<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 30 Apr 2026 09:58:20 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Iot”</title>
    <link>https://www.reality2cast.com/tags/iot</link>
    <pubDate>Fri, 19 Mar 2021 07:00:00 -0400</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 62: How Did Disinformation Become the Truth?</title>
  <link>https://www.reality2cast.com/62</link>
  <guid isPermaLink="false">972f4c4c-7450-4bca-8fd0-05f89778f547</guid>
  <pubDate>Fri, 19 Mar 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/972f4c4c-7450-4bca-8fd0-05f89778f547.mp3" length="36202696" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</itunes:subtitle>
  <itunes:duration>46:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.
Subscribe to our newsletter. (https://reality2cast.com/newsletter)
Reality 2.0 around the web:
Site/Blog/Newsletter (https://www.reality2cast.com)
FaceBook (https://www.facebook.com/reality2cast)
Twitter (https://twitter.com/reality2cast)
YouTube (https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q)
Mastodon (https://linuxrocks.online/@reality2cast)
 Special Guests: Chris Bronk and Petros Koutoupis.
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, disinformation, IoT, voice recognition</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Chris Bronk and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com" rel="nofollow" href="https://www.dictionary.com/e/misinformation-vs-disinformation-get-informed-on-the-difference/">“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com</a> &mdash; Disinformation means “false information, as about a country’s military strength or plans, disseminated by a government or intelligence agency in a hostile act of tactical political subversion.” It is also used more generally to mean “deliberately misleading or biased information; manipulated narrative or facts; propaganda.”

So, disinformation is knowingly spreading misinformation. Our first definition of this word gives one major reason why a person or group might want to spread wrong information, but there are many other nefarious motivations lurking behind the creation of disinformation.

</li><li><a title="Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1541758005/">Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books</a> &mdash; In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.</li><li><a title="Tom Clancy, author of the Jack Ryan Novels - Tom Clancy" rel="nofollow" href="https://tomclancy.com/">Tom Clancy, author of the Jack Ryan Novels - Tom Clancy</a></li><li><a title="Amazon.com : john le carré" rel="nofollow" href="https://www.amazon.com/s?k=john+le+carr%C3%A9">Amazon.com : john le carré</a></li><li><a title="Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books" rel="nofollow" href="https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/1250787408/">Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books</a></li><li><a title="Internet-based chastity belts hijacked by malicious hackers | Boing Boing" rel="nofollow" href="https://boingboing.net/2021/01/24/internet-based-chastity-belts-hijacked-by-malicious-hackers.html">Internet-based chastity belts hijacked by malicious hackers | Boing Boing</a> &mdash; Oh man. A bluetooth-controlled chastity belt was the recent victim of a hacker attack. The Cellmate Chastity Cage, made by Chinese company Qiui, was designed so that users are able to lock and unlock their sex partner's penis prison remotely. Users caught in the attack were threatened with having their genitals locked in permanently unless they paid a 0.02 bitcoin (about $270) ransom.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Chris Bronk and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com" rel="nofollow" href="https://www.dictionary.com/e/misinformation-vs-disinformation-get-informed-on-the-difference/">“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com</a> &mdash; Disinformation means “false information, as about a country’s military strength or plans, disseminated by a government or intelligence agency in a hostile act of tactical political subversion.” It is also used more generally to mean “deliberately misleading or biased information; manipulated narrative or facts; propaganda.”

So, disinformation is knowingly spreading misinformation. Our first definition of this word gives one major reason why a person or group might want to spread wrong information, but there are many other nefarious motivations lurking behind the creation of disinformation.

</li><li><a title="Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1541758005/">Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books</a> &mdash; In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.</li><li><a title="Tom Clancy, author of the Jack Ryan Novels - Tom Clancy" rel="nofollow" href="https://tomclancy.com/">Tom Clancy, author of the Jack Ryan Novels - Tom Clancy</a></li><li><a title="Amazon.com : john le carré" rel="nofollow" href="https://www.amazon.com/s?k=john+le+carr%C3%A9">Amazon.com : john le carré</a></li><li><a title="Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books" rel="nofollow" href="https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/1250787408/">Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books</a></li><li><a title="Internet-based chastity belts hijacked by malicious hackers | Boing Boing" rel="nofollow" href="https://boingboing.net/2021/01/24/internet-based-chastity-belts-hijacked-by-malicious-hackers.html">Internet-based chastity belts hijacked by malicious hackers | Boing Boing</a> &mdash; Oh man. A bluetooth-controlled chastity belt was the recent victim of a hacker attack. The Cellmate Chastity Cage, made by Chinese company Qiui, was designed so that users are able to lock and unlock their sex partner's penis prison remotely. Users caught in the attack were threatened with having their genitals locked in permanently unless they paid a 0.02 bitcoin (about $270) ransom.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
