Networking & Infrastructure

Firewalls & Security

OPNsense, VPNs, stateful inspection, encryption

12 episodes

The Geometry of Secrets: How SSH Keys Protect the Web

Ever wonder why your SSH keys are so secure? Herman and Corn dive into the "trapdoor" math and elliptic curves powering the modern web.

elliptic-curve-cryptographyssh-keystrapdoor-functions

Beyond the Squiggly Line: How Digital Signatures Work

Think a digital signature is just a picture of your name? Think again. Herman and Corn dive into the math and hardware behind secure PDFs.

public-key-infrastructuredigital-certificatespdf-signatures

The Telemetry Trap: Why Your Devices Won't Stop Talking

Herman and Corn dive into the hidden world of telemetry, exploring why our devices phone home and whether "anonymous" data is actually a myth.

telemetry-datadigital-privacydata-anonymization

Goodbye 2FA: Why Passkeys are the Future of Security

Tired of hunting for 2FA codes? Herman and Corn explore how passkeys are killing the password and making the internet faster and more secure.

passkey-authenticationfido-alliancepasswordless-security

Digital Fingerprints: The Secret Math Saving Your Data

Learn why those random strings of characters on download pages are the only thing keeping your files safe from corruption and hackers.

checksum-verificationdata-integritydigital-provenance

The Invisible Roads: Can BGP Hijacking Break Encryption?

Explore how BGP hijacking allows governments to reroute the web, threatening privacy and exposing metadata despite encrypted apps like Signal.

bgp-hijackinginternet-routingmetadata-security

Beyond HTTPS: Securing Your Digital Shadow with Private DNS

Think HTTPS protects everything? Think again. Learn how Private DNS hides your browsing habits from ISPs and advertisers in this deep dive.

dns-over-tlsdns-over-httpsencrypted-dns

The Secret Language of Security: CVEs and CrowdSec

Discover the hidden plumbing of the internet, from the global CVE catalog to how tools like CrowdSec create a digital neighborhood watch.

common-vulnerabilities-exposurescrowdseccybersecurity-threat-intelligence

The Open Door: How Fast Can Hackers Find Your Server?

Think your new server is safe? Think again. Herman and Corn discuss why an unprotected server can be found and hacked in under 60 seconds.

internet-background-radiationautomated-port-scanningserver-security-threats

The Invisible War: Inside the World of State-Sponsored APTs

They don't just hack; they move in. Discover how state-sponsored APTs stay hidden in networks for years and the signatures they leave behind.

aptadvanced persistent threatcyber espionagecyber warfarestate-sponsored hacking

VPNs: Privacy Myth vs. Reality

VPNs: privacy savior or marketing hype? We expose the truth behind the grand claims and technical realities.

vpnsPrivacySecuritydigital privacyinternet security

Secure Messaging: Beyond the Buzzwords

Is your secure messaging truly private? We expose the hidden truths behind E2EE, cloud backups, and corporate ownership.

end-to-end-encryptionmessaging-app-securitydigital-privacy