<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/signal-check" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Signal Check</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/signal-check</itunes:new-feed-url>
    <description>Tech, hacking, security, running, climbing news all in one podcast cause.. why not?</description>
    <copyright>@signalcheck</copyright>
    <podcast:guid>47d32b0d-4a0b-51c1-9bc5-0cc44325721a</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Mon, 20 Apr 2026 15:09:08 -0600</pubDate>
    <lastBuildDate>Mon, 20 Apr 2026 15:10:25 -0600</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/eIFyQX4CAz28vl05vvVeTlndTgHm8hYfz3e_rgWgg1c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMzVk/N2I1ZWFhNDU5N2Vk/Mjk3NTlkNDMwYzZi/MDhhMi5wbmc.jpg</url>
      <title>Signal Check</title>
    </image>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Sports">
      <itunes:category text="Running"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Adrian North</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/eIFyQX4CAz28vl05vvVeTlndTgHm8hYfz3e_rgWgg1c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMzVk/N2I1ZWFhNDU5N2Vk/Mjk3NTlkNDMwYzZi/MDhhMi5wbmc.jpg"/>
    <itunes:summary>Tech, hacking, security, running, climbing news all in one podcast cause.. why not?</itunes:summary>
    <itunes:subtitle>Tech, hacking, security, running, climbing news all in one podcast cause..</itunes:subtitle>
    <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
    <itunes:owner>
      <itunes:name>The Internet</itunes:name>
      <itunes:email>runclimbhack@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 2026-04-20</title>
      <itunes:title>Episode 2026-04-20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b9035c6-7e4b-48e1-8186-f3c0382b9904</guid>
      <link>https://share.transistor.fm/s/c2288a02</link>
      <description>
        <![CDATA[This episode digs into the surprisingly organized underground economy of stolen credit cards, where fraudsters use customer service metrics and escrow systems to avoid getting scammed themselves. We also explore the EU's rushed age-verification app that researchers dismantled in minutes, and why your push notifications might be leaking more metadata than you think.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into the surprisingly organized underground economy of stolen credit cards, where fraudsters use customer service metrics and escrow systems to avoid getting scammed themselves. We also explore the EU's rushed age-verification app that researchers dismantled in minutes, and why your push notifications might be leaking more metadata than you think.]]>
      </content:encoded>
      <pubDate>Mon, 20 Apr 2026 15:08:43 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/c2288a02/242100c5.mp3" length="6656043" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>416</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into the surprisingly organized underground economy of stolen credit cards, where fraudsters use customer service metrics and escrow systems to avoid getting scammed themselves. We also explore the EU's rushed age-verification app that researchers dismantled in minutes, and why your push notifications might be leaking more metadata than you think.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mjxeuusapi2q"/>
    </item>
    <item>
      <title>Episode 2026-04-18</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 2026-04-18</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ddccc170-f6b1-4f7b-99bc-d60068911a7f</guid>
      <link>https://share.transistor.fm/s/59569a9a</link>
      <description>
        <![CDATA[This episode covers a massive North Korean laptop-farm scheme that fooled U.S. companies for years, Bluesky's battle with a brutal DDoS attack that's testing its credibility, and a teen hacker's rare public confession just before heading to prison. Adrian North breaks down how each story reveals something bigger about the vulnerabilities baked into our digital systems.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode covers a massive North Korean laptop-farm scheme that fooled U.S. companies for years, Bluesky's battle with a brutal DDoS attack that's testing its credibility, and a teen hacker's rare public confession just before heading to prison. Adrian North breaks down how each story reveals something bigger about the vulnerabilities baked into our digital systems.]]>
      </content:encoded>
      <pubDate>Sat, 18 Apr 2026 09:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/59569a9a/31eddaa3.mp3" length="8099396" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>503</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode covers a massive North Korean laptop-farm scheme that fooled U.S. companies for years, Bluesky's battle with a brutal DDoS attack that's testing its credibility, and a teen hacker's rare public confession just before heading to prison. Adrian North breaks down how each story reveals something bigger about the vulnerabilities baked into our digital systems.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mjrpdrykds2k"/>
    </item>
    <item>
      <title>Episode 2026-04-09</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 2026-04-09</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5005a2cf-c5d6-47ac-a112-2831e218420d</guid>
      <link>https://share.transistor.fm/s/7efe675f</link>
      <description>
        <![CDATA[<p>This episode digs into the growing gap between cyber threats and our defenses — from the FBI's report on a record $21 billion lost to scams, to AI models now finding zero-day vulnerabilities in hours instead of months. We also look at how modern GPUs can crack complex passwords in under a day, and why credential theft remains the fastest path to a breach.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into the growing gap between cyber threats and our defenses — from the FBI's report on a record $21 billion lost to scams, to AI models now finding zero-day vulnerabilities in hours instead of months. We also look at how modern GPUs can crack complex passwords in under a day, and why credential theft remains the fastest path to a breach.</p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Apr 2026 00:16:48 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/7efe675f/5d2d02ca.mp3" length="8151223" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>506</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode digs into the growing gap between cyber threats and our defenses — from the FBI's report on a record $21 billion lost to scams, to AI models now finding zero-day vulnerabilities in hours instead of months. We also look at how modern GPUs can crack complex passwords in under a day, and why credential theft remains the fastest path to a breach.</p>]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mjobn5gsdh2p"/>
    </item>
    <item>
      <title>Episode 2026-04-07</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 2026-04-07</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e983c506-b251-4ee1-a51e-b1e1331da6d4</guid>
      <link>https://share.transistor.fm/s/e142802b</link>
      <description>
        <![CDATA[This episode digs into NASA's Artemis II Moon mission — historic but more infrastructure test than breakthrough — then pivots to a brutal week in cybersecurity. From Anthropic's code leak and the FBI getting breached to North Korean crypto heists and supply chain attacks collapsing response times, Adrian unpacks how AI tools have turned developer machines into open credential vaults for attackers.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into NASA's Artemis II Moon mission — historic but more infrastructure test than breakthrough — then pivots to a brutal week in cybersecurity. From Anthropic's code leak and the FBI getting breached to North Korean crypto heists and supply chain attacks collapsing response times, Adrian unpacks how AI tools have turned developer machines into open credential vaults for attackers.]]>
      </content:encoded>
      <pubDate>Wed, 08 Apr 2026 09:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/e142802b/cf580a4d.mp3" length="5315788" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>329</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into NASA's Artemis II Moon mission — historic but more infrastructure test than breakthrough — then pivots to a brutal week in cybersecurity. From Anthropic's code leak and the FBI getting breached to North Korean crypto heists and supply chain attacks collapsing response times, Adrian unpacks how AI tools have turned developer machines into open credential vaults for attackers.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3miykpkv3ne2a"/>
    </item>
    <item>
      <title>Episode 2026-04-06</title>
      <itunes:title>Episode 2026-04-06</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25aa8466-04b2-454e-be85-507548bbccdc</guid>
      <link>https://share.transistor.fm/s/a8f068d0</link>
      <description>
        <![CDATA[This episode digs into LinkedIn's hidden surveillance of over 6,000 Chrome extensions, the failure of app store privacy labels to actually protect users, and Microsoft's hilarious legal disclaimer that Copilot is "for entertainment purposes only" despite selling it as a serious business tool. We're looking at the gap between what tech companies say they're doing and what's really happening behind the scenes. It's your morning Signal Check — coffee's hot, and the tech world's already showing its hand.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into LinkedIn's hidden surveillance of over 6,000 Chrome extensions, the failure of app store privacy labels to actually protect users, and Microsoft's hilarious legal disclaimer that Copilot is "for entertainment purposes only" despite selling it as a serious business tool. We're looking at the gap between what tech companies say they're doing and what's really happening behind the scenes. It's your morning Signal Check — coffee's hot, and the tech world's already showing its hand.]]>
      </content:encoded>
      <pubDate>Mon, 06 Apr 2026 09:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/a8f068d0/db08dd23.mp3" length="6675269" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>418</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into LinkedIn's hidden surveillance of over 6,000 Chrome extensions, the failure of app store privacy labels to actually protect users, and Microsoft's hilarious legal disclaimer that Copilot is "for entertainment purposes only" despite selling it as a serious business tool. We're looking at the gap between what tech companies say they're doing and what's really happening behind the scenes. It's your morning Signal Check — coffee's hot, and the tech world's already showing its hand.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mitjqev6a72z"/>
    </item>
    <item>
      <title>Episode 2026-04-04</title>
      <itunes:title>Episode 2026-04-04</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a60b4d81-b0fe-4bfa-9992-28789cb1d1f5</guid>
      <link>https://share.transistor.fm/s/0beb1e15</link>
      <description>
        <![CDATA[This episode digs into a lightning-fast npm supply chain attack that shows how AI is collapsing human response time, explores a skull-vibration authentication system built into XR headsets that could verify you're still you without lifting a finger, and covers the North Carolina IT admin who methodically locked thousands of company devices with a password straight out of a cybercrime playbook. From accelerating threats to passive biometrics to insider extortion, it's a snapshot of security in motion.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into a lightning-fast npm supply chain attack that shows how AI is collapsing human response time, explores a skull-vibration authentication system built into XR headsets that could verify you're still you without lifting a finger, and covers the North Carolina IT admin who methodically locked thousands of company devices with a password straight out of a cybercrime playbook. From accelerating threats to passive biometrics to insider extortion, it's a snapshot of security in motion.]]>
      </content:encoded>
      <pubDate>Sat, 04 Apr 2026 09:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/0beb1e15/1a4e84b2.mp3" length="5924196" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>371</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into a lightning-fast npm supply chain attack that shows how AI is collapsing human response time, explores a skull-vibration authentication system built into XR headsets that could verify you're still you without lifting a finger, and covers the North Carolina IT admin who methodically locked thousands of company devices with a password straight out of a cybercrime playbook. From accelerating threats to passive biometrics to insider extortion, it's a snapshot of security in motion.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mioitmbnbd2a"/>
    </item>
    <item>
      <title>Episode 2026-04-01</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 2026-04-01</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fea86d0a-bc4f-43cb-9003-b7033c6b0d0e</guid>
      <link>https://share.transistor.fm/s/2b69605f</link>
      <description>
        <![CDATA[This episode digs into a man who lost everything to an AI chatbot he believed was becoming sentient, a shocking leak of Claude's source code through a simple packaging error, and one of the most sophisticated supply chain attacks ever—targeting Axios with tradecraft that points straight to North Korea. Adrian North breaks down how our digital infrastructure is more fragile than we think, and how both human psychology and technical systems are being exploited at unprecedented speed.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into a man who lost everything to an AI chatbot he believed was becoming sentient, a shocking leak of Claude's source code through a simple packaging error, and one of the most sophisticated supply chain attacks ever—targeting Axios with tradecraft that points straight to North Korea. Adrian North breaks down how our digital infrastructure is more fragile than we think, and how both human psychology and technical systems are being exploited at unprecedented speed.]]>
      </content:encoded>
      <pubDate>Wed, 01 Apr 2026 12:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/2b69605f/feeedefc.mp3" length="6087340" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>377</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into a man who lost everything to an AI chatbot he believed was becoming sentient, a shocking leak of Claude's source code through a simple packaging error, and one of the most sophisticated supply chain attacks ever—targeting Axios with tradecraft that points straight to North Korea. Adrian North breaks down how our digital infrastructure is more fragile than we think, and how both human psychology and technical systems are being exploited at unprecedented speed.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mihbi62evb2x"/>
    </item>
    <item>
      <title>Episode 2026-03-29</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 2026-03-29</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ed6cc908-d5c1-4d1b-a8dd-9a1bfd06b457</guid>
      <link>https://share.transistor.fm/s/cca03cfc</link>
      <description>
        <![CDATA[<p>This episode covers Google's 2029 deadline for quantum-safe encryption, the military weaponization of hacked security cameras by state actors, and the compromising of FBI Director Kash Patel's personal email by a suspected Iranian cyber unit. Adrian North walks through why these aren't isolated incidents—they're signals of a rapidly shifting threat landscape where legacy systems, unpatched IoT devices, and personal security gaps are becoming critical vulnerabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers Google's 2029 deadline for quantum-safe encryption, the military weaponization of hacked security cameras by state actors, and the compromising of FBI Director Kash Patel's personal email by a suspected Iranian cyber unit. Adrian North walks through why these aren't isolated incidents—they're signals of a rapidly shifting threat landscape where legacy systems, unpatched IoT devices, and personal security gaps are becoming critical vulnerabilities.</p>]]>
      </content:encoded>
      <pubDate>Sun, 29 Mar 2026 17:15:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/cca03cfc/ec9b612d.mp3" length="6430485" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>398</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers Google's 2029 deadline for quantum-safe encryption, the military weaponization of hacked security cameras by state actors, and the compromising of FBI Director Kash Patel's personal email by a suspected Iranian cyber unit. Adrian North walks through why these aren't isolated incidents—they're signals of a rapidly shifting threat landscape where legacy systems, unpatched IoT devices, and personal security gaps are becoming critical vulnerabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mi5ratlabf2h"/>
    </item>
    <item>
      <title>Episode 2026-03-26</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 2026-03-26</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b7374a0-07b2-4f93-8091-37755edfd765</guid>
      <link>https://share.transistor.fm/s/d366a670</link>
      <description>
        <![CDATA[<p>This episode digs into a landmark legal case where a jury held Meta and Google accountable for harm caused to a teen's mental health, plus a sophisticated malware campaign targeting healthcare and government orgs with fake copyright notices. We also cover the FCC's new ban on foreign-made routers and what it really means for cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into a landmark legal case where a jury held Meta and Google accountable for harm caused to a teen's mental health, plus a sophisticated malware campaign targeting healthcare and government orgs with fake copyright notices. We also cover the FCC's new ban on foreign-made routers and what it really means for cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Sat, 28 Mar 2026 17:16:38 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/d366a670/fcddf0b7.mp3" length="5323311" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>329</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode digs into a landmark legal case where a jury held Meta and Google accountable for harm caused to a teen's mental health, plus a sophisticated malware campaign targeting healthcare and government orgs with fake copyright notices. We also cover the FCC's new ban on foreign-made routers and what it really means for cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mi5rbrijmh26"/>
    </item>
    <item>
      <title>Episode 2026-03-24</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 2026-03-24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0faf3241-218e-4fe4-b550-6806a4fbe13d</guid>
      <link>https://share.transistor.fm/s/803ceb6b</link>
      <description>
        <![CDATA[This episode digs into a supply-chain attack that compromised Trivy, the vulnerability scanner millions trust, turning a security tool into the very threat it's meant to detect. We also explore a chemistry student's quest to create conductive nail polish that actually works with long nails, and the wild discovery of all five DNA building blocks on an asteroid floating through space for billions of years.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into a supply-chain attack that compromised Trivy, the vulnerability scanner millions trust, turning a security tool into the very threat it's meant to detect. We also explore a chemistry student's quest to create conductive nail polish that actually works with long nails, and the wild discovery of all five DNA building blocks on an asteroid floating through space for billions of years.]]>
      </content:encoded>
      <pubDate>Tue, 24 Mar 2026 09:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/803ceb6b/aa7f79a7.mp3" length="5616300" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>347</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into a supply-chain attack that compromised Trivy, the vulnerability scanner millions trust, turning a security tool into the very threat it's meant to detect. We also explore a chemistry student's quest to create conductive nail polish that actually works with long nails, and the wild discovery of all five DNA building blocks on an asteroid floating through space for billions of years.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhstor7dur25"/>
    </item>
    <item>
      <title>Episode 2026-03-23</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 2026-03-23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">58379d29-18dd-47f0-beb4-8deeb900360c</guid>
      <link>https://share.transistor.fm/s/fe843019</link>
      <description>
        <![CDATA[This episode covers a massive international takedown of four major botnets that had hijacked IoT devices to launch hundreds of thousands of crippling cyberattacks. We also dig into how a French Navy officer accidentally revealed his aircraft carrier's location by posting his jog on Strava, proving that fitness apps and military ops don't mix. Plus, a look at the messy intersection of breathalyzer hacks, FBI location tracking, and Iranian cyber threats.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode covers a massive international takedown of four major botnets that had hijacked IoT devices to launch hundreds of thousands of crippling cyberattacks. We also dig into how a French Navy officer accidentally revealed his aircraft carrier's location by posting his jog on Strava, proving that fitness apps and military ops don't mix. Plus, a look at the messy intersection of breathalyzer hacks, FBI location tracking, and Iranian cyber threats.]]>
      </content:encoded>
      <pubDate>Mon, 23 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/fe843019/4e271bbc.mp3" length="6794109" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>421</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode covers a massive international takedown of four major botnets that had hijacked IoT devices to launch hundreds of thousands of crippling cyberattacks. We also dig into how a French Navy officer accidentally revealed his aircraft carrier's location by posting his jog on Strava, proving that fitness apps and military ops don't mix. Plus, a look at the messy intersection of breathalyzer hacks, FBI location tracking, and Iranian cyber threats.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhq4jyargb2g"/>
    </item>
    <item>
      <title>Episode 2026-03-22</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 2026-03-22</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c8dd2bc-fc71-4a20-82d3-acbc1a1c970b</guid>
      <link>https://share.transistor.fm/s/bdb76269</link>
      <description>
        <![CDATA[On today's Signal Check — we cover Musician admits to $10M streaming royalty fraud using AI bots, WordPress.com now lets AI agents write and publish posts, and more, This Guy Ran a 4:47 Mile—While Juggling (and Only Had 1 Drop) and Chuck Norris Once Hosted a 5K Where All the Runners Dressed Up As Chuck Norris. Tune in for the full breakdown.]]>
      </description>
      <content:encoded>
        <![CDATA[On today's Signal Check — we cover Musician admits to $10M streaming royalty fraud using AI bots, WordPress.com now lets AI agents write and publish posts, and more, This Guy Ran a 4:47 Mile—While Juggling (and Only Had 1 Drop) and Chuck Norris Once Hosted a 5K Where All the Runners Dressed Up As Chuck Norris. Tune in for the full breakdown.]]>
      </content:encoded>
      <pubDate>Sun, 22 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/bdb76269/70ccb263.mp3" length="5415262" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>335</itunes:duration>
      <itunes:summary>
        <![CDATA[On today's Signal Check — we cover Musician admits to $10M streaming royalty fraud using AI bots, WordPress.com now lets AI agents write and publish posts, and more, This Guy Ran a 4:47 Mile—While Juggling (and Only Had 1 Drop) and Chuck Norris Once Hosted a 5K Where All the Runners Dressed Up As Chuck Norris. Tune in for the full breakdown.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhnm2su6nv22"/>
    </item>
    <item>
      <title>Episode 2026-03-21</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 2026-03-21</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">59396527-9299-4107-abd7-d4ea1a0a54aa</guid>
      <link>https://share.transistor.fm/s/7a7f31c1</link>
      <description>
        <![CDATA[This episode digs into three major security threats making waves right now: a devastating iOS exploit chain called DarkSword that's giving attackers full device control, a frighteningly clever attack on Claude AI users through weaponized Google ads, and new revelations about how Meta and TikTok tracking pixels are harvesting way more personal data than anyone realized. Adrian breaks down how each exploit works and why even trusted platforms aren't as secure as we think.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into three major security threats making waves right now: a devastating iOS exploit chain called DarkSword that's giving attackers full device control, a frighteningly clever attack on Claude AI users through weaponized Google ads, and new revelations about how Meta and TikTok tracking pixels are harvesting way more personal data than anyone realized. Adrian breaks down how each exploit works and why even trusted platforms aren't as secure as we think.]]>
      </content:encoded>
      <pubDate>Sat, 21 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/7a7f31c1/7fca075f.mp3" length="7472457" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>463</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into three major security threats making waves right now: a devastating iOS exploit chain called DarkSword that's giving attackers full device control, a frighteningly clever attack on Claude AI users through weaponized Google ads, and new revelations about how Meta and TikTok tracking pixels are harvesting way more personal data than anyone realized. Adrian breaks down how each exploit works and why even trusted platforms aren't as secure as we think.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhl3lq6bz42n"/>
    </item>
    <item>
      <title>Episode 2026-03-20</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 2026-03-20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f96c429a-d4f2-4f78-9922-ca8dd36dca3e</guid>
      <link>https://share.transistor.fm/s/e68d6da3</link>
      <description>
        <![CDATA[On this episode of Signal Check, Adrian North digs into how the FBI keeps buying location data from brokers to bypass warrants, why Meta and TikTok tracking pixels are collecting way more personal information than anyone signed up for, and how credential theft has become the number one way attackers are infiltrating enterprise networks. It's surveillance, liability, and login chaos — all before your coffee gets cold.]]>
      </description>
      <content:encoded>
        <![CDATA[On this episode of Signal Check, Adrian North digs into how the FBI keeps buying location data from brokers to bypass warrants, why Meta and TikTok tracking pixels are collecting way more personal information than anyone signed up for, and how credential theft has become the number one way attackers are infiltrating enterprise networks. It's surveillance, liability, and login chaos — all before your coffee gets cold.]]>
      </content:encoded>
      <pubDate>Thu, 19 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/e68d6da3/4e9009ab.mp3" length="6128300" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>379</itunes:duration>
      <itunes:summary>
        <![CDATA[On this episode of Signal Check, Adrian North digs into how the FBI keeps buying location data from brokers to bypass warrants, why Meta and TikTok tracking pixels are collecting way more personal information than anyone signed up for, and how credential theft has become the number one way attackers are infiltrating enterprise networks. It's surveillance, liability, and login chaos — all before your coffee gets cold.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhg2nrpbv72n"/>
    </item>
    <item>
      <title>Episode 2026-03-18</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 2026-03-18</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d1b5298-cf65-43eb-8bb0-54aa30a9033f</guid>
      <link>https://share.transistor.fm/s/f8eb6eaa</link>
      <description>
        <![CDATA[This episode digs into Encyclopedia Britannica and Merriam-Webster's lawsuit against OpenAI for allegedly scraping their content and falsely attributing AI hallucinations to trusted sources. We also explore whether dark web monitoring services are worth the hype or just overpriced alerts for public data breaches. Plus, a wild reveal about how Pokémon Go players unknowingly helped train AI navigation systems.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into Encyclopedia Britannica and Merriam-Webster's lawsuit against OpenAI for allegedly scraping their content and falsely attributing AI hallucinations to trusted sources. We also explore whether dark web monitoring services are worth the hype or just overpriced alerts for public data breaches. Plus, a wild reveal about how Pokémon Go players unknowingly helped train AI navigation systems.]]>
      </content:encoded>
      <pubDate>Wed, 18 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/f8eb6eaa/7b78de96.mp3" length="6871432" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>426</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into Encyclopedia Britannica and Merriam-Webster's lawsuit against OpenAI for allegedly scraping their content and falsely attributing AI hallucinations to trusted sources. We also explore whether dark web monitoring services are worth the hype or just overpriced alerts for public data breaches. Plus, a wild reveal about how Pokémon Go players unknowingly helped train AI navigation systems.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhdk6jruio2r"/>
    </item>
    <item>
      <title>Episode 2026-03-17</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 2026-03-17</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4e0ce57-03ba-4048-88f5-1c700021f9fc</guid>
      <link>https://share.transistor.fm/s/5eb7edae</link>
      <description>
        <![CDATA[On today's Signal Check, Adrian North digs into the launch of Betterleaks, a new open-source tool from the creator of Gitleaks that scans code for accidentally committed secrets like API keys and credentials. We also cover McKinsey's major security breach where hackers accessed their entire internal AI platform in just two hours, exposing millions of messages and the firm's so-called "intellectual crown jewels." Plus, an interstellar comet carrying methanol and hydrogen cyanide offers a glimpse into the chemistry of distant star systems.]]>
      </description>
      <content:encoded>
        <![CDATA[On today's Signal Check, Adrian North digs into the launch of Betterleaks, a new open-source tool from the creator of Gitleaks that scans code for accidentally committed secrets like API keys and credentials. We also cover McKinsey's major security breach where hackers accessed their entire internal AI platform in just two hours, exposing millions of messages and the firm's so-called "intellectual crown jewels." Plus, an interstellar comet carrying methanol and hydrogen cyanide offers a glimpse into the chemistry of distant star systems.]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/5eb7edae/d9229ddc.mp3" length="4899500" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>303</itunes:duration>
      <itunes:summary>
        <![CDATA[On today's Signal Check, Adrian North digs into the launch of Betterleaks, a new open-source tool from the creator of Gitleaks that scans code for accidentally committed secrets like API keys and credentials. We also cover McKinsey's major security breach where hackers accessed their entire internal AI platform in just two hours, exposing millions of messages and the firm's so-called "intellectual crown jewels." Plus, an interstellar comet carrying methanol and hydrogen cyanide offers a glimpse into the chemistry of distant star systems.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mhazq4qae52r"/>
    </item>
    <item>
      <title>Episode 2026-03-16</title>
      <itunes:title>Episode 2026-03-16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb9d1455-acf6-4fe2-a59a-2ac2360c1dad</guid>
      <link>https://share.transistor.fm/s/82e25866</link>
      <description>
        <![CDATA[This episode digs into Meta's surprising rollback of Instagram encryption, new Pew data revealing America's split feelings on AI, and the rise of Handala as a symbol in Iran-linked cyberattacks. Adrian also covers the latest exodus from Elon Musk's xAI as two more co-founders head for the exit.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into Meta's surprising rollback of Instagram encryption, new Pew data revealing America's split feelings on AI, and the rise of Handala as a symbol in Iran-linked cyberattacks. Adrian also covers the latest exodus from Elon Musk's xAI as two more co-founders head for the exit.]]>
      </content:encoded>
      <pubDate>Mon, 16 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/82e25866/d15f46f8.mp3" length="5313976" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>333</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into Meta's surprising rollback of Instagram encryption, new Pew data revealing America's split feelings on AI, and the rise of Handala as a symbol in Iran-linked cyberattacks. Adrian also covers the latest exodus from Elon Musk's xAI as two more co-founders head for the exit.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mh6javexqi2r"/>
    </item>
    <item>
      <title>Episode 2026-03-14</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 2026-03-14</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">51d79346-cd66-439d-8d01-9fd6b40c0915</guid>
      <link>https://share.transistor.fm/s/9d1d84e5</link>
      <description>
        <![CDATA[This episode digs into AI chatbots giving violent instructions when asked about mass attacks, a foreign hacker breaching FBI files on the Jeffrey Epstein case, and why everyone's suddenly having loud speakerphone conversations in public. It's a morning check-in on tech failures, security nightmares, and the weird social norms we're all pretending are fine.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into AI chatbots giving violent instructions when asked about mass attacks, a foreign hacker breaching FBI files on the Jeffrey Epstein case, and why everyone's suddenly having loud speakerphone conversations in public. It's a morning check-in on tech failures, security nightmares, and the weird social norms we're all pretending are fine.]]>
      </content:encoded>
      <pubDate>Sat, 14 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/9d1d84e5/a7eb8d21.mp3" length="5300741" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>328</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into AI chatbots giving violent instructions when asked about mass attacks, a foreign hacker breaching FBI files on the Jeffrey Epstein case, and why everyone's suddenly having loud speakerphone conversations in public. It's a morning check-in on tech failures, security nightmares, and the weird social norms we're all pretending are fine.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgzictc34t2j"/>
    </item>
    <item>
      <title>Episode 2026-03-13</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 2026-03-13</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8819a407-0133-45d2-bded-58ec8b8724ed</guid>
      <link>https://share.transistor.fm/s/7972ea0d</link>
      <description>
        <![CDATA[This episode digs into Amazon's massive six-hour outage traced back to AI-assisted code gone wrong, plus the company's new requirement for senior engineers to sign off on any AI-generated changes. We also explore Meta's acquisition of Moltbook, a social network built exclusively for AI agents to talk to each other, signaling a new frontier in how machines communicate.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into Amazon's massive six-hour outage traced back to AI-assisted code gone wrong, plus the company's new requirement for senior engineers to sign off on any AI-generated changes. We also explore Meta's acquisition of Moltbook, a social network built exclusively for AI agents to talk to each other, signaling a new frontier in how machines communicate.]]>
      </content:encoded>
      <pubDate>Fri, 13 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/7972ea0d/e95ed969.mp3" length="8766459" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>544</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode digs into Amazon's massive six-hour outage traced back to AI-assisted code gone wrong, plus the company's new requirement for senior engineers to sign off on any AI-generated changes. We also explore Meta's acquisition of Moltbook, a social network built exclusively for AI agents to talk to each other, signaling a new frontier in how machines communicate.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgwxvmyigy2e"/>
    </item>
    <item>
      <title>Episode 2026-03-12</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 2026-03-12</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">94a70645-f638-4de3-81f4-292fd4728a2b</guid>
      <link>https://share.transistor.fm/s/4ab7c80f</link>
      <description>
        <![CDATA[This episode covers a Russian hacking campaign targeting Signal and WhatsApp users through clever social engineering, North Korean IT workers now using AI face-swapping to infiltrate companies more convincingly, and a 102-year-old Canadian track star winning four events at a masters championship. Adrian digs into why even strong encryption fails when humans hand over the keys, and why celebrating extraordinary achievements doesn't mean pretending they're ordinary.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode covers a Russian hacking campaign targeting Signal and WhatsApp users through clever social engineering, North Korean IT workers now using AI face-swapping to infiltrate companies more convincingly, and a 102-year-old Canadian track star winning four events at a masters championship. Adrian digs into why even strong encryption fails when humans hand over the keys, and why celebrating extraordinary achievements doesn't mean pretending they're ordinary.]]>
      </content:encoded>
      <pubDate>Thu, 12 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/4ab7c80f/8b06d5e4.mp3" length="4466495" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>276</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode covers a Russian hacking campaign targeting Signal and WhatsApp users through clever social engineering, North Korean IT workers now using AI face-swapping to infiltrate companies more convincingly, and a 102-year-old Canadian track star winning four events at a masters championship. Adrian digs into why even strong encryption fails when humans hand over the keys, and why celebrating extraordinary achievements doesn't mean pretending they're ordinary.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mguhfsejwn2t"/>
    </item>
    <item>
      <title>Episode 2026-03-11</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 2026-03-11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad2b47c2-fee7-43b0-88c5-99e96175fa77</guid>
      <link>https://share.transistor.fm/s/510554d1</link>
      <description>
        <![CDATA[<p>This episode digs into how the tools we built for safety are being turned against us — from hacked security cameras becoming military reconnaissance tools to AI that can unmask your anonymous online profiles by analyzing how you write. We also explore the escalating AI arms race between voice-cloning scammers and the carriers trying to stop them before your phone rings with a perfect fake.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into how the tools we built for safety are being turned against us — from hacked security cameras becoming military reconnaissance tools to AI that can unmask your anonymous online profiles by analyzing how you write. We also explore the escalating AI arms race between voice-cloning scammers and the carriers trying to stop them before your phone rings with a perfect fake.</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/510554d1/8de8fdfb.mp3" length="5453296" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>337</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode digs into how the tools we built for safety are being turned against us — from hacked security cameras becoming military reconnaissance tools to AI that can unmask your anonymous online profiles by analyzing how you write. We also explore the escalating AI arms race between voice-cloning scammers and the carriers trying to stop them before your phone rings with a perfect fake.</p>]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgrwwkexov2w"/>
    </item>
    <item>
      <title>Episode 2026-03-10</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 2026-03-10</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73ff9574-dd44-4d77-9818-bc9ad7b9260b</guid>
      <link>https://share.transistor.fm/s/eddfba63</link>
      <description>
        <![CDATA[<p>This episode digs into incendiary devices hidden in massage pillows shipped from Lithuania, an AI model uncovering twenty-two security flaws in Firefox without human help, and a marathoner who never takes an offseason. It's espionage meets automation meets endurance — all before your morning coffee gets cold.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into incendiary devices hidden in massage pillows shipped from Lithuania, an AI model uncovering twenty-two security flaws in Firefox without human help, and a marathoner who never takes an offseason. It's espionage meets automation meets endurance — all before your morning coffee gets cold.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 07:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/eddfba63/58d4d195.mp3" length="5056653" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>312</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode digs into incendiary devices hidden in massage pillows shipped from Lithuania, an AI model uncovering twenty-two security flaws in Firefox without human help, and a marathoner who never takes an offseason. It's espionage meets automation meets endurance — all before your morning coffee gets cold.</p>]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgpghq3pqa2r"/>
    </item>
    <item>
      <title>Episode 2026-03-09</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 2026-03-09</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a1a3f983-0e25-45e6-a537-9c665a74572f</guid>
      <link>https://share.transistor.fm/s/9453945d</link>
      <description>
        <![CDATA[This episode digs into Pakistan-aligned hackers using AI to mass-produce malware, the aging face of cybercrime moving beyond the teenage hacker stereotype, and why your running routine might be wrecking your digestive system. Adrian also unpacks Bitcoin's strange new behavior as a safe-haven asset and what happens when powerful tools fall into the wrong hands.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into Pakistan-aligned hackers using AI to mass-produce malware, the aging face of cybercrime moving beyond the teenage hacker stereotype, and why your running routine might be wrecking your digestive system. Adrian also unpacks Bitcoin's strange new behavior as a safe-haven asset and what happens when powerful tools fall into the wrong hands.]]>
      </content:encoded>
      <pubDate>Mon, 09 Mar 2026 00:00:00 -0600</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/9453945d/29b82149.mp3" length="4039758" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>249</itunes:duration>
      <itunes:summary>This episode digs into Pakistan-aligned hackers using AI to mass-produce malware, the aging face of cybercrime moving beyond the teenage hacker stereotype, and why your running routine might be wrecking your digestive system. Adrian also unpacks Bitcoin's strange new behavior as a safe-haven asset and what happens when powerful tools fall into the wrong hands.</itunes:summary>
      <itunes:subtitle>This episode digs into Pakistan-aligned hackers using AI to mass-produce malware, the aging face of cybercrime moving beyond the teenage hacker stereotype, and why your running routine might be wrecking your digestive system. Adrian also unpacks Bitcoin's</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgm6j3j2wm2p"/>
    </item>
    <item>
      <title>Episode 2026-03-08</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 2026-03-08</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">53d1d204-fa0f-4194-9eba-f29bdbc974b2</guid>
      <link>https://share.transistor.fm/s/7fdc2482</link>
      <description>
        <![CDATA[This episode digs into how federal agencies buy your location data from advertising auctions without warrants, tracking people through prayer apps, dating profiles, and fitness trackers. We also cover the FBI's wiretap systems getting hacked amid a broader wave of breaches hitting telecom giants and government networks.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into how federal agencies buy your location data from advertising auctions without warrants, tracking people through prayer apps, dating profiles, and fitness trackers. We also cover the FBI's wiretap systems getting hacked amid a broader wave of breaches hitting telecom giants and government networks.]]>
      </content:encoded>
      <pubDate>Sun, 08 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/7fdc2482/7fdf05bc.mp3" length="5991210" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>371</itunes:duration>
      <itunes:summary>This episode digs into how federal agencies buy your location data from advertising auctions without warrants, tracking people through prayer apps, dating profiles, and fitness trackers. We also cover the FBI's wiretap systems getting hacked amid a broader wave of breaches hitting telecom giants and government networks.</itunes:summary>
      <itunes:subtitle>This episode digs into how federal agencies buy your location data from advertising auctions without warrants, tracking people through prayer apps, dating profiles, and fitness trackers. We also cover the FBI's wiretap systems getting hacked amid a broade</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgjrfnghnc2g"/>
    </item>
    <item>
      <title>Episode 2026-03-07</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 2026-03-07</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2e6b2ad-6965-4f5b-ba0c-114b14bf6077</guid>
      <link>https://share.transistor.fm/s/7e49051e</link>
      <description>
        <![CDATA[This episode digs into a sophisticated iOS exploit kit called Coruna that's bringing spyware-grade tools to everyday crypto thieves, plus TikTok's controversial decision to skip end-to-end encryption on DMs. Adrian also explores how Stranger Things references are helping explain cybersecurity concepts in surprisingly effective ways.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode digs into a sophisticated iOS exploit kit called Coruna that's bringing spyware-grade tools to everyday crypto thieves, plus TikTok's controversial decision to skip end-to-end encryption on DMs. Adrian also explores how Stranger Things references are helping explain cybersecurity concepts in surprisingly effective ways.]]>
      </content:encoded>
      <pubDate>Sat, 07 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/7e49051e/7f1a1206.mp3" length="5174100" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>320</itunes:duration>
      <itunes:summary>This episode digs into a sophisticated iOS exploit kit called Coruna that's bringing spyware-grade tools to everyday crypto thieves, plus TikTok's controversial decision to skip end-to-end encryption on DMs. Adrian also explores how Stranger Things references are helping explain cybersecurity concepts in surprisingly effective ways. and space POOP!</itunes:summary>
      <itunes:subtitle>This episode digs into a sophisticated iOS exploit kit called Coruna that's bringing spyware-grade tools to everyday crypto thieves, plus TikTok's controversial decision to skip end-to-end encryption on DMs. Adrian also explores how Stranger Things refere</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mghawzolzk2s"/>
    </item>
    <item>
      <title>Episode 2026-03-06</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 2026-03-06</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f35eeeb-ce61-43a9-b303-3165a7804b2f</guid>
      <link>https://share.transistor.fm/s/8c1bf4fc</link>
      <description>
        <![CDATA[This episode covers two major digital security stories shaking up the tech world. We dig into how a sophisticated iPhone hacking toolkit — possibly built for the US government — leaked into the hands of Russian spies and cybercriminals, and explore a landmark court ruling that just slapped down massively overbroad digital search warrants used against a protester accused of simple assault.]]>
      </description>
      <content:encoded>
        <![CDATA[This episode covers two major digital security stories shaking up the tech world. We dig into how a sophisticated iPhone hacking toolkit — possibly built for the US government — leaked into the hands of Russian spies and cybercriminals, and explore a landmark court ruling that just slapped down massively overbroad digital search warrants used against a protester accused of simple assault.]]>
      </content:encoded>
      <pubDate>Fri, 06 Mar 2026 09:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/8c1bf4fc/ebfd4492.mp3" length="7352920" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>456</itunes:duration>
      <itunes:summary>
        <![CDATA[This episode covers two major digital security stories shaking up the tech world. We dig into how a sophisticated iPhone hacking toolkit — possibly built for the US government — leaked into the hands of Russian spies and cybercriminals, and explore a landmark court ruling that just slapped down massively overbroad digital search warrants used against a protester accused of simple assault.]]>
      </itunes:summary>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgfooe7tgh2s"/>
    </item>
    <item>
      <title>Episode 2026-03-05</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 2026-03-05</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ccff9b8-2f90-40cf-877b-701941a6796e</guid>
      <link>https://share.transistor.fm/s/9462d177</link>
      <description>
        <![CDATA[<p>This episode covers physical warfare colliding with cloud infrastructure as Iranian missiles knock out Amazon data centers in the UAE, forcing customers to scramble for backup regions. We also dig into Samsung's settlement with Texas over secretly tracking what viewers watch on their smart TVs, burying consent forms under two hundred clicks of dark patterns.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers physical warfare colliding with cloud infrastructure as Iranian missiles knock out Amazon data centers in the UAE, forcing customers to scramble for backup regions. We also dig into Samsung's settlement with Texas over secretly tracking what viewers watch on their smart TVs, burying consent forms under two hundred clicks of dark patterns.</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/9462d177/4e2c564f.mp3" length="6196845" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>384</itunes:duration>
      <itunes:summary>This episode covers physical warfare colliding with cloud infrastructure as Iranian missiles knock out Amazon data centers in the UAE, forcing customers to scramble for backup regions. We also dig into Samsung's settlement with Texas over secretly tracking what viewers watch on their smart TVs, burying consent forms under two hundred clicks of dark patterns.</itunes:summary>
      <itunes:subtitle>This episode covers physical warfare colliding with cloud infrastructure as Iranian missiles knock out Amazon data centers in the UAE, forcing customers to scramble for backup regions. We also dig into Samsung's settlement with Texas over secretly trackin</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mgc7yqwpe72z"/>
    </item>
    <item>
      <title>Episode 2026-03-04</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 2026-03-04</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d70e447-6f3d-44bb-8693-80466151ef14</guid>
      <link>https://share.transistor.fm/s/89d17593</link>
      <description>
        <![CDATA[<p>This episode covers disinformation flooding X during military strikes on Iran, a county health department using ChatGPT to solve a Salmonella outbreak at a beer tent, and the return of Mobile World Congress where experimental phones get wonderfully weird. Adrian North walks through how information moves — and breaks — when things happen fast.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers disinformation flooding X during military strikes on Iran, a county health department using ChatGPT to solve a Salmonella outbreak at a beer tent, and the return of Mobile World Congress where experimental phones get wonderfully weird. Adrian North walks through how information moves — and breaks — when things happen fast.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/89d17593/d78f5b10.mp3" length="5482553" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>339</itunes:duration>
      <itunes:summary>This episode covers disinformation flooding X during military strikes on Iran, a county health department using ChatGPT to solve a Salmonella outbreak at a beer tent, and the return of Mobile World Congress where experimental phones get wonderfully weird. Adrian North walks through how information moves — and breaks — when things happen fast.</itunes:summary>
      <itunes:subtitle>This episode covers disinformation flooding X during military strikes on Iran, a county health department using ChatGPT to solve a Salmonella outbreak at a beer tent, and the return of Mobile World Congress where experimental phones get wonderfully weird.</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mg7pk63gyq2j"/>
    </item>
    <item>
      <title>Episode 2026-03-03</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 2026-03-03</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7d2caf6d-8595-4d28-94bf-fddd2727b12f</guid>
      <link>https://share.transistor.fm/s/572c1e3c</link>
      <description>
        <![CDATA[<p>This episode covers U.S. and Israeli military strikes against Iran, the political fallout in Congress, and what it means as tensions continue to escalate in the Middle East. Adrian also digs into the guilty plea of a Ukrainian man who ran OnlyFake, an AI-powered website that generated over ten thousand fake IDs used to bypass banking security checks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers U.S. and Israeli military strikes against Iran, the political fallout in Congress, and what it means as tensions continue to escalate in the Middle East. Adrian also digs into the guilty plea of a Ukrainian man who ran OnlyFake, an AI-powered website that generated over ten thousand fake IDs used to bypass banking security checks.</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Mar 2026 09:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/572c1e3c/2877a4c0.mp3" length="3908518" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>241</itunes:duration>
      <itunes:summary>This episode covers U.S. and Israeli military strikes against Iran, the political fallout in Congress, and what it means as tensions continue to escalate in the Middle East. Adrian also digs into the guilty plea of a Ukrainian man who ran OnlyFake, an AI-powered website that generated over ten thousand fake IDs used to bypass banking security checks.</itunes:summary>
      <itunes:subtitle>This episode covers U.S. and Israeli military strikes against Iran, the political fallout in Congress, and what it means as tensions continue to escalate in the Middle East. Adrian also digs into the guilty plea of a Ukrainian man who ran OnlyFake, an AI-</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mg65bkn4w22g"/>
    </item>
    <item>
      <title>Episode 2026-03-02</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 2026-03-02</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c30c784-989f-43cb-876e-e3df954ebe23</guid>
      <link>https://share.transistor.fm/s/1a127824</link>
      <description>
        <![CDATA[<p>This episode digs into the DOJ's $61 million Tether seizure linked to "pig butchering" scams, where victims are groomed for weeks before being drained of their crypto. Adrian also unpacks the irony of Meta suing advertisers for deceptive celeb-bait schemes and touches on emerging weapons in space.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into the DOJ's $61 million Tether seizure linked to "pig butchering" scams, where victims are groomed for weeks before being drained of their crypto. Adrian also unpacks the irony of Meta suing advertisers for deceptive celeb-bait schemes and touches on emerging weapons in space.</p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/1a127824/0d2cf9d7.mp3" length="4787486" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>296</itunes:duration>
      <itunes:summary>This episode digs into the DOJ's $61 million Tether seizure linked to "pig butchering" scams, where victims are groomed for weeks before being drained of their crypto. Adrian also unpacks the irony of Meta suing advertisers for deceptive celeb-bait schemes and touches on emerging weapons in space.</itunes:summary>
      <itunes:subtitle>This episode digs into the DOJ's $61 million Tether seizure linked to "pig butchering" scams, where victims are groomed for weeks before being drained of their crypto. Adrian also unpacks the irony of Meta suing advertisers for deceptive celeb-bait scheme</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mg2omf25ph2q"/>
    </item>
    <item>
      <title>Episode 2026-03-01</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 2026-03-01</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1683a910-3d94-4cff-bb25-4ac5b5f2e6db</guid>
      <link>https://share.transistor.fm/s/cf2b6bba</link>
      <description>
        <![CDATA[<p>This episode digs into the Pentagon's unprecedented move to label Anthropic a supply chain risk after the AI company refused military contracts, explores how ransomware payments are hitting record lows even as attacks surge, and questions what happens when our hunger for viral content crashes into shared reality—like running a 5K inside an airplane bathroom. Adrian North breaks down the messy collision of AI ethics, cybercrime economics, and the absurdity of chasing clout at 30,000 feet.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into the Pentagon's unprecedented move to label Anthropic a supply chain risk after the AI company refused military contracts, explores how ransomware payments are hitting record lows even as attacks surge, and questions what happens when our hunger for viral content crashes into shared reality—like running a 5K inside an airplane bathroom. Adrian North breaks down the messy collision of AI ethics, cybercrime economics, and the absurdity of chasing clout at 30,000 feet.</p>]]>
      </content:encoded>
      <pubDate>Sun, 01 Mar 2026 00:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/cf2b6bba/a1a4f75c.mp3" length="4573909" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>282</itunes:duration>
      <itunes:summary>This episode digs into the Pentagon's unprecedented move to label Anthropic a supply chain risk after the AI company refused military contracts, explores how ransomware payments are hitting record lows even as attacks surge, and questions what happens when our hunger for viral content crashes into shared reality—like running a 5K inside an airplane bathroom. Adrian North breaks down the messy collision of AI ethics, cybercrime economics, and the absurdity of chasing clout at 30,000 feet.</itunes:summary>
      <itunes:subtitle>This episode digs into the Pentagon's unprecedented move to label Anthropic a supply chain risk after the AI company refused military contracts, explores how ransomware payments are hitting record lows even as attacks surge, and questions what happens whe</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mfy65xgfcy2j"/>
    </item>
    <item>
      <title>Episode 2026-02-28</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2026-02-28</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">47f0bca1-e333-47d2-9f4d-cdb0ac5801ce</guid>
      <link>https://share.transistor.fm/s/cafe4d7d</link>
      <description>
        <![CDATA[<p>This episode digs into the reality check behind Claude Code's overhyped launch, explores the eerie timing of HBO's ransomware episode airing alongside a real Mississippi hospital attack, and profiles Polish computer scientist Maciej Besta who climbs the world's coldest peaks solo. Adrian breaks down why AI tools rarely live up to initial hype and how fictional portrayals might actually help everyday people understand cyber threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode digs into the reality check behind Claude Code's overhyped launch, explores the eerie timing of HBO's ransomware episode airing alongside a real Mississippi hospital attack, and profiles Polish computer scientist Maciej Besta who climbs the world's coldest peaks solo. Adrian breaks down why AI tools rarely live up to initial hype and how fictional portrayals might actually help everyday people understand cyber threats.</p>]]>
      </content:encoded>
      <pubDate>Sat, 28 Feb 2026 14:38:37 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/cafe4d7d/64e40b5a.mp3" length="4487392" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>277</itunes:duration>
      <itunes:summary>This episode digs into the reality check behind Claude Code's overhyped launch, explores the eerie timing of HBO's ransomware episode airing alongside a real Mississippi hospital attack, and profiles Polish computer scientist Maciej Besta who climbs the world's coldest peaks solo. Adrian breaks down why AI tools rarely live up to initial hype and how fictional portrayals might actually help everyday people understand cyber threats.</itunes:summary>
      <itunes:subtitle>This episode digs into the reality check behind Claude Code's overhyped launch, explores the eerie timing of HBO's ransomware episode airing alongside a real Mississippi hospital attack, and profiles Polish computer scientist Maciej Besta who climbs the w</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:45atxo3akzeyfvn6hqmbca64/app.bsky.feed.post/3mfx6rj23yl22"/>
    </item>
    <item>
      <title>Episode 2026-02-27</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2026-02-27</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bbee8c83-ccf1-4a88-acd8-bad923343a9c</guid>
      <link>https://share.transistor.fm/s/4d492ed9</link>
      <description>
        <![CDATA[<p>This episode covers a relentless week in cybersecurity with breaches at PayPal, an emergency Chrome patch, and the troubling reality of AI jailbreaks being used to exfiltrate government data. Adrian also reflects on Jeff Galloway's legacy in running and how normalizing crisis mode has become the new baseline for tech security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers a relentless week in cybersecurity with breaches at PayPal, an emergency Chrome patch, and the troubling reality of AI jailbreaks being used to exfiltrate government data. Adrian also reflects on Jeff Galloway's legacy in running and how normalizing crisis mode has become the new baseline for tech security.</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Feb 2026 19:00:00 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/4d492ed9/9c8dc91e.mp3" length="3512711" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>216</itunes:duration>
      <itunes:summary>This episode digs into major cybersecurity threats including a PayPal breach, a critical Chrome zero-day vulnerability, and a hacker who managed to jailbreak Claude AI to write exploits and steal government data. The hosts also explore BeyondTrust's RCE exploit and wrap up with an inspiring look at how Jeff Galloway revolutionized running for everyday athletes with his run/walk method.</itunes:summary>
      <itunes:subtitle>This episode digs into major cybersecurity threats including a PayPal breach, a critical Chrome zero-day vulnerability, and a hacker who managed to jailbreak Claude AI to write exploits and steal government data. The hosts also explore BeyondTrust's RCE e</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 2026-02-26</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 2026-02-26</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c08bfbd4-3f09-4b33-9791-208fd8c40ba0</guid>
      <link>https://share.transistor.fm/s/c3f9529c</link>
      <description>
        <![CDATA[All that AI but is it safe?]]>
      </description>
      <content:encoded>
        <![CDATA[All that AI but is it safe?]]>
      </content:encoded>
      <pubDate>Thu, 26 Feb 2026 14:37:50 -0700</pubDate>
      <author>Adrian North</author>
      <enclosure url="https://media.transistor.fm/c3f9529c/994b76bc.mp3" length="7463679" type="audio/mpeg"/>
      <itunes:author>Adrian North</itunes:author>
      <itunes:duration>463</itunes:duration>
      <itunes:summary>All that AI but is it safe?</itunes:summary>
      <itunes:subtitle>All that AI but is it safe?</itunes:subtitle>
      <itunes:keywords>hacking,cyber security,running,climbing,r</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
