Root Causes: A PKI and Security Podcast
Latest Episodes
Root Causes 169: Bitcoin and the Anonymity Fallacy
In the developing story of the Colonial pipeline …
Root Causes 168: The Difference Between e-Signing and Digital Signing
In our technology discussions we frequently run i…
Root Causes 167: Colonial Pipeline Ransomware Attack
The recent ransomware attack against the Colonial…
Root Causes 166: The Trouble with OU Fields
Of all aspects of public SSL certificates, few ar…
Root Causes 165: Blockchain - Proof of Work Versus Proof of Stake
In our ongoing examination of blockchain, we defi…
Root Causes 164: Examining MFA Through out-of-Band Phone Calling
In our ongoing series of episodes on MFA, we expl…
Root Causes 163: What Puts the I in PKI?
PKI stands for Public Key Infrastructure. In this…
Root Causes 162: What Is Sideloading?
In a recent interview Tim Cook took a strong stan…
Root Causes 161: Consensus Algorithms and the Byzantine Generals Problem
If you pay attention to blockchain and crypto cur…
Root Causes 160: Purpose-built Quantum Computers for Breaking RSA
A new academic paper has described how a purpose-…