Episodios
-
Alex is back from Bangkok, six words that lead to getting hacked, Google has a culture of concealment, Matt Gaetz misconduct report accessed by unknown individual, people are fleeing Twitter for Bluesky.
-
Alex is still in Bangkok, a rough road ahead, mother forced to install tracking software on son's phone, Twitter changes terms of service to allow training AI, menstrual health tracking app pledges never to share info with authorities.
-
¿Faltan episodios?
-
Alex is in Bangkok, comments on the presidential election and what's to come.
-
Clips from the past, more on the pouches used in schools to prevent cellphone use, Chinese hackers targeting Trump and Harris campaign phones, businesses sue FTC to block new "click to cancel" rule.
-
Alex is at Columbia University, an update on the Internet Archive, San Francisco light rail control system finally ditching floppy disks, listener email on controlling PixMob bracelets, Facebook extorting users, parents object to plan to prevent cellphone use in schools.
-
The past week's adventures, stadium tech, Facebook hacks, hacked robot vacuums, phone problems, hiring North Korean cyber criminals, Pokemon game leak, AI issues in school, Internet Archive hacked.
-
Listener comments on last week's segments on right to repair and hurricane Helene, more disinformation, attacking NOAA, Alex's sister Rachel joins the panel from Ft. Myers Florida to discuss the approaching hurricane Milton.
-
Greg Newby joins the panel, reporter suspended from Twitter for publishing Vance dossier, Trump hackers impersonated Ginni Thomas, paralyzed man unable to walk after maker of powered exoskeleton refuses to repair it, Greg recounts his experience with hurricane Helene.
-
Iranian hackers tried to give Trump data to Biden campaign, labeling Trump’s lies as "disputed" on Twitter makes supporters believe them more, Kaspersky replaces their software with UltraAV, Delaware public library servers hacked.
-
Third party Twitter app hacked, Israeli attack on Hezbollah pagers, investigating BAC Consulting, infiltrating the TOR network, listener email.