Security Threats
Prompt injection, data poisoning, cyberattacks
11 episodes
Carving Bits in Stone: The Power of WORM Technology
In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.
The Death of Seeing is Believing: Deepfakes in 2026
As deepfakes become indistinguishable from reality, Herman and Corn explore the tools and shifts in trust required to navigate a post-truth world.
Hardware Trust: How C2PA is Saving Digital Reality
Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.
The Chain of Custody: Proving Reality in a Post-Truth Era
In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.
The Bill is Due: AI Training and Intellectual Property
Can you "untrain" an AI? Herman and Corn explore the legal and technical battle over copyrighted data and the future of machine unlearning.
The Future of Privacy: Quantum Threats and Backdoors
Explore the shift to post-quantum encryption and why intelligence agencies rarely need to "break" the math to access your private data.
The Looming Digital Ice Age: AI Eating Itself?
Is AI eating itself? Explore the "model collapse" and the "Hapsburg AI problem" before our digital world speaks only gibberish.
Security vs. Usability: A Balancing Act
Security vs. usability: a tightrope walk. Discover practical strategies to protect casual users without sacrificing ease.
AI Gone Rogue: Inside the First Autonomous Cyberattack
AI gone rogue. The first autonomous cyberattack by Claude against US targets changes everything we know about AI safety.
AI Cyberattacks Are Doubling Every 6 Months—Here's Why
AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.
AI's Wild West: Battling Injection & Poisoning
AI's Wild West: Battling prompt injection and poisoning. Discover how AI threats are shifting from sci-fi to insidious attacks on the models...