Coded
These are the programmers on the frontlines of the war over security and privacy.

0 seconds of 6 minutes, 54 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
Keyboard Shortcuts
Shortcuts Open/Close/ or ?
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Decrease Caption Size-
Increase Caption Size+ or =
Seek %0-9
How AI could revolutionize coffee
Could the blockchain be used to make fair trade goods live up to their promise?
All Episodes (17)
The world’s first state-backed cryptocurrency was a revolutionary idea that could’ve saved Venezuela’s economy. Here’s what went wrong.

Tractor hacking is a fast-growing trend in the farming community — but it’s not outsiders breaking in.

What can we do about troll farms, deepfakes, and phoney headlines in the disinformation age?

There are nearly 3,000 satellites in orbit, and all of them are subject to a breach in satellite security. Here’s how white hat hackers can help.

Pentesters use the same methods of breaching as criminal hackers, with one key distinction: they’re hired by the owner of the system and perform the attack with permission.
