My Weird Prompts

The human-AI collaboration podcast

A sloth and a donkey discuss whatever's on Daniel's mind — every episode generated by AI from a single voice prompt

Latest Episode

Browse by Channel

All channels →

Meet the Hosts

How It Works

🎤 Voice Prompt
Record your question or idea using voice capture
🤖 AI Script
AI transforms your prompt into a conversational script
🔊 Text-to-Speech
The script gets converted to natural-sounding speech
🎬 Assembly
Audio segments are combined with intro and outro
🎧 Podcast
Your final episode is ready to listen and share!

#2705: Your Brain Isn't a Hard Drive — What Actually Fits

Long-term memory isn't storage — it's a generative model. Here's where the brain/computer analogy actually holds up.

neuroscienceraggenerative-ai

#2704: The Shower Effect: How Stepping Away Unlocks Solutions

Why do our best ideas come in the shower? The neuroscience behind the incubation effect and when to step back.

neuroscienceneuroplasticityexecutive-function

#2703: Why Fidgeting Actually Helps You Think

Fidget spinners aren't just toys—they're self-regulation tools. Here's the neuroscience behind why movement helps you focus.

neuroscienceadhdsensory-processing

#2702: How Jet Engines Really Push 100 Tons Through the Air

Where does all that fuel live, and how does a spinning fan produce enough thrust to lift a 747?

aerospace-engineeringaviation-technologythermal-management

#2701: Why Drugs Give You Vivid Nightmares

SSRIs, beta-blockers, and melatonin: how medications hijack the brain's dream machinery.

pharmacologyneurosciencedream-research

#2700: What Your Brain Actually Does When You Daydream

Daydreaming isn't your brain slacking off — it's running a flight simulator for your life.

neuroscienceneuroplasticityexecutive-function
Thursday, May 7

#2699: Inside Android's Binder: No HTTP Here

Android's internal APIs don't use HTTP. They use Binder — a kernel-level IPC mechanism that's faster, tighter, and completely opaque.

operating-systemsandroidsecurity

#2698: How Hackers Hide C2 Servers in Plain Sight

Bulletproof hosts, hijacked routers, and Discord channels — how command and control infrastructure stays up despite takedown attempts.

cybersecuritysocial-engineeringbulletproof-hosting

#2697: When Trust in Your Country Feels Like a Bad Relationship

What happens when the state you fund feels like it's deceiving you — and you can't opt out.

israelsocial-engineeringpolitical-history

#2696: How Pegasus Silently Hijacks Your Phone's Microphone

How NSO's Pegasus achieves silent mic access on Android through zero-click exploits, kernel privilege escalation, and DMA buffer reading.

espionagecybersecuritysurveillance-technology