<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/the-lockdown-practical-privacy-security" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The Lockdown - Practical Privacy &amp; Security</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-lockdown-practical-privacy-security</itunes:new-feed-url>
    <description>Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain &lt;b&gt;extreme&lt;/b&gt; levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!</description>
    <copyright>© 2025 The Lockdown - The Practical Privacy &amp; Security Podcast</copyright>
    <podcast:guid>a86e4491-9e3b-5a6d-9dde-8f87826d1d04</podcast:guid>
    <podcast:locked owner="show@lockdown.media">yes</podcast:locked>
    <itunes:applepodcastsverify>2ea1f1b0-4f92-11f0-9fda-c5bb272bc87f</itunes:applepodcastsverify>
    <podcast:funding url="https://www.patreon.com/TheLockdown">Support this podcast on Patreon</podcast:funding>
    <language>en</language>
    <pubDate>Fri, 03 Oct 2025 18:46:45 -0400</pubDate>
    <lastBuildDate>Fri, 03 Oct 2025 18:47:12 -0400</lastBuildDate>
    <link>https://psysecure.com/podcast/</link>
    <image>
      <url>https://img.transistor.fm/2imlED1RNyys0waT8DVS6732yjjorORkJFvgd6WMraQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTY5/YjgyMzUwZGMwZTIz/ZTFlMmNkYzQxNzVi/YWExYS5wbmc.jpg</url>
      <title>The Lockdown - Practical Privacy &amp; Security</title>
      <link>https://psysecure.com/podcast/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="How To"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Ray Heffer</itunes:author>
    <itunes:image href="https://img.transistor.fm/2imlED1RNyys0waT8DVS6732yjjorORkJFvgd6WMraQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTY5/YjgyMzUwZGMwZTIz/ZTFlMmNkYzQxNzVi/YWExYS5wbmc.jpg"/>
    <itunes:summary>Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain &lt;b&gt;extreme&lt;/b&gt; levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!</itunes:summary>
    <itunes:subtitle>Welcome to The Lockdown.</itunes:subtitle>
    <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
    <itunes:owner>
      <itunes:name>Ray Heffer</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>034 - Final Episode</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>034 - Final Episode</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9f5e8bc5-f01b-4983-bc4f-d92c5ae33626</guid>
      <link>https://share.transistor.fm/s/f1f66bb6</link>
      <description>
        <![CDATA[<p>In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.</p><p><strong>In this week’s episode:</strong></p><ol><li>Why this is the final episode</li><li>The all-or-nothing fallacy</li><li>Airport facial recognition and the Clearview AI threat</li><li>Threat modeling for different life situations</li><li>The CIA triad and why 100% security doesn’t exist</li><li>UK and Swiss digital ID systems and their privacy implications</li><li>NPM breach case study and the psychology of social engineering</li><li>Why organizations should compartmentalize communication channels</li><li>Listener Q&amp;A: MySudo virtual cards, self-hosting setup, and mobile hotspots</li><li>The new Privacy Tools page on PsySecure.com</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy Tools Page - <a href="https://psysecure.com/privacytools/">https://psysecure.com/privacytools/</a></li><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>"The Space Between" Blog Post - <a href="https://psysecure.com/ma-the-space-between-breaches">https://psysecure.com/ma-the-space-between-breaches</a></li><li>Swiss E-ID System Information - <a href="https://www.bj.admin.ch/bj/fr/home/staat/gesetzgebung/staatliche-e-id.html">https://www.bk.admin.ch</a></li><li>Cyber Kill Chain (Lockheed Martin) - <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></li><li>Robert Cialdini's Principles of Persuasion - <a href="https://www.influenceatwork.com">https://www.influenceatwork.com</a></li><li>Daniel Kahneman's Thinking, Fast and Slow - <a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555">https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555</a></li></ul>“Nothing in life is as important as you think it is when you are thinking about it.”<p><em>- Daniel Kahneman, Thinking, Fast and Slow </em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.</p><p><strong>In this week’s episode:</strong></p><ol><li>Why this is the final episode</li><li>The all-or-nothing fallacy</li><li>Airport facial recognition and the Clearview AI threat</li><li>Threat modeling for different life situations</li><li>The CIA triad and why 100% security doesn’t exist</li><li>UK and Swiss digital ID systems and their privacy implications</li><li>NPM breach case study and the psychology of social engineering</li><li>Why organizations should compartmentalize communication channels</li><li>Listener Q&amp;A: MySudo virtual cards, self-hosting setup, and mobile hotspots</li><li>The new Privacy Tools page on PsySecure.com</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy Tools Page - <a href="https://psysecure.com/privacytools/">https://psysecure.com/privacytools/</a></li><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>"The Space Between" Blog Post - <a href="https://psysecure.com/ma-the-space-between-breaches">https://psysecure.com/ma-the-space-between-breaches</a></li><li>Swiss E-ID System Information - <a href="https://www.bj.admin.ch/bj/fr/home/staat/gesetzgebung/staatliche-e-id.html">https://www.bk.admin.ch</a></li><li>Cyber Kill Chain (Lockheed Martin) - <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></li><li>Robert Cialdini's Principles of Persuasion - <a href="https://www.influenceatwork.com">https://www.influenceatwork.com</a></li><li>Daniel Kahneman's Thinking, Fast and Slow - <a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555">https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555</a></li></ul>“Nothing in life is as important as you think it is when you are thinking about it.”<p><em>- Daniel Kahneman, Thinking, Fast and Slow </em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 03 Oct 2025 18:46:45 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/f1f66bb6/fc5c91a0.mp3" length="61613669" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2565</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy tools and self-hosting. I also introduce a new concept from my recent blog post about the “space between” in cybersecurity, examining how compartmentalization of identities can serve as an early warning system against social engineering attacks.</p><p><strong>In this week’s episode:</strong></p><ol><li>Why this is the final episode</li><li>The all-or-nothing fallacy</li><li>Airport facial recognition and the Clearview AI threat</li><li>Threat modeling for different life situations</li><li>The CIA triad and why 100% security doesn’t exist</li><li>UK and Swiss digital ID systems and their privacy implications</li><li>NPM breach case study and the psychology of social engineering</li><li>Why organizations should compartmentalize communication channels</li><li>Listener Q&amp;A: MySudo virtual cards, self-hosting setup, and mobile hotspots</li><li>The new Privacy Tools page on PsySecure.com</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy Tools Page - <a href="https://psysecure.com/privacytools/">https://psysecure.com/privacytools/</a></li><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>"The Space Between" Blog Post - <a href="https://psysecure.com/ma-the-space-between-breaches">https://psysecure.com/ma-the-space-between-breaches</a></li><li>Swiss E-ID System Information - <a href="https://www.bj.admin.ch/bj/fr/home/staat/gesetzgebung/staatliche-e-id.html">https://www.bk.admin.ch</a></li><li>Cyber Kill Chain (Lockheed Martin) - <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></li><li>Robert Cialdini's Principles of Persuasion - <a href="https://www.influenceatwork.com">https://www.influenceatwork.com</a></li><li>Daniel Kahneman's Thinking, Fast and Slow - <a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555">https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555</a></li></ul>“Nothing in life is as important as you think it is when you are thinking about it.”<p><em>- Daniel Kahneman, Thinking, Fast and Slow </em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>033 - Black Mirror - Is the UK's Surveillance State Coming to America?</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>033 - Black Mirror - Is the UK's Surveillance State Coming to America?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d543f21-eca0-4a12-a8c6-23496d3a8a12</guid>
      <link>https://share.transistor.fm/s/3cebb3f1</link>
      <description>
        <![CDATA[<p>In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California’s $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.</p><p><a href="https://www.patreon.com/TheLockdown"><strong>Support the show on Patreon!</strong></a><strong><br></strong><br></p><p><strong>In this week’s episode:</strong></p><ol><li>The UK’s TV licensing system: Legal extortion through private contractors</li><li>The Reviver R-plate: $900 to track yourself in California and Arizona</li><li>Brit Cards: UK’s new “voluntary” Digital ID system</li><li>The Bank of England’s digital pound and programmable money</li><li>Historical patterns of control: From land ownership to neural interfaces</li><li>Why the UK is the blueprint for global surveillance rollout</li><li>Predictions for the next 20-50 years of biosurveillance</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>LCD License Plate (not privacy friendly!) - <a href="https://reviver.com/rplate/">https://reviver.com/rplate/</a></li><li>Black Mirror S03E01 "Nosedive" - <a href="https://www.imdb.com/title/tt5497778/">https://www.imdb.com/title/tt5497778/</a></li><li>Bank of England's Digital Pound - <a href="https://www.bankofengland.co.uk/the-digital-pound">https://www.bankofengland.co.uk/the-digital-pound</a></li><li>Brit Card Digital ID System - <a href="https://www.labourtogether.uk/all-reports/britcard">https://www.labourtogether.uk/all-reports/britcard</a></li><li>TV Licensing Detector Ads (1980s-90s): <ul><li><a href="https://www.youtube.com/watch?v=8NmdUcmLFkw">The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw</a></li><li><a href="https://www.youtube.com/watch?v=qF3-S2sCnb8">"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8</a></li><li><a href="https://www.youtube.com/watch?v=mVfOmR7gAek">Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAek</a></li><li><a href="https://www.youtube.com/watch?v=1Q9CsRRhWQI">More Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI</a></li></ul></li></ul>“One believes things because one has been conditioned to believe them.”<p><em>- Mustapha Mond (Brave New World</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California’s $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.</p><p><a href="https://www.patreon.com/TheLockdown"><strong>Support the show on Patreon!</strong></a><strong><br></strong><br></p><p><strong>In this week’s episode:</strong></p><ol><li>The UK’s TV licensing system: Legal extortion through private contractors</li><li>The Reviver R-plate: $900 to track yourself in California and Arizona</li><li>Brit Cards: UK’s new “voluntary” Digital ID system</li><li>The Bank of England’s digital pound and programmable money</li><li>Historical patterns of control: From land ownership to neural interfaces</li><li>Why the UK is the blueprint for global surveillance rollout</li><li>Predictions for the next 20-50 years of biosurveillance</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>LCD License Plate (not privacy friendly!) - <a href="https://reviver.com/rplate/">https://reviver.com/rplate/</a></li><li>Black Mirror S03E01 "Nosedive" - <a href="https://www.imdb.com/title/tt5497778/">https://www.imdb.com/title/tt5497778/</a></li><li>Bank of England's Digital Pound - <a href="https://www.bankofengland.co.uk/the-digital-pound">https://www.bankofengland.co.uk/the-digital-pound</a></li><li>Brit Card Digital ID System - <a href="https://www.labourtogether.uk/all-reports/britcard">https://www.labourtogether.uk/all-reports/britcard</a></li><li>TV Licensing Detector Ads (1980s-90s): <ul><li><a href="https://www.youtube.com/watch?v=8NmdUcmLFkw">The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw</a></li><li><a href="https://www.youtube.com/watch?v=qF3-S2sCnb8">"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8</a></li><li><a href="https://www.youtube.com/watch?v=mVfOmR7gAek">Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAek</a></li><li><a href="https://www.youtube.com/watch?v=1Q9CsRRhWQI">More Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI</a></li></ul></li></ul>“One believes things because one has been conditioned to believe them.”<p><em>- Mustapha Mond (Brave New World</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 09:33:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/3cebb3f1/b7b5ed34.mp3" length="55102334" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2294</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance that could eventually spread globally. I dive into California’s $900 “smart” license plates that track your every move, centralized government digital currencies, and my predictions for the next 20 years of Orwellian surveillance.</p><p><a href="https://www.patreon.com/TheLockdown"><strong>Support the show on Patreon!</strong></a><strong><br></strong><br></p><p><strong>In this week’s episode:</strong></p><ol><li>The UK’s TV licensing system: Legal extortion through private contractors</li><li>The Reviver R-plate: $900 to track yourself in California and Arizona</li><li>Brit Cards: UK’s new “voluntary” Digital ID system</li><li>The Bank of England’s digital pound and programmable money</li><li>Historical patterns of control: From land ownership to neural interfaces</li><li>Why the UK is the blueprint for global surveillance rollout</li><li>Predictions for the next 20-50 years of biosurveillance</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>PsySecure ODSF Framework - <a href="https://odsf.psysecure.com">https://odsf.psysecure.com</a></li><li>LCD License Plate (not privacy friendly!) - <a href="https://reviver.com/rplate/">https://reviver.com/rplate/</a></li><li>Black Mirror S03E01 "Nosedive" - <a href="https://www.imdb.com/title/tt5497778/">https://www.imdb.com/title/tt5497778/</a></li><li>Bank of England's Digital Pound - <a href="https://www.bankofengland.co.uk/the-digital-pound">https://www.bankofengland.co.uk/the-digital-pound</a></li><li>Brit Card Digital ID System - <a href="https://www.labourtogether.uk/all-reports/britcard">https://www.labourtogether.uk/all-reports/britcard</a></li><li>TV Licensing Detector Ads (1980s-90s): <ul><li><a href="https://www.youtube.com/watch?v=8NmdUcmLFkw">The Detector Van - https://www.youtube.com/watch?v=8NmdUcmLFkw</a></li><li><a href="https://www.youtube.com/watch?v=qF3-S2sCnb8">"We know exactly where he is" - https://www.youtube.com/watch?v=qF3-S2sCnb8</a></li><li><a href="https://www.youtube.com/watch?v=mVfOmR7gAek">Keep One Eye Open - https://www.youtube.com/watch?v=mVfOmR7gAek</a></li><li><a href="https://www.youtube.com/watch?v=1Q9CsRRhWQI">More Powerful Dector Vans! - https://www.youtube.com/watch?v=1Q9CsRRhWQI</a></li></ul></li></ul>“One believes things because one has been conditioned to believe them.”<p><em>- Mustapha Mond (Brave New World</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>032 - No Salt Required: Listener Questions Before the Break</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>032 - No Salt Required: Listener Questions Before the Break</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">266196ba-3565-4a21-9d3d-596aa5371be5</guid>
      <link>https://share.transistor.fm/s/79e2ad30</link>
      <description>
        <![CDATA[<p>In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!</p><p><strong>In this week’s episode:</strong></p><ol><li>Addressing the “Tea” controversy and clarifying my positions on doxing</li><li>Community solution for Privacy.com and Plaid privacy concerns</li><li>Contact information protection strategies when family uses social media</li><li>Future of capture-the-flag challenges and OSINT considerations</li><li>Conference attendance updates and travel</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Tea app leak article - <a href="https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/">https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/</a></li><li>OSMOSIS Institute - <a href="https://osmosisinstitute.org/events/">https://osmosisinstitute.org/events/</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li></ul>“There are no facts, only interpretations.”<p><em>- Friedrich Nietzsche</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!</p><p><strong>In this week’s episode:</strong></p><ol><li>Addressing the “Tea” controversy and clarifying my positions on doxing</li><li>Community solution for Privacy.com and Plaid privacy concerns</li><li>Contact information protection strategies when family uses social media</li><li>Future of capture-the-flag challenges and OSINT considerations</li><li>Conference attendance updates and travel</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Tea app leak article - <a href="https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/">https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/</a></li><li>OSMOSIS Institute - <a href="https://osmosisinstitute.org/events/">https://osmosisinstitute.org/events/</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li></ul>“There are no facts, only interpretations.”<p><em>- Friedrich Nietzsche</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 11 Aug 2025 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/79e2ad30/8595db35.mp3" length="31242287" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1300</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!</p><p><strong>In this week’s episode:</strong></p><ol><li>Addressing the “Tea” controversy and clarifying my positions on doxing</li><li>Community solution for Privacy.com and Plaid privacy concerns</li><li>Contact information protection strategies when family uses social media</li><li>Future of capture-the-flag challenges and OSINT considerations</li><li>Conference attendance updates and travel</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Tea app leak article - <a href="https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/">https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/</a></li><li>OSMOSIS Institute - <a href="https://osmosisinstitute.org/events/">https://osmosisinstitute.org/events/</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li></ul>“There are no facts, only interpretations.”<p><em>- Friedrich Nietzsche</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>031 - When Privacy Tools Betray You, Safety Apps That Dox and Revoked Anonymous Payments</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>031 - When Privacy Tools Betray You, Safety Apps That Dox and Revoked Anonymous Payments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7af48e6e-486e-472b-99f6-a7066eaccbd3</guid>
      <link>https://share.transistor.fm/s/18c5bafb</link>
      <description>
        <![CDATA[<p>In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that’s forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women’s safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.</p><p>I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.</p><p><br><strong>In this week’s episode:</strong></p><ol><li>Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmare</li><li>Switzerland’s surveillance crisis: Why Proton is threatening to leave and relocating to Germany/Norway</li><li>Email provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliances</li><li>Tea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chan</li><li>Vehicle tracking: DCM modules, telematics, and why your car is spying on you</li><li>Philosophy of privacy: Stoicism, minimalism, and why less is more</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Cloaked.com - <a href="https://cloaked.com">https://cloaked.com</a></li><li>Proton Warrant Canary - <a href="https://protonvpn.com/blog/transparency-report/">https://protonvpn.com/blog/transparency-report/</a></li><li>Climate Activist Arrest - <a href="https://proton.me/blog/climate-activist-arrest">https://proton.me/blog/climate-activist-arrest</a> and <a href="https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/">https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/</a></li><li>Tuta Crypt - <a href="https://tuta.com/documents/tuta-crypt-spec.pdf">https://tuta.com/documents/tuta-crypt-spec.pdf</a></li><li>Proton elliptic curve cryptography - <a href="https://proton.me/blog/elliptic-curve-cryptography">https://proton.me/blog/elliptic-curve-cryptography</a></li><li>SimpleLogin - <a href="https://simplelogin.io">https://simplelogin.io</a></li><li>HashiCorp Vault - <a href="https://www.vaultproject.io">https://www.vaultproject.io</a></li><li>RAM IS SPYING ON YOU (Cozy Living Machine) - <a href="https://www.youtube.com/watch?v=0-Y1SUSRqNU">https://www.youtube.com/watch?v=0-Y1SUSRqNU</a></li><li>Meditations by Marcus Aurelius - <a href="https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI">https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI</a></li></ul>“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”<p><em>- Marcus Aurelius</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that’s forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women’s safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.</p><p>I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.</p><p><br><strong>In this week’s episode:</strong></p><ol><li>Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmare</li><li>Switzerland’s surveillance crisis: Why Proton is threatening to leave and relocating to Germany/Norway</li><li>Email provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliances</li><li>Tea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chan</li><li>Vehicle tracking: DCM modules, telematics, and why your car is spying on you</li><li>Philosophy of privacy: Stoicism, minimalism, and why less is more</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Cloaked.com - <a href="https://cloaked.com">https://cloaked.com</a></li><li>Proton Warrant Canary - <a href="https://protonvpn.com/blog/transparency-report/">https://protonvpn.com/blog/transparency-report/</a></li><li>Climate Activist Arrest - <a href="https://proton.me/blog/climate-activist-arrest">https://proton.me/blog/climate-activist-arrest</a> and <a href="https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/">https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/</a></li><li>Tuta Crypt - <a href="https://tuta.com/documents/tuta-crypt-spec.pdf">https://tuta.com/documents/tuta-crypt-spec.pdf</a></li><li>Proton elliptic curve cryptography - <a href="https://proton.me/blog/elliptic-curve-cryptography">https://proton.me/blog/elliptic-curve-cryptography</a></li><li>SimpleLogin - <a href="https://simplelogin.io">https://simplelogin.io</a></li><li>HashiCorp Vault - <a href="https://www.vaultproject.io">https://www.vaultproject.io</a></li><li>RAM IS SPYING ON YOU (Cozy Living Machine) - <a href="https://www.youtube.com/watch?v=0-Y1SUSRqNU">https://www.youtube.com/watch?v=0-Y1SUSRqNU</a></li><li>Meditations by Marcus Aurelius - <a href="https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI">https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI</a></li></ul>“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”<p><em>- Marcus Aurelius</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 04 Aug 2025 07:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/18c5bafb/dca5a147.mp3" length="78369930" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3263</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, I discuss the challenges facing privacy-focused payment solutions like Privacy.com, exploring alternatives and the troubling rise of KYC requirements across the industry. I dive deep into the Switzerland privacy crisis that’s forcing Proton to consider relocating their infrastructure, and what this means for encrypted email providers globally. I also cover the catastrophic security failure at Tea, a women’s safety app that exposed 72,000 images including government IDs through basic incompetence, leading to harassment campaigns on 4chan.</p><p>I wrap up with thoughts on vehicle tracking through DCM/Telematics modules, why buying older vehicles might be the better privacy-conscious choice, and how embracing the stoic lifestyle aligns with both privacy and my own philosophical principles.</p><p><br><strong>In this week’s episode:</strong></p><ol><li>Privacy.com troubles: Account freezes, limited alternatives, and the KYC nightmare</li><li>Switzerland’s surveillance crisis: Why Proton is threatening to leave and relocating to Germany/Norway</li><li>Email provider comparison: Proton vs Tutanota vs Atomic Mail, and understanding intelligence alliances</li><li>Tea app breach: How 72,000 IDs and 1.1 million private messages ended up on 4chan</li><li>Vehicle tracking: DCM modules, telematics, and why your car is spying on you</li><li>Philosophy of privacy: Stoicism, minimalism, and why less is more</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Cloaked.com - <a href="https://cloaked.com">https://cloaked.com</a></li><li>Proton Warrant Canary - <a href="https://protonvpn.com/blog/transparency-report/">https://protonvpn.com/blog/transparency-report/</a></li><li>Climate Activist Arrest - <a href="https://proton.me/blog/climate-activist-arrest">https://proton.me/blog/climate-activist-arrest</a> and <a href="https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/">https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/</a></li><li>Tuta Crypt - <a href="https://tuta.com/documents/tuta-crypt-spec.pdf">https://tuta.com/documents/tuta-crypt-spec.pdf</a></li><li>Proton elliptic curve cryptography - <a href="https://proton.me/blog/elliptic-curve-cryptography">https://proton.me/blog/elliptic-curve-cryptography</a></li><li>SimpleLogin - <a href="https://simplelogin.io">https://simplelogin.io</a></li><li>HashiCorp Vault - <a href="https://www.vaultproject.io">https://www.vaultproject.io</a></li><li>RAM IS SPYING ON YOU (Cozy Living Machine) - <a href="https://www.youtube.com/watch?v=0-Y1SUSRqNU">https://www.youtube.com/watch?v=0-Y1SUSRqNU</a></li><li>Meditations by Marcus Aurelius - <a href="https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI">https://www.amazon.com/Meditations-New-Translation-Modern-Library-ebook/dp/B000FC1JAI</a></li></ul>“Very little is needed to make a happy life; it is all within yourself, in your way of thinking.”<p><em>- Marcus Aurelius</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>030 - Info Stealers, GrapheneOS Drama, and Why Video Games and Anti-Virus Are Spyware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a43f867a-fb4c-4c25-bf98-457c2f594bfb</guid>
      <link>https://share.transistor.fm/s/a8873835</link>
      <description>
        <![CDATA[<p>In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it’s not hackers with Wireshark), and share my approach with aliases.</p><p>I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google’s strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.</p><p><strong>In this week’s episode:</strong></p><ol><li>Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias management</li><li>MAC address randomization: GrapheneOS vs Apple’s implementation</li><li>The real threats of public Wi-Fi in 2025</li><li>Info stealers and video games can be a privacy nightmare</li><li>GrapheneOS controversy: Developer conscription, Google’s lockdown, and the future of custom ROMs</li><li>Why antivirus software might be the malware you’re trying to avoid</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>MAC Address Lookup - <a href="https://maclookup.app/">https://maclookup.app/</a></li><li>OUI Lookup - <a href="https://oui.is/">https://oui.is/</a></li><li>33mail - <a href="https://www.33mail.com/">https://www.33mail.com/</a></li><li>OpenSnitch - <a href="https://github.com/evilsocket/opensnitch">https://github.com/evilsocket/opensnitch</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Lithic - <a href="https://lithic.com">https://lithic.com</a></li><li>Kaspersky and Russian Government - <a href="https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government">https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government</a></li><li>Google Not Killing AOSP - <a href="https://www.androidauthority.com/google-not-killing-aosp-3566882/">https://www.androidauthority.com/google-not-killing-aosp-3566882/</a></li><li>GrapheneOS on Developer Conscription - <a href="https://grapheneos.social/@GrapheneOS/114359660453627718">https://grapheneos.social/@GrapheneOS/114359660453627718</a></li><li>GrapheneOS on OEM Partnerships (June 19) - <a href="https://grapheneos.social/@GrapheneOS/114671100848024807">https://grapheneos.social/@GrapheneOS/114671100848024807</a></li><li>GrapheneOS Response to Misinformation - <a href="https://grapheneos.social/@GrapheneOS/114825492698412916">https://grapheneos.social/@GrapheneOS/114825492698412916</a></li><li>GrapheneOS on iPhone Security - <a href="https://grapheneos.social/@GrapheneOS/114824816120139544">https://grapheneos.social/@GrapheneOS/114824816120139544</a></li></ul>“Social engineering bypasses all technologies, including firewalls.”<p><em>- Kevin Mitnick</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it’s not hackers with Wireshark), and share my approach with aliases.</p><p>I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google’s strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.</p><p><strong>In this week’s episode:</strong></p><ol><li>Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias management</li><li>MAC address randomization: GrapheneOS vs Apple’s implementation</li><li>The real threats of public Wi-Fi in 2025</li><li>Info stealers and video games can be a privacy nightmare</li><li>GrapheneOS controversy: Developer conscription, Google’s lockdown, and the future of custom ROMs</li><li>Why antivirus software might be the malware you’re trying to avoid</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>MAC Address Lookup - <a href="https://maclookup.app/">https://maclookup.app/</a></li><li>OUI Lookup - <a href="https://oui.is/">https://oui.is/</a></li><li>33mail - <a href="https://www.33mail.com/">https://www.33mail.com/</a></li><li>OpenSnitch - <a href="https://github.com/evilsocket/opensnitch">https://github.com/evilsocket/opensnitch</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Lithic - <a href="https://lithic.com">https://lithic.com</a></li><li>Kaspersky and Russian Government - <a href="https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government">https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government</a></li><li>Google Not Killing AOSP - <a href="https://www.androidauthority.com/google-not-killing-aosp-3566882/">https://www.androidauthority.com/google-not-killing-aosp-3566882/</a></li><li>GrapheneOS on Developer Conscription - <a href="https://grapheneos.social/@GrapheneOS/114359660453627718">https://grapheneos.social/@GrapheneOS/114359660453627718</a></li><li>GrapheneOS on OEM Partnerships (June 19) - <a href="https://grapheneos.social/@GrapheneOS/114671100848024807">https://grapheneos.social/@GrapheneOS/114671100848024807</a></li><li>GrapheneOS Response to Misinformation - <a href="https://grapheneos.social/@GrapheneOS/114825492698412916">https://grapheneos.social/@GrapheneOS/114825492698412916</a></li><li>GrapheneOS on iPhone Security - <a href="https://grapheneos.social/@GrapheneOS/114824816120139544">https://grapheneos.social/@GrapheneOS/114824816120139544</a></li></ul>“Social engineering bypasses all technologies, including firewalls.”<p><em>- Kevin Mitnick</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 18 Jul 2025 07:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/a8873835/e33878c0.mp3" length="75936777" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3162</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint: it’s not hackers with Wireshark), and share my approach with aliases.</p><p>I also cover the rising threat of infostealers like Atomic Info Stealer for macOS, the dangerous intersection of gaming cheats and malware, and why I avoid third-party antivirus software. Most importantly, I address the GrapheneOS controversy: the loss of a senior developer to military conscription, Google’s strategic pivot that threatens custom ROMs, and why claims of GrapheneOS “dying” are misinformation spread by those with competing agendas.</p><p><strong>In this week’s episode:</strong></p><ol><li>Clarifications and Corrections: Public Wi-Fi, MAC addresses, and alias management</li><li>MAC address randomization: GrapheneOS vs Apple’s implementation</li><li>The real threats of public Wi-Fi in 2025</li><li>Info stealers and video games can be a privacy nightmare</li><li>GrapheneOS controversy: Developer conscription, Google’s lockdown, and the future of custom ROMs</li><li>Why antivirus software might be the malware you’re trying to avoid</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>MAC Address Lookup - <a href="https://maclookup.app/">https://maclookup.app/</a></li><li>OUI Lookup - <a href="https://oui.is/">https://oui.is/</a></li><li>33mail - <a href="https://www.33mail.com/">https://www.33mail.com/</a></li><li>OpenSnitch - <a href="https://github.com/evilsocket/opensnitch">https://github.com/evilsocket/opensnitch</a></li><li>Privacy.com - <a href="https://privacy.com">https://privacy.com</a></li><li>Lithic - <a href="https://lithic.com">https://lithic.com</a></li><li>Kaspersky and Russian Government - <a href="https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government">https://en.wikipedia.org/wiki/Kaspersky_and_the_Russian_government</a></li><li>Google Not Killing AOSP - <a href="https://www.androidauthority.com/google-not-killing-aosp-3566882/">https://www.androidauthority.com/google-not-killing-aosp-3566882/</a></li><li>GrapheneOS on Developer Conscription - <a href="https://grapheneos.social/@GrapheneOS/114359660453627718">https://grapheneos.social/@GrapheneOS/114359660453627718</a></li><li>GrapheneOS on OEM Partnerships (June 19) - <a href="https://grapheneos.social/@GrapheneOS/114671100848024807">https://grapheneos.social/@GrapheneOS/114671100848024807</a></li><li>GrapheneOS Response to Misinformation - <a href="https://grapheneos.social/@GrapheneOS/114825492698412916">https://grapheneos.social/@GrapheneOS/114825492698412916</a></li><li>GrapheneOS on iPhone Security - <a href="https://grapheneos.social/@GrapheneOS/114824816120139544">https://grapheneos.social/@GrapheneOS/114824816120139544</a></li></ul>“Social engineering bypasses all technologies, including firewalls.”<p><em>- Kevin Mitnick</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60dbccb1-10a7-4e80-af9e-05a08ad4291a</guid>
      <link>https://psysecure.com/podcasts/029/</link>
      <description>
        <![CDATA[<p>In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks &amp; Spencer through social engineering.</p><p>I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.</p><p><strong>In this week’s episode:</strong></p><ol><li>Ghost in the Source Capture the Flag challenge results</li><li>The military mindset problem in cybersecurity</li><li>Strategic use of public Wi-Fi for account creation and privacy techniques</li><li>Data curation tactics, and “Minimizing What Can Be Known”</li><li>Invisible surveillance net and Stingray devices</li><li>GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Noam Chomsky on Internet Privacy<a href="https://www.youtube.com/watch?v=QIWsTMcBrjQ">https://www.youtube.com/watch?v=QIWsTMcBrjQ</a></li><li>Noam Chomsky on Advertising - <a href="https://www.youtube.com/watch?v=PfIwUlY44CM">https://www.youtube.com/watch?v=PfIwUlY44CM</a></li><li>TryHackMe Platform - <a href="https://tryhackme.com">https://tryhackme.com</a></li><li>Hack the Box - <a href="https://hackthebox.com">https://hackthebox.com</a></li><li>Wired Article on DNC Stingray Surveillance - <a href="https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/">https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/</a></li><li>IntelTechniques Data Removal Guide - <a href="https://inteltechniques.com/workbook.html">https://inteltechniques.com/workbook.html</a></li><li>Optery Data Broker Removal - <a href="https://optery.com">https://optery.com</a></li><li>Graphene OS - <a href="https://grapheneos.org">https://grapheneos.org</a></li></ul>“We’re dragons. We’re not supposed to live by other people’s rules.”<p><em>- Hajime Ryudo</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks &amp; Spencer through social engineering.</p><p>I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.</p><p><strong>In this week’s episode:</strong></p><ol><li>Ghost in the Source Capture the Flag challenge results</li><li>The military mindset problem in cybersecurity</li><li>Strategic use of public Wi-Fi for account creation and privacy techniques</li><li>Data curation tactics, and “Minimizing What Can Be Known”</li><li>Invisible surveillance net and Stingray devices</li><li>GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Noam Chomsky on Internet Privacy<a href="https://www.youtube.com/watch?v=QIWsTMcBrjQ">https://www.youtube.com/watch?v=QIWsTMcBrjQ</a></li><li>Noam Chomsky on Advertising - <a href="https://www.youtube.com/watch?v=PfIwUlY44CM">https://www.youtube.com/watch?v=PfIwUlY44CM</a></li><li>TryHackMe Platform - <a href="https://tryhackme.com">https://tryhackme.com</a></li><li>Hack the Box - <a href="https://hackthebox.com">https://hackthebox.com</a></li><li>Wired Article on DNC Stingray Surveillance - <a href="https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/">https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/</a></li><li>IntelTechniques Data Removal Guide - <a href="https://inteltechniques.com/workbook.html">https://inteltechniques.com/workbook.html</a></li><li>Optery Data Broker Removal - <a href="https://optery.com">https://optery.com</a></li><li>Graphene OS - <a href="https://grapheneos.org">https://grapheneos.org</a></li></ul>“We’re dragons. We’re not supposed to live by other people’s rules.”<p><em>- Hajime Ryudo</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 07 Jul 2025 08:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/a1ee5df7/fe2593bd.mp3" length="78435114" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3266</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks &amp; Spencer through social engineering.</p><p>I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.</p><p><strong>In this week’s episode:</strong></p><ol><li>Ghost in the Source Capture the Flag challenge results</li><li>The military mindset problem in cybersecurity</li><li>Strategic use of public Wi-Fi for account creation and privacy techniques</li><li>Data curation tactics, and “Minimizing What Can Be Known”</li><li>Invisible surveillance net and Stingray devices</li><li>GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture</li></ol><p><strong>Matrix Community Rooms</strong></p><ul><li>Matrix Community Space - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li></ul><p><strong>Individual Room Links:</strong></p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Noam Chomsky on Internet Privacy<a href="https://www.youtube.com/watch?v=QIWsTMcBrjQ">https://www.youtube.com/watch?v=QIWsTMcBrjQ</a></li><li>Noam Chomsky on Advertising - <a href="https://www.youtube.com/watch?v=PfIwUlY44CM">https://www.youtube.com/watch?v=PfIwUlY44CM</a></li><li>TryHackMe Platform - <a href="https://tryhackme.com">https://tryhackme.com</a></li><li>Hack the Box - <a href="https://hackthebox.com">https://hackthebox.com</a></li><li>Wired Article on DNC Stingray Surveillance - <a href="https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/">https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/</a></li><li>IntelTechniques Data Removal Guide - <a href="https://inteltechniques.com/workbook.html">https://inteltechniques.com/workbook.html</a></li><li>Optery Data Broker Removal - <a href="https://optery.com">https://optery.com</a></li><li>Graphene OS - <a href="https://grapheneos.org">https://grapheneos.org</a></li></ul>“We’re dragons. We’re not supposed to live by other people’s rules.”<p><em>- Hajime Ryudo</em></p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>028 - Silence &amp; Stealth - Mailbox, Email &amp; Anti-KYC Phone Strategies</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>028 - Silence &amp; Stealth - Mailbox, Email &amp; Anti-KYC Phone Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-17364708</guid>
      <link>https://share.transistor.fm/s/41e92f3b</link>
      <description>
        <![CDATA[<p>In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights on anonymous eSIM options and answer listener questions about dealing with Know-Your-Customer requirements.</p><p><strong>In this week’s episode:</strong></p><ol><li>Joining the Matrix community with Element</li><li>Physical mailbox strategies: UPS stores, virtual CMRA addresses, and co-working spaces</li><li>Four-tiered email approach using ProtonMail, Fastmail, SimpleLogin, and Gmail sock puppet</li><li>Mobile phone privacy with Mint Mobile and anonymous eSIM options</li><li>The Flock ALPR camera threat and how to protect yourself</li><li>Listener questions: Australian SIM card strategies with KYC requirements</li><li>Capture the Flag challenge details for June 21st</li></ol><p><strong>Matrix Community Rooms</strong></p><p>It seems on Element X, it doesn’t list the rooms associated with the Matrix space, so you can click on each of these links to join the rooms:</p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Matrix Clients - <a href="https://matrix.org/clients">https://matrix.org/clients</a></li><li>Matrix Community - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li><li>Smarty Address Lookup - <a href="https://www.smarty.com/products/single-address">https://www.smarty.com/products/single-address</a></li><li>Expired Domains - <a href="https://www.expireddomains.net/">https://www.expireddomains.net/</a></li><li>Stealths.net (Anonymous eSIMs) - <a href="https://stealths.net/">https://stealths.net/</a></li><li>DeFlock.me (ALPR Camera Map) - <a href="https://deflock.me/">https://deflock.me/</a></li><li>Flock Safety Privacy Policy - <a href="https://www.flocksafety.com/privacy-policy">https://www.flocksafety.com/privacy-policy</a></li><li>EFF Article on DeFlock - <a href="https://www.eff.org/deeplinks/2025/02/anti-surveillance-mapmaker-refuses-flock-safetys-cease-and-desist-demand">https://www.eff.org/deeplinks/2025/02/anti-surveillance-mapmaker-refuses-flock-safetys-cease-and-desist-demand</a></li><li>CTF Challenge Rules - <a href="https://psysecure.com/ctf">https://psysecure.com/ctf</a></li></ul><p><br></p>“Imagine this situation where we have the huge electronic intercommunication so that everybody is in touch with everybody else in such a way that it reveals their inmost thoughts, and there is no longer any individuality. No privacy. Everything you are, everything you think, is revealed to everyone.”<p><br></p><p><em>- “Future of Communications” Alan Watts</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights on anonymous eSIM options and answer listener questions about dealing with Know-Your-Customer requirements.</p><p><strong>In this week’s episode:</strong></p><ol><li>Joining the Matrix community with Element</li><li>Physical mailbox strategies: UPS stores, virtual CMRA addresses, and co-working spaces</li><li>Four-tiered email approach using ProtonMail, Fastmail, SimpleLogin, and Gmail sock puppet</li><li>Mobile phone privacy with Mint Mobile and anonymous eSIM options</li><li>The Flock ALPR camera threat and how to protect yourself</li><li>Listener questions: Australian SIM card strategies with KYC requirements</li><li>Capture the Flag challenge details for June 21st</li></ol><p><strong>Matrix Community Rooms</strong></p><p>It seems on Element X, it doesn’t list the rooms associated with the Matrix space, so you can click on each of these links to join the rooms:</p><ul><li><a href="https://matrix.to/#/#lockdown-general:matrix.org">https://matrix.to/#/#lockdown-general:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-podcast:matrix.org">https://matrix.to/#/#lockdown-podcast:matrix.org</a></li><li><a href="https://matrix.to/#/#lockdown-intro:matrix.org">https://matrix.to/#/#lockdown-intro:matrix.org</a></li></ul><p><strong>Show Links:</strong></p><ul><li>Matrix Clients - <a href="https://matrix.org/clients">https://matrix.org/clients</a></li><li>Matrix Community - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li><li>Smarty Address Lookup - <a href="https://www.smarty.com/products/single-address">https://www.smarty.com/products/single-address</a></li><li>Expired Domains - <a href="https://www.expireddomains.net/">https://www.expireddomains.net/</a></li><li>Stealths.net (Anonymous eSIMs) - <a href="https://stealths.net/">https://stealths.net/</a></li><li>DeFlock.me (ALPR Camera Map) - <a href="https://deflock.me/">https://deflock.me/</a></li><li>Flock Safety Privacy Policy - <a href="https://www.flocksafety.com/privacy-policy">https://www.flocksafety.com/privacy-policy</a></li><li>EFF Article on DeFlock - <a href="https://www.eff.org/deeplinks/2025/02/anti-surveillance-mapmaker-refuses-flock-safetys-cease-and-desist-demand">https://www.eff.org/deeplinks/2025/02/anti-surveillance-mapmaker-refuses-flock-safetys-cease-and-desist-demand</a></li><li>CTF Challenge Rules - <a href="https://psysecure.com/ctf">https://psysecure.com/ctf</a></li></ul><p><br></p>“Imagine this situation where we have the huge electronic intercommunication so that everybody is in touch with everybody else in such a way that it reveals their inmost thoughts, and there is no longer any individuality. No privacy. Everything you are, everything you think, is revealed to everyone.”<p><br></p><p><em>- “Future of Communications” Alan Watts</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 20 Jun 2025 08:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/41e92f3b/6b9c48d5.mp3" length="32767596" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:image href="https://img.transistor.fm/dGmYuq8qu7SFzysV5Qv0WMNtrUiWmxWaSPmyNCzsUZc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNTA1/ZDkwNDIzMDBmODBh/MWZkODFjMzE5YzBi/NmRiNS5wbmc.jpg"/>
      <itunes:duration>2728</itunes:duration>
      <itunes:summary>In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights on anonymous eSIM options and answer listener questions about dealing with Know-Your-Customer requirements. In this week’s episode: Joining the Mat...</itunes:summary>
      <itunes:subtitle>In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier </itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>027 - Stop Playing the Game, Join The New Matrix Privacy Community</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>027 - Stop Playing the Game, Join The New Matrix Privacy Community</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-17333642</guid>
      <link>https://share.transistor.fm/s/ceb660dc</link>
      <description>
        <![CDATA[<p>In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense &amp; Security Framework progress, and rant about security theater at airports and online services that block VPNs.</p><p><strong>In this week’s episode:</strong></p><ol><li>Apple’s $95 million lawsuit and the ecosystem lock-in problem</li><li>Why people overshare on social media and how OSINT can exploit it</li><li>Introduction to the Matrix community</li><li>Capture the Flag challenge launching June 21st!</li><li>Progress update on the OSINT Defense &amp; Security Framework (ODSF)</li><li>Security theater: VPN blocking and other pointless security measures</li><li>Alternative YouTube clients for privacy (GrayJay and NewPipe)</li></ol><p><strong>Show Links:</strong></p><ul><li>Matrix Community - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li><li>CTF Challenge - <a href="https://psysecure.com/ctf">https://psysecure.com/ctf</a></li><li>GrayJay (by Futo) - <a href="https://grayjay.app">https://grayjay.app</a></li><li>NewPipe - <a href="https://newpipe.net">https://newpipe.net</a></li><li>WiFi Pineapple - <a href="https://shop.hak5.org/products/wifi-pineapple">https://shop.hak5.org/products/wifi-pineapple</a></li><li>System76 Laptops - <a href="https://system76.com/laptops">https://system76.com/laptops</a></li><li>Little Snitch (macOS Firewall) - <a href="https://www.obdev.at/products/littlesnitch/">https://www.obdev.at/products/littlesnitch/</a></li></ul>“I hope for nothing. I fear nothing. I am free.”<p><em>- Nikos Kazantzakis</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense &amp; Security Framework progress, and rant about security theater at airports and online services that block VPNs.</p><p><strong>In this week’s episode:</strong></p><ol><li>Apple’s $95 million lawsuit and the ecosystem lock-in problem</li><li>Why people overshare on social media and how OSINT can exploit it</li><li>Introduction to the Matrix community</li><li>Capture the Flag challenge launching June 21st!</li><li>Progress update on the OSINT Defense &amp; Security Framework (ODSF)</li><li>Security theater: VPN blocking and other pointless security measures</li><li>Alternative YouTube clients for privacy (GrayJay and NewPipe)</li></ol><p><strong>Show Links:</strong></p><ul><li>Matrix Community - <a href="https://matrix.to/#/#psysecure:matrix.org">https://matrix.to/#/#psysecure:matrix.org</a></li><li>CTF Challenge - <a href="https://psysecure.com/ctf">https://psysecure.com/ctf</a></li><li>GrayJay (by Futo) - <a href="https://grayjay.app">https://grayjay.app</a></li><li>NewPipe - <a href="https://newpipe.net">https://newpipe.net</a></li><li>WiFi Pineapple - <a href="https://shop.hak5.org/products/wifi-pineapple">https://shop.hak5.org/products/wifi-pineapple</a></li><li>System76 Laptops - <a href="https://system76.com/laptops">https://system76.com/laptops</a></li><li>Little Snitch (macOS Firewall) - <a href="https://www.obdev.at/products/littlesnitch/">https://www.obdev.at/products/littlesnitch/</a></li></ul>“I hope for nothing. I fear nothing. I am free.”<p><em>- Nikos Kazantzakis</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 13 Jun 2025 19:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/ceb660dc/b3c4db80.mp3" length="31907432" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2656</itunes:duration>
      <itunes:summary>In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense &amp;amp; Security Framework progress, and rant about security theater at airports and online services that block VPNs. In this week’s episode: Apple’s $95 million lawsuit and the ecosystem lock-in problemWhy people overshare on social media and how OSINT can exp...</itunes:summary>
      <itunes:subtitle>In this episode, I discuss breaking free from the Apple ecosystem, the dangers of social media oversharing, and introduce our new Matrix community. I also cover the upcoming capture the flag challenge, share thoughts on the OSINT Defense &amp;amp; Security Fr</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>026 - Ghost in the Source (Announcement)</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>026 - Ghost in the Source (Announcement)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-17258301</guid>
      <link>https://share.transistor.fm/s/d720c826</link>
      <description>
        <![CDATA[<p>In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subscription voucher. I also provide an update on our new Matrix community.</p><p><strong>In this week’s episode:</strong></p><ol><li>Announcing the “Ghost in the Source” CTF challenge</li><li>Challenge details and rules</li><li>Prize information: 3 x 6-month TryHackMe vouchers!</li><li>Matrix community update for listener interaction</li><li>Future plans for OSINT CTF challenges</li></ol><p><strong>Show Links:</strong></p><ul><li>CTF Challenge Page - <a href="https://psysecure.com/ctf/">https://psysecure.com/ctf/</a></li></ul>“When I float weightless back to the surface, I’m imagining I’m becoming someone else.”<p><em>- Motoko Kusanagi</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subscription voucher. I also provide an update on our new Matrix community.</p><p><strong>In this week’s episode:</strong></p><ol><li>Announcing the “Ghost in the Source” CTF challenge</li><li>Challenge details and rules</li><li>Prize information: 3 x 6-month TryHackMe vouchers!</li><li>Matrix community update for listener interaction</li><li>Future plans for OSINT CTF challenges</li></ol><p><strong>Show Links:</strong></p><ul><li>CTF Challenge Page - <a href="https://psysecure.com/ctf/">https://psysecure.com/ctf/</a></li></ul>“When I float weightless back to the surface, I’m imagining I’m becoming someone else.”<p><em>- Motoko Kusanagi</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Sat, 31 May 2025 13:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/d720c826/673f16a1.mp3" length="5496330" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>455</itunes:duration>
      <itunes:summary>In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subscription voucher. I also provide an update on our new Matrix community. In this week’s episode: Announcing the “Ghost in the Source” CTF challengeChallenge details and rulesPrize information: 3 x 6-month TryHackMe vouchers!Matrix community up...</itunes:summary>
      <itunes:subtitle>In this brief episode between travels, I announce the “Ghost in the Source” capture the flag challenge, a cryptographic hunt on my website starting June 21st, 2025. At the end of June I will pick 3 lucky winners which will receive a 6-month TryHackMe subs</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>025 - AI Privacy Concerns with ChatGPT and Claude</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>025 - AI Privacy Concerns with ChatGPT and Claude</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-17223140</guid>
      <link>https://share.transistor.fm/s/e91eb606</link>
      <description>
        <![CDATA[<p>In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little Snitch, and the potential of System76 Linux laptops.</p><p><strong>In this week’s episode:</strong></p><ol><li>Privacy comparison between ChatGPT and Claude AI apps</li><li>ChatGPT’s audio recording storage and data export concerns</li><li>GrapheneOS setup without Google Play Store login</li><li>Using FUTO Keyboard and FUTO Voice for local transcription</li><li>Essential privacy tools: SimpleWall for Windows and Little Snitch for macOS</li><li>Windows Subsystem for Linux (WSL) for developers</li><li>System76 Linux laptops as a privacy-focused alternative</li></ol><p><strong>Show Links:</strong></p><ul><li>Anthropic Claude.ai Encryption - <a href="https://privacy.anthropic.com/en/articles/10458704-how-does-anthropic-protect-the-personal-data-of-claude-ai-users">https://privacy.anthropic.com/en/articles/10458704...</a></li><li>Duck.ai - <a href="https://duck.ai">https://duck.ai</a></li><li>Futo Keyboard &amp; Voice - <a href="https://futo.org/">https://futo.org/</a></li><li>Aurora Store - <a href="https://auroraoss.com/aurora-store">https://auroraoss.com/aurora-store</a></li><li>SimpleWall (Windows Firewall) - <a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a></li><li>Little Snitch (macOS) - <a href="https://www.obdev.at/products/littlesnitch/">https://www.obdev.at/products/littlesnitch/</a></li><li>GeoSpy (OSINT Tool) - <a href="https://geospy.net">https://geospy.net</a></li><li>System76 Linux Laptops - <a href="https://system76.com/">https://system76.com/</a></li><li>Mental Outlaw YouTube Channel - <a href="https://www.youtube.com/@MentalOutlaw">https://www.youtube.com/@MentalOutlaw</a></li><li>DaVinci Resolve - <a href="https://www.blackmagicdesign.com/products/davinciresolve">https://www.blackmagicdesign.com/products/davinciresolve</a></li><li>OSINT Defense &amp; Security Framework - <a href="https://psysecure.com/services/odsf/">https://psysecure.com/services/odsf/</a></li></ul>“██████REDACTED███”<p><em>- █████████</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little Snitch, and the potential of System76 Linux laptops.</p><p><strong>In this week’s episode:</strong></p><ol><li>Privacy comparison between ChatGPT and Claude AI apps</li><li>ChatGPT’s audio recording storage and data export concerns</li><li>GrapheneOS setup without Google Play Store login</li><li>Using FUTO Keyboard and FUTO Voice for local transcription</li><li>Essential privacy tools: SimpleWall for Windows and Little Snitch for macOS</li><li>Windows Subsystem for Linux (WSL) for developers</li><li>System76 Linux laptops as a privacy-focused alternative</li></ol><p><strong>Show Links:</strong></p><ul><li>Anthropic Claude.ai Encryption - <a href="https://privacy.anthropic.com/en/articles/10458704-how-does-anthropic-protect-the-personal-data-of-claude-ai-users">https://privacy.anthropic.com/en/articles/10458704...</a></li><li>Duck.ai - <a href="https://duck.ai">https://duck.ai</a></li><li>Futo Keyboard &amp; Voice - <a href="https://futo.org/">https://futo.org/</a></li><li>Aurora Store - <a href="https://auroraoss.com/aurora-store">https://auroraoss.com/aurora-store</a></li><li>SimpleWall (Windows Firewall) - <a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a></li><li>Little Snitch (macOS) - <a href="https://www.obdev.at/products/littlesnitch/">https://www.obdev.at/products/littlesnitch/</a></li><li>GeoSpy (OSINT Tool) - <a href="https://geospy.net">https://geospy.net</a></li><li>System76 Linux Laptops - <a href="https://system76.com/">https://system76.com/</a></li><li>Mental Outlaw YouTube Channel - <a href="https://www.youtube.com/@MentalOutlaw">https://www.youtube.com/@MentalOutlaw</a></li><li>DaVinci Resolve - <a href="https://www.blackmagicdesign.com/products/davinciresolve">https://www.blackmagicdesign.com/products/davinciresolve</a></li><li>OSINT Defense &amp; Security Framework - <a href="https://psysecure.com/services/odsf/">https://psysecure.com/services/odsf/</a></li></ul>“██████REDACTED███”<p><em>- █████████</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 26 May 2025 07:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/e91eb606/9a29f7aa.mp3" length="27827281" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2316</itunes:duration>
      <itunes:summary>In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also cover my daily app setup, Windows telemetry blocking with SimpleWall, macOS privacy with Little Snitch, and the potential of System76 Linux laptops. In this week’s episode: Privacy comparison between ChatGPT and Claude AI appsChatGPT’s audio re...</itunes:summary>
      <itunes:subtitle>In this episode, I explore the privacy implications of using AI apps like ChatGPT and Claude on mobile devices. I discuss why ChatGPT’s requirement for Google Play Store login and audio recording storage led me to Claude on my GrapheneOS device. I also co</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>024 - Minimize What Can Be Known with the OSINT Defense &amp; Security Framework (OSDF)</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>024 - Minimize What Can Be Known with the OSINT Defense &amp; Security Framework (OSDF)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-17148899</guid>
      <link>https://share.transistor.fm/s/6a04a7a4</link>
      <description>
        <![CDATA[<p>In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating separate online identities.</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>In this week’s episode:</strong></p><ol><li>Introducing the Open Source Intelligence Defense and Security Framework (ODSF)</li><li>Browser privacy comparisons (Firefox, LibreWolf, Brave, Mulvad)</li><li>Experiences with Waymo autonomous taxis and privacy considerations</li><li>TSA security cameras and opting out of facial recognition</li><li>Listener questions about anonymous SIMs in Australia and creating sock puppet accounts</li><li>Using cryptocurrency</li></ol><p><strong>Show Links:</strong></p><ul><li>BIP39 Generator - <a href="https://github.com/iancoleman/bip39">https://github.com/iancoleman/bip39</a></li><li>Phoenix Wallet - <a href="https://phoenix.acinq.co">https://phoenix.acinq.co</a></li><li>Zeus Wallet - <a href="https://zeusln.com">https://zeusln.com</a></li><li>LibreWolf Browser - <a href="https://librewolf.net/">https://librewolf.net/</a></li><li>OSS Document Scanner (GrapheneOS) - <a href="https://github.com/Akylas/OSS-DocumentScanner">https://github.com/Akylas/OSS-DocumentScanner</a></li><li>Mullvad Browser (randomDataOnCanvasExtract) - <a href="https://github.com/mullvad/mullvad-browser/issues/358">https://github.com/mullvad/mullvad-browser/issues/358</a></li><li>Mullvad Browser (Letterboxing) - <a href="https://github.com/mullvad/mullvad-browser/issues/152">https://github.com/mullvad/mullvad-browser/issues/152</a></li></ul>“Minimize what can be known.”<p><em>- Me</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating separate online identities.</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>In this week’s episode:</strong></p><ol><li>Introducing the Open Source Intelligence Defense and Security Framework (ODSF)</li><li>Browser privacy comparisons (Firefox, LibreWolf, Brave, Mulvad)</li><li>Experiences with Waymo autonomous taxis and privacy considerations</li><li>TSA security cameras and opting out of facial recognition</li><li>Listener questions about anonymous SIMs in Australia and creating sock puppet accounts</li><li>Using cryptocurrency</li></ol><p><strong>Show Links:</strong></p><ul><li>BIP39 Generator - <a href="https://github.com/iancoleman/bip39">https://github.com/iancoleman/bip39</a></li><li>Phoenix Wallet - <a href="https://phoenix.acinq.co">https://phoenix.acinq.co</a></li><li>Zeus Wallet - <a href="https://zeusln.com">https://zeusln.com</a></li><li>LibreWolf Browser - <a href="https://librewolf.net/">https://librewolf.net/</a></li><li>OSS Document Scanner (GrapheneOS) - <a href="https://github.com/Akylas/OSS-DocumentScanner">https://github.com/Akylas/OSS-DocumentScanner</a></li><li>Mullvad Browser (randomDataOnCanvasExtract) - <a href="https://github.com/mullvad/mullvad-browser/issues/358">https://github.com/mullvad/mullvad-browser/issues/358</a></li><li>Mullvad Browser (Letterboxing) - <a href="https://github.com/mullvad/mullvad-browser/issues/152">https://github.com/mullvad/mullvad-browser/issues/152</a></li></ul>“Minimize what can be known.”<p><em>- Me</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Tue, 13 May 2025 07:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/6a04a7a4/74292c18.mp3" length="30516289" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2540</itunes:duration>
      <itunes:summary>In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and managing cryptocurrency. I also address listener questions about anonymous SIM cards and creating separate online identities. Official Website: https://psysecure.com In this week’s episode: Introducing the Open Source Intelligence Defense and Sec...</itunes:summary>
      <itunes:subtitle>In this episode, I discuss what has been keeping me away from the mic, the Open Source Intelligence Defense and Security Framework (ODSF), and share updates on privacy topics including browser security, autonomous taxis, airport security cameras, and mana</itunes:subtitle>
      <itunes:keywords>privacy, security, cybersecurity, online privacy, threat modeling, privacy tools</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>023 - Apple Removes ADP in the UK, the Privacy Implications and Listener Q&amp;A</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>023 - Apple Removes ADP in the UK, the Privacy Implications and Listener Q&amp;A</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16676979</guid>
      <link>https://share.transistor.fm/s/ed46aafa</link>
      <description>
        <![CDATA[<p>In this episode, we dive into Apple’s latest privacy retreat with the removal of Advanced Data Protection (ADP) for iCloud in the UK. We break down why Apple made this move, how ADP works, and what it means for users who care about encryption and data security. If you’re in the UK and using Apple’s ecosystem, this episode is a must-listen as I cover strategies to keep your data secure despite Apple’s decision.</p><p><strong>In this week’s episode:</strong></p><ol><li>The UK’s Investigatory Powers Act</li><li>A technical breakdown of how iCloud ADP was supposed to protect user data.</li><li>Alternatives to iCloud, including Nextcloud, GrapheneOS, and secure backups.</li><li>Threat Modeling &amp; The Privacy Spectrum</li><li>Listener Questions, addressing concerns about online privacy, social media exposure, and what to do when friends dismiss security risks.</li></ol><p><strong>Show Links:</strong></p><ul><li>Apple pulls data protection tool (BBC News) - <a href="https://www.bbc.com/news/articles/cgj54eq4vejo">https://www.bbc.com/news/articles/cgj54eq4vejo</a></li><li>Apple Intelligence - <a href="https://www.macrumors.com/2025/02/11/apple-intelligence-re-enabled-in-latest-updates/">https://www.macrumors.com/2025/02/11/apple-intelligence-re-enabled-in-latest-updates/</a></li><li>pfSense Guide - <a href="https://psysecure.com/complete-setup-guide-to-pfSense">https://psysecure.com/complete-setup-guide-to-pfSense</a></li><li>Nextcloud Guide - <a href="https://psysecure.com/self-hosting-nextlcoud">https://psysecure.com/self-hosting-nextlcoud</a></li><li>Möbius Sync - <a href="https://mobiussync.com/">https://mobiussync.com/</a></li><li>Obsidian - <a href="https://obsidian.md/">https://obsidian.md/</a></li></ul>“The right to privacy is not merely a right to secrecy. It is a right to control information about oneself.”<p><em>- Anonymous</em></p><p><strong>Podcast music:</strong> The R3cluse</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we dive into Apple’s latest privacy retreat with the removal of Advanced Data Protection (ADP) for iCloud in the UK. We break down why Apple made this move, how ADP works, and what it means for users who care about encryption and data security. If you’re in the UK and using Apple’s ecosystem, this episode is a must-listen as I cover strategies to keep your data secure despite Apple’s decision.</p><p><strong>In this week’s episode:</strong></p><ol><li>The UK’s Investigatory Powers Act</li><li>A technical breakdown of how iCloud ADP was supposed to protect user data.</li><li>Alternatives to iCloud, including Nextcloud, GrapheneOS, and secure backups.</li><li>Threat Modeling &amp; The Privacy Spectrum</li><li>Listener Questions, addressing concerns about online privacy, social media exposure, and what to do when friends dismiss security risks.</li></ol><p><strong>Show Links:</strong></p><ul><li>Apple pulls data protection tool (BBC News) - <a href="https://www.bbc.com/news/articles/cgj54eq4vejo">https://www.bbc.com/news/articles/cgj54eq4vejo</a></li><li>Apple Intelligence - <a href="https://www.macrumors.com/2025/02/11/apple-intelligence-re-enabled-in-latest-updates/">https://www.macrumors.com/2025/02/11/apple-intelligence-re-enabled-in-latest-updates/</a></li><li>pfSense Guide - <a href="https://psysecure.com/complete-setup-guide-to-pfSense">https://psysecure.com/complete-setup-guide-to-pfSense</a></li><li>Nextcloud Guide - <a href="https://psysecure.com/self-hosting-nextlcoud">https://psysecure.com/self-hosting-nextlcoud</a></li><li>Möbius Sync - <a href="https://mobiussync.com/">https://mobiussync.com/</a></li><li>Obsidian - <a href="https://obsidian.md/">https://obsidian.md/</a></li></ul>“The right to privacy is not merely a right to secrecy. It is a right to control information about oneself.”<p><em>- Anonymous</em></p><p><strong>Podcast music:</strong> The R3cluse</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/ed46aafa/893d613c.mp3" length="22067335" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1836</itunes:duration>
      <itunes:summary>In this episode, we dive into Apple’s latest privacy retreat with the removal of Advanced Data Protection (ADP) for iCloud in the UK. We break down why Apple made this move, how ADP works, and what it means for users who care about encryption and data security. If you’re in the UK and using Apple’s ecosystem, this episode is a must-listen as I cover strategies to keep your data secure despite Apple’s decision. In this week’s episode: The UK’s Investigatory Powers ActA technical breakdown of h...</itunes:summary>
      <itunes:subtitle>In this episode, we dive into Apple’s latest privacy retreat with the removal of Advanced Data Protection (ADP) for iCloud in the UK. We break down why Apple made this move, how ADP works, and what it means for users who care about encryption and data sec</itunes:subtitle>
      <itunes:keywords>privacy, security, Apple ADP, iCloud encryption, end-to-end encryption, Apple privacy, iCloud security, government surveillance, data protection, encryption backdoor, cybersecurity, online privacy, threat modeling, privacy tools, Apple compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>022 - Deep Dive into Session Private Messenger with Co-Founder Kee Jefferys</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>022 - Deep Dive into Session Private Messenger with Co-Founder Kee Jefferys</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16528655</guid>
      <link>https://share.transistor.fm/s/2e8531ac</link>
      <description>
        <![CDATA[<p>In this week’s episode, we take a deep dive into Session, a private messaging app, with its co-founder Kee Jefferys. We discuss the philosophy behind Session, its technical architecture, and the broader implications of privacy in a world increasingly hostile to anonymous communication. Kee shares insights on the importance of decentralized networks, the risks of phone number-based messaging, and the role of cryptocurrency in supporting private infrastructure.</p><p>We also touch on operational security (OPSEC), the real-world challenges of getting people to adopt privacy tools, and how Session is working to improve usability while maintaining strong privacy protections.</p><p><strong>In this week’s episode:</strong></p><ol><li>Session Private Messenger – Kee Jefferys explains the origins of Session, its core principles, and how it differs from mainstream messaging apps.</li><li>The Future of Privacy – Discussion on surveillance, government censorship, and the increasing crackdown on privacy tools.</li><li>Decentralized Messaging – How Session uses a global network of nodes to provide anonymous and resilient communication.</li><li>Session Pro &amp; Sustainability – Monetization strategies for Session and how the network sustains itself without compromising user privacy.</li><li>Avoiding the Privacy Valley of Despair – How privacy-conscious users can avoid burnout and find a practical balance.</li><li>Censorship &amp; Government Interference – Addressing Russia’s blocking of Session nodes and strategies to bypass censorship.</li></ol><p><strong>Show Links:</strong></p><ul><li>Download Session - <a href="https://getsession.org">https://getsession.org</a></li><li>Session Lite Paper - <a href="https://getsession.org/litepaper">https://getsession.org/litepaper</a></li><li>Support the Show on Patreon - <a href="https://patreon.com/TheLockdown">https://patreon.com/TheLockdown</a></li><li>Follow Kee on X - <a href="https://x.com/JefferysKee">https://x.com/JefferysKee</a></li></ul>Until they become conscious they will never rebel, and until after they have rebelled they cannot become conscious.<p><em>- George Orwell, 1984</em></p><p><strong>Podcast music:</strong> The R3cluse</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week’s episode, we take a deep dive into Session, a private messaging app, with its co-founder Kee Jefferys. We discuss the philosophy behind Session, its technical architecture, and the broader implications of privacy in a world increasingly hostile to anonymous communication. Kee shares insights on the importance of decentralized networks, the risks of phone number-based messaging, and the role of cryptocurrency in supporting private infrastructure.</p><p>We also touch on operational security (OPSEC), the real-world challenges of getting people to adopt privacy tools, and how Session is working to improve usability while maintaining strong privacy protections.</p><p><strong>In this week’s episode:</strong></p><ol><li>Session Private Messenger – Kee Jefferys explains the origins of Session, its core principles, and how it differs from mainstream messaging apps.</li><li>The Future of Privacy – Discussion on surveillance, government censorship, and the increasing crackdown on privacy tools.</li><li>Decentralized Messaging – How Session uses a global network of nodes to provide anonymous and resilient communication.</li><li>Session Pro &amp; Sustainability – Monetization strategies for Session and how the network sustains itself without compromising user privacy.</li><li>Avoiding the Privacy Valley of Despair – How privacy-conscious users can avoid burnout and find a practical balance.</li><li>Censorship &amp; Government Interference – Addressing Russia’s blocking of Session nodes and strategies to bypass censorship.</li></ol><p><strong>Show Links:</strong></p><ul><li>Download Session - <a href="https://getsession.org">https://getsession.org</a></li><li>Session Lite Paper - <a href="https://getsession.org/litepaper">https://getsession.org/litepaper</a></li><li>Support the Show on Patreon - <a href="https://patreon.com/TheLockdown">https://patreon.com/TheLockdown</a></li><li>Follow Kee on X - <a href="https://x.com/JefferysKee">https://x.com/JefferysKee</a></li></ul>Until they become conscious they will never rebel, and until after they have rebelled they cannot become conscious.<p><em>- George Orwell, 1984</em></p><p><strong>Podcast music:</strong> The R3cluse</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 03 Feb 2025 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/2e8531ac/56905f78.mp3" length="50608093" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>4214</itunes:duration>
      <itunes:summary>In this week’s episode, we take a deep dive into Session, a private messaging app, with its co-founder Kee Jefferys. We discuss the philosophy behind Session, its technical architecture, and the broader implications of privacy in a world increasingly hostile to anonymous communication. Kee shares insights on the importance of decentralized networks, the risks of phone number-based messaging, and the role of cryptocurrency in supporting private infrastructure. We also touch on operational secu...</itunes:summary>
      <itunes:subtitle>In this week’s episode, we take a deep dive into Session, a private messaging app, with its co-founder Kee Jefferys. We discuss the philosophy behind Session, its technical architecture, and the broader implications of privacy in a world increasingly host</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>021 - Digital Minimalism and Why Your Messages Aren't Really Private</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>021 - Digital Minimalism and Why Your Messages Aren't Really Private</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16461742</guid>
      <link>https://share.transistor.fm/s/c96485f1</link>
      <description>
        <![CDATA[<p>In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously collecting vast amounts of personal data.</p><p>The episode also tackles the technical aspects of email systems to the limitations of encrypted messaging apps, providing practical advice for maintaining privacy.</p><p><br><strong>In this week's episode:</strong></p><ol><li>Listener Questions - Deep dive into pfSense vs OPNsense, mobile VPN usage, and dealing with license plate readers</li><li>Social Media Privacy - Analysis of social media's psychological impact and privacy issues with data collection practices</li><li>Proper Account Deletion - Step-by-step guide for securely deleting social media accounts</li><li>Sock Puppet Accounts - Maintaining anonymous online identities</li><li>Email Privacy - Historical perspective and current state of email security</li><li>WhatsApp Security - A discussion on encryption and device security</li></ol><p><br><strong>Show Links:</strong></p><ul><li>Support the Show on Patreon - <a href="https://patreon.com/TheLockdown">https://patreon.com/TheLockdown</a></li><li>GrapheneOS - <a href="https://grapheneos.org/">https://grapheneos.org</a></li><li>The Neuroscience of Engagement - <a href="https://medium.com/design-bootcamp/the-neuroscience-of-engagement-b50531a9313b">https://medium.com/design-bootcamp/the-neuroscience-of-engagement-b50531a9313b</a><p></p></li></ul><em>"The right information at the right time is deadlier than any weapon."</em><p><br><em>- Dolores Abernathy (Westworld)</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously collecting vast amounts of personal data.</p><p>The episode also tackles the technical aspects of email systems to the limitations of encrypted messaging apps, providing practical advice for maintaining privacy.</p><p><br><strong>In this week's episode:</strong></p><ol><li>Listener Questions - Deep dive into pfSense vs OPNsense, mobile VPN usage, and dealing with license plate readers</li><li>Social Media Privacy - Analysis of social media's psychological impact and privacy issues with data collection practices</li><li>Proper Account Deletion - Step-by-step guide for securely deleting social media accounts</li><li>Sock Puppet Accounts - Maintaining anonymous online identities</li><li>Email Privacy - Historical perspective and current state of email security</li><li>WhatsApp Security - A discussion on encryption and device security</li></ol><p><br><strong>Show Links:</strong></p><ul><li>Support the Show on Patreon - <a href="https://patreon.com/TheLockdown">https://patreon.com/TheLockdown</a></li><li>GrapheneOS - <a href="https://grapheneos.org/">https://grapheneos.org</a></li><li>The Neuroscience of Engagement - <a href="https://medium.com/design-bootcamp/the-neuroscience-of-engagement-b50531a9313b">https://medium.com/design-bootcamp/the-neuroscience-of-engagement-b50531a9313b</a><p></p></li></ul><em>"The right information at the right time is deadlier than any weapon."</em><p><br><em>- Dolores Abernathy (Westworld)</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 20 Jan 2025 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/c96485f1/492a8bf9.mp3" length="29878349" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2487</itunes:duration>
      <itunes:summary>In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously collecting vast amounts of personal data. The episode also tackles the technical aspects of email systems to the limitations of encrypted messaging apps, providing practical advice for maintaining privacy.  In this week's episode: Listener Q...</itunes:summary>
      <itunes:subtitle>In this week's episode we dive deep into both the psychological and privacy implications of social media apps. I reflect on my observations during recent travels, and explore how social media platforms are distorting human connections while simultaneously</itunes:subtitle>
      <itunes:keywords>privacy, social media, security, email security, GrapheneOS, WhatsApp, encryption, surveillance, OSINT, data protection, account security, sock puppets, digital privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>020 - The State of Privacy in 2025</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>020 - The State of Privacy in 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16386777</guid>
      <link>https://share.transistor.fm/s/f24fe703</link>
      <description>
        <![CDATA[<p>This week on The Lockdown, The Practical Privacy &amp; Security Podcast, we’re kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.</p><p><strong>In this week’s episode:</strong></p><ol><li>Reflecting on personal privacy practices and professional projects.</li><li>A look at U.S. state privacy regulations taking effect in 2025.</li><li>Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.</li><li>Detailed privacy settings for iOS and why GrapheneOS is the better alternative.</li><li>AI assistants like ChatGPT and Claude, and their risks.</li><li>Privacy concerns with vehicles, focusing on data leaks and constant surveillance.</li><li>The intersection of cybersecurity and OSINT in modern attacks.</li></ol><p><br><strong>Show Links:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/">Apple offers $95 million in Siri privacy violation settlement</a></li><li><a href="https://apnews.com/article/amazon-alexa-ring-doorbell-privacy-violations-ftc-971419109d7af10203d7ccfd28fcd0ad">Amazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring camera</a></li><li><a href="https://gitlab.com/Nulide/findmydevice">Nulide / FindMyDevice · GitLab</a></li><li><a href="https://www.ilfattoquotidiano.it/in-edicola/articoli/2025/01/02/british-journalist-could-face-years-in-prison-for-refusing-to-hand-over-his-passwords-to-the-police/7822432/">British journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto Quotidiano</a></li><li><a href="https://mashable.com/article/volkswagen-ev-data-leak">Volkswagen EV data leak exposes personal information of 3.3 million people</a></li><li><a href="https://www.yahoo.com/news/tesla-data-helped-police-las-234224985.html">Tesla data helped police after Las Vegas truck explosion, but experts have wider privacy concerns</a></li></ul><p><br><strong>Support this show:</strong> <a href="https://www.patreon.com/c/TheLockdown">https://www.patreon.com/c/TheLockdown</a><br><strong>Official website</strong>: <a href="https://psysecure.com/podcast/">https://psysecure.com/podcast/</a></p><p><em>"If you want to keep a secret, you must also hide it from yourself."</em><br><strong>-George Orwell</strong></p><p>Podcast music: The R3cluse </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on The Lockdown, The Practical Privacy &amp; Security Podcast, we’re kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individuals.</p><p><strong>In this week’s episode:</strong></p><ol><li>Reflecting on personal privacy practices and professional projects.</li><li>A look at U.S. state privacy regulations taking effect in 2025.</li><li>Privacy and security implications of voice assistants like Siri, Alexa, and Google Assistant.</li><li>Detailed privacy settings for iOS and why GrapheneOS is the better alternative.</li><li>AI assistants like ChatGPT and Claude, and their risks.</li><li>Privacy concerns with vehicles, focusing on data leaks and constant surveillance.</li><li>The intersection of cybersecurity and OSINT in modern attacks.</li></ol><p><br><strong>Show Links:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/apple-offers-95-million-in-siri-privacy-violation-settlement/">Apple offers $95 million in Siri privacy violation settlement</a></li><li><a href="https://apnews.com/article/amazon-alexa-ring-doorbell-privacy-violations-ftc-971419109d7af10203d7ccfd28fcd0ad">Amazon to pay $31 million in privacy violation penalties for Alexa voice assistant and Ring camera</a></li><li><a href="https://gitlab.com/Nulide/findmydevice">Nulide / FindMyDevice · GitLab</a></li><li><a href="https://www.ilfattoquotidiano.it/in-edicola/articoli/2025/01/02/british-journalist-could-face-years-in-prison-for-refusing-to-hand-over-his-passwords-to-the-police/7822432/">British journalist could face years in prison for refusing to hand over his passwords to the police - Il Fatto Quotidiano</a></li><li><a href="https://mashable.com/article/volkswagen-ev-data-leak">Volkswagen EV data leak exposes personal information of 3.3 million people</a></li><li><a href="https://www.yahoo.com/news/tesla-data-helped-police-las-234224985.html">Tesla data helped police after Las Vegas truck explosion, but experts have wider privacy concerns</a></li></ul><p><br><strong>Support this show:</strong> <a href="https://www.patreon.com/c/TheLockdown">https://www.patreon.com/c/TheLockdown</a><br><strong>Official website</strong>: <a href="https://psysecure.com/podcast/">https://psysecure.com/podcast/</a></p><p><em>"If you want to keep a secret, you must also hide it from yourself."</em><br><strong>-George Orwell</strong></p><p>Podcast music: The R3cluse </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 06 Jan 2025 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/f24fe703/66446e3f.mp3" length="41681657" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3471</itunes:duration>
      <itunes:summary>This week on The Lockdown, The Practical Privacy &amp;amp; Security Podcast, we’re kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants and their potential privacy pitfalls, this episode covers practical advice, insights, and solutions for everyday users. Additionally, I explore new state-level privacy laws across the U.S. and what they mean for both businesses and individua...</itunes:summary>
      <itunes:subtitle>This week on The Lockdown, The Practical Privacy &amp;amp; Security Podcast, we’re kicking off the new year with reflections, updates, and a deep dive into key privacy issues that are shaping 2025. From privacy settings on iOS and GrapheneOS, to AI assistants</itunes:subtitle>
      <itunes:keywords>privacy, cybersecurity, GrapheneOS, CISO, surveillance, Apple, data leak</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>019 - A Conversation with Luke Mulks from Brave Software</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>019 - A Conversation with Luke Mulks from Brave Software</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16159602</guid>
      <link>https://share.transistor.fm/s/bbb5ec3c</link>
      <description>
        <![CDATA[<p>In this episode I speak with Luke Mulks, who is the VP of Business Operations at Brave Software. We discuss the privacy concerns over traditional web-based ads, and why Brave is offering a privacy-first alternative. <strong></strong></p><p>Show Links:</p><ul><li>Brave Software:  <a href="https://brave.com/podcast/">https://brave.com/podcast/ </a></li><li>The Brave Technologist Podcast: <a href="https://brave.com/podcast/">https://brave.com/podcast/</a></li></ul><p>"Well who's gonna monitor the monitors of the monitors?" - Carla Dean (Enemy of the State)</p><p><strong>Podcast music:</strong> Recluse by Ray Heffer  </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode I speak with Luke Mulks, who is the VP of Business Operations at Brave Software. We discuss the privacy concerns over traditional web-based ads, and why Brave is offering a privacy-first alternative. <strong></strong></p><p>Show Links:</p><ul><li>Brave Software:  <a href="https://brave.com/podcast/">https://brave.com/podcast/ </a></li><li>The Brave Technologist Podcast: <a href="https://brave.com/podcast/">https://brave.com/podcast/</a></li></ul><p>"Well who's gonna monitor the monitors of the monitors?" - Carla Dean (Enemy of the State)</p><p><strong>Podcast music:</strong> Recluse by Ray Heffer  </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 13 Dec 2024 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/bbb5ec3c/575a6cc9.mp3" length="44485371" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3704</itunes:duration>
      <itunes:summary>In this episode I speak with Luke Mulks, who is the VP of Business Operations at Brave Software. We discuss the privacy concerns over traditional web-based ads, and why Brave is offering a privacy-first alternative.   Show Links: Brave Software:  https://brave.com/podcast/ The Brave Technologist Podcast: https://brave.com/podcast/"Well who's gonna monitor the monitors of the monitors?" - Carla Dean (Enemy of the State)  Podcast music: Recluse by Ray Heffer   Official Website: h...</itunes:summary>
      <itunes:subtitle>In this episode I speak with Luke Mulks, who is the VP of Business Operations at Brave Software. We discuss the privacy concerns over traditional web-based ads, and why Brave is offering a privacy-first alternative.   Show Links: Brave Software:  https://</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>018 - Back to the Basics and not Overthinking Privacy</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>018 - Back to the Basics and not Overthinking Privacy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-16159622</guid>
      <link>https://share.transistor.fm/s/5fdb6490</link>
      <description>
        <![CDATA[<p>In this episode, we go back to the basics as I discuss what I would do today if I were starting from scratch. It begins with deleting social media accounts, especially Facebook. Additionally, we have an update from Optery in response to listener feedback.</p><p>We discuss tools like LibreWolf, Brave, and GrapheneOS, and compare privacy approaches for mobile devices, including Pixel and iPhone. A segment is dedicated to starting a privacy-first journey, from deleting social media accounts to adopting secure communication and password management practices. The episode also touches on how AI, including large language models (LLMs), is reshaping privacy concerns by building highly accurate profiles of users.</p><p><strong>In this week’s episode:</strong></p><ul><li>Don't overthink privacy, especially web browsers with Brave, Firefox, and LibreWolf</li><li>Back to the basics starting with deleting social media</li><li>Pixel vs iPhone (GrapheneOS)</li></ul><p><strong>Show Links:</strong></p><ul><li>Self-hosting Nextcloud: <a href="https://psysecure.com/self-hosting-nextlcoud">https://psysecure.com/self-hosting-nextlcoud</a></li><li>LibreWolf: <a href="https://librewolf.net/">https://librewolf.net/</a></li><li>GrapheneOS: <a href="https://grapheneos.org/">https://grapheneos.org/</a></li><li>Meta fined $1.3b: <a href="https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html">https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html</a></li><li>Surveillance Watch: <a href="https://www.surveillancewatch.io/">https://www.surveillancewatch.io/</a></li></ul><p><strong><br>"</strong>The world outside, the world that you know, it’s gone. It doesn’t exist." <br><strong>– Christof </strong></p><p>Podcast music: Recluse by Ray Heffer  </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we go back to the basics as I discuss what I would do today if I were starting from scratch. It begins with deleting social media accounts, especially Facebook. Additionally, we have an update from Optery in response to listener feedback.</p><p>We discuss tools like LibreWolf, Brave, and GrapheneOS, and compare privacy approaches for mobile devices, including Pixel and iPhone. A segment is dedicated to starting a privacy-first journey, from deleting social media accounts to adopting secure communication and password management practices. The episode also touches on how AI, including large language models (LLMs), is reshaping privacy concerns by building highly accurate profiles of users.</p><p><strong>In this week’s episode:</strong></p><ul><li>Don't overthink privacy, especially web browsers with Brave, Firefox, and LibreWolf</li><li>Back to the basics starting with deleting social media</li><li>Pixel vs iPhone (GrapheneOS)</li></ul><p><strong>Show Links:</strong></p><ul><li>Self-hosting Nextcloud: <a href="https://psysecure.com/self-hosting-nextlcoud">https://psysecure.com/self-hosting-nextlcoud</a></li><li>LibreWolf: <a href="https://librewolf.net/">https://librewolf.net/</a></li><li>GrapheneOS: <a href="https://grapheneos.org/">https://grapheneos.org/</a></li><li>Meta fined $1.3b: <a href="https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html">https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html</a></li><li>Surveillance Watch: <a href="https://www.surveillancewatch.io/">https://www.surveillancewatch.io/</a></li></ul><p><strong><br>"</strong>The world outside, the world that you know, it’s gone. It doesn’t exist." <br><strong>– Christof </strong></p><p>Podcast music: Recluse by Ray Heffer  </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 29 Nov 2024 07:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/5fdb6490/154e8ab4.mp3" length="35455566" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2952</itunes:duration>
      <itunes:summary>In this episode, we go back to the basics as I discuss what I would do today if I were starting from scratch. It begins with deleting social media accounts, especially Facebook. Additionally, we have an update from Optery in response to listener feedback.  We discuss tools like LibreWolf, Brave, and GrapheneOS, and compare privacy approaches for mobile devices, including Pixel and iPhone. A segment is dedicated to starting a privacy-first journey, from deleting social media accounts to adopti...</itunes:summary>
      <itunes:subtitle>In this episode, we go back to the basics as I discuss what I would do today if I were starting from scratch. It begins with deleting social media accounts, especially Facebook. Additionally, we have an update from Optery in response to listener feedback.</itunes:subtitle>
      <itunes:keywords>privacy,security,cybersecurity,meta,facebook</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>017 - Privacy During a Natural Disaster, Self-Hosting Nextcloud, Backblaze B2 &amp; Restic, and Farewell Firefox</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>017 - Privacy During a Natural Disaster, Self-Hosting Nextcloud, Backblaze B2 &amp; Restic, and Farewell Firefox</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15906561</guid>
      <link>https://share.transistor.fm/s/f12ab6f9</link>
      <description>
        <![CDATA[<p>In this episode, recorded on October 10, 2024, I dive into privacy and security during natural disasters, highlighting essential tools like iOS 18’s satellite messaging and Starlink for maintaining communication when traditional systems fail. Next I dive into self-hosting in depth, particularly focusing on Nextcloud for privacy-conscious file sync. The episode concludes with a detailed analysis of a critical vulnerability in Firefox and the merits of switching to LibreWolf for enhanced privacy and security.</p><p><strong>In this week’s episode:</strong></p><ol><li>Privacy During Natural Disasters. Using of iOS 18’s satellite communication features for emergency contact, Starlink for off-grid internet access, and the importance of internet and Sudo phone numbers for safety without compromising privacy.</li><li>Bug out bags for emergency preparedness, the utility of Starlink and satellite phones for privacy in disaster zones.</li><li>Overview of the blog post on hosting Nextcloud, importance of cloud backups using Backblaze B2 and Restic, encrypting backups and maintaining data privacy within home networks.</li><li>Other Privacy Tools and Practices, including Blue Iris for managing surveillance cameras without internet access, use of Proxmox for virtual machines and running DNS servers with PiHole.</li><li>Analysis of the Firefox vulnerability (CVE 2024-9680), discussion on the benefits of LibreWolf as a more private alternative to Firefox.</li></ol><p><strong>Show Links:</strong></p><ul><li>Self-hosting Nextcloud - <a href="https://www.psysecure.com/self-hosting-nextlcoud">https://www.psysecure.com/self-hosting-nextlcoud</a></li><li>Starlink - <a href="https://www.starlink.com/">https://www.starlink.com/</a></li><li>Backblaze B2 - <a href="https://www.backblaze.com/cloud-storage">https://www.backblaze.com/cloud-storage</a></li><li>Restic FAQ - <a href="https://restic.readthedocs.io/en/latest/faq.html">https://restic.readthedocs.io/en/latest/faq.html</a></li><li>Nextcloud End-to-End Encryption - <a href="https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html">https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html</a></li><li>Firefox Users Fingerprinted via Cached Intermediate HTTPS Certificates - <a href="https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/">https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/</a></li><li>Certificate issue causing add-ons to be disabled or fail to install - <a href="https://discourse.mozilla.org/t/fixed-certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047">https://discourse.mozilla.org/t/fixed-certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047</a></li><li>Firefox CVE 2024-9680 - <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/">https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/</a></li><li>LibreWolf - <a href="https://librewolf.net/">https://librewolf.net/</a></li></ul><p><br></p>All warfare is based on deception.<p><br><strong>- Sun Tzu</strong></p><p>Podcast music: Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, recorded on October 10, 2024, I dive into privacy and security during natural disasters, highlighting essential tools like iOS 18’s satellite messaging and Starlink for maintaining communication when traditional systems fail. Next I dive into self-hosting in depth, particularly focusing on Nextcloud for privacy-conscious file sync. The episode concludes with a detailed analysis of a critical vulnerability in Firefox and the merits of switching to LibreWolf for enhanced privacy and security.</p><p><strong>In this week’s episode:</strong></p><ol><li>Privacy During Natural Disasters. Using of iOS 18’s satellite communication features for emergency contact, Starlink for off-grid internet access, and the importance of internet and Sudo phone numbers for safety without compromising privacy.</li><li>Bug out bags for emergency preparedness, the utility of Starlink and satellite phones for privacy in disaster zones.</li><li>Overview of the blog post on hosting Nextcloud, importance of cloud backups using Backblaze B2 and Restic, encrypting backups and maintaining data privacy within home networks.</li><li>Other Privacy Tools and Practices, including Blue Iris for managing surveillance cameras without internet access, use of Proxmox for virtual machines and running DNS servers with PiHole.</li><li>Analysis of the Firefox vulnerability (CVE 2024-9680), discussion on the benefits of LibreWolf as a more private alternative to Firefox.</li></ol><p><strong>Show Links:</strong></p><ul><li>Self-hosting Nextcloud - <a href="https://www.psysecure.com/self-hosting-nextlcoud">https://www.psysecure.com/self-hosting-nextlcoud</a></li><li>Starlink - <a href="https://www.starlink.com/">https://www.starlink.com/</a></li><li>Backblaze B2 - <a href="https://www.backblaze.com/cloud-storage">https://www.backblaze.com/cloud-storage</a></li><li>Restic FAQ - <a href="https://restic.readthedocs.io/en/latest/faq.html">https://restic.readthedocs.io/en/latest/faq.html</a></li><li>Nextcloud End-to-End Encryption - <a href="https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html">https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html</a></li><li>Firefox Users Fingerprinted via Cached Intermediate HTTPS Certificates - <a href="https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/">https://www.bleepingcomputer.com/news/security/firefox-users-fingerprinted-via-cached-intermediate-https-certificates/</a></li><li>Certificate issue causing add-ons to be disabled or fail to install - <a href="https://discourse.mozilla.org/t/fixed-certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047">https://discourse.mozilla.org/t/fixed-certificate-issue-causing-add-ons-to-be-disabled-or-fail-to-install/39047</a></li><li>Firefox CVE 2024-9680 - <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/">https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/</a></li><li>LibreWolf - <a href="https://librewolf.net/">https://librewolf.net/</a></li></ul><p><br></p>All warfare is based on deception.<p><br><strong>- Sun Tzu</strong></p><p>Podcast music: Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 11 Oct 2024 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/f12ab6f9/9025fe74.mp3" length="40672747" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3386</itunes:duration>
      <itunes:summary>In this episode, recorded on October 10, 2024, I dive into privacy and security during natural disasters, highlighting essential tools like iOS 18’s satellite messaging and Starlink for maintaining communication when traditional systems fail. Next I dive into self-hosting in depth, particularly focusing on Nextcloud for privacy-conscious file sync. The episode concludes with a detailed analysis of a critical vulnerability in Firefox and the merits of switching to LibreWolf for enhanced privac...</itunes:summary>
      <itunes:subtitle>In this episode, recorded on October 10, 2024, I dive into privacy and security during natural disasters, highlighting essential tools like iOS 18’s satellite messaging and Starlink for maintaining communication when traditional systems fail. Next I dive </itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>016 - Privacy Discussion with Tyler from EasyOptOuts</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>016 - Privacy Discussion with Tyler from EasyOptOuts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15667014</guid>
      <link>https://share.transistor.fm/s/6f737993</link>
      <description>
        <![CDATA[<p>In this episode, we have a special guest, Tyler Murphy, co-founder of EasyOptOuts, a data removal service focused on helping people remove their personal information from publicly accessible people search sites. Tyler discusses the inspiration behind EasyOptOuts, the challenges of maintaining privacy in a world of constant data breaches, and offers insights into data removal from various brokers. This conversation is packed with advice for anyone looking to regain control over their online privacy.</p><p><strong><br>In this week’s episode:</strong></p><ol><li>Tyler shares how EasyOptOuts was founded, the challenges faced, and their mission to make data removal accessible.</li><li>Discussion on the widespread availability of personal data on people search sites and the complexities of removing it.</li><li>Insights into how EasyOptOuts automates data removal, and comparisons with manual removal processes.</li><li>The challenges posed by bot detection, CAPTCHAs, and deceptive removal processes that often require membership or payment.</li><li>The potential implications of data breaches, evolving bot detection, and the future of digital identity verification.</li><li>Tyler shares his own privacy techniques, including the use of VPNs, alias names, and minimizing data exposure online.</li><li>EasyOptOuts approach to scaling their service, future plans for business and family tiers, and their commitment to remaining a two-person operation.</li></ol><p><strong>Show Links</strong>:<br>EasyOptOuts - <a href="https://www.easyoptouts.com/">https://www.easyoptouts.com/</a></p>Imagine, then, this situation where we have the huge electronic intercommunication so that everybody is in touch with everybody else in such a way that it reveals their inmost thoughts, and there is no longer any individuality. No privacy. Everything you are, everything you think is revealed to everyone. - <strong><em>Alan Watts</em></strong><p><br><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we have a special guest, Tyler Murphy, co-founder of EasyOptOuts, a data removal service focused on helping people remove their personal information from publicly accessible people search sites. Tyler discusses the inspiration behind EasyOptOuts, the challenges of maintaining privacy in a world of constant data breaches, and offers insights into data removal from various brokers. This conversation is packed with advice for anyone looking to regain control over their online privacy.</p><p><strong><br>In this week’s episode:</strong></p><ol><li>Tyler shares how EasyOptOuts was founded, the challenges faced, and their mission to make data removal accessible.</li><li>Discussion on the widespread availability of personal data on people search sites and the complexities of removing it.</li><li>Insights into how EasyOptOuts automates data removal, and comparisons with manual removal processes.</li><li>The challenges posed by bot detection, CAPTCHAs, and deceptive removal processes that often require membership or payment.</li><li>The potential implications of data breaches, evolving bot detection, and the future of digital identity verification.</li><li>Tyler shares his own privacy techniques, including the use of VPNs, alias names, and minimizing data exposure online.</li><li>EasyOptOuts approach to scaling their service, future plans for business and family tiers, and their commitment to remaining a two-person operation.</li></ol><p><strong>Show Links</strong>:<br>EasyOptOuts - <a href="https://www.easyoptouts.com/">https://www.easyoptouts.com/</a></p>Imagine, then, this situation where we have the huge electronic intercommunication so that everybody is in touch with everybody else in such a way that it reveals their inmost thoughts, and there is no longer any individuality. No privacy. Everything you are, everything you think is revealed to everyone. - <strong><em>Alan Watts</em></strong><p><br><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 06 Sep 2024 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/6f737993/89bc57ec.mp3" length="48265491" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>4019</itunes:duration>
      <itunes:summary>In this episode, we have a special guest, Tyler Murphy, co-founder of EasyOptOuts, a data removal service focused on helping people remove their personal information from publicly accessible people search sites. Tyler discusses the inspiration behind EasyOptOuts, the challenges of maintaining privacy in a world of constant data breaches, and offers insights into data removal from various brokers. This conversation is packed with advice for anyone looking to regain control over their online pr...</itunes:summary>
      <itunes:subtitle>In this episode, we have a special guest, Tyler Murphy, co-founder of EasyOptOuts, a data removal service focused on helping people remove their personal information from publicly accessible people search sites. Tyler discusses the inspiration behind Easy</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>015 - NPD202401 (National Public Data Breach) and Windows 11</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>015 - NPD202401 (National Public Data Breach) and Windows 11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15666677</guid>
      <link>https://share.transistor.fm/s/8d153ed4</link>
      <description>
        <![CDATA[<p>In today’s show, I discuss the National Public Data (NPD) breach, which contains 2.7 billion records, including the social security numbers of US residents. I cover how to check if your SSN is part of the breach and emphasize the importance of setting up a credit freeze for yourself and your kids. I also explore some useful tools for searching large datasets and share my thoughts on a Reddit post.</p><p><strong>In this week's episode:</strong></p><ol><li>On the brink of giving up!</li><li>Using OnlyOffice as a Google Docs alternative</li><li>National Public Data (NPD) breach</li><li>Ripgrep (rg) and Silver Searcher (ag) tools for searching massive datasets</li><li>Credit freezes</li><li>Best efforts for Windows 11 privacy</li><li>ElevenTray, a useful utility to always show Windows 11 tray icons</li></ol><p><strong>Show Links:</strong><br>Simplewall - <a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a><br>ElevenTray - <a href="https://github.com/locksec/eleventray">https://github.com/locksec/eleventray</a><br>OnlyOffice - <a href="https://www.onlyoffice.com/">https://www.onlyoffice.com/</a><br>LibreOffice - <a href="https://www.libreoffice.org/">https://www.libreoffice.org/</a><br>Credit Freeze Guide - <a href="https://inteltechniques.com/freeze.html">https://inteltechniques.com/freeze.html</a></p><p><strong>Credit Freeze for Kids:</strong><br><strong>Equifax </strong>- <a href="https://www.equifax.com/personal/education/identity-theft/articles/-/learn/freezing-your-childs-credit-report-faq/">https://www.equifax.com/personal/education/identity-theft/articles/-/learn/freezing-your-childs-credit-report-faq/</a><br>(800)685-1111<br>Equifax Security Freeze, PO Box 105788, Atlanta, Georgia 30348</p><p><strong>Experian </strong>- <a href="https://www.experian.com/help/minor-request.html">https://www.experian.com/help/minor-request.html</a><br>(888)397-3742<br>Experian Security Freeze. PO Box 9554, Allen, TX 75013</p><p><strong>TransUnion </strong>- <a href="https://www.transunion.com/credit-freeze/credit-freeze-faq#freeze-other-minor-0">https://www.transunion.com/credit-freeze/credit-freeze-faq#freeze-other-minor-0</a><br>(888)909-8872<br>TransUnion, P.O. Box 380, Woodlyn, PA 19094</p><p><a href="https://www.transunion.com/credit-disputes/child-identity-theft-inquiry-form">https://www.transunion.com/credit-disputes/child-identity-theft-inquiry-form</a></p>&gt; I know why you're here, Neo. I know what you've been doing... why you hardly sleep, why you live alone, and why night after night, you sit by your computer. - <strong>Trinity (The Matrix)</strong><p><br><strong>Podcast music:</strong> Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s show, I discuss the National Public Data (NPD) breach, which contains 2.7 billion records, including the social security numbers of US residents. I cover how to check if your SSN is part of the breach and emphasize the importance of setting up a credit freeze for yourself and your kids. I also explore some useful tools for searching large datasets and share my thoughts on a Reddit post.</p><p><strong>In this week's episode:</strong></p><ol><li>On the brink of giving up!</li><li>Using OnlyOffice as a Google Docs alternative</li><li>National Public Data (NPD) breach</li><li>Ripgrep (rg) and Silver Searcher (ag) tools for searching massive datasets</li><li>Credit freezes</li><li>Best efforts for Windows 11 privacy</li><li>ElevenTray, a useful utility to always show Windows 11 tray icons</li></ol><p><strong>Show Links:</strong><br>Simplewall - <a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a><br>ElevenTray - <a href="https://github.com/locksec/eleventray">https://github.com/locksec/eleventray</a><br>OnlyOffice - <a href="https://www.onlyoffice.com/">https://www.onlyoffice.com/</a><br>LibreOffice - <a href="https://www.libreoffice.org/">https://www.libreoffice.org/</a><br>Credit Freeze Guide - <a href="https://inteltechniques.com/freeze.html">https://inteltechniques.com/freeze.html</a></p><p><strong>Credit Freeze for Kids:</strong><br><strong>Equifax </strong>- <a href="https://www.equifax.com/personal/education/identity-theft/articles/-/learn/freezing-your-childs-credit-report-faq/">https://www.equifax.com/personal/education/identity-theft/articles/-/learn/freezing-your-childs-credit-report-faq/</a><br>(800)685-1111<br>Equifax Security Freeze, PO Box 105788, Atlanta, Georgia 30348</p><p><strong>Experian </strong>- <a href="https://www.experian.com/help/minor-request.html">https://www.experian.com/help/minor-request.html</a><br>(888)397-3742<br>Experian Security Freeze. PO Box 9554, Allen, TX 75013</p><p><strong>TransUnion </strong>- <a href="https://www.transunion.com/credit-freeze/credit-freeze-faq#freeze-other-minor-0">https://www.transunion.com/credit-freeze/credit-freeze-faq#freeze-other-minor-0</a><br>(888)909-8872<br>TransUnion, P.O. Box 380, Woodlyn, PA 19094</p><p><a href="https://www.transunion.com/credit-disputes/child-identity-theft-inquiry-form">https://www.transunion.com/credit-disputes/child-identity-theft-inquiry-form</a></p>&gt; I know why you're here, Neo. I know what you've been doing... why you hardly sleep, why you live alone, and why night after night, you sit by your computer. - <strong>Trinity (The Matrix)</strong><p><br><strong>Podcast music:</strong> Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 30 Aug 2024 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/8d153ed4/cd0c2b9f.mp3" length="19678352" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1637</itunes:duration>
      <itunes:summary>In today’s show, I discuss the National Public Data (NPD) breach, which contains 2.7 billion records, including the social security numbers of US residents. I cover how to check if your SSN is part of the breach and emphasize the importance of setting up a credit freeze for yourself and your kids. I also explore some useful tools for searching large datasets and share my thoughts on a Reddit post. In this week's episode: On the brink of giving up!Using OnlyOffice as a Google Docs alternativeN...</itunes:summary>
      <itunes:subtitle>In today’s show, I discuss the National Public Data (NPD) breach, which contains 2.7 billion records, including the social security numbers of US residents. I cover how to check if your SSN is part of the breach and emphasize the importance of setting up </itunes:subtitle>
      <itunes:keywords>privacy,security,data breach</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
    </item>
    <item>
      <title>014 - Social Media, OPSEC for OSINT, and AI Security</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>014 - Social Media, OPSEC for OSINT, and AI Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15524813</guid>
      <link>https://share.transistor.fm/s/68fdbf8c</link>
      <description>
        <![CDATA[<p>This week I respond to a few listener questions, primarily around the use of social media as a privacy enthusiast. Love it or hate it, you can guess which camp I'm in, social media like LinkedIn has almost become a requirement for job searches, employers, and connecting with other professionals. I also touch on OPSEC for OSINT, a new talk track I am planning to present in the future. It's important for all of us to maintain better Operational Security (OPSEC). Finally, I share my latest blog post: Venturing into AI Security with Locally Hosted LLMs, and why locally hosted AI is essential for privacy.</p><p><strong>In this week's episode:</strong></p><ol><li>Redacting  ███ in your social media profiles</li><li>Minimizing the use of profile photos</li><li>Always assume private profiles are NEVER private</li><li>Addiction to social media and down regulation of the dopamine receptors</li><li>More on custom domains</li><li>Operational Security for OSINT professionals</li><li>Locally hosted LLMs for private AI</li><li>Data (PII) leakage with ChatGPT</li></ol><p><strong>Show Links:</strong></p><ul><li>ChatGPT Privacy Issue - <a href="https://www.nytimes.com/interactive/2023/12/22/technology/openai-chatgpt-privacy-exploit.html">https://www.nytimes.com/interactive/2023/12/22/technology/openai-chatgpt-privacy-exploit.html</a></li><li>Brain anatomy alterations associated with Social Networking addiction - <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5362930/">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5362930/</a></li><li>AI Security with Locally Hosted LLMs - <a href="https://lockdown.media/ai-security-with-llms">https://lockdown.media/ai-security-with-llms</a></li><li>Expired Domains - <a href="https://www.expireddomains.net/">https://www.expireddomains.net/</a></li><li>SimpleLogin - <a href="https://simplelogin.io/">https://simplelogin.io/</a></li></ul>Because you made a phone call.<p><br>- Brill (Enemy of the State)</p><p><strong>Podcast music:</strong> Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week I respond to a few listener questions, primarily around the use of social media as a privacy enthusiast. Love it or hate it, you can guess which camp I'm in, social media like LinkedIn has almost become a requirement for job searches, employers, and connecting with other professionals. I also touch on OPSEC for OSINT, a new talk track I am planning to present in the future. It's important for all of us to maintain better Operational Security (OPSEC). Finally, I share my latest blog post: Venturing into AI Security with Locally Hosted LLMs, and why locally hosted AI is essential for privacy.</p><p><strong>In this week's episode:</strong></p><ol><li>Redacting  ███ in your social media profiles</li><li>Minimizing the use of profile photos</li><li>Always assume private profiles are NEVER private</li><li>Addiction to social media and down regulation of the dopamine receptors</li><li>More on custom domains</li><li>Operational Security for OSINT professionals</li><li>Locally hosted LLMs for private AI</li><li>Data (PII) leakage with ChatGPT</li></ol><p><strong>Show Links:</strong></p><ul><li>ChatGPT Privacy Issue - <a href="https://www.nytimes.com/interactive/2023/12/22/technology/openai-chatgpt-privacy-exploit.html">https://www.nytimes.com/interactive/2023/12/22/technology/openai-chatgpt-privacy-exploit.html</a></li><li>Brain anatomy alterations associated with Social Networking addiction - <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5362930/">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5362930/</a></li><li>AI Security with Locally Hosted LLMs - <a href="https://lockdown.media/ai-security-with-llms">https://lockdown.media/ai-security-with-llms</a></li><li>Expired Domains - <a href="https://www.expireddomains.net/">https://www.expireddomains.net/</a></li><li>SimpleLogin - <a href="https://simplelogin.io/">https://simplelogin.io/</a></li></ul>Because you made a phone call.<p><br>- Brill (Enemy of the State)</p><p><strong>Podcast music:</strong> Recluse by Ray Heffer </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 09 Aug 2024 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/68fdbf8c/328f4cd0.mp3" length="15489131" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1288</itunes:duration>
      <itunes:summary>This week I respond to a few listener questions, primarily around the use of social media as a privacy enthusiast. Love it or hate it, you can guess which camp I'm in, social media like LinkedIn has almost become a requirement for job searches, employers, and connecting with other professionals. I also touch on OPSEC for OSINT, a new talk track I am planning to present in the future. It's important for all of us to maintain better Operational Security (OPSEC). Finally, I share my latest blog ...</itunes:summary>
      <itunes:subtitle>This week I respond to a few listener questions, primarily around the use of social media as a privacy enthusiast. Love it or hate it, you can guess which camp I'm in, social media like LinkedIn has almost become a requirement for job searches, employers,</itunes:subtitle>
      <itunes:keywords>privacy, security, OSINT, AI Security, LLM</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>013: iCloud Private Relay, Complete pfSense Guide, and Privacy for Kids</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>013: iCloud Private Relay, Complete pfSense Guide, and Privacy for Kids</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15483198</guid>
      <link>https://share.transistor.fm/s/e3377182</link>
      <description>
        <![CDATA[<p>In this week’s show, I take a deeper dive into Apple’s iCloud Private Relay, discussing who should and who shouldn’t use it. I then discuss my latest article, “The Complete Setup Guide to pfSense for Privacy and Security,” and the benefits of an always-on VPN. Lastly, for those who are parents, I offer a discussion on privacy for kids and some non-invasive techniques for protecting them online. </p><p><strong>In this week's episode:</strong></p><ol><li>Intro</li><li>iCloud Private Relay</li><li>Complete Guide to pfSense</li><li>Privacy for Kids</li><li>Listener questions</li></ol><p><strong>Show Links:</strong></p><ul><li>The Complete Setup Guide to pfSense for Privacy and Security: <a href="https://lockdown.media/complete-setup-guide-to-pfsense">https://lockdown.media/complete-setup-guide-to-pfsense</a></li><li> NextDNS: <a href="https://nextdns.io/">https://nextdns.io/</a></li><li> Cron package for pfSense: <a href="https://docs.netgate.com/pfsense/en/latest/packages/list.html">https://docs.netgate.com/pfsense/en/latest/packages/list.html</a></li><li> Private Relay Outage: <a href="https://www.tomsguide.com/phones/iphones/having-browsing-trouble-on-apple-devices-youre-not-alone-apples-private-relay-system-is-having-problems">https://www.tomsguide.com/phones/iphones/having-browsing-trouble-on-apple-devices-youre-not-alone-apples-private-relay-system-is-having-problems</a></li><li> iCloud Private Relay Overview: <a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF</a></li></ul>“You never had a camera in my head.”<p><em>- Truman Burbank</em></p><p><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week’s show, I take a deeper dive into Apple’s iCloud Private Relay, discussing who should and who shouldn’t use it. I then discuss my latest article, “The Complete Setup Guide to pfSense for Privacy and Security,” and the benefits of an always-on VPN. Lastly, for those who are parents, I offer a discussion on privacy for kids and some non-invasive techniques for protecting them online. </p><p><strong>In this week's episode:</strong></p><ol><li>Intro</li><li>iCloud Private Relay</li><li>Complete Guide to pfSense</li><li>Privacy for Kids</li><li>Listener questions</li></ol><p><strong>Show Links:</strong></p><ul><li>The Complete Setup Guide to pfSense for Privacy and Security: <a href="https://lockdown.media/complete-setup-guide-to-pfsense">https://lockdown.media/complete-setup-guide-to-pfsense</a></li><li> NextDNS: <a href="https://nextdns.io/">https://nextdns.io/</a></li><li> Cron package for pfSense: <a href="https://docs.netgate.com/pfsense/en/latest/packages/list.html">https://docs.netgate.com/pfsense/en/latest/packages/list.html</a></li><li> Private Relay Outage: <a href="https://www.tomsguide.com/phones/iphones/having-browsing-trouble-on-apple-devices-youre-not-alone-apples-private-relay-system-is-having-problems">https://www.tomsguide.com/phones/iphones/having-browsing-trouble-on-apple-devices-youre-not-alone-apples-private-relay-system-is-having-problems</a></li><li> iCloud Private Relay Overview: <a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF</a></li></ul>“You never had a camera in my head.”<p><em>- Truman Burbank</em></p><p><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 26 Jul 2024 21:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/e3377182/b0c2db1d.mp3" length="36450867" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3035</itunes:duration>
      <itunes:summary>In this week’s show, I take a deeper dive into Apple’s iCloud Private Relay, discussing who should and who shouldn’t use it. I then discuss my latest article, “The Complete Setup Guide to pfSense for Privacy and Security,” and the benefits of an always-on VPN. Lastly, for those who are parents, I offer a discussion on privacy for kids and some non-invasive techniques for protecting them online.   In this week's episode: IntroiCloud Private RelayComplete Guide to pfSensePrivacy for KidsListene...</itunes:summary>
      <itunes:subtitle>In this week’s show, I take a deeper dive into Apple’s iCloud Private Relay, discussing who should and who shouldn’t use it. I then discuss my latest article, “The Complete Setup Guide to pfSense for Privacy and Security,” and the benefits of an always-on</itunes:subtitle>
      <itunes:keywords>privacy, security, OSINT</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>012: Back to the Basics, Back to the iPhone, Authy API Abuse</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>012: Back to the Basics, Back to the iPhone, Authy API Abuse</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15419689</guid>
      <link>https://share.transistor.fm/s/2c458b96</link>
      <description>
        <![CDATA[<p>This week we go back to the basics of privacy and security for the average Joe or Jane, and discuss the latest iPhone settings for privacy. I also discuss the Twilio Authy API abuse that resulted in 33 million phone numbers for Authy accounts being exposed. Huge thank you to the Patreon supporters!</p><p><strong>In this week's episode:</strong></p><ol><li>Back to the basics</li><li>Advice for the 'average Joe'</li><li> The Twilio Authy API breach</li><li> iPhone privacy settings</li><li> Listener question on doorbell cameras</li></ol><p><strong><br>Show Links:</strong></p><ul><li>1Password Security Audits: <a href="https://support.1password.com/security-assessments/">https://support.1password.com/security-assessments/</a></li><li>Bitwarden Security Audits: <a href="https://bitwarden.com/help/is-bitwarden-audited/">https://bitwarden.com/help/is-bitwarden-audited/</a></li><li>Twilio Breach: <a href="https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/">https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/</a></li><li>MySudo: <a href="https://mysudo.com/">https://mysudo.com/</a></li><li>ProtonMail: <a href="https://protonmail.com/">https://protonmail.com/</a></li><li>StrongBox: <a href="https://strongboxsafe.com/">https://strongboxsafe.com/</a></li><li>KeepassDX: <a href="https://www.keepassdx.com/">https://www.keepassdx.com/</a></li><li>Amcrest Cameras: <a href="https://www.amazon.com/gp/product/B07ZJS3L5Y">https://www.amazon.com/gp/product/B07ZJS3L5Y</a></li></ul>"I don't want to live in a world where there's no privacy, and therefore no room for intellectual exploration and creativity."<p><br><em>- Edward Snowden</em></p><p><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week we go back to the basics of privacy and security for the average Joe or Jane, and discuss the latest iPhone settings for privacy. I also discuss the Twilio Authy API abuse that resulted in 33 million phone numbers for Authy accounts being exposed. Huge thank you to the Patreon supporters!</p><p><strong>In this week's episode:</strong></p><ol><li>Back to the basics</li><li>Advice for the 'average Joe'</li><li> The Twilio Authy API breach</li><li> iPhone privacy settings</li><li> Listener question on doorbell cameras</li></ol><p><strong><br>Show Links:</strong></p><ul><li>1Password Security Audits: <a href="https://support.1password.com/security-assessments/">https://support.1password.com/security-assessments/</a></li><li>Bitwarden Security Audits: <a href="https://bitwarden.com/help/is-bitwarden-audited/">https://bitwarden.com/help/is-bitwarden-audited/</a></li><li>Twilio Breach: <a href="https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/">https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/</a></li><li>MySudo: <a href="https://mysudo.com/">https://mysudo.com/</a></li><li>ProtonMail: <a href="https://protonmail.com/">https://protonmail.com/</a></li><li>StrongBox: <a href="https://strongboxsafe.com/">https://strongboxsafe.com/</a></li><li>KeepassDX: <a href="https://www.keepassdx.com/">https://www.keepassdx.com/</a></li><li>Amcrest Cameras: <a href="https://www.amazon.com/gp/product/B07ZJS3L5Y">https://www.amazon.com/gp/product/B07ZJS3L5Y</a></li></ul>"I don't want to live in a world where there's no privacy, and therefore no room for intellectual exploration and creativity."<p><br><em>- Edward Snowden</em></p><p><strong>Podcast music:</strong> Recluse by Ray Heffer</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 19 Jul 2024 06:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/2c458b96/0214f87a.mp3" length="23499858" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1955</itunes:duration>
      <itunes:summary>This week we go back to the basics of privacy and security for the average Joe or Jane, and discuss the latest iPhone settings for privacy. I also discuss the Twilio Authy API abuse that resulted in 33 million phone numbers for Authy accounts being exposed. Huge thank you to the Patreon supporters!  In this week's episode: Back to the basicsAdvice for the 'average Joe' The Twilio Authy API breach iPhone privacy settings Listener question on doorbell cameras Show Links: 1Passwor...</itunes:summary>
      <itunes:subtitle>This week we go back to the basics of privacy and security for the average Joe or Jane, and discuss the latest iPhone settings for privacy. I also discuss the Twilio Authy API abuse that resulted in 33 million phone numbers for Authy accounts being expose</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>011 - Living Like a Recluse, Living Trusts, GrapheneOS, and Listener Questions</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>011 - Living Like a Recluse, Living Trusts, GrapheneOS, and Listener Questions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-15121729</guid>
      <link>https://share.transistor.fm/s/33cccc20</link>
      <description>
        <![CDATA[<p>After escaping to the mountains and living like a recluse for the past few months, I am back. In this week's show, I discuss my latest experiences in purchasing a home and titling in a living trust, along with the potential obstacles with title deeds and mortgage lenders, and avoiding data breaches with utility companies. I also revisit GrapheneOS after using it daily for the past year, and answer listener questions.</p><p><strong>In this week's episode:</strong></p><ol><li>Living in the mountains</li><li>Buying a house with a living trust</li><li>Potential pitfalls with title deeds and mortgage lenders</li><li>Balancing privacy and security</li><li>The 'All or Nothing' approach</li><li>Why I still use Obsidian over Standard Notes</li><li>Revisiting GrapheneOS and the Play Integrity API</li><li>Baby Reindeer</li><li>Listeners Questions</li></ol>"Privacy is rarely lost in one fell swoop. It is usually eroded over time, bit by bit."<p>- Daniel J. Solove</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>After escaping to the mountains and living like a recluse for the past few months, I am back. In this week's show, I discuss my latest experiences in purchasing a home and titling in a living trust, along with the potential obstacles with title deeds and mortgage lenders, and avoiding data breaches with utility companies. I also revisit GrapheneOS after using it daily for the past year, and answer listener questions.</p><p><strong>In this week's episode:</strong></p><ol><li>Living in the mountains</li><li>Buying a house with a living trust</li><li>Potential pitfalls with title deeds and mortgage lenders</li><li>Balancing privacy and security</li><li>The 'All or Nothing' approach</li><li>Why I still use Obsidian over Standard Notes</li><li>Revisiting GrapheneOS and the Play Integrity API</li><li>Baby Reindeer</li><li>Listeners Questions</li></ol>"Privacy is rarely lost in one fell swoop. It is usually eroded over time, bit by bit."<p>- Daniel J. Solove</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 24 May 2024 08:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/33cccc20/99bc5f7a.mp3" length="38364612" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3194</itunes:duration>
      <itunes:summary>After escaping to the mountains and living like a recluse for the past few months, I am back. In this week's show, I discuss my latest experiences in purchasing a home and titling in a living trust, along with the potential obstacles with title deeds and mortgage lenders, and avoiding data breaches with utility companies. I also revisit GrapheneOS after using it daily for the past year, and answer listener questions. In this week's episode: Living in the mountainsBuying a house with a living ...</itunes:summary>
      <itunes:subtitle>After escaping to the mountains and living like a recluse for the past few months, I am back. In this week's show, I discuss my latest experiences in purchasing a home and titling in a living trust, along with the potential obstacles with title deeds and </itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>010 - Alternatives to Authy, SANS OSINT Summit, and Selling your Soul to CLEAR</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>010 - Alternatives to Authy, SANS OSINT Summit, and Selling your Soul to CLEAR</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14694054</guid>
      <link>https://share.transistor.fm/s/0b33737d</link>
      <description>
        <![CDATA[<p><br>In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Additionally, I share some of the highlights from attending the SANS OSINT Summit in Washington, D.C., and explore various uses for custom domain names. Finally, I touch on the Starbucks app and the benefits of using Tello for pre-paid SIM cards.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 14, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>CLEAR Privacy and Selling Souls</li><li>Authy discontinues the desktop app from March 19th, 2024</li><li>Alternative MFA solutions using KeepassXC and KeepassDX</li><li>Storing backup MFA codes in a Veracrypt container</li><li>Make sure you keep scanned copies of your credit cards and ID!</li><li>Update on the SANS OSINT Summit</li><li>Alternative to Mint Mobile with Tello</li><li>Using the Starbucks app privately</li><li>Custom domain names</li></ol><p><b>Show Links:</b></p><ul><li><strong>CLEAR Security Breach</strong>: <a href="https://www.youtube.com/watch?v=i0I0BTtnMC4">https://www.youtube.com/watch?v=i0I0BTtnMC4</a></li><li><strong>OSINT Combine Free Tools</strong>:  <a href="https://www.osintcombine.com/free-tools">osintcombine.com/freetools</a><ul><li><strong>Whatsmyname</strong>: <a href="https://whatsmyname.app/">https://whatsmyname.app/</a></li></ul></li><li><strong>Tello</strong>:  <a href="https://tello.com/">https://tello.com/</a></li><li><strong>QR Scanner (PFA) by Secuso Research Group</strong>: <a href="https://secuso.aifb.kit.edu/english/QR_Scanner.php">https://secuso.aifb.kit.edu/english/QR_Scanner.php</a></li><li><strong>Skull Games</strong>: <a href="https://skullgames.io/">https://skullgames.io/</a></li><li><strong>Trace Labs</strong>: <a href="https://www.tracelabs.org/">https://www.tracelabs.org/</a></li><li><strong>Expired Domains</strong>: <a href="https://www.expireddomains.net/deleted-domains/">https://www.expireddomains.net/deleted-domains/</a></li></ul>"The right to be left alone is indeed the beginning of all freedom."<p><em>- Supreme Court Justice William O. Douglas</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Additionally, I share some of the highlights from attending the SANS OSINT Summit in Washington, D.C., and explore various uses for custom domain names. Finally, I touch on the Starbucks app and the benefits of using Tello for pre-paid SIM cards.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 14, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>CLEAR Privacy and Selling Souls</li><li>Authy discontinues the desktop app from March 19th, 2024</li><li>Alternative MFA solutions using KeepassXC and KeepassDX</li><li>Storing backup MFA codes in a Veracrypt container</li><li>Make sure you keep scanned copies of your credit cards and ID!</li><li>Update on the SANS OSINT Summit</li><li>Alternative to Mint Mobile with Tello</li><li>Using the Starbucks app privately</li><li>Custom domain names</li></ol><p><b>Show Links:</b></p><ul><li><strong>CLEAR Security Breach</strong>: <a href="https://www.youtube.com/watch?v=i0I0BTtnMC4">https://www.youtube.com/watch?v=i0I0BTtnMC4</a></li><li><strong>OSINT Combine Free Tools</strong>:  <a href="https://www.osintcombine.com/free-tools">osintcombine.com/freetools</a><ul><li><strong>Whatsmyname</strong>: <a href="https://whatsmyname.app/">https://whatsmyname.app/</a></li></ul></li><li><strong>Tello</strong>:  <a href="https://tello.com/">https://tello.com/</a></li><li><strong>QR Scanner (PFA) by Secuso Research Group</strong>: <a href="https://secuso.aifb.kit.edu/english/QR_Scanner.php">https://secuso.aifb.kit.edu/english/QR_Scanner.php</a></li><li><strong>Skull Games</strong>: <a href="https://skullgames.io/">https://skullgames.io/</a></li><li><strong>Trace Labs</strong>: <a href="https://www.tracelabs.org/">https://www.tracelabs.org/</a></li><li><strong>Expired Domains</strong>: <a href="https://www.expireddomains.net/deleted-domains/">https://www.expireddomains.net/deleted-domains/</a></li></ul>"The right to be left alone is indeed the beginning of all freedom."<p><em>- Supreme Court Justice William O. Douglas</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 15 Mar 2024 10:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/0b33737d/10df6f0c.mp3" length="26770255" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2228</itunes:duration>
      <itunes:summary>In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Additionally, I share some of the highlights from attending the SANS OSINT Summit in Washington, D.C., and explore various uses for custom domain names. Finally, I touch on the Starbucks app and the benefits of using Tello for pre-paid SIM cards...</itunes:summary>
      <itunes:subtitle>In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Addi</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>009 - Data Broker Sites and a Conversation with Lawrence Gentilello from Optery</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>009 - Data Broker Sites and a Conversation with Lawrence Gentilello from Optery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14649675</guid>
      <link>https://share.transistor.fm/s/b67bb2c2</link>
      <description>
        <![CDATA[<p>In today's show, I have a conversation with Lawrence  Gentilello, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and the bare minimum you should be doing to protect and secure your private data.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 6, 2024</strong></p><p><strong>Follow Ray on Twitter</strong> @<a href="https://twitter.com/privacypod">privacypod</a></p><p><b>In this week's episode:</b></p><ol><li>Lawrence's experience with identity theft highlights the importance of a credit freeze</li><li>The need for disinformation</li><li>A reminder on hunting apps</li><li>The future of data privacy and the need for services like Optery</li><li>Data privacy in the UK and the existence of search sites like 192.com</li><li>Update on next weeks show</li></ol><p><b>Show Links:</b></p><ul><li><strong>Optery website</strong>: <a href="https://www.optery.com/">https://www.optery.com/</a></li><li><strong>PC Magazine Editors Choice Award for Optery</strong>: <a href="https://www.pcmag.com/reviews/optery">https://www.pcmag.com/reviews/optery</a></li><li><strong>PC Magazine's list of the best personal data removal services</strong>: <a href="https://www.pcmag.com/picks/the-best-personal-data-removal-services">https://www.pcmag.com/picks/the-best-personal-data-removal-services</a></li><li><strong>Utah Consumer Privacy Act (UCPA)</strong>: <a href="https://attorneygeneral.utah.gov/utah-consumer-protection-act-a-new-law-to-protect-online-privacy/">https://attorneygeneral.utah.gov/utah-consumer-protection-act-a-new-law-to-protect-online-privacy/</a></li></ul>"If privacy is outlawed, only outlaws will have privacy."<p><em>- Philip R. Zimmermann, creator of PGP encryption</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today's show, I have a conversation with Lawrence  Gentilello, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and the bare minimum you should be doing to protect and secure your private data.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 6, 2024</strong></p><p><strong>Follow Ray on Twitter</strong> @<a href="https://twitter.com/privacypod">privacypod</a></p><p><b>In this week's episode:</b></p><ol><li>Lawrence's experience with identity theft highlights the importance of a credit freeze</li><li>The need for disinformation</li><li>A reminder on hunting apps</li><li>The future of data privacy and the need for services like Optery</li><li>Data privacy in the UK and the existence of search sites like 192.com</li><li>Update on next weeks show</li></ol><p><b>Show Links:</b></p><ul><li><strong>Optery website</strong>: <a href="https://www.optery.com/">https://www.optery.com/</a></li><li><strong>PC Magazine Editors Choice Award for Optery</strong>: <a href="https://www.pcmag.com/reviews/optery">https://www.pcmag.com/reviews/optery</a></li><li><strong>PC Magazine's list of the best personal data removal services</strong>: <a href="https://www.pcmag.com/picks/the-best-personal-data-removal-services">https://www.pcmag.com/picks/the-best-personal-data-removal-services</a></li><li><strong>Utah Consumer Privacy Act (UCPA)</strong>: <a href="https://attorneygeneral.utah.gov/utah-consumer-protection-act-a-new-law-to-protect-online-privacy/">https://attorneygeneral.utah.gov/utah-consumer-protection-act-a-new-law-to-protect-online-privacy/</a></li></ul>"If privacy is outlawed, only outlaws will have privacy."<p><em>- Philip R. Zimmermann, creator of PGP encryption</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 08 Mar 2024 08:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/b67bb2c2/4edae2fb.mp3" length="38872055" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3236</itunes:duration>
      <itunes:summary>In today's show, I have a conversation with Lawrence  Gentilello, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and the bare minimum you should be doing to protect and secure your private data.  Follow on Twitter (X): @privacypod Support the show: https://...</itunes:summary>
      <itunes:subtitle>In today's show, I have a conversation with Lawrence  Gentilello, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>008 - Anonymity with TOR, Data Removals, and Mozilla Monitor</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>008 - Anonymity with TOR, Data Removals, and Mozilla Monitor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14517971</guid>
      <link>https://share.transistor.fm/s/6e54ec07</link>
      <description>
        <![CDATA[<p>In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss the importance of freezing your credit and putting the title of your home into a revocable living trust, prior to removing your records from people search sites.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on February 16, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>I'm still on the road!</li><li>Anonymity with TOR and VPN</li><li>Get that Credit Freeze and Revocable Living Trust</li><li>Data Removals from people search sites</li><li>Mozilla Monitor, a new data removal service</li><li>Quick update on the Complete pfSense Setup Guide</li></ol><p><b>Show Links:</b></p><ul><li><strong>Mozilla Monitor:</strong> <a href="https://monitor.mozilla.org/">https://monitor.mozilla.org</a></li><li><strong>Tor Browser:</strong> <a href="https://www.torproject.org/download/">https://www.torproject.org/download</a></li><li><strong>DeepCorr:</strong> <a href="https://dl.acm.org/doi/pdf/10.1145/3243734.3243824">https://dl.acm.org/doi/pdf/10.1145/3243734.3243824</a></li><li><strong>Foundations of Digital Privacy, Part One:</strong> <a href="https://lockdown.media/the-foundations-of-digital-privacy">https://lockdown.media/the-foundations-of-digital-privacy</a></li></ul>“If you want to keep a secret, you must also hide it from yourself.”<p><em>-George Orwell</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss the importance of freezing your credit and putting the title of your home into a revocable living trust, prior to removing your records from people search sites.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on February 16, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>I'm still on the road!</li><li>Anonymity with TOR and VPN</li><li>Get that Credit Freeze and Revocable Living Trust</li><li>Data Removals from people search sites</li><li>Mozilla Monitor, a new data removal service</li><li>Quick update on the Complete pfSense Setup Guide</li></ol><p><b>Show Links:</b></p><ul><li><strong>Mozilla Monitor:</strong> <a href="https://monitor.mozilla.org/">https://monitor.mozilla.org</a></li><li><strong>Tor Browser:</strong> <a href="https://www.torproject.org/download/">https://www.torproject.org/download</a></li><li><strong>DeepCorr:</strong> <a href="https://dl.acm.org/doi/pdf/10.1145/3243734.3243824">https://dl.acm.org/doi/pdf/10.1145/3243734.3243824</a></li><li><strong>Foundations of Digital Privacy, Part One:</strong> <a href="https://lockdown.media/the-foundations-of-digital-privacy">https://lockdown.media/the-foundations-of-digital-privacy</a></li></ul>“If you want to keep a secret, you must also hide it from yourself.”<p><em>-George Orwell</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 16 Feb 2024 14:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/6e54ec07/f01a0629.mp3" length="16791861" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1396</itunes:duration>
      <itunes:summary>In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss the importance of freezing your credit and putting the title of your home into a revocable living trust, prior to removing your records from people search sites. Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLo...</itunes:summary>
      <itunes:subtitle>In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss th</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>IMPOSTER SYNDROME | FRIDAY FIELD NOTES</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>IMPOSTER SYNDROME | FRIDAY FIELD NOTES</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14416816</guid>
      <link>https://share.transistor.fm/s/dc9ae534</link>
      <description>
        <![CDATA[<p>In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 31, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>Using alias names with food apps</li><li>More on practical privacy vs the extreme</li><li>My motivations for privacy after my move to the USA</li><li>Simplewall for Windows 10</li><li>Using Virtual Machines</li><li>Dual boot Windows for gaming vs productivity</li><li>Micro-segmentation strategies</li><li>Windows 10 LTSC for privacy?</li><li> I'm the Imposter! </li></ol><p><b>Show Links:</b></p><ul><li> <strong>qView Image Viewer: </strong><a href="https://interversehq.com/qview">https://interversehq.com/qview</a></li><li><strong>GPG4Win</strong>: <a href="https://www.gpg4win.org/download.html">https://www.gpg4win.org/download.html</a></li><li><strong>Windows 10 LTSC:</strong> h<a href="https://www.cdw.com/search/?key=Windows%20LTSC">ttps://www.cdw.com/search/?key=Windows%20LTSC</a></li><li><strong>Simplewall: </strong><a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a></li></ul>"Be yourself; everyone else is already taken."<p><em>-Oscar Wilde</em></p><p><strong>Music:</strong> The Lockdown </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 31, 2024</strong></p><p><b>In this week's episode:</b></p><ol><li>Using alias names with food apps</li><li>More on practical privacy vs the extreme</li><li>My motivations for privacy after my move to the USA</li><li>Simplewall for Windows 10</li><li>Using Virtual Machines</li><li>Dual boot Windows for gaming vs productivity</li><li>Micro-segmentation strategies</li><li>Windows 10 LTSC for privacy?</li><li> I'm the Imposter! </li></ol><p><b>Show Links:</b></p><ul><li> <strong>qView Image Viewer: </strong><a href="https://interversehq.com/qview">https://interversehq.com/qview</a></li><li><strong>GPG4Win</strong>: <a href="https://www.gpg4win.org/download.html">https://www.gpg4win.org/download.html</a></li><li><strong>Windows 10 LTSC:</strong> h<a href="https://www.cdw.com/search/?key=Windows%20LTSC">ttps://www.cdw.com/search/?key=Windows%20LTSC</a></li><li><strong>Simplewall: </strong><a href="https://github.com/henrypp/simplewall">https://github.com/henrypp/simplewall</a></li></ul>"Be yourself; everyone else is already taken."<p><em>-Oscar Wilde</em></p><p><strong>Music:</strong> The Lockdown </p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Thu, 01 Feb 2024 12:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/dc9ae534/554e405f.mp3" length="14986624" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:image href="https://img.transistor.fm/fzUKSikXPcyBnJXSWqyn_X9iOZd1nt3c8C8V-kjXXQU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZTY2/NTU3ZDhhNWEwMTBl/MTBjZDNhYjVlYjhh/YzBlMi5wbmc.jpg"/>
      <itunes:duration>1246</itunes:duration>
      <itunes:summary>In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA. Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on January 31, 2024 In this week's episode:Using alias names with food appsMore on practical privacy vs the extremeMy motivations for privacy after my move to the USASimplewall for Window...</itunes:summary>
      <itunes:subtitle>In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA. Follow on Twitter (X): @privacypod Support the show: https://</itunes:subtitle>
      <itunes:keywords>privacy,security,osint,cybersecurity,private,cyber,secure,lockdown,hacker,ransomware,hacking,anonymous</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>007 - Defensive OSINT, Privacy on the Road, More Aliases, and Face Morphing</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>007 - Defensive OSINT, Privacy on the Road, More Aliases, and Face Morphing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14389296</guid>
      <link>https://share.transistor.fm/s/0b86abd1</link>
      <description>
        <![CDATA[<p>This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and cons of using alias names for hotel bookings, including the challenges of identity verification during check-in, while I discuss smart, alternative solutions for these scenarios. Join me as we navigate the complexities of preserving privacy in an era rife with survlleiance and data breaches, providing practical tips and advice for privacy-conscious travelers and digital citizens.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 27, 2024</strong></p><p><b>In This Week's Show:</b></p><ol><li>Privacy on the road with hotels, VRBO rentals, and Uber</li><li>Why we do this, and the reasons behind our privacy lifestyle</li><li>A look at Defensive OSINT strategies</li><li>Face morphing our real photos for privacy</li><li>Location tracking on your phone</li><li>MySudo and pre-paid burner numbers</li><li>A surprise guest?</li></ol><p><b>Show Links:</b></p><ul><li>Black Portable Hotel Door Lock: <a href="https://www.amazon.com/Portable-Security-Additional-Traveling-Apartment/dp/B0CFVS6NRN">https://www.amazon.com/Portable-Security-Additional-Traveling-Apartment/dp/B0CFVS6NRN</a></li><li>Python Script for ThisPersonDoesNotExist: <a href="https://github.com/locksec/tpdne_py">https://github.com/locksec/tpdne_py</a></li><li>Facemorph.me: <a href="https://facemorph.me/">https://facemorph.me</a></li><li>Upscayl: <a href="https://www.upscayl.org/">https://www.upscayl.org</a></li><li>File Optimizer: <a href="https://nikkhokkho.sourceforge.io/static.php?page=FileOptimizer">https://nikkhokkho.sourceforge.io/static.php?page=FileOptimizer</a></li></ul><p><strong>Intro voice-over:</strong> <a href="https://www.youtube.com/watch?v=UN6PoeLUWpo">IRLRosie</a> - Creative Commons Attribution license (reuse allowed)<br><strong>Music:</strong> The Lockdown </p>“Give me six lines written by the most honest man, and I will find something in them to hang him.” - Cardinal Richelieu<p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and cons of using alias names for hotel bookings, including the challenges of identity verification during check-in, while I discuss smart, alternative solutions for these scenarios. Join me as we navigate the complexities of preserving privacy in an era rife with survlleiance and data breaches, providing practical tips and advice for privacy-conscious travelers and digital citizens.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 27, 2024</strong></p><p><b>In This Week's Show:</b></p><ol><li>Privacy on the road with hotels, VRBO rentals, and Uber</li><li>Why we do this, and the reasons behind our privacy lifestyle</li><li>A look at Defensive OSINT strategies</li><li>Face morphing our real photos for privacy</li><li>Location tracking on your phone</li><li>MySudo and pre-paid burner numbers</li><li>A surprise guest?</li></ol><p><b>Show Links:</b></p><ul><li>Black Portable Hotel Door Lock: <a href="https://www.amazon.com/Portable-Security-Additional-Traveling-Apartment/dp/B0CFVS6NRN">https://www.amazon.com/Portable-Security-Additional-Traveling-Apartment/dp/B0CFVS6NRN</a></li><li>Python Script for ThisPersonDoesNotExist: <a href="https://github.com/locksec/tpdne_py">https://github.com/locksec/tpdne_py</a></li><li>Facemorph.me: <a href="https://facemorph.me/">https://facemorph.me</a></li><li>Upscayl: <a href="https://www.upscayl.org/">https://www.upscayl.org</a></li><li>File Optimizer: <a href="https://nikkhokkho.sourceforge.io/static.php?page=FileOptimizer">https://nikkhokkho.sourceforge.io/static.php?page=FileOptimizer</a></li></ul><p><strong>Intro voice-over:</strong> <a href="https://www.youtube.com/watch?v=UN6PoeLUWpo">IRLRosie</a> - Creative Commons Attribution license (reuse allowed)<br><strong>Music:</strong> The Lockdown </p>“Give me six lines written by the most honest man, and I will find something in them to hang him.” - Cardinal Richelieu<p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 29 Jan 2024 06:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/0b86abd1/e4769477.mp3" length="37632903" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>3133</itunes:duration>
      <itunes:summary>This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and cons of using alias names for hotel bookings, including the challenges of identity verification during check-in, while I discuss smart, alternative so...</itunes:summary>
      <itunes:subtitle>This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and</itunes:subtitle>
      <itunes:keywords>privacy, security, cybersecurity, osint, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking, network security, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>006 - When you Lose your Phone, Nextcloud, and Backups with Restic and Backblaze B2</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>006 - When you Lose your Phone, Nextcloud, and Backups with Restic and Backblaze B2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14243622</guid>
      <link>https://share.transistor.fm/s/57997e01</link>
      <description>
        <![CDATA[<p>In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practical turn with a guide on using FindMyDevice on GrapheneOS, and the FindMyDevice feature on the Garmin Instinct 2 watch for tracking lost phones.</p><p>I also tackle the debate between biometric authentication and passcodes, taking our threat model into consideration. For those interested in storage synchronization solutions, I discuss using Nextcloud for a variety of purposes, including photo backups, syncing Keepass, and markdown notes, highlighting its versatility for privacy.</p><p>Join me for an episode packed with valuable insights and tips for enhancing your digital privacy and security as we welcome in 2024!</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 03, 2024</strong></p><p><strong>In this week's episode:</strong><br>1. Closing 2023 with Privacy.com<br>2. How the CIA Triad Relates to privacy<br>3. Tracking Lost Phones with FindMyDevice on GrapheneOS and a Garmin watch<br>4. Biometric authentication vs Passcodes<br>5. Using Nextcloud for photo backups, Keepass Sync, and taking notes in Markdown<br>6. Backups with Backblaze B2 and Restic</p><p><strong>Show Links:</strong><br><a href="https://www.privacy.com">https://www.privacy.com</a><br><a href="https://strongboxsafe.com">https://strongboxsafe.com</a><br><a href="https://www.keepassdx.com">https://www.keepassdx.com</a><br><a href="https://grapheneos.org">https://grapheneos.org</a><br><a href="https://gitlab.com/Nulide/findmydevice">https://gitlab.com/Nulide/findmydevice</a><br><a href="https://obsidian.md">https://obsidian.md</a><br><a href="https://www.backblaze.com/cloud-storage">https://www.backblaze.com/cloud-storage</a><br><a href="https://restic.net">https://restic.net</a><br><a href="https://www.garmin.com/en-US/p/775697">https://www.garmin.com/en-US/p/775697</a></p><p><strong>Ray Ban Meta News:</strong> <a href="https://san.com/cc/investigation-into-new-meta-smart-glasses-brings-privacy-concerns">https://san.com/cc/investigation-into-new-meta-smart-glasses-brings-privacy-concerns</a></p><p><strong>Music:</strong> The Lockdown</p><p>"<em>We suffer more often in imagination than in reality.</em>" - Seneca</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practical turn with a guide on using FindMyDevice on GrapheneOS, and the FindMyDevice feature on the Garmin Instinct 2 watch for tracking lost phones.</p><p>I also tackle the debate between biometric authentication and passcodes, taking our threat model into consideration. For those interested in storage synchronization solutions, I discuss using Nextcloud for a variety of purposes, including photo backups, syncing Keepass, and markdown notes, highlighting its versatility for privacy.</p><p>Join me for an episode packed with valuable insights and tips for enhancing your digital privacy and security as we welcome in 2024!</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on January 03, 2024</strong></p><p><strong>In this week's episode:</strong><br>1. Closing 2023 with Privacy.com<br>2. How the CIA Triad Relates to privacy<br>3. Tracking Lost Phones with FindMyDevice on GrapheneOS and a Garmin watch<br>4. Biometric authentication vs Passcodes<br>5. Using Nextcloud for photo backups, Keepass Sync, and taking notes in Markdown<br>6. Backups with Backblaze B2 and Restic</p><p><strong>Show Links:</strong><br><a href="https://www.privacy.com">https://www.privacy.com</a><br><a href="https://strongboxsafe.com">https://strongboxsafe.com</a><br><a href="https://www.keepassdx.com">https://www.keepassdx.com</a><br><a href="https://grapheneos.org">https://grapheneos.org</a><br><a href="https://gitlab.com/Nulide/findmydevice">https://gitlab.com/Nulide/findmydevice</a><br><a href="https://obsidian.md">https://obsidian.md</a><br><a href="https://www.backblaze.com/cloud-storage">https://www.backblaze.com/cloud-storage</a><br><a href="https://restic.net">https://restic.net</a><br><a href="https://www.garmin.com/en-US/p/775697">https://www.garmin.com/en-US/p/775697</a></p><p><strong>Ray Ban Meta News:</strong> <a href="https://san.com/cc/investigation-into-new-meta-smart-glasses-brings-privacy-concerns">https://san.com/cc/investigation-into-new-meta-smart-glasses-brings-privacy-concerns</a></p><p><strong>Music:</strong> The Lockdown</p><p>"<em>We suffer more often in imagination than in reality.</em>" - Seneca</p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 05 Jan 2024 06:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/57997e01/043efda6.mp3" length="30599920" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2547</itunes:duration>
      <itunes:summary>In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practical turn with a guide on using FindMyDevice on GrapheneOS, and the FindMyDevice feature on the Garmin Instinct 2 watch for tracking lost phones.  I also tackle the debate between biometric authentication and passcodes, taking our threat model ...</itunes:summary>
      <itunes:subtitle>In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practic</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>005 - Brave vs Firefox, and When Privacy Goes Wrong</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>005 - Brave vs Firefox, and When Privacy Goes Wrong</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-14022531</guid>
      <link>https://share.transistor.fm/s/1421429a</link>
      <description>
        <![CDATA[<p>In this week’s show, Ray Heffer gives a farewell to Michael Bazzell's Privacy, Security, and OSINT show. Also, speculation about living in a faraday cage continues, and the reasons Firefox is still better than Brave for privacy and security. Ray also talks about when privacy techniques go wrong, with his lockout from Privacy.com.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on  November 22nd, 2023 <br></strong><br></p><p><strong>This week's episode:</strong></p><ol><li>Introduction</li><li>Notable mention for Michael Bazzell</li><li>New website and Twitter account</li><li>Why I don't use Brave and the reasons Firefox is still the best option</li><li>When Privacy Techniques Go Wrong</li></ol><p>Links mentioned in the show:<br><strong>MITRE ATT&amp;CK (Credentials from Web Browsers)</strong>: <a href="https://attack.mitre.org/techniques/T1555/003/">https://attack.mitre.org/techniques/T1555/003/</a><br><strong>MITRE ATT&amp;CK (Password Managers)</strong>: <a href="https://attack.mitre.org/techniques/T1555/005/">https://attack.mitre.org/techniques/T1555/005/</a><br><strong>Tor Project Recommendations</strong>: <a href="https://support.torproject.org/tbb/tbb-9/">https://support.torproject.org/tbb/tbb-9/</a><br><strong>Brave (VPN Services) Issue</strong>: <a href="https://github.com/brave/brave-browser/issues/33726">https://github.com/brave/brave-browser/issues/33726</a><br><strong>Citi Virtual Credit Cards</strong>: <a href="https://www.cardbenefits.citi.com/Products/Virtual-Account-Numbers">https://www.cardbenefits.citi.com/Products/Virtual-Account-Numbers</a><br><strong>Citi (True Name) Card</strong>: <a href="https://banking.citi.com/cbol/updatemyname/default.htm">https://banking.citi.com/cbol/updatemyname/default.htm</a><br><strong>IronVest (Formerly Abine Blur)</strong>: <a href="https://ironvest.com/pricing/">https://ironvest.com/pricing/</a><br><strong>Wise Virtual Card (UK)</strong>: <a href="https://wise.com/gb/virtual-card/">https://wise.com/gb/virtual-card/</a></p><p><strong>Intro music</strong>: The Lockdown</p><p><em>"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." - Marcus Aurelius</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week’s show, Ray Heffer gives a farewell to Michael Bazzell's Privacy, Security, and OSINT show. Also, speculation about living in a faraday cage continues, and the reasons Firefox is still better than Brave for privacy and security. Ray also talks about when privacy techniques go wrong, with his lockout from Privacy.com.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on  November 22nd, 2023 <br></strong><br></p><p><strong>This week's episode:</strong></p><ol><li>Introduction</li><li>Notable mention for Michael Bazzell</li><li>New website and Twitter account</li><li>Why I don't use Brave and the reasons Firefox is still the best option</li><li>When Privacy Techniques Go Wrong</li></ol><p>Links mentioned in the show:<br><strong>MITRE ATT&amp;CK (Credentials from Web Browsers)</strong>: <a href="https://attack.mitre.org/techniques/T1555/003/">https://attack.mitre.org/techniques/T1555/003/</a><br><strong>MITRE ATT&amp;CK (Password Managers)</strong>: <a href="https://attack.mitre.org/techniques/T1555/005/">https://attack.mitre.org/techniques/T1555/005/</a><br><strong>Tor Project Recommendations</strong>: <a href="https://support.torproject.org/tbb/tbb-9/">https://support.torproject.org/tbb/tbb-9/</a><br><strong>Brave (VPN Services) Issue</strong>: <a href="https://github.com/brave/brave-browser/issues/33726">https://github.com/brave/brave-browser/issues/33726</a><br><strong>Citi Virtual Credit Cards</strong>: <a href="https://www.cardbenefits.citi.com/Products/Virtual-Account-Numbers">https://www.cardbenefits.citi.com/Products/Virtual-Account-Numbers</a><br><strong>Citi (True Name) Card</strong>: <a href="https://banking.citi.com/cbol/updatemyname/default.htm">https://banking.citi.com/cbol/updatemyname/default.htm</a><br><strong>IronVest (Formerly Abine Blur)</strong>: <a href="https://ironvest.com/pricing/">https://ironvest.com/pricing/</a><br><strong>Wise Virtual Card (UK)</strong>: <a href="https://wise.com/gb/virtual-card/">https://wise.com/gb/virtual-card/</a></p><p><strong>Intro music</strong>: The Lockdown</p><p><em>"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." - Marcus Aurelius</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 24 Nov 2023 11:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/1421429a/5066f7f7.mp3" length="21740584" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1808</itunes:duration>
      <itunes:summary>In this week’s show, Ray Heffer gives a farewell to Michael Bazzell's Privacy, Security, and OSINT show. Also, speculation about living in a faraday cage continues, and the reasons Firefox is still better than Brave for privacy and security. Ray also talks about when privacy techniques go wrong, with his lockout from Privacy.com. Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on  November 22nd, 2023    This week's ...</itunes:summary>
      <itunes:subtitle>In this week’s show, Ray Heffer gives a farewell to Michael Bazzell's Privacy, Security, and OSINT show. Also, speculation about living in a faraday cage continues, and the reasons Firefox is still better than Brave for privacy and security. Ray also talk</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>ZERO TRUST | FRIDAY FIELD NOTES</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>ZERO TRUST | FRIDAY FIELD NOTES</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-13942555</guid>
      <link>https://share.transistor.fm/s/31bec9df</link>
      <description>
        <![CDATA[<p>In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats.</p><p>Zero Trust operates on the principle of "never trust, always verify," but what does this mean in practice? Zero Trust doesn't just look outward; it recognizes that threats also come from the inside. By assuming that a breach is not just possible, but has already happened, Zero Trust strategies are uniquely positioned to mitigate damage by insiders, whether malicious or accidental.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on November 09, 2023<br></strong><br><strong>This week's episode</strong>:</p><ol><li>Introduction and Brill is living in a Faraday cage</li><li>How we got to Zero Trust by understadning the Cyber Kill Chain</li><li>The Principals of Zero Trust</li><li>Recommended Zero Trust Frameworks</li></ol><p><strong>NIST Zero Trust Architecture (SP 800-207)</strong>: <a href="https://csrc.nist.gov/pubs/sp/800/207/final">https://csrc.nist.gov/pubs/sp/800/207/final</a><br><strong>CISA Zero Trust Maturity Model</strong>: <a href="https://www.cisa.gov/zero-trust-maturity-model">https://www.cisa.gov/zero-trust-maturity-model</a><br><strong>Cyber Kill Chain</strong>: <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></p><p><strong>Intro music</strong>: The Lockdown</p><p><em>"Security is always seen as too much until the day it is not enough." — William H. Webster</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats.</p><p>Zero Trust operates on the principle of "never trust, always verify," but what does this mean in practice? Zero Trust doesn't just look outward; it recognizes that threats also come from the inside. By assuming that a breach is not just possible, but has already happened, Zero Trust strategies are uniquely positioned to mitigate damage by insiders, whether malicious or accidental.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on November 09, 2023<br></strong><br><strong>This week's episode</strong>:</p><ol><li>Introduction and Brill is living in a Faraday cage</li><li>How we got to Zero Trust by understadning the Cyber Kill Chain</li><li>The Principals of Zero Trust</li><li>Recommended Zero Trust Frameworks</li></ol><p><strong>NIST Zero Trust Architecture (SP 800-207)</strong>: <a href="https://csrc.nist.gov/pubs/sp/800/207/final">https://csrc.nist.gov/pubs/sp/800/207/final</a><br><strong>CISA Zero Trust Maturity Model</strong>: <a href="https://www.cisa.gov/zero-trust-maturity-model">https://www.cisa.gov/zero-trust-maturity-model</a><br><strong>Cyber Kill Chain</strong>: <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html</a></p><p><strong>Intro music</strong>: The Lockdown</p><p><em>"Security is always seen as too much until the day it is not enough." — William H. Webster</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Fri, 10 Nov 2023 09:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/31bec9df/20c0551a.mp3" length="9872777" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:image href="https://img.transistor.fm/RQdwgNSk-ZsOpEAtFABzLzh94EyD40VmqQsiXErox-Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84OTM3/NzlkYTAyYTg0MTNh/ODZlNzEyNTQwODU1/NmNmNy5wbmc.jpg"/>
      <itunes:duration>820</itunes:duration>
      <itunes:summary>In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats. Zero Trust operates on the principle of "never trust, always verify," but what does this mean in pra...</itunes:summary>
      <itunes:subtitle>In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misi</itunes:subtitle>
      <itunes:keywords>privacy, security, cybersecurity, osint, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking, network security, incident response</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>004 - The Psychology of Social Engineering</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>004 - The Psychology of Social Engineering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-13920170</guid>
      <link>https://share.transistor.fm/s/c3640961</link>
      <description>
        <![CDATA[<p>Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on November 06, 2023</strong></p><p><strong>This week's episode:</strong><br>1. I'm back!<br>2. Traveling to London and Los Angeles<br>3. A major privacy invasion for Jennifer Lawrence<br>4. The Psychology of social engineering</p><p><strong>Intro music: </strong>The Lockdown</p><p><em>"To be yourself in a world that is constantly trying to make you something else is the greatest accomplishment." - Ralph Waldo Emerson</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on November 06, 2023</strong></p><p><strong>This week's episode:</strong><br>1. I'm back!<br>2. Traveling to London and Los Angeles<br>3. A major privacy invasion for Jennifer Lawrence<br>4. The Psychology of social engineering</p><p><strong>Intro music: </strong>The Lockdown</p><p><em>"To be yourself in a world that is constantly trying to make you something else is the greatest accomplishment." - Ralph Waldo Emerson</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 06 Nov 2023 14:00:00 -0500</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/c3640961/5d901a03.mp3" length="14634528" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1216</itunes:duration>
      <itunes:summary>Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.  Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on November 06, 2023  This week's episode: 1. I'm back! 2. Traveling to London and Los Angeles 3. A major privacy invasion for Jennifer Lawrence 4. The Psychology of social engineering  Intro music: The Lockdown  "To be yourself in a world that is constantly trying to make you something else i...</itunes:summary>
      <itunes:subtitle>Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.  Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on November 06, 2023  This week's episode: 1. I'm ba</itunes:subtitle>
      <itunes:keywords>privacy, security, cybersecurity, fappening, osint, private, CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>003 - The Invisible Net, and Why I use GrapheneOS</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>003 - The Invisible Net, and Why I use GrapheneOS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-12617002</guid>
      <link>https://share.transistor.fm/s/97ae9c9e</link>
      <description>
        <![CDATA[<p>Welcome to episode three of The Lockdown - The Practical Privacy and Security podcast.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on April 09, 2023</strong></p><p><strong>This week's episode:</strong><br>1. The case of Zachary McCoy<br>2. Why do all this?<br>3. The Apple Ecosystem<br>4. My experience with GrapheneOS</p><p><strong>Get GrapheneOS:</strong> <a href="https://grapheneos.org/">https://grapheneos.org/</a></p><p><strong>The case of Zachary McCoy:<br></strong><a href="https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google">https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google</a></p><p>Tracking Phones, Google Is a Dragnet for the Police:<br><a href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html<br></a><br>Denmark frees 32 inmates over flaws in phone geo-location evidence:<br><a href="https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations">https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations</a></p><p><strong>Intro music: </strong>The Lockdown</p><p><em>"The rights of one are as sacred as the rights of a million." - Eugene V. Debs</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to episode three of The Lockdown - The Practical Privacy and Security podcast.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on April 09, 2023</strong></p><p><strong>This week's episode:</strong><br>1. The case of Zachary McCoy<br>2. Why do all this?<br>3. The Apple Ecosystem<br>4. My experience with GrapheneOS</p><p><strong>Get GrapheneOS:</strong> <a href="https://grapheneos.org/">https://grapheneos.org/</a></p><p><strong>The case of Zachary McCoy:<br></strong><a href="https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google">https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google</a></p><p>Tracking Phones, Google Is a Dragnet for the Police:<br><a href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html<br></a><br>Denmark frees 32 inmates over flaws in phone geo-location evidence:<br><a href="https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations">https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations</a></p><p><strong>Intro music: </strong>The Lockdown</p><p><em>"The rights of one are as sacred as the rights of a million." - Eugene V. Debs</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 10 Apr 2023 09:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/97ae9c9e/d77d9314.mp3" length="18641622" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1550</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to episode three of The Lockdown - The Practical Privacy and Security podcast.</p><p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on April 09, 2023</strong></p><p><strong>This week's episode:</strong><br>1. The case of Zachary McCoy<br>2. Why do all this?<br>3. The Apple Ecosystem<br>4. My experience with GrapheneOS</p><p><strong>Get GrapheneOS:</strong> <a href="https://grapheneos.org/">https://grapheneos.org/</a></p><p><strong>The case of Zachary McCoy:<br></strong><a href="https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google">https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google</a></p><p>Tracking Phones, Google Is a Dragnet for the Police:<br><a href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html<br></a><br>Denmark frees 32 inmates over flaws in phone geo-location evidence:<br><a href="https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations">https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations</a></p><p><strong>Intro music: </strong>The Lockdown</p><p><em>"The rights of one are as sacred as the rights of a million." - Eugene V. Debs</em></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </itunes:summary>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>002 - The Lastpass Breach and Recommended Password Managers</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>002 - The Lastpass Breach and Recommended Password Managers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-12470048</guid>
      <link>https://share.transistor.fm/s/58f31767</link>
      <description>
        <![CDATA[<p>Welcome to episode two of The Lockdown - Practical Privacy and Security podcast. In this episode I share the saga of the LastPass breach, and my thoughts on password managers and authenticator apps. <br><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 19, 2023</strong></p><p><strong>This week's episode:</strong><br>1. The LastPass Breach<br>2. Password Managers: Dashlane, 1Password, BitWarden, and KeePassXC<br>3. Authenticator Apps: Google Authenticator, Aegis, and Authy.</p><p><strong>Recommended Password Managers:</strong><br>1. <a href="https://keepassxc.org">https://keepassxc.org</a> (Desktop)<br>2. <a href="https://www.keepassdx.com">https://www.keepassdx.com</a> (Android only)<br>3. <a href="https://strongboxsafe.com">https://strongboxsafe.com</a> (iOS only)<br>4. <a href="https://bitwarden.com">https://bitwarden.com </a>(Top recommendation for cloud hosted)<br>5. <a href="https://1password.com">https://1password.com</a> (Ease of use, and great option for cloud hosted)<br>6. <a href="https://www.dashlane.com">https://www.dashlane.com</a> (Expensive, no desktop app)</p><p><strong>Recommended Authenticator Apps:</strong><br>1. <a href="https://authy.com">https://authy.com</a><br>2. <a href="https://getaegis.app">https://getaegis.app</a> (Android only)</p><p><strong>Get Yubikey:</strong><br> <a href="https://www.yubico.com">https://www.yubico.com</a></p><p><strong>Intro music:</strong> The Lockdown</p><p><strong><em>"In the long run, we will have to rebuild the universe of the online world to have security first and ease of use second." - Moxie Marlinspike</em></strong></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to episode two of The Lockdown - Practical Privacy and Security podcast. In this episode I share the saga of the LastPass breach, and my thoughts on password managers and authenticator apps. <br><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 19, 2023</strong></p><p><strong>This week's episode:</strong><br>1. The LastPass Breach<br>2. Password Managers: Dashlane, 1Password, BitWarden, and KeePassXC<br>3. Authenticator Apps: Google Authenticator, Aegis, and Authy.</p><p><strong>Recommended Password Managers:</strong><br>1. <a href="https://keepassxc.org">https://keepassxc.org</a> (Desktop)<br>2. <a href="https://www.keepassdx.com">https://www.keepassdx.com</a> (Android only)<br>3. <a href="https://strongboxsafe.com">https://strongboxsafe.com</a> (iOS only)<br>4. <a href="https://bitwarden.com">https://bitwarden.com </a>(Top recommendation for cloud hosted)<br>5. <a href="https://1password.com">https://1password.com</a> (Ease of use, and great option for cloud hosted)<br>6. <a href="https://www.dashlane.com">https://www.dashlane.com</a> (Expensive, no desktop app)</p><p><strong>Recommended Authenticator Apps:</strong><br>1. <a href="https://authy.com">https://authy.com</a><br>2. <a href="https://getaegis.app">https://getaegis.app</a> (Android only)</p><p><strong>Get Yubikey:</strong><br> <a href="https://www.yubico.com">https://www.yubico.com</a></p><p><strong>Intro music:</strong> The Lockdown</p><p><strong><em>"In the long run, we will have to rebuild the universe of the online world to have security first and ease of use second." - Moxie Marlinspike</em></strong></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 20 Mar 2023 08:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/58f31767/cd9419cf.mp3" length="31225870" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>2599</itunes:duration>
      <itunes:summary>Welcome to episode two of The Lockdown - Practical Privacy and Security podcast. In this episode I share the saga of the LastPass breach, and my thoughts on password managers and authenticator apps.  Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on March 19, 2023  This week's episode: 1. The LastPass Breach 2. Password Managers: Dashlane, 1Password, BitWarden, and KeePassXC 3. Authenticator Apps: Google Authenticator, Aegis...</itunes:summary>
      <itunes:subtitle>Welcome to episode two of The Lockdown - Practical Privacy and Security podcast. In this episode I share the saga of the LastPass breach, and my thoughts on password managers and authenticator apps.  Follow on Twitter (X): @privacypod Support the show: ht</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>001 - Stalkerware and the Data Collector</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>001 - Stalkerware and the Data Collector</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">Buzzsprout-12417353</guid>
      <link>https://share.transistor.fm/s/2f7611ff</link>
      <description>
        <![CDATA[<p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 10, 2023</strong></p><p><strong>Show Links:</strong><br>Stalkerware:<a href="https://www.theregister.com/2023/02/07/stalkerware_developer_fined/"> https://www.theregister.com/2023/02/07/stalkerware_developer_fined/</a><br>IntelTechniques (List of People Search Sites): <a href="https://inteltechniques.com/workbook.html">https://inteltechniques.com/workbook.html</a></p><p><strong>This week's privacy tips:</strong><br>1. Privacy check-up / opt-out from people search sites<br>2. Establish a Revocable Living Trust. Be sure to hire an estate planning attorney.<br>3. Custom domains with Namecheap and add privacy.<br>4. Setup a private mailbox with UPS.<br>5. Use Privacy.com for virtual payment cards.<br>6. MySudo virtual phone numbers. Stop being tracked, and avoid SIM swap attacks!<br>7. Use SimpleMobile or Mint for a pre-paid cellphone option.</p><p><strong>Not Sponsors:</strong><br><a href="https://www.privacy.com/">https://www.privacy.com/</a><br><a href="https://mysudo.com/">https://mysudo.com/</a><br><a href="https://www.namecheap.com/">https://www.namecheap.com/</a></p><p><strong>Intro music:</strong> The Lockdown</p><p><strong><em>“Who controls the past controls the future. Who controls the present controls the past.”</em></strong><strong> - 1984 by George Orwell</strong></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Follow on Twitter (X)</strong>: <a href="https://twitter.com/privacypod">@privacypod</a><br><strong>Support the show</strong>: <a href="https://www.patreon.com/TheLockdown">https://www.patreon.com/TheLockdown</a></p><p><strong>This episode was recorded on March 10, 2023</strong></p><p><strong>Show Links:</strong><br>Stalkerware:<a href="https://www.theregister.com/2023/02/07/stalkerware_developer_fined/"> https://www.theregister.com/2023/02/07/stalkerware_developer_fined/</a><br>IntelTechniques (List of People Search Sites): <a href="https://inteltechniques.com/workbook.html">https://inteltechniques.com/workbook.html</a></p><p><strong>This week's privacy tips:</strong><br>1. Privacy check-up / opt-out from people search sites<br>2. Establish a Revocable Living Trust. Be sure to hire an estate planning attorney.<br>3. Custom domains with Namecheap and add privacy.<br>4. Setup a private mailbox with UPS.<br>5. Use Privacy.com for virtual payment cards.<br>6. MySudo virtual phone numbers. Stop being tracked, and avoid SIM swap attacks!<br>7. Use SimpleMobile or Mint for a pre-paid cellphone option.</p><p><strong>Not Sponsors:</strong><br><a href="https://www.privacy.com/">https://www.privacy.com/</a><br><a href="https://mysudo.com/">https://mysudo.com/</a><br><a href="https://www.namecheap.com/">https://www.namecheap.com/</a></p><p><strong>Intro music:</strong> The Lockdown</p><p><strong><em>“Who controls the past controls the future. Who controls the present controls the past.”</em></strong><strong> - 1984 by George Orwell</strong></p><p><strong>Official Website</strong>: <a href="https://psysecure.com/">https://psysecure.com</a></p><p><strong>Podcast music:</strong> The R3cluse</p>
<strong>
  <a href="https://www.patreon.com/TheLockdown" rel="payment" title="★ Support this podcast on Patreon ★">★ Support this podcast on Patreon ★</a>
</strong>]]>
      </content:encoded>
      <pubDate>Mon, 13 Mar 2023 09:00:00 -0400</pubDate>
      <author>Ray Heffer</author>
      <enclosure url="https://media.transistor.fm/2f7611ff/f98b1f3a.mp3" length="20248481" type="audio/mpeg"/>
      <itunes:author>Ray Heffer</itunes:author>
      <itunes:duration>1684</itunes:duration>
      <itunes:summary>Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on March 10, 2023  Show Links: Stalkerware: https://www.theregister.com/2023/02/07/stalkerware_developer_fined/ IntelTechniques (List of People Search Sites): https://inteltechniques.com/workbook.html  This week's privacy tips: 1. Privacy check-up / opt-out from people search sites 2. Establish a Revocable Living Trust. Be sure to hire an estate planning attorney. 3. Custom doma...</itunes:summary>
      <itunes:subtitle>Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown  This episode was recorded on March 10, 2023  Show Links: Stalkerware: https://www.theregister.com/2023/02/07/stalkerware_developer_fined/ IntelTechniques (List of Pe</itunes:subtitle>
      <itunes:keywords>privacy, security, data breach, OSINT, CISO, data protection, threat intelligence, infosec, cyber risk, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
