← All Tags

#data-security

13 episodes

#2667: Lost Phone, Found Tension: Security vs. Returnability

Can you secure your Android without killing the chance a good Samaritan returns it? We break down the tradeoffs.

backup-strategiesdata-securityandroid

#2482: When AI Chatbots Leak Your PDFs via Public S3 Buckets

A user uploaded a sensitive PDF to an AI chatbot. The chatbot stored it in a public S3 bucket with zero authentication.

data-securityai-securitycloud-computing

#2481: How to Ask Cloud Vendors About Security (Without Sounding Clueless)

What to ask cloud vendors about security practices — and the technical red flags that actually matter.

cloud-computingdata-securitycybersecurity

#2383: Breach Blame: When Is It Fair?

How much blame do companies deserve for data breaches? The answer isn't as simple as you think.

cybersecuritydata-securitydigital-privacy

#1824: Why Governments Are Building Bunkers for AI

Public clouds can’t handle the security or scale of classified AI. Governments are retreating to fortified bunkers.

national-securitycybersecuritydata-security

#1796: The Encryption Mirage: Are Your Keys Really Safe?

End-to-end encryption promises privacy, but hidden backdoors and metadata leaks can betray your trust.

cryptographydata-securitydigital-privacy

#1230: Hackers Lived in Your Account for 200 Days Before You Knew

By the time you get a breach notification, the damage is already done. Discover the hidden reality of the "silent breach" and API security.

cybersecuritydata-security2026

#1229: Beyond the .env File: Mastering Secrets Management

Stop relying on "security by pinky-promise." Learn how to move from messy .env files to professional zero-trust secrets management.

software-developmentcybersecuritydata-security

#564: Beyond the Factory Reset: How to Truly Erase Your Data

Think a factory reset protects your old data? Herman and Corn reveal why your digital "ghosts" might still be lurking on your old devices.

data-storagedata-securityprivacye-wastedigital-forensics

#537: The Architecture of Secrecy: From State Secrets to Zero Trust

Is there a master list of state secrets? Explore the evolution of government classification and its impact on modern digital security.

national-securitycybersecuritymilitary-strategydata-securityzero-trust

#98: The Fight for Your Financial Data: Why APIs Matter

Why is it so hard to get your own transaction data? Herman and Corn dive into the CFPB's Section 1033 and the battle for open banking.

financial-dataapisopen-bankingsection-1033cfpb

#73: VPNs: Privacy Myth vs. Reality

VPNs: privacy savior or marketing hype? We expose the truth behind the grand claims and technical realities.

vpnsprivacysecuritydigital-privacyinternet-security

#48: AI Inference Decoded: The How & Where of AI Magic

Ever wonder how AI magic happens? We demystify AI inference, exploring where and how models truly operate.

ai-inferenceai-deploymentcloud-computingon-premisesdata-security