goodlisten

Clip

Cracking the Code on a Conference Lanyard
listen on Spotify
08:57 - 10:14 (01:16)

A DefCon attendee deciphers a hidden message on their conference lanyard by using a clue from the conference schedule, leading to the discovery of a launch key and a secret webpage.

Similar Clips
The speaker describes his experience solving a puzzle at a conference by finding someone who knew the code word 'ghost' among a crowd of 10,000 people by profiling them for language skills.
11:24 - 12:49 (01:25)
listen on Spotify
Conference Puzzle
Summary

The speaker describes his experience solving a puzzle at a conference by finding someone who knew the code word 'ghost' among a crowd of 10,000 people by profiling them for language skills.

Chapter
Uncovering Clues in a Mysterious Puzzle Hunt
Episode
Ep 43: PPP
Podcast
Darknet Diaries
A group of friends discovered that a computer in their cottage was reportedly sending messages from the year 1546.
03:18 - 05:01 (01:43)
listen on Spotify
Time Travel
Summary

A group of friends discovered that a computer in their cottage was reportedly sending messages from the year 1546. The messages appeared on a word processing program without any connection to the internet or modem, and nobody knew who was sending these mysterious messages.

Chapter
Mysterious Messages from the Past
Episode
Short Stuff: Dodleston Messages
Podcast
Stuff You Should Know
The Voynich Manuscript, a handwritten book filled with bizarre illustrations and an unrecognizable language, has baffled codebreakers for over a century.
45:30 - 47:31 (02:01)
listen on SpotifyListen on Youtube
Voynich Manuscript
Summary

The Voynich Manuscript, a handwritten book filled with bizarre illustrations and an unrecognizable language, has baffled codebreakers for over a century. While some theorize it may be a codebook or alchemical text, others believe it's simply a to-do list or hoax.

Chapter
The Early Days of Social Media
Episode
Selects: The Baffling Case of the Body On Somerton Beach
Podcast
Stuff You Should Know
A theory suggests that the Iranian government may have been involved in a cyber attack, leading to increased loyalty and distrust among its citizens.
21:46 - 25:01 (03:15)
listen on Spotify
Iran
Summary

A theory suggests that the Iranian government may have been involved in a cyber attack, leading to increased loyalty and distrust among its citizens. The government then worked to eliminate opposition in the aftermath.

Chapter
Potential Iranian Government Involvement in Hacking
Episode
Ep 3: DigiNotar, You are the Weakest Link, Good Bye!
Podcast
Darknet Diaries
The Windows utility LSAS stores usernames and passwords in clear text in the memory, posing a significant security threat for shared computers, opening the possibility of accessing all users' passwords and potentially even the admin account.
03:20 - 07:17 (03:57)
listen on Spotify
Cybersecurity
Summary

The Windows utility LSAS stores usernames and passwords in clear text in the memory, posing a significant security threat for shared computers, opening the possibility of accessing all users' passwords and potentially even the admin account.

Chapter
The Petia Virus Explained
Episode
54: NotPetya
Podcast
Darknet Diaries