Podcast Episodes
Back to SearchPrivacy vs Content Moderation
There’s no doubt that the internet has enabled criminals to share illicit and vile content with ease. The advent of high-quality end-to-end encrypted…
3 years, 5 months ago
Security Via Subtraction
All software has bugs, so the more software you have installed, the more bugs you have. It’s not just the bugs in any individual application, but it’…
3 years, 5 months ago
No Place Left to Hide
Cameras are everywhere. Every person you pass on the street has a camera on their phone and security cameras are everywhere. They’re so cheap and sma…
3 years, 5 months ago
Hacking Your Honda
The “rolling code” technology used to remotely open and lock your car is supposed to prevent hacking. Unfortunately, Honda has a pretty serious vulne…
3 years, 5 months ago
Crowdsourcing Network Security
We take that little box that connects our home to the internet for granted. But in reality, it’s often the only thing hiding our computers and vulner…
3 years, 6 months ago
The Data Dam is Breaking
This week we’ll talk about three significant new data breaches. Each of these data leaks are important in different ways, but the trend is clear: dat…
3 years, 6 months ago
Necessary Chaos
While many of us prefer order in our lives, at least most of the time, we sometimes need a little chaos. Specifically, we need a source of true rando…
3 years, 6 months ago
Total Cookie Protection
Firefox officially rolled out its Total Cookie Protection feature last week, which is a clever and elegant solution for blocking tracking using third…
3 years, 6 months ago
Moving Beyond Passwords
Everyone hates dealing with passwords, and yet they’ve been the de facto standard of computer authentication for decades. But there’s light at the en…
3 years, 7 months ago
Peppering Your Passwords
I preach about using password managers constantly – because they really are a fantastic tool for increasing your security. Humans suck at creating me…
3 years, 7 months ago