

We also have a bit of errata and some fun miscellany.
Tor messenger sunsetting how to#
This week we examine how Estonia handled the Infineon crypto bug two additional consequences of the pressure to maliciously mine cryptocurrency zero-day exploits in the popular vBulletin forum system Mozilla in the doghouse over “Mr. Robot” Win10’s insecure password manager mistake when legacy protocol come back to bite us how to bulk-steal any Chrome user’s entire stored password vault and we finally know where and why the uber-potent Mirai botnet was created, and by whom. For the other resources you can either LEFT-CLICK to open in your browser or RIGHT-CLICK to save the resource to your computer. Than the audio files since they are created afterwards.)įor best results: RIGHT-CLICK on one of the two audio icons & below then choose "Save Target As." to download the audio file to your computer before starting to listen. (Note that the text transcripts will appear a few hours later We use "local links" to count downloads, but all of the high-quality full-size MP3 files are being served by AOL Radio.Ī web page text transcript of the episode
Tor messenger sunsetting series#
Leo also produces " This Week in Tech" (TWiT) and a number of other very popular podcasts (TWiT is America's most listened to podcast!) So if you are looking for more informed technology talk, be sure to check out Leo's other podcasts and mp3 files.Īnd a huge thanks to AOL Radio for hosting the high-quality MP3 files and providing the bandwidth to make this series possible. Send us your feedback: Use the form at the bottom of the page to share your opinions, thoughts, ideas, and suggestions for future episodes.

See the section at the bottom of this page. Receive an automatic eMail reminder whenever a new episode is posted here (from ). To subscribe, use whichever service you prefer. You may download and listen to selected episodes from this page (see below), or subscribe to the ongoing series as an RSS "podcast" to have them automatically downloaded to you as they are produced. Either way, every week we endeavor to produce something interesting and important for every personal computer user. Sometimes we'll talk about long-standing problems, concerns, or solutions. Sometimes we'll discuss something that just happened. TechTV's Leo Laporte and I take 30 to 90 minutes near the end of each week to discuss important issues of personal computer security.
