The Privacy BlogThoughts on privacy, security, and other stuff.

CAT | Podcast

Play

Standard-Profile-Picture.jpgIn episode 18 of The Privacy Blog Podcast for March 2014 I talk about:

  • Zombie iPhone Bluetooth settings
  • Proposed Australian encryption regulations
  • More from the Mt. Gox and bitcoin saga
  • The cat and mouse of censorship and circumvention in Turkey

· · · · · ·

Play

Standard Profile Picture

In episode 17 of The Privacy Blog Podcast for February, 2014 I talk about:

  • The just completed RSA Security conference
  • How an email can expose your location
  • A guy who suffered extortion because his username was so valuable.
  • What happened in the latest Bitcoin fiasco
  • Exactly how secure Apple’s iMessage protocol is
  • And finally how insurance companies may drive changes in cyber security

· · · ·

Play

PrivacyPodcastGraphicIn episode 16 of the Privacy Blog Podcast for January, Twenty Fourteen I talk about:
Biological Advanced Persistent Threats
The Apps on your mobile devices that may be enabling surveillance
Why you may soon know more about how much information your service providers are revealing to the government
The total compromise of the TorMail anonymous email service
How the British government is using pornography as a trojan horse for Internet Censorship.
And finally why continued use of a deprecated cryptographic signature algorithm could undermine the security of the Web

· · ·

Play

This is  episode 15 of the Privacy Blog Podcast for December, 2013

In this episode I talk about:

How people are tracking the biggest ever theft of Bitcoins

A keylogger that has compromised 2 million accounts

Why a majority of Turks may be at risk of identity theft

How an anonymous bomb hoaxer got caught

A demonstration of activating iSight cameras without the indicator light

and finally, some thoughts on staying safe this holiday season.

 

· · · ·

Play

Standard Profile PictureThis is episode 14 of the Privacy Blog Podcast for November,2013.
In this episode I talk about:
How your phone might be tracked, even if it is off
The hidden second operating system in your phone
Advertising privacy settings in Android KitKat
How Google is using your profile in caller ID
and the lengths to which Obama has to go to avoid surveillance when traveling.

· · · ·

Older posts >>