← All Tags

#security

18 episodes

#2699: Inside Android's Binder: No HTTP Here

Android's internal APIs don't use HTTP. They use Binder — a kernel-level IPC mechanism that's faster, tighter, and completely opaque.

operating-systemsandroidsecurity

#2679: Can a VPN Protect You from SS7 Phone Spying?

SS7 is the hidden backbone of global phone networks—and it's wide open to spies. Here's what a VPN does and doesn't fix.

privacytelecommunicationssecurity

#2678: How IMSI Catchers Actually Track Your Phone

How fake cell towers intercept your phone, from GSM flaws to 5G fixes. Separating spy-thriller hype from real engineering.

surveillance-technologysecurityprivacy

#2594: The Hierarchy of Immutable Code

From mask ROM to e-fuses: how hardware enforces a hierarchy of mutability in every computing device.

hardware-engineeringhardware-reliabilitysecurity

#2508: CORS Demystified: What Your Browser Actually Blocks

Why browsers block cross-origin requests, how CORS actually works, and the common pitfalls that trip up developers.

securitycybersecuritycors

#2496: Are Hidden API Endpoints Leaks or Just Plumbing?

When LLM agents discover unauthenticated JSON endpoints in browser DevTools, is it a security breach or just reading the page?

api-integrationsecurityai-agents

#2324: Filming in Israel: What Creators Need to Know

Navigating the legal and social challenges of filming in Israel—what’s allowed, what’s not, and how creators can stay safe.

israelprivacysecurity

#2251: Agent-to-Agent Protocols: What Actually Needs Standardizing

When autonomous agents call other agents, what does a working protocol actually require? Exploring session handling, state management, security, an...

ai-agentsapi-integrationsecurity

#1797: Why the Cloud Runs on Cassette Tapes

The cloud isn't just hard drives—it's millions of robotic cassette tapes holding petabytes of data for Google and NASA.

data-storagehardware-engineeringsecurity

#1780: The Danger Zone: Your Browser Extensions

Your encrypted data is safe until it hits your browser. Here's how extensions turn your "secure" browsing into a data leak.

securitysupply-chain-securitydigital-privacy

#1773: AI's "Hacky" Command-Line Fixes Are a Security Nightmare

Giving AI agents terminal access speeds up fixes but creates invisible security holes and configuration drift.

ai-agentssecurityinfrastructure

#1714: SDKs vs Raw APIs: The Developer's Real Choice

Why do companies pour millions into SDKs? We explore the hidden costs of raw APIs and the strategic advantages of using software kits.

software-developmentapi-integrationsecurity

#1697: Git Hooks: Your Code's Last Line of Defense

Stop shipping secrets and PII to GitHub. Here's how pre-commit hooks automate security for solo developers.

securitydata-integritygit-hooks

#1075: The Great Kernel Shift: Why Linux is Embracing Rust

Discover why the Linux kernel is adopting Rust and how this shift aims to eliminate 70% of the digital world's security vulnerabilities.

kernel-architectureoperating-systemssecurity

#994: Is Your Phone Keeping You Safe or Keeping You Trapped?

Stop letting Google gaslight you. Learn how to safely install apps outside the Play Store while keeping your data secure from poisoned packages.

securitycybersecuritydigital-privacyandroidsideloading

#893: The Art of Red Teaming: Why You Must Break Your Own Plans

Learn why the most resilient organizations pay people to prove them wrong and how red teaming techniques can prevent catastrophic failures.

military-strategygeopolitical-strategyfault-tolerancesecurityai-safety

#73: VPNs: Privacy Myth vs. Reality

VPNs: privacy savior or marketing hype? We expose the truth behind the grand claims and technical realities.

vpnsprivacysecuritydigital-privacyinternet-security

#65: Security vs. Usability: A Balancing Act

Security vs. usability: a tightrope walk. Discover practical strategies to protect casual users without sacrificing ease.

securityusabilitysecurity-vs-usabilitypasswordless-authenticationuser-education