Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
One-Time Pod

One-Time Pod

Derek Bruff

One-Time Pod explores the history of cryptography through episodes produced by students in Derek Bruff's first-year writing seminar at Vanderbilt University.
profile image

2 Listeners

bookmark
Share icon

All episodes

Best episodes

Top 10 One-Time Pod Episodes

Goodpods has curated a list of the 10 best One-Time Pod episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to One-Time Pod for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite One-Time Pod episode by adding your comments to the episode page.

One-Time Pod - Episode 43 - Cicada 3301
play

08/07/21 • 19 min

by Sebastian Garaycochea

On January 4th 2012 a mysterious post appears on the infamous 4chan website, leaving everyone “puzzled”. The post says that they are looking for highly talented individuals and that there is a message hidden within it. From this stems one of the most intricate scavenger hunt of recent history, stemming to three highly complex puzzles and the search for the mysterious group behind the post. This episode talks about this mystery and the secret group of 3301 that’s behind it. The episode aims to answer the questions Who is 3301? What is their purpose? And finally, What has led them to exist? In this podcast we will also be analyzing and solving the puzzles posted by 3301. If you are interested in creepy mysteries, be sure to give this podcast a listen and follow me into this rabbit hole.

Works Cited

Kushner, D. (2015, January 15). Cicada: Solving the Web’s Deepest Mystery. Rolling Stone. https://www.rollingstone.com/culture/culture-news/cicada-solving-the-webs-deepest-mystery-84394/

Åhlén, J. (n.d.). Cicada 3301 First Puzzle Walkthrough | Boxentriq. Boxentriq. Retrieved April 16, 2021, from https://www.boxentriq.com/code-breaking/cicada-3301-first-puzzle-walkthrough

Andrei, M. (2021, February 1). Cicada 3301: A puzzle for the brightest minds, posted by an unknown, mysterious organization. ZME Science. https://www.zmescience.com/other/feature-post/cicada-3301-puzzle-brightest-minds-posted-unknown-mysterious-organizationt/

Agate Level Up. (2019, March 22). ARG’s Power to Spread Brand Awareness. https://agatelevelup.id/ar-to-spread-brand-awareness/

Corcoran, K. (2018, January 16). GCHQ is using this puzzle to recruit aspiring female spies – try it out. Business Insider. https://www.businessinsider.com/gchq-puzzle-recruitment-female-spies-try-it-out-2018-1?international=true&r=US&IR=T

Bergen, M. (2015, August 26). “Puzzles Are Fun. Search On”: Google Cops to Secret Recruiting Tool Baked Inside Search. Vox. https://www.vox.com/2015/8/26/11618060/puzzles-are-fun-search-on-google-admits-secret-recruiting-tool-in

Bell, B. C. (2013, November 25). The internet mystery that has the world baffled. The Telegraph. https://www.telegraph.co.uk/technology/internet/10468112/The-internet-mystery-that-has-the-world-baffled.html

Hern, A. (2020, April 3). Cicada 3301: I tried the hardest puzzle on the internet and failed spectacularly. The Guardian. https://www.theguardian.com/technology/2014/jan/10/cicada-3301-i-tried-the-hardest-puzzle-on-the-internet-and-failed-spectacularly

Xaxanon. (2012, January 20). 00008.MTS [Video]. YouTube. https://www.youtube.com/watch?v=LdzSuKrTISc

LEMINO. (2018, May 19). Cicada 3301: An Internet Mystery [Video]. YouTube. https://www.youtube.com/watch?v=I2O7blSSzpI

Nox Populi. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5

Audio Sources

Great Big Story. (2016, May 20). 2012 Cicada 3301 Solutions Part 1 [Video]. YouTube. https://www.youtube.com/watch?v=ad_DNgdc35A&list=PLj-CncBDqQ45xQxsjVn5I7fJccKJWxPQ5

habitres. (2012, January 10). Voice On Phone – Cicada 3301 [Video]. YouTube. https://www.youtube.com/watch?v=k24ZrFR2IUQ

Anon Ymous. (2013, January 5). Cicada 3301 Song: The Instar Emergence (76...

profile image

2 Listeners

comment icon

1 Comment

1

bookmark
plus icon
share episode
One-Time Pod - Episode 31 - The Unabomber Ciphers
play

12/12/19 • 9 min

by Kellia Love

My podcast “Kaczynski Ciphers: The Unabomber’s Unused Encryptions” is about the serial killer Dr. Theodore Kaczynski. It covers what he did before starting a life of crime, the reason for his crimes, the consequences of his actions, and ultimately, what led him to be caught and his criminal career coming to an abrupt halt. The podcast also covers how the FBI initially reacted to the ciphers that they found and how they went about the situation. For a good portion of the podcast, I explain how the two codes Kaczynski created worked, and also provided an example of how someone could encode something using his methods.

References

Kifner, John. (1992, April 6). On the Suspect’s Trail: Life in Montana. Retrieved from https://www.nytimes.com/1996/04/05/us/suspect-s-trail-life-montana-gardening-bicycling-reading-exotically.html

Kintz, Theresa. (2014, December 16). Interview with Ted Kaczynski. Retrieved from https://theanarchistlibrary.org/library/theresa-kintz-interview-with-ted-kaczynski.html

Klaus, Schmeh. (2014, March 8). Klaus Schmeh’s Unabomber Cipher Page. Retrieved from https://scienceblogs.de/klausis-krypto-kolumne/klaus-schmehs-unabomber-cipher-page

Klaus, Schmeh. (2016, September 4). The Ciphers of the Unabomber. Retrieved from https://scienceblogs.de/klausis-krypto-kolumne/2016/09/04/the-ciphers-of-the-unabomber/?all=1

Knowles, William. (1997 December 26). Cryptographer Examines Kaczynski’s Journal.

Unabomber. (2016, May 18). Retrieved from www.fbi.gov/history/famous-cases/unabomber

Audio Sources

From https://www.youtube.com/audiolibrary/music?nv=1

  • Magic
  • Voyage
  • Reminisce
  • Something New

Image: Unabomber shack, Wikimedia Commons, CC BY-SA

1 Listener

comment icon

1 Comment

1

bookmark
plus icon
share episode
One-Time Pod - Episode 44 - P vs. NP
play

08/08/21 • 9 min

by Thomas Ditsworth

While many people rely on the internet for everything from casual emails to secure banking transactions, most don’t understand the security behind it. In this podcast, we will discuss a computer science problem that is the basis behind our most current methods of encryption. In turn, we will explore where the encryption is used, the math behind why it is so secure, and how further innovation could put it all in jeopardy.

References:
Baumhof, A. (2019, June 13). Andreas Baumhof. QuintessenceLabs.
https://www.quintessencelabs.com/blog/breaking-rsa-encryption-update-state-art

Hackerdashery. (2014, August 26). P vs. NP and the Computational Complexity Zoo
[Video]. YouTube. https://www.youtube.com/watch?v=YX40hbAHx3s&t=515s

Hardesty, L. (2009, October 29). Explained: P vs. NP. MIT News | Massachusetts
Institute of Technology. https://news.mit.edu/2009/explainer-pnp

Lake, J. (2021, March 18). What is RSA encryption and how does it work? Comparitech. https://www.comparitech.com/blog/information-security/rsa-encryption/

Pavlus, J. (2020, April 2). What Does ‘P vs. NP’ Mean for the Rest of Us? MIT
Technology Review. https://www.technologyreview.com/2010/08/19/262224/what-does-p-vs-np-meanfor-the-rest-of-us

The Millennium Prize Problems | Clay Mathematics Institute. (2021, April 19). Clay
Mathematics Institute. https://www.claymath.org/millennium-problems/millennium-prize-problems

Watson, J. (2017, March 16). Public key cryptography: What is it, how it works and how to use it in email and file encryption. Comparitech. https://www.comparitech.com/blog/vpn-privacy/what-is-public-key-cryptography/

Audio From

Royalty Free Music by Bensound | Stock Music. (n.d.). BenSound. Retrieved March 31, 2021, from https://www.bensound.com/

For more information check out the following links to other resources about topics discussed in this podcast:
P vs NP and the Computational Complexity Zoo
Are you Ready for the Quantum Computing Revolution?

Image: Screenshot from “P vs. NP and the Computational Complexity Zoo.”

1 Listener

bookmark
plus icon
share episode
One-Time Pod - Episode 48 - The Right to Be Forgotten
play

08/12/21 • 9 min

by Angela Brinckerhoff

In today’s world, it’s not very hard to find information about anyone, no matter how personal. Our posts, public records, employment history, etc. can all be uncovered within a few clicks. A University of Washington team of researchers created a project called Vanish to address this, making it possible to permanently erase personal data. This project brings up the central debate of the “right to be forgotten” movement, discussing the legality and prospect of deleting data from public databases and web searches. This podcast discusses the system behind Vanish and the different sides of the “right to be forgotten” debate. Special thanks to Amelia Muir, Henoc Zinga, and Justin Terry for their contributions.

References
Auxier, B. (2020, August 17). Most Americans support right to have some personal info removed from online searches. Pew Research Center. Retrieved from https://www.pewresearch.org/fact-tank/2020/01/27/most-americans-support-right-to-have-some-personal-info-removed-from-online-searches/

DeWeerdt, S. (2021, April 15). A Welcome Disappearing Act. Retrieved from
https://www.washington.edu/alumni/columns/dec09/findings-forget.html

Geambasu, Roxana et. al. (2021, April 15). Enhancing the Privacy of the Web with
Self-Destructing Data. Retrieved from https://vanish.cs.washington.edu/

Heilweil, R. (2018, March 05). How Close Is An American Right-To-Be-Forgotten? Forbes. Retrieved from
https://www.forbes.com/sites/rebeccaheilweil1/2018/03/04/how-close-is-an-american-right-to-be-forgotten/

Markoff, J. (2009, July 20). New Technology to Make Digital Data Self-Destruct. Retrieved from https://www.nytimes.com/2009/07/21/science/21crypto.html

Audio Sources:
https://orangefreesounds.com/swing-drum-beat-loop-with-piano-melody-132-bpm/
https://orangefreesounds.com/funk-guitar-intro/
https://orangefreesounds.com/electronic-background-music/
https://orangefreesounds.com/ocean-waves-crashing-on-beach/
https://orangefreesounds.com/mysterious-piano/
https://orangefreesounds.com/downtempo-chill-out-track/

Image: Footprints in the sand,” Susanne Nilsson, Flickr CC BY-SA

1 Listener

bookmark
plus icon
share episode
One-Time Pod - Episode 39 - The Crypto Wars
play

08/03/21 • 11 min

by Aliyah Weaver

This episode of One-Time Pod focuses on the 1990s “crypto wars,” a power struggle between the government and the American public. How much privacy does the general American public deserve in terms of encryption, and what are the limits of the government’s surveillance of the American public?

References:

Bankston, K., Kehl, D., Wilson, A. (2015). Doomed to Repeat history? Lessons from the Crypto Wars of the 1990s. New America. https://static.newamerica.org/attachments/3407-doomed-to-repeat-history-lessons-from-the-crypto-wars-of-the-1990s/Crypto%20Wars_ReDo.7cb491837ac541709797bdf868d37f52.pdf. Accessed March 30, 2021.

Freeh, L. J. (1998). Statement for the Record of Louis J. Freeh, Director Federal Bureau of Investigation Before the Senate Select Committee on Intelligence [Speech transcript]. The Avalon Project by Yale Law School. https://avalon.law.yale.edu/20th_century/t_0011.asp. Accessed March 30, 2021.

Lewis, J. A. (2021). The Crypto Wars Are Over. Center for Strategic and International Studies. https://www.csis.org/analysis/crypto-wars-are-over. Accessed March 30, 2021.

Peterson, A. (2019). Today’s Internet users are still being hurt By ’90s-era U.S. encryption policies. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2015/05/28/todays-internet-users-are-still-being-hurt-by-90s-era-u-s-encryption-policies/. Accessed March 30, 2021.

Sound effects: Apple iMovie stock sound effects

Image: MYK78 Clipper Chip,” Travis Goodspeed, Flickr CC BY

1 Listener

bookmark
plus icon
share episode
One-Time Pod - Episode 18 - The Dancing Men
play

12/04/18 • 10 min

by Leah Strickland

The 1903 Sir Arthur Conan Doyle short story “Sherlock Holmes and the Dancing Men” features an unusual cipher. In this podcast, I give a summary of the story, so listeners will understand why Sherlock solving the puzzle is important. I then explain how Sherlock was able to solve the Dancing Men cipher. He was able to solve it by using frequency analysis. I go on to explain how Sherlock solving this cipher is unrealistic because of more messages needed to be sent for frequency analysis to be more accurate. I then talk about how the dancing men cipher is similar to the Gold Bug cipher created by Edgar Allan Poe. I then describe some similarities between the two authors and their ciphers. I finish off my podcast by giving an example of popular cryptography in modern times.

I would like to thank Xiaoyu Dong and Xin Yi Zhang for helping me edit my script.

Sources

Illustration by Sidney Paget.

1 Listener

bookmark
plus icon
share episode
One-Time Pod - Episode 30 - Hieroglyphics
play

12/11/19 • 9 min

by Daniel Kim

One of the oldest written languages ever, Egyptian hieroglyphics have remained an unsolvable mystery for hundreds of years. And while the intent was not to hide any sort of message, the process of figuring out the correlation between hieroglyphic characters and its meaning took centuries to figure out, which is why they can be considered one of the earliest forms of cryptography known to mankind.

Works Cited

Cryptographic hieroglyphic writing. (n.d.). Retrieved from https://www.britannica.com/topic/hieroglyphic-writing/Cryptographic-hieroglyphic-writing​.

This article helps make the connections between hieroglyphics and cryptography: how the two relate, or rather how hieroglyphics are the earliest example of cryptography. The fact that this ancient language confused many experts for centuries shows the complexity of the language and the cracking of them would be difficult.

Dirda, M. (2012, August 22). Book World: ‘Cracking the Egyptian Code,’ by Andrew Robinson, explores hieroglyphs. Retrieved from https://www.washingtonpost.com/entertainment/books/book-world-cracking-the-egyptian-co de-by-andrew-robinson-explores-hieroglyphs/2012/08/22/db83be96-e0f5-11e1-a19c-fcfa365 396c8_story.html​.

The actual cracking of the hieroglyphics is what I want to focus on, because this is essentially what I believe makes this language a cipher language. This will go into who figured out the mystery of Egyptian hieroglyphics and how he/she was able to figure it out.

Scalf, F., & Oriental Institute of the University of Chicago. (n.d.). The Rosetta Stone: Unlocking the Ancient Egyptian Language. Retrieved from https://www.arce.org/resource/rosetta-stone-unlocking-ancient-egyptian-language​.

Related to the source above, this will go into the actual cracking of the cipher language. Specifically, the Rosetta Stone was an instrumental part of the process, so I want to touch upon the rock that holds the secrets of the Egyptians.

Scoville, P. (2019, October 10). Egyptian Hieroglyphs. Retrieved from https://www.ancient.eu/Egyptian_Hieroglyphs/​.
This article will help me get into a lot of basics of Egyptian hieroglyphics, such as its purpose, how it was constructed/made up, and how it was used back in the time of the ancient Egyptians.

Singh, S. (2011, February 17). History – Ancient History in depth: The Decipherment of Hieroglyphs. Retrieved from http://www.bbc.co.uk/history/ancient/egyptians/decipherment_01.shtml​.
This article, which is actually written by Singh, is an overview of everything from above. This covers mostly its constructs, how it was cracked, as well as several geniuses of the 17th and 18th centuries that were obsessed with the phenomenon.

Audio Sources

Retrieved from https://www.pond5.com/royalty-free-music/

Egyptian Ceremony

Retrieved from https://gumroad.com/

Dark Tension Rising

Retrieved from https://themeforest.net/

War Drums

Inspirational Background Music

Retrieved from http://soundbible.com/

Wind

Retrieved from youtube.com/

Title: Jazzy by LiQWYD

Genre and Mood: Hip Hop & Rap + Calm

License: Royalty-free music for YouTube, Facebook and Instagram videos giving the appropriate credit.

Retrieved from https://www.toneden.io/afterinfinity-music/post/continuum-royalty-free

Continuum

Retrieved from http://www.orangefreesounds.com/

Simple Peaceful Piano Melody

Mystical Background — Mysterious and Melodic Music

Image: Hieroglyphics,” Andrea, Flickr (CC BY-SA)

1 Listener

bookmark
plus icon
share episode
One-Time Pod - Episode 22 - The Culper Ring
play

12/10/18 • 11 min

by Jerry Ji

The Culper Ring was America’s first intelligence agency, operating during the American Revolution. It was the only source of information on British activities, and such it was vital to the American victory during the war. This podcast delves into the history and workings of the Culper Ring, as well as the Culper Code that encrypted all of their messages. Although it receives very little recognition nowadays, the Culper Ring was a key factor during the American Revolution.

Works Cited

George Washington, Spymaster. (n.d.). Retrieved October 31, 2018, from https://www.mountvernon.org/george-washington/the-revolutionary-war/spying-and-espionage/george-washington-spymaster/

Gould, K. (2016, May 06). Culper Spy Ring. Retrieved October 31, 2018, from https://www.britannica.com/topic/Culper-Spy-Ring

History.com Editors. (2010, March 19). The Culper Spy Ring. Retrieved October 31, 2018, from

bookmark
plus icon
share episode
One-Time Pod - Episode 6 - The Buzzard
play

11/20/17 • 15 min

by Shalin Naik

Olivier Levasseur was a ruthless and cunning pirate that terrorized the seas earning him the title La Buse: The Buzzard. Along with being a pirate, La Buse was highly educated and created a cipher to hide his 500 million Euro treasure he had pirated from a Bishop from France. His cipher has become one of the most confusing artifacts from the pirate times and has led one man to the edges of the Seychelles Archipelago trying to find it.

Sources:

Bath, G. The Levasseur Cryptogram. Retrieved from www.gjbath.com/Misc/LaBuse.htm

La Buse Cryptogram. Retrieved from
cipherfoundation.org/older-ciphers/...se-cryptogram/

Soteriou, H. (27 April 2017). The Island with $100 million hidden. Retrieved from
www.bbc.com/travel/story/201704...-100-million-hidden

Burridge, G. (10 August 2012). The Buzzard’s hoard: The fabulous, undiscovered pirate treasure of Seychelles. Retrieved from
glynnburridge.com/blog/2012/08/the...e-of-seychelles/

Tiburcio, M. (2012). Prying Open the Pigpen Cipher. Retrieved from
derekbruff.org/blogs/fywscrypto/...he-pigpen-cipher/

Music:

www.royaltyfreemusicforfree.com/free-back...und-music
www.royaltyfreemusicforfree.com/free-back...und-music
www.royaltyfreemusicforfree.com/free-back...ther-life
www.orangefreesounds.com/big-waves-cr...-stormy-sea/

Image: www.flickr.com/photos/miwok/10960921734/

bookmark
plus icon
share episode
One-Time Pod - Episode 1 - The Zodiac Ciphers
play

11/08/17 • 11 min

by Kelsey Brown

The Zodiac killer is one of the most infamous serial killers of all time and has remained a mystery that will always intrigue public interest. The image of the 1960s, a time of hippies, love and social expansion, was tainted as he began to lurk in the night and violently murder more and more people. But even with extensive witness descriptions and multiple suspects, he was never caught and has never even been identified. The Zodiac keep himself anonymous and has kept society questioning what exactly happened in those fateful years for the last 57 years by simply using the most intriguing skill in history: cryptography. The Zodiac killer menaced and taunted the police and press through a series of letters, in plaintext and ciphertext, that he claimed contained is long sought after identity. In this podcast, the host, Kelsey Brown, a freshman at Vanderbilt University, delves into the story of the Zodiac killer, starting at the beginning of his killing career and proceeding to explain the mechanics and decipherment of the Zodiac Cipher and ending with how this cultural phenomenon has remained prevalent even today.

Sources:
The Zodiac Ciphers: Messages from a Murderer, by Neil Sareen:
derekbruff.org/blogs/fywscrypto/...-from-a-murderer/

Analysis of the Zodiac Killer’s Three Part Cipher:
www.zodiologists.com/z408_cipher_analysis.html

FBI Records: The Vault: The Zodiac Killer:
vault.fbi.gov/The%20Zodiac%20Kil...20of%2006%20./view

Corey Starliper, Massachusetts Man, Claims He Cracked Zodiac Killer’s Code. The Huffington Post by Ben Muessig
www.huffingtonpost.com/2011/07/21/co...n_906092.html

Zodiac Killer:The Encyclopedia of American Crime: Carl Sifakis:
online.infobase.com/HRC/LearningCen...rticleId=198488

Zodiac Killer Biography:
www.biography.com/people/zodiac-killer-236027

Audio:
Creepy Background Music:
www.royaltyfreemusicforfree.com/free-back...und-music

Time Traveler Beautiful Melodies For Fantastic Stories
Gunshot Sounds:
Dreamy Ambient Background Music:
www.orangefreesounds.com/category/mus...round-music/

Audio From The Zodiac Killer – ABC Primetime Investigation:
www.youtube.com/watch?v=LCYbAdzCAjE

Audio From This is the Zodiac Speaking:
www.youtube.com/watch?v=HI0jnsbZwys

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does One-Time Pod have?

One-Time Pod currently has 52 episodes available.

What topics does One-Time Pod cover?

The podcast is about History and Podcasts.

What is the most popular episode on One-Time Pod?

The episode title 'Episode 43 - Cicada 3301' is the most popular.

What is the average episode length on One-Time Pod?

The average episode length on One-Time Pod is 11 minutes.

How often are episodes of One-Time Pod released?

Episodes of One-Time Pod are typically released every day.

When was the first episode of One-Time Pod?

The first episode of One-Time Pod was released on Nov 6, 2017.

Show more FAQ

Toggle view more icon

Comments