
Firewalls Don't Stop Dragons Podcast
A Podcast on Computer Security & Privacy for Non-Techies
Latest episodes

Oct 16, 2023 • 1h 1min
What’s Your Threat Model?
There are several privacy-focused services available today. And the products we use have a dizzying array of privacy and security settings. How do you know which products you need and which vendors you can trust? How do you know which protections you need and which ones you don't? It comes down to understanding your personal threat model. We each have different things to protect and different consequences for failure. Today I'll speak with Andy Yen, CEO and founder of Proton, to help us figure out what we need.
Interview Notes
Proton Sentinel: https://proton.me/blog/sentinel-high-security-program
Privacy Decrypted #1: https://proton.me/blog/what-is-a-threat-model?ref=instantsearch
Private from Everyone (But Us): https://podcast.firewallsdontstopdragons.com/2022/04/25/private-from-everyone-but-us/
Security Planner (threat model tool): https://innovation.consumerreports.org/initiatives/security-planner/
Ars Technica threat model series: https://arstechnica.com/features/2021/10/securing-your-digital-life-part-1/
Further Info
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:03: Show preview0:01:44: Delete Act passes0:02:36: What new at Proton since we last spoke?0:07:00: How do you determine your personal threat model?0:09:21: How does Proton decide which threat models to address?0:13:40: How do you learn about all the possible security settings?0:15:37: How do you know which companies and products you can trust?0:18:11: How should VC money and buyouts affect our trust?0:22:30: What should tech reviewers be focusing on with privacy products?0:26:24: How important is a company's location for privacy?0:28:47: Are technological solutions sufficient to protect our data?0:30:22: Has Proton received any pressure from governments to weaken privacy?0:33:27: Does Proton actively market to government officials?0:34:43: How can larger companies protect against insider threats?0:37:05: What's your take on the LastPass breach?0:41:32: What is Proton Sentinel and who is it for?0:46:09: Will Sentinel be able to scale?0:47:31: Proton asks Sentinel users for personal information - is that safe?0:51:04: Can you share any specific Sentinel success stories?0:53:39: What other features would you like to add to Proton?0:58:30: Wrap-up1:00:11: Look ahead

Oct 9, 2023 • 1h 7min
Cybersecurity Awareness Month
Guest Nick Oles discusses recognizing and reporting phishing during national Cybersecurity Awareness Month. Other topics include malware-infected Android TV boxes, a data breach at 23andMe, illegal use of smartphone location data by US agencies, Meta's ad-free plans for Facebook and Instagram, FBI warnings about phantom hacker scams, Microsoft's AI tool that clones voices, the importance of upgrading to Windows 10, FCC's net neutrality plans, turning off Google's tracking system, and a new app from Consumer Reports for deleting personal data.

Oct 2, 2023 • 1h 10min
Catching Phish
The weakest link in most cybersecurity systems is you - that is, human beings. And one of the primary ways that people are tricked into infecting their devices (and potentially then threatening other devices on the network) is through phishing. We've all seen the Nigerian Prince scams, but with AI tools like ChatGPT, scam emails are going to get a lot harder to spot. On today's show, author and cybersecurity expert Nick Oles will teach us how to recognize phishing emails, introduce us to tools for detecting and protecting against phishing, and detail other techniques for defending against these sorts of attacks. All of this is just a taste of the top notch advice contained in his new book, "How to Catch a Phish".
Interview Notes
How to Catch a Phish: https://www.amazon.com/How-Catch-Phish-Practical-Detecting/dp/1484293606
Win a free copy!! https://fdsd.me/catchaphish
Nick Oles on LinkedIn: https://www.linkedin.com/in/nick-o-8b5b6349/
National Cybersecurity Awareness Month: https://www.cisa.gov/cybersecurity-awareness-month
Virustotal URL scanner: https://www.virustotal.com/gui/home/url
URLscan.io: https://urlscan.io/
SANS PICERL Incident Response model (PDF): https://www.sans.org/media/score/504-incident-response-cycle.pdf
Malwarebytes personal: https://www.malwarebytes.com/getprotection
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:45: Patron book club update0:02:11: Nat'l Cybersecurity Awareness Month0:02:48: What drove you to write the book?0:06:57: What really happens behind the scenes when I send an email?0:13:37: What are email headers and why would I want to look at them?0:17:13: How are email senders spoofed and can we prevent this?0:23:35: Do email clients have indicators for vetted senders?0:25:40: What is phishing and how can we recognize it?0:32:06: How has phishing evolved over the years?0:37:01: What are spearphishing and business email compromise?0:40:24: Do spam filters help at all with phishing emails?0:42:50: How do I know if I can trust any link or URL in an email?0:48:34: Are web email clients safer than dedicated email apps?0:51:35: How can we know which email attachments are safe to open?0:54:48: If I accidentally click a bad link or attachment, what then?0:59:11: How will AI impact phishing campaigns?1:01:13: Are things getting better or getting worse?1:04:08: Interview wrap-up1:07:44: Book giveaway details

Sep 25, 2023 • 1h 4min
iOS 17 Security & Privacy
Apple has just released a major update to its mobile operating system: iOS 17. There are tons of fun new features, but today I'll walk you through some of the security and privacy enhancements. These include new protections in Lockdown Mode, the Check In feature which can alert loves ones if you fail to arrive at your destination, some privacy-enhancing web browser features, and support for securely sharing passwords and passkeys with others.
In other news: a critical WebP vulnerability means we have to update most of our apps and devices; credit bureaus in the US now allow free weekly access to your credit reports; Proton announces a new, privacy-focused CAPTCHA service; the FTC puts data brokers on notice; LastPass is requiring their users to make their master passwords longer; password managers are still your best bet for web security, despite the LastPass debacle; Hyundai Pay seeks to make in-car payments a thing; and an interesting article from a privacy advocate claiming that privacy tools are too difficult to use.
Article Links
[MakeUseOf] Update Everything: This Critical WebP Vulnerability Affects Major Browsers and Apps https://www.makeuseof.com/critical-webp-vulnerability-affects-major-browsers-apps/
[Consumer Reports] Credit Bureaus Equifax, Experian, and TransUnion Announce Permanent, Free Weekly Access to Credit Reports https://www.consumerreports.org/money/credit-scores-reports/credit-bureaus-permanent-free-weekly-credit-report-access-a2226546788/
[proton.me] Introducing Proton CAPTCHA https://proton.me/blog/proton-captcha
[The Washington Post] FTC consumer protection chief puts data brokers on notice https://www.washingtonpost.com/politics/2023/09/21/ftc-consumer-protection-chief-puts-data-brokers-notice/
[briankrebs] LastPass: ‘Horse Gone Barn Bolted’ is Strong Password https://krebsonsecurity.com/2023/09/lastpass-horse-gone-barn-bolted-is-strong-password/
[ZDNet] Why you can still trust (other) password managers, even after that LastPass mess https://www.zdnet.com/article/why-you-can-still-trust-other-password-managers-even-after-that-lastpass-mess/
[The Verge] ‘Hyundai Pay’ is the latest effort by car companies to make in-car payments a thing https://www.theverge.com/2023/9/6/23861412/hyundai-pay-parkopedia-in-car-payment
[theprivacydad.com] Privacy Tools Are Not Worth the Hassle https://theprivacydad.com/privacy-tools-are-not-worth-the-hassle/
[TechCrunch] iOS 17 includes these new security and privacy features https://techcrunch.com/2023/09/18/ios-17-includes-these-new-security-and-privacy-features/
Tip of the Week: iOS 17 Security & Privacy: https://firewallsdontstopdragons.com/ios-17-security-privacy/
Further Info
Secure Your Home Network article series: https://firewallsdontstopdragons.com/secure-your-network-part-1-scan/
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:27: Delete Act update
0:00:59: BSides RDU
0:01:54: News rundown
0:04:20: Critical WebP Vulnerability Affects Major Browsers and Apps
0:12:22: Credit Bureaus Announce Permanent, Free Weekly Access to Credit Reports
0:17:24: Introducing Proton CAPTCHA
0:22:07: FTC consumer protection chief puts data brokers on notice
0:26:19: LastPass requiring users to create longer passwords
0:32:58: Why you can still trust (non-LastPass) password managers
0:43:01: ‘Hyundai Pay’ in-car payments coming
0:45:38: "Privacy Tools Are Not Worth the Hassle"
0:54:57: Tip of the Week: iOS 17 security & priv...

Sep 18, 2023 • 1h 2min
Your Face Belongs to Us
When the New York Times broke the Clearview AI story in 2020, we suddenly had to face the reality that no one could truly be anonymous in public any more. This powerful app could take a picture of any face and find dozens of public images on the internet that they were in - even just in the background. And if those pictures were associated with a social media profile, we could identify the owner of the face along with their friends and family - all in an instant. Today I speak with Kashmir Hill about her investigation of this company and the sobering impacts of facial recognition technology in a world full of cameras, chronicled in her new book "Your Face Belongs to Us".
Interview Notes
Your Face Belongs to Us: https://www.kashmirhill.com/book
Kashmir Hill facial recognition stories: https://www.kashmirhill.com/stories/face-recognition
Clearview AI, delete dead links: https://www.clearview.ai/privacy-and-requests
FRT used to track activity in coffee shop: https://www.linkedin.com/posts/endritrestelica_ai-tech-activity-7098293527951851520-Mejy/
PimEyes: https://pimeyes.com/
Fawkes masking tool: https://sandlab.cs.uchicago.edu/fawkes/
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Would you like me to speak to your group about security and/or privacy? https://fdsd.me/speakerrequest
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:37: Tell us about your beat at the New York Times
0:02:17: What is the Clearview app and what does it do?
0:05:12: How did you come to write about Clearview AI?
0:07:40: What happened when you first investigated this company?
0:11:46: How did Clearview AI obtain all these images of our faces?
0:14:24: Why are privacy advocates calling for a ban on this technology?
0:16:36: Do the makers of Clearview appreciate the privacy implications of their tool?
0:18:56: How did 9/11 influence our views on surveillance technology?
0:22:33: Who has access to the Clearview app?
0:24:14: How do we know who is using this tool?
0:25:22: How has Clearview tried to win approval for this tool?
0:27:37: What's to stop others from copying this technology?
0:31:05: Wasn't Clearview used to ban lawyers from venues in NYC?
0:33:13: Didn't Illinois sue Clearview AI and win?
0:34:09: Where else is facial recognition being used today?
0:38:05: How often is FRT used in solving crimes in the US?
0:41:26: What about cases where FRT identifies the wrong person?
0:43:23: How accurate are these tools? What causes them to fail?
0:45:59: How accurate is Clearview compared to other tools?
0:47:02: How well does Clearview deal with facial hair, masks, etc?
0:50:01: What can we do to protect our faces online?
0:52:33: How well can Clearview pick out faces in the background?
0:54:41: What's the future of privacy in a world full of cameras?
0:56:24: What can we do to rein in abuse of FRT?
0:58:00: Wrap up and a look ahead

Sep 11, 2023 • 1h 7min
Remediate Your Network
Today I wrap up my four-part series on how to secure your home network. We've enumerated our devices, gotten rid of stuff we don't need, assessed the state of our devices and now it's time to actually remediate any vulnerabilities we found. I'll walk you through everything you need to do.
In other news: Chrome's Topics API has rolled out (and I'll tell you how to shut it off); Apple fixes two zero-day, zero-click exploits; FBI dismantles and even fixes the Qakbot malware network; the UK backs down on requirements to undermine end-to-end encryption; Macs are being targeted with a malvertising campaign; LastPass breach seems to be behind crypto wallet stealing; Apple reveals why it abandoned its CSAM scanning feature; Kias and Hyundais are being stolen left and right and are being sued; new cars are a privacy nightmare; Chrome extensions are able to steal private data from web pages.
Article Links
[The Verge] How to disable Chrome’s new targeted ad tracking https://www.theverge.com/23860050/chrome-ads-topics-sandbox
[citizenlab.ca] NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
[TechCrunch] FBI operation tricked thousands of computers infected by Qakbot into uninstalling the malware https://techcrunch.com/2023/08/29/fbi-operation-qakbot-uninstall/
[AppleInsider] UK backs down from nonsensical law after threats from Apple, WhatsApp https://appleinsider.com/articles/23/09/06/uk-backs-down-from-nonsensical-law-after-threats-from-apple-whatsapp
[Tom's Guide] Macs under threat from malicious ads spreading malware — don’t fall for this https://www.tomsguide.com/news/macs-under-threat-from-malicious-ads-spreading-malware-dont-fall-for-this
[briankrebs] Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/
[WIRED] Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy https://www.wired.com/story/apple-csam-scanning-heat-initiative-letter/
[VICE] Kias and Hyundais Keep Getting Stolen by the Thousands and Cities Are Suing https://www.vice.com/en/article/93kdmp/kias-and-hyundais-keep-getting-stolen-by-the-thousands-and-cities-are-suing
[Gizmodo] If You’ve Got a New Car, It’s a Data Privacy Nightmare https://gizmodo.com/mozilla-new-cars-data-privacy-report-1850805416
[techxplore.com] Researchers issue warning over Chrome extensions that access private data https://techxplore.com/news/2023-09-issue-chrome-extensions-access-private.html
Tip of the Week: Remediate Your Network: https://firewallsdontstopdragons.com/secure-your-network-4-remediate/
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Would you like me to speak to your group about security and/or privacy? https://fdsd.me/speakerrequest
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:29: Kashmir Hill interview coming
0:01:40: News rundown
0:04:32: How to disable Chrome’s new targeted ad tracking
0:07:12: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild
0:10:36: FBI operation dismantles Qakbot botnet
0:13:51: UK backs down from nonsensical law after threats from Apple, WhatsApp
0:17:10: Macs under threat from malicious ads spreading malware
0:23:03: Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach

Sep 4, 2023 • 1h 11min
Containing Big Data
In the US today we're dealing with a completely unfettered free-for-all of data harvesting. Without meaningful privacy regulations like the EU's GDPR, our private information is being collected, collated, packaged and sold by data brokers to all comers. Ad companies like Google and Facebook collect and hoard our data to sell targeted ads for high profits without commensurate benefits to the people placing the ads. How does it all work? What's our data worth? And how can we protect it? I'll discuss all of this and more with my guest, Tom Kemp.
Tom Kemp is a Silicon Valley-based entrepreneur, investor, and policy advisor. Tom is also the author of Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy.
Interview Notes
Containing Big Tech:: https://www.tomkemp.ai/containing-big-tech
Let’s Make Privacy Easy: https://techpolicy.press/lets-make-privacy-easy/
LinkedIn panel discussion on AI and privacy regulation in the US: https://www.linkedin.com/events/thestateofusprivacy-airegulatio7087548531820941312/
SB362 (Delete Act): https://www.darkreading.com/endpoint/why-the-california-delete-act-matters
Tom’s post on SB362: https://www.linkedin.com/posts/tomkemp_sb362-databrokers-privacy-activity-7103448636260302848-Qg6p
Global Privacy Control: https://firewallsdontstopdragons.com/how-to-enable-global-privacy-control/
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Would you like me to speak to your group about security and/or privacy? https://fdsd.me/speakerrequest
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:20: Follow me on Bluesky?
0:01:32: Interview preview
0:02:59: What are data brokers? Would we recognize their names?
0:06:07: How big is the data broker industry?
0:08:35: You say there are 5 different types of data brokers - what are they?
0:12:10: Are there financial data brokers outside the US?
0:15:53: Are we granting permission for data collection without realizing it?
0:18:44: Who is making money off our data and what is it really worth?
0:21:56: Who is selling our data out the back door?
0:26:50: Why is location data so valuable?
0:28:40: How much of my data is raw and how much is inferred or extrapolated?
0:33:06: How often do data records contain errors?
0:36:24: How much of our personal data is publicly available?
0:38:46: Can we have an ad-based web economy and privacy, too?
0:44:56: Our behavior ads really worth more than contextual ads?
0:48:08: Can antitrust laws be leveraged against data collection?
0:50:46: Can laws requiring transparency in data collection be a stepping stone?
0:56:14: Why can't we pass a federal privacy law?
0:58:25: What can we do right now to limit data collection?
1:01:50: What else does your book cover?
1:05:28: Interview wrap-up
1:06:01: Delete Act (SB362) Udpate
1:06:58: A note on warranty registrations
1:08:11: Global Privacy Control article
1:08:28: Patron podcast teaser
1:08:50: Look ahead

Aug 28, 2023 • 59min
Assessing Your Network Security
In the third part of my series on securing your home network, we'll assess your security and privacy vulnerabilities. In prior weeks, we've exhaustively listed our network devices (Scan) and removed any devices that we no longer need or don't need to be "smart" (Simplify). Now it's time to investigate the remaining devices and think about what we need to do to secure them.
In other news: an old Mac malware info stealer is back; thousands of Android apps are evading detection using an interesting technique; Illinois just passed a law allowing doxing victims to sue perpetrators for damages; Meta plans to roll out end-to-end encryption for Messenger by year's end; LinkedIn accounts are being targeted for takeover; Intel's GPU driver collects personal info by default; Tesla suffers data breach of 75,000 current and former employees; police are accessing DNA databases even for people who opted out of this access; Pennsylvania court says police been to be transparent about social media monitoring; Kansas newspaper raid by police teaches us how better to encrypt our data; hackers are selling credit report info on just about any American; NSA director tells employees to spy "with dignity and respect".
Article Links
[TechRadar] One of the worst Mac malware strains is back and hiding as a productivity app - so beware https://www.techradar.com/pro/security/one-of-the-worst-mac-malware-strains-is-back-and-hiding-as-a-productivity-app-so-beware
[Tom's Guide] Thousands of Android malware apps use stealthy APKs to bypass security, study finds https://www.tomsguide.com/news/thousands-of-android-malware-apps-use-stealthy-apks-to-bypass-security-study-finds
[Ars Technica] Illinois just made it possible to sue people for doxxing attacks https://arstechnica.com/tech-policy/2023/08/illinois-just-made-it-possible-to-sue-people-for-doxxing-attacks/
[TechCrunch] Meta plans to roll out default end-to-end encryption for Messenger by the end of the year https://techcrunch.com/2023/08/22/meta-plans-to-roll-out-default-end-to-end-encryption-for-messenger-by-the-end-of-the-year/
[TechRadar] LinkedIn user accounts have been taken over in huge hacking campaign https://www.techradar.com/pro/security/linkedin-user-accounts-have-been-taken-over-in-huge-hacking-campaign
[extremetech.com] Intel's GPU Drivers Now Collect Telemetry https://www.extremetech.com/gaming/intels-gpu-drivers-now-collect-telemetry-including-how-you-use-your-computer
[TechCrunch] Tesla says data breach impacting 75,000 employees was an insider job https://techcrunch.com/2023/08/21/tesla-breach-employee-insider/
[BBC] Why US tech giants are threatening to quit the UK https://www.bbc.com/news/technology-66304002
[The Intercept] Police Are Getting DNA Data From People Who Think They Opted Out https://theintercept.com/2023/08/18/gedmatch-dna-police-forensic-genetic-genealogy/
[The Associated Press] A Pennsylvania court says state police can’t hide how it monitors social media https://apnews.com/article/pennsylvania-police-aclu-social-media-monitoring-1508189aba86cc776e19892b4a2b358a
[freedom.press] What a newsroom police raid teaches us about encrypting our devices https://freedom.press/training/blog/marion-record-police-raid/
[404media.co] The Secret Weapon Hackers Can Use to Dox Nearly Anyone in America for $15 https://www.404media.co/the-secret-weapon-hackers-can-use-to-dox-nearly-anyone-in-america-for-15-tlo-usinfosearch-transunion/
[The Intercept] NSA Orders Employees to Spy on the World “With Dignity and Respect” https://theintercept.com/2023/08/25/nsa-spy-dignity-respect/
Tip of the Week: Securing Your Network 3: Assess: https://firewallsdontstopdragons.com/secure-your-network-3-assess/
Further Info
Dragon Challenge Coin promotion: https://fdsd.me/promo823
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions!

Aug 21, 2023 • 1h 9min
Demystifying AI
AI expert Michael Littman explains what AI is and isn't, how it works, and discusses concerns about job displacement and malicious use. They delve into the rise of AI tools in image generation, explore biases in language models, and discuss safeguards against misuse of AI. Listeners can also learn how to get started with AI using publicly available tools and chat bots integrated with search engines.

Aug 15, 2023 • 56min
Hacker Summer Camp 2023
Every summer, hackers from around the US and around the globe descend on Las Vegas, Nevada, for a series of computer security conferences which are lovingly referred to as hacker summer camp. These conferences - BSides Las Vegas, BlackHat and DEF CON - run for over a week, each overlapping the other. They bring top tier security researchers, government and industry leaders, and eager hackers to learn about new vulnerabilities, new defense mechanisms, and everything in between. There are contests and parties galore, allowing hackers to test their skills and network with others. Today I'll tell you about my trip to BSides and DEF CON in 2023.
Article Links
[securityweek.com] Downfall: New Intel CPU Attack Exposing Sensitive Information https://www.securityweek.com/downfall-new-intel-cpu-attack-exposing-sensitive-information/
[9to5mac.com] Mac malware can easily bypass Apple’s Background Task Manager, says security researcher https://9to5mac.com/2023/08/14/mac-malware-background-task-manager/
[whitehouse.gov] Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/09/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software/
Donate to Maui wildfire relief fund: https://www.gofundme.com/f/5auw5q-maui-wildfire-relief-fund
Veilid project (cDc): https://veilid.com/
Back Orifice: https://en.wikipedia.org/wiki/Back_Orifice
Namecheck from Steve Gibson: https://youtu.be/hGyVuszu0F8?t=6240
CalyxOS mention: https://en.wikipedia.org/wiki/CalyxOS
Tom Kemp on LinkedIn Live: https://www.tomkemp.ai/blog/2023/7/19/live-event-the-state-of-us-privacy-and-ai-regulation
Further Info
Dragon Challenge Coin promotion: https://fdsd.me/promo823
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:04: Preview
0:01:27: Look ma, I'm on Wikipedia!
0:02:16: Steve Gibson reads FDSD
0:03:16: Show overview
0:04:29: What is Hacker Summer Camp?
0:06:21: Using Lockdown Mode on Apple
0:07:20: BSides Las Vegas 2023, Josh Corman, et al
0:08:28: BSides pool party
0:09:44: I skipped out on linecon
0:11:36: I skipped the merch line, too
0:12:36: Darknet Diaries meets FDSD
0:13:13: r00t party!
0:15:14: cDc announces Veilid platform
0:18:48: Voting Village, brush with Chris Krebs
0:20:34: Interview with Nick Oles
0:22:49: Meet Joe Gray ("Practical Social Engineering" author)
0:23:22: cDc Veilid launch party
0:24:19: Checking in the the Hack-a-Sat team
0:38:00: EFF Tech Trivia
0:38:37: Hacker Jeopardy
0:40:11: Evacuation of Caesar's Forum
0:41:50: Closing ceremonies
0:42:48: No swag or amulet sightings
0:43:31: Downfall: New Intel CPU Attack Exposing Sensitive Information
0:47:24: Mac malware can easily bypass Apple’s Background Task Manager
0:52:22: Maui wildfire relief fund
0:53:01: DARPA Launches AI Cyber Challenge
0:54:07: Looking ahead
0:55:28: Dragon coin promotion is ending soon
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.