Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Introduction
00:00 • 4min
How to Pick the Most Private Browser
03:53 • 4min
The War With Ukraina and Its Hackers
08:22 • 4min
Hacking in the Cold War
12:35 • 2min
E C D S a Signature Verification in Java
14:54 • 2min
The Race Is on to Fix This Bug
17:18 • 3min
Celebrite Premium Phone Cracking Kits - What's the Difference?
20:02 • 2min
Celebrit Premium Unlocks All Models of Phones, Even When Locked
21:57 • 4min
Apple's Protections Against Brute Force Attacks
25:38 • 3min
Amazon Using Voice Control Data for Its Voice Assistant to Target Ads
28:24 • 3min
Amazon's Privacy Policies Are Not Enforced at All
31:50 • 3min
Microsopt Edge Edge Browser to Get a Free VPN
34:33 • 2min
The Mark Up Report on Student Loan Data Collection
36:41 • 4min
Facebook Will Have a Hard Time Committing to Privacy Laws
40:17 • 2min
Facebook's Privacy Team Will Need to Filter Data With Purpse Policy Framework
42:20 • 2min
Google Is Expanding Its Options for Removing Personal Information From Google Search Results
44:10 • 2min
Google Amps - What Are They?
46:25 • 2min
Google's Amp Implementation Is Bad for Privacy and Security
48:36 • 4min
Chrome, Edge and Opera Are the Best Browsers in the World
52:27 • 4min
Firefox Browser
56:32 • 4min
The Security Enhancing Challenge Coin
01:00:17 • 2min


