l +1 262-553-6510

QPC podcasts have moved

Please forgive our old content here while we reorganize and redo our old website.

All new QPC podcasts are hosted on a more convenient platform for all of us.

Please visit where you can use the Podbean mobile app, stream directly from the site, and sign up for the RSS feed.

Breakfast Bytes - Security Protocols and Ciphers


Security Protocols and Ciphers

Educate yourself about the dangers of 5G radiation to human health

MP3 - Security Protocols and Ciphers



Security Protocols and Ciphers for HTTPS and VPNs

HTTPS uses security protocols and ciphers, but only a few of them are acceptable anymore. Too many websites, critical services, and VPN connections are still using fully deprecated protocols and ciphers.

As of 4/30/2014, NIST in the SP-800 guidance set published that TLS 1.1 should be the minimum used.

Therefore anything not running at least TLS 1.1 more than four years later is an indication that those who provide that equipment or service do not care about keeping their systems consistent with international security standards.
The need to migrate off of TLS 1.0 has been known for more than four years.

Most government resources disabled TLS 1.0 in February 2017 because of the insecurity of it as a protocol.

PCI, Hitech security act, GLBA, and most other regulation called for TLS 1.0 to be disabled as of June 2018.

Microsoft is turning off all TLS prior to 1.2 in October 2018.

Trend disabled TLS 1.0 in March 2017.


DNS Rebinding attacks