<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 19 Apr 2026 11:35:18 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Dave &amp; Gunnar Show - Episodes Tagged with “Enarx”</title>
    <link>https://dgshow.org/tags/enarx</link>
    <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
    <description>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Not our circus, not our monkey.</itunes:subtitle>
    <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
    <itunes:summary>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>privacy, security, robots, internet, open source, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>David Egts &amp; Gunnar Hellekson</itunes:name>
      <itunes:email>gunnar@hellekson.com</itunes:email>
    </itunes:owner>
<itunes:category text="Society &amp; Culture"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Episode 239: The Bottom Turtle</title>
  <link>https://dgshow.org/239</link>
  <guid isPermaLink="false">3be567ec-edff-4ba6-92d8-337d05cfbf35</guid>
  <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/3be567ec-edff-4ba6-92d8-337d05cfbf35.mp3" length="13998467" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about his new book, Trust in Computer Systems and the Cloud!</itunes:subtitle>
  <itunes:duration>29:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/3/3be567ec-edff-4ba6-92d8-337d05cfbf35/cover.jpg?v=1"/>
  <description>This week Dave talks with Mike Bursell (https://dgshow.org/guests/mbursell) about his new book, Trust in Computer Systems and the Cloud (https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324)!
Check out Mike Bursell (https://dgshow.org/guests/mbursell) and Nathaniel McCallum (https://dgshow.org/guests/nmccallum) on episode 237 (https://dgshow.org/237)!
Trust in Computer Systems and the Cloud (https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324) by Mike Bursell
Profian (https://www.profian.com/)
Defcon (https://defcon.org/)
Blockchain (https://en.wikipedia.org/wiki/Blockchain)
Zero Trust (https://en.wikipedia.org/wiki/Zero_trust_security_model): Poorly named? Would Explicit Trust be more accurate?
Reflections on Trusting Trust (http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf) by Ken Thompson (https://en.wikipedia.org/wiki/Ken_Thompson) 
Trusted Platform Module (TPM) (https://en.wikipedia.org/wiki/Trusted_Platform_Module)
Hardware Security Module (HSM) (https://en.wikipedia.org/wiki/Hardware_security_module)
Trusted Execution Environment (TEE) (https://en.wikipedia.org/wiki/Trusted_execution_environment)
Trusted computing (https://en.wikipedia.org/wiki/Trusted_Computing)
Confidential computing – the new HTTPS? (https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/)
Enarx (https://enarx.dev/)
Idris Elba (https://en.wikipedia.org/wiki/Idris_Elba)
Horrible Histories (https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series))
We Give Thanks
* Mike Bursell (https://dgshow.org/guests/mbursell), for joining us on the show! Special Guest: Mike Bursell.
</description>
  <itunes:keywords>Trust in Computer Systems and the Cloud, trust, Profian, Defcon, blockchain, zero trust, Reflections on Trusting Trust, Ken Thompson, trusted platform modules, TPM, hardware security modules, HSM, trusted execution environments, TEE, trusted computing, confidential computing, Enarx, Idris Elba, Horrible Histories</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 201: Trust Issues</title>
  <link>https://dgshow.org/201</link>
  <guid isPermaLink="false">dc0a5d29-3905-4aef-8948-2ab51580a946</guid>
  <pubDate>Mon, 27 Jul 2020 07:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/dc0a5d29-3905-4aef-8948-2ab51580a946.mp3" length="13310663" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about how he handles his trust issues with Enarx!</itunes:subtitle>
  <itunes:duration>27:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/d/dc0a5d29-3905-4aef-8948-2ab51580a946/cover.jpg?v=2"/>
  <description>This week Dave (https://twitter.com/davidegts) talks with Mike Bursell (https://twitter.com/mikecamel) about how he handles his trust issues with Enarx!
  Enarx (https://enarx.io/)
  Trusted Execution Environment (TEE) (https://en.wikipedia.org/wiki/Trusted_execution_environment)
  Trust No One, Run Everywhere–Introducing Enarx (https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/)
  Announcing Enarx for running sensitive workloads (https://opensource.com/article/19/5/enarx-security)
  Enarx - project maturity update (https://next.redhat.com/2020/07/01/enarx-project-maturity-update/)
  Enarx news: WebAssembly + SGX (http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/)
  Follow @enarxproject (https://twitter.com/enarxproject) on Twitter
  https://confidentialcomputing.io (https://confidentialcomputing.io) 
We Give Thanks
*   Mike Bursell (https://twitter.com/mikecamel) for being our special guest star! Special Guest: Mike Bursell.
</description>
  <itunes:keywords>Enarx, trusted execution environment, TEE, confidential computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week <a href="https://twitter.com/davidegts" rel="nofollow">Dave</a> talks with <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> about how he handles his trust issues with Enarx!</p>

<ul>
<li>  <a href="https://enarx.io/" rel="nofollow">Enarx</a></li>
<li>  <a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li>  <a href="https://next.redhat.com/2019/08/16/trust-no-one-run-everywhere-introducing-enarx/" rel="nofollow">Trust No One, Run Everywhere–Introducing Enarx</a></li>
<li>  <a href="https://opensource.com/article/19/5/enarx-security" rel="nofollow">Announcing Enarx for running sensitive workloads</a></li>
<li>  <a href="https://next.redhat.com/2020/07/01/enarx-project-maturity-update/" rel="nofollow">Enarx - project maturity update</a></li>
<li>  <a href="http://aliceevebob.com/2020/07/07/enarx-news-webassembly-sgx/" rel="nofollow">Enarx news: WebAssembly + SGX</a></li>
<li>  Follow <a href="https://twitter.com/enarxproject" rel="nofollow">@enarxproject</a> on Twitter</li>
<li>  <a href="https://confidentialcomputing.io" rel="nofollow">https://confidentialcomputing.io</a> </li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li>  <a href="https://twitter.com/mikecamel" rel="nofollow">Mike Bursell</a> for being our special guest star!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
