Joinhosts Lisa Monaco and Ken Wainstein, former Advisors to the President on Homeland Security and Counterterrorism, as they break down national security and foreign policy news making the headlines in this ad-free bi-weekly podcast.
Join former Justice Department National Security Chief John Carlin as he engages thought leaders from the government and the private sector to make sense of the issues at the intersection of cyber, policy, and law in this ad-free bi-weekly podcast.
Have you ever thought how important open data is in today's world? Are you curious about its practical applications and the challenges around it? Would you like to know what's coming next in the world of open data? Well, you are in for a treat with our six-episode podcast series on
data.europa.eu! Grab your coffee or tea and join us at the 'Open Data Cafe' podcast.
To this final episode of the podcast series, we invited Daniele Rizzi, who served with the European Commission and recently retired after decades dedicated to advancing European efforts in promoting data supply and re-use. In this episode, he takes us on a quick journey through nearly 20 years of data strategy and regulatory history and shares his insights on what the future holds.
Our guest is Dominique Roest, a management consultant with Capgemini Invent working on FARM project. She shares with us the story of her team addressing societal challenges, using data to support small hold farmers. In conversation with the host, she discusses the essential skills to make the project successful, the types of data used, and the importance of involving users.
In this episode, Hans Graux, attorney-at-law and partner at Timelex, helps us understand the fundamental principles of the digital world. He explains the practical legal aspects of reusing data and the importance of licensing, responsibility and liability when using it, for example, to train artificial intelligence models.
Our guest Ian Makgill, an entrepreneur and founder of SpendNetwork, describes the challenges of procurement data and how these challenges have evolved over time. He shares with us the insights into what it takes to be a successful entrepreneur, especially when relying heavily on open data.
In this episode, we talk to John Harnisher, Head of Research at DataKind, about how most data projects need to begin with the preparation of the data itself and how critical this stage is for the overall success of the operation. He also defines data governance and addresses the challenge of tracking data sources.
To kick off this podcast series, we invited Stefaan Verhulst, co-founder, Chief of Research and Development, and Director of the Data Program of the Governance Laboratory in New York City. In conversation with our host, Gianfranco Cecconi, he introduces the concept of open data and discusses the various waves that have transformed open data over time, namely freedom of information, civic tech and the potential application of generative AI.
The Publications Office of the European Union is the official provider of publishing services to all EU institutions, bodies, and agencies. As such, it is a central point of access to EU law, publications, open data, research results, procurement notices and other official information.
The Freedive Cafe Podcast is available on all good podcast players!For freediving courses in Dahab, Egypt, visit the main website www.freediveandthrive.comOriginally produced between 2019 and 2021, the Lost Episodes of The...
The Freedive Cafe Podcast is available on all good podcast players!For freediving courses in Dahab, Egypt, visit the main website www.freediveandthrive.comStphane Tourreau started diving at the age of ten around the waters...
The Freedive Cafe Podcast is available on all good podcast players!Erika Schagatay PhD grew up in northern Sweden, far from the sea but eventually went to Lund University in southern Sweden to study biology, focusing on...
The Freedive Cafe Podcast is available on all good podcast players!Alenka Artink is the deepest female freediver in the world. Originating from Slovenia, she transformed her life and broke free of her old bonds to pursue...
The Freedive Cafe Podcast is available on all good podcast players!Originally produced between 2019 and 2021, the Lost Episodes of The Freedive Cafe were originally released as exclusive content for Patreon subscribers,...
The Freedive Cafe Podcast is available on all good podcast players!Kateryna Sadurska is a world record holding freediving athlete from Ukraine. Kate joined me at The Little Blue in Dahab to discuss her amazing 2023, how she...
Freediving Courses Schedule
Remote Coaching Options
New Freedive Cafe Podcast Releases
New Freediving Journal Podcast Releases
New YouTube Video Content
New Transcript Releases
PATREON Exclusive Content Releases
Tim Nguyen has a wonderful podcast called the Cartesian Cafe, where he interviews for an extended time people on a technical topic. Some people he interviewed include Scott Aaronson, John Baez, Tai-Danae Bradley, Sean Carroll, Richard Easther, Alex Kontorovich, Po-Shen Loh, Grant Sanderson, Daniel Schroeder, Ethan Siegel, Greg Yang, and John Urschel.
Recently, Tim interviewed me about cryptography. You can find the discussion on youtube, apple podcasts, or spotify. (In the video version, we used an ipad as a whiteboard, so that may be the most useful one.) A lot of it is based on my notes at
intensecrypto.org.
Boaz: 00:00:00 GPT and others have not touched cryptography at all. AI can do a lot of things that humans can do, but humans cannot break encryption schemes like AES and neither can AI.
Tim: 00:04:10 I never thought of students being the main reason for going. But I guess there are many reasons. I figured maybe the intellectual freedom in academia and maybe the less freedom in industry might be the more motivating factor.
One historical example is the sad story of Mary, Queen of Scots, who used a substitution cipher in a plot to free herself and assassinate her cousin. The cipher was broken by frequency analysis, leading to her execution.
Boaz: 00:31:49 The Enigma was much more complicated. It was like a typewriter where every time you press a key, a set of rotors move that determines the permutation between inputs and outputs. The number of permutations is immense, so you really had to understand the structure of the Enigma to break it. The Polish intelligence made the first breakthroughs, and then the British took it to the next level, mechanizing the process at Bletchley Park with Alan Turing heavily involved.
Boaz: 00:33:31 At some point, they did obtain some physical copies. The Germans switched machines or settings during the war, making it more complex. The Enigma was based on a cipher constructed before the war by some Germans, so the Allies had some idea of its operation.
Boaz: 00:39:08 Exactly. Now that we have a definition of what an encryption scheme is, a pair of functions where encryption maps a plaintext and a key into a ciphertext and decryption maps a ciphertext and the key back into a plaintext, we can start talking about what it means to be secure.
Boaz: 00:43:13 Yes, yes. And in fact, in cryptography, we often kind of super steel man your opponent in the sense that you assume that your opponent has much more computational power than you, because if you think about actually using cryptography in practice, every time we go on the web, we are using encryption and decryption. So this has to be very computationally efficient operation. Encryption decryption itself has to be done very efficiently because we do it all the time. But the adversary might only be interested in a very particular message so they can invest a lot of computational resources into breaking that message. So we often want breaking the encryption to be much, much more difficult than using the
Tim: 00:45:52 secure, right? So basically Eve can see everything, right? So Eve can see why the encrypted message, but, but nothing else, right? And also Eve has full access to the function capital E as well.
Boaz: 00:56:00 Yes. What we want is some kind of experiment like the following: X is a sample from some probability distribution M on messages. And then, we could hope that a probability over both the choice of X from M and the choice of key from 0 to 1 to the power of n that Eve guesses X is at most the best possible guess for Eve. This is the definition that Shannon came up with.
Boaz: 01:09:23 Definitely. The people that invented differential privacy are cryptographers. They come from this field and were very inspired by cryptography. Cynthia Dwork, my colleague at Harvard, did very strong work in cryptography and was very much inspired by cryptography when they came up with this privacy definition.
Boaz: 01:29:32 Yes. And in some sense, if you know information theory, then you can prove this with information theory. By basically saying there must be some non-zero mutual information between the ciphertext and the messages. Ah, I see. Okay. So you can use information theory. It will be something like, I think this is basically what we could say is right. So we look at the mutual information between why the ciphertext and the, and, and, and the, say X, the message, right? And that basically, there are like three sources of randomness. There are say two sources of randomness here, the message and the key. Right. And we know that, because you can decode, we know that this has to be at least the entropy of X. Okay? Because, because you can decrypt, right? So y has to contain all the information about x. And the only source of randomness after you condition on X is the key. So this has to be at most the entropy of the key. Okay. So this has to be a, so if the entropy of the key is less than the entropy of X, then this is positive. Ah, so there is mutual information between the ciphertext and the message. Which breaks the notion of secrecy.
3a8082e126