32 avsnitt • Längd: 65 min • Månadsvis
Welcome to Nerding Out With Viktor, a podcast at the intersection of tech innovation and entrepreneurial expertise! Hosted by Viktor, a proud nerd and seasoned entrepreneur, this show is a deep dive into the exciting world of technology. Viktor started his entrepreneurial journey during his time in Silicon Valley with YippieMove, a groundbreaking email migration service, and continued with the creation of Blotter, a highly successful macOS productivity app.
A vanguard in remote work, Viktor has been skillfully managing remote teams for over a decade, demonstrating visionary leadership ahead of its wider adoption. His career is marked by a consistent knack for identifying and leveraging untapped tech opportunities.
Screenly, a venture Viktor bootstrapped, stands at the pinnacle of his achievements. It’s the world’s first developer-friendly digital signage solution, and its flagship product now powers over 10,000 screens globally. In addition, Viktor’s innovative streak led to the development of Anthias, a leading open-source digital signage solution, underscoring his role as an industry innovator.
In Nerding Out With Viktor, listeners are treated to rich discussions with tech experts in areas such as AI, software development, cybersecurity, and hardware advancements. Viktor’s unique experiences, honed in Silicon Valley and through his entrepreneurial ventures, provide a compelling backdrop for these insightful conversations, making complex tech topics accessible and engaging.
Perfect for tech enthusiasts, budding entrepreneurs, or anyone curious about the tech landscape’s future, ”Nerding Out with Viktor” is the ultimate podcast for insightful, thought-provoking discussions. Join Viktor as he delves into conversations with the minds shaping our technological world.
Subscribe to Nerding Out With Viktor and join a community where deep nerdiness and entrepreneurial insight blend in exciting dialogues.
The podcast Nerding Out With Viktor is created by Viktor Petersson. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
In this episode of "Nerding Out with Viktor," I'm joined by Johan Christenson, founder of Cleura, to dig into one of the most critical questions facing European tech today: how do we build a sovereign cloud that can actually compete?
Johan brings decades of experience in open infrastructure and a front-row seat to the evolution of cloud computing. We talk about why Europe still leans so heavily on U.S. cloud platforms, and the real-world risks that come with that dependency whether it's pricing, control, or strategic leverage.
We get into the friction points that keep Europe from moving faster: outdated procurement practices, broken incentive structures, and the lack of deep technical understanding inside policymaking circles. Johan also shares what it's been like building on OpenStack from the early days, and what Cleura has learned about scaling sovereign infrastructure in a space dominated by hyperscalers.
I really enjoyed diving into how cloud-native tools like Kubernetes can unlock more flexibility and how standardization could help level the playing field for smaller providers. We also touch on the limitations of regulation when enforcement is missing, and why alignment between government goals and operational behavior is long overdue.
Whether you're in cloud infrastructure, policy, or just curious about how Europe can chart its own course, this one's packed with insight.
]]>In this episode of "Nerding Out with Viktor," Warren Houghton returns to pull back the curtain on the covert world of physical penetration testing. As a seasoned security expert from Pentest Partners, Warren shares his extensive experience in breaching physical security measures, offering listeners a rare glimpse into the methodologies and techniques used by professional security testers.
Viktor and Warren explore the fascinating realm of physical security assessments, from initial reconnaissance and planning to the execution of sophisticated social engineering tactics. Warren reveals how security professionals can clone access badges, bypass reception areas, and exploit human psychology to gain unauthorized access to secured facilities. Through compelling real-world examples, he demonstrates how even seemingly robust security systems can be compromised by determined adversaries who understand the vulnerabilities in both technology and human behavior.
The conversation delves into the critical importance of physical security in the overall security posture of organizations, particularly those with sensitive data centers or restricted areas. Warren provides valuable insights into common weaknesses in building security, explaining how organizations can identify and address these vulnerabilities before they're exploited by malicious actors. He also discusses the ethical considerations and legal frameworks that govern physical penetration testing, emphasizing the importance of proper authorization and scope definition.
Whether you're a security professional looking to enhance your organization's physical defenses, an IT manager concerned about holistic security approaches, or simply fascinated by the world of security testing, this episode offers invaluable knowledge about the realities of physical security in today's complex threat landscape. Join Viktor and Warren for this eye-opening discussion that will forever change how you view the security of physical spaces around you.
]]>Join host Viktor Petersson as he sits down with Marc Pous of Balena to explore the ever-evolving world of IoT, from remote management and fleet updates to security legislation and software bills of materials (SBOMs). Marc reveals how Balena pioneered container-based deployments on devices like Raspberry Pi, explains why over-the-air (OTA) updates are critical for any hardware project, and offers insights into upcoming regulations such as the Cyber Resilience Act (CRA). Discover why IoT is quickly becoming "just connected products," how businesses can adapt to this new era, and why it's time to rethink everything from SD cards to DevOps workflows. Whether you're an IoT veteran or curious about the future of connected tech, this episode offers a deep dive into managing devices at scale and keeping them secure.
]]>In this episode of Nerding Out with Viktor, host Viktor Petersson sits down with Dustin Kirkland from Chainguard for an illuminating discussion on modern supply chain security and container hardening. Drawing from his rich experience across tech giants like IBM, Red Hat, Canonical, and Google, Dustin shares invaluable insights into the evolution of container security and the critical importance of maintaining secure infrastructure.
The conversation delves deep into Chainguard's innovative approach to building minimal, hardened container images directly from source code. Dustin explains their groundbreaking Zero-CVE initiative, demonstrating how continuous rolling updates and careful dependency management can dramatically reduce vulnerability exposure. Through practical examples and real-world scenarios, he illustrates the delicate balance between security, functionality, and maintainability in modern container deployments.
Viktor and Dustin explore the intricate world of Software Bills of Materials (SBOMs), diving into how attestations and digital signatures through tools like Sigstore and Cosign create a robust chain of trust. The discussion illuminates the critical role these technologies play in guaranteeing software provenance and enabling rapid vulnerability patching across complex deployments.
The episode also tackles the challenges of navigating stringent compliance requirements such as FedRAMP and HIPAA, with Dustin sharing practical strategies for maintaining security without sacrificing agility. The conversation extends to the nuances of open source licensing and the future landscape of infrastructure security, offering listeners valuable insights into maintaining secure, modern systems in an increasingly complex technological environment.
Whether you're a security professional, container enthusiast, or technology leader, this episode provides essential knowledge about the future of supply chain security and container hardening. Don't miss this comprehensive exploration of how organizations can build and maintain secure infrastructure in today's rapidly evolving technology landscape.
]]>In this episode of "Nerding Out with Viktor," Warren Houghton from Pentest Partners joins Viktor to explore the fascinating world of professional penetration testing. As they delve into the intricacies of "legal hacking," Warren shares invaluable insights into the methodologies, tools, and best practices that define ethical hacking in today's cybersecurity landscape.
The conversation covers crucial aspects of pentesting, from obtaining proper authorization and managing scope to selecting the right tools for different scenarios. Warren explains how seemingly minor oversights, such as exposed .git directories, can lead to significant security breaches, and demonstrates why thorough documentation and proper paperwork are as critical as technical expertise in professional pentesting.
Viktor and Warren explore the essential toolkit of a modern pentester, discussing tools like Burp Suite for web application testing, Nmap for network discovery, and Metasploit for exploitation. Through real-world examples and engaging stories from the field, Warren illustrates how attackers can leverage small vulnerabilities to gain broader access to networks and systems.
The episode also serves as a valuable resource for aspiring cybersecurity professionals, with Warren offering guidance on certifications, practical experience, and developing the investigative mindset necessary for success in the field. The discussion concludes with a preview of physical security testing, highlighting how the principles of penetration testing extend beyond the digital realm to encompass physical security controls and access systems.
]]>In this episode of "Nerding Out with Viktor," Kate Stewart from the Linux Foundation and Gary O'Neall, a long-time SPDX contributor, join Viktor to explore the evolution and impact of SPDX (Systems Package Data Exchange) in software transparency. The conversation traces SPDX's journey from its origins in license compliance to its current pivotal role in security and vulnerability tracking, revealing how this open standard is shaping modern software development practices.
Kate and Gary provide deep technical insights into the challenges teams face when generating accurate Software Bills of Materials (SBOMs), including complex scenarios involving circular dependencies and component uncertainty. Through practical examples from their work with various organizations, they demonstrate how these real-world challenges have influenced the development of SPDX tools and specifications.
The discussion delves into current initiatives for integrating SBOM generation into build systems, with specific focus on implementations in the Zephyr and Yocto projects. They also explore ongoing efforts to implement build-time SBOM generation for the Linux kernel, highlighting both the technical approach and practical benefits for development teams.
Viktor, Kate, and Gary examine the growing regulatory requirements surrounding SBOMs, particularly in safety-critical systems, and how SPDX 3.0 is being designed to meet these demands while supporting modern CI/CD pipelines. The conversation illuminates the technical considerations behind maintaining compatibility with existing tools while expanding functionality for new use cases. As an open, community-driven project, SPDX continues to evolve with industry needs, offering solutions for compliance, security vulnerabilities, and supply chain transparency in modern software development workflows.
]]>In a captivating deep dive into the world of advanced storage systems, Viktor welcomes ZFS expert and FreeBSD developer Allan Jude to explore the intricate landscape of modern filesystem architecture. This episode of Nerding Out with Viktor peels back the layers of enterprise storage solutions, offering listeners a masterclass in both theoretical foundations and practical implementations.
Allan, drawing from his extensive experience in FreeBSD development and ZFS optimization, guides listeners through the sophisticated underpinnings of ZFS's copy-on-write architecture. The discussion illuminates how this fundamental design choice revolutionizes data integrity and storage management, while exploring the real-world implications for enterprise deployments. Through concrete examples and technical insights, Allan demonstrates why ZFS continues to be the go-to solution for organizations demanding unwavering data reliability.
The conversation takes an exciting turn as Viktor and Allan explore FreeBSD's networking capabilities, unraveling how its architectural decisions contribute to its reputation for exceptional performance in production environments. Allan shares fascinating insider perspectives on why industry giants repeatedly choose FreeBSD for their critical infrastructure, backing these insights with compelling technical analysis and real-world case studies.
Listeners will find themselves immersed in practical wisdom as Allan shares battle-tested strategies for ZFS deployment and optimization. The discussion covers everything from fine-tuning storage pools to leveraging advanced features for maximum efficiency, providing administrators and developers with actionable takeaways they can implement immediately. The episode also ventures into forward-looking territory, examining emerging trends in storage technology and operating system development.
What sets this episode apart is Allan's remarkable ability to convey complex technical concepts with clarity and precision, making advanced topics accessible without sacrificing technical depth. Whether you're managing enterprise storage infrastructure, developing system-level software, or simply passionate about cutting-edge filesystem technology, this conversation offers invaluable insights into the present and future of storage solutions. Allan's expertise, combined with Viktor's engaging interview style, creates a compelling narrative that bridges theoretical knowledge with practical application in the ever-evolving landscape of enterprise storage and operating systems.
]]>In this thrilling episode of Nerding Out with Viktor, host Viktor Petersson is joined by Ken Munro, a leading figure in cybersecurity and an expert in penetration testing. Together, they dive into the hidden world of aviation cybersecurity, shedding light on the challenges, discoveries, and unexpected vulnerabilities that exist within modern aircraft systems. With decades of experience and a passion for making aviation safer, Ken guides listeners through some of the most fascinating aspects of airplane hacking, responsible disclosures, and how his team tests aircraft security to uncover vulnerabilities.
The conversation kicks off with an exploration of how Ken entered the field of aviation cybersecurity, sharing tales of hacking decommissioned planes in a scrapyard—a unique method that allowed his team to practice without endangering passengers or active fleets. Ken provides insight into his early career in the antivirus industry, his background as a general aviation pilot, and how these experiences culminated in his journey into the world of aviation security. He talks about the infamous time he hacked airplane entertainment systems and even how, with the right setups, it's possible to rickroll an entire flight!
Ken and Viktor then turn their attention to one of aviation's most pressing security concerns: the electronic flight bag (EFB). EFBs, now commonly used in commercial cockpits, have replaced the hefty stacks of maps and manuals pilots once carried. Yet, while EFBs improve efficiency, Ken highlights the vulnerabilities in their design. For instance, by manipulating data within the EFB's performance calculators, attackers could mislead pilots about crucial factors like runway length or engine thrust. Ken explains the dire implications of these weaknesses and the sophisticated tactics used to secure these systems.
The episode also covers GPS spoofing, a technique used by some adversaries to mislead or disrupt an aircraft's navigation system. Ken describes the complexities of GPS spoofing and jamming, explaining how such attacks can confuse onboard navigation and leave pilots relying on outdated or incorrect data until they're able to safely land. Ken's research into GPS vulnerabilities has revealed the scope of these threats, particularly in areas of high political tension.
The discussion moves into the intricacies of responsible disclosure in the aviation industry, as Ken explains the delicate balance between informing manufacturers about security issues while respecting the time-consuming processes they require for safety certification. He shares examples of working with Boeing and Airbus, noting how long it can take to fix even minor vulnerabilities due to the rigorous testing needed to maintain passenger safety. Ken even praises Boeing for their commitment to addressing issues, despite the inevitable delay between discovery and patching.
Viktor and Ken wrap up by discussing the industry's gradual shift towards transparency in handling disclosures and threats. They talk about the importance of collaboration between cybersecurity professionals, manufacturers, and government regulators to enhance aviation security continuously. Ken emphasizes that, while security is critical, safety remains paramount in aviation, which often means extended timelines for vulnerability patches.
For anyone fascinated by cybersecurity, aviation, or the hidden challenges of keeping the skies secure, this episode of Nerding Out with Viktor is an eye-opening deep dive into a world that affects millions of passengers daily. Ken Munro's expertise, combined with Viktor's curiosity and insights, makes for a compelling and informative conversation that reveals both the resilience and the risks of modern aviation systems. Don't miss this must-listen episode on the cutting edge of cybersecurity and aviation.
]]>In this enlightening episode of Nerding Out with Viktor, Viktor Petersson welcomes authentication expert Massi Gori to delve deep into the ever-evolving world of digital identity and security. Massi, a seasoned product manager at Canonical, brings over 17 years of experience in identity management, from foundational protocols like LDAP and Kerberos to the latest advancements in passkeys and zero-trust models.
The conversation begins with a historical journey through the evolution of authentication technologies, highlighting the pivotal roles of LDAP and Kerberos, which laid the groundwork for modern identity verification. Massi reflects on the shift from SAML to OAuth and OpenID, underscoring how these standards set the stage for today's Single Sign-On (SSO) systems and federated identity management.
Viktor and Massi explore the crucial distinction between authentication (verifying who you are) and authorization (determining what you can access), unraveling the often-complex concepts behind identity management. Massi emphasizes the importance of user management and identity governance, illustrating how each plays a vital role in securing enterprise environments. They also cover the rising significance of Multi-Factor Authentication (MFA) and the progression from hardware tokens to modern soft tokens, which have simplified yet bolstered the security framework for millions.
The discussion transitions to FIDO2 and WebAuthn standards, a major leap toward a passwordless future. Massi shares insights into the mechanics behind these protocols and how FIDO2's architecture enhances security against adversaries-in-the-middle and other sophisticated attacks. He also addresses the role of biometrics, behavioral metrics, and device-based security as essential components of the zero-trust framework, shedding light on why continuous verification is more important than ever in the digital age.
Towards the end, Viktor and Massi discuss passkeys—the new generation of passwordless authentication. Massi explains how passkeys combine the security of FIDO2 with the convenience of cloud sync, making it easier for users to recover credentials without sacrificing security. The duo addresses the trade-offs between using traditional hardware tokens like YubiKeys and the cloud-based flexibility of passkeys, giving listeners a comprehensive look at the future of authentication.
This episode is a must-listen for tech enthusiasts and professionals alike, offering a thorough understanding of where digital identity is headed and what companies can do to stay ahead in securing user access.
]]>In this episode of Nerding Out With Viktor, host Viktor Petersson sits down with Steve Springett, a leading figure in the world of Software Bill of Materials (SBOMs) and the primary maintainer of CycloneDX, to explore the evolving landscape of software security and SBOMs.
Steve shares his journey into the SBOM space, starting with his early experiences in supply chain management and the creation of OWASP Dependency-Track, a project that began out of necessity to manage full-stack inventories of hardware and software. Steve discusses the challenges faced during the early days, the limitations of existing tools, and how these experiences informed his later contributions to CycloneDX.
The conversation dives deep into the technical nuances of SBOMs, including the differences between CycloneDX and SPDX, two of the most prominent SBOM standards. Steve and Viktor debate the pros and cons of each, with Steve emphasizing CycloneDX's pragmatic and automatable design philosophy. The discussion also touches on the complexities of supply chain security, including the importance of provenance, the challenges of dependency tracking, and the potential risks posed by nation-state adversaries.
Steve provides insights into the future of SBOMs and how they will likely become as standard in software development as unit testing is today. He also introduces the concept of OBOMs (Operational Bill of Materials), explaining how SBOMs can extend to cover runtime environments and services, ensuring a more comprehensive approach to managing and securing software stacks.
Key topics covered: - Steve Springett's journey into SBOM and CycloneDX - Differences between CycloneDX and SPDX - The role of provenance in software supply chains - The future of SBOMs and their importance in cybersecurity compliance - Introduction to OBOMs and how they expand the SBOM concept
If you're working in software development, DevOps, or cybersecurity, this episode is packed with practical advice and forward-thinking insights on how SBOMs are reshaping the industry. Tune in to learn from one of the leading voices in the SBOM world and stay ahead in securing your software supply chain.
Check out sbomify at sbomify.com for a tool that simplifies SBOM generation and management!
]]>In this episode of Nerding Out with Viktor, I sit down with Iceman, a well-known figure in the RFID hacking community. You might have caught one of his DEFCON talks, where he's done some groundbreaking work in RFID security. Today, we're diving deep into RFID technology, hacking techniques, and security vulnerabilities that many of us take for granted in everyday systems.
RFID (Radio-Frequency Identification) is all around us—from access control systems in buildings to payment cards, car immobilizers, and even alarm systems. While it's widely used, few people realize how vulnerable this technology can be. Iceman is here to break it all down, helping us understand the difference between RF and RFID, and explaining the various frequency ranges, from low frequency (125 kHz) to high frequency (13.56 MHz) and ultra-high frequency (800-900 MHz).
Whether you're a seasoned RF enthusiast, a hacker, or just curious about the technology behind the systems we rely on, this episode offers a deep dive into the world of RFID hacking. Iceman walks us through the basics, discussing different types of key fobs, cards, and readers. He also explains how people often buy RFID cloners only to realize they can't clone certain cards due to the specific technology used. I learned this the hard way when I stumbled upon an RFID cloner at DEFCON—where I'd gone for my general interest in security—and it opened my eyes to the whole world of RFID hacking.
Iceman reveals the essential tools of the trade, from the Proxmark to the Blue Gun Cloner, to more advanced gear like the iCopyX. We talk about the different tools available at all levels, from hobbyist to professional pentesters. But we don't stop at the tools—he breaks down how RFID authentication and encryption work, and how vulnerabilities like static and dynamic nonces leave even "secure" systems exposed.
One of the most exciting parts of the conversation is learning that RFID hacking isn't just about cloning a fob or breaking into a building. Iceman talks about how the hacking community is really about exploring, learning, and pushing the boundaries of technology. His story about creating the Iceman Fork of the Proxmark repository is a great example of how hackers collaborate to improve tools and share knowledge.
We also get into more advanced RFID attacks like downgrade attacks, where hackers exploit systems that still support older, less secure versions of card technology. Iceman shares some real-world examples of how these vulnerabilities play out, giving us a peek behind the curtain at how hackers find and exploit these security gaps.
We explore the security (or lack thereof) in systems we encounter every day—like hotel room key cards and smart locks. Iceman breaks down how even high-end systems can be vulnerable to simple cloning or more sophisticated downgrade and replay attacks. We also touch on newer technologies like NFC and mobile credentials, discussing how they compare to older RFID systems.
For those of you looking to get started with RFID hacking or to deepen your knowledge, Iceman has some great advice on tools to buy, where to start, and how to get involved in the community. He also shares where you can pick up a Proxmark device and how to join the Proxmark Discord community, which is full of discussions, support, and new insights.
So, whether you're here to learn about RFID technology, interested in ethical hacking, or just love getting nerdy about tech, this episode is packed with great information and stories from one of the top minds in RFID hacking.
]]>In this episode of Nerding Out with Viktor, host Viktor Petersson sits down with Philipp Deppenwiese, Head of Solution Engineering at Binarly, to delve into the critical yet often overlooked world of firmware security. As they explore the unique challenges of firmware and BIOS, Viktor and Philipp shed light on the importance of transparency in the development process. The conversation takes a fascinating turn as they dive into Binarly's groundbreaking discoveries, including the infamous "Logo Fail" vulnerability that exposed critical flaws in BIOS boot logos.
Philipp shares his extensive expertise in cybersecurity, discussing the intricacies of Binarly's tooling, such as FW Hunt and the newly launched RISK Binarly service. This innovative approach allows users to scan firmware for vulnerabilities and generate SBOMs directly from binary code, making it a game-changer in the industry. As they touch on responsible disclosure with hardware vendors, PKI management, and attestation, Viktor and Philipp offer valuable insights into the cultural and technical challenges facing the hardware and firmware industry.
Don't miss out on this deep dive into firmware security - hit play now! For more information, check out Binarly's RISK Service at risk.binarly.io, the Open Source Firmware Conference at osfc.io, and the SBCTL Tool for Secure Boot on GitHub.
]]>In this episode of "Nerding Out with Viktor," Justin shares his unique insights on the evolution of Docker, the containerization pioneer. He reminisces about the early days of the London DevOps scene and its significant role in shaping the global community. The conversation delves into Docker's origins, highlighting the challenges and rapid rise to prominence in the cloud-native ecosystem.
Justin expertly debunks the debate surrounding containers versus VMs, providing a nuanced understanding of Docker's success in simplifying application packaging and deployment. He also provides clarity on Docker's pivotal business shift in 2019, where the company split into two entities, focusing on developers and the cloud while selling off Docker Enterprise.
The discussion also touches on the controversy surrounding Docker Desktop's pricing changes and the ongoing efforts to optimize Docker Hub's infrastructure. Additionally, Justin explores Docker Scout's role in generating SBOMs (Software Bill of Materials) and its potential for enhancing security through real-time vulnerability alerts. As Docker continues to innovate, this conversation highlights the company's focus on empowering developers while addressing practical challenges in running software at scale.
]]>In this episode of "Nerding Out with Viktor," Viktor dives deep into the world of artificial intelligence with Luke Marsden, an AI expert and visionary behind Helix. The conversation explores the rapidly evolving landscape of large language models (LLMs), the impact of OpenAI's ChatGPT, and the rise of open-source AI alternatives. Luke sheds light on the current state of AI, discussing how companies like Meta, Google, and Microsoft are shaping the future.
The episode delves into the ongoing debate between open-source AI models and proprietary systems, highlighting the benefits and risks associated with each approach. Viktor and Luke discuss the emergence of Helix, a groundbreaking platform that enables businesses to harness the power of AI while maintaining control over their data. The conversation also touches on AI security and ethics, as well as the potential for Artificial General Intelligence (AGI).
Throughout the episode, Luke shares practical insights into how businesses can leverage AI to drive innovation, from automating routine tasks to providing personalized recommendations. With a mix of technical depth and real-world examples, this episode offers a unique perspective on the future of AI, making it a must-listen for tech enthusiasts and industry professionals alike.
]]>On this engaging episode of "Nerding Out with Viktor", Viktor sits down with Daniel Stenberg, founder of the widely adopted command-line tool Curl, to discuss his fascinating journey from early programming days on Commodore 64 and Amiga to creating a tool that has become indispensable for developers worldwide. Daniel shares insights into maintaining an open-source project for over 26 years, including the complexities of supporting various architectures and quirky operating systems like Windows. The conversation highlights Daniel's anecdotes about crazy support requests, the importance of community building, and reducing friction for contributors. He also delves into adopting new standards in Curl, backward compatibility, and security measures to prevent supply chain attacks. Additionally, Daniel shares his thoughts on open-source funding, sponsorships, and the challenges faced by maintainers. Join Viktor for this insightful discussion with a true pioneer in the open-source world, offering valuable takeaways for developers, open-source enthusiasts, and anyone interested in software development.
]]>On this episode of "Nerding Out with Viktor", we dive into the world of cybersecurity with special guest Allan. He shares his expertise on CISA, the civilian government's critical infrastructure defense and security agency, highlighting its role in safeguarding American society.
We also explore the concept of Software Bill of Materials (SBOMs), their origin, and why they're crucial for cybersecurity. Allan discusses the evolution of SBOMs, accelerated by executive orders, and international collaborations driving their implementation across various sectors.
From technical aspects to challenges and solutions, we cover it all. We discuss SBOM formats like CycloneDX and SPDX, common obstacles in generating and using SBOMs, and the importance of automation. Allan also shares his insights on open-source software and SBOMs, as well as the impact of international policies and frameworks on SBOM adoption and standardization.
Viktor's conversation with Allan provides practical advice for organizations starting their SBOM journey, offering a unique perspective on securing software supply chains and enhancing transparency in software development. Join us to discover the importance of SBOMs in today's cybersecurity landscape and how they can be leveraged for better software security.
]]>In this episode of "Nerding Out with Viktor," Bryan Cantrill, CTO and co-founder of Oxide Computer Company, joins Viktor Petersson for a thought-provoking conversation about the future of cloud infrastructure. Bryan shares his expertise on DTrace, a game-changing system monitoring tool he pioneered at Sun Microsystems, which emphasized observation over modification, ensuring minimal impact on system performance.
The discussion delves into Bryan's experiences at Joyent, where he navigated the challenges of operating a public cloud on commodity hardware, and how these insights led to the founding of Oxide Computer Company. Viktor and Bryan explore the innovative design choices behind Oxide's holistic solution, which integrates hardware and software design for efficient and flexible cloud computing on-premises.
As the conversation unfolds, Bryan highlights the economic and practical benefits of owning infrastructure versus renting it from public cloud providers, making a compelling case for modern, scalable, and efficient computing solutions that can be deployed both in the cloud and on-premises. Join Viktor and Bryan as they nerd out over the evolution of computing technology and the future of cloud infrastructure, featuring one of the industry's leading innovators.
]]>In this captivating episode of Nerding Out with Viktor, Christian Walter from 9Elements shares his expertise on firmware and hardware security, diving deep into vulnerabilities, BIOS security, and open-source firmware advancements. As a leading expert in the field, Christian brings years of experience in IT security, hardware security, and firmware development to the conversation.
Viktor and Christian explore two significant BIOS vulnerabilities: LogoFAIL and PixieFAIL, discussing their technical details, impact, and critical importance. They also discuss Trusted Platform Modules (TPMs), highlighting a recent vulnerability in Intel's TPMs and the need for stringent security measures. The conversation shifts to the Firmware CI Project, an initiative by 9Elements to simplify and automate firmware testing and development practices.
Christian shares his insights on the Open Source Firmware Foundation, its goals, and the importance of having a neutral ground for developing and promoting open-source firmware standards. He also expresses skepticism about AI integration in firmware, raising concerns about potential security risks. Don't miss this insightful episode with Christian Walter, perfect for firmware developers, security professionals, or tech enthusiasts looking to stay ahead in the world of firmware and hardware security.
]]>In this episode of "Nerding Out with Viktor," join Viktor as he delves into the world of Linux and open source with Mark Shuttleworth, founder of Canonical and Ubuntu. This insightful conversation takes listeners on a journey through Mark's storied career, from pioneering space tourism to shaping the Linux ecosystem with Ubuntu.
Mark shares his experiences starting a certificate authority in the early days of the internet, offering valuable insights into the evolution of Ubuntu and its impact on the industry. The discussion also touches on the innovative concept of snaps, which has revolutionized package management for developers. Viktor and Mark explore the future of open source technology, providing listeners with a wealth of knowledge and inspiration.
Whether you're a seasoned Linux enthusiast or simply curious about the intersection of technology and business, this conversation offers something for everyone. Tune in to discover the stories and strategies behind one of the leading figures in tech today, and gain a deeper understanding of Mark's vision for the future of open source innovation.
]]>In this captivating episode of "Nerding Out with Viktor," Viktor engages in a thought-provoking conversation with Eben Upton, the visionary behind Raspberry Pi. As they delve into the inspiring story of Raspberry Pi's evolution from an educational tool to its significant impact on various industries, including digital signage solutions like Screenly. Viktor and Eben explore pressing issues such as SD card durability and the intriguing potential of RISC-V in Raspberry Pi platforms. This conversation offers valuable insights for tech enthusiasts, educators, and industry professionals looking to understand the intersection of technology, education, and business innovation. Eben's expertise provides a unique perspective on the transformative impact of Raspberry Pi, making this episode a must-listen for those interested in the latest technological advancements. With Viktor's signature conversational style, listeners will be treated to an engaging and informative discussion that is sure to spark their curiosity.
]]>In this enlightening episode of "Nerding Out with Viktor," esteemed guest Liz Rice shares her expertise on eBPF, a powerful kernel programming technology that's transforming the security and observability landscape. As a leading voice in the eBPF community, Liz offers insights into its evolution from a packet filtering tool to a dynamic kernel behavior modification solution. With real-world examples from companies like Netflix and Meta, she demonstrates eBPF's ability to handle massive scale operations and its impact on infrastructure.
The conversation also explores the acquisition of Isovalent by Cisco, discussing the implications for the eBPF ecosystem and Isovalent's commitment to open source. Liz and Viktor delve into critical topics like runtime security, supply chain security in the open-source domain, and compliance issues in regulated industries. Throughout the episode, Liz showcases how eBPF can meet stringent security requirements without compromising on innovation.
This episode is a must-listen for anyone interested in kernel programming, cybersecurity, and compliance. With Liz's expertise as a renowned security geek and open source advocate, listeners will gain valuable insights into the transformative potential of eBPF and its future implications for the tech industry.
]]>In this episode of "Nerding Out with Viktor," Richard Hughes from Red Hat and Mario Limonciello from AMD join host Viktor to dive into the world of firmware updates in the Linux ecosystem. With decades of experience in open-source, Richard shares his journey from creating essential tools like PackageKit to spearheading firmware update solutions through the fwupd project. Mario, with a rich background in enabling Linux on various devices, sheds light on the collaboration that led to significant advancements in firmware updates for Linux.
Together, they discuss the challenges and triumphs of developing fwupd and the Linux Vendor Firmware Service (LVFS), services that have transformed how firmware updates are deployed and managed across millions of devices. Viktor's conversation with Richard and Mario offers invaluable insights into a crucial aspect of modern computing, making this episode a must-listen for tech enthusiasts, developers, and anyone curious about the backend of their device's updates.
]]>Join Viktor Petersson on this episode of Nerding Out with Viktor as he dives into the world of open source security with guest Chris Swan, a seasoned engineer at Atsign. Together, they explore the critical role of SBOMs (Software Bill of Materials) and OpenSSF Scorecards in securing software and promoting transparency. Chris shares his expertise on how Atsign harnesses these tools to safeguard their networking platform and build trust with users.
The conversation shines a light on the importance of OpenSSF within the Linux Foundation, highlighting Atsign's adoption of scorecards as a testament to their commitment to security. They also delve into the challenges and solutions surrounding dependency management, the shift towards secure coding practices, and the broader implications for the tech industry. This episode is packed with expert advice, strategic insights, and practical takeaways on ensuring security in open-source projects and beyond. As Viktor engages in conversation with Chris, listeners will gain a deeper understanding of the cutting-edge strategies being implemented by Atsign and the wider tech community.
]]>In this episode of "Nerding Out with Viktor," Viktor engages in a captivating conversation with Simon Westh Henriksen, co-founder of Kin (mykin.ai), a pioneering company merging AI, machine learning, and digital privacy. As they delve into Web3 and data sovereignty, Simon emphasizes the significance of individual ownership and control over digital data. He shares his entrepreneurial journey, from software engineering to tech startups, highlighting experiences in various industries and lessons learned during the COVID-19 pandemic.
Their discussion centers on Kin's mission: building a privacy-first, personal AI assistant. Simon delves into technical challenges, innovations, and approaches to handling data locally on devices while balancing user convenience and security. They explore the future of AI interaction, including decentralized web nodes for data portability and the concept of AI agents communicating with each other.
Simon invites listeners to explore Kin further, encourages engineers to join their team, and invites interested individuals to sign up for Kin's beta. This thought-provoking conversation offers a unique blend of industry insights, innovative ideas, and expertise in AI and privacy.
]]>In this episode of "Nerding Out with Viktor," join Viktor as he delves into the world of coreboot, an open-source BIOS technology, alongside esteemed guests Matt DeVillier (Mr. Chromebox) and David Hendricks. Together, they explore the intricacies of coreboot, its applications in Chromebooks and server environments, and its significance in securing firmware through Secure Boot.
The conversation navigates critical topics like supply chain security, emphasizing transparency and control in firmware development, and introduces Software Bill of Materials (SBOMs) as a means to ensure firmware integrity and trust. Viktor's guests share their experiences with coreboot, highlighting its potential for extending the lifespan of hardware and promoting sustainable computing practices.
As they discuss the challenges and benefits of transitioning to coreboot, Matt and David shed light on the importance of early engagement with Original Design Manufacturers (ODMs) and the value of consulting services. With a focus on RISC-V in the open hardware field and coreboot's role in this evolving area, this episode offers a comprehensive understanding of coreboot, its impact on technology, and its vision for the future of BIOS technology.
In this engaging episode of Nerding Out with Viktor, renowned tech expert Guillaume Belanger from Canonical joins the conversation to delve into the fascinating world of 5G and 4G technologies. As an industry insider with a wealth of knowledge, Guillaume sheds light on the transformative potential of open-source solutions in revolutionizing the telecom sector. Specifically, he discusses the game-changing projects like Magma and SD-Core, and how e-SIMs are poised to disrupt traditional network management. Viktor and Guillaume also explore the intriguing possibility of 5G becoming the new Wi-Fi standard, and dive into the technical nuances of private 5G networks, including software-defined networking and regulatory considerations. With Guillaume's expert insights, listeners will gain a deeper understanding of the emerging trends in telecom and the crucial role that tech giants like Google and Amazon are playing in shaping the industry landscape. This conversation is a must-listen for anyone looking to stay ahead of the curve in the rapidly evolving world of 5G and 4G technologies.
]]>On this episode of Nerding Out with Viktor, Chris Fabian, co-founder of Giga, joins host Viktor Petersson for a fascinating conversation about connecting every school in the world to the internet. With his impressive background in establishing internet service providers in East Africa and innovating at UNICEF, Chris brings a wealth of expertise to the table. As they geek out on tech, they explore the critical need for digital connectivity, particularly in emerging markets where 70% of schools are disconnected from the internet.
Viktor and Chris delve into the economic and educational impact of school connectivity, highlighting the potential for increased schooling years and GDP per capita. They also discuss the role of blockchain technology in Giga's approach, envisioning schools as nodes in a decentralized network that can facilitate not only educational but also financial services. With Chris's unique perspective on open-access and fair pricing, they tackle regulatory challenges and technological advancements in the telecom industry. This conversation is a must-listen for anyone interested in education, innovation, and global good – tune in to Nerding Out with Viktor!
]]>Join Viktor on this fascinating episode of "Nerding Out with Viktor" as he dives into the world of digital content standards with special guest Dom Guinard from Digimarc. In this engaging conversation, you'll gain insights into the latest developments in generative AI and its impact on digital content. Explore the intricacies of C2PA (Coalition for Content Provenance and Authenticity), a standard that's making waves in the industry.
What to Expect:
Takeaways:
Additional Resources:
Check out these useful links: * C2PA Standard * Content Authenticity Initiative * Digimarc's C2PA Chrome Extension
]]>In this electrifying episode of "Nerding Out with Viktor," join Viktor as he delves into the fascinating world of Nix with Jon from Canonical. As VP of Enterprise Engineering, Jon brings a treasure trove of experience in Linux distributions and automation tools like JuJu and charms. Together, they dive into the realm of Nix, highlighting its prowess as both a functional programming language and robust package manager.
Jon reveals Nix's superpower for creating unparalleled reproducibility across systems, revolutionizing system configuration with the Nix package manager and module system. The conversation navigates the intricacies of NixOS, showcasing its immutable elegance and seamless integration with tools like TailScale. Witness Jon's home setup, a tech enthusiast's paradise, and get insights into his curated list of resources for mastering Nix:
This episode is an unmissable treat for tech aficionados seeking to harness the future of system management and software development. Viktor and Jon take listeners on a riveting journey into the heart of Nix, making it an exhilarating exploration for anyone looking to dive into the world of Nix with expert guidance from Jon's expertise.
]]>In this episode of Nerding Out with Viktor, host Viktor Petersson dives deep into the world of observability with special guest Julius Volz, co-founder of Prometheus and founder of PromLab. As they geek out over monitoring systems, Julius shares his expertise on the technical aspects of Prometheus, including its dimensional data model, query language (PromQL), and efficient handling of time series data.
The conversation covers best practices in server monitoring, the power of alert managers, and the challenges of long-term data storage, with insights into solutions like Cortex and Thanos. Julius also showcases the simplicity and flexibility of writing Prometheus exporters, even for those without extensive coding knowledge. Get ready to be inspired by unique use cases of Prometheus in industries such as wind power, shipping, and transportation.
Tune in to learn about emerging trends in observability, including the role of eBPF in Prometheus, integration with OpenTelemetry, and the evolution of the OpenMetrics project. This episode is a must-listen for anyone interested in monitoring systems, observability, and the future of IT operations management.
]]>In this episode of "Nerding Out with Viktor," cybersecurity expert Andy Martin from ControlPlane joins Viktor for an in-depth exploration of Cloud Native security. As a seasoned security engineer, Andy shares his expertise in servicing regulated industries like finance and government, offering unique insights into the field.
The conversation covers a range of critical topics, including penetration testing, social engineering attacks, and the ethics of hacking. Viktor and Andy delve into the nuances of Black Hat, White Hat, and Grey Hat hackers and their impact on cybersecurity. They also discuss the importance of compliance and certifications in Cybersecurity, focusing on SOC 2 and ISO 27001.
Andy's practical Threat Modeling Exercise is a highlight of the episode, showcasing real-time risk assessment strategies. The conversation also touches on Supply Chain Security and Software Bills of Materials (SBOMs), emphasizing their significance in software development.
With Andy's expertise at the forefront, this episode is a must-listen for cybersecurity professionals and IT enthusiasts looking to stay up-to-date with the latest trends and practices in digital security. Tune in to gain valuable insights from Andy Martin and ControlPlane!
]]>In this inaugural episode of "Nerding Out with Viktor", Viktors launches his exciting new series where he delves into the intricacies of technology, bringing together insightful discussions and expert opinions every fortnight. Tune in to get a sneak peek at what's in store for this tech-savvy audience.
Joining Viktor is a subject matter expert who brings their unique insights and deep knowledge to the table. Together, they'll explore cutting-edge topics such as AI/ML, DevSecOps, Open Hardware, and the vast universe of Open Source. You'll gain valuable insights into the latest tech trends and innovations that are shaping the industry.
As a seasoned entrepreneur and self-proclaimed nerd, Viktor is well-equipped to guide you through these complex themes, making them accessible and engaging for listeners at all levels - from industry veterans to students and hobbyists with a passion for learning. Stay tuned to find out who his first expert guest is! Don't miss this opportunity to level up your tech knowledge and get ready to nerd out with Viktor every fortnight.
]]>En liten tjänst av I'm With Friends. Finns även på engelska.