Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts115/v4/c5/8c/54/c58c5490-e30b-a104-d3ff-91b87c0c8f0a/mza_7009397206772167834.jpg/600x600bb.jpg
Root Causes: A PKI and Security Podcast
Tim Callan and Jason Soroko
500 episodes
1 day ago
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.
Show more...
Technology
RSS
All content for Root Causes: A PKI and Security Podcast is the property of Tim Callan and Jason Soroko and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.
Show more...
Technology
Episodes (20/500)
Root Causes: A PKI and Security Podcast
Root Causes 542: Use Cases for HQC
In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.
Show more...
2 days ago
10 minutes 34 seconds

Root Causes: A PKI and Security Podcast
Root Causes 541: Introducing the HQC PQC Algorithm
NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. We explain this code-based algorithm.
Show more...
4 days ago
6 minutes 52 seconds

Root Causes: A PKI and Security Podcast
Root Causes 540: Contextual CBOM
We define Cryptographic Bill of Materials (CBOM), which is more than a list of your cryptography and where it is. A CBOM need also include information about the PQC readiness of environments, availability of updates, and the importance of secrets.
Show more...
1 week ago
11 minutes 3 seconds

Root Causes: A PKI and Security Podcast
Root Causes 539: What Is the Two-QWAC Architecture?
A new kind of eIDAS QWAC (Qualifieid Website Authentication Certificate) is on the way. The "two-QWAC architecture" introduces a second certificate containing organization information to be displayed by the browser, to sit alongside but independent of the certificate that authenticates a domain. We explain what's coming and why.
Show more...
1 week ago
20 minutes 2 seconds

Root Causes: A PKI and Security Podcast
Root Causes 538: What Is an Entropy Desert?
An environment in which credentials are extremely predictable could be described as an entropy desert. There are occurring at a global scale. We discuss concepts like measurable entropy availability and entropy by design.
Show more...
2 weeks ago
9 minutes 2 seconds

Root Causes: A PKI and Security Podcast
Root Causes 537: The Thermodynamics of Privacy
In this episode we build on our concept of entropy-aware guidance to explain how we might quantify privacy. We touch on GDPR, proof of work, and Landaur's principle.
Show more...
2 weeks ago
13 minutes 34 seconds

Root Causes: A PKI and Security Podcast
Root Causes 536: Patent Blocker on ML-KEM
A patent dispute in 2024 nearly blocked ML-KEM. But emerging thinking raises concern that the 2024 resolution did not guarantee full, clear access to all ML-KEM implementations. We explain.
Show more...
2 weeks ago
11 minutes 51 seconds

Root Causes: A PKI and Security Podcast
Root Causes 535: The CPS Is a Superset of Actual Practices
The CPS must always be a superset of actual practices in a properly running CA. We explain why this is a product of good design.
Show more...
3 weeks ago
10 minutes 22 seconds

Root Causes: A PKI and Security Podcast
Root Causes 534: Signing the Machines That Think
Imagine what happens if you use the wrong LLM, including a malicious model placed there to create mischief or crime. How do you know? Jason proposes that, the same way we sign our code, we should be signing our AI models as well.
Show more...
3 weeks ago
8 minutes 56 seconds

Root Causes: A PKI and Security Podcast
Root Causes 533: Flexibility Through Multi-CA Trust Models
We discuss how a static PKI structure can hurt corporate flexibility and resilience. Events like reorgs and M&A activity can cause intractable problems with the wrong PKI setup. Plus, Jason coins the term PKI archeology.
Show more...
4 weeks ago
9 minutes 25 seconds

Root Causes: A PKI and Security Podcast
Root Causes 532: Introducing Offline PKI
In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.
Show more...
1 month ago
11 minutes 4 seconds

Root Causes: A PKI and Security Podcast
Root Causes 531: Benefits of Single-purpose Root Hierarchies
Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones. We discuss why.
Show more...
1 month ago
16 minutes 36 seconds

Root Causes: A PKI and Security Podcast
Root Causes 530: Introducing the AI Iceberg
We compare AI in 2025 to Internet in 1995 and describe the AI iceberg, including the majority of applications which are below the waterline.
Show more...
1 month ago
18 minutes 46 seconds

Root Causes: A PKI and Security Podcast
Root Causes 529: What Is a Common Mark Certificate?
Verified Mark Certificates (VMC) now have a companion product for logos that are not registered trademarks, called a Common Mark Certificate (CMC). We explain the differences.
Show more...
1 month ago
7 minutes 32 seconds

Root Causes: A PKI and Security Podcast
Root Causes 528: Misissued SSL Certificate for 1.1.1.1
A CA has incorrectly issued TLS certificates for the 1.1.1.1 and 2.2.2.2 IP addresses. We go into the details.
Show more...
1 month ago
17 minutes 31 seconds

Root Causes: A PKI and Security Podcast
Root Causes 527: Key Dates for the Deprecation of Public mTLS
Client authentication using public TLS server certificates is on the deprecation path. In this episode we go through the key dates in this deprecation.
Show more...
1 month ago
10 minutes 25 seconds

Root Causes: A PKI and Security Podcast
Root Causes 526: Voice Biometrics Are Worthless
Based on the ready availability of AI-based voice cloning, we declare voice biometric authentication to be utterly valueless.
Show more...
1 month ago
8 minutes 32 seconds

Root Causes: A PKI and Security Podcast
Root Causes 525: The End of Email-based DCV
A new CABF ballot proposal will eliminate all email- and phone-based DCV over the next few years. We go into the details.
Show more...
1 month ago
10 minutes 3 seconds

Root Causes: A PKI and Security Podcast
Root Causes 524: How to Kill Three Birds with One Stone
Three major changes are coming to the world of public certificates, all of which require major changes in how organizations deploy, renew, and manage their certificates. These are 47-day SSL, PQC, and the deprecation of mTLS. We describe the overlap between these efforts and how to combine them for better efficiency and project management.
Show more...
1 month ago
12 minutes 42 seconds

Root Causes: A PKI and Security Podcast
Root Causes 523: Will Your Configuration Block MPIC DCV?
MPIC (Multi-perspective Issuance Corroboration) is soon to move into enforcement phase. In this episode we describe three configuration decisions that can force Domain Control Validation (DCV) to fail and tell you what to do about them before you have a problem.
Show more...
2 months ago
11 minutes 16 seconds

Root Causes: A PKI and Security Podcast
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.