goodlisten

Clip

The Cost of Exploits in the Cybersecurity Industry
listen on SpotifyListen on Youtube
07:54 - 11:10 (03:15)

Exploits and rooted devices can cost up to seven figures, but according to cybersecurity expert Matt Holland, it only takes about two hours and a budget to hack into a device.

Similar Clips
Secret communication channels on the internet can be disguised as completely benign sites.
10:28 - 14:17 (03:49)
listen on Spotify
Privacy
Summary

Secret communication channels on the internet can be disguised as completely benign sites. Brave's browser allows users to utilize advanced features while maintaining their privacy.

Chapter
Covert Communications and Mole Hunts
Episode
75: Compromised Comms
Podcast
Darknet Diaries
A traveler returning to the United States was subjected to a routine electronic device check by customs agents who accused him of having child pornography on his computer.
32:06 - 34:05 (01:59)
listen on Spotify
Customs, Travel, Privacy
Summary

A traveler returning to the United States was subjected to a routine electronic device check by customs agents who accused him of having child pornography on his computer. The agents proceeded to search his laptop using his passwords and found no incriminating evidence.

Chapter
Increased Collaboration to Combat Online Drug Trafficking
Episode
58: OxyMonster
Podcast
Darknet Diaries
The trifecta for digital privacy is encryption, VPN (Virtual Private Network), and a password manager.
30:42 - 32:29 (01:46)
listen on Spotify
Digital Privacy
Summary

The trifecta for digital privacy is encryption, VPN (Virtual Private Network), and a password manager. Signal should be used for instant messaging, rather than platforms that send things in clear text or only encrypt in transit, as they have to have a special setting turned on for things to be encrypted.

Chapter
Cybersecurity Tips for Everyday Users
Episode
#203: David Heinemeier Hansson on Digital Security, Company Culture, and the Value of Schooling
Podcast
The Tim Ferriss Show
The emerging theme of this podcast seems to be government complicity in allowing fraudulent schemes to be profitable despite the risks of prosecution.
21:59 - 23:22 (01:23)
listen on Spotify
Fraudulent Schemes
Summary

The emerging theme of this podcast seems to be government complicity in allowing fraudulent schemes to be profitable despite the risks of prosecution. The podcast acknowledges the buyer beware nature of capitalism and suggests that freedom of speech includes the freedom to be manipulated by advertising.

Chapter
The Inspiring Work of Langston Hughes and the Downfall of a Community Space
Episode
Episode 1: The Psychic Readers Network Part I – CLEO 2020
Podcast
Last Podcast On The Left
The constructs of democracy and balance of power were invented, as are systems for collecting data.
44:55 - 46:46 (01:50)
listen on Spotify
Decentralization
Summary

The constructs of democracy and balance of power were invented, as are systems for collecting data. With the potential for inventions that prevent centralized power, a decentralized world may be possible.

Chapter
Balancing Privacy and Freedom in a Free Society
Episode
#231 – Alex Gladstein: Bitcoin, Authoritarianism, and Human Rights
Podcast
Lex Fridman Podcast