<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <atom:link href="http://rss-feeds.eu/feeds/SecurityNow-16k-2011.xml" rel="self" type="application/rss+xml" />
    <title>Security Now 2011 - 16k MP3</title>
    <pubDate>Sat, 27 May 2017 15:47:59 +0100</pubDate>
    <lastBuildDate>Wed, 15 Apr 2020 10:26:09 +0100</lastBuildDate>
    <link>https://twit.tv/shows/security-now</link>
    <language>en-US</language>
    <copyright>
      This work is licensed under a Creative Commons License - 
      Attribution-NonCommercial-NoDerivatives 4.0 International - 
      http://creativecommons.org/licenses/by-nc-nd/4.0/
    </copyright>
    <ttl>14400</ttl>
    <category>Technology</category>
    <category>Security</category>
    <image>
      <title>Security Now 2011 - 16k MP3</title>
      <url>http://twit.cachefly.net/coverart/sn/sn144audio.jpg</url>
      <link>https://twit.tv/shows/security-now</link>
      <width>144</width>
      <height>144</height>
    </image>
    <itunes:author>TWiT</itunes:author>
    <itunes:subtitle>Steve Gibson discusses the hot topics in security today with Leo Laporte.</itunes:subtitle>
    <itunes:summary>Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
    
    Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.</itunes:summary>
    <description>
      Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, 
      creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
      Records live at https://twit.tv/live every Tuesday.
    </description>
    <itunes:keywords>TWiT, Technology, Steve Gibson, Leo Laporte, security, spyware, malware, hacking, cyber crime, encryption</itunes:keywords>
    <itunes:explicit>false</itunes:explicit>
    <itunes:block>no</itunes:block>
    <itunes:owner>
      <itunes:name>Leo Laporte</itunes:name>
      <itunes:email>distro@twit.tv</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology" />
    <itunes:category text="News">
      <itunes:category text="Tech News" />
    </itunes:category>
    <item>
      <title>SN333: Science Fiction Holiday Special</title>
      <pubDate>Wed, 28 Dec 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-333-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-333-lq.mp3</guid>
      <description>After catching up with just a bit of year-end security news, for their special holiday episode, Steve and Leo review their favorite Science Fiction books and movies, pulling the commentary they have previously scattered throughout many years into a single reference.</description>
      <enclosure url="http://media.grc.com/sn/sn-333-lq.mp3" length="11440925" type="audio/mpeg" />
    </item>
    <item>
      <title>SN332: Listener Feedback #133</title>
      <pubDate>Wed, 21 Dec 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-332-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-332-lq.mp3</guid>
      <description>Tom and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-332-lq.mp3" length="11193284" type="audio/mpeg" />
    </item>
    <item>
      <title>SN331: Mega Security News Update</title>
      <pubDate>Wed, 14 Dec 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-331-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-331-lq.mp3</guid>
      <description>We had so much news this week that it squeezed out our show's planned topic of Google's new SDPY web browser protocol. So we'll tackle that early next year. In the meantime, Leo and Steve will discuss the news of this very active week!</description>
      <enclosure url="http://media.grc.com/sn/sn-331-lq.mp3" length="11310521" type="audio/mpeg" />
    </item>
    <item>
      <title>SN330: Listener Feedback #132</title>
      <pubDate>Wed, 07 Dec 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-330-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-330-lq.mp3</guid>
      <description>Tom and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-330-lq.mp3" length="11868706" type="audio/mpeg" />
    </item>
    <item>
      <title>SN329: Browser ID</title>
      <pubDate>Wed, 30 Nov 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-329-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-329-lq.mp3</guid>
      <description>After catching up with the week's news, Leo and I examine the operation of Mozilla's solution to the need for secure, reliable and easy-to-use establishment of online Internet identity known as: BrowserID.  We also compare it with all of the other existing technologies and solutions we've discussed before.</description>
      <enclosure url="http://media.grc.com/sn/sn-329-lq.mp3" length="8833800" type="audio/mpeg" />
    </item>
    <item>
      <title>SN328: Listener Feedback #131</title>
      <pubDate>Wed, 23 Nov 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-328-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-328-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-328-lq.mp3" length="12230972" type="audio/mpeg" />
    </item>
    <item>
      <title>SN327: Internet Privacy Update</title>
      <pubDate>Wed, 16 Nov 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-327-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-327-lq.mp3</guid>
      <description>The day before recording this podcast in the studio with Leo, I attended an annual Internet privacy conference.  After catching up with the week's security news, updates, and errata, I share what I saw and learned during the conference, including three VERY promising new privacy and authentication tools.</description>
      <enclosure url="http://media.grc.com/sn/sn-327-lq.mp3" length="8168931" type="audio/mpeg" />
    </item>
    <item>
      <title>SN326: Listener Feedback #130</title>
      <pubDate>Wed, 09 Nov 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-326-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-326-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-326-lq.mp3" length="12194819" type="audio/mpeg" />
    </item>
    <item>
      <title>SN325: TCP Pt.3 - Necessary Refinements</title>
      <pubDate>Wed, 02 Nov 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-325-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-325-lq.mp3</guid>
      <description>After catching up with the week's news, Leo and I return this week to our "How the Internet Works" fundamentals series. We examine the challenges presented by &quot;packet-based connections&quot; to further understand the operation of the Internet's most popular and complex protocol: TCP.</description>
      <enclosure url="http://media.grc.com/sn/sn-325-lq.mp3" length="8866923" type="audio/mpeg" />
    </item>
    <item>
      <title>SN324: Listener Feedback #129</title>
      <pubDate>Wed, 26 Oct 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-324-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-324-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-324-lq.mp3" length="8955321" type="audio/mpeg" />
    </item>
    <item>
      <title>SN323: TCP Pt.2 - Attacking TCP</title>
      <pubDate>Wed, 19 Oct 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-323-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-323-lq.mp3</guid>
      <description>After catching up with the week's news, Leo and I return this week to our &quot;How the Internet Works&quot; fundamentals series. We examine the operation of the various attacks that have been made through the years against the Internet's most popular and complex protocol:  TCP.</description>
      <enclosure url="http://media.grc.com/sn/sn-323-lq.mp3" length="10139191" type="audio/mpeg" />
    </item>
    <item>
      <title>SN322: Listener Feedback #128</title>
      <pubDate>Wed, 12 Oct 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-322-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-322-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-322-lq.mp3" length="9014776" type="audio/mpeg" />
    </item>
    <item>
      <title>SN321: The Beauty of B.E.A.S.T.</title>
      <pubDate>Wed, 05 Oct 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-321-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-321-lq.mp3</guid>
      <description>After catching up with the week's security news, Steve and Leo examine the implications of a recent Internet-wide exploit known as BEAST: Browser Exploits Against SSL/TLS. They share the process used by the discoverers of an exploit for this long-known vulnerability and consider its implications.</description>
      <enclosure url="http://media.grc.com/sn/sn-321-lq.mp3" length="12318012" type="audio/mpeg" />
    </item>
    <item>
      <title>SN320: Listener Feedback #127</title>
      <pubDate>Thu, 29 Sep 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-320-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-320-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-320-lq.mp3" length="10976677" type="audio/mpeg" />
    </item>
    <item>
      <title>SN319: Certificate Authority (CA) Trust - Time to Change it?</title>
      <pubDate>Thu, 22 Sep 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-319-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-319-lq.mp3</guid>
      <description>After catching up with just a bit of the past week's news, Leo and I explore the most mature potential replacement for the Internet's existing (and failing) &quot;trust model&quot; which has always been based upon the unequivocal trust of Certificate Authorities.</description>
      <enclosure url="http://media.grc.com/sn/sn-319-lq.mp3" length="8904539" type="audio/mpeg" />
    </item>
    <item>
      <title>SN318: Listener Feedback #126</title>
      <pubDate>Thu, 15 Sep 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-318-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-318-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-318-lq.mp3" length="12505467" type="audio/mpeg" />
    </item>
    <item>
      <title>SN317: TCP Part 1 &#8211; Getting Connected</title>
      <pubDate>Thu, 8 Sep 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-317-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-317-lq.mp3</guid>
      <description>After catching up with a week of the amazing news of the security breach of the DigiNotar certificate authority, Steve and Leo continue their "How the Internet Works" series with the first of several episodes describing the operation of the Internet's most used protocol: TCP.</description>
      <enclosure url="http://media.grc.com/sn/sn-317-lq.mp3" length="11043132" type="audio/mpeg" />
    </item>
    <item>
      <title>SN316: Listener Feedback #125</title>
      <pubDate>Thu, 1 Sep 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-316-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-316-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-316-lq.mp3" length="11772784" type="audio/mpeg" />
    </item>
    <item>
      <title>SN315: Off The Grid</title>
      <pubDate>Thu, 25 Aug 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-315-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-315-lq.mp3</guid>
      <description>After catching up with the week's news, I explain my goals, development process, and operation of the &quot;Off The Grid&quot; paper-based encryption system I developed for use in encrypting website domain names into matching secure website passwords.</description>
      <enclosure url="http://media.grc.com/sn/sn-315-lq.mp3" length="9960304" type="audio/mpeg" />
    </item>
    <item>
      <title>SN314: Listener Feedback #124</title>
      <pubDate>Thu, 18 Aug 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-314-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-314-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-314-lq.mp3" length="9832931" type="audio/mpeg" />
    </item>
    <item>
      <title>SN313: How The Internet Works: ICMP &amp; UDP</title>
      <pubDate>Thu, 11 Aug 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-313-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-313-lq.mp3</guid>
      <description>After catching up with a busy week of security updates, and some miscellaneous fun security news, Tom &amp; I return for the second installment of "How The Internet Works" with a look at the ICMP and UDP protocols.</description>
      <enclosure url="http://media.grc.com/sn/sn-313-lq.mp3" length="12346851" type="audio/mpeg" />
    </item>
    <item>
      <title>SN312: Listener Feedback #123</title>
      <pubDate>Thu, 04 Aug 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-312-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-312-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-312-lq.mp3" length="10761950" type="audio/mpeg" />
    </item>
    <item>
      <title>SN311: Anatomy of a Security Mistake</title>
      <pubDate>Thu, 28 Jul 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-311-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-311-lq.mp3</guid>
      <description>This week, after catching up with a collection of interesting security events, Leo and I take a close look at a recently discovered security coding error, examining exactly how and why it occurred, to understand how easily these kinds of mistakes can be made... and how difficult it can be to EVER find them all.</description>
      <enclosure url="http://media.grc.com/sn/sn-311-lq.mp3" length="7942896" type="audio/mpeg" />
    </item>
    <item>
      <title>SN310: Listener Feedback #122</title>
      <pubDate>Thu, 21 Jul 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-310-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-310-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-310-lq.mp3" length="12394812" type="audio/mpeg" />
    </item>
    <item>
      <title>SN309: How the Internet Works, Part 1</title>
      <pubDate>Thu, 14 Jul 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-309-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-309-lq.mp3</guid>
      <description>This week, after catching up with our usual grab bag of Internet-related security and privacy news, including another Microsoft Patch Tuesday, Leo and I plow into the first of a series of forthcoming episodes, which will be spread out over time, describing the detailed technical operation of the ever-more-ubiquitous global Internet.</description>
      <enclosure url="http://media.grc.com/sn/sn-309-lq.mp3" length="9423854" type="audio/mpeg" />
    </item>
    <item>
      <title>SN308: Listener Feedback #121</title>
      <pubDate>Thu, 07 Jul 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-308-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-308-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-308-lq.mp3" length="12444445" type="audio/mpeg" />
    </item>
    <item>
      <title>SN307: The Future of Identity</title>
      <pubDate>Thu, 30 Jun 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-307-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-307-lq.mp3</guid>
      <description>This week, after catching up on the week's security and privacy news, Steve and Leo take a look at the state of Identity Management in Cyberspace with the U.S. Government's publication of its NSTIC - National Strategy for Trusted Identities in Cyberspace.</description>
      <enclosure url="http://media.grc.com/sn/sn-307-lq.mp3" length="9099308" type="audio/mpeg" />
    </item>
    <item>
      <title>SN306: Listener Feedback #120</title>
      <pubDate>Thu, 23 Jun 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-306-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-306-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-306-lq.mp3" length="11501738" type="audio/mpeg" />
    </item>
    <item>
      <title>SN305: Ghostery</title>
      <pubDate>Thu, 16 Jun 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-305-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-305-lq.mp3</guid>
      <description>This week, after catching up on the week's security and privacy news, Steve and Leo take a close look at &quot;Ghostery,&quot; a highly recommended, multi-OS, multi-browser extension that reveals all of the tracking bugs and cookies websites are hosting to track us, and optionally allows them to be blocked.</description>
      <enclosure url="http://media.grc.com/sn/sn-305-lq.mp3" length="8008957" type="audio/mpeg" />
    </item>
    <item>
      <title>SN304: Listener Feedback #119</title>
      <pubDate>Thu, 09 Jun 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-304-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-304-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-304-lq.mp3" length="10280148" type="audio/mpeg" />
    </item>
    <item>
      <title>SN303: Password Haystacks</title>
      <pubDate>Thu, 02 Jun 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-303-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-303-lq.mp3</guid>
      <description>Steve shares something of a revelation about the true nature of passwords and why &quot;password entropy&quot; really doesn't matter as much as has long been believed. He explains, therefore, how it's possible for passwords to be both memorable AND impossible to crack at the same time.</description>
      <enclosure url="http://media.grc.com/sn/sn-303-lq.mp3" length="10954211" type="audio/mpeg" />
    </item>
    <item>
      <title>SN302: Listener Feedback #118</title>
      <pubDate>Thu, 26 May 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-302-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-302-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-302-lq.mp3" length="11280742" type="audio/mpeg" />
    </item>
    <item>
      <title>SN301: Going Random, Part 2 of 2</title>
      <pubDate>Thu, 19 May 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-301-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-301-lq.mp3</guid>
      <description>After catching up with the week's security and privacy news, we conclude our two-part series discussing the need for, and applications of, random and pseudo-random numbers. We discuss the ways in which a computer, which cannot produce random numbers, can be programmed to do an extremely good job.</description>
      <enclosure url="http://media.grc.com/sn/sn-301-lq.mp3" length="10861529" type="audio/mpeg" />
    </item>
    <item>
      <title>SN300: Listener Feedback #117</title>
      <pubDate>Thu, 12 May 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-300-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-300-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-300-lq.mp3" length="13580539" type="audio/mpeg" />
    </item>
    <item>
      <title>SN299: Going Random, Part 1 of 2</title>
      <pubDate>Thu, 05 May 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-299-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-299-lq.mp3</guid>
      <description>This week's security news and events took up so much time that we didn't have time to cover the entire topic of &quot;Randomness&quot; in security and cryptography. So we split the topic into two parts. This first week we open the topic and explain the background, problem and need. Week after next we'll plow into the solutions.</description>
      <enclosure url="http://media.grc.com/sn/sn-299-lq.mp3" length="10879373" type="audio/mpeg" />
    </item>
    <item>
      <title>SN298: Listener Feedback #116</title>
      <pubDate>Thu, 28 Apr 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-298-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-298-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-298-lq.mp3" length="12215066" type="audio/mpeg" />
    </item>
    <item>
      <title>SN297: Pass-Sentences??</title>
      <pubDate>Thu, 21 Apr 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-297-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-297-lq.mp3</guid>
      <description>After catching up with a number of extra-interesting security news of the week, Steve and Leo explore the recently raised suggestion that using a three word "pass-sentence" such as &quot;I like tomatoes&quot; would be MORE secure (and far more memorable) than "J4f6&amp;lt;2". Short sentences are certainly easier to remember... but more secure?</description>
      <enclosure url="http://media.grc.com/sn/sn-297-lq.mp3" length="10815739" type="audio/mpeg" />
    </item>
    <item>
      <title>SN296: Listener Feedback #115</title>
      <pubDate>Thu, 14 Apr 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-296-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-296-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-296-lq.mp3" length="13004696" type="audio/mpeg" />
    </item>
    <item>
      <title>SN295: The Comodo SSL Breach</title>
      <pubDate>Thu, 07 Apr 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-295-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-295-lq.mp3</guid>
      <description>After catching up with the past week's very busy security news, Leo and I closely examine the circumstances and repercussions surrounding the mid-March breach of the Comodo SSL certificate authority certificate signing system.</description>
      <enclosure url="http://media.grc.com/sn/sn-295-lq.mp3" length="9196774" type="audio/mpeg" />
    </item>
    <item>
      <title>SN294: Listener Feedback #114</title>
      <pubDate>Thu, 31 Mar 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-294-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-294-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-294-lq.mp3" length="12283611" type="audio/mpeg" />
    </item>
    <item>
      <title>SN293: IE9</title>
      <pubDate>Thu, 24 Mar 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-293-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-293-lq.mp3</guid>
      <description>After catching up with a great deal of security news and interesting computer industry miscellania, Steve shares everything he has recently learned from his extensive study into the new security and privacy features of IE9.</description>
      <enclosure url="http://media.grc.com/sn/sn-293-lq.mp3" length="11341740" type="audio/mpeg" />
    </item>
    <item>
      <title>SN292: Listener Feedback #113</title>
      <pubDate>Thu, 17 Mar 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-292-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-292-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-292-lq.mp3" length="9985567" type="audio/mpeg" />
    </item>
    <item>
      <title>SN291: Stuxnet</title>
      <pubDate>Thu, 10 Mar 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-291-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-291-lq.mp3</guid>
      <description>After catching up with a very busy week of software updates and wide-ranging security news, Steve &amp; Leo discuss the revelations documented in Symantec's comprehensive &quot;Stuxnet Dossier.&quot;</description>
      <enclosure url="http://media.grc.com/sn/sn-291-lq.mp3" length="10853982" type="audio/mpeg" />
    </item>
    <item>
      <title>SN290: Listener Feedback #112</title>
      <pubDate>Thu, 03 Mar 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-290-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-290-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-290-lq.mp3" length="11247282" type="audio/mpeg" />
    </item>
    <item>
      <title>SN289: Proxied Surfing</title>
      <pubDate>Thu, 24 Feb 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-289-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-289-lq.mp3</guid>
      <description>After catching up with the week's security updates and other security-related news, Leo and I discuss the many modes of operation of &quot;Proxied Web Surfing&quot; which are used to bypass firewalls and Internet filters, aid free speech, and alter the contents of web pages retrieved from the Internet.</description>
      <enclosure url="http://media.grc.com/sn/sn-289-lq.mp3" length="12108069" type="audio/mpeg" />
    </item>
    <item>
      <title>SN288: Listener Feedback #111</title>
      <pubDate>Thu, 17 Feb 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-288-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-288-lq.mp3</guid>
      <description>Tom Merritt and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-288-lq.mp3" length="10982922" type="audio/mpeg" />
    </item>
    <item>
      <title>SN287: BitCoin CryptoCurrency</title>
      <pubDate>Thu, 10 Feb 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-287-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-287-lq.mp3</guid>
      <description>This week, after catching up with a busy &quot;Patch Tuesday,&quot; Tom Merritt and I explore the fascinating crypto technology developed to create &quot;BitCoin,&quot; the Internet's decentralized peer-to-peer completely private online currency exchange system.</description>
      <enclosure url="http://media.grc.com/sn/sn-287-lq.mp3" length="9928411" type="audio/mpeg" />
    </item>
    <item>
      <title>SN286: Listener Feedback #110</title>
      <pubDate>Thu, 03 Feb 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-286-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-286-lq.mp3</guid>
      <description>Tom Merritt and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-286-lq.mp3" length="11082919" type="audio/mpeg" />
    </item>
    <item>
      <title>SN285: Fuzzy Browsers</title>
      <pubDate>Thu, 27 Jan 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-285-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-285-lq.mp3</guid>
      <description>After catching up with the week's security updates and news, Leo and I examine the use of &quot;code fuzzing&quot; to locate functional defects in the web browsers we use every day.  Surprisingly, every browser in use today can be crashed with this technique.</description>
      <enclosure url="http://media.grc.com/sn/sn-285-lq.mp3" length="8065254" type="audio/mpeg" />
    </item>
    <item>
      <title>SN284: Listener Feedback #109</title>
      <pubDate>Thu, 20 Jan 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-284-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-284-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-284-lq.mp3" length="9507736" type="audio/mpeg" />
    </item>
    <item>
      <title>SN283: Bluetooth Hacking</title>
      <pubDate>Thu, 13 Jan 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-283-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-283-lq.mp3</guid>
      <description>After catching up with the week's security and privacy news, Leo and I complete our analysis of the Bluetooth security by examining the history and current status of Bluetooth hacking exploits. We conclude with a set of recommendations for minimizing the Bluetooth attack surface.</description>
      <enclosure url="http://media.grc.com/sn/sn-283-lq.mp3" length="7945718" type="audio/mpeg" />
    </item>
    <item>
      <title>SN282: Listener Feedback #108</title>
      <pubDate>Thu, 06 Jan 2011 18:00:00 -0800</pubDate>
      <link>http://media.grc.com/sn/sn-282-lq.mp3</link>
      <itunes:author>TWiT</itunes:author>
      <category>Technology</category>
      <category>Security</category>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">http://media.grc.com/sn/sn-282-lq.mp3</guid>
      <description>Leo and I discuss the week's major security events and discuss questions and comments from listeners of previous episodes.  We tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed.</description>
      <enclosure url="http://media.grc.com/sn/sn-282-lq.mp3" length="11570904" type="audio/mpeg" />
    </item>
  </channel>
</rss>
