{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/664fde3eda02bb0012bad909/68cf3283ef1d2c878d0afa1f?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Securing Evolving Software with Noah Hall","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/664fde3eda02bb0012bad909/1758409423871-20100121-46a0-47f0-8c66-2bda076505d4.jpeg?height=200","description":"<p>xz vulnerability: <a href=\"https://en.wikipedia.org/wiki/XZ_Utils_backdoor\" rel=\"noopener noreferrer\" target=\"_blank\">https://en.wikipedia.org/wiki/XZ_Utils_backdoor</a></p><p>Spectre: <a href=\"https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)\" rel=\"noopener noreferrer\" target=\"_blank\">https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)</a></p><p>Meltdown: <a href=\"https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)\" rel=\"noopener noreferrer\" target=\"_blank\">https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)</a></p><p>Heartbleed: <a href=\"https://en.wikipedia.org/wiki/Heartbleed\" rel=\"noopener noreferrer\" target=\"_blank\">https://en.wikipedia.org/wiki/Heartbleed</a></p><p>Noah on GitHub <a href=\"https://github.com/eeue56\" rel=\"noopener noreferrer\" target=\"_blank\">https://github.com/eeue56</a> - Substack <a href=\"https://substack.com/@eeue56\" rel=\"noopener noreferrer\" target=\"_blank\">https://substack.com/@eeue56</a> - BlueSky https://bsky.app/profile/derw-lang.com</p>","author_name":"Richard Feldman"}