<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/the-all-things-auth-podcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The All Things Auth Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-all-things-auth-podcast</itunes:new-feed-url>
    <description>Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.

Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.

The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own projects and organizations.</description>
    <copyright>© 2019 Conor Gilsenan</copyright>
    <podcast:guid>1c2dcbff-1957-5780-8f03-4440eb0c0ac0</podcast:guid>
    <podcast:locked owner="podcast@allthingsauth.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 10:34:41 -0400</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 15:17:28 -0500</lastBuildDate>
    <link>https://allthingsauth.com/podcast</link>
    <image>
      <url>https://img.transistor.fm/OCeH39WjbVqKq5CLOJh8VR3pjhqJ_mCyD-wMBLotlKk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI2MDkvMTU1OTc5/NzQwNy1hcnR3b3Jr/LmpwZw.jpg</url>
      <title>The All Things Auth Podcast</title>
      <link>https://allthingsauth.com/podcast</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Conor Gilsenan</itunes:author>
    <itunes:image href="https://img.transistor.fm/OCeH39WjbVqKq5CLOJh8VR3pjhqJ_mCyD-wMBLotlKk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI2MDkvMTU1OTc5/NzQwNy1hcnR3b3Jr/LmpwZw.jpg"/>
    <itunes:summary>Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.

Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.

The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own projects and organizations.</itunes:summary>
    <itunes:subtitle>Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.</itunes:subtitle>
    <itunes:keywords>usability, security, privacy, computer, password, authentication, research, startup, founder, cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>Conor Gilsenan</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>#010 - Making Open-Source Software Usable with Ashley Fowler of USABLE.tools</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>#010 - Making Open-Source Software Usable with Ashley Fowler of USABLE.tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4ddf358c-ece3-4b14-bd2c-e4b6ca90789f</guid>
      <link>https://share.transistor.fm/s/6e8387b2</link>
      <description>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Email: <a href="mailto:connect@usable.tool">connect@usable.tools</a></li><li>Twitter: <a href="https://twitter.com/global_ashm">@global_ashm</a>, <a href="https://twitter.com/usable_tools">@USABLE_tools</a></li><li>Website: <a href="https://usable.tools">usable.tools</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Jon Camfield published an article titled "<a href="https://usable.tools/blog/2016-04-22-originstories/">Where did USABLE come from?</a>" that explains the motivation for starting the organization.</li><li>The free <a href="https://usable.tools/blog/2019-10-03-guidebook-launch/">USABLE Guidebook</a> contains resources and activities to help trainers and facilitators to collect relevant and useful feedback from high-risk users.</li><li>The <a href="https://usable.tools/blog/">USABLE blog</a> has a ton of posts about their mission and interviews with their partner organizations.</li><li>Ashley explained how USABLE gets hands-on help from design and user experience partners (<a href="https://simplysecure.org/">Simply Secure</a> and <a href="https://okthanks.com/">OKTHANKS</a>) and accessibility partners (<a href="https://a11ylab.com/">Accessibility Lab</a>).</li><li>Ashley shared the story of working with Thomas, the lead developer of <a href="https://www.mailvelope.com/en">Mailvelope</a>, an app that allows you to send end-to-end encrypted emails. Also, check out the <a href="https://www.mailvelope.com/en/blog/mailvelope-2.2-user-experience">Mailvelope Blog</a>.</li><li>USABLE created detailed <a href="https://usable.tools/personas/">personas</a> to help developers understand how to make their products more usable for at-risk communities around the world.</li><li>USABLE has also recently supported the <a href="https://securedrop.org/">Secure Drop</a>, <a href="https://guardianproject.info/apps/orbot/">Orbot</a>, and <a href="https://keepassxc.org/">KeePass XC</a> projects. The USABLE blog has great interviews with these projects.</li></ul><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/010-ashley-fowler-of-usable-tools">https://allthingsauth.com/podcast/010-ashley-fowler-of-usable-tools</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Email: <a href="mailto:connect@usable.tool">connect@usable.tools</a></li><li>Twitter: <a href="https://twitter.com/global_ashm">@global_ashm</a>, <a href="https://twitter.com/usable_tools">@USABLE_tools</a></li><li>Website: <a href="https://usable.tools">usable.tools</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Jon Camfield published an article titled "<a href="https://usable.tools/blog/2016-04-22-originstories/">Where did USABLE come from?</a>" that explains the motivation for starting the organization.</li><li>The free <a href="https://usable.tools/blog/2019-10-03-guidebook-launch/">USABLE Guidebook</a> contains resources and activities to help trainers and facilitators to collect relevant and useful feedback from high-risk users.</li><li>The <a href="https://usable.tools/blog/">USABLE blog</a> has a ton of posts about their mission and interviews with their partner organizations.</li><li>Ashley explained how USABLE gets hands-on help from design and user experience partners (<a href="https://simplysecure.org/">Simply Secure</a> and <a href="https://okthanks.com/">OKTHANKS</a>) and accessibility partners (<a href="https://a11ylab.com/">Accessibility Lab</a>).</li><li>Ashley shared the story of working with Thomas, the lead developer of <a href="https://www.mailvelope.com/en">Mailvelope</a>, an app that allows you to send end-to-end encrypted emails. Also, check out the <a href="https://www.mailvelope.com/en/blog/mailvelope-2.2-user-experience">Mailvelope Blog</a>.</li><li>USABLE created detailed <a href="https://usable.tools/personas/">personas</a> to help developers understand how to make their products more usable for at-risk communities around the world.</li><li>USABLE has also recently supported the <a href="https://securedrop.org/">Secure Drop</a>, <a href="https://guardianproject.info/apps/orbot/">Orbot</a>, and <a href="https://keepassxc.org/">KeePass XC</a> projects. The USABLE blog has great interviews with these projects.</li></ul><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/010-ashley-fowler-of-usable-tools">https://allthingsauth.com/podcast/010-ashley-fowler-of-usable-tools</a>.</p>]]>
      </content:encoded>
      <pubDate>Thu, 10 Oct 2019 11:05:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/6e8387b2/ed1dbc60.mp3" length="55366472" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>2999</itunes:duration>
      <itunes:summary>When at-risk communities around the world have a voice in the design and development of open-source security and privacy tools, they get more usable! Ashley explains how the USABLE project facilitates this mission.</itunes:summary>
      <itunes:subtitle>When at-risk communities around the world have a voice in the design and development of open-source security and privacy tools, they get more usable! Ashley explains how the USABLE project facilitates this mission.</itunes:subtitle>
      <itunes:keywords>usability, security, privacy, open-source, at risk community, communication, personas, mailvelope, tor, guardian project, secure drop, journalism</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#009 - How to be an #MFAally with Tanya Janca of Microsoft</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>#009 - How to be an #MFAally with Tanya Janca of Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b448d970-389a-4a56-981b-86cda20d7cc7</guid>
      <link>https://share.transistor.fm/s/7251d708</link>
      <description>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/shehackspurple">@shehackspurple</a></li><li>Website: <a href="https://dev.to/shehackspurple">dev.to/shehackspurple<br></a><br></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Tanya talks about enabling MFA on <a href="https://www.tangerine.ca/en">Tangerine Bank</a>, <a href="https://www.wealthsimple.com/en-us/">WealthSimple</a>, and <a href="https://www.paypal.com/us/home">PayPal</a>.</li><li>Tanya wrote a blog post titled "<a href="https://dev.to/azure/multi-factor-authentication-mfa-nm2">Multi-Factor Authentication (MFA)</a>" that explains what MFA is for people who are not familiar with the term.</li><li>The site <a href="https://twofactorauth.org">twofactorauth.org</a> is a community maintained database of which sites support 2FA and which do not.</li><li>Conor built an open-source browser extension called <a href="https://2fanotifier.org">2FA Notifier</a>, which alerts you anytime you visit a site that is known to support 2FA and helps you enable it.</li><li>During Microsoft Ignite 2018, <a href="https://twitter.com/conorgil/status/1069896061290987520">Azure shared</a> that adoption rate of MFA among admins was only 1.7%. “The rate increased from 0.7% in 2017 to 1.7% in 2018. Yes, it doubled, but it is still terrible.”</li><li>Tanya mentioned <a href="https://twitter.com/jessysaurusrex">Jessy Irwin</a>’s mantra “If you liked it, then you should have put some crypto on it” and multi-Raptor authentication.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/009-tanya-janca-of-microsoft">https://allthingsauth.com/podcast/009-tanya-janca-of-microsoft</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/shehackspurple">@shehackspurple</a></li><li>Website: <a href="https://dev.to/shehackspurple">dev.to/shehackspurple<br></a><br></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Tanya talks about enabling MFA on <a href="https://www.tangerine.ca/en">Tangerine Bank</a>, <a href="https://www.wealthsimple.com/en-us/">WealthSimple</a>, and <a href="https://www.paypal.com/us/home">PayPal</a>.</li><li>Tanya wrote a blog post titled "<a href="https://dev.to/azure/multi-factor-authentication-mfa-nm2">Multi-Factor Authentication (MFA)</a>" that explains what MFA is for people who are not familiar with the term.</li><li>The site <a href="https://twofactorauth.org">twofactorauth.org</a> is a community maintained database of which sites support 2FA and which do not.</li><li>Conor built an open-source browser extension called <a href="https://2fanotifier.org">2FA Notifier</a>, which alerts you anytime you visit a site that is known to support 2FA and helps you enable it.</li><li>During Microsoft Ignite 2018, <a href="https://twitter.com/conorgil/status/1069896061290987520">Azure shared</a> that adoption rate of MFA among admins was only 1.7%. “The rate increased from 0.7% in 2017 to 1.7% in 2018. Yes, it doubled, but it is still terrible.”</li><li>Tanya mentioned <a href="https://twitter.com/jessysaurusrex">Jessy Irwin</a>’s mantra “If you liked it, then you should have put some crypto on it” and multi-Raptor authentication.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/009-tanya-janca-of-microsoft">https://allthingsauth.com/podcast/009-tanya-janca-of-microsoft</a>.</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Sep 2019 02:45:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/7251d708/8974790d.mp3" length="46476596" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>2902</itunes:duration>
      <itunes:summary>Ever tweeted at a company? Did they reply? Tanya tweeted so consistently that she got a phone call...from her bank! Tanya and I break down passwords and multi-factor authentication, the bread and butter of security that many folks still don't get right.</itunes:summary>
      <itunes:subtitle>Ever tweeted at a company? Did they reply? Tanya tweeted so consistently that she got a phone call...from her bank! Tanya and I break down passwords and multi-factor authentication, the bread and butter of security that many folks still don't get right.</itunes:subtitle>
      <itunes:keywords>usability, security, privacy, 2fa, mfa, multi factor authentication, multi-factor authentication, two-factor authentication, two factor authentication, passwords, MFAally, microsoft, 1password, password manager, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#008 - Secured by Math, Designed for People with Pilar García of 1Password</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>#008 - Secured by Math, Designed for People with Pilar García of 1Password</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d455e85-e713-426a-ad5c-fe07bea6f8f7</guid>
      <link>https://share.transistor.fm/s/e5a8a987</link>
      <description>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/1password">@1password</a></li><li>Website: <a href="https://1password.com">1password.com</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Conor and Pilar frequently reference <a href="https://1password.com/files/1Password%20for%20Teams%20White%20Paper.pdf">1Password’s White Paper</a>, which explains the security architecture and overall security philosophy of the company.</li><li>Pilar mentioned the well known <a href="https://www.xkcd.com/936/">XKCD comic on password strength</a> that popularized the comical phrase “correct horse battery staple”.</li><li>1Password’s <a href="https://watchtower.1password.com/">Watchtower</a> has many useful features related to monitoring the security of your account passwords and your use of two factor authentication (2FA).</li><li>You can learn more about Troy Hunt’s <em>Pwned Passwords API</em> <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/">here</a> and <a href="https://www.troyhunt.com/enhancing-pwned-passwords-privacy-by-exclusively-supporting-anonymity/">here</a>. Also, check out <a href="https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/">Junade Ali’s post on the Cloudflare blog</a> about why and how he proposed the Pwned Passwords API should use k-anonymity.</li><li>Conor mentions the <a href="https://pages.nist.gov/800-63-3/sp800-63b.html#-511-memorized-secrets">NIST special publication 800-63B</a>, which contains password best practices.</li><li>1Password has a <a href="https://www.bugcrowd.com/blog/1password-increases-highest-reward-to-100000/">$100k bug bounty</a> hosted on BugCrowd.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/008-pilar-garcia-of-1password">https://allthingsauth.com/podcast/008-pilar-garcia-of-1password</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/1password">@1password</a></li><li>Website: <a href="https://1password.com">1password.com</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Conor and Pilar frequently reference <a href="https://1password.com/files/1Password%20for%20Teams%20White%20Paper.pdf">1Password’s White Paper</a>, which explains the security architecture and overall security philosophy of the company.</li><li>Pilar mentioned the well known <a href="https://www.xkcd.com/936/">XKCD comic on password strength</a> that popularized the comical phrase “correct horse battery staple”.</li><li>1Password’s <a href="https://watchtower.1password.com/">Watchtower</a> has many useful features related to monitoring the security of your account passwords and your use of two factor authentication (2FA).</li><li>You can learn more about Troy Hunt’s <em>Pwned Passwords API</em> <a href="https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/">here</a> and <a href="https://www.troyhunt.com/enhancing-pwned-passwords-privacy-by-exclusively-supporting-anonymity/">here</a>. Also, check out <a href="https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/">Junade Ali’s post on the Cloudflare blog</a> about why and how he proposed the Pwned Passwords API should use k-anonymity.</li><li>Conor mentions the <a href="https://pages.nist.gov/800-63-3/sp800-63b.html#-511-memorized-secrets">NIST special publication 800-63B</a>, which contains password best practices.</li><li>1Password has a <a href="https://www.bugcrowd.com/blog/1password-increases-highest-reward-to-100000/">$100k bug bounty</a> hosted on BugCrowd.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/008-pilar-garcia-of-1password">https://allthingsauth.com/podcast/008-pilar-garcia-of-1password</a>.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Sep 2019 12:15:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/e5a8a987/4953a5e2.mp3" length="56196236" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>3509</itunes:duration>
      <itunes:summary>Want to earn $100k for reading some bad poetry? Break into a 1Password Vault and it could all be yours! Pilar explains how 1Password is built around the core principles of privacy by design, cryptography, usability, and openness.</itunes:summary>
      <itunes:subtitle>Want to earn $100k for reading some bad poetry? Break into a 1Password Vault and it could all be yours! Pilar explains how 1Password is built around the core principles of privacy by design, cryptography, usability, and openness.</itunes:subtitle>
      <itunes:keywords>usability, security, privacy, password, passwords, password manager, 1password, 2fa, two-factor, two factor, authentication, two-factor authentication, two factor authentication, encryption, end-to-end encryption, cryptography, Troy Hunt, Have I Been Pwned, Have I Been Owned, bug bounty, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#007 - SOUPS 2019 - Part 2</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>#007 - SOUPS 2019 - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c961b783-7d07-4e1b-8c33-b41136d89d11</guid>
      <link>https://share.transistor.fm/s/75206ffc</link>
      <description>
        <![CDATA[<ol><li>Yixin Zou<ol><li><strong>Social:</strong> <a href="https://twitter.com/yixinzou1124">@yixinzou1124</a></li><li><strong>University:</strong> <a href="https://www.si.umich.edu/research-projects">School of Information at University of Michigan</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/habib">An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites</a></li></ol></li><li>Karoline Busse<ol><li><strong>Social:</strong> <a href="https://twitter.com/kb_usec">@kb_usec</a></li><li><strong>University:</strong> <a href="https://net.cs.uni-bonn.de/start-page/">Institute of Computer Science 4 Security and Networked Systems at University of Bonn</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/busse">Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice</a></li></ol></li><li>Anthony Vance<ol><li><strong>Social:</strong> <a href="https://twitter.com/anthonyvance">@anthonyvance</a>, <a href="https://anthonyvance.com/">anthonyvance.com</a></li><li><strong>University:</strong> <a href="https://www.fox.temple.edu/research/">Center for Cybersecurity of the Fox School of Business at Temple University</a> in collaboration with <a href="https://neurosecurity.byu.edu/">Neuro Security Lab at Brigham Young University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/vance">The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings</a></li></ol></li><li>Sarah Pearman and Shikun Aerin Zhang<ol><li><strong>Social:</strong> <a href="https://www.linkedin.com/in/sarahpearman/">in/sarahpearman</a>, <a href="http://sarahpearman.com/">sarahpearman.com</a></li><li><strong>University:</strong> <a href="https://cylab.cmu.edu/">CyLab at Carnegie Mellon University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/pearman">Why people (don’t) use password managers effectively</a></li></ol></li><li>Kyle Crichton<ol><li><strong>Social:</strong> <a href="https://www.linkedin.com/in/kyle-crichton-81b72359">in/kyle-crichton-81b72359</a></li><li><strong>University:</strong> <a href="https://cups.cs.cmu.edu/">CyLab Usable Privacy and Security (CUPS) Laboratory at Carnegie Mellon University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/sites/default/files/soups2019posters-crichton.pdf">Incentives for Enabling Two-Factor Authentication in Online Gaming</a></li></ol></li></ol><p><br>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/007-soups-2019-part-2">https://allthingsauth.com/podcast/007-soups-2019-part-2</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<ol><li>Yixin Zou<ol><li><strong>Social:</strong> <a href="https://twitter.com/yixinzou1124">@yixinzou1124</a></li><li><strong>University:</strong> <a href="https://www.si.umich.edu/research-projects">School of Information at University of Michigan</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/habib">An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites</a></li></ol></li><li>Karoline Busse<ol><li><strong>Social:</strong> <a href="https://twitter.com/kb_usec">@kb_usec</a></li><li><strong>University:</strong> <a href="https://net.cs.uni-bonn.de/start-page/">Institute of Computer Science 4 Security and Networked Systems at University of Bonn</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/busse">Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice</a></li></ol></li><li>Anthony Vance<ol><li><strong>Social:</strong> <a href="https://twitter.com/anthonyvance">@anthonyvance</a>, <a href="https://anthonyvance.com/">anthonyvance.com</a></li><li><strong>University:</strong> <a href="https://www.fox.temple.edu/research/">Center for Cybersecurity of the Fox School of Business at Temple University</a> in collaboration with <a href="https://neurosecurity.byu.edu/">Neuro Security Lab at Brigham Young University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/vance">The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings</a></li></ol></li><li>Sarah Pearman and Shikun Aerin Zhang<ol><li><strong>Social:</strong> <a href="https://www.linkedin.com/in/sarahpearman/">in/sarahpearman</a>, <a href="http://sarahpearman.com/">sarahpearman.com</a></li><li><strong>University:</strong> <a href="https://cylab.cmu.edu/">CyLab at Carnegie Mellon University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/pearman">Why people (don’t) use password managers effectively</a></li></ol></li><li>Kyle Crichton<ol><li><strong>Social:</strong> <a href="https://www.linkedin.com/in/kyle-crichton-81b72359">in/kyle-crichton-81b72359</a></li><li><strong>University:</strong> <a href="https://cups.cs.cmu.edu/">CyLab Usable Privacy and Security (CUPS) Laboratory at Carnegie Mellon University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/sites/default/files/soups2019posters-crichton.pdf">Incentives for Enabling Two-Factor Authentication in Online Gaming</a></li></ol></li></ol><p><br>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/007-soups-2019-part-2">https://allthingsauth.com/podcast/007-soups-2019-part-2</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Aug 2019 22:35:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/75206ffc/d7613526.mp3" length="41842642" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>2612</itunes:duration>
      <itunes:summary>A series of interviews with researchers from the Symposium on Usable Privacy and Security (SOUPS) on deleting your data from websites, updated expert advice, why your brain actually ignores notifications, usability of password managers, and 2FA on Fortnite.</itunes:summary>
      <itunes:subtitle>A series of interviews with researchers from the Symposium on Usable Privacy and Security (SOUPS) on deleting your data from websites, updated expert advice, why your brain actually ignores notifications, usability of password managers, and 2FA on Fortnit</itunes:subtitle>
      <itunes:keywords>usability, privacy, security, 2fa, two factor, two factor authentication, opt-out, data, gdpr, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#006 - SOUPS 2019 - Part 1</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>#006 - SOUPS 2019 - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">afc19f21-07c3-43af-a203-6c16342a63be</guid>
      <link>https://share.transistor.fm/s/9bfff00a</link>
      <description>
        <![CDATA[<ol><li>Miranda Wei<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/_weimf">@_weimf</a></li><li><strong>University:</strong> <a href="https://seclab.cs.washington.edu/">Security and Privacy Research Lab at University of Washington</a> (work done at <a href="https://super.cs.uchicago.edu/">SUPERgroup at University of Chicago</a>)</li><li><strong>Paper:</strong> <a href="https://www.blaseur.com/papers/ccs18-pwdreuse.pdf">“What was that site doing with my Facebook password?” Designing Password-Reuse Notifications</a></li></ol></li><li>Eva Gerlitz<ol><li><strong>University:</strong> <a href="https://net.cs.uni-bonn.de/start-page/">Institute of Computer Science 4 Security and Networked Systems at University of Bonn</a></li><li><strong>Paper:</strong> <a href="https://net.cs.uni-bonn.de/fileadmin/user_upload/naiakshi/Naiakshina_Password_Study.pdf">"If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers</a></li></ol></li><li>Mariano Di Martino<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/dimartinomar">@dimartinomar</a></li><li><strong>University:</strong> <a href="https://www.uhasselt.be/edm">Expertise Center for Digital Media (EDM) at Hasselt University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/dimartino">Personal Information Leakage by Abusing the GDPR 'Right of Access'</a></li></ol></li><li>Elham Al Qahtani<ol><li><strong>University:</strong> <a href="https://liisp.uncc.edu/members/">Lab of Information Integration, Security and Privacy (LIISP) at UNC Charlotte</a></li><li><strong>Paper: </strong><a href="https://www.usenix.org/sites/default/files/soups2019posters-al_qahtani.pdf">Messaging Campaigns for Motivating Users to Adopt Duo at a University</a><strong> </strong></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2018/presentation/qahtani">The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians</a></li></ol></li><li>Andreas Gutmann<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/kryptoandi">@kryptoandi</a></li><li><strong>Company:</strong> <a href="https://www.onespan.com/">onespan.com</a></li><li><strong>University:</strong> <a href="http://sec.cs.ucl.ac.uk/people/">Information Security Group at University College London</a></li><li><strong>Paper:</strong> <a href="https://wayworkshop.org/2019/papers/way2019-gutmann.html">Taken Out of Context: Security Risks with Security Code AutoFill in iOS &amp; macOS</a></li></ol></li></ol><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/006-soups-2019-part-1">https://allthingsauth.com/podcast/006-soups-2019-part-1</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<ol><li>Miranda Wei<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/_weimf">@_weimf</a></li><li><strong>University:</strong> <a href="https://seclab.cs.washington.edu/">Security and Privacy Research Lab at University of Washington</a> (work done at <a href="https://super.cs.uchicago.edu/">SUPERgroup at University of Chicago</a>)</li><li><strong>Paper:</strong> <a href="https://www.blaseur.com/papers/ccs18-pwdreuse.pdf">“What was that site doing with my Facebook password?” Designing Password-Reuse Notifications</a></li></ol></li><li>Eva Gerlitz<ol><li><strong>University:</strong> <a href="https://net.cs.uni-bonn.de/start-page/">Institute of Computer Science 4 Security and Networked Systems at University of Bonn</a></li><li><strong>Paper:</strong> <a href="https://net.cs.uni-bonn.de/fileadmin/user_upload/naiakshi/Naiakshina_Password_Study.pdf">"If you want, I can store the encrypted password." A Password-Storage Field Study with Freelance Developers</a></li></ol></li><li>Mariano Di Martino<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/dimartinomar">@dimartinomar</a></li><li><strong>University:</strong> <a href="https://www.uhasselt.be/edm">Expertise Center for Digital Media (EDM) at Hasselt University</a></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2019/presentation/dimartino">Personal Information Leakage by Abusing the GDPR 'Right of Access'</a></li></ol></li><li>Elham Al Qahtani<ol><li><strong>University:</strong> <a href="https://liisp.uncc.edu/members/">Lab of Information Integration, Security and Privacy (LIISP) at UNC Charlotte</a></li><li><strong>Paper: </strong><a href="https://www.usenix.org/sites/default/files/soups2019posters-al_qahtani.pdf">Messaging Campaigns for Motivating Users to Adopt Duo at a University</a><strong> </strong></li><li><strong>Paper:</strong> <a href="https://www.usenix.org/conference/soups2018/presentation/qahtani">The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians</a></li></ol></li><li>Andreas Gutmann<ol><li><strong>Twitter:</strong> <a href="https://twitter.com/kryptoandi">@kryptoandi</a></li><li><strong>Company:</strong> <a href="https://www.onespan.com/">onespan.com</a></li><li><strong>University:</strong> <a href="http://sec.cs.ucl.ac.uk/people/">Information Security Group at University College London</a></li><li><strong>Paper:</strong> <a href="https://wayworkshop.org/2019/papers/way2019-gutmann.html">Taken Out of Context: Security Risks with Security Code AutoFill in iOS &amp; macOS</a></li></ol></li></ol><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/006-soups-2019-part-1">https://allthingsauth.com/podcast/006-soups-2019-part-1</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Aug 2019 19:00:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/9bfff00a/cc6bc415.mp3" length="39034308" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>2437</itunes:duration>
      <itunes:summary>SOUPS is the conference to be at for usable security and privacy research. Listen to a series of interviews on everything from passwords and 2FA to abusing GDPR and unintended consequences of the auto-fill capability on iOS.</itunes:summary>
      <itunes:subtitle>SOUPS is the conference to be at for usable security and privacy research. Listen to a series of interviews on everything from passwords and 2FA to abusing GDPR and unintended consequences of the auto-fill capability on iOS.</itunes:subtitle>
      <itunes:keywords>SOUPS, SOUPS19, usesec, usesec19, usenix, password, passwords, 2fa, two factor, two factor authentication, privacy, developers, password storage, gdpr, iOS, SMS, phishing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#005 - Grading How Companies (In)Securely Store Passwords with Michal Špaček of Password Storage</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>#005 - Grading How Companies (In)Securely Store Passwords with Michal Špaček of Password Storage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">578db062-92cc-4c36-8ddc-2b0001def6dc</guid>
      <link>https://share.transistor.fm/s/53ce049d</link>
      <description>
        <![CDATA[<p>Michal Špaček shares the story of how the Password Storage project has convinced hundreds of companies to publicly disclose their password storage practices and assigned each a grade based on how well they follow best practices.</p><p>We discuss hashing algorithms and the technology behind storing passwords securely. Learn why a company who follows the technical best practices might still not earn an A grade if they do not have a public disclosure, or if they rely on an Invisible Disclosure.</p><p>We compare the Password Storage project to other fantastic security tools, including SSL Labs and Mozilla Observatory.</p><p>Michal outlines how the grading criteria will change in the short term, highlights the desire to get more companies included in the data set, and contemplates how the project will continue to grow over time.</p><p>This episode was initially published in August 2019, the 5 year anniversary of Michal’s talk at BSides Las Vegas 2014, which planted the seeds that eventually grew into the Password Storage project. Happy birthday, Password Storage!</p><p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/PasswordStorage">@PasswordStorage</a>, <a href="https://twitter.com/spazef0rze">@spazef0rze</a></li><li>Website: <a href="https://pulse.michalspacek.cz/passwords/storages">Password Storage disclosures</a>, <a href="https://www.michalspacek.com/">michalspacek.com</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Michal launched Password Storage at BSides Las Vegas in 2016. You can see the slides from his talk <a href="https://www.michalspacek.com/talks/disclosing-password-hashing-policies-passwords">here</a>.</li><li>Bruce K. Marshall is a researcher and consultant dedicated to improving the application of authentication technologies, products, and good practices. He founded <a href="http://passwordresearch.com">PasswordResearch.com</a> to better share the password information he was collecting.<ul><li>You can find Bruce on Twitter <a href="https://twitter.com/PwdRsch">@PwdRsch</a>.</li></ul></li><li>Michal’s wrote an article titled “<a href="https://www.michalspacek.com/upgrading-existing-password-hashes">Upgrading existing password hashes</a>” that explains how to gracefully migrate passwords hashed with a legacy algorithm to a secure and modern algorithm.</li><li>To get your website listed in the Password Storage project, check out <a href="https://pulse.michalspacek.cz/passwords/storages/questions#get-listed">the FAQ</a>.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/005-michal-spacek-of-password-storage">https://allthingsauth.com/podcast/005-michal-spacek-of-password-storage</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Michal Špaček shares the story of how the Password Storage project has convinced hundreds of companies to publicly disclose their password storage practices and assigned each a grade based on how well they follow best practices.</p><p>We discuss hashing algorithms and the technology behind storing passwords securely. Learn why a company who follows the technical best practices might still not earn an A grade if they do not have a public disclosure, or if they rely on an Invisible Disclosure.</p><p>We compare the Password Storage project to other fantastic security tools, including SSL Labs and Mozilla Observatory.</p><p>Michal outlines how the grading criteria will change in the short term, highlights the desire to get more companies included in the data set, and contemplates how the project will continue to grow over time.</p><p>This episode was initially published in August 2019, the 5 year anniversary of Michal’s talk at BSides Las Vegas 2014, which planted the seeds that eventually grew into the Password Storage project. Happy birthday, Password Storage!</p><p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/PasswordStorage">@PasswordStorage</a>, <a href="https://twitter.com/spazef0rze">@spazef0rze</a></li><li>Website: <a href="https://pulse.michalspacek.cz/passwords/storages">Password Storage disclosures</a>, <a href="https://www.michalspacek.com/">michalspacek.com</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Michal launched Password Storage at BSides Las Vegas in 2016. You can see the slides from his talk <a href="https://www.michalspacek.com/talks/disclosing-password-hashing-policies-passwords">here</a>.</li><li>Bruce K. Marshall is a researcher and consultant dedicated to improving the application of authentication technologies, products, and good practices. He founded <a href="http://passwordresearch.com">PasswordResearch.com</a> to better share the password information he was collecting.<ul><li>You can find Bruce on Twitter <a href="https://twitter.com/PwdRsch">@PwdRsch</a>.</li></ul></li><li>Michal’s wrote an article titled “<a href="https://www.michalspacek.com/upgrading-existing-password-hashes">Upgrading existing password hashes</a>” that explains how to gracefully migrate passwords hashed with a legacy algorithm to a secure and modern algorithm.</li><li>To get your website listed in the Password Storage project, check out <a href="https://pulse.michalspacek.cz/passwords/storages/questions#get-listed">the FAQ</a>.</li></ul><p><br></p><p>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p><br>Canonical URL: <a href="https://allthingsauth.com/podcast/005-michal-spacek-of-password-storage">https://allthingsauth.com/podcast/005-michal-spacek-of-password-storage</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 03 Aug 2019 22:20:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/53ce049d/7db9d760.mp3" length="59641076" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>3725</itunes:duration>
      <itunes:summary>Does your website store account passwords correctly? Would you tell everyone on the internet how you do it? Michal Špaček explains why you should and how to get an A+ grade from the Password Storage project.</itunes:summary>
      <itunes:subtitle>Does your website store account passwords correctly? Would you tell everyone on the internet how you do it? Michal Špaček explains why you should and how to get an A+ grade from the Password Storage project.</itunes:subtitle>
      <itunes:keywords>usability, security, privacy, password, passwords, hash, best practice, bcrypt, scrypt, argon, argon2, md5, sha1, encrypt, bsides, bsides las vegas, ssl labs, mozilla, mozilla observatory, security, security headers, securityheaders, password research</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#004 - Product Managers: The Polyglot Communication Hubs That Improve Your Products with Simon Moffatt of ForgeRock</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>#004 - Product Managers: The Polyglot Communication Hubs That Improve Your Products with Simon Moffatt of ForgeRock</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d26d690-f706-44c3-82cf-8f106df7519b</guid>
      <link>https://share.transistor.fm/s/ceb4a8ed</link>
      <description>
        <![CDATA[<p>Simon Moffatt, a Technical Product Manager at ForgeRock, joins me to discuss why a Product Manager is a critical role within any organization that aims to create usable security and privacy technologies. We discuss what, exactly, a PM actually does and why they are the critical hub between all departments, teams, and areas of the business.</p><p>While most companies have a never ending list of TODO items, Simon explains why it is important to have a DO NOT list.</p><p>Should PMs come from a technical background, a sales background, or is it better to be a polyglot with a range of experience? How can companies create product road maps that they will actually stick to and avoid the trap of sales-driven engineering?</p><p>We also discuss security compliance and how market failures lead to standards and regulation to protect end-users.</p><p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/SimonMoffatt">@SimonMoffatt</a>, <a href="https://twitter.com/ForgeRock">@ForgeRock</a></li><li>Website: <a href="https://www.simonmoffatt.com/">simonmoffatt.com</a>, <a href="https://www.forgerock.com/">forgerock.com</a></li><li>LinkedIn: <a href="https://www.linkedin.com/in/simonmoffatt/">@simonmoffatt</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Simon mentions how <a href="http://theleanstartup.com/">The Lean Startup</a> advocates a quick learning cycle to capitalize on user feedback to improve your products.</li><li>Simon also writes articles on <a href="https://www.thecyberhut.com/">The Cyber Hut</a>.</li></ul><p><br>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/004-simon-moffatt-of-forgerock">https://allthingsauth.com/podcast/004-simon-moffatt-of-forgerock</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Simon Moffatt, a Technical Product Manager at ForgeRock, joins me to discuss why a Product Manager is a critical role within any organization that aims to create usable security and privacy technologies. We discuss what, exactly, a PM actually does and why they are the critical hub between all departments, teams, and areas of the business.</p><p>While most companies have a never ending list of TODO items, Simon explains why it is important to have a DO NOT list.</p><p>Should PMs come from a technical background, a sales background, or is it better to be a polyglot with a range of experience? How can companies create product road maps that they will actually stick to and avoid the trap of sales-driven engineering?</p><p>We also discuss security compliance and how market failures lead to standards and regulation to protect end-users.</p><p><strong>Social media &amp; website</strong></p><ul><li>Twitter: <a href="https://twitter.com/SimonMoffatt">@SimonMoffatt</a>, <a href="https://twitter.com/ForgeRock">@ForgeRock</a></li><li>Website: <a href="https://www.simonmoffatt.com/">simonmoffatt.com</a>, <a href="https://www.forgerock.com/">forgerock.com</a></li><li>LinkedIn: <a href="https://www.linkedin.com/in/simonmoffatt/">@simonmoffatt</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Simon mentions how <a href="http://theleanstartup.com/">The Lean Startup</a> advocates a quick learning cycle to capitalize on user feedback to improve your products.</li><li>Simon also writes articles on <a href="https://www.thecyberhut.com/">The Cyber Hut</a>.</li></ul><p><br>You can find the host of The All Things Auth Podcast on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/004-simon-moffatt-of-forgerock">https://allthingsauth.com/podcast/004-simon-moffatt-of-forgerock</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Jul 2019 17:20:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/ceb4a8ed/a1ff7a17.mp3" length="56755258" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>3544</itunes:duration>
      <itunes:summary>Your Engineering team is always on the same page as your Sales team, right? They never miscommunicate with Design, UX, or Customer Success either, right? Yea, I didn’t think so. Simon Moffatt explains what a Product Manager actually does and why the role is critical to building better software.</itunes:summary>
      <itunes:subtitle>Your Engineering team is always on the same page as your Sales team, right? They never miscommunicate with Design, UX, or Customer Success either, right? Yea, I didn’t think so. Simon Moffatt explains what a Product Manager actually does and why the role </itunes:subtitle>
      <itunes:keywords>usability, privacy, security, product management, project management, identity and access management, iam, password, passwords, lean startup, user feedback, customer success</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#003 - End-to-end Encrypted Chat Without Getting Snooped On with Max Krohn of Keybase</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>#003 - End-to-end Encrypted Chat Without Getting Snooped On with Max Krohn of Keybase</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ba21fdf0-2770-4bd5-9c05-f595cac3d909</guid>
      <link>https://share.transistor.fm/s/71ce297c</link>
      <description>
        <![CDATA[<p>Keybase is a Slack-like app that supports chat and file sharing, but it is fully end-to-end encrypted. You might be familiar with other well known apps that support end-to-end encryption, like WhatsApp and Signal, but Keybase has a fundamentally different security architecture. Max explains why this is so important and helps us understand the cryptography that makes the service work.</p><p><br></p><p>Before starting Keybase, Max was the co-founder of OkCupid. He shares the story about how he went from running a dating app to focusing on making public key cryptography approachable for the average internet user. Towards the end of our conversation, we discuss how Keybase approaches user research, how Keybase makes enough money to keep the lights on, and how they plan to grow the service in the future.</p><p><br><strong>Social media &amp; website</strong></p><ul><li>Website: <a href="https://keybase.io/">keybase.io</a></li><li>Twitter: <a href="https://twitter.com/keybaseio">@keybaseio</a>, <a href="https://twitter.com/maxtaco">@maxtaco</a></li><li>Keybase: <a href="https://keybase.io/max">@max</a><ul><li>After installing Keybase, you can request to join the team <a href="https://keybase.io/team/keybasefriends">keybasefriends</a>.</li></ul></li></ul><p><br></p><p><strong>Resources mentioned in episode</strong></p><ul><li>Keybase Blog<ul><li>The post <a href="https://keybase.io/blog/keybase-new-key-model">Keybase's New Key Model</a> explains how you cryptographically link all of your devices so that you can use Keybase on all of your devices at the same time.</li><li>The post <a href="https://keybase.io/blog/introducing-keybase-teams">Introducing Keybase Teams</a> explains the user experience and underlying cryptography that powers the Keybase teams functionality.</li><li>In <a href="https://keybase.io/blog/chat-apps-softer-than-tofu">Keybase is not softer than TOFU</a>, Keybase explains what Trust on First Use means and how Keybase approaches this problem differently than any other app providing end-to-end encrypted communication.</li></ul></li><li>The <a href="https://keybase.io/docs">Keybase documentation</a> contains technical explanations of how Keybase is designed and architected.</li><li>The Verge: <a href="https://www.theverge.com/2019/5/30/18645449/google-whatsapp-apple-gchq-encrypted-chat-snoop-eavesdropping-encryption">Google, WhatsApp, and Apple slam GCHQ proposal to snoop on encrypted chats</a></li></ul><p><br></p><p>You can find Conor, the host, on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p> </p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/003-max-krohn-of-keybase">https://allthingsauth.com/podcast/003-max-krohn-of-keybase</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Keybase is a Slack-like app that supports chat and file sharing, but it is fully end-to-end encrypted. You might be familiar with other well known apps that support end-to-end encryption, like WhatsApp and Signal, but Keybase has a fundamentally different security architecture. Max explains why this is so important and helps us understand the cryptography that makes the service work.</p><p><br></p><p>Before starting Keybase, Max was the co-founder of OkCupid. He shares the story about how he went from running a dating app to focusing on making public key cryptography approachable for the average internet user. Towards the end of our conversation, we discuss how Keybase approaches user research, how Keybase makes enough money to keep the lights on, and how they plan to grow the service in the future.</p><p><br><strong>Social media &amp; website</strong></p><ul><li>Website: <a href="https://keybase.io/">keybase.io</a></li><li>Twitter: <a href="https://twitter.com/keybaseio">@keybaseio</a>, <a href="https://twitter.com/maxtaco">@maxtaco</a></li><li>Keybase: <a href="https://keybase.io/max">@max</a><ul><li>After installing Keybase, you can request to join the team <a href="https://keybase.io/team/keybasefriends">keybasefriends</a>.</li></ul></li></ul><p><br></p><p><strong>Resources mentioned in episode</strong></p><ul><li>Keybase Blog<ul><li>The post <a href="https://keybase.io/blog/keybase-new-key-model">Keybase's New Key Model</a> explains how you cryptographically link all of your devices so that you can use Keybase on all of your devices at the same time.</li><li>The post <a href="https://keybase.io/blog/introducing-keybase-teams">Introducing Keybase Teams</a> explains the user experience and underlying cryptography that powers the Keybase teams functionality.</li><li>In <a href="https://keybase.io/blog/chat-apps-softer-than-tofu">Keybase is not softer than TOFU</a>, Keybase explains what Trust on First Use means and how Keybase approaches this problem differently than any other app providing end-to-end encrypted communication.</li></ul></li><li>The <a href="https://keybase.io/docs">Keybase documentation</a> contains technical explanations of how Keybase is designed and architected.</li><li>The Verge: <a href="https://www.theverge.com/2019/5/30/18645449/google-whatsapp-apple-gchq-encrypted-chat-snoop-eavesdropping-encryption">Google, WhatsApp, and Apple slam GCHQ proposal to snoop on encrypted chats</a></li></ul><p><br></p><p>You can find Conor, the host, on Twitter<a href="http://twitter.com/conorgil"> @conorgil</a>.</p><p> </p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/003-max-krohn-of-keybase">https://allthingsauth.com/podcast/003-max-krohn-of-keybase</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 04 Jul 2019 09:30:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/71ce297c/6b0b403d.mp3" length="73928099" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>4618</itunes:duration>
      <itunes:summary>Max shares the story of how he went from founding OkCupid to creating Keybase, a Slack-like app that allows average internet users to have end-to-end encrypted conversations and file sharing.</itunes:summary>
      <itunes:subtitle>Max shares the story of how he went from founding OkCupid to creating Keybase, a Slack-like app that allows average internet users to have end-to-end encrypted conversations and file sharing.</itunes:subtitle>
      <itunes:keywords>usability, security, cryptography, end-to-end encryption, e2e, e2e encryption, keybase, whatsapp, signal, privacy, startup</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#002 - Your Phone is a Phishing Resistant Security Key with Alex Grinman of Kryptco</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>#002 - Your Phone is a Phishing Resistant Security Key with Alex Grinman of Kryptco</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">31d211ab-942c-4072-bf88-325273227cee</guid>
      <link>https://share.transistor.fm/s/15b1171c</link>
      <description>
        <![CDATA[<p>Alex shares the story of how Krypton first started as a secure messaging app, then evolved to help developers manage SSH keys, and today aims to make phishing resistant two factor authentication a realistic option for average internet users.</p><p>We get Alex’s thoughts on Google’s recent focus on allowing Android phones to be used as security keys, what happens if you lose your phone, and different approaches to account recovery.</p><p><strong>Social media &amp; website</strong></p><ul><li>Kryptco: <a href="https://krypt.co/">krypt.co</a>, <a href="https://twitter.com/kryptco">@kryptco</a>, <a href="mailto:hello@krypt.co">hello@krypt.co</a></li><li>Alex Grinman: <a href="https://www.alexgr.in/">www.alexgr.in</a>, <a href="https://twitter.com/alexgrinman">@alexgrinman</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Phishing resistant two factor authentication (2FA) comes from implementing the<a href="https://fidoalliance.org/fido2/"> FIDO2: WebAuthn &amp; CTAP</a> specifications.</li><li>Krypton’s blog post, <a href="https://krypt.co/blog/posts/krypton-our-zero-trust-infrastructure.html">Our Zero-Trust Infrastructure</a>, explains how the Krypton app pairs your phone to your browser to guarantee secure communication.</li><li>You can find all of Kryptco’s open source software <a href="https://github.com/kryptco">on GitHub</a>.</li><li>Google Security Blog - <a href="https://security.googleblog.com/2019/05/titan-keys-update.html">Advisory: Security Issue with Bluetooth Low Energy (BLE) Titan Security Keys</a></li></ul><p><br></p><p>You can find Conor, the host, on Twitter <a href="http://twitter.com/conorgil">@conorgil</a>.</p><p><br> </p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/002-alex-grinman-of-kryptco">https://allthingsauth.com/podcast/002-alex-grinman-of-kryptco</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Alex shares the story of how Krypton first started as a secure messaging app, then evolved to help developers manage SSH keys, and today aims to make phishing resistant two factor authentication a realistic option for average internet users.</p><p>We get Alex’s thoughts on Google’s recent focus on allowing Android phones to be used as security keys, what happens if you lose your phone, and different approaches to account recovery.</p><p><strong>Social media &amp; website</strong></p><ul><li>Kryptco: <a href="https://krypt.co/">krypt.co</a>, <a href="https://twitter.com/kryptco">@kryptco</a>, <a href="mailto:hello@krypt.co">hello@krypt.co</a></li><li>Alex Grinman: <a href="https://www.alexgr.in/">www.alexgr.in</a>, <a href="https://twitter.com/alexgrinman">@alexgrinman</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Phishing resistant two factor authentication (2FA) comes from implementing the<a href="https://fidoalliance.org/fido2/"> FIDO2: WebAuthn &amp; CTAP</a> specifications.</li><li>Krypton’s blog post, <a href="https://krypt.co/blog/posts/krypton-our-zero-trust-infrastructure.html">Our Zero-Trust Infrastructure</a>, explains how the Krypton app pairs your phone to your browser to guarantee secure communication.</li><li>You can find all of Kryptco’s open source software <a href="https://github.com/kryptco">on GitHub</a>.</li><li>Google Security Blog - <a href="https://security.googleblog.com/2019/05/titan-keys-update.html">Advisory: Security Issue with Bluetooth Low Energy (BLE) Titan Security Keys</a></li></ul><p><br></p><p>You can find Conor, the host, on Twitter <a href="http://twitter.com/conorgil">@conorgil</a>.</p><p><br> </p><p>Canonical URL: <a href="https://allthingsauth.com/podcast/002-alex-grinman-of-kryptco">https://allthingsauth.com/podcast/002-alex-grinman-of-kryptco</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 20 Jun 2019 17:45:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/15b1171c/7174d907.mp3" length="51897888" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>3241</itunes:duration>
      <itunes:summary>Alex explains how Krypton, their open source browser extension and mobile app, can turn the phone sitting in your pocket into a phishing resistant two factor authentication (2FA) security key.</itunes:summary>
      <itunes:subtitle>Alex explains how Krypton, their open source browser extension and mobile app, can turn the phone sitting in your pocket into a phishing resistant two factor authentication (2FA) security key.</itunes:subtitle>
      <itunes:keywords>security, authentication, login, log in, two factor, two-factor, two factor auth, 2fa, mfa, 2sv, password, passwords, usability, privacy, startup, security key, u2f, fido, fido2, ctap, webauthn, kryptco, krypton, browser extension</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#001 - Open-source Hardware Security Keys with Conor Patrick of SoloKeys</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>#001 - Open-source Hardware Security Keys with Conor Patrick of SoloKeys</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">987bd6c9-9161-476c-bcac-15f2e6a38735</guid>
      <link>https://share.transistor.fm/s/a2671433</link>
      <description>
        <![CDATA[<p>Conor explains what security keys are and why they provide a stronger level of security than other methods of 2FA. He shares the story about how he created and sold his first open-source security key on Amazon while he was an undergraduate studying Computer Engineering and how that project evolved into a wildly successful Kickstarter project that launched SoloKeys the company.</p><p>Towards the end of the conversation, Conor shares his thoughts on the recent trend of using phones as security keys and highlights Somu, the next exciting product that he and his team are working on right now.</p><p><strong>Social media &amp; website</strong></p><ul><li>SoloKey’s Twitter: <a href="https://twitter.com/solokeyssec">@SoloKeysSec</a></li><li><a href="https://solokeys.com/">SoloKeys website</a></li><li>Conor Patrick’s Twitter: <a href="https://twitter.com/_conorpp">@_conorpp</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Phishing resistance two factor authentication (2FA) comes from implementing the <a href="https://fidoalliance.org/fido2/">FIDO2: WebAuthn &amp; CTAP</a> specifications.</li><li>U2F Zero security key<ul><li>In his blog post, <a href="https://conorpp.com/blog/designing-and-producing-2fa-tokens-to-sell-on-amazon">Designing and Producing 2FA tokens to Sell on Amazon</a>, Conor explains how he created and sold an open source security key named U2F Zero while an undergrad in university.</li><li>You can access the hardware designs and software in the GitHub repo <a href="https://github.com/conorpp/u2f-zero">conorpp/u2f-zero</a>.</li><li>You can build your own U2F Zero by following the instructions in the <a href="https://github.com/conorpp/u2f-zero/wiki/Building-a-U2F-Token">Build a U2F Token</a> wiki page.</li></ul></li><li>SoloKey security key<ul><li>SoloKeys, the company, launched after raising $125,000 in a hugely successful <a href="https://www.kickstarter.com/projects/conorpatrick/solo-the-first-open-source-fido2-security-key-usb/">Kickstarter project</a>.</li><li>In his blog post, <a href="https://conorpp.com/blog/designing-solo-a-new-u2ffido2-token">Designing Solo, a new U2F/FIDO2 Token</a>, Conor explains </li><li>The hardware and software for SoloKey’s open source hardware security key, Solo, is available in the GitHub repo <a href="https://github.com/solokeys/solo">solokeys/solo</a>.</li></ul></li><li>Google Security Blog: <a href="https://cloud.google.com/blog/products/identity-security/now-generally-available-android-phones-built-in-security-key">Now generally available: Android phone’s built-in security key</a></li><li>NitroKey security key<ul><li>NitroKey, a commercial provider of security keys, based their open source U2F security key on Conor’s U2F Zero project. You can access the Nitrokey firmware and hardware in the GitHub repo <a href="https://github.com/Nitrokey/nitrokey-fido-u2f-firmware">Nitrokey/nitrokey-fido-u2f-firmware</a>.</li><li>NitroKey is also building security keys based on SoloKey’s current design as well.</li></ul></li><li><a href="https://www.crowdsupply.com/solokeys/somu">Somu: A tiny FIDO2 security key for two-factor authentication and passwordless login</a></li></ul><p><br>Canonical URL: https://allthingsauth.com/podcast/001-conor-patrick-of-solokeys</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Conor explains what security keys are and why they provide a stronger level of security than other methods of 2FA. He shares the story about how he created and sold his first open-source security key on Amazon while he was an undergraduate studying Computer Engineering and how that project evolved into a wildly successful Kickstarter project that launched SoloKeys the company.</p><p>Towards the end of the conversation, Conor shares his thoughts on the recent trend of using phones as security keys and highlights Somu, the next exciting product that he and his team are working on right now.</p><p><strong>Social media &amp; website</strong></p><ul><li>SoloKey’s Twitter: <a href="https://twitter.com/solokeyssec">@SoloKeysSec</a></li><li><a href="https://solokeys.com/">SoloKeys website</a></li><li>Conor Patrick’s Twitter: <a href="https://twitter.com/_conorpp">@_conorpp</a></li></ul><p><strong>Resources mentioned in episode</strong></p><ul><li>Phishing resistance two factor authentication (2FA) comes from implementing the <a href="https://fidoalliance.org/fido2/">FIDO2: WebAuthn &amp; CTAP</a> specifications.</li><li>U2F Zero security key<ul><li>In his blog post, <a href="https://conorpp.com/blog/designing-and-producing-2fa-tokens-to-sell-on-amazon">Designing and Producing 2FA tokens to Sell on Amazon</a>, Conor explains how he created and sold an open source security key named U2F Zero while an undergrad in university.</li><li>You can access the hardware designs and software in the GitHub repo <a href="https://github.com/conorpp/u2f-zero">conorpp/u2f-zero</a>.</li><li>You can build your own U2F Zero by following the instructions in the <a href="https://github.com/conorpp/u2f-zero/wiki/Building-a-U2F-Token">Build a U2F Token</a> wiki page.</li></ul></li><li>SoloKey security key<ul><li>SoloKeys, the company, launched after raising $125,000 in a hugely successful <a href="https://www.kickstarter.com/projects/conorpatrick/solo-the-first-open-source-fido2-security-key-usb/">Kickstarter project</a>.</li><li>In his blog post, <a href="https://conorpp.com/blog/designing-solo-a-new-u2ffido2-token">Designing Solo, a new U2F/FIDO2 Token</a>, Conor explains </li><li>The hardware and software for SoloKey’s open source hardware security key, Solo, is available in the GitHub repo <a href="https://github.com/solokeys/solo">solokeys/solo</a>.</li></ul></li><li>Google Security Blog: <a href="https://cloud.google.com/blog/products/identity-security/now-generally-available-android-phones-built-in-security-key">Now generally available: Android phone’s built-in security key</a></li><li>NitroKey security key<ul><li>NitroKey, a commercial provider of security keys, based their open source U2F security key on Conor’s U2F Zero project. You can access the Nitrokey firmware and hardware in the GitHub repo <a href="https://github.com/Nitrokey/nitrokey-fido-u2f-firmware">Nitrokey/nitrokey-fido-u2f-firmware</a>.</li><li>NitroKey is also building security keys based on SoloKey’s current design as well.</li></ul></li><li><a href="https://www.crowdsupply.com/solokeys/somu">Somu: A tiny FIDO2 security key for two-factor authentication and passwordless login</a></li></ul><p><br>Canonical URL: https://allthingsauth.com/podcast/001-conor-patrick-of-solokeys</p>]]>
      </content:encoded>
      <pubDate>Thu, 06 Jun 2019 00:46:00 -0400</pubDate>
      <author>Conor Gilsenan</author>
      <enclosure url="https://media.transistor.fm/a2671433/ff852564.mp3" length="61017114" type="audio/mpeg"/>
      <itunes:author>Conor Gilsenan</itunes:author>
      <itunes:duration>3811</itunes:duration>
      <itunes:summary>Conor Patrick (@_conorpp), co-founder of SoloKeys, shares the story of raising $125,000 on Kickstarter to build Solo, an open-source hardware security key for two factor authentication (2FA).</itunes:summary>
      <itunes:subtitle>Conor Patrick (@_conorpp), co-founder of SoloKeys, shares the story of raising $125,000 on Kickstarter to build Solo, an open-source hardware security key for two factor authentication (2FA).</itunes:subtitle>
      <itunes:keywords>security, two factor, two factor auth, 2fa, mfa, 2sv, password, passwords, authentication, usability, privacy, startup, kickstarter, crowd supply, somu, solo, solokeys, u2f zero, security key, fido, fido2, ctap, webauthn</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
