goodlisten

Clip

The Illusion of Security in Smart Home Devices
listen on Spotify
38:41 - 40:32 (01:50)

The smart home industry is booming but do these devices truly provide security? With easy access points for hackers, it's important to think critically about the level of safety they offer.

Similar Clips
A description of a propaganda video targeting younger hackers to inspire them to build up a botnet through easy-to-recreate cyber attacks, disguised as an office building.
22:01 - 24:57 (02:55)
listen on Spotify
Cybersecurity
Summary

A description of a propaganda video targeting younger hackers to inspire them to build up a botnet through easy-to-recreate cyber attacks, disguised as an office building.

Chapter
The Motivations Behind Botnet Creation
Episode
70: Ghost Exodus
Podcast
Darknet Diaries
The process of laundering money involves replicating the exact process that the US Treasury follows in order to make the money look authentic and untraceable.
22:40 - 25:43 (03:02)
listen on Spotify
Money Laundering
Summary

The process of laundering money involves replicating the exact process that the US Treasury follows in order to make the money look authentic and untraceable. This requires a deep understanding of the process and attention to detail, as even a small mistake could raise suspicions.

Chapter
Counterfeit Money and the Art of Laundering
Episode
102: Money Maker
Podcast
Darknet Diaries
The podcast raises awareness on ways nation-state level actors will go to get people to leak private company information.
51:00 - 53:36 (02:36)
listen on Spotify
Information leaks
Summary

The podcast raises awareness on ways nation-state level actors will go to get people to leak private company information. The speaker questions if there are any effective strategies to keep the CIA from getting people to leak information.

Chapter
The Art of Espionage
Episode
116: Mad Dog
Podcast
Darknet Diaries
The "not your keys, not your crypto" argument suggests that people should not trust centralized exchanges because they hold the keys to a user's cryptocurrency wallet, leaving the user susceptible to hacks or theft.
1:05:25 - 1:08:03 (02:37)
listen on SpotifyListen on Youtube
Cryptocurrency
Summary

The "not your keys, not your crypto" argument suggests that people should not trust centralized exchanges because they hold the keys to a user's cryptocurrency wallet, leaving the user susceptible to hacks or theft. While this argument has some validity, it may not be practical for everyone and there needs to be an escape hatch or lifeboat in case of emergencies.

Chapter
Simplifying Crypto Transactions with Coinbase
Episode
#627: Brian Armstrong, CEO of Coinbase — The Art of Relentless Focus, Preparing for Full-Contact Entrepreneurship, Critical Forks in the Path, Handling Haters, The Wisdom of Paul Graham, Epigenetic Reprogramming, and Much More
Podcast
The Tim Ferriss Show
A former NSA employee discusses his involvement in producing the first software-based manual crypto system for the NSA, which was a combination of a paper pad and a floppy disk accompanied by a computer program for encryption and decryption.
52:11 - 56:53 (04:41)
listen on Spotify
Cybersecurity
Summary

A former NSA employee discusses his involvement in producing the first software-based manual crypto system for the NSA, which was a combination of a paper pad and a floppy disk accompanied by a computer program for encryption and decryption. This was the first instance of software-based cryptography produced by the NSA.

Chapter
A Look into NSA's First Foray into Software-Based Cryptography
Episode
83: NSA Cryptologists
Podcast
Darknet Diaries