The Privacy Report cover art

All Episodes

The Privacy Report — 84 episodes

#
Title
1

What Is Cybersecurity Really Protecting?

2

DNS Block Lists: Do They Actually Protect Your Privacy?

3

Are Loyalty Programs Selling Your Data?

4

Credit Freeze vs Credit Monitoring: What Actually Protects You?

5

The Risks of FinTech Screen Scraping

6

Identity theft online: what actually works in 2026?

7

“I Have Nothing to Hide” Is a Dangerous Myth

8

Email Receipts Are Tracking You

9

KOSA and Age Verification: The Good, the Bad, and the Ugly

10

Apple’s Contact Key Verification: What It Actually Protects—and What It Doesn’t

11

Zero Trust Security: Trust Less, Protect More

12

CVEs Explained Simply

13

Understand Terms of Service Before You Click Accept

14

Data Sovereignty Starts at Home

15

Education Is the Best Deterrent Against Cyber Attacks

16

Mullvad Browser: A Practical Tool to Reduce Web Tracking and Profiling

17

What Is RCS Messaging—and Is It Actually Secure?

18

Immich: Private Photo Hosting Without Big Tech

19

The Erosion of Privacy

20

Free Software: When You’re the Product

21

End-to-End Encryption Explained

22

Surveillance Pricing Explained

23

uBlock Origin for Privacy

24

Hidden Data Trails in Smart TVs

25

How QR Codes Quietly Track You

26

The Overlooked Side of Digital Privacy

27

Shielding the Signals

28

Hardware Keys: The Fastest Upgrade to Your Account Security

29

Privacy in Public Wi-Fi: Beyond VPNs

30

Encrypted External Drives: What You Need to Know

31

Sandboxing Apps for Safer Browsing

32

Home Routers as the Weakest Link

33

The Rise of Encrypted Search Engines

34

Password Managers Under the Microscope

35

The Hidden Costs of “Free” VPNs

36

Network Isolation for Smart Devices

37

Hardware Firewalls vs. Software Firewalls

38

What Is SIEM?

39

Disposable Email Domains: A Double-Edged Sword

40

What is GDPR?

41

When Apps Watch You Without Wi-Fi

42

Browser Fingerprinting: The Silent Identifier

43

Set-It-and-Forget-It Updates

44

Enterprise Risk Management, Explained

45

The Cost of Convenience

46

What is IPv6?

47

Decentralized Social Networks: Privacy or Illusion?

48

Local-Only AI: Keeping Your Data Off the Cloud

49

The Hidden Risks of Wearable Tech

50

Block Ads, Boost Privacy: Why You Should Self-Host a Pi-hole

51

Selling Your Location: How Carriers Profit from Real-Time Data

52

The Privacy Tradeoffs of Password Managers

53

When a SaaS Shuts Down: Where Does Your Data Go?

54

Metadata: The Invisible Trail You Always Leave

55

The Hidden Dangers of Browser Extensions

56

Protect Your Kids Online with Smart Home Network Controls

57

The Hidden Strength of Air-Gapped Systems

58

NAS for Private Cloud Storage: Take Control of Your Data

59

Inside the Hardware Shield

60

Public vs. Private IP Addresses

61

Airplane Mode Myths: What Still Communicates When You Think It Doesn’t

62

Building a Privacy-Focused Company Culture

63

How Your ISP Tracks You – And What You Can Do About It

64

The Privacy Nightmare of Smart Cars

65

SIM vs. eSIM Cards

66

What is an MSP?

67

Shield Your Screen

68

Redundancy and Resilience: UPS Systems

69

Mac Malware Myths

70

SMF vs. MMF: Choosing the Right Fiber for Your Network

71

Windows Malware Types

72

Data Brokers vs Governments: Who Really Knows You Better?

73

Physical Data Destruction Methods

74

VPNs Explained

75

Object Storage

76

Behind the Interface

77

Network Segmentation

78

Understanding Backups

79

The Future of Backups

80

Understanding Firewalls

81

A History of Wireless Encryption

82

Spam, Phishing, Vishing, and Beyond

83

Understanding DNS

84

Understanding 2FA, MFA, and Passkeys