PodParley PodParley
Firewalls Don't Stop Dragons Podcast cover art

All Episodes

Firewalls Don't Stop Dragons Podcast — 478 episodes

#
Title
1

The Power of Prophecy

2

AI’s Promise and Peril

3

Identity Resolution

4

Routers Behaving Badly

5

Privacy Guides Panel

6

Spring Cleaning

7

Surveillance Pricing

8

Fixing ClickFix

9

Double Blind Armadillo

10

New Google Alternatives

11

Professionally Paranoid

12

Agents of Misfortune

13

Debunking Hacklore

14

Zero-Knowledge Proofs

15

Honoring Auto Privacy Rights

16

Private AI Chat

17

Decentralized Messaging

18

Best of 2025 Bonus Content

19

Replay: Stop Reusing Passwords

20

Best of 2025!

21

40 Years of Phrack

22

Be Wary of Holiday Scams

23

Best & Worst Gifts for 2025!

24

Erasing Your Online Data

25

Becoming Cyber Resilient

26

Removing Old Accounts

27

Privacy-Focused AI

28

Securing Old Accounts

29

Project Franklin Wants You

30

Tech Time Bombs

31

Ente: Private by Design

32

Find Old Accounts (Part 2)

33

On the Ethics of AI

34

Find Old Accounts (Part 1)

35

Meet Rayhunter

36

Going on a Data Diet

37

I’m Just a (Privacy) Bill

38

Hacker Summer Camp 2025

39

Tariffs vs IP Law

40

Physical Phone Security

41

Passport, Lawyer, Locksmith

42

Freezing Your Mobile Account

43

Defending Student Privacy

44

The In-App Switcheroo

45

ShmooCon: Moose You Already

46

Rogue AI?

47

Dialog with the Data Diva

48

Life in the Panopticon

49

Dividing Trust

50

Slay Message Snoopers

51

Shelter from the Storm

52

Disable Your MAID

53

Riding the Data Gravy Train

54

Travel Insecurity

55

Life on the Blue Team

56

Differential Privacy

57

Microscoping Our Apps

58

It’s Tax (Scam) Time Again

59

All Things Secured

60

Slay Browser Ads Forever

61

Back to The L0pht

62

Onion Routing

63

Security Planner

64

Crypto Wars 2.0

65

Controlling Your Digital ID

66

Treat Plugins Like Apps

67

Reclaiming Data Privacy

68

New Year’s Resolutions 2025!

69

ALPRs Are Everywhere

70

Best of Bonus 2024!

71

Replay: Golden Age of Surveillance

72

Best of 2024!

73

Deleting Your Data

74

Letters from the Mailbag

75

Privacy is Power

76

Best & Worst Gifts for 2024

77

Cutting the Software Tether

78

Curbing Location Tracking

79

Episode 400 Special

80

Understanding AI Chatbots

81

L0pht Heavy Industries

82

Indicators of Account Compromise

83

TunnelVision, VPNs and You

84

Malware Reboot Remedy

85

Post-Quantum Crypto

86

The Truth is Out There

87

Crazy Proton Summer

88

National Public Data Breach

89

Dating App Privacy

90

Hacker Summer Camp 2024

91

Catch You on the BSide

92

CrowdStrike Lessons Learned

93

Open Source Intelligence

94

How & Why to Block Ads

95

Promising Privacy Tech

96

Backing Up Other Data

97

Means of Control

98

Backup Your Cloud Data

99

Anom: The FBI’s Phone Company

100

Migrate to Mastodon

101

Why Privacy Matters

102

How to Choose a PIN

103

Inside Ukraine’s IT Army

104

Please Quit Chrome

105

The Rise of CBDC

106

Just Do It: Freeze Your Credit

107

Protecting Kids Online

108

Answering Listener Questions

109

He Said She Said

110

Account Security is Broken

111

Health Data Privacy

112

Backing Up 2FA Seeds

113

How Our Data is Abused

114

Mitigating AI Risks

115

Car Privacy is Horrid

116

Avoiding Tax Scams

117

Securing Your Mac

118

Data Privacy Week 2024

119

Rise of the Slaughterbots

120

New Year’s Resolutions: 2024

121

Investigating Data Leaks

122

Best of 2023 Bonus Content

123

Classic Replay: Lavabit

124

Best of 2023

125

Restoring Trust in Elections

126

Using Email Aliases

127

Smart City Blues

128

Best & Worst Gifts for 2023

129

Smartphone Spyware

130

The Rise of Cellular IoT

131

Reclaiming the Internet

132

It’s Time to Try Proton

133

What’s Your Threat Model?

134

Cybersecurity Awareness Month

135

Catching Phish

136

iOS 17 Security & Privacy

137

Your Face Belongs to Us

138

Remediate Your Network

139

Containing Big Data

140

Assessing Your Network Security

141

Demystifying AI

142

Hacker Summer Camp 2023

143

Cult of the Dead Cow

144

Less is More

145

The Politics of Privacy

146

IoT Inventory

147

National Cyber Strategy

148

Access Backup Plan

149

Hacking in Space

150

Go Forth, Do Good Deeds

151

Making a Difference

152

Blocking .zip Domains

153

Vehicle Privacy Report

154

Problems with Passkeys

155

Probing the Ministry of Truth

156

Blocking Google Popups

157

STOPping Mass Surveillance

158

How to Avoid Juice Jacking

159

Securing the Internet of Things

160

Reviewing Mullvad Browser

161

Privacy Peeps Panel

162

Fingerprinting Your Devices

163

Solving Your Password Problems

164

Securing Your Home Network

165

Designing Apps for Privacy

166

Unmasking Shortened Links

167

Fixing Social Media

168

Where & Why to Plant Your Flag

169

Combatting Surveillance Capitalism

170

Data Privacy Week 2023

171

Using Aliases to Improve Privacy

172

New Year’s Resolutions: 2023

173

Privacy Tide is Turning

174

SPECIAL: LastPass Breach

175

Building a Better Private Network

176

Best of 2022!

177

We Are the Cavalry

178

Tis the Season for Scams

179

300th Episode!!

180

Best & Worst Gifts for 2022

181

Surveying the Digital Explosion

182

Redirect Ransom

183

Building Trust with Privacy

184

Your TV is Watching You

185

Protecting Schools and Students

186

Mobile Payment Fraud

187

Capture the Flag for Fun & Profit

188

iOS 16 Security & Privacy Features

189

Tornado Warning for Free Speech

190

Decoding Computers & Software

191

LastPass Source Code Breach

192

The Night the Lights Went Out in Vegas

193

Hacker Summer Camp 2022

194

Privacy vs Content Moderation

195

Security Via Subtraction

196

No Place Left to Hide

197

Hacking Your Honda

198

Crowdsourcing Network Security

199

The Data Dam is Breaking

200

Necessary Chaos

201

Total Cookie Protection

202

Moving Beyond Passwords

203

Peppering Your Passwords

204

Cryptocurrency 101

205

Emergency Mode

206

Tomatoes & Telegraphs

207

Global Privacy Control

208

How to Stop Tracking & Stalking

209

What is the Most Private Browser?

210

Private from Everyone (But Us)

211

Demystifying VPNs

212

Luck Favors the Prepared

213

De-Google Your Life (Part 4)

214

Teaching & Preaching Privacy

215

De-Google Your Life (Part 3)

216

Computer Security Goes Microscopic

217

My De-Google Strategy

218

Securing Your Mobile Device

219

De-Google Your Life (Part 2)

220

Free & Open Source Software

221

De-Google Your Life

222

Searching for Privacy

223

Building a Privacy-Respecting World

224

Data Privacy Week 2022

225

2022 New Year’s Resolutions

226

The State of Kids’ Privacy

227

The Best of 2021

228

The Log4Shell Debacle

229

End Run Around Your Rights

230

Defending Democracy with Technology

231

My Debit Card Was Hacked

232

Security Requires Privacy

233

Best & Worst Gifts for 2021

234

Restoring Trust in Our Elections

235

Spooky Security Stories

236

Through the Past, Privately: PGP Turns 30

237

Rough Week for Facebook

238

Privacy Dynamic Duo

239

iOS 15 Privacy & Security Features

240

Apple’s Problematic CSAM Scanning

241

Security Is Hard

242

Driving Data Privacy for Cars

243

Privacy Matters

244

Morpheus: Securing CPUs with Entropy

245

Beware the Four Horsemen

246

On a Dark Tangent

247

Understanding Hackers & Hacking

248

Selling You Out to the Highest Bidder

249

Guard Your Digital Rolodex

250

It’s Time to Drop the SBOM

251

How to Keep Ransomware at Bay

252

Make That Shaken AND Stirred

253

Sad State of Cybersecurity

254

Hacking Satellites for Fun & Profit

255

Payment App Privacy Sucks

256

Have I Been FLoCed? (Part 2)

257

Have I Been FLoCed? (Part 1)

258

How & When to Use a Passphrase

259

Protecting Intellectual Freedom (Part 2)

260

Protecting Intellectual Freedom (Part 1)

261

App Tracking Transparency

262

Hunting for Stingrays (Part 2)

263

Hunting for Stingrays (Part 1)

264

Trust No One

265

Social Media is Ruining Society

266

Stop Using SMS for 2FA

267

Computers Interviewing Humans (Part 2)

268

Computers Interviewing Humans (Part 1)

269

Last Straw for LastPass

270

Tech Learning Collective (Part 2)

271

Tech Learning Collective (Part 1)

272

Not Just a Face in the Crowd

273

Free Speech & Deplatforming

274

Stop Watching Me!

275

De-Googling Your Life

276

Choosing a Private Email Service (Part 2)

277

Choosing a Private Email Service (Part 1)

278

The Great SolarWinds Hack

279

200th Podcast & New Year’s 2021!

280

Best of 2020!

281

Setting the Digital Standard (Part 2)

282

Setting the Digital Standard (Part 1)

283

Best & Worst Gifts Guide 2020

284

Dark Patterns (Part 2)

285

Dark Patterns (Part 1)

286

Zoom: Now with Actual Privacy

287

The Ebb & Flow of the Internet

288

Big Proctor is Watching You (part 2)

289

Big Proctor is Watching You (part 1)

290

National Cybersecurity Awareness Month

291

Apple’s Epic Battle Royale (Part 2)

292

Apple’s Epic Battle Royale (Part 1)

293

Take Out the (Windows) Trash

294

It’s a Trap!

295

Firefox Privacy (Part 2)

296

Firefox Privacy (Part 1)

297

Apple’s Epic Battle

298

This is Why We Can’t Have Nice Things (part 2)

299

This is Why We Can’t Have Nice Things (part 1)

300

The Pros & Cons of Antivirus Software

301

The Great Twitter Hack

302

Your Money or Your Data (part 2)

303

Your Money or Your Data (part 1)

304

TikTok Boom

305

COVID19 Privacy: Pro Tips (part 2)

306

COVID19 Security: Pro Tips (part 1)

307

From Mailbox to Ballot Box

308

Fiber For Our Future (part 2)

309

Fiber For Our Future (part 1)

310

Apple vs FBI, Part 2

311

Beware the Evil Maid

312

COVID19 Security & Privacy Tips (Part 2)

313

COVID19 Security & Privacy Tips (Part 1)

314

Have You Been Pwned?

315

Phish Spotting 101

316

Contact Tracing, Privately

317

Secure & Private Social Distancing

318

Privacy by Design

319

Beware COVID-19 Scams

320

The CCPA and You (Part 2)

321

The CCPA and You (Part 1)

322

Hacked: A Clearer View of Clearview

323

Adversarial Interoperability (Part 2)

324

Adversarial Interoperability (Part 1)

325

Tax Time Brings Tax Scams

326

Just Say No (to Sharing)

327

Data Privacy Day 2020

328

Clearview Knows Who You Are

329

Why “Free File” Isn’t Free

330

Time to Upgrade Windows

331

2020 New Year’s Resolutions

332

Behind the One-Way Mirror (part 2)

333

Behind the One-Way Mirror (part 1)

334

Snail Mail Identity Theft

335

Best & Worst Gifts for 2019

336

Data vs. Democracy (Part 2)

337

Data vs. Democracy (Part 1)

338

The Rise of Browser Fingerprinting

339

Preventing & Mitigating Identity Theft

340

Dropping Dropbox

341

Risky Business (Part 2)

342

Risky Business (Part 1)

343

Don’t Forget to Wipe Your Data

344

Not Just a Face in the Crowd (Part 2)

345

Not Just a Face in the Crowd (Part 1)

346

Google’s Not-So-Private Sandbox

347

Ring’s Orwellian Doorbell

348

Choosing a VPN Provider

349

The Great Cellular Sellout (Part 2)

350

The Great Cellular Sellout (Part 1)

351

The Tyranny of the Default

352

The Great Hack

353

Get Your Equifax Settlement

354

Privacy in a Box (Part 2)

355

Privacy in a Box (Part 1)

356

Big Brother 2.0

357

Set Warp Factor 1.1.1.1

358

The Internet of Junk

359

The Rise of Stalkerware

360

A Tale of Two Browsers: Chrome vs Firefox

361

Polling on Privacy (Pt2)

362

Polling on Privacy (Pt1)

363

Google Knows What You Buy

364

Time to Break Up Facebook

365

Health Apps Behaving Badly

366

Further Facebook Fiascos

367

Swiped: Identity Theft (Pt 2)

368

Swiped: Identity Theft (pt 1)

369

Spotting Scare Scams

370

Fix It Already!

371

Preparing for Your Digital Afterlife

372

Enter the Panopticon (Part 2)

373

Enter the Panopticon (Part 1)

374

Account Defense in Depth

375

Guiding the Development of AI

376

Toying With Security

377

You Must Stop Reusing Passwords

378

You Have Been Pwned

379

Data Privacy Day Pod-Centennial!

380

Delete My DNA, Please

381

Ghost on the Wire

382

Google is Watching You

383

2019 Security & Privacy New Years Resolutions

384

Replacing Your Plastic Driver’s License

385

Ads Are Tracking You in the Real World, Too

386

Marriott’s Massive Data Breach

387

Lock Down Your Privacy on Your Mobile Devices

388

The Best & Worst Gifts for 2018

389

Phone Scammers Are Spoofing Your Caller ID

390

Why You Should Care About the Future of Computing

391

Marketers Are Tracking You On and Off the Web

392

The Fight for Net Neutrality is Far from Over

393

Did China Implant Spy Chips in Our Computers?

394

How to Protect Yourself From Ransomware

395

Big Companies Behaving Badly: The Facebook Breach Explained

396

Now Is the Time to Freeze Your Credit

397

Prying Yourself From Google’s Clutches

398

🎧 The Tale of Ma Bell and Big Brother

399

🎧 It’s Time to Fix Our Election Systems (Again)

400

🎧 Facebook’s Virtual Private Network is Not Private

401

🎧 Hacking Your Network Using 1970s Technology

402

How a Wall of Lava Lamps is Helping Secure the Internet

403

🎧 Anti-Sex Trafficking Law Does More Harm Than Good

404

🎧 When Plugins Go Rogue

405

🎧 Your Public Data May Raise Your Insurance Rates

406

🎧 Supreme Court Scores One for Location Privacy

407

🎧 Crypto 101, What is Encryption, Anyway…

408

One Simple Step to a Faster and More Private Internet

409

🎧 Supreme Court Ruling Protects Your Location Privacy

410

🎧 Your Android Device’s Backdoor May Be Wide Open

411

🎧 Carpe Datum: Opting Out of Data Collection

412

🎧 How NOT to Hide Your Digital Footprints

413

Know Before You Go: Cyber Summer Tips

414

🎧 GDPR: Here I Come, Ready or Not

415

🎧 Why You Need to Ditch WhatsApp

416

We Now Live in the Golden Age of Surveillance

417

🎧 Defending Your Home From Rogue IoT Devices

418

🎧 Who Was at the Scene of the Crime? Google Knows!

419

🎧 Don’t Tread on My Internet: Saving Net Neutrality

420

🎧 Best Buy Geek Squad or Spy Squad?

421

🎧 I’m Deleting Facebook. You Should, Too.

422

🎧 Your Privacy is Now Under a Dark CLOUD

423

🎧 You Should Know What Facebook Knows

424

🎧 Protecting the 2018 and 2020 Elections

425

🎧 Facebook’s Two-Faced Privacy

426

Security Tips from a Professional Hacker

427

🎧 Authorized Personnel Only: Saving You from Yourself

428

🎧 Beware Geeks Bearing Gifts

429

🎧 Mobile Privacy: A Modern Oxymoron

430

🎧 File Your Taxes Before the Bad Guys Do!

431

🎧 Data Privacy Day: Take Control of Your Data

432

🎧 Is This a Bitcoin Boom or a Bubble?

433

🎧 Doing the Cybersecurity Two-Step

434

🎧 Dumpster Diving Trashes the Fourth Amendment

435

🎧 Old Spectre Causes Computer Meltdown

436

🎧 Upholding the Bill of Rights in Cyberspace

437

🎧 Make Your New Years (Cyber) Resolutions!

438

🎧 Curl Up With a Good (Security) Book for the Holidays!

439

🎧 The Fight for Net Neutrality Isn’t Over

440

🎧 Project Galileo: Ensuring the Silent Voices Are Heard

441

🎧 The Best & Worst Cyber-Gifts of 2017

442

🎧 A Nasty Worm in Your Apple Product (and How to Fix It)

443

It’s Time for Everyone to use Secure Email

444

🎧 Choosing the Safest Web Browser

445

🎧 It’s Time to End Dragnet Mass Surveillance

446

🎧 Beware the Reaper – Lock Down Your LAN

447

🎧 Using Ad Blockers to Tame Those Annoying Web Ads

448

Do We Own Any Media We Buy Anymore?

449

The Mouse That Scored, How Copyright Went Wrong

450

🎧 Goodbye Privacy, Hello Panopticon

451

🎧 Rise of the Machines: Should We Fear Artificial Intelligence?

452

🎧 Equifax Breach, Here’s What You Need to Do

453

🎧 If You Aren’t Backing Up, Your Data is on Borrowed Time

454

Your Privacy Rights Are Under Assault at the U.S. Border

455

🎧 How to Live in the Era of Fake News

456

🎧 Hackers Crack Safes, Teslas, Car Washes and Voting Machines

457

Why I Killed my Company to Save my Customers, pt 2

458

Why I Killed my Company to Save my Customers

459

🎧 Achieving Trust in the Digital Age

460

🎧 How To Hack An Election

461

🎧 Creating and Remembering Killer Passwords

462

NotPetya Malware Strikes, Everything You Need to Know

463

Don’t Tread on My Bits: Why Net Neutrality Matters

464

🎧 If You Use Public WiFi At The Hotel, Airport, Coffee Shop….

465

🎧 The Feds Plan For Cars That Can Track & Tattle On You

466

How Dumb Are Your ‘Smart Devices’?

467

🎧 Cyber Travel Tips: What To Know Before You Go

468

Learn These WannaCry Lessons Before Round 2 Hits

469

🎧 Inoculating the World Against Malware

470

🎧 Intel Closes a Nine-Year Backdoor

471

Your Email is as Vulnerable as Sending a Postcard

472

🎧 When the Hackers Become the Hacked

473

🎧 How to Pick The Only Password You’ll Ever Need

474

🎧 Congress Just Sold You Out (Again)

475

Protecting Your Privacy at the US Border

476

🎧 Masking Your Digital Footprints

477

🎧 How The Bad Guys Trick You Into Taking Their Bait

478

🎧 Why CloudBleed Wasn’t So Bloody Scary