Podcast Episodes

Back to Search
Securing the software supply chain, with Kim Lewandowski

Securing the software supply chain, with Kim Lewandowski


Season 3 Episode 13


At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the "supply chain." Immediate stockpiling by an alarmed (and from a smaller share, opportunistic) public led…


Published on 3 years, 5 months ago

Tor’s (security) role in the future of the Internet, with Alec Muffett

Tor’s (security) role in the future of the Internet, with Alec Muffett


Season 3 Episode 12


Tor, which stands for "The Onion Router," has a storied reputation in the world of online privacy, but on today's episode of Lock and Code with host David Ruiz, we speak with security researcher Alec…


Published on 3 years, 6 months ago

Hunting down your data with Whitney Merrill

Hunting down your data with Whitney Merrill


Season 3 Episode 11


Last year, Whitney Merrill wanted to know just how much information the company Clubhouse had on her, even though she wasn't a user. After many weeks of, at first, non-responses, she learned that her…


Published on 3 years, 6 months ago

Recovering from romance scams with Cindy Liebes

Recovering from romance scams with Cindy Liebes


Season 3 Episode 10


Earlier this year, a flashy documentary premiered on Netflix that shed light onto on often-ignored cybercrime—a romance scam. In this documentary, called The Tinder Swindler, the central scam artist …


Published on 3 years, 7 months ago

Why software has so many vulnerabilities, with Tanya Janca

Why software has so many vulnerabilities, with Tanya Janca


Season 3 Episode 9


Every few months, a basic but damaging flaw is revealed in a common piece of software, or a common tool used in many types of programs, and the public will be left asking: What is going on with how o…


Published on 3 years, 7 months ago

Why data protection and privacy are not the same, and why that matters

Why data protection and privacy are not the same, and why that matters


Season 3 Episode 8


Data protection, believe it or not, is not synonymous with privacy, or even data privacy. But around the world, countless members of the public often innocently misconstrue these three topics with on…


Published on 3 years, 8 months ago

Telling important stories securely, with Runa Sandvik

Telling important stories securely, with Runa Sandvik


Season 3 Episode 7


In 2017, a former NSA contractor was arrested for allegedly leaking an internal report to the online news outlet The Intercept. To verify the report itself, a journalist for The Intercept sent an ima…


Published on 3 years, 8 months ago

De-Googling Carey Parker’s (and your) life

De-Googling Carey Parker’s (and your) life


Season 3 Episode 6


Three years ago, a journalist for Gizmodo removed five of the biggest tech companies from her life—restricting her from using services and hardware developed or owned by Google, Apple, Amazon, Facebo…


Published on 3 years, 9 months ago

How Crisis Text Line crossed the line in the public’s mind

How Crisis Text Line crossed the line in the public’s mind


Season 3 Episode 5


How would you feel if the words you wrote to someone while in a crisis—maybe you were suicidal, maybe you were newly homeless, maybe you were suffering from emotional abuse at home—were later used t…


Published on 3 years, 9 months ago

The world’s most coveted spyware, Pegasus

The world’s most coveted spyware, Pegasus


Season 3 Episode 4


Two years ago, the FBI reportedly purchased a copy of the world's most coveted spyware, a tool that can remotely and silently crack into Androids and iPhones without leaving a trace, spilling device…


Published on 3 years, 10 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate