

Firewalls Don't Stop Dragons Podcast
Carey Parker
A Podcast on Computer Security & Privacy for Non-Techies
Episodes
Mentioned books

Dec 4, 2023 • 1h 12min
Using Email Aliases
Your online account credentials have two parts: a user name and a password. Today, most online providers force you to use your email address for your user name. This gives the service provider a guaranteed way to contact (and spam) their users, but it also means that bad guys know half of all your credentials and data brokers have a unique ID to track you across all your accounts. Today I'll explain the value of using email aliases for your online user names.
In other news: Iranian hackers attack US water plant; CISA launches program to address critical infrastructure threats; Google Drive users report missing data; Plex users fear new feature will leak p0rn watching habits; several articles on the ease of using data broker tools to spy on just about anyone, creating privacy and national security problems; smart mattress company CEO inadvertently reveals extent of data collection; concerns about IoT device sold with a home; overblown fears over Apple's new NameDrop feature; Zelle offering refunds to some scam victims; and Malwarebyte's survey of people's security practices (spoiler: it's bad).
Article Links
[The Hacker News] Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S. https://thehackernews.com/2023/11/iranian-hackers-exploit-plcs-in-attack.html
[Dark Reading] CISA Launches Pilot Program to Address Critical Infrastructure Threats https://www.darkreading.com/ics-ot/cisa-launches-pilot-program-critical-infrastructure-threats
[AppleInsider] Google Drive users complain of missing files, months of data disappearing https://appleinsider.com/articles/23/11/27/google-drive-users-complain-of-missing-files-months-of-data-disappearing
[404media.co] Plex Users Fear New Feature Will Leak Porn Habits to Their Friends and Family https://www.404media.co/plex-users-fear-discover-together-week-in-review-feature-will-leak-porn-habits-to-their-friends-and-family/
[Rolling Stone] We Spied on Trump’s ‘Southern White House’ From Our Couches https://www.rollingstone.com/culture/culture-features/data-brokers-trump-tech-spying-privacy-threat-1234897098/
[9to5mac.com] Data brokers selling even more sensitive info; national security risk, says report https://9to5mac.com/2023/11/14/data-brokers-sensitive-info/
[MIT Technology Review] The US military’s privacy problem in three charts https://www.technologyreview.com/2023/11/13/1083262/the-us-militarys-privacy-problem-in-three-charts/
[therecord.media] Court rules automakers can record and intercept owner text messages https://therecord.media/class-action-lawsuit-cars-text-messages-privacy
[404media.co] CEO Reminds Everyone His Company Collects Customers' Sleep Data to Make Zeitgeisty Point About OpenAI Drama https://www.404media.co/ceo-reminds-everyone-eightsleep-pod-collects-sleep-data-to-make-zeitgeisty-point-about-openai-drama/
[sdmmag.com] Who Is Gonna “Own” the IoT? https://www.sdmmag.com/articles/93730-who-is-gonna-own-the-iot
[TechRadar] NameDrop in iOS 17 doesn’t have to be a privacy nightmare – here’s how to control it https://www.techradar.com/phones/ios/namedrop-in-ios-17-doesnt-have-to-be-a-privacy-nightmare-heres-how-to-control-it
[9to5mac.com] Zelle scams: App now starting limited refunds, under pressure from lawmakers https://9to5mac.com/2023/11/13/zelle-scams/
[malwarebytes.com] 3 crucial security steps people should do, but don't https://www.malwarebytes.com/blog/news/2023/10/the-3-crucial-security-steps-people-should-do-but-dont
OwnCloud hack: https://www.helpnetsecurity.com/2023/11/28/cve-2023-49103/
Pros & Cons of Antivirus Software: https://firewallsdontstopdragons.com/the-pros-and-cons-of-anti-virus-software/
Tip of the Week: https://firewallsdontstopdragons.com/how-to-use-email-aliases-part-1/
Further Info
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support

Nov 27, 2023 • 58min
Smart City Blues
City governments are relying more and more on a vast network of sensors to tell them what's going on: stop light cameras, gunshot detectors, air quality sensors, license plate readers, automated toll booths, and much more. While these technologies can help the powers that be allocate precious resources and gain helpful insights, they can also lead to over-policing, chilling of free speech and mass warrantless surveillance. Today I'll discuss the dangers of smart cities with Eleni Manis from the Surveillance Technology Oversight Project (STOP).
Interview Notes
Surveillance Technology Oversight Project: https://www.stopspying.org/
S.T.O.P.'s Beginner’s Guide to the All-Too-Dumb World of Smart Cities: www.justcities.tech
CCOPS laws: https://www.eff.org/issues/community-control-police-surveillance-ccops
Further Info
Best & Worst Gifts for 2023: https://firewallsdontstopdragons.com/best-worst-gifts-2023/
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:04:38: What got you into researching smart cities?
0:09:03: What are the positive aspects of smart cities?
0:13:06: How ubiquitous are these smart city technologies?
0:15:32: What are some of the most concerning smart city technologies?
0:16:45: is this data being shared between local and federal agencies?
0:19:14: Can students opt out of school surveillance?
0:20:48: How can the police access footage from video doorbells?
0:24:20: How is this tech used for predictive policing?
0:26:31: Do these predictive policing systems actually work?
0:27:29: How does this mass surveillance affect people?
0:28:58: What about use of surveillance tech in neighborhoods?
0:33:56: Who operates these sensor networks? Who can access the data?
0:37:49: Is it possible to anonymize this data properly?
0:42:06: Can government agencies access our cellular data?
0:45:22: Can you refuse to hand your cell phone over to authorities?
0:48:04: Can we find ways to collect this data without ruining privacy?
0:49:42: How do I find out what smart city tech is being used in my area?
0:53:29: Wrap-up
0:54:57: Preview of upcoming shows

Nov 20, 2023 • 1h 2min
Best & Worst Gifts for 2023
The holiday gift-giving season is upon us - and therefore it's time for my annual guide on the best and worst gifts for your loved ones, at least in terms of security and privacy. There are some perennial favs on the nice and naughty lists, but there are some newcomers, as well. And I've got some top tips for how to shop for privacy-respecting, security-protecting products! I've even got some ideas for free and helpful stocking stuffers.
In the news: FCC tried to protect consumers from SIM-swap attacks; cheap children's tablet came with malware and data mining software; medical transcription service has data of 9M patients exposed; hackers hold data from plastic surgeon patients for ransom, including nude photos; FTC filing in Kochava case unsealed showing 'staggering' amount of data for sale; Bitwarden announces support for passkeys; Article 45 of eIDAS 2.0 bill will completely undermine internet security in the EU.
Article Links
[The Hacker News] FCC Enforces Stronger Rules to Protect Customers Against SIM Swapping Attacks https://thehackernews.com/2023/11/fcc-enforces-stronger-rules-to-protect.html
[TechCrunch] Children’s tablet has malware and exposes kid’s data, researcher finds https://techcrunch.com/2023/11/16/childrens-tablet-has-malware-and-exposes-kids-data-researcher-finds/
[BleepingComputer] PJ&A says cyberattack exposed data of nearly 9 million patients https://www.bleepingcomputer.com/news/security/pj-and-a-says-cyberattack-exposed-data-of-nearly-9-million-patients/
[8newsnow.com] Hackers target Las Vegas plastic surgeons, post patient information, naked photos online https://www.8newsnow.com/investigators/hackers-target-las-vegas-plastic-surgeons-post-patient-information-naked-photos-online/
[Ars Technica] Data broker’s “staggering” sale of sensitive info exposed in unsealed FTC filing https://arstechnica.com/tech-policy/2023/11/data-brokers-staggering-sale-of-sensitive-info-exposed-in-unsealed-ftc-filing/
[bitwarden.com] Bitwarden launches passkey management https://bitwarden.com/blog/bitwarden-launches-passkey-management/
[Electronic Frontier Foundation] Article 45 Will Roll Back Web Security by 12 Years https://www.eff.org/deeplinks/2023/11/article-45-will-roll-back-web-security-12-years
Best & Worst Gifts for 2023: https://firewallsdontstopdragons.com/best-worst-gifts-2023/
Further Info
Give Thanks!: https://firewallsdontstopdragons.com/give-thanks-donate/
Consumer Reports Naughty List: https://foundation.mozilla.org/en/privacynotincluded/articles/our-longest-naughty-list-ever-the-2023-holiday-buyers-guide-is-here/
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:37: News run-down
0:03:18: FCC Enforces Stronger Rules to Protect Against SIM Swapping
0:06:39: Children’s tablet has malware and exposes kid’s data
0:11:22: Cyberattack exposed data of nearly 9 million patients
0:15:16: Hackers target plastic surgeons, post patient info, naked photos online
0:22:37: Data broker’s “staggering” sale of sensitive info exposed in unsealed FTC filing
0:27:10: Bitwarden launches passkey management
0:30:45: Article 45 Will Roll Back Web Security by 12 Years
0:39:00: Best & Worst Gifts for 2023
0:42:38: The Naughty List
0:47:50: The Nice List
0:59:14: Give thanks!
1:00:03: FDSD Merch sale!
1:00:25: Upcoming shows & promotion

Nov 13, 2023 • 1h 12min
Smartphone Spyware
Today there is a thriving market for legal, for-profit smartphone spyware (aka mercenary spyware). Companies like the NSO Group are free to create and sell highly sophisticated, zero-click malware such as Pegasus which has been used to spy on dissidents, politicians, activists and journalists around the world. There are also several apps available to parents to track their children, but are often used to abuse or stalk adult partners or ex-lovers. Today I'll discuss the state of these malicious apps, ways to protect our smartphones and even detect such spyware after the fact with the co-founders of iVerify, Danny Rogers and Rocky Cole.
Interview Notes
iVerify app: https://www.iverify.io/consumer
xkcd “Security” cartoon: https://xkcd.com/538/
Moxie Marlinspike (Signal) on Cellebrite tool: https://signal.org/blog/cellebrite-vulnerabilities/
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Would you like me to speak to your group about security and/or privacy? https://fdsd.me/speakerrequest
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:38: Interview setup
0:03:08: How does iVerify work and why did you create it?
0:07:10: What sort of people need protection like iVerify?
0:11:07: How do you know that you can trust a security app?
0:14:54: What do MDM profiles do to my phone? Is it reversible?
0:20:37: How dangerous are third-party app stores, compared to Apple/Google?
0:27:37: If an app I've installed is pulled from the app store, will I be notified?
0:28:50: How hard is it today to jailbreak a phone?
0:31:49: How do you tell if a phone has been hacked?
0:33:21: Can you detect if an app has escaped its sandbox?
0:38:09: What is the marketplace like for spyware?
0:41:36: Are phones getting harder to hack?
0:44:16: Is it possible to detect or prevent hacking via physical access?
0:49:11: How do Apple and Google phones compare on security?
0:52:08: How does Apple's Lockdown Mode work?
0:54:47: Should governments outlaw the sale of mercenary spyware?
1:01:10: Should governments hoard 0-days or disclose them?
1:03:31: What are your top security tips for regular users?
1:05:44: What's next for iVerify?
1:07:28: Wrap-up

Nov 6, 2023 • 1h 4min
The Rise of Cellular IoT
The podcast discusses the risks and privacy concerns of connecting devices to the internet. It highlights recent security breaches and privacy issues with services like 1Password and genetic testing companies. The chapter also explores cybercriminal tactics, ad-blocking wars on YouTube, and the importance of contact key verification in iMessage. The podcast concludes with a discussion on the privacy concerns of cellular modems in IoT devices and the lack of control users have over their data.

Oct 30, 2023 • 1h 10min
Reclaiming the Internet
What happened to the internet? It had so much promise. Social media and search results are full of stuff we never wanted to see. Surveillance capitalism is monetizing our most private information to serve us so many ads that we can never seem to consume the actual content. And if we're all so unhappy with the incumbents, where are the competitors offering better service? Cory Doctorow helps us understand how the internet got so crappy and what we can do to fix it.
Cory Doctorow is a science fiction author, activist, journalist and blogger at the site Pluralistic. He has written a bunch of great books, both fiction and non, including Little Brother, Red Team Blues and Chokepoint Capitalism.
Interview Notes
TikTok’s Ensh*tification: https://pluralistic.net/2023/01/21/potemkin-ai/#hey-guys
Cory’s blog: https://pluralistic.net/
Cory at DEF CON 31: https://www.youtube.com/watch?v=rimtaSgGz_4
The Internet Con: https://craphound.com/category/internetcon/
Chokepoint Capitalism: https://chokepointcapitalism.com/
Red Team Blues: https://craphound.com/category/novels/redteamblues/
Saving the News from Big Tech: https://www.eff.org/deeplinks/2023/04/saving-news-big-tech
Tracking Exposed: https://tracking.exposed/
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Would you like me to speak to your group about security and/or privacy? https://fdsd.me/speakerrequest
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:55: Defining some terms
0:03:57: Swear warning
0:04:25: What have you been up to since we last had you on the show?
0:07:58: What is ensh*tification? How does it work?
0:18:26: Have any companies actually completed the ensh*tification cycle?
0:22:36: Do we have concrete examples of interoperability breaking this cycle?
0:29:07: What percentage of oday are not what we asked for?
0:37:04: What happens to DRM'd content when the licencing company goes away?
0:39:19: How can we reverse engineer these algorithms?
0:41:04: How is social media promotion like a big carnival teddy bear?
0:44:28: Whatever happened to the Amazon Smile program?
0:45:58: What do you mean by the End-to-End Principle?
0:51:53: Isn't ensh*tification just a natural result of modern capitalism?
0:54:02: Doesn't capitalism require rules (aka regulations)?
0:57:18: So what are the solutions? How do we fix the internet?
1:02:46: Did we undermine antitrust by lowering the bar of consumer harm?
1:04:25: What can we do to help, as consumers and citizens?
1:07:06: Wrap-up
1:07:50: Looking ahead

Oct 23, 2023 • 57min
It’s Time to Try Proton
Email is old and was never built for security and privacy. Thankfully there are several modern secure email services. My personal favorite is Proton Mail and I'll explain to you today why you should really give it a try. I will also (finally) answer several interesting "Dear Carey" questions from listeners.
In other news: If you use WinRAR, you need to update right away; hackers are targeting a company that brokers Emergency Data Requests between law enforcement and Big Tech companies; Google is forced to reveal user search history in a CO court case; Google is making passkeys the default, but you may want to wait; EFF asks MasterCard to stop selling our data; and Bruce Schneier has an insightful article around the rather heated discussions over the benefits and dangers of artificial intelligence.
Article Links
[Gizmodo] You Need to Update WinRAR, Right Now https://gizmodo.com/you-need-to-update-winrar-right-now-1850939201
[404media.co] Hackers Target Company That Vets Police Data Requests for Tech Giants https://www.404media.co/hackers-target-kodex-accounts-edrs/
[TechSpot] Google forced to reveal user search history in Colorado court ruling https://www.techspot.com/news/100529-google-forced-reveal-users-search-queries-colorado-court.html
[blog.google] Passwordless by default: Make the switch to passkeys https://blog.google/technology/safety-security/passkeys-default-google-accounts/
[Electronic Frontier Foundation] Mastercard Should Stop Selling Our Data https://www.eff.org/deeplinks/2023/10/mastercard-should-stop-selling-our-data
[Schneier Blog] AI Risks https://www.schneier.com/blog/archives/2023/10/ai-risks.html
Tip of the Week: Try Proton https://firewallsdontstopdragons.com/its-time-to-try-proton/
Further Info
De-Googling Your Life: https://firewallsdontstopdragons.com/reducing-my-google-footprint/
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Generate secure passphrases! https://d20key.com/#/
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:12: News rundown
0:02:38: You Need to Update WinRAR, Right Now
0:05:10: Hackers Target Company That Vets Police Data Requests for Tech Giants
0:11:22: Google forced to reveal user search history in Colorado court ruling
0:15:59: Google: Passwordless by default
0:21:48: EFF: Mastercard Should Stop Selling Our Data
0:25:59: Bruce Schneier: AI Risks
0:33:12: Mailbag!!
0:42:28: Tip of the Week: Try Proton
0:54:25: Wrap up, look ahead

Oct 16, 2023 • 1h 1min
What’s Your Threat Model?
There are several privacy-focused services available today. And the products we use have a dizzying array of privacy and security settings. How do you know which products you need and which vendors you can trust? How do you know which protections you need and which ones you don't? It comes down to understanding your personal threat model. We each have different things to protect and different consequences for failure. Today I'll speak with Andy Yen, CEO and founder of Proton, to help us figure out what we need.
Interview Notes
Proton Sentinel: https://proton.me/blog/sentinel-high-security-program
Privacy Decrypted #1: https://proton.me/blog/what-is-a-threat-model?ref=instantsearch
Private from Everyone (But Us): https://podcast.firewallsdontstopdragons.com/2022/04/25/private-from-everyone-but-us/
Security Planner (threat model tool): https://innovation.consumerreports.org/initiatives/security-planner/
Ars Technica threat model series: https://arstechnica.com/features/2021/10/securing-your-digital-life-part-1/
Further Info
Get your Firewalls Don’t Stop Dragons Merch! https://fdsd.me/merch
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:01:03: Show preview0:01:44: Delete Act passes0:02:36: What new at Proton since we last spoke?0:07:00: How do you determine your personal threat model?0:09:21: How does Proton decide which threat models to address?0:13:40: How do you learn about all the possible security settings?0:15:37: How do you know which companies and products you can trust?0:18:11: How should VC money and buyouts affect our trust?0:22:30: What should tech reviewers be focusing on with privacy products?0:26:24: How important is a company's location for privacy?0:28:47: Are technological solutions sufficient to protect our data?0:30:22: Has Proton received any pressure from governments to weaken privacy?0:33:27: Does Proton actively market to government officials?0:34:43: How can larger companies protect against insider threats?0:37:05: What's your take on the LastPass breach?0:41:32: What is Proton Sentinel and who is it for?0:46:09: Will Sentinel be able to scale?0:47:31: Proton asks Sentinel users for personal information - is that safe?0:51:04: Can you share any specific Sentinel success stories?0:53:39: What other features would you like to add to Proton?0:58:30: Wrap-up1:00:11: Look ahead

Oct 9, 2023 • 1h 7min
Cybersecurity Awareness Month
Guest Nick Oles discusses recognizing and reporting phishing during national Cybersecurity Awareness Month. Other topics include malware-infected Android TV boxes, a data breach at 23andMe, illegal use of smartphone location data by US agencies, Meta's ad-free plans for Facebook and Instagram, FBI warnings about phantom hacker scams, Microsoft's AI tool that clones voices, the importance of upgrading to Windows 10, FCC's net neutrality plans, turning off Google's tracking system, and a new app from Consumer Reports for deleting personal data.

Oct 2, 2023 • 1h 10min
Catching Phish
The weakest link in most cybersecurity systems is you - that is, human beings. And one of the primary ways that people are tricked into infecting their devices (and potentially then threatening other devices on the network) is through phishing. We've all seen the Nigerian Prince scams, but with AI tools like ChatGPT, scam emails are going to get a lot harder to spot. On today's show, author and cybersecurity expert Nick Oles will teach us how to recognize phishing emails, introduce us to tools for detecting and protecting against phishing, and detail other techniques for defending against these sorts of attacks. All of this is just a taste of the top notch advice contained in his new book, "How to Catch a Phish".
Interview Notes
How to Catch a Phish: https://www.amazon.com/How-Catch-Phish-Practical-Detecting/dp/1484293606
Win a free copy!! https://fdsd.me/catchaphish
Nick Oles on LinkedIn: https://www.linkedin.com/in/nick-o-8b5b6349/
National Cybersecurity Awareness Month: https://www.cisa.gov/cybersecurity-awareness-month
Virustotal URL scanner: https://www.virustotal.com/gui/home/url
URLscan.io: https://urlscan.io/
SANS PICERL Incident Response model (PDF): https://www.sans.org/media/score/504-incident-response-cycle.pdf
Malwarebytes personal: https://www.malwarebytes.com/getprotection
Further Info
Nominate someone for a challenge coin: https://fdsd.me/quest
Give the gift of privacy and security: https://fdsd.me/coupons
Send me your questions! https://fdsd.me/qna
Support our mission! https://fdsd.me/support
Subscribe to the newsletter: https://fdsd.me/newsletter
Check out my book, Firewalls Don’t Stop Dragons: https://fdsd.me/book
Table of Contents
Use these timestamps to jump to a particular section of the show.
0:00:45: Patron book club update0:02:11: Nat'l Cybersecurity Awareness Month0:02:48: What drove you to write the book?0:06:57: What really happens behind the scenes when I send an email?0:13:37: What are email headers and why would I want to look at them?0:17:13: How are email senders spoofed and can we prevent this?0:23:35: Do email clients have indicators for vetted senders?0:25:40: What is phishing and how can we recognize it?0:32:06: How has phishing evolved over the years?0:37:01: What are spearphishing and business email compromise?0:40:24: Do spam filters help at all with phishing emails?0:42:50: How do I know if I can trust any link or URL in an email?0:48:34: Are web email clients safer than dedicated email apps?0:51:35: How can we know which email attachments are safe to open?0:54:48: If I accidentally click a bad link or attachment, what then?0:59:11: How will AI impact phishing campaigns?1:01:13: Are things getting better or getting worse?1:04:08: Interview wrap-up1:07:44: Book giveaway details