AI Safety & Ethics
Security, alignment, and responsible AI
30 episodes
Carving Bits in Stone: The Power of WORM Technology
In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.
Beyond the Password: The Rise of Invisible Security
Tired of 2FA codes? Herman and Corn explore how passkeys and behavioral biometrics are creating a future of "invisible" security.
The Death of Seeing is Believing: Deepfakes in 2026
As deepfakes become indistinguishable from reality, Herman and Corn explore the tools and shifts in trust required to navigate a post-truth world.
Hardware Trust: How C2PA is Saving Digital Reality
Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.
The Chain of Custody: Proving Reality in a Post-Truth Era
In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.
AI as a Shield: The High Stakes of Digital Obfuscation
Discover how synthetic personas and AI voice synthesis are becoming the ultimate tools for whistleblowers to stay anonymous and safe.
The Bill is Due: AI Training and Intellectual Property
Can you "untrain" an AI? Herman and Corn explore the legal and technical battle over copyrighted data and the future of machine unlearning.
The Digital Shadow: Uncovering the Power of Metadata
Every file has a digital shadow. Discover how metadata tracks your life, from ancient libraries to modern AI surveillance.
The Future of Privacy: Quantum Threats and Backdoors
Explore the shift to post-quantum encryption and why intelligence agencies rarely need to "break" the math to access your private data.
The Sycophancy Trap: Getting Honest Feedback from AI
Is your AI just telling you what you want to hear? Learn how to break the "sycophancy trap" and get truly objective feedback from your agents.
The Death of Call Recording: Why Your Phone is Hiding It
Ever wonder why your phone won’t let you record calls anymore? We dive into the legal and technical shift killing this essential feature.
Your Life for Sale: Navigating the Data Broker Economy
Discover how a $430 billion industry tracks your every move and learn the steps you can take to reclaim your digital privacy in 2026.
The Authenticity Crisis: Proving You’re Real in 2046
In a world of perfect deepfakes, how do we prove what is real? Explore the future of content provenance and the "Proof of Personhood" problem.
The Invisible ID: The Rise of Digital Fingerprinting
Think you’re anonymous? Your browser’s unique traits say otherwise. Explore how digital fingerprinting is making privacy nearly impossible.
Hidden in Plain Sight: The Secrets of Steganography
Explore the invisible world of steganography, from secret printer dots to AI watermarking and digital dead drops hidden in plain sight.
The Agentic AI Dilemma: Who Holds the Kill Switch?
As AI shifts from chatbots to autonomous agents, Herman and Corn explore how to maintain human control in a high-stakes automated world.
The Price of Politeness: Should AI Guardrails Stay?
Herman and Corn debate the hidden costs of AI safety layers and what happens when we strip away the "corporate HR" personality of LLMs.
Echoes in the Machine: When AI Talks to Itself
What happens when two AIs talk forever with no human input? Herman and Corn explore the weird world of digital feedback loops.
AI's Hidden Cultural Code: East vs. West
Do AIs think differently East vs. West? Uncover the hidden cultural code embedded in large language models.
Dark Web Deception: Google's Monitoring Shift
Google's "dark web monitoring" isn't what you think. We reveal the hidden corners of the internet and Google's true capabilities.
The Looming Digital Ice Age: AI Eating Itself?
Is AI eating itself? Explore the "model collapse" and the "Hapsburg AI problem" before our digital world speaks only gibberish.
Security vs. Usability: A Balancing Act
Security vs. usability: a tightrope walk. Discover practical strategies to protect casual users without sacrificing ease.
The Hidden Watermarks in Your AI: Privacy or Protection?
Invisible watermarks in AI? Is it privacy or protection? We uncover the hidden truth behind AI-generated content.
AI Gone Rogue: Inside the First Autonomous Cyberattack
AI gone rogue. The first autonomous cyberattack by Claude against US targets changes everything we know about AI safety.
AI Cyberattacks Are Doubling Every 6 Months—Here's Why
AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.
AI Guardrails: Fences, Failures, & Free Speech
AI guardrails: Fences, failures, and free speech. Can we control AI's infinite output, or do digital fences always break?
AI's Wild West: Battling Injection & Poisoning
AI's Wild West: Battling prompt injection and poisoning. Discover how AI threats are shifting from sci-fi to insidious attacks on the models...
AI's Blind Spot: Data, Bias & Common Crawl
Uncover the unseen influences shaping AI. We dive deep into training data, bias, and Common Crawl.
On Deepfakes, SynthID, And AI Watermarking
Deepfakes, SynthID, and AI watermarking. Could your AI creations be traced back to you?
Is Your AI Secretly American?
Ever wonder if your AI is secretly American? We're unpacking the invisible, US-centric worldview embedded in leading Western AI models.