One-Time Pod
Derek Bruff
2 Listeners
All episodes
Best episodes
Top 10 One-Time Pod Episodes
Goodpods has curated a list of the 10 best One-Time Pod episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to One-Time Pod for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite One-Time Pod episode by adding your comments to the episode page.
Episode 43 - Cicada 3301
One-Time Pod
08/07/21 • 19 min
by Sebastian Garaycochea
On January 4th 2012 a mysterious post appears on the infamous 4chan website, leaving everyone “puzzled”. The post says that they are looking for highly talented individuals and that there is a message hidden within it. From this stems one of the most intricate scavenger hunt of recent history, stemming to three highly complex puzzles and the search for the mysterious group behind the post. This episode talks about this mystery and the secret group of 3301 that’s behind it. The episode aims to answer the questions Who is 3301? What is their purpose? And finally, What has led them to exist? In this podcast we will also be analyzing and solving the puzzles posted by 3301. If you are interested in creepy mysteries, be sure to give this podcast a listen and follow me into this rabbit hole.
Works Cited
Kushner, D. (2015, January 15). Cicada: Solving the Web’s Deepest Mystery. Rolling Stone. https://www.rollingstone.com/culture/culture-news/cicada-solving-the-webs-deepest-mystery-84394/
Åhlén, J. (n.d.). Cicada 3301 First Puzzle Walkthrough | Boxentriq. Boxentriq. Retrieved April 16, 2021, from https://www.boxentriq.com/code-breaking/cicada-3301-first-puzzle-walkthrough
Andrei, M. (2021, February 1). Cicada 3301: A puzzle for the brightest minds, posted by an unknown, mysterious organization. ZME Science. https://www.zmescience.com/other/feature-post/cicada-3301-puzzle-brightest-minds-posted-unknown-mysterious-organizationt/
Agate Level Up. (2019, March 22). ARG’s Power to Spread Brand Awareness. https://agatelevelup.id/ar-to-spread-brand-awareness/
Corcoran, K. (2018, January 16). GCHQ is using this puzzle to recruit aspiring female spies – try it out. Business Insider. https://www.businessinsider.com/gchq-puzzle-recruitment-female-spies-try-it-out-2018-1?international=true&r=US&IR=T
Bergen, M. (2015, August 26). “Puzzles Are Fun. Search On”: Google Cops to Secret Recruiting Tool Baked Inside Search. Vox. https://www.vox.com/2015/8/26/11618060/puzzles-are-fun-search-on-google-admits-secret-recruiting-tool-in
Bell, B. C. (2013, November 25). The internet mystery that has the world baffled. The Telegraph. https://www.telegraph.co.uk/technology/internet/10468112/The-internet-mystery-that-has-the-world-baffled.html
Hern, A. (2020, April 3). Cicada 3301: I tried the hardest puzzle on the internet and failed spectacularly. The Guardian. https://www.theguardian.com/technology/2014/jan/10/cicada-3301-i-tried-the-hardest-puzzle-on-the-internet-and-failed-spectacularly
Xaxanon. (2012, January 20). 00008.MTS [Video]. YouTube. https://www.youtube.com/watch?v=LdzSuKrTISc
LEMINO. (2018, May 19). Cicada 3301: An Internet Mystery [Video]. YouTube. https://www.youtube.com/watch?v=I2O7blSSzpI
Nox Populi. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5
Audio Sources
Great Big Story. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5
habitres. (2012, January 10). Voice On Phone – Cicada 3301 [Video]. YouTube. https://www.youtube.com/watch?v=k24ZrFR2IUQ
Anon Ymous. (2013, January 5). Cicada 3301 Song: The Instar Emergence (76...
2 Listeners
1 Comment
1
Episode 31 - The Unabomber Ciphers
One-Time Pod
12/12/19 • 9 min
by Kellia Love
My podcast “Kaczynski Ciphers: The Unabomber’s Unused Encryptions” is about the serial killer Dr. Theodore Kaczynski. It covers what he did before starting a life of crime, the reason for his crimes, the consequences of his actions, and ultimately, what led him to be caught and his criminal career coming to an abrupt halt. The podcast also covers how the FBI initially reacted to the ciphers that they found and how they went about the situation. For a good portion of the podcast, I explain how the two codes Kaczynski created worked, and also provided an example of how someone could encode something using his methods.
References
Kifner, John. (1992, April 6). On the Suspect’s Trail: Life in Montana. Retrieved from https://www.nytimes.com/1996/04/05/us/suspect-s-trail-life-montana-gardening-bicycling-reading-exotically.html
Kintz, Theresa. (2014, December 16). Interview with Ted Kaczynski. Retrieved from https://theanarchistlibrary.org/library/theresa-kintz-interview-with-ted-kaczynski.html
Klaus, Schmeh. (2014, March 8). Klaus Schmeh’s Unabomber Cipher Page. Retrieved from https://scienceblogs.de/klausis-krypto-kolumne/klaus-schmehs-unabomber-cipher-page
Klaus, Schmeh. (2016, September 4). The Ciphers of the Unabomber. Retrieved from https://scienceblogs.de/klausis-krypto-kolumne/2016/09/04/the-ciphers-of-the-unabomber/?all=1
Knowles, William. (1997 December 26). Cryptographer Examines Kaczynski’s Journal.
Unabomber. (2016, May 18). Retrieved from www.fbi.gov/history/famous-cases/unabomber
Audio Sources
From https://www.youtube.com/audiolibrary/music?nv=1
- Magic
- Voyage
- Reminisce
- Something New
Image: Unabomber shack, Wikimedia Commons, CC BY-SA
1 Listener
1 Comment
1
Episode 44 - P vs. NP
One-Time Pod
08/08/21 • 9 min
by Thomas Ditsworth
While many people rely on the internet for everything from casual emails to secure banking transactions, most don’t understand the security behind it. In this podcast, we will discuss a computer science problem that is the basis behind our most current methods of encryption. In turn, we will explore where the encryption is used, the math behind why it is so secure, and how further innovation could put it all in jeopardy.
References:
Baumhof, A. (2019, June 13). Andreas Baumhof. QuintessenceLabs.
https://www.quintessencelabs.com/blog/breaking-rsa-encryption-update-state-art
Hackerdashery. (2014, August 26). P vs. NP and the Computational Complexity Zoo
[Video]. YouTube. https://www.youtube.com/watch?v=YX40hbAHx3s&t=515s
Hardesty, L. (2009, October 29). Explained: P vs. NP. MIT News | Massachusetts
Institute of Technology. https://news.mit.edu/2009/explainer-pnp
Lake, J. (2021, March 18). What is RSA encryption and how does it work? Comparitech. https://www.comparitech.com/blog/information-security/rsa-encryption/
Pavlus, J. (2020, April 2). What Does ‘P vs. NP’ Mean for the Rest of Us? MIT
Technology Review. https://www.technologyreview.com/2010/08/19/262224/what-does-p-vs-np-meanfor-the-rest-of-us
The Millennium Prize Problems | Clay Mathematics Institute. (2021, April 19). Clay
Mathematics Institute. https://www.claymath.org/millennium-problems/millennium-prize-problems
Watson, J. (2017, March 16). Public key cryptography: What is it, how it works and how to use it in email and file encryption. Comparitech. https://www.comparitech.com/blog/vpn-privacy/what-is-public-key-cryptography/
Audio From
Royalty Free Music by Bensound | Stock Music. (n.d.). BenSound. Retrieved March 31, 2021, from https://www.bensound.com/
For more information check out the following links to other resources about topics discussed in this podcast:
P vs NP and the Computational Complexity Zoo
Are you Ready for the Quantum Computing Revolution?
Image: Screenshot from “P vs. NP and the Computational Complexity Zoo.”
1 Listener
Episode 48 - The Right to Be Forgotten
One-Time Pod
08/12/21 • 9 min
by Angela Brinckerhoff
In today’s world, it’s not very hard to find information about anyone, no matter how personal. Our posts, public records, employment history, etc. can all be uncovered within a few clicks. A University of Washington team of researchers created a project called Vanish to address this, making it possible to permanently erase personal data. This project brings up the central debate of the “right to be forgotten” movement, discussing the legality and prospect of deleting data from public databases and web searches. This podcast discusses the system behind Vanish and the different sides of the “right to be forgotten” debate. Special thanks to Amelia Muir, Henoc Zinga, and Justin Terry for their contributions.
References
Auxier, B. (2020, August 17). Most Americans support right to have some personal info removed from online searches. Pew Research Center. Retrieved from https://www.pewresearch.org/fact-tank/2020/01/27/most-americans-support-right-to-have-some-personal-info-removed-from-online-searches/
DeWeerdt, S. (2021, April 15). A Welcome Disappearing Act. Retrieved from
https://www.washington.edu/alumni/columns/dec09/findings-forget.html
Geambasu, Roxana et. al. (2021, April 15). Enhancing the Privacy of the Web with
Self-Destructing Data. Retrieved from https://vanish.cs.washington.edu/
Heilweil, R. (2018, March 05). How Close Is An American Right-To-Be-Forgotten? Forbes. Retrieved from
https://www.forbes.com/sites/rebeccaheilweil1/2018/03/04/how-close-is-an-american-right-to-be-forgotten/
Markoff, J. (2009, July 20). New Technology to Make Digital Data Self-Destruct. Retrieved from https://www.nytimes.com/2009/07/21/science/21crypto.html
Audio Sources:
https://orangefreesounds.com/swing-drum-beat-loop-with-piano-melody-132-bpm/
https://orangefreesounds.com/funk-guitar-intro/
https://orangefreesounds.com/electronic-background-music/
https://orangefreesounds.com/ocean-waves-crashing-on-beach/
https://orangefreesounds.com/mysterious-piano/
https://orangefreesounds.com/downtempo-chill-out-track/
Image: “Footprints in the sand,” Susanne Nilsson, Flickr CC BY-SA
1 Listener
Episode 39 - The Crypto Wars
One-Time Pod
08/03/21 • 11 min
by Aliyah Weaver
This episode of One-Time Pod focuses on the 1990s “crypto wars,” a power struggle between the government and the American public. How much privacy does the general American public deserve in terms of encryption, and what are the limits of the government’s surveillance of the American public?
References:
Bankston, K., Kehl, D., Wilson, A. (2015). Doomed to Repeat history? Lessons from the Crypto Wars of the 1990s. New America. https://static.newamerica.org/attachments/3407-doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/Crypto%20Wars_ReDo.7cb491837ac541709797bdf868d37f52.pdf. Accessed March 30, 2021.
Freeh, L. J. (1998). Statement for the Record of Louis J. Freeh, Director Federal Bureau of Investigation Before the Senate Select Committee on Intelligence [Speech transcript]. The Avalon Project by Yale Law School. https://avalon.law.yale.edu/20th_century/t_0011.asp. Accessed March 30, 2021.
Lewis, J. A. (2021). The Crypto Wars Are Over. Center for Strategic and International Studies. https://www.csis.org/analysis/crypto-wars-are-over. Accessed March 30, 2021.
Peterson, A. (2019). Today’s Internet users are still being hurt By ’90s-era U.S. encryption policies. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2015/05/28/todays-internet-users-are-still-being-hurt-by-90s-era-u-s-encryption-policies/. Accessed March 30, 2021.
Sound effects: Apple iMovie stock sound effects
Image: “MYK78 Clipper Chip,” Travis Goodspeed, Flickr CC BY
1 Listener
Episode 18 - The Dancing Men
One-Time Pod
12/04/18 • 10 min
by Leah Strickland
The 1903 Sir Arthur Conan Doyle short story “Sherlock Holmes and the Dancing Men” features an unusual cipher. In this podcast, I give a summary of the story, so listeners will understand why Sherlock solving the puzzle is important. I then explain how Sherlock was able to solve the Dancing Men cipher. He was able to solve it by using frequency analysis. I go on to explain how Sherlock solving this cipher is unrealistic because of more messages needed to be sent for frequency analysis to be more accurate. I then talk about how the dancing men cipher is similar to the Gold Bug cipher created by Edgar Allan Poe. I then describe some similarities between the two authors and their ciphers. I finish off my podcast by giving an example of popular cryptography in modern times.
I would like to thank Xiaoyu Dong and Xin Yi Zhang for helping me edit my script.
Sources
- https://www.geocachingtoolbox.com/index.php?page=dancingMen
- https://www.arthurconandoyle.com/biography.html
- https://illuminations.nctm.org/uploadedFiles/Content/Lessons/Resources/9-12/Caesar-DancingMen.pdf
- https://www.britannica.com/topic/substitution-cipher
- https://literature.stackexchange.com/questions/446/how-much-did-forensic-science-at-the-time-of-sherlock-holmes-publication-influe
Illustration by Sidney Paget.
1 Listener
Episode 30 - Hieroglyphics
One-Time Pod
12/11/19 • 9 min
by Daniel Kim
One of the oldest written languages ever, Egyptian hieroglyphics have remained an unsolvable mystery for hundreds of years. And while the intent was not to hide any sort of message, the process of figuring out the correlation between hieroglyphic characters and its meaning took centuries to figure out, which is why they can be considered one of the earliest forms of cryptography known to mankind.
Works Cited
Cryptographic hieroglyphic writing. (n.d.). Retrieved from https://www.britannica.com/topic/hieroglyphic-writing/Cryptographic-hieroglyphic-writing.
This article helps make the connections between hieroglyphics and cryptography: how the two relate, or rather how hieroglyphics are the earliest example of cryptography. The fact that this ancient language confused many experts for centuries shows the complexity of the language and the cracking of them would be difficult.
Dirda, M. (2012, August 22). Book World: ‘Cracking the Egyptian Code,’ by Andrew Robinson, explores hieroglyphs. Retrieved from https://www.washingtonpost.com/entertainment/books/book-world-cracking-the-egyptian-co de-by-andrew-robinson-explores-hieroglyphs/2012/08/22/db83be96-e0f5-11e1-a19c-fcfa365 396c8_story.html.
The actual cracking of the hieroglyphics is what I want to focus on, because this is essentially what I believe makes this language a cipher language. This will go into who figured out the mystery of Egyptian hieroglyphics and how he/she was able to figure it out.
Scalf, F., & Oriental Institute of the University of Chicago. (n.d.). The Rosetta Stone: Unlocking the Ancient Egyptian Language. Retrieved from https://www.arce.org/resource/rosetta-stone-unlocking-ancient-egyptian-language.
Related to the source above, this will go into the actual cracking of the cipher language. Specifically, the Rosetta Stone was an instrumental part of the process, so I want to touch upon the rock that holds the secrets of the Egyptians.
Scoville, P. (2019, October 10). Egyptian Hieroglyphs. Retrieved from https://www.ancient.eu/Egyptian_Hieroglyphs/.
This article will help me get into a lot of basics of Egyptian hieroglyphics, such as its purpose, how it was constructed/made up, and how it was used back in the time of the ancient Egyptians.
Singh, S. (2011, February 17). History – Ancient History in depth: The Decipherment of Hieroglyphs. Retrieved from http://www.bbc.co.uk/history/ancient/egyptians/decipherment_01.shtml.
This article, which is actually written by Singh, is an overview of everything from above. This covers mostly its constructs, how it was cracked, as well as several geniuses of the 17th and 18th centuries that were obsessed with the phenomenon.
Audio Sources
Retrieved from https://www.pond5.com/royalty-free-music/
Egyptian Ceremony
Retrieved from https://gumroad.com/
Dark Tension Rising
Retrieved from https://themeforest.net/
War Drums
Inspirational Background Music
Retrieved from http://soundbible.com/
Wind
Retrieved from youtube.com/
Title: Jazzy by LiQWYD
Genre and Mood: Hip Hop & Rap + Calm
License: Royalty-free music for YouTube, Facebook and Instagram videos giving the appropriate credit.
Retrieved from https://www.toneden.io/afterinfinity-music/post/continuum-royalty-free
Continuum
Retrieved from http://www.orangefreesounds.com/
Simple Peaceful Piano Melody
Mystical Background — Mysterious and Melodic Music
Image: “Hieroglyphics,” Andrea, Flickr (CC BY-SA)
1 Listener
Episode 22 - The Culper Ring
One-Time Pod
12/10/18 • 11 min
by Jerry Ji
The Culper Ring was America’s first intelligence agency, operating during the American Revolution. It was the only source of information on British activities, and such it was vital to the American victory during the war. This podcast delves into the history and workings of the Culper Ring, as well as the Culper Code that encrypted all of their messages. Although it receives very little recognition nowadays, the Culper Ring was a key factor during the American Revolution.
Works Cited
George Washington, Spymaster. (n.d.). Retrieved October 31, 2018, from https://www.mountvernon.org/george-washington/the-revolutionary-war/spying-and-espionage/george-washington-spymaster/
Gould, K. (2016, May 06). Culper Spy Ring. Retrieved October 31, 2018, from https://www.britannica.com/topic/Culper-Spy-Ring
History.com Editors. (2010, March 19). The Culper Spy Ring. Retrieved October 31, 2018, from 1 Listener
Episode 6 - The Buzzard
One-Time Pod
11/20/17 • 15 min
by Shalin Naik
Olivier Levasseur was a ruthless and cunning pirate that terrorized the seas earning him the title La Buse: The Buzzard. Along with being a pirate, La Buse was highly educated and created a cipher to hide his 500 million Euro treasure he had pirated from a Bishop from France. His cipher has become one of the most confusing artifacts from the pirate times and has led one man to the edges of the Seychelles Archipelago trying to find it.
Sources:
Bath, G. The Levasseur Cryptogram. Retrieved from www.gjbath.com/Misc/LaBuse.htm
La Buse Cryptogram. Retrieved from
cipherfoundation.org/older-ciphers/...se-cryptogram/
Soteriou, H. (27 April 2017). The Island with $100 million hidden. Retrieved from
www.bbc.com/travel/story/201704...-100-million-hidden
Burridge, G. (10 August 2012). The Buzzard’s hoard: The fabulous, undiscovered pirate treasure of Seychelles. Retrieved from
glynnburridge.com/blog/2012/08/the...e-of-seychelles/
Tiburcio, M. (2012). Prying Open the Pigpen Cipher. Retrieved from
derekbruff.org/blogs/fywscrypto/...he-pigpen-cipher/
Music:
www.royaltyfreemusicforfree.com/free-back...und-music
www.royaltyfreemusicforfree.com/free-back...und-music
www.royaltyfreemusicforfree.com/free-back...ther-life
www.orangefreesounds.com/big-waves-cr...-stormy-sea/
Episode 1 - The Zodiac Ciphers
One-Time Pod
11/08/17 • 11 min
by Kelsey Brown
The Zodiac killer is one of the most infamous serial killers of all time and has remained a mystery that will always intrigue public interest. The image of the 1960s, a time of hippies, love and social expansion, was tainted as he began to lurk in the night and violently murder more and more people. But even with extensive witness descriptions and multiple suspects, he was never caught and has never even been identified. The Zodiac keep himself anonymous and has kept society questioning what exactly happened in those fateful years for the last 57 years by simply using the most intriguing skill in history: cryptography. The Zodiac killer menaced and taunted the police and press through a series of letters, in plaintext and ciphertext, that he claimed contained is long sought after identity. In this podcast, the host, Kelsey Brown, a freshman at Vanderbilt University, delves into the story of the Zodiac killer, starting at the beginning of his killing career and proceeding to explain the mechanics and decipherment of the Zodiac Cipher and ending with how this cultural phenomenon has remained prevalent even today.
Sources:
The Zodiac Ciphers: Messages from a Murderer, by Neil Sareen:
derekbruff.org/blogs/fywscrypto/...-from-a-murderer/
Analysis of the Zodiac Killer’s Three Part Cipher:
www.zodiologists.com/z408_cipher_analysis.html
FBI Records: The Vault: The Zodiac Killer:
vault.fbi.gov/The%20Zodiac%20Kil...20of%2006%20./view
Corey Starliper, Massachusetts Man, Claims He Cracked Zodiac Killer’s Code. The Huffington Post by Ben Muessig
www.huffingtonpost.com/2011/07/21/co...n_906092.html
Zodiac Killer:The Encyclopedia of American Crime: Carl Sifakis:
online.infobase.com/HRC/LearningCen...rticleId=198488
Zodiac Killer Biography:
www.biography.com/people/zodiac-killer-236027
Audio:
Creepy Background Music:
www.royaltyfreemusicforfree.com/free-back...und-music
Time Traveler Beautiful Melodies For Fantastic Stories
Gunshot Sounds:
Dreamy Ambient Background Music:
www.orangefreesounds.com/category/mus...round-music/
Audio From The Zodiac Killer – ABC Primetime Investigation:
www.youtube.com/watch?v=LCYbAdzCAjE
Audio From This is the Zodiac Speaking:
www.youtube.com/watch?v=HI0jnsbZwys
Show more best episodes
Show more best episodes
Featured in these lists
FAQ
How many episodes does One-Time Pod have?
One-Time Pod currently has 52 episodes available.
What topics does One-Time Pod cover?
The podcast is about History and Podcasts.
What is the most popular episode on One-Time Pod?
The episode title 'Episode 43 - Cicada 3301' is the most popular.
What is the average episode length on One-Time Pod?
The average episode length on One-Time Pod is 11 minutes.
How often are episodes of One-Time Pod released?
Episodes of One-Time Pod are typically released every day.
When was the first episode of One-Time Pod?
The first episode of One-Time Pod was released on Nov 6, 2017.
Show more FAQ
Show more FAQ