426 episodes

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

Open Source Security Podcast Josh Bressers & Kurt Seifried

    • Technology
    • 4.7 • 38 Ratings

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

    Video game cheaters, also pretendo

    Video game cheaters, also pretendo

    Josh and Kurt talk about a database of game cheaters. Cheating in games has many similarities to security problems. Anti cheat rootkits are also terrible. The clever thing however is using statistics to identify cheaters. Statistics don't lie. Also, we discuss the Pretendo project sitting on a vulnerability for a year, is this ethical?
    Show Notes Hacker News searchable database
    Benford's law
    John Oliver Medicaid
    Mario64 invisible walls
    Pretendo
    Pretendo exploit

    • 30 min
    The Notepad++ Parasite Website

    The Notepad++ Parasite Website

    Josh and Kurt talk about a Notepad++ fake website. It's possibly not illegal, but it's certainly ethically wrong. We also end up discussing why it seems like all these weird and wild things keep happening. It's probably due to the massive size of open source (and everything) now. Things have gotten gigantic and we didn't really notice.
    Show Notes Help us to take down the parasite website Open Source is bigger than you can imagine Toronto Pearson International Airport heist

    • 35 min
    FCC cybersecurity label for consumer devices

    FCC cybersecurity label for consumer devices

    Josh and Kurt talk about a new FCC program to provide a cybersecurity certification mark. Similar to other consumer safety marks such as UL or CE. We also tie this conversation into GrapheneOS, and what trying to claim a consumer device is secure really means. Some of our compute devices have an infinite number of possible states. It's a really weird and hard problem.
    Show Notes GrapheneOS FCC approves cybersecurity label for consumer devices Cyber Trust Mark Logo

    • 32 min
    XZ Bonus Spectacular Episode

    XZ Bonus Spectacular Episode

    Josh and Kurt talk about the recent events around XZ. It's only been a few days, and it's amazing what we already know. We explain a lot of the basics we currently know with the attitude much of these details will change quickly over the coming week. We can't fix this problem as it stands, we don't know where to start yet. But that's not a reason to lose hope. We can fix this if we want to, but it won't be flashy, it'll be hard work.
    Show Notes GossiTheDog's Blog Post fr0gger diagram OpenSSF Blog (archive) stb library

    • 1 hr 1 min
    Do you have a security.txt file?

    Do you have a security.txt file?

    Josh and Kurt talk about the security.txt file. It's not new, but it's not something we've discussed before. It's a great idea, an easy format, and well defined. It's not high on many of our todo lists, but it's something worth doing.
    Show Notes RFC 9116

    • 30 min
    CISA's new SSDF attestation form

    CISA's new SSDF attestation form

    Josh and Kurt talk about the new SSDF attestation form from CISA. The current form isn't very complicated, and the SSDF has a lot of room for interpretation. But this is the start of something big. It's going to take a long time to see big changes in supply chain security, but we're confident they will come.
    Show Notes Secure Software Development Attestation Form The U.S. Military Is Missing Six Nuclear Weapons NIST 800-218

    • 41 min

Customer Reviews

4.7 out of 5
38 Ratings

38 Ratings

adamajreynolds ,

Excellent

I listen every week - it’s great to hear from others in my field.

cspeckrun ,

Most frustrating show I continue listening to

Like a meeting with no agenda it can be informative and entertaining and you’re never quite sure if you should attend again but usually you do.

unbleachedbit ,

The banter is spot on

as of September 2023 be negative reviews may be from non-techs or squishy persons in general. I understand the humor, and every episode that I have listened to so far which is only half a dozen the hosts understand and get what they are talking about. having over 20 years both professionally and not in the information technology field I find myself quite amused at their observations, and more often than not not in agreement more than once an episode. If the hosts, however, ever come across this comment, if you guys would enable Apple podcasts, so that I could toss a few dollars your way I would be more than happy to do so.

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
Dwarkesh Podcast
Dwarkesh Patel
TED Radio Hour
NPR

You Might Also Like

2.5 Admins
The Late Night Linux Family
LINUX Unplugged
Jupiter Broadcasting
Late Night Linux
The Late Night Linux Family
Self-Hosted
Jupiter Broadcasting
Security Now (Audio)
TWiT
Risky Business News
risky.biz