Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
How to Synchronize Your Files in the Cloud
01:50 • 4min
Google's Four-Fecta of Critical Zero-Day Bugs
06:01 • 2min
How to Protect Your Mobile Device From Cyber Criminals
08:14 • 2min
Google's Decision to Delay Disclosure of Four Vulnerabilities That Allow for the Internet to Baseband Remote Code Execution
10:39 • 2min
How to Protect Your Mobile Device From Vulnerabilities
13:07 • 2min
How to Fix a Vulnerability Bug in Your Phone
15:19 • 2min
How to Avoid a Malicious Chrome or Chromium Browser Extension
17:29 • 2min
How to Avoid Malicious Extensions in Your Browser
19:48 • 3min
The Privacy Flaws of Popular Fertility Apps
22:36 • 2min
The Risks of Privacy Settings in Apps
24:28 • 4min
The Impacts of Chatbots on Privacy
28:40 • 3min
How to Avoid Scams
31:31 • 2min
The Ransomware Vulnerability Warning Pilot Program
33:40 • 2min
Why You Should Opt Out of Sharing Data With Your Mobile Provider
35:52 • 5min
The Problem With CP&I Breach by Wireless Carriers
40:30 • 2min
TikTok's CEO: Should They Split Off?
42:53 • 3min
TikTok: The Chinese Communist Party's Threat to Privacy
45:58 • 2min
The IRS Is Trying to Ban TikTok
48:06 • 2min
The IRS Is Preparing to Implement a Government-Operated Identity Verification System, login.gov
49:39 • 2min
The Importance of Fingerprinting
51:58 • 2min
How to Use JavaScript APIs to Track Your Website
53:44 • 2min
The Importance of Knowing Your Device's Size
55:48 • 2min
The Different Types of Fingerprints
58:17 • 2min
How to Block a Tor Browser
01:00:16 • 4min
How to Use PGP Part Two
01:04:05 • 2min


