All Episodes
Firewalls Don't Stop Dragons Podcast — 478 episodes
The Power of Prophecy
AI’s Promise and Peril
Identity Resolution
Routers Behaving Badly
Privacy Guides Panel
Spring Cleaning
Surveillance Pricing
Fixing ClickFix
Double Blind Armadillo
New Google Alternatives
Professionally Paranoid
Agents of Misfortune
Debunking Hacklore
Zero-Knowledge Proofs
Honoring Auto Privacy Rights
Private AI Chat
Decentralized Messaging
Best of 2025 Bonus Content
Replay: Stop Reusing Passwords
Best of 2025!
40 Years of Phrack
Be Wary of Holiday Scams
Best & Worst Gifts for 2025!
Erasing Your Online Data
Becoming Cyber Resilient
Removing Old Accounts
Privacy-Focused AI
Securing Old Accounts
Project Franklin Wants You
Tech Time Bombs
Ente: Private by Design
Find Old Accounts (Part 2)
On the Ethics of AI
Find Old Accounts (Part 1)
Meet Rayhunter
Going on a Data Diet
I’m Just a (Privacy) Bill
Hacker Summer Camp 2025
Tariffs vs IP Law
Physical Phone Security
Passport, Lawyer, Locksmith
Freezing Your Mobile Account
Defending Student Privacy
The In-App Switcheroo
ShmooCon: Moose You Already
Rogue AI?
Dialog with the Data Diva
Life in the Panopticon
Dividing Trust
Slay Message Snoopers
Shelter from the Storm
Disable Your MAID
Riding the Data Gravy Train
Travel Insecurity
Life on the Blue Team
Differential Privacy
Microscoping Our Apps
It’s Tax (Scam) Time Again
All Things Secured
Slay Browser Ads Forever
Back to The L0pht
Onion Routing
Security Planner
Crypto Wars 2.0
Controlling Your Digital ID
Treat Plugins Like Apps
Reclaiming Data Privacy
New Year’s Resolutions 2025!
ALPRs Are Everywhere
Best of Bonus 2024!
Replay: Golden Age of Surveillance
Best of 2024!
Deleting Your Data
Letters from the Mailbag
Privacy is Power
Best & Worst Gifts for 2024
Cutting the Software Tether
Curbing Location Tracking
Episode 400 Special
Understanding AI Chatbots
L0pht Heavy Industries
Indicators of Account Compromise
TunnelVision, VPNs and You
Malware Reboot Remedy
Post-Quantum Crypto
The Truth is Out There
Crazy Proton Summer
National Public Data Breach
Dating App Privacy
Hacker Summer Camp 2024
Catch You on the BSide
CrowdStrike Lessons Learned
Open Source Intelligence
How & Why to Block Ads
Promising Privacy Tech
Backing Up Other Data
Means of Control
Backup Your Cloud Data
Anom: The FBI’s Phone Company
Migrate to Mastodon
Why Privacy Matters
How to Choose a PIN
Inside Ukraine’s IT Army
Please Quit Chrome
The Rise of CBDC
Just Do It: Freeze Your Credit
Protecting Kids Online
Answering Listener Questions
He Said She Said
Account Security is Broken
Health Data Privacy
Backing Up 2FA Seeds
How Our Data is Abused
Mitigating AI Risks
Car Privacy is Horrid
Avoiding Tax Scams
Securing Your Mac
Data Privacy Week 2024
Rise of the Slaughterbots
New Year’s Resolutions: 2024
Investigating Data Leaks
Best of 2023 Bonus Content
Classic Replay: Lavabit
Best of 2023
Restoring Trust in Elections
Using Email Aliases
Smart City Blues
Best & Worst Gifts for 2023
Smartphone Spyware
The Rise of Cellular IoT
Reclaiming the Internet
It’s Time to Try Proton
What’s Your Threat Model?
Cybersecurity Awareness Month
Catching Phish
iOS 17 Security & Privacy
Your Face Belongs to Us
Remediate Your Network
Containing Big Data
Assessing Your Network Security
Demystifying AI
Hacker Summer Camp 2023
Cult of the Dead Cow
Less is More
The Politics of Privacy
IoT Inventory
National Cyber Strategy
Access Backup Plan
Hacking in Space
Go Forth, Do Good Deeds
Making a Difference
Blocking .zip Domains
Vehicle Privacy Report
Problems with Passkeys
Probing the Ministry of Truth
Blocking Google Popups
STOPping Mass Surveillance
How to Avoid Juice Jacking
Securing the Internet of Things
Reviewing Mullvad Browser
Privacy Peeps Panel
Fingerprinting Your Devices
Solving Your Password Problems
Securing Your Home Network
Designing Apps for Privacy
Unmasking Shortened Links
Fixing Social Media
Where & Why to Plant Your Flag
Combatting Surveillance Capitalism
Data Privacy Week 2023
Using Aliases to Improve Privacy
New Year’s Resolutions: 2023
Privacy Tide is Turning
SPECIAL: LastPass Breach
Building a Better Private Network
Best of 2022!
We Are the Cavalry
Tis the Season for Scams
300th Episode!!
Best & Worst Gifts for 2022
Surveying the Digital Explosion
Redirect Ransom
Building Trust with Privacy
Your TV is Watching You
Protecting Schools and Students
Mobile Payment Fraud
Capture the Flag for Fun & Profit
iOS 16 Security & Privacy Features
Tornado Warning for Free Speech
Decoding Computers & Software
LastPass Source Code Breach
The Night the Lights Went Out in Vegas
Hacker Summer Camp 2022
Privacy vs Content Moderation
Security Via Subtraction
No Place Left to Hide
Hacking Your Honda
Crowdsourcing Network Security
The Data Dam is Breaking
Necessary Chaos
Total Cookie Protection
Moving Beyond Passwords
Peppering Your Passwords
Cryptocurrency 101
Emergency Mode
Tomatoes & Telegraphs
Global Privacy Control
How to Stop Tracking & Stalking
What is the Most Private Browser?
Private from Everyone (But Us)
Demystifying VPNs
Luck Favors the Prepared
De-Google Your Life (Part 4)
Teaching & Preaching Privacy
De-Google Your Life (Part 3)
Computer Security Goes Microscopic
My De-Google Strategy
Securing Your Mobile Device
De-Google Your Life (Part 2)
Free & Open Source Software
De-Google Your Life
Searching for Privacy
Building a Privacy-Respecting World
Data Privacy Week 2022
2022 New Year’s Resolutions
The State of Kids’ Privacy
The Best of 2021
The Log4Shell Debacle
End Run Around Your Rights
Defending Democracy with Technology
My Debit Card Was Hacked
Security Requires Privacy
Best & Worst Gifts for 2021
Restoring Trust in Our Elections
Spooky Security Stories
Through the Past, Privately: PGP Turns 30
Rough Week for Facebook
Privacy Dynamic Duo
iOS 15 Privacy & Security Features
Apple’s Problematic CSAM Scanning
Security Is Hard
Driving Data Privacy for Cars
Privacy Matters
Morpheus: Securing CPUs with Entropy
Beware the Four Horsemen
On a Dark Tangent
Understanding Hackers & Hacking
Selling You Out to the Highest Bidder
Guard Your Digital Rolodex
It’s Time to Drop the SBOM
How to Keep Ransomware at Bay
Make That Shaken AND Stirred
Sad State of Cybersecurity
Hacking Satellites for Fun & Profit
Payment App Privacy Sucks
Have I Been FLoCed? (Part 2)
Have I Been FLoCed? (Part 1)
How & When to Use a Passphrase
Protecting Intellectual Freedom (Part 2)
Protecting Intellectual Freedom (Part 1)
App Tracking Transparency
Hunting for Stingrays (Part 2)
Hunting for Stingrays (Part 1)
Trust No One
Social Media is Ruining Society
Stop Using SMS for 2FA
Computers Interviewing Humans (Part 2)
Computers Interviewing Humans (Part 1)
Last Straw for LastPass
Tech Learning Collective (Part 2)
Tech Learning Collective (Part 1)
Not Just a Face in the Crowd
Free Speech & Deplatforming
Stop Watching Me!
De-Googling Your Life
Choosing a Private Email Service (Part 2)
Choosing a Private Email Service (Part 1)
The Great SolarWinds Hack
200th Podcast & New Year’s 2021!
Best of 2020!
Setting the Digital Standard (Part 2)
Setting the Digital Standard (Part 1)
Best & Worst Gifts Guide 2020
Dark Patterns (Part 2)
Dark Patterns (Part 1)
Zoom: Now with Actual Privacy
The Ebb & Flow of the Internet
Big Proctor is Watching You (part 2)
Big Proctor is Watching You (part 1)
National Cybersecurity Awareness Month
Apple’s Epic Battle Royale (Part 2)
Apple’s Epic Battle Royale (Part 1)
Take Out the (Windows) Trash
It’s a Trap!
Firefox Privacy (Part 2)
Firefox Privacy (Part 1)
Apple’s Epic Battle
This is Why We Can’t Have Nice Things (part 2)
This is Why We Can’t Have Nice Things (part 1)
The Pros & Cons of Antivirus Software
The Great Twitter Hack
Your Money or Your Data (part 2)
Your Money or Your Data (part 1)
TikTok Boom
COVID19 Privacy: Pro Tips (part 2)
COVID19 Security: Pro Tips (part 1)
From Mailbox to Ballot Box
Fiber For Our Future (part 2)
Fiber For Our Future (part 1)
Apple vs FBI, Part 2
Beware the Evil Maid
COVID19 Security & Privacy Tips (Part 2)
COVID19 Security & Privacy Tips (Part 1)
Have You Been Pwned?
Phish Spotting 101
Contact Tracing, Privately
Secure & Private Social Distancing
Privacy by Design
Beware COVID-19 Scams
The CCPA and You (Part 2)
The CCPA and You (Part 1)
Hacked: A Clearer View of Clearview
Adversarial Interoperability (Part 2)
Adversarial Interoperability (Part 1)
Tax Time Brings Tax Scams
Just Say No (to Sharing)
Data Privacy Day 2020
Clearview Knows Who You Are
Why “Free File” Isn’t Free
Time to Upgrade Windows
2020 New Year’s Resolutions
Behind the One-Way Mirror (part 2)
Behind the One-Way Mirror (part 1)
Snail Mail Identity Theft
Best & Worst Gifts for 2019
Data vs. Democracy (Part 2)
Data vs. Democracy (Part 1)
The Rise of Browser Fingerprinting
Preventing & Mitigating Identity Theft
Dropping Dropbox
Risky Business (Part 2)
Risky Business (Part 1)
Don’t Forget to Wipe Your Data
Not Just a Face in the Crowd (Part 2)
Not Just a Face in the Crowd (Part 1)
Google’s Not-So-Private Sandbox
Ring’s Orwellian Doorbell
Choosing a VPN Provider
The Great Cellular Sellout (Part 2)
The Great Cellular Sellout (Part 1)
The Tyranny of the Default
The Great Hack
Get Your Equifax Settlement
Privacy in a Box (Part 2)
Privacy in a Box (Part 1)
Big Brother 2.0
Set Warp Factor 1.1.1.1
The Internet of Junk
The Rise of Stalkerware
A Tale of Two Browsers: Chrome vs Firefox
Polling on Privacy (Pt2)
Polling on Privacy (Pt1)
Google Knows What You Buy
Time to Break Up Facebook
Health Apps Behaving Badly
Further Facebook Fiascos
Swiped: Identity Theft (Pt 2)
Swiped: Identity Theft (pt 1)
Spotting Scare Scams
Fix It Already!
Preparing for Your Digital Afterlife
Enter the Panopticon (Part 2)
Enter the Panopticon (Part 1)
Account Defense in Depth
Guiding the Development of AI
Toying With Security
You Must Stop Reusing Passwords
You Have Been Pwned
Data Privacy Day Pod-Centennial!
Delete My DNA, Please
Ghost on the Wire
Google is Watching You
2019 Security & Privacy New Years Resolutions
Replacing Your Plastic Driver’s License
Ads Are Tracking You in the Real World, Too
Marriott’s Massive Data Breach
Lock Down Your Privacy on Your Mobile Devices
The Best & Worst Gifts for 2018
Phone Scammers Are Spoofing Your Caller ID
Why You Should Care About the Future of Computing
Marketers Are Tracking You On and Off the Web
The Fight for Net Neutrality is Far from Over
Did China Implant Spy Chips in Our Computers?
How to Protect Yourself From Ransomware
Big Companies Behaving Badly: The Facebook Breach Explained
Now Is the Time to Freeze Your Credit
Prying Yourself From Google’s Clutches
🎧 The Tale of Ma Bell and Big Brother
🎧 It’s Time to Fix Our Election Systems (Again)
🎧 Facebook’s Virtual Private Network is Not Private
🎧 Hacking Your Network Using 1970s Technology
How a Wall of Lava Lamps is Helping Secure the Internet
🎧 Anti-Sex Trafficking Law Does More Harm Than Good
🎧 When Plugins Go Rogue
🎧 Your Public Data May Raise Your Insurance Rates
🎧 Supreme Court Scores One for Location Privacy
🎧 Crypto 101, What is Encryption, Anyway…
One Simple Step to a Faster and More Private Internet
🎧 Supreme Court Ruling Protects Your Location Privacy
🎧 Your Android Device’s Backdoor May Be Wide Open
🎧 Carpe Datum: Opting Out of Data Collection
🎧 How NOT to Hide Your Digital Footprints
Know Before You Go: Cyber Summer Tips
🎧 GDPR: Here I Come, Ready or Not
🎧 Why You Need to Ditch WhatsApp
We Now Live in the Golden Age of Surveillance
🎧 Defending Your Home From Rogue IoT Devices
🎧 Who Was at the Scene of the Crime? Google Knows!
🎧 Don’t Tread on My Internet: Saving Net Neutrality
🎧 Best Buy Geek Squad or Spy Squad?
🎧 I’m Deleting Facebook. You Should, Too.
🎧 Your Privacy is Now Under a Dark CLOUD
🎧 You Should Know What Facebook Knows
🎧 Protecting the 2018 and 2020 Elections
🎧 Facebook’s Two-Faced Privacy
Security Tips from a Professional Hacker
🎧 Authorized Personnel Only: Saving You from Yourself
🎧 Beware Geeks Bearing Gifts
🎧 Mobile Privacy: A Modern Oxymoron
🎧 File Your Taxes Before the Bad Guys Do!
🎧 Data Privacy Day: Take Control of Your Data
🎧 Is This a Bitcoin Boom or a Bubble?
🎧 Doing the Cybersecurity Two-Step
🎧 Dumpster Diving Trashes the Fourth Amendment
🎧 Old Spectre Causes Computer Meltdown
🎧 Upholding the Bill of Rights in Cyberspace
🎧 Make Your New Years (Cyber) Resolutions!
🎧 Curl Up With a Good (Security) Book for the Holidays!
🎧 The Fight for Net Neutrality Isn’t Over
🎧 Project Galileo: Ensuring the Silent Voices Are Heard
🎧 The Best & Worst Cyber-Gifts of 2017
🎧 A Nasty Worm in Your Apple Product (and How to Fix It)
It’s Time for Everyone to use Secure Email
🎧 Choosing the Safest Web Browser
🎧 It’s Time to End Dragnet Mass Surveillance
🎧 Beware the Reaper – Lock Down Your LAN
🎧 Using Ad Blockers to Tame Those Annoying Web Ads
Do We Own Any Media We Buy Anymore?
The Mouse That Scored, How Copyright Went Wrong
🎧 Goodbye Privacy, Hello Panopticon
🎧 Rise of the Machines: Should We Fear Artificial Intelligence?
🎧 Equifax Breach, Here’s What You Need to Do
🎧 If You Aren’t Backing Up, Your Data is on Borrowed Time
Your Privacy Rights Are Under Assault at the U.S. Border
🎧 How to Live in the Era of Fake News
🎧 Hackers Crack Safes, Teslas, Car Washes and Voting Machines
Why I Killed my Company to Save my Customers, pt 2
Why I Killed my Company to Save my Customers
🎧 Achieving Trust in the Digital Age
🎧 How To Hack An Election
🎧 Creating and Remembering Killer Passwords
NotPetya Malware Strikes, Everything You Need to Know
Don’t Tread on My Bits: Why Net Neutrality Matters
🎧 If You Use Public WiFi At The Hotel, Airport, Coffee Shop….
🎧 The Feds Plan For Cars That Can Track & Tattle On You
How Dumb Are Your ‘Smart Devices’?
🎧 Cyber Travel Tips: What To Know Before You Go
Learn These WannaCry Lessons Before Round 2 Hits
🎧 Inoculating the World Against Malware
🎧 Intel Closes a Nine-Year Backdoor
Your Email is as Vulnerable as Sending a Postcard
🎧 When the Hackers Become the Hacked
🎧 How to Pick The Only Password You’ll Ever Need
🎧 Congress Just Sold You Out (Again)
Protecting Your Privacy at the US Border
🎧 Masking Your Digital Footprints
🎧 How The Bad Guys Trick You Into Taking Their Bait
🎧 Why CloudBleed Wasn’t So Bloody Scary