This chapter explores how many major hacks originate from seemingly insignificant sources, such as stolen or easily guessable passwords. It emphasizes the vulnerability of human identity and discusses the authors' vision for the future of data and privacy, encompassing universal signals, federal privacy regulations, and safeguards for artificial intelligence.
When your information is everywhere, is it possible to rein it back in?
Deidre Woollard caught up with Tom Kemp, a cybersecurity expert and author of “Containing Big Tech: How to Protect our Civil Rights, Economy, and Democracy.” They discuss: - The implications of biometric data collection in a world where big tech runs rampant - Which companies are getting the privacy game right (and wrong) - Angel investing, and workarounds to weak links in existing cybersecurity systems
Tickers discussed: META, AAPL, AMZN, GOOG, GOOGL, MSFT
Host: Deidre Woollard Guest: Tom Kemp Producer: Mary Long Engineers: Dan Boyd, Kyle Carruthers
Learn more about your ad choices. Visit megaphone.fm/adchoices