Networking & Infrastructure
Networks, security, and system administration
33 episodes
The Geometry of Secrets: How SSH Keys Protect the Web
Ever wonder why your SSH keys are so secure? Herman and Corn dive into the "trapdoor" math and elliptic curves powering the modern web.
Beyond the Squiggly Line: How Digital Signatures Work
Think a digital signature is just a picture of your name? Think again. Herman and Corn dive into the math and hardware behind secure PDFs.
From Hotel Hacks to Digital Resistance: The Travel Router
Discover how a hotel billing hack became a tool for digital resistance and how a Linksys "accident" changed internet privacy forever.
The Invisible Hand: Inside Rail Traffic Management
Discover the high-stakes world of rail dispatching, where physics, logic, and "dark territory" meet to keep thousands of tons of steel on track.
The Hidden Hierarchy: Why Your Mobile Plan Might Be Slower
Ever wonder why your budget phone plan slows down in a crowd? Herman and Corn explore the hidden hierarchy of mobile network priority.
The Physics of Plane Wi-Fi: Musk, O'Leary, and Phased Arrays
Why is in-flight Wi-Fi finally getting good? Explore the physics of Starlink, phased array antennas, and the Musk-OβLeary corporate feud.
The Telemetry Trap: Why Your Devices Won't Stop Talking
Herman and Corn dive into the hidden world of telemetry, exploring why our devices phone home and whether "anonymous" data is actually a myth.
The SFP+ Revolution: Future-Proofing Your Home Network
Stop the bottleneck! Learn why SFP+ fiber backbones are the ultimate upgrade for modern high-speed internet and future-proof home networking.
Bandwidth vs. Speed: Decoding Your Digital Plumbing
Is your 10-gig plan actually fast? Herman and Corn dive into the difference between bandwidth and speed in the modern fiber era.
Goodbye 2FA: Why Passkeys are the Future of Security
Tired of hunting for 2FA codes? Herman and Corn explore how passkeys are killing the password and making the internet faster and more secure.
Beyond the 404: Building a Permanent Web with IPFS
Tired of 404 errors? Explore how IPFS and content addressing are solving the internet's link rot problem to preserve digital history.
Digital Fingerprints: The Secret Math Saving Your Data
Learn why those random strings of characters on download pages are the only thing keeping your files safe from corruption and hackers.
Deep Shelter Data: Building Emergency Mesh Networks
Learn how to bypass thick concrete walls and bring high-speed internet into deep shelters using portable mesh networks and Starlink technology.
The Invisible Roads: Can BGP Hijacking Break Encryption?
Explore how BGP hijacking allows governments to reroute the web, threatening privacy and exposing metadata despite encrypted apps like Signal.
The Death of the VPN: Moving Toward a Zero Trust Future
Is the classic corporate VPN a dying dinosaur? Explore why the "castle and moat" model is failing and how Zero Trust is taking over.
Beyond HTTPS: Securing Your Digital Shadow with Private DNS
Think HTTPS protects everything? Think again. Learn how Private DNS hides your browsing habits from ISPs and advertisers in this deep dive.
The Secret Language of Security: CVEs and CrowdSec
Discover the hidden plumbing of the internet, from the global CVE catalog to how tools like CrowdSec create a digital neighborhood watch.
The Portable Fortress: Moving Your Network Like a Pro
Learn how to build a "portable digital fortress" using military tactics and roadie discipline to make your next move tech-stress-free.
The Open Door: How Fast Can Hackers Find Your Server?
Think your new server is safe? Think again. Herman and Corn discuss why an unprotected server can be found and hacked in under 60 seconds.
BGP: The Secret Glue Holding the Global Internet Together
Discover how BGP acts as the internet's postal service, managing data across thousands of networks through economics, policy, and trust.
The Invisible Sky: Networking JFK International Airport
Ever wonder how thousands of people stay connected at JFK? Join Herman and Corn as they dive into the massive scale of airport networking.
The Mesh Myth: Why Wires Still Win in Home Networking
Is your mesh system killing your speed? Discover why dedicated access points and wired backhauls outperform the "no wires" marketing hype.
Decoding the Internet: A Deep Dive into the OSI Model
How does data travel from a cable to your screen? Join Herman and Corn as they break down the seven layers of the OSI model.
The Hidden Copper Graveyard: Our Legacy of Dead Cables
Millions of miles of toxic copper cables sit beneath our feet. Why is it so hard to dig up our digital past?
Bulletproof Internet: Achieving the Gold Standard of Uptime
Tired of outages? Discover how to build a "five nines" internet setup using fiber, satellite, and bonding tech to stay connected no matter what.
Future-Proofing Your Home Network for the AI Era
Stop the lag: Herman and Corn break down Cat 6A, SFP+ backbones, and why Wi-Fi 7 is the ultimate upgrade for local AI.
The Invisible War: Inside the World of State-Sponsored APTs
They don't just hack; they move in. Discover how state-sponsored APTs stay hidden in networks for years and the signatures they leave behind.
Ditching the Tank: Lightweight Linux Router Alternatives
Is OPNsense overkill for your home? Herman and Corn explore lightweight Linux alternatives for a faster, simpler, and more reliable network.
Why Your Gigabit Internet Feels Like Dial-Up: Mesh vs. Wired
Tired of losing speed to a mesh system? Herman and Corn break down Wi-Fi 7, VLANs, and how to reclaim your home network's performance.
The Glass Threads: Decoding the Internet's Anatomy
From living room routers to deep-sea cables, Herman and Corn explore the massive, hidden engineering that keeps our digital world connected.
VPNs: Privacy Myth vs. Reality
VPNs: privacy savior or marketing hype? We expose the truth behind the grand claims and technical realities.
Fork or Stay? The Art of Customizing Open Source
Fork or stay? We're diving deep into customizing open source, weighing ownership, contribution, and the hidden costs of going solo.
Secure Messaging: Beyond the Buzzwords
Is your secure messaging truly private? We expose the hidden truths behind E2EE, cloud backups, and corporate ownership.