-
Listen Now
EPISODE 231
Broadcast Date:
July 6, 202224 minutes
Podcast Jul 06, 2022Root Causes 231: What Is FIDO?
We explain device-centric authentication, the FIDO Alliance, WebAuthn, and how it all works.
-
Listen Now
EPISODE 230
Broadcast Date:
June 30, 202216 minutes
Podcast Jun 30, 2022Root Causes 230: What Is Apple Passkey?
Apple recently announced its Passkey functionality, which will allow passwordless authentication with supporting web services through key exchange.
-
Listen Now
EPISODE 229
Broadcast Date:
June 8, 202222 minutes
Podcast Jun 08, 2022Root Causes 229: Browsing Collectives and the 80/20 Rule of Privacy
In this follow-on to our two previous podcasts, we elucidate additional potential schemes for preserving consumer privacy.
-
Listen Now
EPISODE 228
Broadcast Date:
June 1, 202214 minutes
Podcast Jun 01, 2022Root Causes 228: Getting the FLoC out of Here
We discuss Google's Federated Learning of Cohorts (FLoC) initiative, why it failed, and other privacy directions the industry is looking in.
-
Listen Now
EPISODE 227
Broadcast Date:
May 27, 202224 minutes
Podcast May 27, 2022Root Causes 227: Let's Talk About Cookies
We discuss the many ways web users can be tracked including cross-site cookies, tracking pixels, and browser fingerprinting.
-
Listen Now
EPISODE 226
Broadcast Date:
May 24, 202221 minutes
Podcast May 24, 2022Root Causes 226: The Six Benefits of SSH Certificates
We identify the six main benefits of SSH certificates and how they mitigate the problems with SSH identified in earlier episodes.
-
Listen Now
EPISODE 225
Broadcast Date:
May 20, 202215 minutes
Podcast May 20, 2022Root Causes 225: Relying Parties Versus Certificate Consumers
We define the four main roles in the public trust ecosystem: CA, Subscriber, Certificate Consumer, and Relying Party, with real-world examples.
-
Listen Now
EPISODE 224
Broadcast Date:
May 17, 202219 minutes
Podcast May 17, 2022Root Causes 224: The Five Problems with SSH Keys
We discuss the five problems SSH keys present to organizations using them. And we give a peek at how to solve these problems.
-
Listen Now
EPISODE 223
Broadcast Date:
May 13, 202215 minutes
Podcast May 13, 2022Root Causes 223: CT Log-Enabled Attacks on WordPress Sites
Attackers are using CT logs to identify brand new WordPress sites and install malware before upcoming security measures are in place.
-
Listen Now
EPISODE 222
Broadcast Date:
May 11, 202210 minutes
Podcast May 11, 2022Root Causes 222: Consolidation and PKI Solutions
Vendor consolidation is an important topic in IT security. In this episode we discuss this trend and how it affects PKI and digital certificates.
-
Listen Now
EPISODE 221
Broadcast Date:
May 5, 202215 minutes
Podcast May 05, 2022Root Causes 221: What Are SSH Keys?
SSH (Secure Shell) keys are ubiquitous for authenticated access to Linux systems. We explain what these keys are and how they're used.
-
Listen Now
EPISODE 220
Broadcast Date:
May 2, 202214 minutes
Podcast May 02, 2022Root Causes 220: The Difference Between OTP and Passwordless
In this episode we clarify the difference between OTP services and passwordless authentication.