Nick Sullivan, and Adam Langley join Melanie and Mark to provide a pragmatic view on post-quantum cryptography and what it means to research security for the potential of quantum computing. Post-quantum cryptography is about developing algorithms that are resistant to quantum computers in conjunction with “classical” computers. It’s about looking at the full picture of potential threats and planning on how to address them using a diversity of types of mathematics in the research. Adam and Nick help clarify the different terminology and techniques that are applied in the research and give a practical understanding of what to expect from a security perspective.

Nick Sullivan

Nick Sullivan runs the cryptography team at Cloudflare, an internet security and performance company.

Adam Langley

Adam Langley is a Principal Software Engineer at Google, responsible for a variety of cryptography-related efforts.

Cool things of the week
  • Google IO site & IO Extended Events site
  • App Engine Turns 10 blog
  • Introducing Stackdriver APM & Stackdriver Profiler blog & article
  • Smart Parking story:
    • Cloud-native architecture with serverless microservices blog part1
    • Implementing an event-driven architecture on serverless blog part2
    • What we learned doing serverless blog part3
    • Episode 102 Smart Parking and IoT Core with Brian Granatir podcast

Additional References / Resources:

Question of the week

How to stream realtime coding?

Where can you find us next?
  • San Francisco
United States


00:00:17hi and welcome to episode number 123 of the weekly Google Cloud platform podcast I'm not mad and I'm here with my colleague is always Melanie work how you doing today Melanie I'm good how are you doing I am slowly still getting over this cold it's not a hundred percent gone but I got in there ending elness pretty much around we do we are going to be talking about Quantum security Quantum Computing Security in particular and we're talking with Nick and Adam which will be fun to hear about but before we get into that world Ivan are cool things the weekend of course is always we ever question the week that comes at the end and the question this week is how do I stream real time when I'm coding like how do I do real-time coating I've been doing that so I think you might okay cool anyway cool things of the week some may have heard of an event called Google IO and that's coming up May 8th through the 10th done it a few times now there's quite a a popular event
00:01:17since tickets are out are there will actually be the opportunity if you want to help do extended events and there's a link will provide of the show notes where you can apply if you want to make it an official thing and we provide resources on how to stream live the actual event in an organized with others who are interested in watching so yeah we will include that and that's coming and if you are not a new vent there's a map on the extended event page it has a huge number of events already set up and ready to go so if you don't want to go to all the trouble of setting something up then it's probably one you can think I should go to someone else like that one alright and we also want to announce apparently abandoned turn 10 yes it is a really great blog post on Google Cloud blog just reflecting on our 10-year app and looking back heading back in time memory this is your life how do you feel about that
00:02:17so you can click on and kind of see a different times of big highlights about on things I did not know this I'm just cooking right now 2011 William and Kate's royal wedding website on GA know that we're part of the wedding somehow that's awesome yeah I have a quick read it that's a nice Nostalgia is that we wanted to mention how set timer 8 p.m. and stack driver profile are two new products that we have out there as part of the stack driver sweet so stack driver APM is using stuck driver trace and debugger and they put that together in the DM tooling to allow you to debug applications while they're running production without impacting user experience in any way which is she and always is a challenge that you're up against especially in the devops space but did Mutual in this is the stack driver profiler and that's letting you profile and explore how your code actually execute in production to optimize performance and reduce cost of computation there's one other thing to that room include the blood pressure on this there's an integration between stack Drive
00:03:17trip to bugger and get Hub Enterprise and get lab and so that's adding to their existing code mirroring functionality for GitHub bitbucket Google Cloud repositories as well as hopefully snort source code so lots of great functionality for profiling and debugging and solving the issues that you have in your production environment in your code which is always necessary much-needed especially in distributed environments new yeah pretty flame dress yet and that's what's important actually which I take a really nice if you remember back to November of last year we did a wonderful episode on Smart parking and iot core with Brian Grant is here he told you all about Adventure and systems and using tide function in the pub sub and dinosaur and bickering and all that stuff so he has written and we publish on the Google Cloud blog at three-part series way he goes way into the Weeds on all the technical stuff that they have done talking to create the system and how it will running in that stuff and fuse
00:04:17the podcast previously it is definitely written in egg Brian Grant hairstyle I can hear his voice the way through it would means it's fun and exciting and a really good rate yes definitely let's go right on this week's podcast we are excited to have Nick Sullivan his room cloudflare and Adam langlie who works on Chrome we're going to talk about postponing security or post Quantum cryptography thank you guys for joining So Adam and Nick can you take him in and tell us a little bit more about yourself and what you work on that Nick wanted to start so I work at cloudflare which is a service that helps protect websites and accelerate them as well as any sort of service that's on the web and I'm responsible for the cryptography team so we look into different cryptographic Technologies to help protect traffic between folks were browsing the internet and websites and web services that they're going to be visiting this means making sure that it's confidential making sure that this data is authenticate
00:05:17right I'm Adam langlie so I manage the team at Google who is responsible for most front end of Photography so that means cryptography between Google services and its uses mostly we work in Chrome and obviously are not serviced and then it will show tipping indication Lisa Android and wherever around the company that we can be useful and so I can you have worked a little bit in the past together and end have worked from the security standpoint for today's interview of course we're diving more specifically into Quantum and post Quantum security can you guys give us a little bit of an understanding of what is quantum Computing before we dive into security element of it so confusing as we have known it for decades now since truing as time has all being based on classical physics more Lesotho down at the very new depths of how a CPU is made that will Quantum affects what we trying to build is a computer that deals with ones and zeros and you could
00:06:17whip sound Cynthia we how these computers will can be 18 hundreds if you want it's a quantum computer is it computer that's obviously not just made in the quantum universe but uses effects of quantum physics and it's difficult to convey quiet boss that means but there are certain problems where the ability in quantum physics to have states that are a mixture of ones and zeros and to use the fax that in quantum physics probabilities are the square root of the sum of the squares rather than the sums and things those abilities allow you to solve some problems significantly faster and many problems quite a lot faster nice Nick was there anything you wanted to add show Quantum Computing and something that involves as Adam said quantum physics and Quantum interactions and the more classical way
00:07:17thinking about this is is you know the idea of Schrodinger's cat where you have a cat it's inside enclosed region and it can be in a superposition of Blaze the cat alive where is the cat dead so because you can't see it and you can interact with it quantum effects allow multiple states of being to exist simultaneously and the first time that you actually interact with it or look at it immediately crystallizes as one specific State whether you know the cat is alive or the cat is dead so this idea of interactions between superpositions of different states is one of the key components of quantum Computing and it's not something that you can do classically with bits ones and zeros is as I mentioned classical computers involve a whole series of ons and offs and then they can interact together with one on turns another one off because another one
00:08:17on and you can build the classical Mass with us you can sort of bad things by representing numbers in binary with quantum computers for Quantum Computing you can do something slightly more complex witches you can have switches that are both on and off simultaneously and intertwined in a way that once you finally look at it or interact with that he could stabilize and crystallize in one specific state allows you to solve 7 problems Foster why is that so there's one that say such a problem is quantum Computing essentially gives you a square root to speed up so the classical example here is unstructured search if you have an an unordered list of numbers and you want to find the number and the classical world was like the only thing you can do that is look for the numbers one by one and you expect to find what you're looking for
00:09:17bridge in half like the number numbers you have
00:09:21now with a quantum computer somewhat mind-bending day you can do it ain't no need a square root of the number of numbers you have and I have no good way to give an intuitive explanation of why that is so but it involves the way the probabilities of old probabilities in the quantum World always squared so in the classical world if you check one number you expect to have one of any chance of having found the one you're looking for and in a Quantum world you get stuff A 1 / √ and Sean's each time you look and sew in a Quantum will once you've looked at some of the square root of an you you then you go to fraction is approaching one so that's does not on this is important that you sold exponential problems faster than exponentially soak the square root of 2 to the end is still an exponential problem
00:10:15however there is a such a problem in the exponential problems but we don't sell some of them all we don't know any classical efficient way to solve them but we do know an efficient way to sell them on quantum computers and the effects that was much bigger than the square average day is going from small accident say to just a polynomial and so for these problems going to just make a huge difference and unfortunately that set of problems in Clues to all the problems on which we base public key cryptography on today so it not gets to parlor is why we wanted to do this discussion was because we know Quantum Computing is becoming more mainstream in terms of people are aware of it and then they hear well that's going to break all the codes once we've achieved it's so the question on many people's minds is you know what are the security issues what's the reality of quantum computing
00:11:15is wow you have all these bits and you can do sort of an infinite number of things together at once in Computing is massively difficult problems that you can't normally do this actually is not the case Quantum Computing is useful for speeding up a very small set of problems one of which is searching through an unordered list other ones would be simulating Quantum interactions so if you're if you're in physics anyone understand how different photons interact together Quantum Computing it's an interesting way to simulate that and the other one is interesting enough factoring numbers so if you have a number and you want to know what the prime factors are quantum computers allow you to do via an algorithm told shor's algorithm we don't have to go into it but it allows you to take a big number and find out what its prime factors are quickly it also is useful for you know related problems around that field but the interesting
00:12:14is that factoring numbers and being able to do what's called the discrete logarithm which is almost equivalent to factoring numbers lets you break almost all modern cryptography you have a big enough to want the computer that has enough bits that you can intertwined together you can actually take any modern cryptographic algorithms that we use and figure out what the key is this is somewhat scary you could say to how we communicate online and how we share information for tography is is pervasive if you're accessing Gmail or Yahoo sussing any sort of website on the Internet or chats to your friends we use modern photography all the time for this so what does sufficiently large quantum computer there is risk stats ography can be done so should we be panicking about security no I'm pretty much trying to leave so don't panic
00:13:14Quantum Computing causes at so many problems and we could talk if you own problems that we don't have enough structure to self efficiently with cancel computers but they have enough structure to be quick and to be smooth and sew weave sewed of huddled up against this boundary of what we could previously solve efficiently and I'll come to computers and moving that boundary house a little bit so there's two reasons in which we shouldn't Pathak firstly discussions like many troops are now building quantum computers smoke on two computers but they have quite High Ever right it's very difficult to build a quantum computer because the rest of the universe tends to leak in ankles D coherence and messes up your Quantum States and everything goes wrong and when that happens to call you but you still will not answer and so the elevates we have at the moment I'll quite High We believe that's given enough Quantum bits with a aloha
00:14:14ferry rates we can when I'm a correction codes and sopa juice theoretically perfect Quantum bits out to reopen some bits but it takes a lot of them so it is not the case that if you see that some group has some fun to compete with some dozens of bits than once that in the movie cheese 2048 sold some other number you may have heard of relation to geography that everything is going and broken it depends on the technology but perhaps a hundred thousand to a million volt cubits to make them just one like functional one that I've heard that term before interest and number of its Supremacy is it it's an insert of an artificial concept Quantum Supremacy is the idea that there is an algorithm out there that a quantum computer chin demonstrable solve faster than a classical computer and we haven't hit that point yet and as I mentioned earlier some of the more interest
00:15:14ideas of things that you want to do with quantum computers involves stimulating physics situations and so the Target that people have for Quantum Supremacy is this algorithm called sampling where you can take a lot of bits and you scramble them up together and they supposedly represent a certain random but structure Association of probabilities and if you want to actually look at them they do here and you say okay this this fits a specific distribution whether it's a gaussian distribution of our distribution or something some statistical representation so the idea is that the first time that you can get to a point where a quantum computer can simulate a random pattern for a random distribution faster than a classical computer then it's somewhat Supreme there is some type of Supremacy
00:16:14one specific point this is not really related to cryptography these these problems that people solved with condom Supremacy or to chemistry Quantum Supremacy are really nice problems that aren't really applicable to you know breaking modern cryptography so even if this were to happen next year or in the next 5 years it it wouldn't cause you know the collapse of our financial system or everyone to lose their privacy it really takes a lot more to to find the point in which cryptography can be broken that's why I was not as much of a concern it was there anything else that you wanted to add around that terms of you know why Quantum Computing is still sore far off in the distance for us for breaking all the codes. I think we chatted about how hard it is to build he's going to computers on how important it is to consider our rates and you don't just think that end with phone to computer is going to be able to solve any problems like it is a
00:17:14huge difference between virtual physical cubits and the theoretical cubits that we want to build out of Many Many real ones and the second reason for Don't Panic is that I said that we've cuddled the games this border of what we can solve and how much truck should we put in at Publix to make invitations we can back away from that border a bit and we can still have cryptography matches with Boston the face of a Quantum adversary and we do need some results to Moses called Quantum cryptography to do that so Quantum cryptography is is pushing too expensive boxes of Optics on the end of fiber optic cables and using Quantum phenomena mean to guarantee confidentiality in and so forth that's exciting interesting but it's not stuff was Nick and I are looking at because we we not going to have no dedicated fiber optic links between everything on the internet so we'd like to be able to using that we go we can do that week
00:18:14use different problems with public key cryptography that resists Quantum abuses and it's just normal software that runs on the computers and phones over the internet says we know and love is quantum security what are you looking at what are the things that you're assessing when you think about long-term what this looks like these number theoretical algorithms like factoring so RSA this is the standard way that cryptography has been done this was the first algorithm for public key cryptography since 1977 and RSA involves these numbers that you scramble up-and-coming Cribs To to another person and that person can decrypt it so being able to break this requires you to factor large number it's with quantum computers in is potentially possible to do this so far as they become something that's serve less safe if there are
00:19:14large-scale quantum computers in weather that's going to happen in the next 10 or 15 years we don't really we don't really know there's some sort of very small quantum computers that are happening right now but they necessarily break something like RSA so one thing that we're looking at as a dimension is different cryptographic algorithms that are potentially resistant to the types of things that quantum computers can do so quantum computers as we mentioned only have a few things that they can do better than classical computers in actuality some complications are actually worse than regular classical computers sound what we're looking at right now is finding algorithms that are resistant to these quantum computers or that are resistant to all known Quantum algorithms as well as being resistant to the sort of classical traditional computers as the years progress computer still get faster computers get stronger people figure out better algorithms to solve
00:20:14hoping so this class of algorithms to do cryptography that is resistant to quantum computers is called post Quantum cryptography and many folks around the world are looking at actually how to figure out what the right post want him cryptography algorithms are and there are several different possibilities in different fields of research in mathematics that have promising answers for what a Quantum resistant were post Quantum cryptography outgrow them would look like which I know is running this kind of large-scale Assessments is it is it a competition that they're doing the National Institute of Standards and technology which have been involved in standardizing photography for a long time they standardized Shaw and a yes and a number of other acronyms that people would have heard
00:21:14that pay attention to this space so that currently running what they cool up process and they go to the process to distinguish it from a competition I think because they expect to have more than one winner in quotes tie they will be selecting a portfolio of possibilities and they have a time line that stretches out identical precisely but some five or six years from now on so they invited groups around the world to submit proposals on at the end of 2017 that way I don't show the quiet like some close to 70 proposal submitted from different groups for candidate post Quantum algorithms on news published one of these and so people are now going through the surround one submissions and breaking some of them and analyzing others and we clean them down a little bit and then at some point in this will publishing of the shield around 2 and that will continue for
00:22:14CVS to come and in terms of this process do you use some of the others that you see coming from missed an experiment with them 2016 dates do an experiment with one post one tomorrow with them so if you use Chrome in 2016 you may well have you supposed Quantum out with them when connecting to Google service and we did that both to raise the profile of this subject in general and also to check the viability because one of the it appears consequences of Pokemon to my other than that they will be less efficient either in terms of speeds or in terms of size and we had simply never tried running a key green metallic with a fat Lodge over the Internet so it stays this way complicates you don't always know what's going to happen and so we did this experiment looks like
00:23:14CM packs and impacts on Arrow rates it went pretty well so you actually touch them one small thing but I'd love to learn more about like what are the characteristics or the differences between like what's current cryptography and like what could chuck if a wood look like in the first Quantum world right now uses several different Primitives that provide different security features there is symmetric cryptography is cartography in which both parties already have the same key and you are making sure that the data is confidential so that only the person with with the exact same key candy Cryptid and also this is this is symmetric encryption there's also something called Integrity that you can add on top of that message up indication codes are Max are one of those and this also requires symmetric he is so both people have the exact same to you so you can send information across the internet or across any kind of untrusted medium as long as both parties have the same key you can you can communicate now
00:24:14Keys nowadays are around 120 bit eight bits long that's considered to be the smallest possible key that will give you a long-term amount of security in a post Quantum worlds because of the square root level advances in being able to search through a list the only real difference is that these keys go from a 128 bits to 256 pets so this is something that were used to in this is something that that we can do the V the bigger differences come in these so-called asymmetric algorithm ideas of public key encryption RSA that I mentioned these allow you to as an individual have a private key as well as a public key and your apology is shared with the world and anyone can in Krypt data so that only you can decrypt it using your public key so you take data you take the public key you scramble up the
00:25:14yeah and only the person with the associated private key candy trip it a similarly there's the idea of digital signatures where you can take that 5 mg and associated with a piece of data so that anyone in the world with your apology can been verify that only the person with the private key was able to digitally sign that data so these both provide ways for folks to agree on symmetric keys so you go from public asymmetric cryptography to sharing a key and being able to communicate across the internet each one of these different pieces weather at symmetric key cryptography with a digital sated signatures or public key cryptography has a Quantum resistant post Quantum component to ascend as Adam mentioned these typically I do not have the same performance characteristics in terms of computing so it's either going to cost a lot more.
00:26:14CPU to compute these operations so it might take milliseconds longer than it would usually or the cheese sizes are much bigger and as I mentioned symmetric Keys have 128-bit king size they go up to you know 256 typically right now for public key cryptography if you're using elliptic curves which is very popular you have 256-bit numbers are I say it's about 2048-bit numbers when you're talking about post Quantum cryptography these keys can get up into the 10,000 bit strange work for some of these proposals the hundred thousand bit ranges and for some joke this proposal so you can have keys as large is a terabyte still in development so as in Siri essentially it is the case that's what about classical cryptography we don't know that that I don't efficient algorithms to break a ton of high school computer
00:27:14Ione basis for believing that they're onto still looks real hard we've never found one and so it remains with quantum computers so piece of shit was able to come up with shor's algorithm the factory bring up there long before any quantum computers exist it because we know in theory the physics and so we can theorize about giving this problem can we come up with a Advance America in the deficiency song says I need the answer is no then we know hypothesize it is post Quantum secure but just like high school photography we have nose of proof that isn't in the fish and I wear them out that nobody's just found yet but that's the situation move it it's really comfortable away it's because it's always been that way I just said that you were interested in diving at a little bit is what is the difference between confidentiality versus authenticity
00:28:14provides Cyanogen symmetric cryptography is sending a message and making sure that only the person that it's intended for candy Cryptid this is confidentiality this is how you keep your information confidential the other piece is integrity it which is how do you make sure that someone didn't change that message even if they didn't see what it was how are you sure that this message is in the right order that it's it's exactly the message that the person sent and innocent area where someone is trying to attack your cryptography these have different timelines so if you have the ability to break an Integrity algorithm if someone's already sent the message that doesn't really help you if someone's already received the message that it doesn't help you at all because the messages said it's been received it's been it's been checked so if you have the ability to break Integrity you have to be there right now and intercepting communication and changing it and modifying it before
00:29:14it's to the person that you're talking to when it comes to confidentiality you have to be prepared for attackers in the future so if you're communicating with someone right now and saying something that you want to be secure for 30 years then and you're sending it over an insecure Channel then you want to make sure that the confidentiality algorithm that you're using is going to be able to not be broken for those 30 years so sometime in the future if someone's collected it they break that algorithm they can you know reveal what it is you said and this is actually the more pressing points for Quantum cryptography if we're talking right now about digital signatures it's not so important that we get a digital signature right now would with respect to Quantum security because in the next five years of the next 10 years there's not going to be a large-scale quantum computer but in the next 25 years
00:30:1430 years there's potentially a chance you know technology moves rather quickly in 25 years is a long time so the main focus of what's the Chrome's experiment was on and what we're looking at right now for post-mortem photography is how do we do this key agreement how do we make sure that the confidentiality of communication is actually Quantum resistant so having a post wanton an algorithm is very very important now because everything that you say on the internet all the encrypted right now in the future with a quantum computer you know someone should should be able to eventually decrypted if they have a copy when we do these experiments with post once I'm going back to how I said that we have no proof of security for them all the pic Togepi we count to use so we combine them cuz it's quite possible that sour
00:31:14Posey Post once I'm out with them might not only fool to a computer it may fool to a classical computer and so when we add them we will we will replace the current cryptocurrency with old men and women both on the mixing outputs together so the combination is as strong as the weakest of the two and that for at least by using a supposedly guys want to ride with me or at least not making things any worse resources or places that you recommend if you are interested in and better understanding post Quantum Security Plus Quantum cryptography outside of Nest websites for research there's an annual conference called that the PQ crypto conference and this is where the latest and greatest from the academic research comes out but a lot of this is very very new and very on going and it's rapidly changing so every year something that was considered
00:32:14show me post Quantum secure last year gets broken and this is especially true with in this process so there's that there's a number of web sites and and resources for getting up to date with post-mortem photography but I think waiting for the end of the Mist competition / processed it to happen is probably probably where people want to get more involved in more more interested in this because otherwise he may be overwhelmed with the the rapid rate of change I think this is a resource that someone needs to build is an accessible list of links about joining the coast want them I know there's there's one website item on on his website space Once Upon a Time it's a bit narrow though will look for that and speaking of the post Quantum crypto conference my understanding is that was last week Nick to where you at that conference
00:33:14and we saw a bunch of interesting proposals that had to move the state-of-the-art even more past the algorithms that were submitted to the Miss contest which is kind of surprising but kind of not that it was even less than a half a year ago that the final proposals were due for the nest process but several of them have been broken and interesting ways several of them have been modified in interesting ways and there's even brand new proposals that have yet to be cord analyzed so when you talk about what the new standards are going to be proposed Quantum cryptography I think what comes through the first names processes are not going to be the final one set that people use I think there is just so many different Arenas of research so active right now. We will be discovering new algorithms for long time going forward and from this point of view this is perhaps frustrating right because you wanted to pick a standard
00:34:14listen to it and make sure that people have implemented it correctly and Safeway I'm looking forward to more cryptography that's oriented towards safe and secure implementation and appointment as well as you know security against Quantum machines resume with me was the diversity of types of mathematics that were involved so I filled a cryptographer that I haven't studied very much is called codebase cryptography and this uses things like error-correcting codes to build cryptosystems so rather than using mathematical properties like 5 numbers and whatnot that uses these codes that are used in communication and you can build cryptosystems on this end in fact one of the first Quantum resistant algorithms is based on this type of thing so
00:35:14there's there's cryptography everywhere you can kind of builds interesting cryptosystems from a lot of different Arenas and it's it's just it's just fascinating to see it all together so codebase cryptography is perhaps has some issues where you get you have to meet encryption Sailors once in awhile so you have these modes in which geography as you're used to it is supposed to work 100% of the time you lose that in some of these new constructions so I think some of what is most interesting to me is cryptographic algorithms that most closely represent the intuition that we have from current cryptography and that help fit into our current system so that people can actually deploy them and make you some of them on the Internet is there something you think would be great if we could bring these types of insights or this types of expertise that could potentially help expand as Quantum cryptography research one of the things I would like to see
00:36:14would be some lessons learned from earlier photography a loss of the cartography we use today was developed and standardize in the 1990s and I think there was some things that the size of what we just go wrong that we made things that's were overly complicated Fitz and overly configurable and difficult to implement correctly and the consequences of glass of not being good ride the consequences of those problems are folks and security issues on so I think we are now a lot better at recognizing these issues I'm recognizing know what is a sensible level of complexity and what are the hours that implementations are likely to make and then we will think about how to restructure these designs to avoid these hours I think we better I would like most like to see post 1/2 photography really embracing that's more practical concern
00:37:14but that has to come down the road in some cases because we are still out the theoretical points in many of these algorithms there's still in Development Centers in some cases quite rapid Evolution but if we didn't repeat the mistakes of the past in the next cycle that would be very very nice Adam Nick we have time unfortunately as much as this a great conversation so I'd like to say thank you to you both for spending time with us and talking about post Clemson security and Quantum cryptography you write welcome try on the space and folks will be exploring these Continental group Quantum resistant algorithms more and more in the coming years and don't panic thank you so much it was very insightful we really appreciate you coming on the show to talk to us about Quantum security I know I actually have like a bit of an idea of what those words mean that's fabulous yeah I just had no idea now we will quiz you
00:38:14it's a Left 4 Dead all right so mark question the week so you've been coding in real time and streaming this coding experience how do you do that if you wanted to do that one would want one want to do this not related to Google Cloud it all but possibly still interesting so it's actually really fun and really cool and I really like doing it and he is remarkably simple you can find all sorts of really great resources on the internet and in fact I will link to a particular blog post that I first read that I found particularly useful by someone I'm going to probably mess up their name as soon as she wrote a blogpost called lessons for my first year of Life coating on Twitch where they took all the way through the tools and how they do it I pretty much listed that and spoke to some of my teammates about how to do it but the short answer is so I've been streaming list of all the community basically on Twitch so which is really easy to set up you can go there twitch.tv skip account but the real two pieces of this one is getting yourself a decent microphone so you have good audio
00:39:14on your laptop I don't do that blue yeti will do in a pinch word Picasso is a really nice as well I'm been using the ones we have that are not expensive Mike's in the podcast so I get advantage of that but the other thing that you should use that's really awesome is a piece of Open Source software cold OBS Studio runs on Windows Mac Linux pretty much everyone uses it it's kind of amazing actually what it does you can do so that picture in picture you can put your webcam in one spot snelson another a switch between scenes or like I'll show you a picture of my dog while I'm waiting for her to get the stream started and then switch to me and that kind of stuff and of the record locally in that kind of thing too so that you can push that video up to YouTube or anything like that it's obvious you do is Magic it's it's really amazing but yeah other than not get yourself on Twitch Rising code try to do it on a regular basis and it's free to get started off of that is how you should probably create a fake account to use while you're clear coating
00:40:14run like a clipboard like a clipboard manager anytime just clear that out before you start that kind of stuff you couldn't even go as far as like starting a whole new light browser profile and I kind of stuff you may not do that and you heard it here first folks as well how would they do that that is a great question we haven't done this in a while he has school so let's go through the things they want to email email said hello at JCP podcast.com yep they want to reach out to us on Reddit / R / GCB podcast if they want to tweet at us we're at gcp podcast if they want to reach out to some Google Plus community and join the hashtag podcast Channel bit. Ly / gcpd Schleck
00:41:14Buster's really busy but yeah you can find me at 9 a.m. on Tuesdays but follow me on Twitter on Twitch so you can find other stuff I'm doing well thank you very much for joining me for yet another week thank you and thank you for listening and we'll see you all next week

Transcribed by algorithms. Report Errata


Whether you are a Windows Fan, Linux Fanatic or a Apple Fanboy this is the place to check out all the variety of platforms.
United States
147 episodes
since Jul, 2016
Disclaimer: The podcast and artwork embedded on this page are from Tech Podcast Network, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.


Thank you for helping to keep the podcast database up to date.