← All Tags

#digital-forensics

9 episodes

#1983: Why Your Digital Photos Are Slowly Disappearing

Physical paper from the 1700s is more durable than a Word doc from 1994. Here's why digital data is fragile and how archivists fight bit rot.

data-storagedigital-forensicshardware-reliability

#1925: The Plumbing That Keeps Science From Collapsing

Half of all links in academic papers are dead. Here’s the plumbing that keeps knowledge from vanishing.

digital-forensicsdata-redundancyknowledge-management

#1910: Our Podcast Is Now a Permanent Research Artifact

Why we're uploading every episode to CERN's Zenodo archive, giving our AI experiments a permanent DOI and a life beyond streaming platforms.

open-sourcedata-storagedigital-forensics

#1890: Forensic Cameras vs. the 'It's Just AI' Defense

If a photo can be faked in seconds, how does law enforcement prove their surveillance footage is real?

digital-forensicsforensic-grade-camerascryptographic-signatures

#1521: How Journalists Use Sun Shadows to Catch Fake News

How do newsrooms verify a missile strike in a "black box" scenario? Discover the forensic tools fighting digital disinformation.

osintdigital-forensicsmisinformation

#564: Beyond the Factory Reset: How to Truly Erase Your Data

Think a factory reset protects your old data? Herman and Corn reveal why your digital "ghosts" might still be lurking on your old devices.

data-storagedata-securityprivacye-wastedigital-forensics

#340: Carving Bits in Stone: The Power of WORM Technology

In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.

worm-technologydata-immutabilitydigital-forensics

#287: The Chain of Custody: Proving Reality in a Post-Truth Era

In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.

digital-forensicschain-of-custodycryptographic-hashing

#167: Why Are Hackers Hiding in Your System for Decades?

They don't just hack; they move in. Discover how state-sponsored APTs stay hidden in networks for years and the signatures they leave behind.

aptadvanced-persistent-threatcyber-espionagecyber-warfarestate-sponsored-hacking