;&gt;CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/about/faqs.html#c7&#34;&gt;CVE Candidates (CAN)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://distributedweaknessfiling.org/&#34;&gt;DWF&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nvd.nist.gov/&#34;&gt;NVD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.openwall.com/lists/oss-security/&#34;&gt;Open Source Security Mailing List&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=9ADubsByGos&#34;&gt;Larry Cashdollar&amp;rsquo;s Defcon talk&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/ISO_2848#Metric_inch&#34;&gt;Metric Inch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Who cares if someone hacks my driveway camera?</title>
      <link>https://opensourcesecurity.io/2016/11/14/who-cares-if-someone-hacks-my-driveway-camera/</link>
      <pubDate>Mon, 14 Nov 2016 14:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/11/14/who-cares-if-someone-hacks-my-driveway-camera/</guid> 
      <description>&lt;p&gt;I keep hearing something from people about IoT that reminds me of the old saying, if you’ve done nothing wrong, you have nothing to fear. This attitude is incredibly dangerous in the context of IoT devices (it’s dangerous in all circumstances honestly). The way I keep hearing this in the context of IoT is something like this: “I don’t care if someone hacks my video camera, it’s just showing pictures of my driveway”. The problem here isn’t what video the camera is capturing, it’s the fact that if your camera gets hacked, the attacker can do nearly anything with the device on the Internet. Remember, at this point these things are fairly powerful general purpose computers that happen to have a camera.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 12 - Security Trebuchet</title>
      <link>https://opensourcesecurity.io/2016/11/10/episode-12-security-trebuchet/</link>
      <pubDate>Thu, 10 Nov 2016 20:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/11/episode-12-security-trebuchet.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and special guest host &lt;a href=&#34;https://twitter.com/dsirrine&#34;&gt;Dave Sirrine&lt;/a&gt; talk about feedback, OpenSSL, OAuth2, Let&amp;rsquo;s Encrypt, disclosure, and locks.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/292434458-opensourcesecuritypodcast-episode-12-security-trebuchet.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/292434458-opensourcesecuritypodcast-episode-12-security-trebuchet.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/292434458-opensourcesecuritypodcast-episode-12-security-trebuchet.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.co-hoppe.net/post/ossp_ep8/&#34;&gt;coh&amp;rsquo;s feedback&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/news/secadv/20161110.txt&#34;&gt;OpenSSL security advisory&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://access.redhat.com/discussions/2713931&#34;&gt;Red Hat CLI security API&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/joshbressers/status/792875684607787009&#34;&gt;Shovel Knight Pumpkin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bleepingcomputer.com/news/security/over-one-billion-android-users-susceptible-to-app-hijacking-via-oauth-2-0-attack/&#34;&gt;OAuth2 bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/half-of-chrome-pageloads-are-https/121798/&#34;&gt;Half of all Chrome connections use https&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html&#34;&gt;Google&amp;rsquo;s Windows Bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://richsec.com/&#34;&gt;RichSec (Richmond VA Information Security Users Group)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://rvasec.com/&#34;&gt;RVASec (Yearly conference in June held by RichSec)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=jqjacHSTd48&#34;&gt;Schuyler Towne - “Why do you lock your door?”&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20@dsirrine&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Free security is the only security that really works</title>
      <link>https://opensourcesecurity.io/2016/11/06/free-security-is-the-only-security-that-really-works/</link>
      <pubDate>Sun, 06 Nov 2016 23:41:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/11/06/free-security-is-the-only-security-that-really-works/</guid> 
      <description>&lt;p&gt;There are certain things people want and will pay for. There are things they want and won’t. If we look at security it’s pretty clear now that security is one of those things people want, but most won’t pay for. The insane &lt;a href=&#34;https://www.eff.org/deeplinks/2016/10/lets-encrypt-largest-certificate-authority-web&#34;&gt;success&lt;/a&gt; of Let’s Encrypt is where this thought came from. Certificates aren’t new, they used to even be really cheap (there were free providers, but there was a time cost of jumping through hoops). Let’s Encrypt make the time and actual cost basically zero, now it’s deployed all over. Depending who you ask, they’re one of the biggest CAs around now, and that took them a year? That’s crazy.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stop being the monkey&#39;s paw</title>
      <link>https://opensourcesecurity.io/2016/10/31/stop-being-the-monkeys-paw/</link>
      <pubDate>Mon, 31 Oct 2016 22:57:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/10/31/stop-being-the-monkeys-paw/</guid> 
      <description>&lt;p&gt;Tonight while I was handing out candy on Halloween as the children came to the door trick-or-treating getting whatever candy I&amp;rsquo;ve not yet eaten. I started thinking about scary stories the security universe. Some of the things we do in Security could be compared to the old fable of the cursed monkey&amp;rsquo;s paw, which is one of my favorite stories.&lt;/p&gt;
&lt;p&gt;For those who don&amp;rsquo;t know what this story is, the quick version of the story is essentially there is a monkey&amp;rsquo;s paw, an actual severed appendage of a monkey (it&amp;rsquo;s not some sort of figurative item). It has some fingers on it that may or may not signify the number of wishes used. The paw is indestructible, the previous owner doesn’t want it, but can’t get rid of it until some unsuspecting suckers shows up. The idea is you make a wish you get three wishes or five or whatever depending upon the version of the story that&amp;rsquo;s told (these old folk tales can differ greatly depending on what part of the world is telling them) and then the monkey paw gives you exactly what you asked for. The problem is what you asked for comes with horrifying consequences. For example there was an old man who had the paw and he asked for $200, the next day he got his $200 because his son was killed at work and they brought him $200 of his last paycheck. Of course there&amp;rsquo;s different variants of this but the basic idea is the paw seems clever, it grants wishes, but every wish comes with terrible consequences.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 11 - The Poison Candy Episode</title>
      <link>https://opensourcesecurity.io/2016/10/31/episode-11-the-poison-candy-episode/</link>
      <pubDate>Mon, 31 Oct 2016 18:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/10/episode-11-poison-candy-episode.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; and special guest host &lt;a href=&#34;https://twitter.com/dsirrine&#34;&gt;Dave Sirrine&lt;/a&gt; talk about Halloween, passwords, hardware timing attacks, chip and pin, security economics, SSL/TLS, and Mozilla enabling TLS 1.3 by default.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/290834937-opensourcesecuritypodcast-episode-11-the-poison-candy-episode.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/290834937-opensourcesecuritypodcast-episode-11-the-poison-candy-episode.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/290834937-opensourcesecuritypodcast-episode-11-the-poison-candy-episode.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.snopes.com/horrors/poison/halloween.asp&#34;&gt;Risky Candy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/936/&#34;&gt;XKCD Password Strength&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://world.std.com/~reinhold/diceware.html&#34;&gt;Diceware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.binghamton.edu/mpr/news-releases/news-release.html?id=2441&#34;&gt;Haswell Timing Attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/&#34;&gt;Rowhammer on Android&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2016/10/eavesdropping_o_6.html&#34;&gt;Eavesdropping keystrokes via VOIP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.0&#34;&gt;SSL/TLS Timeline&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried%20@dsirrine&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security is in the same leaky boat as the sysadmins</title>
      <link>https://opensourcesecurity.io/2016/10/31/security-is-in-the-same-leaky-boat-as-the-sysadmins/</link>
      <pubDate>Mon, 31 Oct 2016 00:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/10/31/security-is-in-the-same-leaky-boat-as-the-sysadmins/</guid> 
      <description>&lt;p&gt;Sysadmins used to rule the world. Anyone who&amp;rsquo;s been around for more than a few years remembers the days when whatever the system administrator wanted, the system administrator got. They were the center of the business. Without them nothing would work. They were generally super smart and could quite often work magic with what they had. It was certainly a different time back then.&lt;/p&gt;
&lt;p&gt;Now developers are king, the days of the sysadmin have waned. The systems we run workloads on are becoming a commodity, you either buy a relatively complete solution, or you just run it in the cloud. These days most anyone using technology for their business relies on developers instead of sysadmins.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 10 - The super botnet that nobody can stop</title>
      <link>https://opensourcesecurity.io/2016/10/24/episode-10-the-super-botnet-that-nobody-can-stop/</link>
      <pubDate>Mon, 24 Oct 2016 21:25:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/10/episode-10-super-botnet-that-nobody-can.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; discuss Dirty COW, the big IoT DDoS, and Josh can&amp;rsquo;t pronounce Mirai or Dyn.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/289791587-opensourcesecuritypodcast-episode-10-the-super-botnet-that-nobody-can-stop.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/289791587-opensourcesecuritypodcast-episode-10-the-super-botnet-that-nobody-can-stop.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/289791587-opensourcesecuritypodcast-episode-10-the-super-botnet-that-nobody-can-stop.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://dirtycow.ninja/&#34;&gt;Dirty Cow&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://outflux.net/blog/archives/2016/10/18/security-bug-lifetime/&#34;&gt;Kees Cook Kernel Bug Lifetime&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Row_hammer&#34;&gt;Rowhammer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.flashpoint-intel.com/mirai-botnet-linked-dyn-dns-ddos-attacks/&#34;&gt;Mirai botnet DDoS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Law_of_truly_large_numbers&#34;&gt;Law of truly large numbers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Everything you know about security is wrong</title>
      <link>https://opensourcesecurity.io/2016/10/23/everything-you-know-about-security-is-wrong/</link>
      <pubDate>Sun, 23 Oct 2016 22:21:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/10/23/everything-you-know-about-security-is-wrong/</guid> 
      <description>&lt;p&gt;If I asked everyone to tell me what security is, what do you do about it, and why you do it. I wouldn&amp;rsquo;t get two answers that were the same. I probably wouldn&amp;rsquo;t even get two that are similar. Why is this? After recording &lt;a href=&#34;http://www.opensourcesecuritypodcast.com/2016/10/episode-9-are-bug-bounties-measuring.html&#34;&gt;Episode 9&lt;/a&gt; of the Open Source Security Podcast I co-host, I started thinking about measuring a lot. It came up in the podcast in the context of bug bounties, which get exactly what they measure. But do they measure the right things? I don&amp;rsquo;t know the answer, nor does it really matter. It&amp;rsquo;s just important to keep this in mind as in any system, you will get exactly what you measure.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IoT Can Never Be Fixed</title>
      <link>https://opensourcesecurity.io/2016/10/22/iot-can-never-be-fixed/</link>
      <pubDate>Sat, 22 Oct 2016 02:32:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/10/22/iot-can-never-be-fixed/</guid> 
      <description>&lt;p&gt;This title is a bit click baity, but it&amp;rsquo;s true, not for the reason you think. Keep reading to see why.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;ve ever been involved in keeping a software product updated, I mean from the development side of things, you know it&amp;rsquo;s not a simple task. It&amp;rsquo;s nearly impossible really. The biggest problem is that even after you&amp;rsquo;ve tested it to death and gone out of your way to ensure the update is as small as possible, things break. Something always breaks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 9 - Are bug bounties measuring the wrong things?</title>
      <link>https://opensourcesecurity.io/2016/10/18/episode-9-are-bug-bounties-measuring-the-wrong-things/</link>
      <pubDate>Tue, 18 Oct 2016 22:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/10/episode-9-are-bug-bounties-measuring.html</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://twitter.com/kurtseifried&#34;&gt;Kurt&lt;/a&gt; and &lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;Josh&lt;/a&gt; discuss responsible disclosure, irresponsible disclosure, bug bounties, measuring security, usability AND security, as well as quality of life.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/288890601-opensourcesecuritypodcast-episode-9-are-bug-bounties-measuring-the-wrong-things.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/288890601-opensourcesecuritypodcast-episode-9-are-bug-bounties-measuring-the-wrong-things.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/288890601-opensourcesecuritypodcast-episode-9-are-bug-bounties-measuring-the-wrong-things.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://tools.ietf.org/html/draft-christey-wysopal-vuln-disclosure-00&#34;&gt;Responsible Disclosure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/policies/secpolicy.html&#34;&gt;OpenSSL Security Policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/RFPolicy&#34;&gt;Rain Forest Puppy Policy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://standards.iso.org/ittf/PubliclyAvailableStandards/c045170_ISO_IEC_29147_2014.zip&#34;&gt;ISO 29147&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/10/14/facebook_bug_bounty_squashes_900_falws/&#34;&gt;Facebook Bug Bounty&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/10/14/security_spending_idc/&#34;&gt;Security Spending&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://threatpost.com/free-ssl-providers-spark-unprecedented-growth-in-encrypted-traffic/121336/&#34;&gt;Security AND Usability&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Can I interest you in talking about Security?</title>
      <link>https://opensourcesecurity.io/2016/10/17/can-i-interest-you-in-talking-about-security/</link>
      <pubDate>Mon, 17 Oct 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/10/17/can-i-interest-you-in-talking-about-security/</guid> 
      <description>&lt;p&gt;I had a discussion last week with some fellow security folks about how we can discuss security with normal people. If you pay attention to what&amp;rsquo;s going on, you know the security people and the non security people don&amp;rsquo;t really communicate well. We eventually made our way to comparing what we do to the door to door religious groups. They&amp;rsquo;re rarely seen in a positive light, are usually annoying, and only seem to show up when it&amp;rsquo;s most inconvenient. This got me thinking, we probably have more in common there than we want to admit, but there are also some lessons for us.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 8 - The primality of prime numbers</title>
      <link>https://opensourcesecurity.io/2016/10/11/episode-8-the-primality-of-prime-numbers/</link>
      <pubDate>Tue, 11 Oct 2016 23:33:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/10/episode-8-primality-of-prime-numbers.html</guid> 
      <description>&lt;p&gt;Kurt and Josh discuss prime numbers (probably getting a lot of it wrong), Samsung, passwords, National Cyber Security Awareness Month, and bathroom scales.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/287233537-opensourcesecuritypodcast-episode-8-the-primality-of-prime-numbers.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/287233537-opensourcesecuritypodcast-episode-8-the-primality-of-prime-numbers.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/287233537-opensourcesecuritypodcast-episode-8-the-primality-of-prime-numbers.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.com/security/2016/10/how-the-nsa-could-put-undetectable-trapdoors-in-millions-of-crypto-keys/&#34;&gt;New Prime Number Research&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.phy.duke.edu/~rgb/General/dieharder.php&#34;&gt;Randomness testing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/RedHatProductSecurity/Diffie-Hellman-Primes/&#34;&gt;Kurt&amp;rsquo;s Repo of Primes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/&#34;&gt;DNSSEC Signing Ceremony&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pcworld.com/article/2941172/magento-ecommerce-platform-targeted-with-sneaky-code.html&#34;&gt;Magento Skimmer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://xkcd.com/538/&#34;&gt;XKCD Wrench Comic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://codebutler.github.io/firesheep/&#34;&gt;Firesheep&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://staysafeonline.org/ncsam/&#34;&gt;National Cyber Security Awareness Month&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2016/10/security_design.html&#34;&gt;Stop Trying to Fix the User&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2016/10/only-trust-food-delivered-by-zebra.html&#34;&gt;Only Trust Food Delivered by Zebra&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://help.fitbit.com/articles/en_US/Help_article/1164&#34;&gt;Bathroom Scale Flaw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 7 - More Powerful than root!</title>
      <link>https://opensourcesecurity.io/2016/10/03/episode-7-more-powerful-than-root/</link>
      <pubDate>Mon, 03 Oct 2016 21:05:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/10/episode-7-more-powerful-than-root.html</guid> 
      <description>&lt;p&gt;Kurt and Josh discuss the ORWL computer, crashing systemd with one line, NIST, and a security journal.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285901909-opensourcesecuritypodcast-episode-7-more-powerful-than-root.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285901909-opensourcesecuritypodcast-episode-7-more-powerful-than-root.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285901909-opensourcesecuritypodcast-episode-7-more-powerful-than-root.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://insights.ubuntu.com/2016/09/29/meet-orwl-the-first-open-source-physically-secure-computer/&#34;&gt;Physically secure open source computer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/09/27/printerfax_crack_enables_patient_dialup_hack/&#34;&gt;Ancient Linux fax machine firmware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet&#34;&gt;systemd one liner crash&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://adamcaudill.com/2016/09/28/need-open-security-journal/&#34;&gt;Open security journal&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://golang.org/pkg/math/rand/&#34;&gt;Random Numbers in Go&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://csrc.nist.gov/publications/PubsDrafts.html#NIST-IR-8138&#34;&gt;DRAFT Vulnerability Description Ontology&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Impossible is impossible!</title>
      <link>https://opensourcesecurity.io/2016/10/03/impossible-is-impossible/</link>
      <pubDate>Mon, 03 Oct 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/10/03/impossible-is-impossible/</guid> 
      <description>&lt;p&gt;Sometimes when you plan for a security event, it would be expected that the thing you&amp;rsquo;re doing will be making some outcome (something bad probably) impossible. The goal of the security group is to keep the bad guys out, or keep the data in, or keep the servers patched, or find all the security bugs in the code. One way to look at this is security is often in the business of preventing things from happening, such as making data exfiltration impossible. I&amp;rsquo;m here to tell you it&amp;rsquo;s impossible to make something impossible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 6 - Foundational Knowledge of Security</title>
      <link>https://opensourcesecurity.io/2016/09/29/episode-6-foundational-knowledge-of-security/</link>
      <pubDate>Thu, 29 Sep 2016 19:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-6-foundational-knowledge-of.html</guid> 
      <description>&lt;p&gt;Kurt and Josh discuss interesting news stories&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285305681-opensourcesecuritypodcast-episode-6-foundational-knowledge-of-security.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285305681-opensourcesecuritypodcast-episode-6-foundational-knowledge-of-security.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285305681-opensourcesecuritypodcast-episode-6-foundational-knowledge-of-security.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://ottawacitizen.com/news/local-news/egan-170k-in-mint-gold-allegedly-smuggled-in-body-cavity-judge-hears&#34;&gt;How much gold can you steal from the Canadian mint?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/worldnews/comments/53sl5r/someone_is_putting_malicious_usb_sticks_in/&#34;&gt;Stop plugging random usb sticks in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/?_lrsc=697bf960-d341-4c5a-9902-7b36e38054b9&amp;amp;sc_cid=70160000000lfTCAAY&#34;&gt;IoT DoS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.schneier.com/blog/archives/2016/09/the_cost_of_cyb.html&#34;&gt;Cost of Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.kijiji.ca/&#34;&gt;Kijiji&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://worldofvnc.net/&#34;&gt;World of VNC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://sobersecurity.blogspot.com/2016/01/security-and-tribal-knowledge.html&#34;&gt;Security and Tribal Knowledge&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 5 - OpenSSL: The library we deserve</title>
      <link>https://opensourcesecurity.io/2016/09/29/episode-5-openssl-the-library-we-deserve/</link>
      <pubDate>Thu, 29 Sep 2016 00:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-5-openssl-library-we-deserve.html</guid> 
      <description>&lt;p&gt;Kurt and Josh discuss the recent OpenSSL update(s)&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285193058-opensourcesecuritypodcast-episode-5-openssl-the-library-we-deserve.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285193058-opensourcesecuritypodcast-episode-5-openssl-the-library-we-deserve.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/285193058-opensourcesecuritypodcast-episode-5-openssl-the-library-we-deserve.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://security.360.cn/cve/CVE-2016-6304/&#34;&gt;OpenSSL Flaw Logo&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.zdnet.com/article/sloppy-programming-leads-to-openssl-woes/&#34;&gt;​Sloppy programming leads to OpenSSL woes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6309&#34;&gt;CVE-2016-6309 (OpenSSL advisory) [Critical severity] 26th September 2016&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://shop.oreilly.com/product/9780596510299.do&#34;&gt;Sendmail &amp;ldquo;Bat&amp;rdquo; Book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.openssl.org/docs/manmaster/apps/&#34;&gt;OpenSSL Man Pages&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Who left all this fire everywhere?</title>
      <link>https://opensourcesecurity.io/2016/09/26/who-left-all-this-fire-everywhere/</link>
      <pubDate>Mon, 26 Sep 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/09/26/who-left-all-this-fire-everywhere/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;re paying attention, you saw the news about Yahoo&amp;rsquo;s breach. Five hundred million accounts. That&amp;rsquo;s a whole lot of data if you think about it.  But here&amp;rsquo;s the thing. If you&amp;rsquo;re a security person, are you surprised by this? If you are, you&amp;rsquo;ve not been paying attention.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s pretty well accepted that there are two types of large infrastructures. Those who know they&amp;rsquo;ve been hacked, and those who don&amp;rsquo;t yet know they&amp;rsquo;ve been hacked. Any group as large as Yahoo probably has more attackers inside their infrastructure than anyone really wants to think about. This is certainly true of every single large infrastructure and cloud provider and consumer out there. Think about that for a little bit. If you&amp;rsquo;re part of a large infrastructure, you have threat actors inside your network right now, probably more than you think.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 4 - Dead squirrel in a box</title>
      <link>https://opensourcesecurity.io/2016/09/21/episode-4-dead-squirrel-in-a-box/</link>
      <pubDate>Wed, 21 Sep 2016 03:24:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-4-dead-squirrel-in-box.html</guid> 
      <description>&lt;p&gt;Josh and Kurt discuss news of the day, shipping, and container security&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/283885003-opensourcesecuritypodcast-episode-4-dead-squirrel-in-a-box.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/283885003-opensourcesecuritypodcast-episode-4-dead-squirrel-in-a-box.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/283885003-opensourcesecuritypodcast-episode-4-dead-squirrel-in-a-box.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/09/15/hacker_jailed_over_gold_bar_theft_scam/&#34;&gt;Stealing shipped gold&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://postalmuseumblog.si.edu/2012/11/delivering-the-hope-diamond.html&#34;&gt;Shipping the Hope Diamond&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/09/15/trend_micro_french_underground/&#34;&gt;The French Underground&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.amazon.com/Spam-Nation-Organized-Cybercrime_from-Epidemic/dp/1501210424&#34;&gt;Spam Nation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://wwwwwwwwwwwwwwwwwwwwww.bitnik.org/r/&#34;&gt;The Random Darknet Shopper&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.independent.co.uk/life-style/food-and-drink/features/why-are-kinder-surprise-eggs-illegal-in-the-usa-10055273.html&#34;&gt;Kinder Eggs in the US&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.improbable.com/airchives/paperair/volume6/v6i4/postal-6-4.html&#34;&gt;Mailing crazy things&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.stampsofdistinction.com/2008/07/bank-that-was-sent-through-post-office.html&#34;&gt;Mailing Bricks to Alaska&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.mirror.co.uk/news/world-news/astonishing-self-driving-uber-cars-8832381&#34;&gt;Uber&amp;rsquo;s self driving fleet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.2600.com/offthehook/&#34;&gt;Off the Hook radio show&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.redstate.com/brandon_morse/2016/09/19/caught-red-handed-hillarys-tech-guy-discovered-asking-wipe-evidence-reddit/&#34;&gt;How to wipe email servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.theregister.co.uk/2016/09/14/great_british_blockoff/&#34;&gt;Government firewall rules&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://xkcd.com/1735/&#34;&gt;xkcd grammar police&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/projectatomic/bubblewrap&#34;&gt;Project Bubblewrap&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is dialup still an option?</title>
      <link>https://opensourcesecurity.io/2016/09/20/is-dialup-still-an-option/</link>
      <pubDate>Tue, 20 Sep 2016 13:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/09/20/is-dialup-still-an-option/</guid> 
      <description>&lt;p&gt;TL;DR - No.&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s why.&lt;/p&gt;
&lt;p&gt;I was talking with my &lt;a href=&#34;https://opensourcesecuritypodcast.com/&#34;&gt;Open Source Security Podcast&lt;/a&gt; co-host Kurt Seifried about what it would be like to access the modern Internet using dialup. So I decided to give this a try. My first thought was to find a modem, but after looking into this, it isn&amp;rsquo;t really an option anymore.&lt;/p&gt;
&lt;h2 id=&#34;the-setup&#34;&gt;The setup&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;No Modem&lt;/li&gt;
&lt;li&gt;Fedora 24 VM&lt;/li&gt;
&lt;li&gt;Firefox as packaged with Fedora 24&lt;/li&gt;
&lt;li&gt;Use the firewall via wondershaper to control the network speed&lt;/li&gt;
&lt;li&gt;&amp;ldquo;App Telemetry&amp;rdquo; firefox plugin to time the site load time&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I know it&amp;rsquo;s not perfect, but it&amp;rsquo;s probably close enough to get a feel for what&amp;rsquo;s going on. I understand this doesn&amp;rsquo;t exactly recreate a modem experience with details like compression, latency, and someone picking up the phone during a download. There was nothing worse than having that 1 megabyte download at 95% when someone decided they needed to make a phone call. Call waiting was also a terrible plague.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Why do we do security?</title>
      <link>https://opensourcesecurity.io/2016/09/18/why-do-we-do-security/</link>
      <pubDate>Sun, 18 Sep 2016 20:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/09/18/why-do-we-do-security/</guid> 
      <description>&lt;p&gt;I had a discussion last week that ended with this question. &amp;ldquo;Why do we do security&amp;rdquo;. There wasn&amp;rsquo;t a great answer to this question. I guess I sort of knew this already, but it seems like something too obvious to not have an answer. Even as I think about it I can&amp;rsquo;t come up with a simple answer. It&amp;rsquo;s probably part of the problems you see in infosec.&lt;/p&gt;
&lt;p&gt;The purpose of security isn&amp;rsquo;t just to be &amp;ldquo;secure&amp;rdquo;, it&amp;rsquo;s to manage risk in some meaningful way. In the real world this is usually pretty easy for us to understand. You have physical things, you want to keep them from getting broken, stolen, lost, pick something. It usually makes some sort of sense.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 3 - The Lockpicking Sewing Circle</title>
      <link>https://opensourcesecurity.io/2016/09/13/episode-3-the-lockpicking-sewing-circle/</link>
      <pubDate>Tue, 13 Sep 2016 19:55:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-3-lockpicking-sewing-circle.html</guid> 
      <description>&lt;p&gt;Josh and Kurt discuss news of the day, banks, 3D printing, and lockpicking.&lt;/p&gt;
&lt;h3 id=&#34;hahahugoshortcode328s0hbhb&#34;&gt;
&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/282763713-opensourcesecuritypodcast-episode-3-the-lockpicking-sewing-circle.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/282763713-opensourcesecuritypodcast-episode-3-the-lockpicking-sewing-circle.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/282763713-opensourcesecuritypodcast-episode-3-the-lockpicking-sewing-circle.mp3&lt;/a&gt;
&lt;/audio&gt;
&lt;/h3&gt;
&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://www.pcworld.com/article/3118717/security/thousands-of-seagate-nas-boxes-host-cryptocurrency-mining-malware.html&#34;&gt;Segate NAS mining bitcoin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://en.blog.nic.cz/2016/09/01/telnet-is-not-dead-at-least-not-on-smart-devices/&#34;&gt;Telnet honeypot activity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.sony.co.uk/support/en/content/cnt-hn/prd-tvhc/YouTube-service-for-2012-TVs&#34;&gt;Bravia TVs losing Youtube&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.bbc.com/news/technology-37305200&#34;&gt;10 Million Raspberry Pis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.leakedsource.com/i/lastfmlong.txt&#34;&gt;last.fm passwords&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.csoonline.com/article/3117308/techology-business/security-solved-company-says-their-tech-renders-servers-hack-proof.html&#34;&gt;Hack Proof Systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.hammacher.com/Product/87427?cm_cat=ProductSEM&amp;amp;cm_pla=AdWordsPLA&amp;amp;source=PRODSEM&amp;amp;gclid=CLTjgfWNjc8CFQMcaQodqgMFUA&#34;&gt;3D printing pen&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.lulzbot.com/&#34;&gt;LulzBot&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>On Experts</title>
      <link>https://opensourcesecurity.io/2016/09/12/on-experts/</link>
      <pubDate>Mon, 12 Sep 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/09/12/on-experts/</guid> 
      <description>&lt;p&gt;Are you an expert? Do you know an expert? Do you want to be an expert?&lt;/p&gt;
&lt;p&gt;This came up for me the other day while having a discussion with a self proclaimed expert. I&amp;rsquo;m not going to claim I&amp;rsquo;m an expert at anything, but if you tell me all about how good you are, I&amp;rsquo;m not going to take it at face value. I&amp;rsquo;m going to demand some proof. &amp;ldquo;Trust me&amp;rdquo; isn&amp;rsquo;t proof.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 2 - Instills the proper amount of fear</title>
      <link>https://opensourcesecurity.io/2016/09/07/episode-2-instills-the-proper-amount-of-fear/</link>
      <pubDate>Wed, 07 Sep 2016 00:28:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-2-instills-proper-amount-of-fear.html</guid> 
      <description>&lt;p&gt;Josh and Kurt discuss how open source security works.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281731016-opensourcesecuritypodcast-episode-2-instills-the-proper-amount-of-fear.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281731016-opensourcesecuritypodcast-episode-2-instills-the-proper-amount-of-fear.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281731016-opensourcesecuritypodcast-episode-2-instills-the-proper-amount-of-fear.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://www.coreinfrastructure.org/programs/badge-program&#34;&gt;CII Badges&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/&#34;&gt;CVE&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://nodesecurity.io/&#34;&gt;Node Security Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://www.csoonline.com/article/3113043/security/myth-versus-fact-open-source-projects-and-federal-agencies.html&#34;&gt;CSO open source story&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Episode 1 - Rich History of Security Flaws</title>
      <link>https://opensourcesecurity.io/2016/09/07/episode-1-rich-history-of-security-flaws/</link>
      <pubDate>Wed, 07 Sep 2016 00:24:00 +0000</pubDate>
       <guid isPermaLink="false">https://www.opensourcesecuritypodcast.com/2016/09/episode-1-rich-history-of-security-flaws.html</guid> 
      <description>&lt;p&gt;Josh and Kurt discuss their first podcast as well as random bits about open source security.&lt;/p&gt;

&lt;audio controls preload=&#34;metadata&#34;&gt;
  &lt;source src=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281712199-opensourcesecuritypodcast-episode-1-rich-history-of-security-flaws.mp3&#34; type=&#34;audio/mp3&#34;&gt;
    &lt;a href=&#34;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281712199-opensourcesecuritypodcast-episode-1-rich-history-of-security-flaws.mp3&#34;&gt;https://traffic.libsyn.com/secure/opensourcesecuritypodcast/281712199-opensourcesecuritypodcast-episode-1-rich-history-of-security-flaws.mp3&lt;/a&gt;
&lt;/audio&gt;

&lt;h3 id=&#34;show-notes&#34;&gt;Show Notes&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Gordon-Loeb_Model&#34;&gt;Gordon-Loeb Model for investing 37% the cost of a breach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecurity.io/wp-content/uploads/2018/08/open.jpg&#34;&gt;Dunning-Kruger&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/dotMudge/status/769588040884817920&#34;&gt;Mudge Mercedes tweet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.reference.com/health/fear-elevators-called-26027e2389104c29&#34;&gt;Fear of elevators&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&#34;https://twitter.com/home?status=@joshbressers%20@kurtseifried&#34;&gt;Comment on Twitter&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>You can&#39;t weigh risk if you don&#39;t know what you don&#39;t know</title>
      <link>https://opensourcesecurity.io/2016/09/06/you-cant-weigh-risk-if-you-dont-know-what-you-dont-know/</link>
      <pubDate>Tue, 06 Sep 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/09/06/you-cant-weigh-risk-if-you-dont-know-what-you-dont-know/</guid> 
      <description>&lt;p&gt;There is an old saying we&amp;rsquo;ve all heard at some point. It&amp;rsquo;s often attributed to Donald Rumsfeld.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;There are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns &amp;ndash; the ones we don&amp;rsquo;t know we don&amp;rsquo;t know&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;If any of us have ever been in a planning meeting, a variant of this has no doubt come up at some point. It came up for me last week, and every time I hear it I think about all things we don&amp;rsquo;t know we don&amp;rsquo;t know. If you&amp;rsquo;re not familiar with the concept, it works a bit like this. I know I don&amp;rsquo;t know to drive a boat. But because I know I don&amp;rsquo;t know this, I could learn. If you know you lack certain knowledge, you could find a way to learn it. If you don&amp;rsquo;t know what you don&amp;rsquo;t know, there is nothing you can do about it. The future is often an unknown unknown. There is nothing we can do about the future in many instances, you just have to wait until it becomes a known, and hope it won&amp;rsquo;t be anything too horrible. There can also be blindness when you think you know something, but you really don&amp;rsquo;t. This is when people tend to stop listening to the actual experts because they think they are an expert.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How do we explain email to an &amp;quot;expert&amp;quot;?</title>
      <link>https://opensourcesecurity.io/2016/08/29/how-do-we-explain-email-to-an-expert/</link>
      <pubDate>Mon, 29 Aug 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/08/29/how-do-we-explain-email-to-an-expert/</guid> 
      <description>&lt;p&gt;This has been a pretty wild week, more wild than usual I think we can all agree. The topic I found the most interesting wasn&amp;rsquo;t about one of the countless 0day flaws, it was a story from Slate titled: &lt;a href=&#34;http://www.slate.com/articles/technology/future_tense/2016/08/if_you_aren_t_hilary_clinton_a_private_email_server_is_a_good_idea.html&#34;&gt;In Praise of the Private Email Server&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The TL;DR says running your own email server is a great idea. Almost everyone came out proclaiming it a terrible idea. I agree it&amp;rsquo;s a terrible idea, but this also got me thinking. How do you explain this to someone who doesn&amp;rsquo;t really understand what&amp;rsquo;s going on?&lt;/p&gt;</description>
    </item>
    <item>
      <title>The cost of mentoring, or why we need heroes</title>
      <link>https://opensourcesecurity.io/2016/08/21/the-cost-of-mentoring-or-why-we-need-heroes/</link>
      <pubDate>Sun, 21 Aug 2016 23:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/08/21/the-cost-of-mentoring-or-why-we-need-heroes/</guid> 
      <description>&lt;p&gt;Earlier this week I had a chat with &lt;a href=&#34;http://www.dwheeler.com/&#34;&gt;David A. Wheeler&lt;/a&gt; about mentoring. The conversation was fascinating and covered many things, but the topic of mentoring really got me thinking. David pointed out that nobody will mentor if they&amp;rsquo;re not getting paid. My first thought was that it can&amp;rsquo;t be true! But upon reflection, I&amp;rsquo;m pretty sure it is.&lt;/p&gt;
&lt;p&gt;I can&amp;rsquo;t think of anyone I mentored where a paycheck wasn&amp;rsquo;t involved. There are people in the community I&amp;rsquo;ve given advice to, sometimes for an extended period of time, but I would hesitate to claim I was a mentor. Now I think just equating this to a paycheck would be incorrect and inaccurate. There are plenty of mentors in other organizations that aren&amp;rsquo;t necessarily getting a paycheck, but I would say they&amp;rsquo;re getting paid in some sense of the word. If you&amp;rsquo;re working with at risk youth for example, you may not get paid money, but you do have satisfaction in knowing you&amp;rsquo;re making a difference in someone&amp;rsquo;s life. If you mentor kids as part of a sports team, you&amp;rsquo;re doing it because you&amp;rsquo;re getting value out of the relationship. If you&amp;rsquo;re not getting value, you&amp;rsquo;re going to quit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Can&#39;t Trust This!</title>
      <link>https://opensourcesecurity.io/2016/08/15/cant-trust-this/</link>
      <pubDate>Mon, 15 Aug 2016 14:20:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/08/15/cant-trust-this/</guid> 
      <description>&lt;p&gt;Last week saw a really interesting bug in TCP come to light. &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696&#34;&gt;CVE-2016-5696&lt;/a&gt; describes an issue in the way Linux deals with challenge ACKs defined in RFC 5961. The issue itself is really clever and interesting. It&amp;rsquo;s not exactly new but given the research was presented at USENIX, it suddenly got more attention from the press.&lt;/p&gt;
&lt;p&gt;The researchers showed themselves injecting data into a standard http connection, which is easy to understand and terrifying to most people. Generally speaking we operate in a world where TCP connections are mostly trustworthy. It&amp;rsquo;s not true if you have a &amp;ldquo;man in the middle&amp;rdquo;, but with this bug you don&amp;rsquo;t need a MiTM if you&amp;rsquo;re using a public network, which is horrifying.&lt;/p&gt;</description>
    </item>
    <item>
      <title>We&#39;re figuring out the security problem (finally)</title>
      <link>https://opensourcesecurity.io/2016/08/08/were-figuring-out-the-security-problem-finally/</link>
      <pubDate>Mon, 08 Aug 2016 13:17:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/08/08/were-figuring-out-the-security-problem-finally/</guid> 
      <description>&lt;p&gt;If you attended Black Hat last week, the single biggest message I kept hearing over and over again is that what we do today in the security industry isn&amp;rsquo;t working. They say the first step is admitting you have a problem (and we have a big one). Of course it&amp;rsquo;s easy to proclaim this, if you just look at the numbers it&amp;rsquo;s pretty clear. The numbers haven&amp;rsquo;t really ever been in our favor though, we&amp;rsquo;ve mostly ignored them in the past, I think we&amp;rsquo;re taking real looks at them now.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Everyone has been hacked</title>
      <link>https://opensourcesecurity.io/2016/08/01/everyone-has-been-hacked/</link>
      <pubDate>Mon, 01 Aug 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/08/01/everyone-has-been-hacked/</guid> 
      <description>&lt;p&gt;Unless you live in a cave (if you do, I&amp;rsquo;m pretty jealous) you&amp;rsquo;ve heard about all the political hacking going on. I don&amp;rsquo;t like to take sides, so let&amp;rsquo;s put aside who is right or wrong and use it as a lesson in thinking about how we have to operate in what is the new world.&lt;/p&gt;
&lt;p&gt;In the past, there were ways to communicate that one could be relatively certain was secure and/or private. Long ago you didn&amp;rsquo;t write everything down. There was a lot of verbal communication. When things were written down there was generally only one copy. Making copies of things was hard. Recording communications was hard. Even viewing or hearing many of these conversations if you weren&amp;rsquo;t supposed to was hard. None of this is true anymore, it hasn&amp;rsquo;t been true for a long time, yet we still act like what we do is just fine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using a HooToo Nano as a magic VPN box</title>
      <link>https://opensourcesecurity.io/2016/07/18/using-a-hootoo-nano-as-a-magic-vpn-box/</link>
      <pubDate>Mon, 18 Jul 2016 14:56:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/07/18/using-a-hootoo-nano-as-a-magic-vpn-box/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve been getting myself ready for Blackhat. If you&amp;rsquo;re going you know this conference isn&amp;rsquo;t like most. You don&amp;rsquo;t bring your normal gear with you. You turn the tinfoil hat knob up to an 11, then keep turning it until it breaks off. I did do one thing that&amp;rsquo;s pretty clever this year though, I have no doubt it could be useful for someone else putting together an overengineered tin foil hat security rig.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Entry level AI</title>
      <link>https://opensourcesecurity.io/2016/07/11/entry-level-ai/</link>
      <pubDate>Mon, 11 Jul 2016 13:57:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/07/11/entry-level-ai/</guid> 
      <description>&lt;p&gt;I was listening to the podcast &lt;a href=&#34;http://securityweekly.com/&#34;&gt;Security Weekly&lt;/a&gt; and the topic of using AI For security work came up. This got me thinking about how most people make their way into security and what something like AI might mean for the industry.&lt;/p&gt;
&lt;p&gt;In virtually every industry you start out doing some sort of horrible job nobody else wants to do, but you have to start there because it&amp;rsquo;s the place you start to learn the skills you need for more exciting and interesting work. Nobody &lt;strong&gt;wants&lt;/strong&gt; to go over yesterday&amp;rsquo;s security event log, but somebody does it.&lt;/p&gt;</description>
    </item>
    <item>
      <title>But I have work to do!</title>
      <link>https://opensourcesecurity.io/2016/07/05/but-i-have-work-to-do/</link>
      <pubDate>Tue, 05 Jul 2016 12:21:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/07/05/but-i-have-work-to-do/</guid> 
      <description>&lt;p&gt;There’s a news &lt;a href=&#34;http://www.campussafetymagazine.com/article/study_computer_security_measures_often_ignored_in_hospitals&#34;&gt;story&lt;/a&gt; going around that talks about how horrible computer security tends to be in hospitals. This probably doesn’t surprise anyone who works in the security industry, security is often something that gets in the way, it’s not something that helps get work done.&lt;/p&gt;
&lt;p&gt;There are two really important lessons we should take away from this. The first is that a doctor or nurse isn’t a security expert, doesn’t want to be a security expert, and shouldn’t be a security expert. Their job is helping sick people. We want them helping sick people, especially if we’re the people who are sick. The second is that when security gets in the way, security loses. Security should lose when it gets in the way, we’ve been winning far too often and it’s critically damaged the industry.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The future of security</title>
      <link>https://opensourcesecurity.io/2016/06/27/the-future-of-security/</link>
      <pubDate>Mon, 27 Jun 2016 15:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/06/27/the-future-of-security/</guid> 
      <description>&lt;p&gt;The Red Hat Summit is happening this week in San Francisco. It&amp;rsquo;s a big deal if you&amp;rsquo;re part of the Red Hat universe, which I am. I&amp;rsquo;m giving the Red Hat security roadmap talk this year. The topic has me thinking about the future of security quite a lot. It&amp;rsquo;s easy to think about this in the context of an organization like Red Hat, we have a lot of resources, and there are a lot of really interesting things happening. Everything from container security, to operating system security, to middleware security. My talk will end up youtube at some point, I&amp;rsquo;ll link to it, but I also keep thinking about the bigger picture. Where will security be in the next 5, 10, 15 years?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Decentralized Security</title>
      <link>https://opensourcesecurity.io/2016/06/20/decentralized-security/</link>
      <pubDate>Mon, 20 Jun 2016 13:35:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/06/20/decentralized-security/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;re a fan of the cryptocurrency projects, you&amp;rsquo;ve heard of something called &lt;a href=&#34;https://www.ethereum.org/&#34;&gt;Ethereum&lt;/a&gt;. It&amp;rsquo;s similar to bitcoin, but is a seperate coin. It&amp;rsquo;s been in the news lately due to an &lt;a href=&#34;http://www.nytimes.com/2016/06/18/business/dealbook/hacker-may-have-removed-more-than-50-million-from-experimental-cybercurrency-project.html?_r=0&#34;&gt;attack&lt;/a&gt; on the currency. Nobody is sure how this story will end at this point, there are a few possible options, none are good. This got me thinking about the future of security, there are some parallels when you compare traditional currency to crypto currency as well as where we see security heading (stick with me here).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ready to form Voltron! why security is like a giant robot make of lions</title>
      <link>https://opensourcesecurity.io/2016/06/13/ready-to-form-voltron-why-security-is-like-a-giant-robot-make-of-lions/</link>
      <pubDate>Mon, 13 Jun 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/06/13/ready-to-form-voltron-why-security-is-like-a-giant-robot-make-of-lions/</guid> 
      <description>&lt;p&gt;Due to various conversations about security this week, Voltron came up in the context of security. This is sort of a strange topic, but it makes sense when we ponder modern day security. If you talk to anyone, there is generally one thing they push as a solution for a problem. This is no different for security technologies. There is always one thing that will fix your problems. In reality this is never the case. Good security is about putting a number of technologies together to create something bigger and better than any one thing can do by itself.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is there a future view that isn&#39;t a security dystopia?</title>
      <link>https://opensourcesecurity.io/2016/06/06/is-there-a-future-view-that-isnt-a-security-dystopia/</link>
      <pubDate>Mon, 06 Jun 2016 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/06/06/is-there-a-future-view-that-isnt-a-security-dystopia/</guid> 
      <description>&lt;p&gt;I recently finished reading the book &lt;a href=&#34;https://www.goodreads.com/book/show/22749719-ghost-fleet&#34;&gt;Ghost Fleet&lt;/a&gt;, it&amp;rsquo;s not a bad read if you&amp;rsquo;re into what cyberwar could look like. It&amp;rsquo;s not great though, I won&amp;rsquo;t suggest it as the book of the summer. The biggest thing I keep thinking about is I&amp;rsquo;ve yet to really see any sort of book that takes place in the future, with a focus on technology, that isn&amp;rsquo;t a dystopian warning. &lt;em&gt;Ghost Fleet&lt;/em&gt; is no different.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Regulation can fix security, except you can&#39;t regulate security</title>
      <link>https://opensourcesecurity.io/2016/05/29/regulation-can-fix-security-except-you-cant-regulate-security/</link>
      <pubDate>Sun, 29 May 2016 23:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/05/29/regulation-can-fix-security-except-you-cant-regulate-security/</guid> 
      <description>&lt;p&gt;Every time I start a discussion about how we can solve some of our security problems it seems like the topics of professional organizations and regulation are where things end up. I think regulations and professional organizations can fix a lot of problems in an industry, I&amp;rsquo;m not sure they work for security. First let&amp;rsquo;s talk about why regulation usually works, then, why it won&amp;rsquo;t work for security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is regulation?&lt;/strong&gt;&lt;br&gt;
You may not know it, but you deal with regulated industries every day. The food we eat, the cars we drive, the buildings we use, the roads, our water, products we buy, phones, internet, banks; there are literally too many to list. The reasons for the regulation vary greatly, but at the end of the day it&amp;rsquo;s a nice way to use laws to protect society. It doesn&amp;rsquo;t always directly protect people, sometimes it protects the government, or maybe even a giant corporation, but the basic idea is because of the regulation society is a better place. There are plenty of corner cases but for now let&amp;rsquo;s just assume the goal is to make the world a better place.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thoughts on our security bubble</title>
      <link>https://opensourcesecurity.io/2016/05/23/thoughts-on-our-security-bubble/</link>
      <pubDate>Mon, 23 May 2016 00:23:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/05/23/thoughts-on-our-security-bubble/</guid> 
      <description>&lt;p&gt;Last week I spent time with a lot of normal people. Well, they were all computer folks, but not the sort one would find in a typical security circle. It really got me thinking about the bubble we live in as the security people.&lt;/p&gt;
&lt;p&gt;There are a lot of things we take for granted. I can reference Dunning Kruger and &amp;ldquo;turtles all the way down&amp;rdquo; and not have to explain myself. If I talk about a buffer overflow, or most any security term I never have to explain what&amp;rsquo;s going on. Even some of the more obscure technologies like container scanners and SCAP don&amp;rsquo;t need but a few words to explain what happens. It&amp;rsquo;s easy to talk to security people, at least it&amp;rsquo;s easy for security people to talk to other security people.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security will fix itself, eventually</title>
      <link>https://opensourcesecurity.io/2016/05/15/security-will-fix-itself-eventually/</link>
      <pubDate>Sun, 15 May 2016 23:06:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/05/15/security-will-fix-itself-eventually/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;re in the security industry these days things often don&amp;rsquo;t look very good. Everywhere you look it sometimes feels like everything is on fire. The joke is there are two types of companies, those that know they&amp;rsquo;ve been hacked and those that don&amp;rsquo;t. The world of devices looks even worse. They&amp;rsquo;re all running old software, most will never see updates, most of the people building the things don&amp;rsquo;t know or care about proper security, most people buying them don&amp;rsquo;t know this is a problem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security isn&#39;t a feature, it&#39;s a part of everything</title>
      <link>https://opensourcesecurity.io/2016/05/08/security-isnt-a-feature-its-a-part-of-everything/</link>
      <pubDate>Sun, 08 May 2016 23:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/05/08/security-isnt-a-feature-its-a-part-of-everything/</guid> 
      <description>&lt;p&gt;Almost every industry goes through a time when new novel features are sold as some sort of add on or extra product. Remember needing a TCP stack? What about having to buy a sound card for your computer, or a CD drive? (Does anyone even know what a CD is anymore?) Did you know that web browsers used to cost money? Times were crazy.&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s think about security now. There is a lot of security that&amp;rsquo;s some sort of add on, or maybe a separate product. Some of this is because it&amp;rsquo;s a clever idea, some things exist because people are willing to pay for it even if it should be included. No matter what we&amp;rsquo;re talking about, there is always a march toward commoditization. This is how Linux took over the universe, the operating system is a commodity now, it&amp;rsquo;s all about how you put things together using things like containers and devops and cloud.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trusting, Trusting Trust</title>
      <link>https://opensourcesecurity.io/2016/05/01/trusting-trusting-trust/</link>
      <pubDate>Sun, 01 May 2016 23:04:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/05/01/trusting-trusting-trust/</guid> 
      <description>&lt;p&gt;A long time ago Ken Thompson wrote something called &lt;a href=&#34;https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf&#34;&gt;Reflections on Trusting Trust&lt;/a&gt;. If you&amp;rsquo;ve never read this, go read it right now. It&amp;rsquo;s short and it&amp;rsquo;s something everyone needs to understand. The paper basically explains how Ken backdoored the compiler on a UNIX system in such a way it was extremely hard to get rid of the backdoors (yes, more than one). His conclusion was you can only trust code you wrote. Given the nature of the world today, that&amp;rsquo;s no longer an option.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Can we train our way out of security flaws?</title>
      <link>https://opensourcesecurity.io/2016/04/24/can-we-train-our-way-out-of-security-flaws/</link>
      <pubDate>Sun, 24 Apr 2016 23:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/04/24/can-we-train-our-way-out-of-security-flaws/</guid> 
      <description>&lt;p&gt;I had a discussion with some people I work with smarter than myself about training developers. The usual training suggests came up, but at the end of the day, and this will no doubt enrage some of you, we can&amp;rsquo;t train developers to write secure code.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s OK, my twitter handle is &lt;a href=&#34;https://twitter.com/joshbressers&#34;&gt;@joshbressers&lt;/a&gt;, go tell me how dumb I am, I can handle it.&lt;/p&gt;
&lt;p&gt;So anyhow, training. It&amp;rsquo;s a great idea in theory. It works in many instances, but security isn&amp;rsquo;t one of them. If you look at where training is really successful it&amp;rsquo;s for things like how to use a new device, or how to work with a bit of software. Those are really single purpose items, that&amp;rsquo;s the trick. If you have a device that really only does one thing, you can train a person how to use it; it has a finite scope. Writing software has no scope. To quote myself from this discussion:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Software end of life matters!</title>
      <link>https://opensourcesecurity.io/2016/04/17/software-end-of-life-matters/</link>
      <pubDate>Sun, 17 Apr 2016 20:33:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/04/17/software-end-of-life-matters/</guid> 
      <description>&lt;p&gt;Anytime you work on a software project, the big events are always new releases. We love to get our update and see what sort of new and exciting things have been added. New versions are exciting, they&amp;rsquo;re the result of months or years of hard work. Who doesn&amp;rsquo;t love to talk about the new cool things going on?&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s a side of software that rarely gets talked about though, and honestly in the past it just wasn&amp;rsquo;t all that important or exciting. That&amp;rsquo;s the end of life. When is it time to kill off the old versions. Or sometimes even kill an entire project. When you do, what happens to the people using it? These are hard things to decide, there aren&amp;rsquo;t good answers usually, it&amp;rsquo;s just not a topic we&amp;rsquo;re good at yet.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What happened with Badlock?</title>
      <link>https://opensourcesecurity.io/2016/04/12/what-happened-with-badlock/</link>
      <pubDate>Tue, 12 Apr 2016 22:07:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/04/12/what-happened-with-badlock/</guid> 
      <description>&lt;p&gt;Unless you live under a rock, you&amp;rsquo;ve heard of the Badlock security issue. It went public on April 12. Then things got weird.&lt;/p&gt;
&lt;p&gt;I wrote about this a bit in a &lt;a href=&#34;http://sobersecurity.blogspot.com/2016/03/im-going-to-do-something-really-cool-in.html&#34;&gt;previous post.&lt;/a&gt; I mentioned there that this better be good. If it&amp;rsquo;s not, people will get grumpy. People got grumpy.&lt;/p&gt;
&lt;p&gt;The thing is, this is a nice security flaw. Whoever found it is clearly bright, and if you look at the Samba patchset, it wasn&amp;rsquo;t trivial to fix. Hats off to those two groups.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Cybersecurity education isn&#39;t good, nobody is shocked</title>
      <link>https://opensourcesecurity.io/2016/04/10/cybersecurity-education-isnt-good-nobody-is-shocked/</link>
      <pubDate>Sun, 10 Apr 2016 20:24:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/04/10/cybersecurity-education-isnt-good-nobody-is-shocked/</guid> 
      <description>&lt;p&gt;There was a news story published last week about the &lt;a href=&#34;http://www.darkreading.com/vulnerabilities---threats/top-us-undergraduate-computer-science-programs-skip-cybersecurity-classes/d/d-id/1325024?&#34;&gt;almost total lack of cybersecurity attention in undergraduate education&lt;/a&gt;. Most people in the security industry won&amp;rsquo;t be surprised by this. In the majority of cases when the security folks have to talk to developers, there is a clear lack of understanding about security.&lt;/p&gt;
&lt;p&gt;Every now and then I run across someone claiming that our training and education is going great. Sometimes I believe them for a few seconds, then I remember the state of things. Here&amp;rsquo;s the thing. While there is a lot of good training and education opportunities. The ratio between competent security people and developers is without doubt going down. Software engineering positions are growing at more than double the rate of other positions. By definition it&amp;rsquo;s significantly harder to educate a security person, the math says there&amp;rsquo;s a problem here (this disregards the fact that as an industry we do a horrible job of passing on knowledge).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security is really about Risk vs Reward</title>
      <link>https://opensourcesecurity.io/2016/04/03/security-is-really-about-risk-vs-reward/</link>
      <pubDate>Sun, 03 Apr 2016 21:16:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/2016/04/03/security-is-really-about-risk-vs-reward/</guid> 
      <description>&lt;p&gt;Every now and then the conversation erupts about what is security really? There&amp;rsquo;s the old saying that the only secure computer is one that&amp;rsquo;s off (or fill in your favorite quote here, there are hundreds). But the thing is, security isn&amp;rsquo;t the binary concept: you can be secure, or insecure. That&amp;rsquo;s not how anything works. Everything is a sliding scale, you are never secure, you are never insecure. You&amp;rsquo;re somewhere in the middle. Rather than bumble around about your risk though, you need to understand what&amp;rsquo;s going on and plan for the risk.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ransomware is scary, but not for the reasons you think it is</title>
      <link>https://opensourcesecurity.io/2016/03/29/ransomware-is-scary-but-not-for-the-reasons-you-think-it-is/</link>
      <pubDate>Tue, 29 Mar 2016 12:29:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/03/29/ransomware-is-scary-but-not-for-the-reasons-you-think-it-is/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;ve been paying any attention for the past few weeks, you know what ransomware is. It&amp;rsquo;s a pretty massive pain for anyone who gets it, and in some cases, it was a matter of life and death.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s easy to understand what makes this stuff scary, but there&amp;rsquo;s another angle most haven&amp;rsquo;t caught on to yet, and it&amp;rsquo;s not a pleasant train of thought.&lt;/p&gt;
&lt;p&gt;Firstly, let&amp;rsquo;s consider a few thing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>I&#39;m going to do something really cool in 3 weeks! ... Probably.</title>
      <link>https://opensourcesecurity.io/2016/03/23/im-going-to-do-something-really-cool-in-3-weeks-probably/</link>
      <pubDate>Wed, 23 Mar 2016 22:38:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/03/23/im-going-to-do-something-really-cool-in-3-weeks-probably/</guid> 
      <description>&lt;p&gt;If you pay attention to the security news, there is something coming called Badlock. It just set off a treasure hunt for security flaws in Samba. Rather than link to the web site (I&amp;rsquo;d rather not support this sort of behavior), let&amp;rsquo;s think about this as reasonable people.&lt;/p&gt;
&lt;p&gt;I can imagine three possible outcomes to the events that have been set in motion.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;On April 12 a truly impressive security flaw will be disclosed. We will all be impressed.&lt;/li&gt;
&lt;li&gt;Someone will figure this out before April 12, they have no incentive to act responsibly and will publish what the know right away, better to be first than to be right!&lt;/li&gt;
&lt;li&gt;Whatever happens on April 12 won&amp;rsquo;t be nearly as interesting or exciting as we&amp;rsquo;ve been led to believe. The world will say a collective &amp;lsquo;meh&amp;rsquo; and we&amp;rsquo;ll go back to looking at pictures of cats.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Numbers 1 and 2 rely on the flaw being quite serious. If it is serious, I suspect there is a far greater chance of #2 happening than #1. As an industry we should hope for #3, we don&amp;rsquo;t need more terrible flaws.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Everything is fine, nothing to see here!</title>
      <link>https://opensourcesecurity.io/2016/03/20/everything-is-fine-nothing-to-see-here/</link>
      <pubDate>Sun, 20 Mar 2016 22:26:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/03/20/everything-is-fine-nothing-to-see-here/</guid> 
      <description>&lt;p&gt;As anyone who reads this blog knows, I&amp;rsquo;ve been talking about soft skills in security for quite some time now. I&amp;rsquo;m willing to say it&amp;rsquo;s one of our biggest issues at the moment, a point which I get a lot of disagreement on. I have sympathy for anyone who thinks this stuff doesn&amp;rsquo;t matter, I used to be there. Until I had to start talking to people. As soon as you talk to most anyone outside the security echo chamber, you see what&amp;rsquo;s actually going on, and it&amp;rsquo;s not great.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Containers are like sandwiches</title>
      <link>https://opensourcesecurity.io/2016/03/13/containers-are-like-sandwiches/</link>
      <pubDate>Sun, 13 Mar 2016 22:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/03/13/containers-are-like-sandwiches/</guid> 
      <description>&lt;p&gt;During the RSA conference, I was talking about containers and it occurred to me we can think about them like a sandwich. Not so much that they&amp;rsquo;re tasty, but rather where does your container come from. I was pleased that almost all of the security people I spoke with understand the current security nightmare containers are. The challenge of course is how do we explain what&amp;rsquo;s going on to everyone else. Securtiy is hard and we&amp;rsquo;re bad at talking about it. They also didn&amp;rsquo;t know what Red Hat was doing, which is totally our own fault, but we&amp;rsquo;ll talk about that somewhere else.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The interesting things from RSA are what didn&#39;t happen, and containers are sandwiches</title>
      <link>https://opensourcesecurity.io/2016/03/07/the-interesting-things-from-rsa-are-what-didnt-happen-and-containers-are-sandwiches/</link>
      <pubDate>Mon, 07 Mar 2016 01:09:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/03/07/the-interesting-things-from-rsa-are-what-didnt-happen-and-containers-are-sandwiches/</guid> 
      <description>&lt;p&gt;The RSA conference is done. It was a very long and busy show, there were plenty of interesting people there and lots of clever ideas and things to do.&lt;/p&gt;
&lt;p&gt;I think the best part is what didn&amp;rsquo;t happen though. We love talking about the exciting things from the show, I&amp;rsquo;m going to talk about the unexciting non events I was waiting to happen (but thankfully they did not).&lt;/p&gt;
&lt;p&gt;The DROWN issue came and went. It wasn&amp;rsquo;t very exciting, it got the appropriate amount of attention. Basically SSLv2 is still broken, don&amp;rsquo;t use it for any reasons. If you use SSLv2, it&amp;rsquo;s like licking the handrail at the airport. Nobody is going to feel bad for you.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Let&#39;s talk about soft skills at RSA, plus some other things</title>
      <link>https://opensourcesecurity.io/2016/02/29/lets-talk-about-soft-skills-at-rsa-plus-some-other-things/</link>
      <pubDate>Mon, 29 Feb 2016 02:10:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/02/29/lets-talk-about-soft-skills-at-rsa-plus-some-other-things/</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s been no secret that I think the lack of soft skills in the security space is one of our biggest problems. While usually I usually only write all about the world&amp;rsquo;s problems and how to fix them here, during RSA I&amp;rsquo;m going to take a somewhat different approach.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m giving a talk on Friday titled &lt;a href=&#34;https://www.rsaconference.com/events/us16/agenda/sessions/2780/why-wont-anyone-listen-to-us&#34;&gt;Why Won&amp;rsquo;t Anyone Listen to Us?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m going to talk about how a security person can talk to a normal person without turning them against us. We&amp;rsquo;re a group that doesn&amp;rsquo;t like talking to anyone, even each other. We need to start talking to people. I&amp;rsquo;m not saying we should stand around and accept abuse, I am saying the world wants help with security. We&amp;rsquo;re not really in a place to give it because we don&amp;rsquo;t like people. But they need our help, most of them know it even!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thinking about glibc and Heartbleed, how do fix things</title>
      <link>https://opensourcesecurity.io/2016/02/23/thinking-about-glibc-and-heartbleed-how-do-fix-things/</link>
      <pubDate>Tue, 23 Feb 2016 13:14:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/02/23/thinking-about-glibc-and-heartbleed-how-do-fix-things/</guid> 
      <description>&lt;p&gt;After my last blog post &lt;a href=&#34;http://sobersecurity.blogspot.com/2016/02/change-direction-increase-speed-or-why.html&#34;&gt;Change direction, increase speed! (or why glibc changes nothing)&lt;/a&gt; it really got me thinking about how can we start to fix some of this. The sad conclusion is that nothing can be fixed in the short term. Rather than trying to make up some nonsense about how to fix this, I want to explain what&amp;rsquo;s happening and why this can&amp;rsquo;t be fixed anytime soon.&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s look at Heartbleed first.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Change direction, increase speed! (or why glibc changes nothing)</title>
      <link>https://opensourcesecurity.io/2016/02/21/change-direction-increase-speed-or-why-glibc-changes-nothing/</link>
      <pubDate>Sun, 21 Feb 2016 22:49:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/02/21/change-direction-increase-speed-or-why-glibc-changes-nothing/</guid> 
      <description>&lt;p&gt;The glibc issue has had me thinking. What will we learn from this?&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m pretty sure the answer is &amp;ldquo;nothing&amp;rdquo;, which then made me wonder why this is.&lt;/p&gt;
&lt;p&gt;The conclusion I came up with is we are basically the aliens from space invaders. &lt;em&gt;&lt;strong&gt;Change direction, increase speed!&lt;/strong&gt;&lt;/em&gt; While this can give the appearance of doing something, we are all very busy all the time. It&amp;rsquo;s not super useful when you really think about it. Look at Shellshock, Heartbleed, GHOST, LOGJAM, Venom, pick an issue with a fancy name. After the flurry of news stories and interviews, did anything change, or did everyone just go back to business as usual? Business as usual pretty much.&lt;/p&gt;</description>
    </item>
    <item>
      <title>glibc for humans</title>
      <link>https://opensourcesecurity.io/2016/02/19/glibc-for-humans/</link>
      <pubDate>Fri, 19 Feb 2016 01:36:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/02/19/glibc-for-humans/</guid> 
      <description>&lt;p&gt;Unless you&amp;rsquo;ve been living under a rock, you&amp;rsquo;ve heard about the latest glibc issue.&lt;br&gt;
&lt;a href=&#34;https://access.redhat.com/articles/2161461&#34;&gt;CVE-2015-7547&lt;/a&gt; - glibc stack-based buffer overflow in getaddrinfo()&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s always hard to understand some of these issues, so I&amp;rsquo;m going to do my best to explain it using simple language. Making security easy to understand is something I&amp;rsquo;ve been talking about for a long time now, it&amp;rsquo;s time to do something about it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt;&lt;br&gt;
The fundamental problem here is that glibc has a bug that could allow a DNS response from an attacker to run the command of that attacker&amp;rsquo;s choosing on your system. The final goal of course would be to become the root user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Does the market care about security?</title>
      <link>https://opensourcesecurity.io/2016/01/31/does-the-market-care-about-security/</link>
      <pubDate>Sun, 31 Jan 2016 23:22:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/01/31/does-the-market-care-about-security/</guid> 
      <description>&lt;p&gt;I had some discussions this week about security and the market. When I say the market I speak of what sort of products will people or won&amp;rsquo;t people buy based on some requirements centered around security. This usually ends up at a discussion about regulation. That got me wondering if there are any industries that are unregulated, have high safety requirements, and aren&amp;rsquo;t completely unsafe?&lt;/p&gt;
&lt;p&gt;After a little research, it seems &lt;a href=&#34;https://ricochet.com/laissez-faire-scuba-part-1-how-an-unregulated-industry-triumphed/&#34;&gt;SCUBA&lt;/a&gt; is the industry I was looking for. If you read the linked article (which you should, it&amp;rsquo;s great) the SCUBA story is an important lesson for the security industry. Our industry moves fast, too fast to regulate. Regulation would either hurt innovation or be useless due to too much change. Either way it would be very expensive. SCUBA is a place where the lack of regulation has allowed for dramatic innovation over the past 50 years. The article compares the personal aircraft industry which has substantial regulation and very little innovation (but the experimental aircraft industry is innovating due to lax regulation).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security and Tribal Knowledge</title>
      <link>https://opensourcesecurity.io/2016/01/25/security-and-tribal-knowledge/</link>
      <pubDate>Mon, 25 Jan 2016 00:57:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/01/25/security-and-tribal-knowledge/</guid> 
      <description>&lt;p&gt;I&amp;rsquo;ve noted a few times in the past the whole security industry is run by magicians. I don&amp;rsquo;t mean this in a bad way, it&amp;rsquo;s just how things work. Long term will will have to change, but it&amp;rsquo;s not going to be an easy path.&lt;/p&gt;
&lt;p&gt;When I say everything is run by magicians I speak of extremely smart people who are so smart they don&amp;rsquo;t need or have process (they probably don&amp;rsquo;t want it either so there&amp;rsquo;s no incentive). They can do whatever needs to be done whenever it needs doing. The folks in the center are incredibly smart but they learned their skills on their own and don&amp;rsquo;t know how to pass on knowledge. We have no way to pass knowledge on to others, many don&amp;rsquo;t even know this is a problem. Magicians can be awesome if you have one, until they quit. New industries are created by magicians but no industry succeeds with magicians. There are a finite number of these people and an infinite number of problems.&lt;/p&gt;</description>
    </item>
    <item>
      <title>OpenSSH, security, and everyone else</title>
      <link>https://opensourcesecurity.io/2016/01/18/openssh-security-and-everyone-else/</link>
      <pubDate>Mon, 18 Jan 2016 02:43:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/01/18/openssh-security-and-everyone-else/</guid> 
      <description>&lt;p&gt;If you pay attention at all, this week you heard about a security flaw in OpenSSH.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://www.openssh.com/txt/release-7.1p2&#34;&gt;Link to scary security flaw&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Of course nothing is going to change because of this. We didn&amp;rsquo;t make any real changes after Heartbleed or Shellshock, this isn&amp;rsquo;t nearly as bad, it&amp;rsquo;s business as usual.&lt;/p&gt;
&lt;p&gt;Trying to force change isn&amp;rsquo;t the important part though. The important thing to think about is the context this bug exists in. The folks who work on OpenSSH are some of the brightest security minds in the world. We&amp;rsquo;re talking well above average here, not just bright. If they can&amp;rsquo;t avoid security mistakes, is there any hope for the normal people?&lt;/p&gt;</description>
    </item>
    <item>
      <title>What the lottery and security have in common</title>
      <link>https://opensourcesecurity.io/2016/01/10/what-the-lottery-and-security-have-in-common/</link>
      <pubDate>Sun, 10 Jan 2016 17:32:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/01/10/what-the-lottery-and-security-have-in-common/</guid> 
      <description>&lt;p&gt;If you live in the US you can&amp;rsquo;t escape the news about the &lt;a href=&#34;http://www.powerball.com/&#34;&gt;Powerball&lt;/a&gt; lottery. The jackpot has grown to $1.3 Billion (with a capital B). Everyone is buying tickets and talking about what they&amp;rsquo;ll do when they win enough money to ruin their life.&lt;/p&gt;
&lt;p&gt;This made me realize the unfortunate truth about security we like to ignore. Humans are bad at reality. Here is how most of my conversations go.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A security analogy that works</title>
      <link>https://opensourcesecurity.io/2016/01/04/a-security-analogy-that-works/</link>
      <pubDate>Mon, 04 Jan 2016 23:31:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2016/01/04/a-security-analogy-that-works/</guid> 
      <description>&lt;p&gt;Over the holiday break I spent a lot of time reading and thinking about what the security problem really is. It&amp;rsquo;s really hard to describe, no analogies work, and things just seem to keep getting worse.&lt;/p&gt;
&lt;p&gt;Until now!&lt;/p&gt;
&lt;p&gt;Maybe.&lt;/p&gt;
&lt;p&gt;Well, things will probably keep getting worse, but I think I&amp;rsquo;ve found a way to describe this almost anyone can understand. We can&amp;rsquo;t really talk about our problems today, which makes it impossible to fix anything.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security reminds me of the gym on January 2</title>
      <link>https://opensourcesecurity.io/2015/12/29/security-reminds-me-of-the-gym-on-january-2/</link>
      <pubDate>Tue, 29 Dec 2015 18:53:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/12/29/security-reminds-me-of-the-gym-on-january-2/</guid> 
      <description>&lt;p&gt;If you have any sort of gym membership you dread the month of January. Every year, there are countless people who make a resolution to get in shape, so the gym is flooded with people for much of January. I&amp;rsquo;m in favor of everyone staying in shape and having a gym membership, my point isn&amp;rsquo;t to claim how annoying the n00bs are. The point of this story is how few people stick around, and most give up because doing nothing is often easier than doing something.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A Christmas Cyber</title>
      <link>https://opensourcesecurity.io/2015/12/21/a-christmas-cyber/</link>
      <pubDate>Mon, 21 Dec 2015 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/12/21/a-christmas-cyber/</guid> 
      <description>&lt;p&gt;Mallory was dead: to begin with. Bob knew he was dead, and nobody liked Bob, he was the security guy, nobody likes the security guy.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;Merry Christmas Bob!&amp;rdquo; said Alice. &amp;ldquo;Bah humbug!&amp;rdquo; was the reply. Bob had to work over Christmas protecting the network, he had no reason to be merry. As Bob opened the door to the server room he noticed the door knocker looked like Mallory, which was odd as the server room door didn&amp;rsquo;t have a knocker. A closer inspection led Bob to believe his mind was playing tricks on him.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security is the new paperless office!</title>
      <link>https://opensourcesecurity.io/2015/12/14/security-is-the-new-paperless-office/</link>
      <pubDate>Mon, 14 Dec 2015 14:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/12/14/security-is-the-new-paperless-office/</guid> 
      <description>&lt;p&gt;If you&amp;rsquo;re old enough, you remember reading a lot about the coming &amp;ldquo;paperless office&amp;rdquo;. It never came, but I realized there are parallels we can draw in the context of our current security problems.&lt;/p&gt;
&lt;p&gt;Back in the 90&amp;rsquo;s, everyone wanted a paperless office. It sounded neat and with the future coming, who would need paper with all the flying cars and hoverboards! It turns out paper didn&amp;rsquo;t go away. Everyone keeps talking about how security is the most important thing ever, investing in the paperless office was once the most important thing ever.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security lacks patience</title>
      <link>https://opensourcesecurity.io/2015/12/07/security-lacks-patience/</link>
      <pubDate>Mon, 07 Dec 2015 18:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/12/07/security-lacks-patience/</guid> 
      <description>&lt;p&gt;I had a meeting with some non security people to discuss some of the challenges around security. It&amp;rsquo;s a rather popular topic these days but nobody knows what that means (remember 5 years ago when everyone talked about cloud but nobody knew what that meant?). The details are irrelevant, the most important thing that came out of this meeting was when someone pointed out as a group we are impatient.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Where is the physical trust boundary?</title>
      <link>https://opensourcesecurity.io/2015/11/30/where-is-the-physical-trust-boundary/</link>
      <pubDate>Mon, 30 Nov 2015 14:18:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/11/30/where-is-the-physical-trust-boundary/</guid> 
      <description>&lt;p&gt;There&amp;rsquo;s a story of a toothbrush security advisory making the &lt;a href=&#34;http://gse-compliance.blogspot.com/2008/06/craig-wright-security-advisory-0002.html&#34;&gt;rounds&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This advisory is pretty funny but it matters. The actual issue with the toothbrush isn&amp;rsquo;t a huge deal, an attacker isn&amp;rsquo;t going to do anything exciting with the problems. The interesting issue here is we&amp;rsquo;re at the start of many problems like this we&amp;rsquo;re going to see.&lt;/p&gt;
&lt;p&gt;Today some engineers built a clever toothbrush. Tomorrow they&amp;rsquo;re going to build new things, different things. Security will matter for some of them. It won&amp;rsquo;t matter for most of them.&lt;/p&gt;</description>
    </item>
    <item>
      <title>If your outcome is perfect or nothing, nothing always wins</title>
      <link>https://opensourcesecurity.io/2015/11/20/if-your-outcome-is-perfect-or-nothing-nothing-always-wins/</link>
      <pubDate>Fri, 20 Nov 2015 14:02:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/11/20/if-your-outcome-is-perfect-or-nothing-nothing-always-wins/</guid> 
      <description>&lt;p&gt;This tweet&lt;br&gt;
&lt;a href=&#34;https://twitter.com/RichFelker/status/666325066838339584&#34;&gt;https://twitter.com/RichFelker/status/666325066838339584&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Led to this thread&lt;br&gt;
&lt;a href=&#34;http://marc.info/?t=144778171800001&amp;amp;r=1&amp;amp;w=2&#34;&gt;http://marc.info/?t=144778171800001&amp;amp;r=1&amp;amp;w=2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The short version is there are some developers from Red Hat working on gcc attempting to prevent ROP style attacks. More than one person has accused this work of being pointless and a waste of time. It&amp;rsquo;s not, the waste of time is arguing about why trying new things is dumb.&lt;/p&gt;
&lt;p&gt;Here&amp;rsquo;s the important thing security people always screw up.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The only waste of time is if you do nothing and complain about the people who are doing something.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Your containers were built in some guy&#39;s barn!</title>
      <link>https://opensourcesecurity.io/2015/11/16/your-containers-were-built-in-some-guys-barn/</link>
      <pubDate>Mon, 16 Nov 2015 14:06:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/11/16/your-containers-were-built-in-some-guys-barn/</guid> 
      <description>&lt;p&gt;Today containers are a bit like how cars used to work a long long long time ago. You couldn&amp;rsquo;t really buy a car, you had to build it yourself or find someone who could build one for you in their barn. The parts were terrible and things would break all the time. It probably ran on steam or was pulled by a horse.&lt;/p&gt;
&lt;p&gt;Containers aren&amp;rsquo;t magic. Well they are for most people. Almost all technology is basically magic for almost everyone. There are some who understand it but generally speaking, it&amp;rsquo;s complicated. People know enough to get by which is fine, but that also means you have to trust your supplier. Your car is probably magic to you. You put gas in a hole in the back, then you can press buttons, push peddles, and turn wheels to transport you places. I&amp;rsquo;m sure a lot of people at this point are running through the basics of how cars work in their heads to reassure themselves its&amp;rsquo; not magic and they know what&amp;rsquo;s going on!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Is the Linux ransomware the first of many?</title>
      <link>https://opensourcesecurity.io/2015/11/11/is-the-linux-ransomware-the-first-of-many/</link>
      <pubDate>Wed, 11 Nov 2015 03:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/11/11/is-the-linux-ransomware-the-first-of-many/</guid> 
      <description>&lt;p&gt;If you pay any attention to the news, no doubt the story of the &lt;a href=&#34;http://krebsonsecurity.com/2015/11/ransomware-now-gunning-for-your-web-sites/&#34;&gt;Linux ransomware&lt;/a&gt; that&amp;rsquo;s making the rounds. There has been much said about the technical merits of this, but there are two things I keep wondering.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is this a singular incident, or the first of many?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;**&lt;br&gt;
** You could argue this either way. It might be a one off blip, it might be the first of more to come. We shouldn&amp;rsquo;t start to get worked up just yet. If there&amp;rsquo;s another one of these before the year ends I&amp;rsquo;m going to stock up on coffee for the impending long nights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Third Group</title>
      <link>https://opensourcesecurity.io/2015/10/27/the-third-group/</link>
      <pubDate>Tue, 27 Oct 2015 13:03:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/10/27/the-third-group/</guid> 
      <description>&lt;p&gt;Anytime you do anything, no matter how small or big, there will always be three groups of people involved. How we interact with these groups can affect the outcome of our decisions and projects. If you don&amp;rsquo;t know they exist it can be detrimental to what you&amp;rsquo;re working on. If you know who they are and how to deal with them, a great deal of pain can be avoided, and you will put yourself in a better position to succeed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How do we talk to normal people?</title>
      <link>https://opensourcesecurity.io/2015/10/20/how-do-we-talk-to-normal-people/</link>
      <pubDate>Tue, 20 Oct 2015 13:20:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/10/20/how-do-we-talk-to-normal-people/</guid> 
      <description>&lt;p&gt;How do we talk to the regular people? What&amp;rsquo;s going to motivate them? What matters to them?&lt;/p&gt;
&lt;p&gt;You can easily make the &lt;a href=&#34;http://sobersecurity.blogspot.com/2015/10/how-do-we-talk-to-business.html&#34;&gt;case&lt;/a&gt; that business is driven by financial rewards, but what can we say or do to get normal people to understand us, to care? Money? Privacy? Donuts?&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m not saying we&amp;rsquo;re going to turn people into experts, I&amp;rsquo;m not even suggesting they will reach a point of being slightly competent. Most people can&amp;rsquo;t fix their car, or wire their house, or fix their pipes. Some can, but most can&amp;rsquo;t. People don&amp;rsquo;t need to really know anything about security, they don&amp;rsquo;t want to, so there&amp;rsquo;s no point in us even trying. When we do try, they get confused and scared. So really this comes down to:&lt;/p&gt;</description>
    </item>
    <item>
      <title>How do we talk to business?</title>
      <link>https://opensourcesecurity.io/2015/10/13/how-do-we-talk-to-business/</link>
      <pubDate>Tue, 13 Oct 2015 13:28:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/10/13/how-do-we-talk-to-business/</guid> 
      <description>&lt;p&gt;How many times have you tried to get buyin for a security idea at work, or with a client, only to have them say &amp;ldquo;no&amp;rdquo;. Even though you knew it was really important, they still made the wrong decision.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve all seen this more times than we can count. We usually walk away grumbling about how sorry they&amp;rsquo;ll be someday. Some of them will be, some won&amp;rsquo;t. The reason is always the same though:&lt;/p&gt;</description>
    </item>
    <item>
      <title>What&#39;s filling the vacuum?</title>
      <link>https://opensourcesecurity.io/2015/10/06/whats-filling-the-vacuum/</link>
      <pubDate>Tue, 06 Oct 2015 15:42:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/10/06/whats-filling-the-vacuum/</guid> 
      <description>&lt;p&gt;Anytime there&amp;rsquo;s some sort of vacuum, something will appear to fill the gap. In this context we&amp;rsquo;re going to look at what&amp;rsquo;s filling the vacuum in security. There are a lot of smart people, but we&amp;rsquo;re failing horribly at getting our message out.&lt;/p&gt;
&lt;p&gt;The answer to this isn&amp;rsquo;t simple. You have to look at what&amp;rsquo;s getting attention that doesn&amp;rsquo;t deserve to get attention. Just because we know a product, service, or idea is hogwash doesn&amp;rsquo;t mean non security people know this. They have to attempt to find someone to trust, then listen to what they have to say. Unfortunately when you&amp;rsquo;re talking about extremely complex and technical problems, they listen to whoever they can understand as there&amp;rsquo;s no way they can determine who is technically more correct. They&amp;rsquo;re going to follow whoever sounds the smartest.&lt;/p&gt;</description>
    </item>
    <item>
      <title>We&#39;re losing the battle for security</title>
      <link>https://opensourcesecurity.io/2015/09/29/were-losing-the-battle-for-security/</link>
      <pubDate>Tue, 29 Sep 2015 13:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/29/were-losing-the-battle-for-security/</guid> 
      <description>&lt;p&gt;The security people are currently losing the battle to win the hearts and minds of the people. The war is far from over but it&amp;rsquo;s not currently looking good for our team.&lt;/p&gt;
&lt;p&gt;As with all problems, if there is a vacuum, something or someone end up filling it. This is happening right now in security. There are a lot of really smart security people out there. We generally know what&amp;rsquo;s wrong, and sometimes even know how to fix it, but the people we need to listen aren&amp;rsquo;t. I don&amp;rsquo;t blame them either, we&amp;rsquo;re not telling them what they need to know.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to build trust</title>
      <link>https://opensourcesecurity.io/2015/09/22/how-to-build-trust/</link>
      <pubDate>Tue, 22 Sep 2015 15:53:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/22/how-to-build-trust/</guid> 
      <description>&lt;p&gt;One the hardest things we have to do is to build trust.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s not hard for everyone, just us specifically. It&amp;rsquo;s not in our nature.&lt;/p&gt;
&lt;p&gt;Security people tend not to trust anyone. Everything we do is based on not trusting anyone, it&amp;rsquo;s literally our job. Trust is a two way street. If you expect someone to trust you, you have to trust them to a certain degree. This is our first problem. We don&amp;rsquo;t trust anybody, for good reason often, but it&amp;rsquo;s a problem. We have to learn how to trust others so we can get them to trust us. This is of course easier said than done. Would you trust someone with your password? I wouldn&amp;rsquo;t, but a lot of people do. This is a place where they won&amp;rsquo;t understand why we don&amp;rsquo;t trust them. Of course sharing a password isn&amp;rsquo;t a great idea, but that&amp;rsquo;s not the point.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How can we describe a buffer overflow in common terms?</title>
      <link>https://opensourcesecurity.io/2015/09/13/how-can-we-describe-a-buffer-overflow-in-common-terms/</link>
      <pubDate>Sun, 13 Sep 2015 16:11:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/13/how-can-we-describe-a-buffer-overflow-in-common-terms/</guid> 
      <description>&lt;p&gt;We can&amp;rsquo;t.&lt;/p&gt;
&lt;p&gt;You think you can, but you can&amp;rsquo;t. This reminds of the Feynman video where he&amp;rsquo;s asked &lt;a href=&#34;https://www.youtube.com/watch?v=qjmtJpzoW0o&#34;&gt;how magnets work&lt;/a&gt; and he doesn&amp;rsquo;t explain it, he explains why he can&amp;rsquo;t explain it.&lt;/p&gt;
&lt;p&gt;Our problem is we&amp;rsquo;re generally too clever to know when to stop. There are limits to our cleverness unfortunately.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m picking on buffer overflows in this case because they&amp;rsquo;re something that&amp;rsquo;s pretty universal throughout the security universe. Most everyone knows what they are, how they work, and we all think we could explain it to our grandma.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Being a nice security person</title>
      <link>https://opensourcesecurity.io/2015/09/08/being-a-nice-security-person/</link>
      <pubDate>Tue, 08 Sep 2015 12:08:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/08/being-a-nice-security-person/</guid> 
      <description>&lt;p&gt;Sometimes it&amp;rsquo;s really hard to be nice to someone. This is especially true if you think they&amp;rsquo;re not very smart. Respect is a two way street though. If you think someone&amp;rsquo;s an idiot, they probably think you&amp;rsquo;re an idiot. You&amp;rsquo;re both going to end up right once it&amp;rsquo;s all over though.&lt;/p&gt;
&lt;p&gt;As an industry we overestimate how much people know about security, which I think is the root of our problem.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Everyone is afraid of us</title>
      <link>https://opensourcesecurity.io/2015/09/03/everyone-is-afraid-of-us/</link>
      <pubDate>Thu, 03 Sep 2015 12:39:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/03/everyone-is-afraid-of-us/</guid> 
      <description>&lt;p&gt;How many times have you been afraid to say something about security because you knew if you&amp;rsquo;re wrong, you&amp;rsquo;re going to be destroyed in public about it by your peers?&lt;/p&gt;
&lt;p&gt;How many times did you try really hard to completely discredit someone who said something wrong about security?&lt;/p&gt;
&lt;p&gt;How many times have you been wrong but still argued because you didn&amp;rsquo;t want to admit it?&lt;/p&gt;
&lt;p&gt;How many good ideas never saw the light of day because of this?&lt;/p&gt;</description>
    </item>
    <item>
      <title>You are bad at talking to people</title>
      <link>https://opensourcesecurity.io/2015/09/02/you-are-bad-at-talking-to-people/</link>
      <pubDate>Wed, 02 Sep 2015 11:36:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurityio.wordpress.com/2015/09/02/you-are-bad-at-talking-to-people/</guid> 
      <description>&lt;p&gt;You&amp;rsquo;re probably bad at talking to people. I don&amp;rsquo;t mean your friends you play D&amp;amp;D or Halo or whatever hip game people play now, I mean humans, like the guy who serves you coffee in the morning.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve all had more than once instance where we said something and ended up with a room full of people staring at us because it wasn&amp;rsquo;t terribly nice or thoughtful. At the time you had no idea anything was wrong, you still might not.&lt;/p&gt;</description>
    </item>
    <item>
      <title>About</title>
      <link>https://opensourcesecurity.io/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/about/</guid> 
      <description>&lt;p&gt;Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s a lot of good work happening that doesn&amp;rsquo;t get attention because there&amp;rsquo;s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let&amp;rsquo;s focus on those people and teams then learn what they do and how they do it. The goal is to hear from the people doing the work, they know what’s up, they have a lot to teach us. We just have to listen.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Contact Info</title>
      <link>https://opensourcesecurity.io/contact/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">http://opensourcesecurity.io/contact/</guid> 
      <description>&lt;p&gt;We are always looking for guests. We want guest that have an open source focus, ideally security, but security can be a strange topic, we&amp;rsquo;re open to a lot of interpretation.&lt;/p&gt;
&lt;p&gt;We prefer technical guest who are doing the work. Your CEO may be a great and smart person, but we want your head of engineering, or even better, one of your developers!&lt;/p&gt;
&lt;p&gt;Please get in touch of you have an idea for a topic or guest.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Media</title>
      <link>https://opensourcesecurity.io/feeds/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
       <guid isPermaLink="false">https://opensourcesecurity.io/feeds/</guid> 
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://opensourcesecuritypodcast.libsyn.com/rss&#34;&gt;RSS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://itunes.apple.com/us/podcast/open-source-security-podcast/id1151833659&#34;&gt;iTunes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://open.spotify.com/show/4YeKi2aGfxuhGj2QqazzVV&#34;&gt;Spotify&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.youtube.com/@opensourcesecurity&#34;&gt;YouTube&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description>
    </item>
  </channel>
</rss>
