<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
    <channel>
        <generator>RedCircle VERIFY_TOKEN_9ef08af1-edec-4c9a-a15f-2ce17b479fa3  -- Rendered At Thu, 21 May 2026 19:27:43 &#43;0000</generator>
        <title>3 Security Buddies</title>
        <link>https://redcircle.com/shows/3-security-buddies</link>
        <language>en-US</language>
        <copyright>All rights reserved.</copyright>
        <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
        <itunes:summary>Weekly podcast where three security buddies discuss security topics.</itunes:summary>
        <podcast:guid>9ef08af1-edec-4c9a-a15f-2ce17b479fa3</podcast:guid>
        
        <description><![CDATA[<p>Weekly podcast where three security buddies discuss security topics.</p>]]></description>
        
        <itunes:type>episodic</itunes:type>
        <podcast:locked>no</podcast:locked>
        <itunes:owner>
            <itunes:name>Paul Kehrer, Robert Clark, Matias Brutti</itunes:name>
            <itunes:email>matiasbrutti@gmail.com</itunes:email>
        </itunes:owner>
        
        <itunes:image href="https://media.redcircle.com/images/2021/5/4/2/636cec7c-36fb-470c-b8f6-d4a96b6b9d00_blob.jpg"/>
        
        
        
            
            <itunes:category text="Technology" />

            

        
        
            
            <itunes:category text="News">

            
                <itunes:category text="Tech News"/>
            

        </itunes:category>
        

        
        <itunes:explicit>yes</itunes:explicit>
        
        
        
        
        
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-8: Password Complexity</itunes:title>
                <title>3SB-8: Password Complexity</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Follow up:</strong></p><ul><li>No follow ups</li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>NIST changing password requirements</li><li>Roundtable how we got into security + suggestions</li></ul><p><br></p><p><strong>Paul Rant:</strong></p><ul><li>Paul is on vacation. No Rants.  </li></ul><p><br></p><p><strong>Links:</strong></p><ul><li><a href="https://pages.nist.gov/800-63-3/sp800-63b.html" rel="nofollow">https://pages.nist.gov/800-63-3/sp800-63b.html</a><span> </span></li><li><a href="https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords" rel="nofollow">https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords</a><span> </span></li></ul><p><br></p><p><strong>Hosts</strong>:</p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Special Guest:</strong></p><p>Travis McPeak @travismcpeak </p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer: </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Follow up:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;No follow ups&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;NIST changing password requirements&lt;/li&gt;&lt;li&gt;Roundtable how we got into security &#43; suggestions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Paul is on vacation. No Rants.  &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://pages.nist.gov/800-63-3/sp800-63b.html&#34; rel=&#34;nofollow&#34;&gt;https://pages.nist.gov/800-63-3/sp800-63b.html&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords&#34; rel=&#34;nofollow&#34;&gt;https://www.ncsc.gov.uk/blog-post/let-them-paste-passwords&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts&lt;/strong&gt;:&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Special Guest:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Travis McPeak @travismcpeak &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer: &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="57951294" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/9984cd73-f73f-4f56-8d45-1b8637e7030e/stream.mp3"/>
                
                <guid isPermaLink="false">740f85a8-58d2-4245-9a01-6fc13a526509</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/9984cd73-f73f-4f56-8d45-1b8637e7030e</link>
                <pubDate>Thu, 24 Jun 2021 19:29:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/6/24/19/c459b14b-3813-4b6b-96e8-3553b7e26967_3sb_logo.jpg"/>
                <itunes:duration>3621</itunes:duration>
                
                
                <itunes:explicit>yes</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-7: 🍎 Security Worms</itunes:title>
                <title>3SB-7: 🍎 Security Worms</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Follow up:</strong></p><ul><li>US is elevating ransomware the same level of terrorism.</li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>Apple Security WWDC</li><li>Move beyond passwords ( iCloud Keychain WebAuthN keys ) </li><li>Discover account-driven User Enrollment</li><li>Secure login with iCloud Keychain verification codes ( domain-binding apple-totp )</li><li>Polkit PrivEsc</li><li>Growing abuse of Kubernetes (it’s not containers) </li></ul><p><br></p><p><strong>Paul Rant:</strong></p><ul><li>Apple Bug Report blackhole  </li></ul><p><br></p><p><strong>Links:</strong></p><ul><li><a href="https://www.reuters.com/technology/exclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03/" rel="nofollow">https://www.reuters.com/technology/exclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03/</a><span> </span></li><li><a href="https://threatpost.com/microsoft-cryptomining-kubeflow/166777/" rel="nofollow">https://threatpost.com/microsoft-cryptomining-kubeflow/166777/</a></li><li><a href="https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/" rel="nofollow">https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/</a><span> </span></li></ul><p><br></p><p><strong>Hosts</strong>:</p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer: </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Follow up:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;US is elevating ransomware the same level of terrorism.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Apple Security WWDC&lt;/li&gt;&lt;li&gt;Move beyond passwords ( iCloud Keychain WebAuthN keys ) &lt;/li&gt;&lt;li&gt;Discover account-driven User Enrollment&lt;/li&gt;&lt;li&gt;Secure login with iCloud Keychain verification codes ( domain-binding apple-totp )&lt;/li&gt;&lt;li&gt;Polkit PrivEsc&lt;/li&gt;&lt;li&gt;Growing abuse of Kubernetes (it’s not containers) &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Apple Bug Report blackhole  &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.reuters.com/technology/exclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03/&#34; rel=&#34;nofollow&#34;&gt;https://www.reuters.com/technology/exclusive-us-give-ransomware-hacks-similar-priority-terrorism-official-says-2021-06-03/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://threatpost.com/microsoft-cryptomining-kubeflow/166777/&#34; rel=&#34;nofollow&#34;&gt;https://threatpost.com/microsoft-cryptomining-kubeflow/166777/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/&#34; rel=&#34;nofollow&#34;&gt;https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts&lt;/strong&gt;:&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer: &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="84855327" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/081d3d1f-ada4-446f-9d54-de2800dfd707/stream.mp3"/>
                
                <guid isPermaLink="false">46745c46-885c-4bc3-9c1b-66fee87e09d2</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/081d3d1f-ada4-446f-9d54-de2800dfd707</link>
                <pubDate>Wed, 16 Jun 2021 03:20:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/6/16/3/98079bea-7660-4352-86d2-b1e683b405c3_3sb_logo.jpg"/>
                <itunes:duration>5303</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-6: Dependency Hell</itunes:title>
                <title>3SB-6: Dependency Hell</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Follow up:</strong></p><p> - Nothing this week</p><p><br></p><p><strong>Topics:</strong></p><ul><li>Automated Fuzzing Testing in Go</li><li>Stack Overflow Supply Chain Attacks</li><li>Deps.dev</li><li>Update on Github’s policies regarding exploits, malware, and vulnerability research</li></ul><p><strong>Paul Rant:</strong></p><ul><li>Pinning dependencies on Libraries </li></ul><p><br></p><p><strong>Links:</strong></p><ul><li><a href="https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/" rel="nofollow">https://blog.golang.com/fuzz-beta</a></li><li><a href="https://www.wsj.com/articles/software-developer-community-stack-overflow-sold-to-tech-giant-prosus-for-1-8-billion-11622648400" rel="nofollow">https://www.wsj.com/articles/software-developer-community-stack-overflow-sold-to-tech-giant-prosus-for-1-8-billion-11622648400</a></li><li><a href="https://deps.dev" rel="nofollow">https://deps.dev</a></li><li><a href="https://github.blog/2021-06-04-updates-to-our-policies-regarding-exploits-malware-and-vulnerability-research/" rel="nofollow">https://github.blog/2021-06-04-updates-to-our-policies-regarding-exploits-malware-and-vulnerability-research/</a></li></ul><p><br></p><p><strong>Hosts</strong>:</p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer: </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Follow up:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt; - Nothing this week&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Automated Fuzzing Testing in Go&lt;/li&gt;&lt;li&gt;Stack Overflow Supply Chain Attacks&lt;/li&gt;&lt;li&gt;Deps.dev&lt;/li&gt;&lt;li&gt;Update on Github’s policies regarding exploits, malware, and vulnerability research&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Pinning dependencies on Libraries &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/&#34; rel=&#34;nofollow&#34;&gt;https://blog.golang.com/fuzz-beta&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.wsj.com/articles/software-developer-community-stack-overflow-sold-to-tech-giant-prosus-for-1-8-billion-11622648400&#34; rel=&#34;nofollow&#34;&gt;https://www.wsj.com/articles/software-developer-community-stack-overflow-sold-to-tech-giant-prosus-for-1-8-billion-11622648400&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://deps.dev&#34; rel=&#34;nofollow&#34;&gt;https://deps.dev&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://github.blog/2021-06-04-updates-to-our-policies-regarding-exploits-malware-and-vulnerability-research/&#34; rel=&#34;nofollow&#34;&gt;https://github.blog/2021-06-04-updates-to-our-policies-regarding-exploits-malware-and-vulnerability-research/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts&lt;/strong&gt;:&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer: &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="52595983" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/c4a8263f-ed7e-4b89-9177-edbd27f44974/stream.mp3"/>
                
                <guid isPermaLink="false">0fd4637a-d449-422c-a797-b02453d04978</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/c4a8263f-ed7e-4b89-9177-edbd27f44974</link>
                <pubDate>Wed, 09 Jun 2021 21:40:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/6/9/21/c74303df-96b6-4b27-aa4e-542743501ab9_3sb_logo.jpg"/>
                <itunes:duration>3287</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-5: Hardware Apocalypses</itunes:title>
                <title>3SB-5: Hardware Apocalypses</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Follow up:</strong></p><ul><li>Vaxxed || Mask Rant Update</li><li>WhatsApp will not be removing functionality.</li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>OpenSSL Rustification</li><li>Data without context is useless </li><li>AMD attacks on Virtual Machine Protection System.</li><li>M1ssing Register Access Controls Leak EL0 State</li></ul><p><br></p><p><strong>Paul Rant:</strong></p><ul><li>QC35 switch is garbage. GARBAGE!</li></ul><p><br></p><p><strong>Links:</strong></p><ul><li><a href="https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/" rel="nofollow">https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/</a></li><li><a href="https://m1racles.com" rel="nofollow">https://m1racles.com</a></li></ul><p><br></p><p><strong>Hosts</strong>:</p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer: </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p><p><br></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Follow up:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Vaxxed || Mask Rant Update&lt;/li&gt;&lt;li&gt;WhatsApp will not be removing functionality.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;OpenSSL Rustification&lt;/li&gt;&lt;li&gt;Data without context is useless &lt;/li&gt;&lt;li&gt;AMD attacks on Virtual Machine Protection System.&lt;/li&gt;&lt;li&gt;M1ssing Register Access Controls Leak EL0 State&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;QC35 switch is garbage. GARBAGE!&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/&#34; rel=&#34;nofollow&#34;&gt;https://therecord.media/two-attacks-disclosed-against-amds-sev-virtual-machine-protection-system/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://m1racles.com&#34; rel=&#34;nofollow&#34;&gt;https://m1racles.com&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts&lt;/strong&gt;:&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer: &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="63007346" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/cff7ae99-09d3-4758-9a52-296f7275f442/stream.mp3"/>
                
                <guid isPermaLink="false">27390ce2-ae4a-4b05-897d-e44265e7fe0a</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/cff7ae99-09d3-4758-9a52-296f7275f442</link>
                <pubDate>Thu, 03 Jun 2021 06:08:26 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/6/3/6/f73af5ce-14b1-4ad0-833d-357b66e3d21f_3sb_logo.jpg"/>
                <itunes:duration>3937</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-4: EuroCyberVision</itunes:title>
                <title>3SB-4: EuroCyberVision</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Episode Follow up:</strong></p><ul><li>Codecov Mercari </li><li>Audacity Open Source Telemetry </li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>WhatsApp: Give me your privacy or I will stop working. </li><li>Russian Keyboard as a first line of defense </li><li> Craig Federighi MacOS vs iOS Security Model </li></ul><p><br></p><p><strong>Paul Rant:</strong></p><ul><li>Vaxxed or Mask. Trust by Verify Rant by Matias Brutti. </li></ul><p><br></p><p><strong>Links:</strong></p><ul><li>https://about.mercari.com/en/press/news/articles/20210521_incident_report/</li><li>https://github.com/audacity/audacity/discussions/889</li><li>https://blog.malwarebytes.com/privacy-2/2021/05/whatsapp-calls-and-messages-will-break-unless-you-share-data-with-facebook/</li><li>https://www.schneier.com/blog/archives/2021/05/adding-a-russian-keyboard-to-protect-against-ransomware.html</li><li>https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/</li><li>https://9to5mac.com/2021/05/19/craig-federighi-mac-malware-problem/</li><li>https://www.imore.com/craig-federighi-defends-iphone-security-throwing-mac-under-bus</li></ul><p><br></p><p><br></p><p><strong>Hosts:</strong></p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer:</strong> <em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Episode Follow up:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Codecov Mercari &lt;/li&gt;&lt;li&gt;Audacity Open Source Telemetry &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;WhatsApp: Give me your privacy or I will stop working. &lt;/li&gt;&lt;li&gt;Russian Keyboard as a first line of defense &lt;/li&gt;&lt;li&gt; Craig Federighi MacOS vs iOS Security Model &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Vaxxed or Mask. Trust by Verify Rant by Matias Brutti. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;https://about.mercari.com/en/press/news/articles/20210521_incident_report/&lt;/li&gt;&lt;li&gt;https://github.com/audacity/audacity/discussions/889&lt;/li&gt;&lt;li&gt;https://blog.malwarebytes.com/privacy-2/2021/05/whatsapp-calls-and-messages-will-break-unless-you-share-data-with-facebook/&lt;/li&gt;&lt;li&gt;https://www.schneier.com/blog/archives/2021/05/adding-a-russian-keyboard-to-protect-against-ransomware.html&lt;/li&gt;&lt;li&gt;https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/&lt;/li&gt;&lt;li&gt;https://9to5mac.com/2021/05/19/craig-federighi-mac-malware-problem/&lt;/li&gt;&lt;li&gt;https://www.imore.com/craig-federighi-defends-iphone-security-throwing-mac-under-bus&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer:&lt;/strong&gt; &lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="63391869" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/5ee24a5d-3644-45a7-be5c-0b1cd2d1416c/stream.mp3"/>
                
                <guid isPermaLink="false">b13fd75a-5902-4e3f-9564-0f8333ff0dbb</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/5ee24a5d-3644-45a7-be5c-0b1cd2d1416c</link>
                <pubDate>Wed, 26 May 2021 06:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/5/26/6/a348d969-70b0-4c0f-8116-202fff537062_3sb_logo.jpg"/>
                <itunes:duration>3961</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-3: Zero Trust Cyber</itunes:title>
                <title>3SB-3: Zero Trust Cyber</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Episode 2 Follow up</strong>:</p><ul><li>CodeCov continues to claim victims. Rapid7 &amp; Twilio. </li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>Rob’s python adventures</li><li>Alfredos mouse mic</li><li>FragAttack</li><li>CyberBattleSiem</li></ul><p><br></p><p><strong>Paul Rant:</strong></p><ul><li>ZeroTrust Executive Order By Robert </li></ul><p><strong>Links:</strong></p><ul><li><a href="https://www.rapid7.com/blog/post/2021/05/13/rapid7s-response-to-codecov-incident/" rel="nofollow">https://www.rapid7.com/blog/post/2021/05/13/rapid7s-response-to-codecov-incident/</a> </li><li><a href="https://www.twilio.com/blog/response-to-the-codecov-vulnerability" rel="nofollow">https://www.twilio.com/blog/response-to-the-codecov-vulnerability</a></li><li><a href="https://github.com/ortegaalfredo/mousemic" rel="nofollow">https://github.com/ortegaalfredo/mousemic</a> </li><li><a href="https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/05/fragattack-new-wi-fi-vulnerabilities-that-affect-basically-everything/" rel="nofollow">https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/05/fragattack-new-wi-fi-vulnerabilities-that-affect-basically-everything/</a></li><li><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" rel="nofollow">https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/</a> </li></ul><p><br></p><p><strong>Hosts:</strong></p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer:  </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Episode 2 Follow up&lt;/strong&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;CodeCov continues to claim victims. Rapid7 &amp;amp; Twilio. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Rob’s python adventures&lt;/li&gt;&lt;li&gt;Alfredos mouse mic&lt;/li&gt;&lt;li&gt;FragAttack&lt;/li&gt;&lt;li&gt;CyberBattleSiem&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul Rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;ZeroTrust Executive Order By Robert &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.rapid7.com/blog/post/2021/05/13/rapid7s-response-to-codecov-incident/&#34; rel=&#34;nofollow&#34;&gt;https://www.rapid7.com/blog/post/2021/05/13/rapid7s-response-to-codecov-incident/&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.twilio.com/blog/response-to-the-codecov-vulnerability&#34; rel=&#34;nofollow&#34;&gt;https://www.twilio.com/blog/response-to-the-codecov-vulnerability&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://github.com/ortegaalfredo/mousemic&#34; rel=&#34;nofollow&#34;&gt;https://github.com/ortegaalfredo/mousemic&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/05/fragattack-new-wi-fi-vulnerabilities-that-affect-basically-everything/&#34; rel=&#34;nofollow&#34;&gt;https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/05/fragattack-new-wi-fi-vulnerabilities-that-affect-basically-everything/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&#34; rel=&#34;nofollow&#34;&gt;https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer:  &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="65631294" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/c6031fc3-f86e-4e9f-8edb-14b4ae085fda/stream.mp3"/>
                
                <guid isPermaLink="false">2f3c9c88-9994-48af-8820-ce15ab138f78</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/c6031fc3-f86e-4e9f-8edb-14b4ae085fda</link>
                <pubDate>Wed, 19 May 2021 06:09:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/5/22/17/339b5c1d-c147-4933-abc8-c1dfd674ab5c_4a16a4b4-cfcc-4ba2-9420-621b483aa9f0_3sb_logo.jpg"/>
                <itunes:duration>4101</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-2: BlockChain Tuna</itunes:title>
                <title>3SB-2: BlockChain Tuna</title>

                <itunes:episode>2</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                <itunes:summary>Episode 1 follow up:
Signal continues to make the news. This time hacking Privacy 

Topics:
CocoaPods Trunk: Remote Code Execution found 
Cosign - container image signing. 
TBONE hacking Tesla from a drone with zero clicks. 
SAML XML Injections 
Tinker Twitter threat on: real &amp; physical occupational hazard for infosec.
1Password Secrets Automation 
Google mandatory MFA

Paul’s rant:
-blockchain tuna tracking 

Links:
https://signal.org/blog/the-instagram-ads-you-will-never-see/
https://blog.cocoapods.org/CocoaPods-Trunk-RCE/ 
https://justi.cz/security/2021/04/20/cocoapods-rce.html
https://blog.1password.com/introducing-secrets-automation/
https://kunnamon.io/tbone/
https://research.nccgroup.com/2021/03/29/saml-xml-injection/
https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html 
https://twitter.com/TinkerSec/status/1388107620574171140
https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/

Hosts:
Paul Kehrer @reaperhulk
Robert Clark @hyakuhei
Matías Brutti @MrBrutti

Post-Production:
Matias Brutti @MrBrutti</itunes:summary>
                <description><![CDATA[<p><strong>Episode 1 follow up:</strong></p><ul><li>Signal continues to make the news. This time hacking Privacy </li></ul><p><br></p><p><strong>Topics:</strong></p><ul><li>CocoaPods Trunk: Remote Code Execution found </li><li>Cosign - container image signing. </li><li>TBONE hacking Tesla from a drone with zero clicks. </li><li>SAML XML Injections </li><li>Tinker Twitter threat on: real &amp; physical occupational hazard for infosec.</li><li>1Password Secrets Automation </li><li>Google mandatory MFA</li></ul><p><br></p><p><strong>Paul’s rant:</strong></p><ul><li>-blockchain tuna tracking </li></ul><p><br></p><p><strong>Links:</strong></p><ul><li><a href="https://signal.org/blog/the-instagram-ads-you-will-never-see/" rel="nofollow">https://signal.org/blog/the-instagram-ads-you-will-never-see/</a></li><li><a href="https://blog.cocoapods.org/CocoaPods-Trunk-RCE/" rel="nofollow">https://blog.cocoapods.org/CocoaPods-Trunk-RCE/</a> </li><li><a href="https://justi.cz/security/2021/04/20/cocoapods-rce.html" rel="nofollow">https://justi.cz/security/2021/04/20/cocoapods-rce.html</a></li><li><a href="https://blog.1password.com/introducing-secrets-automation/?utm_campaign=davenewsletter&utm_medium=email&utm_source=newsletter" rel="nofollow">https://blog.1password.com/introducing-secrets-automation/</a></li><li><a href="https://kunnamon.io/tbone/" rel="nofollow">https://kunnamon.io/tbone/</a></li><li><a href="https://research.nccgroup.com/2021/03/29/saml-xml-injection/" rel="nofollow">https://research.nccgroup.com/2021/03/29/saml-xml-injection/</a></li><li><a href="https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html" rel="nofollow">https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html</a> </li><li>https://twitter.com/TinkerSec/status/1388107620574171140</li><li><a href="https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/" rel="nofollow">https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/</a></li></ul><p><br></p><p><strong>Hosts:</strong></p><p>Paul Kehrer @reaperhulk</p><p>Robert Clark @hyakuhei</p><p>Matías Brutti @MrBrutti</p><p><br></p><p><strong>Post-Production:</strong></p><p>Matias Brutti @MrBrutti</p><p><br></p><p><strong>Disclaimer:  </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Episode 1 follow up:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Signal continues to make the news. This time hacking Privacy &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;CocoaPods Trunk: Remote Code Execution found &lt;/li&gt;&lt;li&gt;Cosign - container image signing. &lt;/li&gt;&lt;li&gt;TBONE hacking Tesla from a drone with zero clicks. &lt;/li&gt;&lt;li&gt;SAML XML Injections &lt;/li&gt;&lt;li&gt;Tinker Twitter threat on: real &amp;amp; physical occupational hazard for infosec.&lt;/li&gt;&lt;li&gt;1Password Secrets Automation &lt;/li&gt;&lt;li&gt;Google mandatory MFA&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Paul’s rant:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;-blockchain tuna tracking &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://signal.org/blog/the-instagram-ads-you-will-never-see/&#34; rel=&#34;nofollow&#34;&gt;https://signal.org/blog/the-instagram-ads-you-will-never-see/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://blog.cocoapods.org/CocoaPods-Trunk-RCE/&#34; rel=&#34;nofollow&#34;&gt;https://blog.cocoapods.org/CocoaPods-Trunk-RCE/&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://justi.cz/security/2021/04/20/cocoapods-rce.html&#34; rel=&#34;nofollow&#34;&gt;https://justi.cz/security/2021/04/20/cocoapods-rce.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://blog.1password.com/introducing-secrets-automation/?utm_campaign=davenewsletter&amp;utm_medium=email&amp;utm_source=newsletter&#34; rel=&#34;nofollow&#34;&gt;https://blog.1password.com/introducing-secrets-automation/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://kunnamon.io/tbone/&#34; rel=&#34;nofollow&#34;&gt;https://kunnamon.io/tbone/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://research.nccgroup.com/2021/03/29/saml-xml-injection/&#34; rel=&#34;nofollow&#34;&gt;https://research.nccgroup.com/2021/03/29/saml-xml-injection/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html&#34; rel=&#34;nofollow&#34;&gt;https://security.googleblog.com/2021/05/making-internet-more-secure-one-signed.html&lt;/a&gt; &lt;/li&gt;&lt;li&gt;https://twitter.com/TinkerSec/status/1388107620574171140&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/&#34; rel=&#34;nofollow&#34;&gt;https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Hosts:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Paul Kehrer @reaperhulk&lt;/p&gt;&lt;p&gt;Robert Clark @hyakuhei&lt;/p&gt;&lt;p&gt;Matías Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Post-Production:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Matias Brutti @MrBrutti&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer:  &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="62974746" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/2bbcd8ef-fa89-4b4c-9336-3049727d9df6/stream.mp3"/>
                
                <guid isPermaLink="false">5a7b9b13-906f-4355-8abb-24ce8b2dd330</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/2bbcd8ef-fa89-4b4c-9336-3049727d9df6</link>
                <pubDate>Tue, 11 May 2021 03:30:00 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/5/22/17/e867b609-0f5e-44a0-99bb-5d28656d8521__eba3a75e-a4aa-497f-a09c-881743ec3fb2_3sb_logo.jpg"/>
                <itunes:duration>3935</itunes:duration>
                
                
                <itunes:explicit>yes</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>3SB-1: A New Beginning</itunes:title>
                <title>3SB-1: A New Beginning</title>

                
                
                <itunes:author>Paul Kehrer, Robert Clark, Matias Brutti</itunes:author>
                
                <description><![CDATA[<p><strong>Episode 0 follow up:</strong></p><p>- Signal legal consequences. Robert was right.</p><p><br></p><p><strong>Topics:</strong></p><ul><li>Hypocrite commits </li><li>Apple AirDrop PII leak</li><li>ZK proof Vuln Disclosure</li><li>Software RAID recovery rant by Paul</li></ul><p><br></p><p><strong>Links:</strong></p><ul><li>AirDrop Leak paper (<a href="https://www.usenix.org/system/files/sec21fall-heinrich.pdf" rel="nofollow">https://www.usenix.org/system/files/sec21fall-heinrich.pdf</a>) presented in August at the USENIX Security Symposium</li><li><a href="https://www.scmagazine.com/home/security-news/vulnerabilities/darpa-is-creating-zero-knowledge-proofs-for-vulnerability-disclosure/" rel="nofollow">https://www.scmagazine.com/home/security-news/vulnerabilities/darpa-is-creating-zero-knowledge-proofs-for-vulnerability-disclosure/</a></li></ul><p><br></p><p><strong>Disclaimer:  </strong><em>The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. </em></p>]]></description>
                <content:encoded>&lt;p&gt;&lt;strong&gt;Episode 0 follow up:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- Signal legal consequences. Robert was right.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Topics:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Hypocrite commits &lt;/li&gt;&lt;li&gt;Apple AirDrop PII leak&lt;/li&gt;&lt;li&gt;ZK proof Vuln Disclosure&lt;/li&gt;&lt;li&gt;Software RAID recovery rant by Paul&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Links:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AirDrop Leak paper (&lt;a href=&#34;https://www.usenix.org/system/files/sec21fall-heinrich.pdf&#34; rel=&#34;nofollow&#34;&gt;https://www.usenix.org/system/files/sec21fall-heinrich.pdf&lt;/a&gt;) presented in August at the USENIX Security Symposium&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.scmagazine.com/home/security-news/vulnerabilities/darpa-is-creating-zero-knowledge-proofs-for-vulnerability-disclosure/&#34; rel=&#34;nofollow&#34;&gt;https://www.scmagazine.com/home/security-news/vulnerabilities/darpa-is-creating-zero-knowledge-proofs-for-vulnerability-disclosure/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Disclaimer:  &lt;/strong&gt;&lt;em&gt;The opinions and security statements on this podcast are our own and do not represent that of our respective past, current or future employers. &lt;/em&gt;&lt;/p&gt;</content:encoded>
                
                <enclosure length="45375320" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/52304512-f906-44d8-8093-c53feefa9ce2/stream.mp3"/>
                
                <guid isPermaLink="false">92bb19d4-278a-434f-b77a-34cdc7944bc5</guid>
                <link>https://redcircle.com/shows/9ef08af1-edec-4c9a-a15f-2ce17b479fa3/episodes/52304512-f906-44d8-8093-c53feefa9ce2</link>
                <pubDate>Tue, 04 May 2021 02:24:09 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2021/5/22/17/f83c9452-a344-410e-8621-9236671d026d__bb4d977a-128b-4da9-b8ad-91af83a5590b_3sb_logo.jpg"/>
                <itunes:duration>2835</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
    </channel>
</rss>
