<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 13:53:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Speck”</title>
    <link>https://techsnap.systems/tags/speck</link>
    <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
