{"version":"1.1.0","author":"Jupiter Broadcasting","title":"410: Epyc Encryption","podcastName":"TechSNAP","chapters":[{"startTime":0,"title":"Intro"},{"startTime":15,"title":"Intro"},{"startTime":29,"title":"Epyc AMD Followup"},{"startTime":568,"title":"Secure Memory Encryption"},{"startTime":923,"title":"Secure Encrypted Virtualization"},{"startTime":1188,"title":"Intel's Comet Lake Confusion"},{"startTime":1542,"title":"Windows Warnings"},{"startTime":2260,"title":"The KNOB Attack"},{"startTime":2523,"title":"The End Of Extended Validation"},{"startTime":2944,"title":"Final Thoughts"}]}