Closed Network Privacy Podcast

Episode 46 - Not perfect but good enough. Be your own algorithm.

Jul 26, 2025
Simon shares personal reflections on coping with loss while returning to podcasting. He dives into social engineering tactics, recounting how he nearly fell victim to a spoofed Google call. Explore the implications of AI on encrypted messaging and why self-hosting is crucial for privacy. Simon discusses transitioning to Graphene OS for enhanced app permissions and practical tips for starting self-hosting with old hardware. He also highlights local privacy communities and tools for maintaining digital privacy, ending with steps to protect oneself on social apps.
Ask episode
AI Snips
Chapters
Books
Transcript
Episode notes
ANECDOTE

Targeted Google Social‑Engineering Call

  • Simon describes a social‑engineering call claiming Google legal contacted him about a death certificate and account access.
  • He resisted a push to approve a remote MFA prompt and later reported the incident to Google support.
INSIGHT

Passkey/MFA Prompts Create New Attack Vector

  • Simon explains a login flow that bypasses passwords by sending an MFA prompt to a logged‑in device.
  • This creates a social‑engineering vector where attackers ask targets to approve prompts on trusted devices.
ADVICE

Verify Calls And Recheck Account Security

  • Do verify unexpected security calls by contacting the company through official channels rather than following caller instructions.
  • Do audit account sign‑ins, change passwords, and confirm hardware keys remain registered after any suspicious contact.
Get the Snipd Podcast app to discover more snips from this episode
Get the app