And so the first thing we said to ourselves is, aha, we gotta solve the
Speaker:architecture problem. The other thing we said
Speaker:was, wait a second, there is this looming elephant in the room. The
Speaker:800-maybe-800 pound gorilla in the room. And that's the emergence of
Speaker:quantum computing. Quantum computing doesn't just change
Speaker:security, it breaks it. Let's talk about what comes next.
Speaker:Welcome to Impact Quantum. The universe dances its
Speaker:snug as a rock. Quantum pot shad. Turn
Speaker:it up fast. Can it, Frank. Blowing my mind at last.
Speaker:Hello and welcome back to Impact Quantum, the podcast. We explore the emerging industry
Speaker:and field of quantum computing where you don't need to have
Speaker:a PhD or study particle physics. You just need to be curious.
Speaker:And with me is the most quantum curious person I know, Candace Gooley. How's it
Speaker:going, Candace? It's great. Thank you so much, Frank. I'm really excited
Speaker:about today. We're going to be speaking with Adam
Speaker:Firestone, who is the CEO of and co
Speaker:founder of six Arrow. He's also
Speaker:called, calls himself Quantum Secure Innovator.
Speaker:I have lots of questions. It's very exciting. Yeah, I'm very
Speaker:interested. So. So welcome to the show, Adam. How's it going? Thanks.
Speaker:I am glad to be here. It's going great. I can't complain. I mean, I
Speaker:could complain, but nobody would listen. So that is the
Speaker:true. That is a true statement of wisdom. It doesn't matter. No one would care.
Speaker:No one will listen. No one would care. So tell
Speaker:us about. And it's pronounced six, zero, six
Speaker:arrow. Okay. I wasn't sure if you're going for
Speaker:like a Cicero type thing or it. Is really
Speaker:pronounced six character URL that was available without a
Speaker:surcharge. I like it. Which people don't realize. The struggle
Speaker:is very real. Right, Candace? Absolutely. No, it's true.
Speaker:It's really true. So that's going to register a domain name.
Speaker:And it was like it was available, but it was also the surcharge was like.
Speaker:Was it $2,000? Yes. It was insane. Right?
Speaker:Well, that's cool. I'm guessing that the license
Speaker:plate is. Probably available too, but probably I haven't looked into
Speaker:that yet. So I'm curious
Speaker:about this. How do you participate in like
Speaker:quantum security? Like what? Or quantum
Speaker:safety? Like what does that look. So maybe I'll take a step back and give
Speaker:a general. The way we see the world.
Speaker:I think the best way to start is to say that, look, we solve a
Speaker:problem and we're not. You know, I like
Speaker:the word quantum is cool. It gets People's attention, We like that a lot. But
Speaker:at the end of the day, we are solving a business problem. And the business
Speaker:problem we solve is what we think the most fundamental business activity
Speaker:is. And that's the ability to move information from outside the organization,
Speaker:into the organization and from into the organization, inside the organization,
Speaker:outside the organization. We have called
Speaker:this very creatively into, out, out to, in. And what happens is
Speaker:this. Unless you are the person who makes their
Speaker:living by making decorative wrought iron gates with a map torch in your backyard
Speaker:out of leaf springs, you steal from wrecked trucks in the
Speaker:middle of the night, you get paid in cash, and you advertise by
Speaker:word of mouth. This applies to you, right? So everything in the world,
Speaker:what happens is somebody or something sends you something that
Speaker:is valuable to them and they send it to you because you have some level
Speaker:of unique expertise. You take that expertise, you apply it to their problem,
Speaker:you create a value add product and then you push it out.
Speaker:And in that set of transactions, we have two hops across
Speaker:organizational boundaries, and that's great,
Speaker:and that's fine. And those hops
Speaker:presuppose that you can move that information in a secure manner.
Speaker:In a secure manner, meaning that only the right people see it,
Speaker:that the information isn't changed by someone
Speaker:without authorization along the way, and that you can rely
Speaker:on it when you get it to work with it.
Speaker:And so, to give you an example, you have
Speaker:a great new idea and you put it together in an invention disclosure statement,
Speaker:and you send this to your patent lawyer, and you send it to your patent
Speaker:lawyer somehow. So it leaves your domain, goes to your patent lawyer's domain,
Speaker:your patent lawyer does magic to it and creates a patent out of it and
Speaker:then pushes that out again to the Patent and Trademark Office and a copy back
Speaker:to you. So we're making cops all over the place through the wild, wild west
Speaker:of the open Internet. And we have assumed to
Speaker:date that there are many ways we do that, right? We assume we can use
Speaker:MFT Managed File transfer. We assume we can use electronic file sync and
Speaker:share tools. We assume we can use shared portals or
Speaker:secure portals, like the kind you might use to send your stuff to your
Speaker:accountant for your taxes, and that all these
Speaker:magically will keep things secure. Except we've got a whole lot of evidence over the
Speaker:last, I don't know, 40 years to include some really high
Speaker:profile cases recently that none of this actually is secure,
Speaker:right? Things are constantly getting breached. Not only are things constantly getting
Speaker:breached, credentials are being stolen, you know,
Speaker:right and left in the in the millions. And part of that, that's
Speaker:what we. Know about target ceasefire. Way worse.
Speaker:Well, let's assume it's all happening by a
Speaker:factor of 10. The mechanics of the problem are still the same
Speaker:and there's two sets of mechanics, so. So bear with me. I promise I'll get
Speaker:done with this soon. No, no, no. This is fascinating. Along for
Speaker:the hall, man. I got my rook sick on too. So
Speaker:mechanics number one are
Speaker:maybe the architecture that we rely on
Speaker:for the Internet client server is
Speaker:not securable. It's robust, it'll
Speaker:get the information there. It is ubiquitous, it is
Speaker:relatively inexpensive. But maybe it's not securable
Speaker:and maybe it's not securable on a number of bases. Maybe it creates
Speaker:one big target, right? Whatever server that is, maybe it, it relies
Speaker:on humans who can be suborned
Speaker:to administer it. And there's an entire class of attacks against the
Speaker:humans that have nothing to do with technology.
Speaker:Maybe it makes things so difficult when we try to secure the insecurable
Speaker:that the people who are charged with doing their jobs get so
Speaker:frustrated at five o' clock on Friday night when they have to get this, whatever
Speaker:this is out the door to the right people on the other side that they're
Speaker:using their personal Gmail accounts. We could go on and on about, about the
Speaker:issues. And so the first thing we said to ourselves is aha,
Speaker:we gotta solve the architecture problem. The
Speaker:other thing we said was wait a second, there is this looming elephant in the
Speaker:room, the 800-perhaps-800 pound gorilla in the room. And that's the
Speaker:emergence of quantum computing. Now quantum computing has many,
Speaker:many, many, many promises, right? I mean we could actually might have whatever
Speaker:weather forecasts that are accurate. We ability to do
Speaker:really neat things in healthcare like customized
Speaker:medication schedules, early indications
Speaker:and treatments for cancer, all sorts of great things.
Speaker:Optimizing delivery schedules and resource usage. Quantum
Speaker:computing can do a tremendous amount for us. And the reason it can do that
Speaker:is because quantum computing more or less to simplify
Speaker:it down and probably oversimplify it, so bear with me, is
Speaker:it's incredibly massively parallel. It affects a
Speaker:massive parallelization of computing. And the way I describe it to folks
Speaker:is do you remember doing mazes as a kid? You'd have a book of mazes
Speaker:and you'd run your pen down. You guys probably did it in pen. I was
Speaker:never that good. I did it in pencil. But you'd run your pencil down from
Speaker:the beginning and if that didn't work, you'd start again. And you start again and
Speaker:you did this surreally. Imagine being able to do all of that
Speaker:at the same time. All possible solutions to find the right
Speaker:one. That's the promise of quantum computing.
Speaker:Unfortunately, that runs smack into the
Speaker:technology that underpins the Internet today. And that technology is
Speaker:classical asymmetric cryptography. It's a lot of words, but.
Speaker:Or a lot of syllables. Anyway, so classical asymmetric
Speaker:crypto is things like rsa. It's things like elliptical curve. It is
Speaker:the thing that allows that a lock icon on your
Speaker:browser to appear because there's a discussion back and forth
Speaker:between your browser and the server. It's the thing that allows your debit
Speaker:card and credit card to be secured to you. It's the thing that allows your
Speaker:keyless remote entry to your car to work. It is
Speaker:ubiquitous. It is everywhere. And everything we do in the
Speaker:connected world relies on it. Literally everything.
Speaker:This technology in turn, relies on something called trapdoor
Speaker:functions. Trapdoor functions are a type of math where it's really easy to calculate
Speaker:the output output, but really, really hard. Think 10,000
Speaker:to 100,000 years. Hard to figure out what the original inputs were
Speaker:without. Without knowing what they were to begin with. And those form our
Speaker:keys. And great, okay. Unfortunately,
Speaker:quantum computing solves those in an efficient manner. Now,
Speaker:efficient maybe an hour, maybe a day, we don't know. But it certainly isn't
Speaker:100,000 years or 10,000 years. And so the security and
Speaker:integrity of everything we expect and rely upon in the Internet is
Speaker:at risk. And we said, aha, opportunity, great.
Speaker:And so we looked around and one of the first thing we
Speaker:noticed was that there are new post, relatively new
Speaker:post quantum algorithms that have been standardized, right? So nist has
Speaker:standardized ML chem, which is FIPS 203. They've
Speaker:standardized MLDSA, which is FIPS 204,
Speaker:and SLHDSA latitude digital signature
Speaker:algorithms, which is FIPS 205. And there's another one in the wings called
Speaker:HQC. HQC should be standardized sometime in
Speaker:2017. ISO is working on a couple of algorithms in terms of
Speaker:standardization. One is classic Macaulays, one is Frodo
Speaker:Camp. Okay, great. But then we
Speaker:started to look a little more deeply at this and we
Speaker:realized that if you solve the algorithm problem and
Speaker:only the algorithm problem, you haven't solved the quantum problem.
Speaker:Why is that? So? The reality is, right now,
Speaker:we're on three different computers. One of them may be a Mac,
Speaker:one of them may be a PC, one of them may be something else. And
Speaker:natively, those devices speak different languages.
Speaker:Fortunately for the Internet, and for all of us, we have universal translators that
Speaker:allow us to talk together. I'm kind of a sci fi geek, so
Speaker:I apologize for the reference. You're in good company.
Speaker:Those universal translators are things called Internet protocols.
Speaker:And the reason why Internet protocols are so powerful is
Speaker:because they're standardized and widely adopted. So for example,
Speaker:when you see the little lock icon in your browser, your browser doesn't
Speaker:know who it's talking to. Your browser doesn't know the server,
Speaker:but it knows how to speak TLS and it knows how to negotiate a
Speaker:TLS session with the server. And because TLS
Speaker:is standardized, TLS 1.2 or TLS 1.3 is TLS's,
Speaker:TLS's TLS and we're good to go. That's
Speaker:great. Except the post quantum
Speaker:Internet security protocols don't exist,
Speaker:right? Not only do they not exist,
Speaker:standards time is kind of like somewhere between normal people time
Speaker:and geologic time, right? It took us 10 years to go
Speaker:from TLS 1.2 to 1.3. And that's when everyone was
Speaker:pulling in the same direction. We now have a
Speaker:situation where there is a looming threat, right? Quantum computers, our latest and
Speaker:Greatest guess is 2028 to 2030. Sometime in there they're going
Speaker:to cryptographically relevant quantum computers are going to appear.
Speaker:And we have a standards body, the ietf,
Speaker:who's doing this internally. And
Speaker:there are a number of things they are arguing internally about.
Speaker:People far smarter than me, like Dr. Daniel Bernstein have written about
Speaker:this. What that does is it applies friction.
Speaker:Friction means we don't get standardization
Speaker:until a later date. If we don't get standardization
Speaker:until a later date, proliferation and broad adoption are also
Speaker:similarly delayed. So how the heck are we going to talk to each other in
Speaker:a secure way? And again, we looked at this and said that's a problem.
Speaker:But the flip side of the problem is opportunity, right? So
Speaker:we built two things. Thing one is a
Speaker:platform that allows us to extend to a whole bunch of stuff. I can talk
Speaker:about that in a little bit if you're interested. The thing we built on top
Speaker:of the platform, the narrow end of the wedge as we enter the market we're
Speaker:a startup, is something called Portal 6. What Portal 6 does is it
Speaker:allows organizations to conquer and and address
Speaker:that out to in to out problem by addressing
Speaker:not just the quantum problem in terms of algorithms, but the
Speaker:quantum problem in terms of algorithms and a mechanism that obviates the
Speaker:protocol problem and also the architectural problem at the
Speaker:same time, by adopting a decentralized approach to
Speaker:information Movement and networking. And so
Speaker:that's who we are. It's what we do. We've been around about a year,
Speaker:and yeah, we're about to enter the market, hopefully
Speaker:with our first pilots sometime either later this month or next month.
Speaker:Oh, interesting. Very fascinating
Speaker:stuff here. What
Speaker:would you say
Speaker:has been your biggest challenge in terms of conveying your
Speaker:message? Right. I liked your whole spiel. I liked your whole spiel. I
Speaker:loved it. But that would have been one heck of an elevator ride.
Speaker:It's really hard. And your point is really, really well
Speaker:taken. And so the answer is here, read
Speaker:on white paper. But people don't want to read. The elevator
Speaker:pitch is. Look, you face three huge problems. Actually four if we
Speaker:count credential leakage. You face four huge
Speaker:problems. The world is telling you they've got one of them
Speaker:solved. All four are fatal.
Speaker:I'm glad we've solved one of them. But the other three are going to kill
Speaker:you. We can help. And then now
Speaker:you've got their attention. Right? Well, I use a first aid analogy. If you're
Speaker:familiar with the acronym MARCH in first aid.
Speaker:Massive bleeding, airway, respiratory, circulatory
Speaker:and hypothermia or head injuries, right. Any of those
Speaker:can be fatal. That's just the order you check the list in.
Speaker:And, and so for our, from our perspective, if you are
Speaker:not addressing all of it, right, architecture,
Speaker:credential leakage, algorithms and
Speaker:protocols, you're not addressing the problem, your patient's still going
Speaker:to die. And we seem to be stuck in a do loop right
Speaker:now inside the community where we are focused on only the algorithms,
Speaker:right? And algorithms alone don't get you very
Speaker:far. Algorithms have to be integrated, they have to be
Speaker:employed, and they have to be put into, into protocols, you know, for
Speaker:comfort. Organizations that do their own bespoke software, all of that
Speaker:matters for the majority of organizations in the
Speaker:world that use somebody else's software. You know,
Speaker:think about your Microsoft 365 account, right? How many organizations just
Speaker:use that as the basis for their software? And they're good to go.
Speaker:For organizations that do that, we are in this position of
Speaker:having to wait for vendors to fix all the problems.
Speaker:And what we think we can do is provide a solution that will grow with
Speaker:you, that is available immediately and will grow with the organization even as these
Speaker:other solutions roll out.
Speaker:Go ahead, Candice. She has something profound. She's going to say, yeah,
Speaker:don't set me up like that. I'm just really kind of
Speaker:interested. You know, everybody, I mean, everyone
Speaker:needs this kind of Security in their system.
Speaker:So how do you determine, you know, what
Speaker:sectors you're trying to go after in what you know
Speaker:and what kind of priority otter to have as opposed
Speaker:to not, you know. Right, that's a great,
Speaker:that's a great question. And it really is about a go to market
Speaker:analysis. So right now we've got some really cool
Speaker:stuff. So I'm going to walk right out into a Global
Speaker:50 law firm, sit myself down in their IT department and they're
Speaker:immediately going to fall over themselves trying to buy my stuff.
Speaker:Probably not, because that's not how that works. Right.
Speaker:So you take a page out of Startup101 and
Speaker:Startup101 says, I'm going to get myself a set of pilot
Speaker:customers that prove out the point. I'm going to look at two or three or
Speaker:four sectors that really could use this. And if we think
Speaker:about professional services, for example, right, Lawyers, what do lawyers do?
Speaker:I give you what is the most important thing in the world to me so
Speaker:you can do something important for me with your expertise, that is create something and
Speaker:push it out. Well, if that sounds like out to in into out. How about
Speaker:accountants? How about financial services? How about consultancies?
Speaker:We can go down the list. There are a whole lot of those
Speaker:organizations out there. And if we start with organizations that are
Speaker:small, let's say, and small is interesting. So let me go into
Speaker:that for a second. Let's say 10 people, maybe 100 people
Speaker:max. One, we're getting legitimacy. Two, we are able
Speaker:to, in real time to continually improve the product. And three,
Speaker:there is a concept of internal and external seats in our product.
Speaker:So you have a law firm, 20 lawyers, right. So you got
Speaker:20 seats, but each lawyer has 100 clients.
Speaker:So you need the ability to create these secure communications,
Speaker:secure information exchanges, we call them sixes. Secure information
Speaker:exchanges. You need the ability to create sixes with
Speaker:at least some significant subset of that 20
Speaker:times 100 of those 2,000 seats. And so by
Speaker:starting small one, we gain legitimacy, we gain the ability to come back
Speaker:to larger clients over time. And at the same time we are
Speaker:exposed to many, many, many other people because the attorney or the,
Speaker:or the accountant or the, or the financial analyst or whoever
Speaker:is now working with some other group who sees
Speaker:the tool and says, I would like some of that, please. And so
Speaker:it's, it's a virtuous cycle that feeds back into itself and
Speaker:continuously allows us to go after bigger and bigger organizations.
Speaker:Interesting. This reminds me of the
Speaker:conversation we had yesterday. Frank with the harvest now
Speaker:decrypt later. Yeah,
Speaker:that's a good thing. And then so, folks, I mean,
Speaker:obviously I encourage listeners to go back and go back and watch that,
Speaker:listen to that. But harvest now to later kind of defined
Speaker:in a sentence is, I know that in a couple of years
Speaker:I'm going to have, as a nation state, I'm going to have access to some
Speaker:of the tools that will crack this existing encryption. I'm going to start hoarding data
Speaker:now because storage is cheap. And honestly, if I'm a state actor,
Speaker:money ain't. I will quote Jay Z, bling bling. Money ain't a thing. Right.
Speaker:And so what's
Speaker:Adam, does that, does the fear of harvest now
Speaker:decrypt later, does that scare a lot of people as much
Speaker:as it should? So not as much as it should, but
Speaker:certainly more than it did when we started on this journey.
Speaker:We had to really explain Quantum and the threats posed
Speaker:by the ongoing attack. Right? The attack is happening. This
Speaker:conversation is being, is being recorded. And that's great. Maybe they'll hit the
Speaker:like button when they decrypt it and they read it.
Speaker:But now all of a sudden, Quantum
Speaker:is really starting to hit the news cycle and we're starting to get a
Speaker:whole lot of interest and people are really starting to,
Speaker:to twig to it. It takes less and less effort to explain where we're coming
Speaker:from and why we're doing what we're doing as time goes by. And by the
Speaker:way, that's part of the whole, the gestalt behind why we
Speaker:think, for example, we're a great investment. Because there will come a time,
Speaker:if you guys remember Y2K, I'm probably the only one old enough to
Speaker:do that. Don't argue with me.
Speaker:And if you remember the, the craziness, you
Speaker:couldn't spend money fast enough in about
Speaker:1998. Right. In about
Speaker:2027, we're going to be in a position 2027,
Speaker:2028, where organizations will not be able to spend
Speaker:money fast enough to get anything called post Quantum.
Speaker:And so we are, we'd like to think really far out ahead of that
Speaker:wave. Yeah, I can
Speaker:easily see that. Like, you know, you're starting to see
Speaker:feature lists of, you know, this is post Quantum safe. Or, you
Speaker:know, my concern is, you know,
Speaker:the unlimited
Speaker:funding led to excesses which ultimately added fuel to the fire of
Speaker:the.com boom. And it's not hard to see the parallels
Speaker:of the AI boom and that, that
Speaker:fear kind of doing that and kind of like the aftermath, like, I don't know,
Speaker:like that's the kind of thing, that's the sort of thing that also kind of
Speaker:keeps me up at night. Right. Well, I like to think that we are
Speaker:serious about our technology. We're also serious about the value we provide.
Speaker:We're serious about our cryptography.
Speaker:I am by training
Speaker:and avocation a systems engineer. Right. I build stuff, it's what I do. I figure
Speaker:out what, what the problems are, what the solutions are, deliver
Speaker:those solutions to people who need them. And we don't
Speaker:build fluff on top of that. We don't gold plate it
Speaker:and we don't lie about what we're building. There are some
Speaker:serious concerns that the cryptographic community has
Speaker:about where we're going in terms of post quantum capabilities.
Speaker:And those concerns are things we're aware of and we build in or
Speaker:we will be building in mitigation
Speaker:mechanisms so that no matter where it goes,
Speaker:the, the products are able to deflect and
Speaker:still support the user base. That's a
Speaker:good way to put it. Like, and not, not saying like that you would take
Speaker:advantage of it. But like I just wonder like, you know, let's, if we can't
Speaker:learn from history, you know, as an industry.
Speaker:Right. You know, George Santano. Right. I mean those who do not learn from history,
Speaker:doomed to repeat it. There's a lot of people who are doomed to repeat it.
Speaker:Yeah. Sabotru. So when you're, when you're working with businesses
Speaker:who are now getting excited about Quantum because they're hearing about
Speaker:it on the news and AI plus Quantum, what, what is the biggest
Speaker:misconception that you come across
Speaker:that they have about. I think there's, there's quantum can do. There's a couple of,
Speaker:couple of places things intersect. So one of them, one of them
Speaker:is, is the idea that it's all
Speaker:solved because algorithms.
Speaker:Another is really, what does this mean to me?
Speaker:And the idea that anything you do, from
Speaker:your mobile device to your laptop to your desktop,
Speaker:talking internally to the server, talking to different parts of your organization
Speaker:that may be distributed, any and all of that is
Speaker:subject to harvest and therefore attack is something
Speaker:people have a rough time wrapping their heads around. People have a rough time
Speaker:wrapping their heads around the concept of all data. Right. I think, you know,
Speaker:one of the things we have done historically in cybersecurity is we have
Speaker:categorized and classified data as to. This is really important.
Speaker:This is not so much important. The problem is given the
Speaker:scale of data movement, it's really
Speaker:hard to separate that out. You know, you have an employee who's Ordering
Speaker:lunch on doordash. You have another employee who's moving some really
Speaker:sensitive stuff. It's coming over the same wires, the same pipe.
Speaker:How do I, how do I separate those out? Our philosophy
Speaker:is you shouldn't be, you should be applying cryptography in a blank
Speaker:way to protect your information so that it doesn't matter
Speaker:what information it is, it's all protected. And that
Speaker:reduces a level of, a burden level on, on, on defenders,
Speaker:because you just assume everything is going to be protected
Speaker:over the course of its life cycle.
Speaker:So I think that's part of it. The other part of it is, what do
Speaker:I do? People don't know where to start.
Speaker:And so one of the design principles in
Speaker:our first product is it's going to be boring.
Speaker:It's going to look like stuff you've seen a million times that you
Speaker:intuitively know how to use. And all the special stuff
Speaker:is hidden. It's all under the hood. And as a result,
Speaker:we don't create a daunting factor for either
Speaker:employees or CIOs. It's a web based
Speaker:product for a reason initially, right? I don't want
Speaker:CIO Frank to come to me and say, wait, what, you want me to
Speaker:move all my data? I have to buy three more servers, I have to
Speaker:install software on everyone's machine? No, they'd have to go to a browser,
Speaker:open a tab, and if you do that, all of a sudden, you've made
Speaker:adoption really, really easy, relatively painless. And then
Speaker:when you want to move into future iterations that might be a little
Speaker:more invasive,
Speaker:you've established trust with people, you've established a track record
Speaker:as opposed to coming in and demanding that the world change just to accommodate
Speaker:you. And I think that's, that's not a winning strategy.
Speaker:No, it's a good way to put it.
Speaker:That's a good way to put it. It's funny that you say boring, right? Make
Speaker:it boring, right? Because that's true, right?
Speaker:From the sales cycle point of view. You want to have the sizzle and
Speaker:the amazement and all that, but realistically, enterprise software at its best is boring
Speaker:because they don't want drama, you don't want surprises, right?
Speaker:And you don't want to have to train your employees. You don't want a barrier
Speaker:to entry. You want this to be, I mean, it's one of the things I
Speaker:say is, hey, that's a really nifty iPhone you have. That's a really
Speaker:nifty Android you have. How long was the user manual?
Speaker:What user manual exactly? Right. And that's, that's the goal.
Speaker:That's what you're trying to achieve. You're trying to achieve a seamless
Speaker:and almost transparent, completely transparent
Speaker:adoption and make it simple, painless, easy,
Speaker:and to have it continually grow because
Speaker:that level of simple and easy makes it the gotta have
Speaker:application. Right. I mean, that makes sense.
Speaker:What? Yeah, no, like
Speaker:I actually just got a Kindle and this is the user
Speaker:manual for it. It's got a color Kindle and this
Speaker:is the user manual. Exactly. All the stuff they couldn't get away with
Speaker:because it's all regulatory notices. Right. There is a manual,
Speaker:apparently on the actual device, but.
Speaker:No, that's true. Right, because let's say shipping cost, it says a lot. Right. Plus
Speaker:the only thing worse than the manual, I mean then no
Speaker:manual is an inaccurate manual. And the
Speaker:problem is nobody reads the manual. Right. I mean, you know, I spent, I
Speaker:spent a bunch of time in the army. Right. And RTFM was a, was a,
Speaker:was a watchword. But the reality is nobody reads
Speaker:anymore. So you've got to create something that's intuitive and easy to
Speaker:adopt. So. Right. So let's go back because
Speaker:now I'm all excited about what shaped you into
Speaker:where you are today. I mean, you're a seven time patent
Speaker:owner, you've written. You actually you
Speaker:told me in the green room that you've just released another
Speaker:book. Yep. Okay. On
Speaker:tech, startup life and advice to give,
Speaker:which is incredibly exciting. So why don't you walk
Speaker:us back a little bit. To you, in university,
Speaker:what were you focusing on and what kind of major path go
Speaker:towards Quantum. Wow.
Speaker:I was born a long time ago at a very young age.
Speaker:So in university I, I was an ROTC cadet. I was one of three
Speaker:ROTC cadets and I graduated.
Speaker:And six days later I show up at Fort Knox to become an armor officer
Speaker:and do all sorts of stuff. And through
Speaker:that path and after I got out of the regular army, one of the things
Speaker:I constantly noted was we were training to fight
Speaker:in a way that would have been totally familiar
Speaker:to Patton's 3rd Armored at Bastogne in
Speaker:World War II. And I was wondering why this was. And then I got out
Speaker:of the regular army, went to law school
Speaker:and I practiced law for a while and I kept wondering,
Speaker:why are we doing this stuff by hand? It wasn't at Quantum
Speaker:yet. And so I got frustrated. Right. I mean,
Speaker:getting frustrated as a lawyer is probably something common to many
Speaker:lawyers. And I stopped doing that after a while and I
Speaker:went and I moved down from New York to Northern Virginia.
Speaker:And one day I walked into a job fair, a big defense
Speaker:contractor and it was mobbed. I mean there's all sorts of people there, right?
Speaker:And there was one table that was not mobbed, and that one table was
Speaker:not mob because it didn't have a fancy display, it had a whiteboard with a
Speaker:bunch of acronyms on it. So I walked over because I figured they looked lonely.
Speaker:And I said, hey, my name's Adam Firestone. Here's my
Speaker:resume. As you can tell from there, I'm not qualified for anything you have on
Speaker:that board, but you want to hire me and this is why. And
Speaker:they did. And so I spent almost 20 years at that company.
Speaker:Last thing, I mean I clawed my way up and I taught myself and
Speaker:got had the opportunity to take a lot of training work with a lot of
Speaker:really smart people and an IR transformed
Speaker:into a systems engineer. I had the opportunity to work and take some classes
Speaker:at some really, really top notch organizations.
Speaker:Wound up teaching systems engineering in the organization's
Speaker:in house university before I left. And I guess the last
Speaker:thing I did was I pretty much single handedly redesigned
Speaker:the mission planning and command and control systems for a small little
Speaker:system you might have heard of called Tomahawk.
Speaker:But I got the security bug when I was, when I was there, right? Because
Speaker:security was S.E.P. somebody else's problem. You built your
Speaker:stuffs and then the information assurance people
Speaker:would poke at your stuff and then probably let it onto their
Speaker:network and that was it. And that sort of seemed disconnected and
Speaker:disjointed to me. So I had the opportunity to go and
Speaker:do some interesting middleware work, open source and
Speaker:middleware, which is really cool, and do some really cool travel to South Asia, which
Speaker:was also really cool. And in the process of doing
Speaker:that, I really got a fantastic introduction to the idea of
Speaker:integrated security. The idea that we can build it
Speaker:in and build it right. In fact, I'm also the editor in
Speaker:chief of, of United States Cybersecurity Magazine. And my, my
Speaker:tagline is Build it Right America, because that's really where I, I
Speaker:got that bug. And I said great, security is great. What security? I
Speaker:know threat intelligence. So I went into threat intelligence, which by the way, spoiler alert
Speaker:is neither. And, and I got
Speaker:this, I got disillusioned and I said maybe security is,
Speaker:is protecting the information with cryptography. I got my first patent when
Speaker:I was working in threat intelligence that was in a multi level security system.
Speaker:And then I moved into this pure play
Speaker:cryptography world and second patent there post Quantum
Speaker:symmetric cryptographic algorithm, which is kind of pointless because
Speaker:AES is good. But, you know, it was another patent.
Speaker:And I learned a whole lot about it, but I really learned that
Speaker:you've got to put it together for people. You've got to hand
Speaker:them something they can use on day one. Because at
Speaker:the end of the day, nobody cares about your cryptography.
Speaker:They just don't care about components. They care about the ability to do their jobs,
Speaker:which was the right answer. And they care when
Speaker:there's a leak or an issue. Right, right. But day to day
Speaker:and convincing people to buy it. So then we go
Speaker:and I said, what should I do next? And one of my co
Speaker:founders, who is still one of my co founders, sat down and we said,
Speaker:okay, the whole problem is we talked about that
Speaker:architectural problem, we should do it this way.
Speaker:And we created a company and we started to do it this way. And we
Speaker:got acquired really early by a larger company,
Speaker:cloud company. We built out a grand
Speaker:solution that solved everything. And that was the worst thing you could
Speaker:possibly do because, Frank, as you pointed out, it takes half an hour
Speaker:to explain a grand solution
Speaker:and you can't sell that. And then eventually there was this
Speaker:realization on everyone's part that our focus on
Speaker:decentralization was fundamentally at odds with a cloud
Speaker:organization's focus. Right. I mean, it just doesn't work. Right.
Speaker:So we left and we sat down and said, okay, so we learned a whole
Speaker:lot about what not to do. Let's do that the right way.
Speaker:And we were joined by a classmate of mine from university,
Speaker:became our third co founder, and the rest is kind of history.
Speaker:And so we put together Sixero and we have been fortunate to
Speaker:work with some really, really good people. It's a small team right now, and
Speaker:when we close this round, the team will grow, but not by a whole lot.
Speaker:Really focused on being efficient, being lean, and putting product
Speaker:out there as rapidly and efficiently as possible.
Speaker:So the quantum thing happened over time.
Speaker:Among other things that I have done or did do or am doing
Speaker:is I taught at a couple of universities. So I taught cryptography and
Speaker:systems engineering at Georgetown at the graduate level. I
Speaker:taught at the George Mason University Business School and I
Speaker:taught undergraduate at George Mason cybersecurity
Speaker:engineering. For all of those areas,
Speaker:quantum was an issue, and it was a looming issue that became
Speaker:more and more imminent. And that's when I really got familiar with the,
Speaker:the threat and I really got familiar with what are the solutions. And I was
Speaker:part of the original, yay, we have algorithms. And then, you know, you took a
Speaker:deeper dive into that and you said, wait a second, I'm a systems engineer. What
Speaker:are my actual requirements? My actual requirements include the ability to
Speaker:converse, the ability to move information in real time,
Speaker:and holy smokes, this, this data in transit problem
Speaker:doesn't go away with just the algorithms. And so
Speaker:quantum. I'm interested in quantum computing. I write about it a lot in
Speaker:my substack and. But I'm really interested in the ability
Speaker:of the world to continue to be the world that we know
Speaker:after the advent of quantum computing. It's really about
Speaker:preserving our ability to innovate and work together and work
Speaker:collaboratively as an economy, as a country, as a global.
Speaker:As a global set of partners. That's a good
Speaker:way to put it. I don't know if you. There's a YouTube channel called the
Speaker:Y Files and
Speaker:he has one on post Quantum, like the post the Q Day, I think is
Speaker:what it's called. And normally he covers like crazy
Speaker:conspiracy stuff. That's normally like kind of what he covers. But
Speaker:like, you know, when he, when he did the one on what a post Quantum
Speaker:kind of world would look like, it was kind of like, that was the one.
Speaker:I'm like, yeah, I can't debunk anything in that. Right. I mean, he did
Speaker:play up some things for, you know, dramatic effect. But aside from that, I mean,
Speaker:everything else looked like it was pretty legit and pretty alarming.
Speaker:Right. Like, so I highly recall. We'll put a link in the show notes. It's
Speaker:a cool show anyway. There's like a talking goldfish. And it's funny.
Speaker:It can be alarming. It can be. And it's
Speaker:fascinating because there are so many people and so many players with so many
Speaker:agendas. I mean, there's, there's like James
Speaker:Bondi spy stuff as well. And, and there's
Speaker:suborning of, or. Or accusations
Speaker:of suborning of standards bodies. And, and why are we using
Speaker:this instead of that? And this seems to be, you know,
Speaker:somebody else's agenda. And, you know, okay,
Speaker:those are real, right? Those are real concerns by really smart people.
Speaker:And so you can do a number of things. You can throw up your hands
Speaker:and say, voila, or you can push the I believe button. Just accept what
Speaker:someone says because they're saying it. Or you can take, I think, the route we
Speaker:took, which I like, well, I'm probio interested in. And
Speaker:that was. We said, if this is true,
Speaker:what do we need to be able to do to
Speaker:mitigate that problem? There's a phrase that I
Speaker:absolutely despise but has gained traction. That
Speaker:is important. And that phrase is crypto agility. And you
Speaker:may have heard that phrase, I get a stomachache every time I hear it. I
Speaker:get a worse stomachache every time I say it. Not because
Speaker:it isn't important, but because it sort of
Speaker:glosses over the fact that we should have been building our systems,
Speaker:all of them, in such a way that everything is
Speaker:modular, that everything is replaceable, that everything is
Speaker:maintainable, and. And the fact that we had to come up with this as an
Speaker:industry, we had to come up with this marketing phrase, crypto
Speaker:agility, which nobody knows what it means anyway,
Speaker:bugs me. It's more popular cousin, which is also
Speaker:about as same on the cringe level, is digital transformation.
Speaker:See? Yeah, yeah, yeah. There's a visceral reaction when you hear that. It's like, ugh.
Speaker:And every time I say it, I throw up in my mouth a little, you
Speaker:know? But the core of the discussion for
Speaker:us was when we build things,
Speaker:we build things in a very, very careful way. The system is
Speaker:extraordinarily carefully architected to allow
Speaker:us to swap things in and swap things out. We are not
Speaker:tied into any one technology to any one way of doing things.
Speaker:We know what we want to accomplish, but the tools and the mechanisms
Speaker:we accomplish that with, we can change as we need to change.
Speaker:And so with respect to cryptography and all the spy
Speaker:stories and the. And the clashing and the gnashing of teeth and. And all that.
Speaker:And I mean, you remember the rock versus Disco wars? Yeah,
Speaker:yeah, okay. That was nothing compared to the hybrid
Speaker:versus PQC wars, right. That are going on
Speaker:right now. And. And so our response is
Speaker:we provide customers the ability to say,
Speaker:hey, this matters to me. I want this
Speaker:type of crypto or that type of crypto or this type of crypto. And so
Speaker:it becomes something that we can manage to give them the
Speaker:ability to manage for themselves. Because prescriptive never gets you very far because
Speaker:you're going to make someone unhappy at some point.
Speaker:That's true. Quantum
Speaker:has a very long R and D Runway,
Speaker:generally. So how do you balance your
Speaker:visionary ambition with practical, near term
Speaker:commercial value? There are things
Speaker:people need to do. I need to be able to send
Speaker:Candace my magnum opus, right. So she can read Still Scrappy,
Speaker:which is the book that came out last week. And
Speaker:how do I do that? And I need to have a conversation with you. How
Speaker:do I do that? And I need to send you a text message or a
Speaker:chat. How do I do that? The set of things people need
Speaker:to do is finite. And if you think about the smartphone when it first came
Speaker:out, it didn't enable you to do anything different.
Speaker:It just let you do it in one place. The things you
Speaker:needed to do, I need to take notes, I need to take pictures, I need
Speaker:to call my friend, I need to send text messages. All of that
Speaker:was just done in one convenient package. And so
Speaker:if we look at the world as a set of I need to be able
Speaker:to. How do I enable people to do
Speaker:all those things based on the set of constraints that emerging technology
Speaker:is placing on them? And so what you do is
Speaker:you start with. Remember that narrow wedge I mentioned earlier? You
Speaker:start with a narrow wedge, I'm going to allow you to move files from point
Speaker:A to point B, period, full stop. Right? It's just a data in
Speaker:transit solution. We're not a file system, so on and so forth. But
Speaker:maybe in the future I'm going to add on voice and maybe in the future
Speaker:I'm going to add on video. Maybe in the future I'm going to add on
Speaker:tap chat and it's going to be all decentralized and it's going to be
Speaker:a complete unified communications platform. And I build it out over time
Speaker:based on levels of staffing,
Speaker:levels of investment, levels of sales and so on and so forth. But you have
Speaker:a roadmap and you adhere to that roadmap until the
Speaker:market slaps you in the face, at which point you say, okay, I get the
Speaker:picture. Let me pivot companies that can understand where the market
Speaker:is today and what the pivot points are. And the indicators of the
Speaker:pivot points are the companies that survive and thrive. Did that answer your question?
Speaker:Way better than in my imagination. Really good
Speaker:job, by the way. Thank you. Of answering said question.
Speaker:So what else can I say? Tell me about this book. I think I still
Speaker:scrappy, I think was in my Amazon recommendations feed.
Speaker:I should be scrappy. Good on you, man. I don't know,
Speaker:I remember seeing that title somewhere. So maybe it was from LinkedIn or whatever.
Speaker:I consume a lot of content and
Speaker:the upside is I appear really smart. The downside is I lose
Speaker:kind of like the origin of it. Like, so I'll be like, I remember hearing
Speaker:this somewhere and like I have a lot of those moments. And
Speaker:there's actually an SAT word. Maybe we should have that as a, as a
Speaker:feature for season four. Candace, The SAT word of the day. I love
Speaker:SAT words. I love SAT words.
Speaker:Cryptonisia, which means
Speaker:you don't remember where you heard something or something like. I think that's what
Speaker:it is. You remember something, but you don't remember where you learned it from.
Speaker:Kryptonisia is when I try to forget about RC4. Anyway.
Speaker:So tell us about the book. So there are two books, actually.
Speaker:The origins are. Why
Speaker:would it be it. I had been both involved in
Speaker:the previous company, and there were a bunch of things I saw that
Speaker:operationally that didn't make sense to me. And then I
Speaker:was advising another company, and I liked
Speaker:those guys. Oh, man, did I like. They were just good folks,
Speaker:but they approached everything as if it was de novo, as it was brand new,
Speaker:as if this had never happened before, ever.
Speaker:And I, you know, you do your advisor thing and you say, hey, maybe you
Speaker:could. Here's a way. And you know, you get ignored because it's never
Speaker:happened before. And we have to figure this out from the beginning. And they
Speaker:kept inducing friction into their processes as a result
Speaker:of that. So I started to write a blog
Speaker:anonymously. And the blog was just my way
Speaker:of. It was cathartic. I was getting it all out of my
Speaker:system. And at some point I looked back and I said, holy smokes, I got
Speaker:a whole bunch of stuff here. And this stuff is actually pretty good.
Speaker:And I put together a book called Scrappy but Hapless.
Speaker:And I like Scrappy but Hapless. Really. I think it's a
Speaker:really good book. It's not as disciplined as I would
Speaker:have liked it to be because it evolved from a series of blog posts.
Speaker:And the blog posts eventually matured to the point where each post
Speaker:grew longer. I went from basically 1100 words or so per
Speaker:post to 3 to 5000 words a post.
Speaker:And of course, nobody's going to read that, right? I was posting
Speaker:for me, it was anonymous. I had violated every rule
Speaker:that Medium has about how you get readership.
Speaker:And what I had realized was the evolution kind of happened on its
Speaker:own. There are three parts to the posts I'm most happy with in that
Speaker:book. And part one is a historical story.
Speaker:It could be anything from the history of East Germany or something in
Speaker:East Germany or something that happened in the ancient world. And
Speaker:then there's a thread that connects it to modern tech companies and
Speaker:how companies navigated the same sort of problem, because the problems don't
Speaker:change. Who's navigating them changes. And then the third
Speaker:part was a fictional vignette about a mythical startup
Speaker:called Scrappy but Hapless, or sbh. And there's a
Speaker:cast of characters. There's Mallory, the CEO. Carlos, one
Speaker:of the lead engineers. Alex. Alex, another lead engineer.
Speaker:Teresa, the chief commercial officer, Marie, the
Speaker:cto. And what that has done is. It's two
Speaker:things. One, it's the dessert, right? It's the reward for getting through the rest of
Speaker:the chapter. But two, it really puts it in context for
Speaker:people living in a startup universe about
Speaker:each specific problem. And so the first book is
Speaker:good. Like, it is not necessarily
Speaker:important to read it in any particular order because all the chapters stand alone.
Speaker:But I learned a lot. And by the time I figured it out and published
Speaker:the first book, I had about half the material for the second book already
Speaker:written. And so the second book really
Speaker:refined that. And so still scrappy.
Speaker:The subtitle is how the Threads of History Inform and Influence Tech
Speaker:Startup Leadership. And it does the same thing. And
Speaker:it really is a manual for doers. It's a.
Speaker:You're not alone. You haven't done this has been done many, many times.
Speaker:Learn from history. Learn from the ability of other people
Speaker:to solve the problem, then pick that up and run with it. And of course,
Speaker:then there's the scrappy but hapless stories, and they're fun and they're endearing,
Speaker:and you get to like and really identify with the characters.
Speaker:And I think on my radar at some
Speaker:point is a scrappy but hapless novel about tech startup using
Speaker:those characters. So they're. They're both on Amazon
Speaker:and you know, hardcover, softcover, ebook, whatever.
Speaker:And yeah, so. And it also,
Speaker:you know, there's a day to day involved with being a CEO of a tech
Speaker:company. Right. And. And so that day to day, in many cases, wound
Speaker:up in the books in one. In one way or another.
Speaker:Interesting. That's interesting. It seems like there's a lot of good information to, like, glean
Speaker:from that book. I'm definitely gonna pick up a copy.
Speaker:Cool. That's fantastic. So you've got to think that being. Being an
Speaker:author and completing it, which is one of the. I work for a
Speaker:tech book publisher for years, and I've been in publishing for
Speaker:years, and the hardest thing in the world is to actually finish a
Speaker:book. I will tell you, Candace. Oh, my gosh.
Speaker:One of the things I realized through the whole journey was
Speaker:how incredibly awesome
Speaker:publishing has become. So publishing used to be the
Speaker:world of gatekeepers, right? There might
Speaker:be a million people writing things, and maybe 50 of them get a book out,
Speaker:right? And when you get a book out, one, they change it. So it's not
Speaker:you writing the book anymore. It's some editor or group of editors writing the book
Speaker:and then it's on some schedule where you've had great grandkids
Speaker:by the time the book comes out.
Speaker:What Amazon has done with Kindle Direct publishing is
Speaker:level the playing field. And it used to be that, you know, it all looked
Speaker:like Sam's Dot stuff way back when. That was just yuck. Right? The
Speaker:quality was meh. Not anymore. I mean,
Speaker:oh my goodness. The ability to communicate,
Speaker:the ability for everybody to get their message out there
Speaker:has never been more available. And
Speaker:I think it's fantastic. I think the ability of everyone to say
Speaker:this is my world. Let me describe it for you. Not everyone's going to sit
Speaker:down and write a book, but you can and you can then publish it
Speaker:and it's virtually free. Yeah,
Speaker:no, and I'm a big fan. Candice, how many books have we put
Speaker:together this year? We did two last year. We did one or two.
Speaker:Yes, we did one last year. Right, exactly. And
Speaker:it's true, you have this information and you're compelled to get it
Speaker:out there and to talk about it. It's very
Speaker:exciting that it's true. We ourselves have used the
Speaker:Amazon Direct to Kindle Publishing. But you're right, I mean,
Speaker:I'm sorry Candice cut you off. No, no, go ahead. Too many monster energy drinks
Speaker:today. The.
Speaker:The gatekeepers. Right. Like you know and I know Candace worked for a big
Speaker:publishing and if you're really curious, you can look her up on LinkedIn, see who
Speaker:it was. But
Speaker:those books, I've written one book for a big. Not
Speaker:that company the candidates work for, but a different one. And I mean it
Speaker:was a 13 month cycle and that was fast. Right.
Speaker:And if you look at like writing a book about an
Speaker:AI topic or security topic, I mean 13 months is an
Speaker:eternity, right. Thirteen months ago,
Speaker:from the AI space, deep seek wasn't a thing. Right.
Speaker:Thirteen months ago, Willow was just about to be announced. Right. Like
Speaker:I don't know how the publishing industry, at least traditional publishing industry
Speaker:is going to keep up. But Kindle Direct, man, I mean it's just if
Speaker:you want to get now you do have to do some sifting because you're right.
Speaker:Like the quality is way better today than it used to be. But you do
Speaker:have to do some sifting. But I tell you man, some of the best,
Speaker:smartest people I know have books out there because they're free from
Speaker:publisher input, which isn't always positive
Speaker:and they're the time
Speaker:to production is just phenomenal. Right.
Speaker:You can finish a book On Tuesday and it can be published by Friday.
Speaker:Yes. I mean it's, it's. Or Thursday. I mean, it's, it's
Speaker:wild. Yeah, well, they always tell you like it could take five days, but they
Speaker:always like trick you and like they do it in 48 hours. Yeah, I,
Speaker:I wrote one of the chapters. I think it's in still scrappy. Is. Is really
Speaker:about. It is. It's. It's about the importance of a personal platform for
Speaker:founders of a startup. And so
Speaker:book publishing is one of them. But platforms like Substack,
Speaker:oh my goodness. Learning how to use LinkedIn,
Speaker:absolutely critical. I write on a tech topic,
Speaker:usually about a thousand words a day, and I publish. Published
Speaker:it every morning at 6am on both LinkedIn and Substack.
Speaker:And that has been really, really important and
Speaker:effective about creating recognition and creating
Speaker:a voice and trust within an overall community.
Speaker:And again, we have never. The
Speaker:ability to move information so that it creates a
Speaker:personal platform that is influential and effective for a business has
Speaker:never been better than it is today. And I can't
Speaker:emphasize podcasts like this. I can't emphasize
Speaker:how important it is for founders to take advantage of those things.
Speaker:Yeah, well, we love hearing that.
Speaker:You guys are doing a tremendous service. Right. For both a
Speaker:founder like me and potential buyers and potential. I mean, what
Speaker:it really does is it helps get the word out and it helps
Speaker:unify the community in a way that you could not
Speaker:do 10 years ago. No,
Speaker:it's true. Like, I mean, and you look at like what, what
Speaker:podcasting has done just in general. Right? You're
Speaker:right. If I wanted a radio show. Right. There were a lot of gatekeepers.
Speaker:Right. And
Speaker:you would have to be beholden to sponsors. Right. Like, we love
Speaker:sponsors. We are actively seeking sponsors as we record this. Just putting it out
Speaker:there. But our production costs are so low.
Speaker:Season 3 was not sponsored by anyone. Right.
Speaker:I think up through season eight of Data Driven also. Well, we had one
Speaker:sponsor, but it was largely. The production costs are so low. And
Speaker:I think you're right. If anyone, it's really,
Speaker:it's not so much the cost. Right. Because realistically, anyone who's a professional, an
Speaker:IT professional is going to have a laptop. They're going to have post
Speaker:pandemic, they're going to have a camera and a microphone. That's good enough.
Speaker:Right. It's really
Speaker:just time is really the only production cost. Candice and I have this discussion all
Speaker:the time, like, let's do this, let's do this. And we try to figure out
Speaker:the most time efficient way. Right. Because to do
Speaker:something and the, the. Democratization
Speaker:of information that things like that
Speaker:enable is so valuable. I mean, I know that there's a
Speaker:lot of about, about
Speaker:who says what when on what social media platform, but at the end of the
Speaker:day, I'm a firm believer in the idea that in the marketplace of ideas, the
Speaker:best ideas will win out. And, and the ability to
Speaker:contribute to that marketplace is, is not only valuable
Speaker:again for founders and for, for purchasers and for people in the community,
Speaker:but I think it's valuable to the nation as a whole. Yeah,
Speaker:that's a good way to put it. Agreed. Agreed.
Speaker:So where can everybody find out more about you
Speaker:and what you're doing? So there's
Speaker:the Sixera website and that's
Speaker:www.63ro.com.
Speaker:There is LinkedIn. So, you know, feel free to look me
Speaker:up. First name, last name, Adam Firestone. Pretty easy to find.
Speaker:And I think with those two entry points, we can
Speaker:take you just about anywhere. If you join and you follow me on
Speaker:LinkedIn or you connect with me on LinkedIn, the daily tech
Speaker:stuff that I publish will come straight to your inbox or straight to your
Speaker:feed. Cool. Awesome. Excellent.
Speaker:And with that, we'll play the outro music. Excellent.
Speaker:Quantum podcast, they're breaking the mold Science and sky beats
Speaker:it's bold and it's gold.
Speaker:The multiverse is skanking, skanking in time Black holes
Speaker:are wailing in a horn line so fine From Planck scales to planets they're
Speaker:connecting the dots Candace and Frank, they're the cosmic
Speaker:hot shots.
Speaker:Quantum podcast, turn it up fast Candace and Frank,
Speaker:blowing my mind at last Quantum podcast, they're breaking
Speaker:the mold Science has got beats it's bold
Speaker:and it's gold.