Cybersecurity, Sovereignty & Bitcoin

Cybersecurity, Sovereignty & Bitcoin

July 1, 2025

Anton Livaja has spent years protecting billions in digital assets, advising Bitcoin companies, and helping people ta...

Fighting Back Against Crypto and Supply Chain Threats

Fighting Back Against Crypto and Supply Chain Threats

May 24, 2025

In this insightful discussion, host Jim Love is joined by Anton Livaja, co-founder of Distrust, to uncover how advanc...

Expanding (Dis)Trust - talk about compiler safety, determinism and StageX

Expanding (Dis)Trust - talk about compiler safety, determinism and StageX

October 30, 2024

This talk which was held in Montreal at the InCyber conference taking place Oct 29-30 2024, covers topics regarding b...

Protecting Your Digital Life and Bitcoin

Protecting Your Digital Life and Bitcoin

April 4, 2024

On this episode of Your Life, Your Terms podcast, Anthony and I dive into some best practices around personal securit...

AI and Social Engineering

AI and Social Engineering

October 3, 2023

Imagine the following scenario. You are the financial controller of a company, and receive a late night call to join ...

Elevating Data Security

Elevating Data Security

April 14, 2023

The modern regulatory landscape frequently mandates the collection and retention of Personally Identifiable Informati...

Nostrica Nostr Relay Panel

Nostrica Nostr Relay Panel

March 23, 2023

On this Nostrica panel we talk about Nostr relays, and their future.

Crushing Cyber Attacks & The Dark Web

Crushing Cyber Attacks & The Dark Web

November 4, 2022

On this episode of Your Life, Your Terms podcast, Anthony, Tom and I dive into some best practices around staying saf...

Two Factor Authentication (2FA)

Two Factor Authentication (2FA)

November 1, 2022

If you haven’t read I Have a Password System, and don’t feel confident with how you manage your passwords, it’s recom...

I Have a Password System

I Have a Password System

October 11, 2022

Even though passwords are one of the most common and basic types of security mechanisms, few understand what makes a ...

Can Clicking a Link Get You Hacked?

Can Clicking a Link Get You Hacked?

October 8, 2022

How much damage can a malicious actor do by getting someone to click on a link? This blog focuses on exploring the di...

Why Visual Programming Doesn't Suck

Why Visual Programming Doesn't Suck

August 30, 2018

I’m here to tell you that visual programming, and diagrammatic reasoning in particular, is a formidable tool-set if u...