<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 05 May 2026 10:25:16 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Dave &amp; Gunnar Show - Episodes Tagged with “Horrible Histories”</title>
    <link>https://dgshow.org/tags/horrible%20histories</link>
    <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
    <description>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Not our circus, not our monkey.</itunes:subtitle>
    <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
    <itunes:summary>David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>privacy, security, robots, internet, open source, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>David Egts &amp; Gunnar Hellekson</itunes:name>
      <itunes:email>gunnar@hellekson.com</itunes:email>
    </itunes:owner>
<itunes:category text="Society &amp; Culture"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Episode 239: The Bottom Turtle</title>
  <link>https://dgshow.org/239</link>
  <guid isPermaLink="false">3be567ec-edff-4ba6-92d8-337d05cfbf35</guid>
  <pubDate>Fri, 04 Nov 2022 05:00:00 -0500</pubDate>
  <author>David Egts &amp; Gunnar Hellekson</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/1b67eddd-d80f-444d-ba32-aa9ef36b589d/3be567ec-edff-4ba6-92d8-337d05cfbf35.mp3" length="13998467" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>David Egts &amp; Gunnar Hellekson</itunes:author>
  <itunes:subtitle>This week Dave talks with Mike Bursell about his new book, Trust in Computer Systems and the Cloud!</itunes:subtitle>
  <itunes:duration>29:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/1/1b67eddd-d80f-444d-ba32-aa9ef36b589d/episodes/3/3be567ec-edff-4ba6-92d8-337d05cfbf35/cover.jpg?v=1"/>
  <description>&lt;p&gt;This week Dave talks with &lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; about his new book, &lt;em&gt;&lt;a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" target="_blank" rel="nofollow noopener"&gt;Trust in Computer Systems and the Cloud&lt;/a&gt;&lt;/em&gt;!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check out &lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt; and &lt;a href="https://dgshow.org/guests/nmccallum" target="_blank" rel="nofollow noopener"&gt;Nathaniel McCallum&lt;/a&gt; on &lt;a href="https://dgshow.org/237" target="_blank" rel="nofollow noopener"&gt;episode 237&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;&lt;a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" target="_blank" rel="nofollow noopener"&gt;Trust in Computer Systems and the Cloud&lt;/a&gt;&lt;/em&gt; by Mike Bursell&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.profian.com/" target="_blank" rel="nofollow noopener"&gt;Profian&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://defcon.org/" target="_blank" rel="nofollow noopener"&gt;Defcon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Blockchain" target="_blank" rel="nofollow noopener"&gt;Blockchain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" target="_blank" rel="nofollow noopener"&gt;Zero Trust&lt;/a&gt;: Poorly named? Would Explicit Trust be more accurate?&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" target="_blank" rel="nofollow noopener"&gt;Reflections on Trusting Trust&lt;/a&gt; by &lt;a href="https://en.wikipedia.org/wiki/Ken_Thompson" target="_blank" rel="nofollow noopener"&gt;Ken Thompson&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" target="_blank" rel="nofollow noopener"&gt;Trusted Platform Module (TPM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Hardware_security_module" target="_blank" rel="nofollow noopener"&gt;Hardware Security Module (HSM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" target="_blank" rel="nofollow noopener"&gt;Trusted Execution Environment (TEE)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Trusted_Computing" target="_blank" rel="nofollow noopener"&gt;Trusted computing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" target="_blank" rel="nofollow noopener"&gt;Confidential computing – the new HTTPS?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://enarx.dev/" target="_blank" rel="nofollow noopener"&gt;Enarx&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Idris_Elba" target="_blank" rel="nofollow noopener"&gt;Idris Elba&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" target="_blank" rel="nofollow noopener"&gt;Horrible Histories&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;We Give Thanks&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://dgshow.org/guests/mbursell" target="_blank" rel="nofollow noopener"&gt;Mike Bursell&lt;/a&gt;, for joining us on the show! Special Guest: Mike Bursell.&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>Trust in Computer Systems and the Cloud, trust, Profian, Defcon, blockchain, zero trust, Reflections on Trusting Trust, Ken Thompson, trusted platform modules, TPM, hardware security modules, HSM, trusted execution environments, TEE, trusted computing, confidential computing, Enarx, Idris Elba, Horrible Histories</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Dave talks with <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> about his new book, <em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em>!</p>

<ul>
<li>Check out <a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a> and <a href="https://dgshow.org/guests/nmccallum" rel="nofollow">Nathaniel McCallum</a> on <a href="https://dgshow.org/237" rel="nofollow">episode 237</a>!</li>
<li><em><a href="https://www.wiley.com/en-us/Trust+in+Computer+Systems+and+the+Cloud-p-9781119692324" rel="nofollow">Trust in Computer Systems and the Cloud</a></em> by Mike Bursell</li>
<li><a href="https://www.profian.com/" rel="nofollow">Profian</a></li>
<li><a href="https://defcon.org/" rel="nofollow">Defcon</a></li>
<li><a href="https://en.wikipedia.org/wiki/Blockchain" rel="nofollow">Blockchain</a></li>
<li><a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" rel="nofollow">Zero Trust</a>: Poorly named? Would Explicit Trust be more accurate?</li>
<li><a href="http://www.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf" rel="nofollow">Reflections on Trusting Trust</a> by <a href="https://en.wikipedia.org/wiki/Ken_Thompson" rel="nofollow">Ken Thompson</a> </li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow">Trusted Platform Module (TPM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">Hardware Security Module (HSM)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_execution_environment" rel="nofollow">Trusted Execution Environment (TEE)</a></li>
<li><a href="https://en.wikipedia.org/wiki/Trusted_Computing" rel="nofollow">Trusted computing</a></li>
<li><a href="https://aliceevebob.com/2019/12/03/confidential-computing-the-new-https/" rel="nofollow">Confidential computing – the new HTTPS?</a></li>
<li><a href="https://enarx.dev/" rel="nofollow">Enarx</a></li>
<li><a href="https://en.wikipedia.org/wiki/Idris_Elba" rel="nofollow">Idris Elba</a></li>
<li><a href="https://en.wikipedia.org/wiki/Horrible_Histories_(2001_TV_series)" rel="nofollow">Horrible Histories</a></li>
</ul>

<p><strong>We Give Thanks</strong></p>

<ul>
<li><a href="https://dgshow.org/guests/mbursell" rel="nofollow">Mike Bursell</a>, for joining us on the show!</li>
</ul><p>Special Guest: Mike Bursell.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
