Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Introduction
00:00 • 2min
How to Maximize Sharpness in Space Hackers
01:52 • 3min
Juice-Jacking: A Threat to Privacy
05:06 • 2min
Why Is Juice-Jacking Suddenly Back in the News?
06:42 • 4min
How to Avoid Compromising Fake Wall Chargers and Cables
10:26 • 5min
The Fear of Gray Key Cables
15:06 • 2min
The Future of Cybersecurity in Space
17:31 • 2min
The Ethical Hackers Exploited a Satellite's Quote Standard Access Rights to Gain Control of Its Application Environment
19:51 • 2min
The Importance of Doctoring Images
21:49 • 2min
The Chinese Government Is Developing Capabilities to Seize Control of Satellites
23:46 • 5min
The Problem With Free to Play Games
28:31 • 4min
The Financial Penalty for Cheating in Free to Play Games
32:36 • 2min
The Importance of Identity Verification in Games
34:56 • 2min
How to Be a Successful Engineer at Bloomberg
37:06 • 3min
How to Make Money on the Internet With Crypto
39:45 • 6min
How to Make Money Out of Thin Air
45:22 • 2min
How to Grow Your Cryptocurrency Business
47:49 • 3min
How to Make 50% Legal, 50% Monthly Returns
50:44 • 3min
Cryptocurrency and the Ponzi Logic Test
54:06 • 2min
The Future of Crypto and Tinder
56:12 • 3min