Security Now (Audio)

SN 1041: Covering All the Bases - SHAKEN Networks, Uncontrollable AI, and Robocall Reckoning

41 snips
Sep 3, 2025
Steve Gibson dives into the chaos of software supply chain vulnerabilities, questioning if anyone can truly vet dependencies. The ramifications of AI out of control, illustrated by celebrity chatbots, raise critical ethical concerns. Also discussed are the newly enforced SHAKEN protocols for telecoms and the dangers of authentication consolidation. Issues surrounding age verification online and recent data breaches shed light on privacy challenges. As we celebrate BYTE Magazine's 50th anniversary, the conversation wraps up with reflections on tech evolution and user autonomy in AI.
Ask episode
AI Snips
Chapters
Books
Transcript
Episode notes
INSIGHT

Early Hobbyist Roots Still Matter

  • BYTE magazine's 1975 inaugural issue framed microcomputers as 'the world's greatest toy' and taught gritty DIY skills.
  • Early constraints shaped enduring fundamentals like asynchronous serial comms and assembler thinking.
INSIGHT

Caller Authentication Finally Enforced

  • SHAKEN/STIR retrofit adds caller identity via certificates but adoption lagged for years.
  • The FCC's recent enforcement removing noncompliant providers may finally curb robocalls.
ADVICE

Limit OAuth Single-Point Risk

  • Avoid relying on single-provider OAuth authentication for multiple services.
  • Use unique credentials or reduce trust blast radius to limit pivot after a breach.
Get the Snipd Podcast app to discover more snips from this episode
Get the app