<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 11 May 2026 07:43:17 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Privacy”</title>
    <link>https://www.reality2cast.com/tags/privacy</link>
    <pubDate>Sat, 28 Oct 2023 08:00:00 -0400</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 153: Personal AI</title>
  <link>https://www.reality2cast.com/153</link>
  <guid isPermaLink="false">6f995209-0cad-428b-93f8-9cfc6b20d89f</guid>
  <pubDate>Sat, 28 Oct 2023 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/6f995209-0cad-428b-93f8-9cfc6b20d89f.mp3" length="19785299" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls, and Kyle Rankin discuss the personal AI tools they'd like to have, what's available, and how they might come together.</itunes:subtitle>
  <itunes:duration>58:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman, Doc Searls, and Kyle Rankin discuss the personal AI tools they'd like to have, what's available, and how they might come together.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt;&lt;br&gt;
 Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Kyle Rankin discuss the personal AI tools they&#39;d like to have, what&#39;s available, and how they might come together.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Microsoft says it will take the heat if Copilot AI commercial users get sued - The Verge" rel="nofollow" href="https://www.theverge.com/2023/9/7/23863349/microsoft-ai-assume-responsibility-copyright-lawsuit">Microsoft says it will take the heat if Copilot AI commercial users get sued - The Verge</a> &mdash; Some users of Microsoft’s Copilot platforms can turn to the company if they get sued for copyright infringement.</li><li><a title="AI | Doc Searls Weblog" rel="nofollow" href="https://doc.searls.com/category/ai/">AI | Doc Searls Weblog</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Kyle Rankin discuss the personal AI tools they&#39;d like to have, what&#39;s available, and how they might come together.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Microsoft says it will take the heat if Copilot AI commercial users get sued - The Verge" rel="nofollow" href="https://www.theverge.com/2023/9/7/23863349/microsoft-ai-assume-responsibility-copyright-lawsuit">Microsoft says it will take the heat if Copilot AI commercial users get sued - The Verge</a> &mdash; Some users of Microsoft’s Copilot platforms can turn to the company if they get sued for copyright infringement.</li><li><a title="AI | Doc Searls Weblog" rel="nofollow" href="https://doc.searls.com/category/ai/">AI | Doc Searls Weblog</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 141: User Sovereignty and Authenticity in Commerce</title>
  <link>https://www.reality2cast.com/141</link>
  <guid isPermaLink="false">572867c2-c2dc-422e-b7b2-7c47f5dc6826</guid>
  <pubDate>Wed, 01 Mar 2023 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/572867c2-c2dc-422e-b7b2-7c47f5dc6826.mp3" length="45837720" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls hear Dave Huseby's new ideas about identity verification and data authenticity in commerce.</itunes:subtitle>
  <itunes:duration>54:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls hear Dave Huseby's new ideas about identity verification and data authenticity in commerce.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Dave Huseby.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls hear Dave Huseby&#39;s new ideas about identity verification and data authenticity in commerce.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/">Cryptid Technologies</a> &mdash; Necessary Security at Unprecedented Scale
We offer flexible APIs for building zero-knowledge proof based authentication and authorization, authenticated provenance, verifiable authenticity, and privacy preserving decentralized identity that scales to billions of people and devices.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls hear Dave Huseby&#39;s new ideas about identity verification and data authenticity in commerce.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/">Cryptid Technologies</a> &mdash; Necessary Security at Unprecedented Scale
We offer flexible APIs for building zero-knowledge proof based authentication and authorization, authenticated provenance, verifiable authenticity, and privacy preserving decentralized identity that scales to billions of people and devices.</li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a> &mdash; The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it’s likely that more substantial discussion and work has been done at IIW than any other conference!</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 139: Permission Slip, a Consumer Reports Privacy App</title>
  <link>https://www.reality2cast.com/139</link>
  <guid isPermaLink="false">198ef7f2-1991-4fe3-950c-d0ddb9b1c230</guid>
  <pubDate>Thu, 09 Feb 2023 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/198ef7f2-1991-4fe3-950c-d0ddb9b1c230.mp3" length="48807145" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls, and Petros Koutoupis talk to Don Marti about Permission Slip, the new data privacy app from Consumer Reports.</itunes:subtitle>
  <itunes:duration>51:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman, Doc Searls, and Petros Koutoupis talk to Don Marti about Permission Slip, the new data privacy app from Consumer Reports.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Don Marti and Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Petros Koutoupis talk to Don Marti about Permission Slip, the new data privacy app from Consumer Reports.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Don Marti and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Introducing Permission Slip, the app to take back control of your data | Digital Lab at Consumer Reports" rel="nofollow" href="https://digital-lab.consumerreports.org/2022/11/16/introducing-permission-slip/">Introducing Permission Slip, the app to take back control of your data | Digital Lab at Consumer Reports</a> &mdash; Privacy is a right. This is a fact in many states, and it’s one of our fervent beliefs at Consumer Reports. But that doesn’t mean privacy is easy. Anyone who’s tried to make their digital life more private knows how much effort it requires. We create data in nearly every interaction we have with companies. Keeping track and chasing after this data can feel convoluted, frustrating, even futile.

The right to privacy is only real if you can use it. So today, we’re announcing a new, experimental service by Consumer Reports to help you do privacy better. Enter: Permission Slip.</li><li><a title="Permission Slip by CR" rel="nofollow" href="https://www.permissionslipcr.com/">Permission Slip by CR</a> &mdash; Find out what companies know about us
It’s no secret that a huge number of companies are collecting, buying and selling data about us. Find out what information they collect, and take action to help protect yourself.</li><li><a title="blog: Don Marti" rel="nofollow" href="https://blog.zgp.org/">blog: Don Marti</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls, and Petros Koutoupis talk to Don Marti about Permission Slip, the new data privacy app from Consumer Reports.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Don Marti and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Introducing Permission Slip, the app to take back control of your data | Digital Lab at Consumer Reports" rel="nofollow" href="https://digital-lab.consumerreports.org/2022/11/16/introducing-permission-slip/">Introducing Permission Slip, the app to take back control of your data | Digital Lab at Consumer Reports</a> &mdash; Privacy is a right. This is a fact in many states, and it’s one of our fervent beliefs at Consumer Reports. But that doesn’t mean privacy is easy. Anyone who’s tried to make their digital life more private knows how much effort it requires. We create data in nearly every interaction we have with companies. Keeping track and chasing after this data can feel convoluted, frustrating, even futile.

The right to privacy is only real if you can use it. So today, we’re announcing a new, experimental service by Consumer Reports to help you do privacy better. Enter: Permission Slip.</li><li><a title="Permission Slip by CR" rel="nofollow" href="https://www.permissionslipcr.com/">Permission Slip by CR</a> &mdash; Find out what companies know about us
It’s no secret that a huge number of companies are collecting, buying and selling data about us. Find out what information they collect, and take action to help protect yourself.</li><li><a title="blog: Don Marti" rel="nofollow" href="https://blog.zgp.org/">blog: Don Marti</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 136: Happy New Year!</title>
  <link>https://www.reality2cast.com/136</link>
  <guid isPermaLink="false">885cbb0c-3e2a-4a24-a7df-fcf18121575c</guid>
  <pubDate>Wed, 11 Jan 2023 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/885cbb0c-3e2a-4a24-a7df-fcf18121575c.mp3" length="47797599" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk about Facebook's recent Irish problems, Google's Performance Max ad product, and digress into discussing the Houston food scene as we welcome back Reality 2.0 for 2023.</itunes:subtitle>
  <itunes:duration>46:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk about Facebook's recent Irish problems, Google's Performance Max ad product, and digress into discussing the Houston food scene as we welcome back Reality 2.0 for 2023.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk about Facebook&#39;s recent Irish problems, Google&#39;s Performance Max ad product, and digress into discussing the Houston food scene as we welcome back Reality 2.0 for 2023.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Data Protection Commission tries to make victory of its U-turn on Facebook and Instagram – The Irish Times" rel="nofollow" href="https://www.irishtimes.com/business/2023/01/05/data-protection-commission-tries-to-make-victory-of-its-u-turn-on-facebook-and-instagram/">Data Protection Commission tries to make victory of its U-turn on Facebook and Instagram – The Irish Times</a> &mdash; Watchdog forced to toughen its decision on data protection complaint after European intervention

</li><li><a title="Data Protection Commission announces conclusion of two inquiries into Meta Ireland | 04/01/2023 | Data Protection Commission" rel="nofollow" href="https://www.dataprotection.ie/en/news-media/data-protection-commission-announces-conclusion-two-inquiries-meta-ireland">Data Protection Commission announces conclusion of two inquiries into Meta Ireland | 04/01/2023 | Data Protection Commission</a> &mdash; The Data Protection Commission (DPC) has today announced the conclusion of two inquiries into the data processing operations of Meta Platforms Ireland Limited (“Meta Ireland”) in connection with the delivery of its Facebook and Instagram services. (Meta Ireland was previously known as Facebook Ireland Limited).</li><li><a title="Inside Google’s Ad Display Network Black Box: Porn, Piracy, Fraud — ProPublica" rel="nofollow" href="https://www.propublica.org/article/google-display-ads-piracy-porn-fraud">Inside Google’s Ad Display Network Black Box: Porn, Piracy, Fraud — ProPublica</a> &mdash; Google’s ad business hides nearly all publishers it works with and where billions of ad dollars flow. We uncovered a network containing manga piracy, porn, fraud and disinformation.</li><li><a title="Meet Performance Max, The Blackest Black Box Of All Google Ad Products | AdExchanger" rel="nofollow" href="https://www.adexchanger.com/commerce/meet-performance-max-the-blackest-black-box-of-all-google-ad-products/">Meet Performance Max, The Blackest Black Box Of All Google Ad Products | AdExchanger</a> &mdash; Lost in the Sturm und Drang of Q4 (Q for quarantine) 2020, Google introduced a beta program called Performance Max, its first ad product spanning all Google-owned media.</li><li><a title="GitHub - dmarti/CAPCA: California Advertising Placements on Criminal Activity Act" rel="nofollow" href="https://github.com/dmarti/CAPCA">GitHub - dmarti/CAPCA: California Advertising Placements on Criminal Activity Act</a></li><li><a title="LastPass Data Breach: It’s Time to Ditch This Password Manager | WIRED" rel="nofollow" href="https://www.wired.com/story/lastpass-breach-vaults-password-managers/">LastPass Data Breach: It’s Time to Ditch This Password Manager | WIRED</a> &mdash; The password manager’s most recent data breach is so concerning, users need to take immediate steps to protect themselves.
</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk about Facebook&#39;s recent Irish problems, Google&#39;s Performance Max ad product, and digress into discussing the Houston food scene as we welcome back Reality 2.0 for 2023.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Data Protection Commission tries to make victory of its U-turn on Facebook and Instagram – The Irish Times" rel="nofollow" href="https://www.irishtimes.com/business/2023/01/05/data-protection-commission-tries-to-make-victory-of-its-u-turn-on-facebook-and-instagram/">Data Protection Commission tries to make victory of its U-turn on Facebook and Instagram – The Irish Times</a> &mdash; Watchdog forced to toughen its decision on data protection complaint after European intervention

</li><li><a title="Data Protection Commission announces conclusion of two inquiries into Meta Ireland | 04/01/2023 | Data Protection Commission" rel="nofollow" href="https://www.dataprotection.ie/en/news-media/data-protection-commission-announces-conclusion-two-inquiries-meta-ireland">Data Protection Commission announces conclusion of two inquiries into Meta Ireland | 04/01/2023 | Data Protection Commission</a> &mdash; The Data Protection Commission (DPC) has today announced the conclusion of two inquiries into the data processing operations of Meta Platforms Ireland Limited (“Meta Ireland”) in connection with the delivery of its Facebook and Instagram services. (Meta Ireland was previously known as Facebook Ireland Limited).</li><li><a title="Inside Google’s Ad Display Network Black Box: Porn, Piracy, Fraud — ProPublica" rel="nofollow" href="https://www.propublica.org/article/google-display-ads-piracy-porn-fraud">Inside Google’s Ad Display Network Black Box: Porn, Piracy, Fraud — ProPublica</a> &mdash; Google’s ad business hides nearly all publishers it works with and where billions of ad dollars flow. We uncovered a network containing manga piracy, porn, fraud and disinformation.</li><li><a title="Meet Performance Max, The Blackest Black Box Of All Google Ad Products | AdExchanger" rel="nofollow" href="https://www.adexchanger.com/commerce/meet-performance-max-the-blackest-black-box-of-all-google-ad-products/">Meet Performance Max, The Blackest Black Box Of All Google Ad Products | AdExchanger</a> &mdash; Lost in the Sturm und Drang of Q4 (Q for quarantine) 2020, Google introduced a beta program called Performance Max, its first ad product spanning all Google-owned media.</li><li><a title="GitHub - dmarti/CAPCA: California Advertising Placements on Criminal Activity Act" rel="nofollow" href="https://github.com/dmarti/CAPCA">GitHub - dmarti/CAPCA: California Advertising Placements on Criminal Activity Act</a></li><li><a title="LastPass Data Breach: It’s Time to Ditch This Password Manager | WIRED" rel="nofollow" href="https://www.wired.com/story/lastpass-breach-vaults-password-managers/">LastPass Data Breach: It’s Time to Ditch This Password Manager | WIRED</a> &mdash; The password manager’s most recent data breach is so concerning, users need to take immediate steps to protect themselves.
</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 123: Open Source Home Automation with Home Assistant</title>
  <link>https://www.reality2cast.com/123</link>
  <guid isPermaLink="false">bb8cf8a7-1430-4622-b244-3491139e53c4</guid>
  <pubDate>Fri, 26 Aug 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/bb8cf8a7-1430-4622-b244-3491139e53c4.mp3" length="44940516" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman talks to Shawn Powers about home automation using a combination of open source software and proprietary devices using Home Assistant.</itunes:subtitle>
  <itunes:duration>52:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman talks to Shawn Powers about home automation using a combination of open source software and proprietary devices using Home Assistant.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman talks to Shawn Powers about home automation using a combination of open source software and proprietary devices using Home Assistant.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Home Assistant" rel="nofollow" href="https://www.home-assistant.io/">Home Assistant</a> &mdash; Open source home automation that puts local control and privacy first. Powered by a worldwide community of tinkerers and DIY enthusiasts. Perfect to run on a Raspberry Pi or a local server.</li><li><a title="Ubiquiti - Rethinking IT" rel="nofollow" href="https://ui.com/">Ubiquiti - Rethinking IT</a> &mdash; A true multi-application network operating system
</li><li><a title="Nabu Casa" rel="nofollow" href="https://www.nabucasa.com/">Nabu Casa</a> &mdash; We successfully crowdfunded Home Assistant Yellow, the easiest way to get started with Home Assistant.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman talks to Shawn Powers about home automation using a combination of open source software and proprietary devices using Home Assistant.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Home Assistant" rel="nofollow" href="https://www.home-assistant.io/">Home Assistant</a> &mdash; Open source home automation that puts local control and privacy first. Powered by a worldwide community of tinkerers and DIY enthusiasts. Perfect to run on a Raspberry Pi or a local server.</li><li><a title="Ubiquiti - Rethinking IT" rel="nofollow" href="https://ui.com/">Ubiquiti - Rethinking IT</a> &mdash; A true multi-application network operating system
</li><li><a title="Nabu Casa" rel="nofollow" href="https://www.nabucasa.com/">Nabu Casa</a> &mdash; We successfully crowdfunded Home Assistant Yellow, the easiest way to get started with Home Assistant.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 122: Health Data and Human Rights</title>
  <link>https://www.reality2cast.com/122</link>
  <guid isPermaLink="false">14210350-7101-4036-9b65-b8d41ebad976</guid>
  <pubDate>Fri, 19 Aug 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/14210350-7101-4036-9b65-b8d41ebad976.mp3" length="57371758" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Adrian Gropper, CTO of Patient Privacy Rights, about health data and human rights, delegating patient agency, and health data standards.</itunes:subtitle>
  <itunes:duration>1:13:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Adrian Gropper, CTO of Patient Privacy Rights, about health data and human rights, delegating patient agency, and health data standards. Special Guest: Adrian Gropper.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Adrian Gropper, CTO of Patient Privacy Rights, about health data and human rights, delegating patient agency, and health data standards.</p><p>Special Guest: Adrian Gropper.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Patient Privacy Rights" rel="nofollow" href="https://patientprivacyrights.org/">Patient Privacy Rights</a> &mdash; Patient Privacy Rights’ purpose is to honor and empower the individual’s right to privacy through personal control of health information wherever such information is collected and used. We educate, collaborate and partner with people to ensure privacy in law, policy, technology, and maximize the benefits from the use of personal health information with consent.</li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a> &mdash; The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Adrian Gropper, CTO of Patient Privacy Rights, about health data and human rights, delegating patient agency, and health data standards.</p><p>Special Guest: Adrian Gropper.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Patient Privacy Rights" rel="nofollow" href="https://patientprivacyrights.org/">Patient Privacy Rights</a> &mdash; Patient Privacy Rights’ purpose is to honor and empower the individual’s right to privacy through personal control of health information wherever such information is collected and used. We educate, collaborate and partner with people to ensure privacy in law, policy, technology, and maximize the benefits from the use of personal health information with consent.</li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a> &mdash; The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 121: Who Really Owns Your Car?</title>
  <link>https://www.reality2cast.com/121</link>
  <guid isPermaLink="false">4b0b61d5-348c-4f08-a4c2-31119f8722eb</guid>
  <pubDate>Fri, 05 Aug 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/4b0b61d5-348c-4f08-a4c2-31119f8722eb.mp3" length="43895422" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about the data cars collect, where it goes, and how we’re really just driving around in a smart phone that we don’t even own.</itunes:subtitle>
  <itunes:duration>53:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about the data cars collect, where it goes, and how we’re really just driving around in a smart phone that we don’t even own.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, cars</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about the data cars collect, where it goes, and how we’re really just driving around in a smart phone that we don’t even own.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Who Is Collecting Data from Your Car? – The Markup" rel="nofollow" href="https://themarkup.org/the-breakdown/2022/07/27/who-is-collecting-data-from-your-car">Who Is Collecting Data from Your Car? – The Markup</a> &mdash; A firehose of sensitive data from your vehicle is flowing to a group of companies you’ve probably never heard of</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Locked In A Remote Control Car – Purism" rel="nofollow" href="https://puri.sm/posts/locked-in-a-remote-control-car/">Locked In A Remote Control Car – Purism</a> &mdash; It’s rare to find modern technology that’s actually on your side. For the most part when technology advances today, new features are less for your benefit, and more to benefit the company that made them.</li><li><a title="Tesla Removes About 80 Miles Of Customer&#39;s Available Battery Capacity Via Software Restriction" rel="nofollow" href="https://www.msn.com/en-us/money/news/tesla-removes-about-80-miles-of-customers-available-battery-capacity-via-software-restriction/ar-AA102gEk">Tesla Removes About 80 Miles Of Customer's Available Battery Capacity Via Software Restriction</a> &mdash; Tesla Inc (NASDAQ: TSLA) has some of the most advanced cars on the planet. Software updates allow new features to be added for free, such as better performance or enhanced safety features. But having a car that is dominated by software can have its drawbacks, too. </li><li><a title="Ford, GM Push Harder to Stop New Car Flipping and Price Gouging" rel="nofollow" href="https://www.caranddriver.com/news/a40763094/ford-gm-price-gouging-sales-rules/">Ford, GM Push Harder to Stop New Car Flipping and Price Gouging</a> &mdash; Some dealers are overpricing such popular cars and trucks as the Ford F-150 Lightning and Chevy Corvette Z06, but the automakers are cracking down.</li><li><a title="In-car monitoring: Surveillance tech will make your car less private - CNET" rel="nofollow" href="https://www.cnet.com/roadshow/news/in-car-monitoring-surveillance-technology-privacy/">In-car monitoring: Surveillance tech will make your car less private - CNET</a> &mdash; Everything you do in your car may soon be noticed.

</li><li><a title="How your car is spying on you | Daily Mail Online" rel="nofollow" href="https://www.dailymail.co.uk/sciencetech/article-5274809/How-car-SPYING-you.html">How your car is spying on you | Daily Mail Online</a> &mdash; Experts have revealed the myriad ways that your car can spy on your personal habits.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about the data cars collect, where it goes, and how we’re really just driving around in a smart phone that we don’t even own.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Who Is Collecting Data from Your Car? – The Markup" rel="nofollow" href="https://themarkup.org/the-breakdown/2022/07/27/who-is-collecting-data-from-your-car">Who Is Collecting Data from Your Car? – The Markup</a> &mdash; A firehose of sensitive data from your vehicle is flowing to a group of companies you’ve probably never heard of</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Locked In A Remote Control Car – Purism" rel="nofollow" href="https://puri.sm/posts/locked-in-a-remote-control-car/">Locked In A Remote Control Car – Purism</a> &mdash; It’s rare to find modern technology that’s actually on your side. For the most part when technology advances today, new features are less for your benefit, and more to benefit the company that made them.</li><li><a title="Tesla Removes About 80 Miles Of Customer&#39;s Available Battery Capacity Via Software Restriction" rel="nofollow" href="https://www.msn.com/en-us/money/news/tesla-removes-about-80-miles-of-customers-available-battery-capacity-via-software-restriction/ar-AA102gEk">Tesla Removes About 80 Miles Of Customer's Available Battery Capacity Via Software Restriction</a> &mdash; Tesla Inc (NASDAQ: TSLA) has some of the most advanced cars on the planet. Software updates allow new features to be added for free, such as better performance or enhanced safety features. But having a car that is dominated by software can have its drawbacks, too. </li><li><a title="Ford, GM Push Harder to Stop New Car Flipping and Price Gouging" rel="nofollow" href="https://www.caranddriver.com/news/a40763094/ford-gm-price-gouging-sales-rules/">Ford, GM Push Harder to Stop New Car Flipping and Price Gouging</a> &mdash; Some dealers are overpricing such popular cars and trucks as the Ford F-150 Lightning and Chevy Corvette Z06, but the automakers are cracking down.</li><li><a title="In-car monitoring: Surveillance tech will make your car less private - CNET" rel="nofollow" href="https://www.cnet.com/roadshow/news/in-car-monitoring-surveillance-technology-privacy/">In-car monitoring: Surveillance tech will make your car less private - CNET</a> &mdash; Everything you do in your car may soon be noticed.

</li><li><a title="How your car is spying on you | Daily Mail Online" rel="nofollow" href="https://www.dailymail.co.uk/sciencetech/article-5274809/How-car-SPYING-you.html">How your car is spying on you | Daily Mail Online</a> &mdash; Experts have revealed the myriad ways that your car can spy on your personal habits.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 120: I'm Here (aka Happy Birthday, Doc)</title>
  <link>https://www.reality2cast.com/120</link>
  <guid isPermaLink="false">df540d88-d5f7-444b-bea5-4950a5fddf3f</guid>
  <pubDate>Sat, 30 Jul 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/df540d88-d5f7-444b-bea5-4950a5fddf3f.mp3" length="38410023" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls celebrate Doc's birthday and chat about Amazon acquisitions and privacy legislation.</itunes:subtitle>
  <itunes:duration>44:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls celebrate Doc's birthday and chat about Amazon acquisitions and privacy legislation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls celebrate Doc&#39;s birthday and chat about Amazon acquisitions and privacy legislation.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls celebrate Doc&#39;s birthday and chat about Amazon acquisitions and privacy legislation.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 114: Ethical Advertising</title>
  <link>https://www.reality2cast.com/114</link>
  <guid isPermaLink="false">6fe2b451-6b7b-4b0c-894c-d267df5f610a</guid>
  <pubDate>Fri, 10 Jun 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/6fe2b451-6b7b-4b0c-894c-d267df5f610a.mp3" length="83248756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Tune in to our new episode! Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about how to advertise without being creepy.</itunes:subtitle>
  <itunes:duration>58:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Tune in to our new episode! Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about how to advertise without being creepy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about how to advertise without being creepy.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Is Ethical Advertising Possible? – Purism" rel="nofollow" href="https://puri.sm/posts/is-ethical-advertising-possible/">Is Ethical Advertising Possible? – Purism</a> &mdash; Is ethical advertising possible? We all certainly know unethical advertising is possible, we live with it every day. The ad-driven Internet has created an insatiable hunger for personal data and as a result most of what the average person does in their web browser, or on their phone, and in real life is being measured, tracked, and sold to some degree. Yet if a company actually cared about your privacy and wanted to advertise its products, could it do so ethically? Can you track what a visitor does on your website without violating their privacy? We have been thinking about these issues heavily at Purism as we consider how to expand our marketing and in this article I’m going to explore where we currently are in our thinking.</li><li><a title="Doc Searls Weblog · People vs. Adtech" rel="nofollow" href="https://blogs.harvard.edu/doc/the-adblock-war/">Doc Searls Weblog · People vs. Adtech</a> &mdash; Below are blog posts, articles and essays I’ve written toward four goals in fighting surveillance of our private spaces online by the tracking-based advertising business and its dependents in publishing.</li><li><a title="Opinion | In Stores, Secret Bluetooth Surveillance Tracks Your Every Move - The New York Times" rel="nofollow" href="https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html">Opinion | In Stores, Secret Bluetooth Surveillance Tracks Your Every Move - The New York Times</a> &mdash; Imagine you are shopping in your favorite grocery store. As you approach the dairy aisle, you are sent a push notification in your phone: “10 percent off your favorite yogurt! Click here to redeem your coupon.” You considered buying yogurt on your last trip to the store, but you decided against it. How did your phone know?</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman and Doc Searls talk to Kyle Rankin of Purism about how to advertise without being creepy.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Is Ethical Advertising Possible? – Purism" rel="nofollow" href="https://puri.sm/posts/is-ethical-advertising-possible/">Is Ethical Advertising Possible? – Purism</a> &mdash; Is ethical advertising possible? We all certainly know unethical advertising is possible, we live with it every day. The ad-driven Internet has created an insatiable hunger for personal data and as a result most of what the average person does in their web browser, or on their phone, and in real life is being measured, tracked, and sold to some degree. Yet if a company actually cared about your privacy and wanted to advertise its products, could it do so ethically? Can you track what a visitor does on your website without violating their privacy? We have been thinking about these issues heavily at Purism as we consider how to expand our marketing and in this article I’m going to explore where we currently are in our thinking.</li><li><a title="Doc Searls Weblog · People vs. Adtech" rel="nofollow" href="https://blogs.harvard.edu/doc/the-adblock-war/">Doc Searls Weblog · People vs. Adtech</a> &mdash; Below are blog posts, articles and essays I’ve written toward four goals in fighting surveillance of our private spaces online by the tracking-based advertising business and its dependents in publishing.</li><li><a title="Opinion | In Stores, Secret Bluetooth Surveillance Tracks Your Every Move - The New York Times" rel="nofollow" href="https://www.nytimes.com/interactive/2019/06/14/opinion/bluetooth-wireless-tracking-privacy.html">Opinion | In Stores, Secret Bluetooth Surveillance Tracks Your Every Move - The New York Times</a> &mdash; Imagine you are shopping in your favorite grocery store. As you approach the dairy aisle, you are sent a push notification in your phone: “10 percent off your favorite yogurt! Click here to redeem your coupon.” You considered buying yogurt on your last trip to the store, but you decided against it. How did your phone know?</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 112: Pseudonymous Authentication for Twitter</title>
  <link>https://www.reality2cast.com/112</link>
  <guid isPermaLink="false">b77937b6-289a-4961-90d0-8bb966aec39b</guid>
  <pubDate>Fri, 20 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/b77937b6-289a-4961-90d0-8bb966aec39b.mp3" length="66643224" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</itunes:subtitle>
  <itunes:duration>1:29:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Dave Huseby and Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Dave Huseby and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Authentication With Pseudonymity - Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/post/authentication-with-pseudonymity">Authentication With Pseudonymity - Cryptid Technologies</a> &mdash; Authentication With Pseudonymity
How Elon can Legally Transform Twitter with Pseudonymous Free Speech
by Dave Huseby

“Authentication is important, but so is anonymity for many. A balance must be struck.” — Elon Musk (@elonmusk)
In a well-studied and famous letter dated October 17, 1788 from James Madison to Thomas Jefferson, Madison discusses the proposed Bill of Rights and his plan for getting it passed in the first session of Congress. One fact that many do not know is that the letter is encrypted in part using a cipher invented by Thomas Jefferson. In the letter, Madison details the bitter and extremely contentious politics among the states, especially between the prominent Anti-Federalists and the Federalists like themselves. Madison’s chief concern was passing the Bill of Rights to quell any organized opposition to the Constitution. Political persecution was rampant and serious enough that Madison and Jefferson made careful use of encryption to avoid being doxxed and canceled because of their private political opinions.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Kyle Rankin talk to Dave Huseby about his new approach to pseudonymous user authentication.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Dave Huseby and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Authentication With Pseudonymity - Cryptid Technologies" rel="nofollow" href="https://www.cryptid.tech/post/authentication-with-pseudonymity">Authentication With Pseudonymity - Cryptid Technologies</a> &mdash; Authentication With Pseudonymity
How Elon can Legally Transform Twitter with Pseudonymous Free Speech
by Dave Huseby

“Authentication is important, but so is anonymity for many. A balance must be struck.” — Elon Musk (@elonmusk)
In a well-studied and famous letter dated October 17, 1788 from James Madison to Thomas Jefferson, Madison discusses the proposed Bill of Rights and his plan for getting it passed in the first session of Congress. One fact that many do not know is that the letter is encrypted in part using a cipher invented by Thomas Jefferson. In the letter, Madison details the bitter and extremely contentious politics among the states, especially between the prominent Anti-Federalists and the Federalists like themselves. Madison’s chief concern was passing the Bill of Rights to quell any organized opposition to the Constitution. Political persecution was rampant and serious enough that Madison and Jefferson made careful use of encryption to avoid being doxxed and canceled because of their private political opinions.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 111: Peer-to-Peer Messaging with Quiet</title>
  <link>https://www.reality2cast.com/111</link>
  <guid isPermaLink="false">ff55ed12-545e-4a70-98a4-2235281bcedf</guid>
  <pubDate>Fri, 13 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ff55ed12-545e-4a70-98a4-2235281bcedf.mp3" length="54958496" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</itunes:subtitle>
  <itunes:duration>1:17:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Holmes Wilson and Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Holmes Wilson and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="GitHub - ZbayApp/monorepo" rel="nofollow" href="https://github.com/ZbayApp/monorepo">GitHub - ZbayApp/monorepo</a> &mdash; An early prototype for a peer-to-peer alternative to Slack and Discord.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Holmes Wilson and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="GitHub - ZbayApp/monorepo" rel="nofollow" href="https://github.com/ZbayApp/monorepo">GitHub - ZbayApp/monorepo</a> &mdash; An early prototype for a peer-to-peer alternative to Slack and Discord.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 106: Revisiting Privacy</title>
  <link>https://www.reality2cast.com/106</link>
  <guid isPermaLink="false">d86c57f3-eb60-44ec-b2a7-b3e8c775fb63</guid>
  <pubDate>Fri, 08 Apr 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/d86c57f3-eb60-44ec-b2a7-b3e8c775fb63.mp3" length="55594975" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls revisit the topic of data privacy.</itunes:subtitle>
  <itunes:duration>42:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls revisit the topic of data privacy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls revisit the topic of data privacy.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Views on Current Laws and Practices to Protect Personal Data According to US Likely Voters, July 2021 (% of respondents) | Insider Intelligence" rel="nofollow" href="https://www.emarketer.com/chart/249584/views-on-current-laws-practices-protect-personal-data-according-us-likely-voters-july-2021-of-respondents">Views on Current Laws and Practices to Protect Personal Data According to US Likely Voters, July 2021 (% of respondents) | Insider Intelligence</a></li><li><a title="ProjectVRM – Developing tools for customer independence and engagement with vendors" rel="nofollow" href="http://blogs.harvard.edu/vrm/">ProjectVRM – Developing tools for customer independence and engagement with vendors</a></li><li><a title="Ostrom Workshop Calendar" rel="nofollow" href="https://events.iu.edu/ostromworkshop/event/291452-beyond-the-web-salon-series-shoshana-zuboff">Ostrom Workshop Calendar</a> &mdash; The main business model of the Web goes by a label we all now know from the title of Shoshana Zuboff’s landmark book, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. How do we fight surveillance capitalism? And how do we work around it? How, especially, can we keep our new Byway from becoming infested with it—or with the mendacities behind it?

Nobody better to help us toward answers than Shoshana herself, who leads this finale to our salon series.

Scholar, writer, and activist Shoshana Zuboff is the author of three major books, each of which signaled the start of a new epoch in technological society. Her recent masterwork, The Age of Surveillance Capitalism, an international bestseller translated into twenty-six languages, has been hailed as the tech industry’s Silent Spring and the Das Kapital of the 21st Century. Professor Zuboff is the Charles Edward Wilson Professor Emeritus at Harvard Business School and a faculty associate at the Harvard Kennedy School’s Carr Center for Human Rights. Her work has received the Axel Springer Award (2019), the EPIC Lifetime Achievement Award (2021), and is the first recipient of the Global Privacy Assembly Giovanni Buttarelli Award (2021).</li><li><a title="Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times" rel="nofollow" href="https://www.nytimes.com/2021/01/29/opinion/sunday/facebook-surveillance-society-technology.html">Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times</a> &mdash; We can have democracy, or we can have a surveillance society, but we cannot have both.</li><li><a title="Mindf*ck: Cambridge Analytica and the Plot to Break America: Wylie, Christopher: 9781984854636: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Mindf-Cambridge-Analytica-Break-America/dp/1984854631/">Mindf*ck: Cambridge Analytica and the Plot to Break America: Wylie, Christopher: 9781984854636: Amazon.com: Books</a></li><li><a title="Slaughterbots - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Slaughterbots">Slaughterbots - Wikipedia</a> &mdash; Slaughterbots is a 2017 arms-control advocacy video presenting a dramatized near-future scenario where swarms of inexpensive microdrones use artificial intelligence and facial recognition to assassinate political opponents based on preprogrammed criteria.</li><li><a title="Privacy is Power: Why and How You Should Take Back Control of Your Data: Veliz, Carissa: 9781612199672: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Privacy-Power-Should-Take-Control/dp/1612199674/">Privacy is Power: Why and How You Should Take Back Control of Your Data: Veliz, Carissa: 9781612199672: Amazon.com: Books</a></li><li><a title="The Privacy Engineer&#39;s Manifesto: Getting from Policy to Code to QA to Value: Dennedy, Michelle, Fox, Jonathan, Finneran, Tom: 9781430263555: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Privacy-Engineers-Manifesto-Getting-Policy/dp/1430263555/">The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value: Dennedy, Michelle, Fox, Jonathan, Finneran, Tom: 9781430263555: Amazon.com: Books</a></li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls revisit the topic of data privacy.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Views on Current Laws and Practices to Protect Personal Data According to US Likely Voters, July 2021 (% of respondents) | Insider Intelligence" rel="nofollow" href="https://www.emarketer.com/chart/249584/views-on-current-laws-practices-protect-personal-data-according-us-likely-voters-july-2021-of-respondents">Views on Current Laws and Practices to Protect Personal Data According to US Likely Voters, July 2021 (% of respondents) | Insider Intelligence</a></li><li><a title="ProjectVRM – Developing tools for customer independence and engagement with vendors" rel="nofollow" href="http://blogs.harvard.edu/vrm/">ProjectVRM – Developing tools for customer independence and engagement with vendors</a></li><li><a title="Ostrom Workshop Calendar" rel="nofollow" href="https://events.iu.edu/ostromworkshop/event/291452-beyond-the-web-salon-series-shoshana-zuboff">Ostrom Workshop Calendar</a> &mdash; The main business model of the Web goes by a label we all now know from the title of Shoshana Zuboff’s landmark book, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. How do we fight surveillance capitalism? And how do we work around it? How, especially, can we keep our new Byway from becoming infested with it—or with the mendacities behind it?

Nobody better to help us toward answers than Shoshana herself, who leads this finale to our salon series.

Scholar, writer, and activist Shoshana Zuboff is the author of three major books, each of which signaled the start of a new epoch in technological society. Her recent masterwork, The Age of Surveillance Capitalism, an international bestseller translated into twenty-six languages, has been hailed as the tech industry’s Silent Spring and the Das Kapital of the 21st Century. Professor Zuboff is the Charles Edward Wilson Professor Emeritus at Harvard Business School and a faculty associate at the Harvard Kennedy School’s Carr Center for Human Rights. Her work has received the Axel Springer Award (2019), the EPIC Lifetime Achievement Award (2021), and is the first recipient of the Global Privacy Assembly Giovanni Buttarelli Award (2021).</li><li><a title="Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times" rel="nofollow" href="https://www.nytimes.com/2021/01/29/opinion/sunday/facebook-surveillance-society-technology.html">Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times</a> &mdash; We can have democracy, or we can have a surveillance society, but we cannot have both.</li><li><a title="Mindf*ck: Cambridge Analytica and the Plot to Break America: Wylie, Christopher: 9781984854636: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Mindf-Cambridge-Analytica-Break-America/dp/1984854631/">Mindf*ck: Cambridge Analytica and the Plot to Break America: Wylie, Christopher: 9781984854636: Amazon.com: Books</a></li><li><a title="Slaughterbots - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Slaughterbots">Slaughterbots - Wikipedia</a> &mdash; Slaughterbots is a 2017 arms-control advocacy video presenting a dramatized near-future scenario where swarms of inexpensive microdrones use artificial intelligence and facial recognition to assassinate political opponents based on preprogrammed criteria.</li><li><a title="Privacy is Power: Why and How You Should Take Back Control of Your Data: Veliz, Carissa: 9781612199672: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Privacy-Power-Should-Take-Control/dp/1612199674/">Privacy is Power: Why and How You Should Take Back Control of Your Data: Veliz, Carissa: 9781612199672: Amazon.com: Books</a></li><li><a title="The Privacy Engineer&#39;s Manifesto: Getting from Policy to Code to QA to Value: Dennedy, Michelle, Fox, Jonathan, Finneran, Tom: 9781430263555: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Privacy-Engineers-Manifesto-Getting-Policy/dp/1430263555/">The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value: Dennedy, Michelle, Fox, Jonathan, Finneran, Tom: 9781430263555: Amazon.com: Books</a></li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 105: What is the Digital Markets Act?</title>
  <link>https://www.reality2cast.com/105</link>
  <guid isPermaLink="false">36729465-cbdd-488d-808a-68a8c21cadf6</guid>
  <pubDate>Fri, 01 Apr 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/36729465-cbdd-488d-808a-68a8c21cadf6.mp3" length="28553086" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk about the Digital Markets Act and Apple's personal finance plans.</itunes:subtitle>
  <itunes:duration>35:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk about the Digital Markets Act and Apple's personal finance plans.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about the Digital Markets Act and Apple&#39;s personal finance plans.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Digital Markets Act: ensuring fair and open digital markets | European Commission" rel="nofollow" href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/digital-markets-act-ensuring-fair-and-open-digital-markets_en#who-are-the-gatekeepers">The Digital Markets Act: ensuring fair and open digital markets | European Commission</a> &mdash; The Digital Markets Act (DMA) establishes a set of narrowly defined objective criteria for qualifying a large online platform as a so-called “gatekeeper”. This allows the DMA to remain well targeted to the problem that it aims to tackle as regards large, systemic online platforms.</li><li><a title="Why Alphabet Will Benefit From New European Privacy Rules" rel="nofollow" href="https://www.forbes.com/sites/jonmarkman/2022/03/28/why-alphabet-will-benefit-from-new-european-privacy-rules/?sh=8973b2c40a4f">Why Alphabet Will Benefit From New European Privacy Rules</a> &mdash; European regulators are once again coming after big American technology companies. Some say it is the beginning of the end for them. Not so fast.</li><li><a title="New EU law could spark gold rush of iMessage alternatives" rel="nofollow" href="https://www.msn.com/en-us/money/other/new-eu-law-could-spark-gold-rush-of-imessage-alternatives/ar-AAVCQgN">New EU law could spark gold rush of iMessage alternatives</a> &mdash; At the moment, getting access to iMessage’s features on non-Apple devices is a complete pain. In fact, getting access to any messaging platform’s features outside of its native apps can range from difficult to almost impossible. Whether it’s Facebook Messenger, WhatsApp, or Signal, in every case, the services’ developers want you to stick to their own software to message on their platforms.</li><li><a title="Europe agrees on big new package of tech rules" rel="nofollow" href="https://www.axios.com/europe-agrees-on-big-new-package-of-tech-rules-a1a0bc8b-3ff1-48ee-93bf-56f7b7f7ef2f.html">Europe agrees on big new package of tech rules</a> &mdash; European regulators have come to an agreement on major competition rules that could force the world's biggest tech platforms, including Google, Apple, Facebook, Amazon and Microsoft, to reshape big chunks of their business.</li><li><a title="US consumer views on privacy laws" rel="nofollow" href="https://www.insiderintelligence.com/charts/us-consumer-views-privacy-laws/">US consumer views on privacy laws</a> &mdash; A July 2021 survey from Data for Progress found that nearly three-quarters (72%) of likely US voters felt that existing privacy laws are insufficient. </li><li><a title="Computer Crime Hype - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Computer Crime Hype - Schneier on Security</a> &mdash; Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.</li><li><a title="Apple (AAPL) Working to Bring Financial Services Tasks In-House - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2022-03-30/apple-is-working-on-project-to-bring-financial-services-in-house">Apple (AAPL) Working to Bring Financial Services Tasks In-House - Bloomberg</a> &mdash; The effort, dubbed ‘Breakout,’ would replace fintech partners</li><li><a title="Wordle Hacking—Suddenly Wordle Is Tracking You, Here’s How To Stop It" rel="nofollow" href="https://www.forbes.com/sites/daveywinder/2022/02/19/wordle-hacking-suddenly-wordle-is-tracking-you-heres-how-to-stop-it/?sh=76011f105b01">Wordle Hacking—Suddenly Wordle Is Tracking You, Here’s How To Stop It</a> &mdash; Perhaps what will come as some surprise to many players of the game is that it now comes complete with ad-trackers. But don't sweat it, you can stop it with a little Wordle hacking.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about the Digital Markets Act and Apple&#39;s personal finance plans.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="The Digital Markets Act: ensuring fair and open digital markets | European Commission" rel="nofollow" href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/digital-markets-act-ensuring-fair-and-open-digital-markets_en#who-are-the-gatekeepers">The Digital Markets Act: ensuring fair and open digital markets | European Commission</a> &mdash; The Digital Markets Act (DMA) establishes a set of narrowly defined objective criteria for qualifying a large online platform as a so-called “gatekeeper”. This allows the DMA to remain well targeted to the problem that it aims to tackle as regards large, systemic online platforms.</li><li><a title="Why Alphabet Will Benefit From New European Privacy Rules" rel="nofollow" href="https://www.forbes.com/sites/jonmarkman/2022/03/28/why-alphabet-will-benefit-from-new-european-privacy-rules/?sh=8973b2c40a4f">Why Alphabet Will Benefit From New European Privacy Rules</a> &mdash; European regulators are once again coming after big American technology companies. Some say it is the beginning of the end for them. Not so fast.</li><li><a title="New EU law could spark gold rush of iMessage alternatives" rel="nofollow" href="https://www.msn.com/en-us/money/other/new-eu-law-could-spark-gold-rush-of-imessage-alternatives/ar-AAVCQgN">New EU law could spark gold rush of iMessage alternatives</a> &mdash; At the moment, getting access to iMessage’s features on non-Apple devices is a complete pain. In fact, getting access to any messaging platform’s features outside of its native apps can range from difficult to almost impossible. Whether it’s Facebook Messenger, WhatsApp, or Signal, in every case, the services’ developers want you to stick to their own software to message on their platforms.</li><li><a title="Europe agrees on big new package of tech rules" rel="nofollow" href="https://www.axios.com/europe-agrees-on-big-new-package-of-tech-rules-a1a0bc8b-3ff1-48ee-93bf-56f7b7f7ef2f.html">Europe agrees on big new package of tech rules</a> &mdash; European regulators have come to an agreement on major competition rules that could force the world's biggest tech platforms, including Google, Apple, Facebook, Amazon and Microsoft, to reshape big chunks of their business.</li><li><a title="US consumer views on privacy laws" rel="nofollow" href="https://www.insiderintelligence.com/charts/us-consumer-views-privacy-laws/">US consumer views on privacy laws</a> &mdash; A July 2021 survey from Data for Progress found that nearly three-quarters (72%) of likely US voters felt that existing privacy laws are insufficient. </li><li><a title="Computer Crime Hype - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2005/12/computer_crime_1.html">Computer Crime Hype - Schneier on Security</a> &mdash; Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.</li><li><a title="Apple (AAPL) Working to Bring Financial Services Tasks In-House - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2022-03-30/apple-is-working-on-project-to-bring-financial-services-in-house">Apple (AAPL) Working to Bring Financial Services Tasks In-House - Bloomberg</a> &mdash; The effort, dubbed ‘Breakout,’ would replace fintech partners</li><li><a title="Wordle Hacking—Suddenly Wordle Is Tracking You, Here’s How To Stop It" rel="nofollow" href="https://www.forbes.com/sites/daveywinder/2022/02/19/wordle-hacking-suddenly-wordle-is-tracking-you-heres-how-to-stop-it/?sh=76011f105b01">Wordle Hacking—Suddenly Wordle Is Tracking You, Here’s How To Stop It</a> &mdash; Perhaps what will come as some surprise to many players of the game is that it now comes complete with ad-trackers. But don't sweat it, you can stop it with a little Wordle hacking.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 98: You Win Some, You Lose Some (Billions)</title>
  <link>https://www.reality2cast.com/98</link>
  <guid isPermaLink="false">6f98bd09-c923-47b4-b688-54d5749459cb</guid>
  <pubDate>Fri, 04 Feb 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/6f98bd09-c923-47b4-b688-54d5749459cb.mp3" length="29070569" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Petros Koutoupis about how big tech navigates the ad tech landscape, for better or worse.</itunes:subtitle>
  <itunes:duration>36:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Petros Koutoupis about how big tech navigates the ad tech landscape, for better or worse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, ad tech, business</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Petros Koutoupis about how big tech navigates the ad tech landscape, for better or worse.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet (FSG Originals x Logic): Hwang, Tim: 9780374538651: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Subprime-Attention-Crisis-Advertising-Originals/dp/0374538654">Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet (FSG Originals x Logic): Hwang, Tim: 9780374538651: Amazon.com: Books</a> &mdash; In Subprime Attention Crisis, Tim Hwang investigates the way big tech financializes attention. In the process, he shows us how digital advertising―the beating heart of the internet―is at risk of collapsing, and that its potential demise bears an uncanny resemblance to the housing crisis of 2008.</li><li><a title="Amazon has a $31 billion a year advertising business" rel="nofollow" href="https://www.cnbc.com/2022/02/03/amazon-has-a-31-billion-a-year-advertising-business.html">Amazon has a $31 billion a year advertising business</a> &mdash; Amazon revealed Thursday just how big its advertising business has become. It generated $31.2 billion in revenue in 2021, with fourth-quarter sales rising 32%, according to the retailer’s fourth-quarter earnings statement.</li><li><a title="Facebook and Google stocks have diverged, and the reason is Apple" rel="nofollow" href="https://www.cnbc.com/2022/02/03/facebook-and-google-stocks-have-diverged-and-the-reason-is-apple.html">Facebook and Google stocks have diverged, and the reason is Apple</a> &mdash; Facebook’s apps rely almost entirely on Apple and Google for distribution. So when Apple changed its privacy policy last year, limiting the ability of app developers to target users, Facebook was suddenly stripped of one of its most important assets.</li><li><a title="A public apology - on screwing up by not questioning assumptions - my talk at #BIF10 - Ethan Zuckerman" rel="nofollow" href="https://ethanzuckerman.com/2014/09/17/a-public-apology-on-screwing-up-by-not-questioning-assumptions-my-talk-at-bif10/">A public apology - on screwing up by not questioning assumptions - my talk at #BIF10 - Ethan Zuckerman</a> &mdash; About a month ago, I wrote an article about a simple idea. I asked whether anyone really believed that advertising should be the main way we supported content and services on the internet. Given how poorly banner advertising on the web worksGiven that nobody likes banner ads, and given that the current system puts users under surveillance, which in turn seems to inure us to government surveillance, I wondered whether there might be a better way.</li><li><a title="Doc Searls Weblog · Apple vs (or plus) Adtech, Part I" rel="nofollow" href="https://blogs.harvard.edu/doc/2021/05/29/apple-vs-or-plus-adtech/">Doc Searls Weblog · Apple vs (or plus) Adtech, Part I</a> &mdash; If you haven’t seen it yet, watch Apple’s Privacy on iPhone | tracked ad. In it a guy named Felix (that’s him, above) goes from a coffee shop to a waiting room somewhere, accumulating a vast herd of hangers-on along the way. The herd represents trackers in his phone, all crowding his personal space while gathering private information about him. The sound track is “Mind Your Own Business,” by Delta 5.</li><li><a title="Fighting FLoC and Fighting Monopoly Are Fully Compatible | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/deeplinks/2021/04/fighting-floc-and-fighting-monopoly-are-fully-compatible">Fighting FLoC and Fighting Monopoly Are Fully Compatible | Electronic Frontier Foundation</a> &mdash; Are tech giants really damned if they do and damned if they don’t (protect our privacy)?</li><li><a title="Facebook says Apple iOS privacy change will cost $10 billion this year" rel="nofollow" href="https://www.cnbc.com/2022/02/02/facebook-says-apple-ios-privacy-change-will-cost-10-billion-this-year.html">Facebook says Apple iOS privacy change will cost $10 billion this year</a> &mdash; Facebook said on Wednesday that Apple’s App Tracking Transparency feature would decrease the company’s 2022 sales by about $10 billion.</li><li><a title="Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads" rel="nofollow" href="https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html">Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads</a> &mdash; Google on Tuesday announced that it is abandoning its controversial plans for replacing third-party cookies in favor of a new Privacy Sandbox proposal called Topics, which categorizes users' browsing habits into approximately 350 topics.

The new mechanism, which takes the place of FLoC (short for Federated Learning of Cohorts), slots users' browsing history for a given week into a handful of top pre-designated interests (i.e., topics), which are retained only on the device for a revolving period of three weeks.</li><li><a title="GDPR enforcer rules that IAB Europe&#39;s consent popups are unlawful - Irish Council for Civil Liberties" rel="nofollow" href="https://www.iccl.ie/news/gdpr-enforcer-rules-that-iab-europes-consent-popups-are-unlawful/">GDPR enforcer rules that IAB Europe's consent popups are unlawful - Irish Council for Civil Liberties</a> &mdash; Google, Amazon, and the entire tracking industry relies on IAB Europe’s consent system, which has now been found to be illegal following complaints coordinated by ICCL.&nbsp;

EU data protection authorities find that the consent popups that plagued Europeans for years are illegal. All data collected through them must be deleted. This decision impacts Google’s, Amazon’s and Microsoft’s online advertising businesses.</li><li><a title="Case number: DOS-2019-01377 Concerning: Complaint relating to Transparency &amp; Consent Framework" rel="nofollow" href="https://www.gegevensbeschermingsautoriteit.be/publications/beslissing-ten-gronde-nr.-21-2022-english.pdf">Case number: DOS-2019-01377 Concerning: Complaint relating to Transparency &amp; Consent Framework</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Petros Koutoupis about how big tech navigates the ad tech landscape, for better or worse.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet (FSG Originals x Logic): Hwang, Tim: 9780374538651: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Subprime-Attention-Crisis-Advertising-Originals/dp/0374538654">Subprime Attention Crisis: Advertising and the Time Bomb at the Heart of the Internet (FSG Originals x Logic): Hwang, Tim: 9780374538651: Amazon.com: Books</a> &mdash; In Subprime Attention Crisis, Tim Hwang investigates the way big tech financializes attention. In the process, he shows us how digital advertising―the beating heart of the internet―is at risk of collapsing, and that its potential demise bears an uncanny resemblance to the housing crisis of 2008.</li><li><a title="Amazon has a $31 billion a year advertising business" rel="nofollow" href="https://www.cnbc.com/2022/02/03/amazon-has-a-31-billion-a-year-advertising-business.html">Amazon has a $31 billion a year advertising business</a> &mdash; Amazon revealed Thursday just how big its advertising business has become. It generated $31.2 billion in revenue in 2021, with fourth-quarter sales rising 32%, according to the retailer’s fourth-quarter earnings statement.</li><li><a title="Facebook and Google stocks have diverged, and the reason is Apple" rel="nofollow" href="https://www.cnbc.com/2022/02/03/facebook-and-google-stocks-have-diverged-and-the-reason-is-apple.html">Facebook and Google stocks have diverged, and the reason is Apple</a> &mdash; Facebook’s apps rely almost entirely on Apple and Google for distribution. So when Apple changed its privacy policy last year, limiting the ability of app developers to target users, Facebook was suddenly stripped of one of its most important assets.</li><li><a title="A public apology - on screwing up by not questioning assumptions - my talk at #BIF10 - Ethan Zuckerman" rel="nofollow" href="https://ethanzuckerman.com/2014/09/17/a-public-apology-on-screwing-up-by-not-questioning-assumptions-my-talk-at-bif10/">A public apology - on screwing up by not questioning assumptions - my talk at #BIF10 - Ethan Zuckerman</a> &mdash; About a month ago, I wrote an article about a simple idea. I asked whether anyone really believed that advertising should be the main way we supported content and services on the internet. Given how poorly banner advertising on the web worksGiven that nobody likes banner ads, and given that the current system puts users under surveillance, which in turn seems to inure us to government surveillance, I wondered whether there might be a better way.</li><li><a title="Doc Searls Weblog · Apple vs (or plus) Adtech, Part I" rel="nofollow" href="https://blogs.harvard.edu/doc/2021/05/29/apple-vs-or-plus-adtech/">Doc Searls Weblog · Apple vs (or plus) Adtech, Part I</a> &mdash; If you haven’t seen it yet, watch Apple’s Privacy on iPhone | tracked ad. In it a guy named Felix (that’s him, above) goes from a coffee shop to a waiting room somewhere, accumulating a vast herd of hangers-on along the way. The herd represents trackers in his phone, all crowding his personal space while gathering private information about him. The sound track is “Mind Your Own Business,” by Delta 5.</li><li><a title="Fighting FLoC and Fighting Monopoly Are Fully Compatible | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/deeplinks/2021/04/fighting-floc-and-fighting-monopoly-are-fully-compatible">Fighting FLoC and Fighting Monopoly Are Fully Compatible | Electronic Frontier Foundation</a> &mdash; Are tech giants really damned if they do and damned if they don’t (protect our privacy)?</li><li><a title="Facebook says Apple iOS privacy change will cost $10 billion this year" rel="nofollow" href="https://www.cnbc.com/2022/02/02/facebook-says-apple-ios-privacy-change-will-cost-10-billion-this-year.html">Facebook says Apple iOS privacy change will cost $10 billion this year</a> &mdash; Facebook said on Wednesday that Apple’s App Tracking Transparency feature would decrease the company’s 2022 sales by about $10 billion.</li><li><a title="Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads" rel="nofollow" href="https://thehackernews.com/2022/01/google-drops-floc-and-introduces-topics.html">Google Drops FLoC and Introduces Topics API to Replace Tracking Cookies for Ads</a> &mdash; Google on Tuesday announced that it is abandoning its controversial plans for replacing third-party cookies in favor of a new Privacy Sandbox proposal called Topics, which categorizes users' browsing habits into approximately 350 topics.

The new mechanism, which takes the place of FLoC (short for Federated Learning of Cohorts), slots users' browsing history for a given week into a handful of top pre-designated interests (i.e., topics), which are retained only on the device for a revolving period of three weeks.</li><li><a title="GDPR enforcer rules that IAB Europe&#39;s consent popups are unlawful - Irish Council for Civil Liberties" rel="nofollow" href="https://www.iccl.ie/news/gdpr-enforcer-rules-that-iab-europes-consent-popups-are-unlawful/">GDPR enforcer rules that IAB Europe's consent popups are unlawful - Irish Council for Civil Liberties</a> &mdash; Google, Amazon, and the entire tracking industry relies on IAB Europe’s consent system, which has now been found to be illegal following complaints coordinated by ICCL.&nbsp;

EU data protection authorities find that the consent popups that plagued Europeans for years are illegal. All data collected through them must be deleted. This decision impacts Google’s, Amazon’s and Microsoft’s online advertising businesses.</li><li><a title="Case number: DOS-2019-01377 Concerning: Complaint relating to Transparency &amp; Consent Framework" rel="nofollow" href="https://www.gegevensbeschermingsautoriteit.be/publications/beslissing-ten-gronde-nr.-21-2022-english.pdf">Case number: DOS-2019-01377 Concerning: Complaint relating to Transparency &amp; Consent Framework</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 95: What Was Web 2.0?</title>
  <link>https://www.reality2cast.com/95</link>
  <guid isPermaLink="false">0a077a9d-b1fc-41ae-8087-fb7e410f993e</guid>
  <pubDate>Fri, 14 Jan 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/0a077a9d-b1fc-41ae-8087-fb7e410f993e.mp3" length="22928639" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Petros Koutoupis about Air Tags and the generations of the web.</itunes:subtitle>
  <itunes:duration>27:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Petros Koutoupis about Air Tags and the generations of the web.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Petros Koutoupis about Air Tags and the generations of the web.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Byway FAQ – Customer Commons" rel="nofollow" href="https://customercommons.org/solutions/tools/byway/byway-faq/">Byway FAQ – Customer Commons</a> &mdash; The Intention Byway—or&nbsp;Byway for short—is a way to move messages of intent between customers and companies, buyers and sellers, demand and supply, anywhere in any value chain or among a collection of participants. Its goal is to maximize the quality and volume of economic signaling by everyone and to expand the range of economic activity that can take place in a networked marketplace.

</li><li><a title="Moxie Marlinspike &gt;&gt; Blog &gt;&gt; My first impressions of web3" rel="nofollow" href="https://moxie.org/2022/01/07/web3-first-impressions.html">Moxie Marlinspike &gt;&gt; Blog &gt;&gt; My first impressions of web3</a> &mdash; Despite considering myself a cryptographer, I have not found myself particularly drawn to “crypto.” I don’t think I’ve ever actually said the words “get off my lawn,” but I’m much more likely to click on Pepperidge Farm Remembers flavored memes about how “crypto” used to mean “cryptography” than I am the latest NFT drop.

Also – cards on the table here – I don’t share the same generational excitement for moving all aspects of life into an instrumented economy.

Even strictly on the technological level, though, I haven’t yet managed to become a believer. So given all of the recent attention into what is now being called web3, I decided to explore some of what has been happening in that space more thoroughly to see what I may be missing.</li><li><a title="Matt Mullenweg on Twitter: &quot;People seem to be redefining Web 2.0 as Facebook, etc, that own data, but Web 2.0 at the time was platforms like WordPress, Odeo, Six Apart, Flickr, Technorati, and https://t.co/vlhR5g6fkg that had open data and interoperated. https://t.co/PXuZBaLbP2 https://t.co/sJJT8kyaJG&quot; / Twitter" rel="nofollow" href="https://twitter.com/photomatt/status/1479998907123863554">Matt Mullenweg on Twitter: "People seem to be redefining Web 2.0 as Facebook, etc, that own data, but Web 2.0 at the time was platforms like WordPress, Odeo, Six Apart, Flickr, Technorati, and https://t.co/vlhR5g6fkg that had open data and interoperated. https://t.co/PXuZBaLbP2 https://t.co/sJJT8kyaJG" / Twitter</a></li><li><a title="What Is Web 2.0 - O&#39;Reilly Media" rel="nofollow" href="https://www.oreilly.com/pub/a/web2/archive/what-is-web-20.html">What Is Web 2.0 - O'Reilly Media</a> &mdash; The concept of "Web 2.0" began with a conference brainstorming session between O'Reilly and MediaLive International. Dale Dougherty, web pioneer and O'Reilly VP, noted that far from having "crashed", the web was more important than ever, with exciting new applications and sites popping up with surprising regularity. What's more, the companies that had survived the collapse seemed to have some things in common. Could it be that the dot-com collapse marked some kind of turning point for the web, such that a call to action such as "Web 2.0" might make sense? We agreed that it did, and so the Web 2.0 Conference was born.</li><li><a title="Apple AirTags being used to track cars and stalk victims, police warn" rel="nofollow" href="https://www.fox2detroit.com/news/apple-airtags-being-used-by-criminals-for-stalking-dearborn-police-say">Apple AirTags being used to track cars and stalk victims, police warn</a> &mdash; The Apple AirTag is a device created to help people keep track of their misplaced items. But the seemingly harmless tool is being used by some to track people and commit car thefts. As authorities investigate these incidents, the devices are raising privacy and security concerns.&nbsp;</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Petros Koutoupis about Air Tags and the generations of the web.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Byway FAQ – Customer Commons" rel="nofollow" href="https://customercommons.org/solutions/tools/byway/byway-faq/">Byway FAQ – Customer Commons</a> &mdash; The Intention Byway—or&nbsp;Byway for short—is a way to move messages of intent between customers and companies, buyers and sellers, demand and supply, anywhere in any value chain or among a collection of participants. Its goal is to maximize the quality and volume of economic signaling by everyone and to expand the range of economic activity that can take place in a networked marketplace.

</li><li><a title="Moxie Marlinspike &gt;&gt; Blog &gt;&gt; My first impressions of web3" rel="nofollow" href="https://moxie.org/2022/01/07/web3-first-impressions.html">Moxie Marlinspike &gt;&gt; Blog &gt;&gt; My first impressions of web3</a> &mdash; Despite considering myself a cryptographer, I have not found myself particularly drawn to “crypto.” I don’t think I’ve ever actually said the words “get off my lawn,” but I’m much more likely to click on Pepperidge Farm Remembers flavored memes about how “crypto” used to mean “cryptography” than I am the latest NFT drop.

Also – cards on the table here – I don’t share the same generational excitement for moving all aspects of life into an instrumented economy.

Even strictly on the technological level, though, I haven’t yet managed to become a believer. So given all of the recent attention into what is now being called web3, I decided to explore some of what has been happening in that space more thoroughly to see what I may be missing.</li><li><a title="Matt Mullenweg on Twitter: &quot;People seem to be redefining Web 2.0 as Facebook, etc, that own data, but Web 2.0 at the time was platforms like WordPress, Odeo, Six Apart, Flickr, Technorati, and https://t.co/vlhR5g6fkg that had open data and interoperated. https://t.co/PXuZBaLbP2 https://t.co/sJJT8kyaJG&quot; / Twitter" rel="nofollow" href="https://twitter.com/photomatt/status/1479998907123863554">Matt Mullenweg on Twitter: "People seem to be redefining Web 2.0 as Facebook, etc, that own data, but Web 2.0 at the time was platforms like WordPress, Odeo, Six Apart, Flickr, Technorati, and https://t.co/vlhR5g6fkg that had open data and interoperated. https://t.co/PXuZBaLbP2 https://t.co/sJJT8kyaJG" / Twitter</a></li><li><a title="What Is Web 2.0 - O&#39;Reilly Media" rel="nofollow" href="https://www.oreilly.com/pub/a/web2/archive/what-is-web-20.html">What Is Web 2.0 - O'Reilly Media</a> &mdash; The concept of "Web 2.0" began with a conference brainstorming session between O'Reilly and MediaLive International. Dale Dougherty, web pioneer and O'Reilly VP, noted that far from having "crashed", the web was more important than ever, with exciting new applications and sites popping up with surprising regularity. What's more, the companies that had survived the collapse seemed to have some things in common. Could it be that the dot-com collapse marked some kind of turning point for the web, such that a call to action such as "Web 2.0" might make sense? We agreed that it did, and so the Web 2.0 Conference was born.</li><li><a title="Apple AirTags being used to track cars and stalk victims, police warn" rel="nofollow" href="https://www.fox2detroit.com/news/apple-airtags-being-used-by-criminals-for-stalking-dearborn-police-say">Apple AirTags being used to track cars and stalk victims, police warn</a> &mdash; The Apple AirTag is a device created to help people keep track of their misplaced items. But the seemingly harmless tool is being used by some to track people and commit car thefts. As authorities investigate these incidents, the devices are raising privacy and security concerns.&nbsp;</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 93: Quad9 and DNS</title>
  <link>https://www.reality2cast.com/93</link>
  <guid isPermaLink="false">e7f8e7cc-c402-433a-a1d6-619c7395ce49</guid>
  <pubDate>Fri, 03 Dec 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/e7f8e7cc-c402-433a-a1d6-619c7395ce49.mp3" length="72684782" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</itunes:subtitle>
  <itunes:duration>55:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: John Todd and Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, DNS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: John Todd and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Quad9 | A public and free DNS service for a better security and privacy" rel="nofollow" href="https://www.quad9.net/">Quad9 | A public and free DNS service for a better security and privacy</a> &mdash; Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone.</li><li><a title="Pi-hole – Network-wide protection" rel="nofollow" href="https://pi-hole.net/">Pi-hole – Network-wide protection</a> &mdash; Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: John Todd and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Quad9 | A public and free DNS service for a better security and privacy" rel="nofollow" href="https://www.quad9.net/">Quad9 | A public and free DNS service for a better security and privacy</a> &mdash; Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone.</li><li><a title="Pi-hole – Network-wide protection" rel="nofollow" href="https://pi-hole.net/">Pi-hole – Network-wide protection</a> &mdash; Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 90: Can Facebook Be the Good Guy?</title>
  <link>https://www.reality2cast.com/90</link>
  <guid isPermaLink="false">77e631f8-f618-4083-a389-8d1023a4344b</guid>
  <pubDate>Fri, 29 Oct 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/77e631f8-f618-4083-a389-8d1023a4344b.mp3" length="103520917" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems.</itunes:subtitle>
  <itunes:duration>1:06:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Petros Koutoupis and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Petros Koutoupis and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Exclusive: Facebook whistleblower Frances Haugen warns company&#39;s encryption will aid espionage by hostile nations" rel="nofollow" href="https://www.telegraph.co.uk/news/2021/10/24/facebook-whistleblower-warns-dangerous-encryption-will-aid-espionage/">Exclusive: Facebook whistleblower Frances Haugen warns company's encryption will aid espionage by hostile nations</a> &mdash; A Facebook spokesman said: “The reason we believe in end-to-end encryption is precisely so that we can keep people safe, including from foreign interference and surveillance as well as hackers and criminals.</li><li><a title="Scripting News: Facebook is us" rel="nofollow" href="http://scripting.com/2021/10/05/135513.html?title=facebookIsUs#a135518">Scripting News: Facebook is us</a> &mdash; The bullshit about Facebook keeps coming. It's not a fucking autocracy, it's a carrier. You could say everything you say about FB about a city like NY.</li><li><a title="(15) Post | LinkedIn" rel="nofollow" href="https://www.linkedin.com/posts/zedwards_ive-got-a-big-twitter-thread-with-tons-of-activity-6857724891274342400-amVb/">(15) Post | LinkedIn</a> &mdash; I've got a big Twitter thread with tons of screenshots from the unredacted docs between Facebook and Google</li><li><a title="Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption – dropsafe" rel="nofollow" href="https://alecmuffett.com/article/15058">Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption – dropsafe</a> &mdash; Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption
In 2016 I quit the best job I ever had: the most impactful, the most challenging, and (yes) the best paid. I did so in part because of explicable burnout from shipping a radical product, but also and primarily because of a shift in Facebook’s company goals towards degrading user-experience for profit, and for experimentally building message-censorship infrastructure to offer-up as a gift and to show willing, for entry into the Chinese market.</li><li><a title="Eva on Twitter: &quot;It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?&quot; / Twitter" rel="nofollow" href="https://twitter.com/evacide/status/1452738461631344642?s=21">Eva on Twitter: "It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?" / Twitter</a> &mdash; It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?</li><li><a title="My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post” – dropsafe" rel="nofollow" href="https://alecmuffett.com/article/14994">My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post” – dropsafe</a> &mdash; My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post”</li><li><a title="Facebook CIA Project: The Onion News Network ONN - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=juQcZO_WnsI">Facebook CIA Project: The Onion News Network ONN - YouTube</a></li><li><a title="So...what now? - by Charlie Warzel - Galaxy Brain" rel="nofollow" href="https://warzel.substack.com/p/sowhat-now">So...what now? - by Charlie Warzel - Galaxy Brain</a> &mdash; There’s so much reporting out there from the consortium of news outlets on ‘The Facebook Papers’ that I don’t really know what to do or where to start. Over at Protocol they’ve collected a running list of stories published and I count 50 pieces (as of Monday evening), many of them thousands of words long. Apparently, (according to Casey Newton and Kara Swisher) there are like six week’s worth of stories like this coming.</li><li><a title="FTC Study Confirms ISPs Collect a Scary Amount of Your Personal Data - ExtremeTech" rel="nofollow" href="https://www.extremetech.com/internet/328503-ftc-study-confirms-isps-collect-a-scary-amount-of-your-personal-data">FTC Study Confirms ISPs Collect a Scary Amount of Your Personal Data - ExtremeTech</a> &mdash; Frustration with Big Tech is reaching a crescendo, and we could be headed for legislative efforts to reduce the influence of companies like Google, Amazon, and Facebook, but another technology heavyweight has managed to fly under the radar: your Internet Service Provider (ISP). A new Federal Trade Commission (FTC) report examines what ISPs are doing with your data, and it’s not good news. Even when they promise not to sell your information, it often ends up in the hands of advertisers and other third parties.&nbsp;</li><li><a title="The Facebook Papers Are a Big Fat Nothingburger - Reason.com" rel="nofollow" href="https://reason.com/2021/10/25/the-facebook-papers-mark-zuckerberg-frances-haugen-media/">The Facebook Papers Are a Big Fat Nothingburger - Reason.com</a> &mdash; More than a dozen mainstream media organizations published reports today on the so-called Facebook Papers, a trove of internal company documents obtained and released by former Facebook employee Frances Haugen. The headlines promised dramatic revelations and damning indictments.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers and Petros Koutoupis about Facebook’s metaverse focus and whistleblower problems.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Petros Koutoupis and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Exclusive: Facebook whistleblower Frances Haugen warns company&#39;s encryption will aid espionage by hostile nations" rel="nofollow" href="https://www.telegraph.co.uk/news/2021/10/24/facebook-whistleblower-warns-dangerous-encryption-will-aid-espionage/">Exclusive: Facebook whistleblower Frances Haugen warns company's encryption will aid espionage by hostile nations</a> &mdash; A Facebook spokesman said: “The reason we believe in end-to-end encryption is precisely so that we can keep people safe, including from foreign interference and surveillance as well as hackers and criminals.</li><li><a title="Scripting News: Facebook is us" rel="nofollow" href="http://scripting.com/2021/10/05/135513.html?title=facebookIsUs#a135518">Scripting News: Facebook is us</a> &mdash; The bullshit about Facebook keeps coming. It's not a fucking autocracy, it's a carrier. You could say everything you say about FB about a city like NY.</li><li><a title="(15) Post | LinkedIn" rel="nofollow" href="https://www.linkedin.com/posts/zedwards_ive-got-a-big-twitter-thread-with-tons-of-activity-6857724891274342400-amVb/">(15) Post | LinkedIn</a> &mdash; I've got a big Twitter thread with tons of screenshots from the unredacted docs between Facebook and Google</li><li><a title="Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption – dropsafe" rel="nofollow" href="https://alecmuffett.com/article/15058">Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption – dropsafe</a> &mdash; Before the “Whistleblowers” there were “Goodbye” posts: leaving #Facebook Engineering in 2016 because of #China, User Content, and #EndToEndEncryption
In 2016 I quit the best job I ever had: the most impactful, the most challenging, and (yes) the best paid. I did so in part because of explicable burnout from shipping a radical product, but also and primarily because of a shift in Facebook’s company goals towards degrading user-experience for profit, and for experimentally building message-censorship infrastructure to offer-up as a gift and to show willing, for entry into the Chinese market.</li><li><a title="Eva on Twitter: &quot;It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?&quot; / Twitter" rel="nofollow" href="https://twitter.com/evacide/status/1452738461631344642?s=21">Eva on Twitter: "It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?" / Twitter</a> &mdash; It is still a bad idea to idolize whistleblowers instead of focusing on the revelations the whistleblowers bring forward, but Frances Haugen says that her opinions on end-to-end encrypted messaging were misinterpreted and mischaracterized and e2e messaging is good, ok?</li><li><a title="My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post” – dropsafe" rel="nofollow" href="https://alecmuffett.com/article/14994">My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post” – dropsafe</a> &mdash; My interview with Steven Levy of Wired re: Frances Haugen leaking my Facebook Engineering “Goodbye Post”</li><li><a title="Facebook CIA Project: The Onion News Network ONN - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=juQcZO_WnsI">Facebook CIA Project: The Onion News Network ONN - YouTube</a></li><li><a title="So...what now? - by Charlie Warzel - Galaxy Brain" rel="nofollow" href="https://warzel.substack.com/p/sowhat-now">So...what now? - by Charlie Warzel - Galaxy Brain</a> &mdash; There’s so much reporting out there from the consortium of news outlets on ‘The Facebook Papers’ that I don’t really know what to do or where to start. Over at Protocol they’ve collected a running list of stories published and I count 50 pieces (as of Monday evening), many of them thousands of words long. Apparently, (according to Casey Newton and Kara Swisher) there are like six week’s worth of stories like this coming.</li><li><a title="FTC Study Confirms ISPs Collect a Scary Amount of Your Personal Data - ExtremeTech" rel="nofollow" href="https://www.extremetech.com/internet/328503-ftc-study-confirms-isps-collect-a-scary-amount-of-your-personal-data">FTC Study Confirms ISPs Collect a Scary Amount of Your Personal Data - ExtremeTech</a> &mdash; Frustration with Big Tech is reaching a crescendo, and we could be headed for legislative efforts to reduce the influence of companies like Google, Amazon, and Facebook, but another technology heavyweight has managed to fly under the radar: your Internet Service Provider (ISP). A new Federal Trade Commission (FTC) report examines what ISPs are doing with your data, and it’s not good news. Even when they promise not to sell your information, it often ends up in the hands of advertisers and other third parties.&nbsp;</li><li><a title="The Facebook Papers Are a Big Fat Nothingburger - Reason.com" rel="nofollow" href="https://reason.com/2021/10/25/the-facebook-papers-mark-zuckerberg-frances-haugen-media/">The Facebook Papers Are a Big Fat Nothingburger - Reason.com</a> &mdash; More than a dozen mainstream media organizations published reports today on the so-called Facebook Papers, a trove of internal company documents obtained and released by former Facebook employee Frances Haugen. The headlines promised dramatic revelations and damning indictments.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 86: Pedal-Assisted Privacy</title>
  <link>https://www.reality2cast.com/86</link>
  <guid isPermaLink="false">d8994992-719d-4dce-820d-f46cde1355ed</guid>
  <pubDate>Fri, 17 Sep 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/d8994992-719d-4dce-820d-f46cde1355ed.mp3" length="98912023" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Shawn Powers about their various health-related gadgets, including trackers, ebikes, VR workouts, etc., and the ways we incorporate them into our lives.
</itunes:subtitle>
  <itunes:duration>1:08:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Shawn Powers about their various health-related gadgets, including trackers, ebikes, VR workouts, etc., and the ways we incorporate them into our lives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, health</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers about their various health-related gadgets, including trackers, ebikes, VR workouts, etc., and the ways we incorporate them into our lives.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers about their various health-related gadgets, including trackers, ebikes, VR workouts, etc., and the ways we incorporate them into our lives.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 82: Apple’s Child Safety and the Screeching Voices of the Minority</title>
  <link>https://www.reality2cast.com/82</link>
  <guid isPermaLink="false">ce3b59f4-54e4-4610-9c95-d6d78a8951c7</guid>
  <pubDate>Fri, 13 Aug 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ce3b59f4-54e4-4610-9c95-d6d78a8951c7.mp3" length="81973275" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence.</itunes:subtitle>
  <itunes:duration>55:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, apple</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Apple&#39;s Plan to &quot;Think Different&quot; About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life">Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation</a> &mdash; Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its messaging system.</li><li><a title="Daring Fireball: Apple’s New ‘Child Safety’ Initiatives, and the Slippery Slope" rel="nofollow" href="https://daringfireball.net/2021/08/apple_child_safety_initiatives_slippery_slope">Daring Fireball: Apple’s New ‘Child Safety’ Initiatives, and the Slippery Slope</a> &mdash; My first advice is to read Apple’s own high-level description of the features, which ends with links to detailed technical documentation regarding the encryption and techniques Apple is employing in the implementations, and “technical assessments” from three leading researchers in cryptography and computer vision.</li><li><a title="Eva on Twitter: &quot;Apple distributed this internal memo this morning, dismissing their critics as &quot;the screeching voices of the minority.&quot; I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you. https://t.co/lLDfxEUIXL&quot; / Twitter" rel="nofollow" href="https://twitter.com/evacide/status/1423748333001080833?s=20">Eva on Twitter: "Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you. https://t.co/lLDfxEUIXL" / Twitter</a> &mdash; Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." 

I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.</li><li><a title="GitHub - nadimkobeissi/appleprivacyletter: An open letter against Apple&#39;s new privacy-invasive client-side content scanning." rel="nofollow" href="https://github.com/nadimkobeissi/appleprivacyletter">GitHub - nadimkobeissi/appleprivacyletter: An open letter against Apple's new privacy-invasive client-side content scanning.</a> &mdash; An open letter against Apple's new privacy-invasive client-side content scanning technology.

</li><li><a title="Transactional analysis - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Transactional_analysis">Transactional analysis - Wikipedia</a> &mdash; Transactional analysis (TA) is a psychoanalytic theory and method of therapy wherein social transactions are analyzed to determine the ego state of the communicator (whether parent-like, childlike, or adult-like) as a basis for understanding behavior.[1] In transactional analysis, the communicator is taught to alter the ego state as a way to solve emotional problems. The method deviates from Freudian psychoanalysis which focuses on increasing awareness of the contents of subconsciously held ideas. Eric Berne developed the concept and paradigm of transactional analysis in the late 1950s.[2]</li><li><a title="Reality 2.0 Episode 80: NSO Group&#39;s Pegasus, Stingrays, and Grindr" rel="nofollow" href="https://www.reality2cast.com/80">Reality 2.0 Episode 80: NSO Group's Pegasus, Stingrays, and Grindr</a> &mdash; Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</li><li><a title="The Encryption Debate in Australia: 2021 Update - Carnegie Endowment for International Peace" rel="nofollow" href="https://carnegieendowment.org/2021/03/31/encryption-debate-in-australia-2021-update-pub-84237">The Encryption Debate in Australia: 2021 Update - Carnegie Endowment for International Peace</a> &mdash; In 2018, the heads of Australia’s law enforcement and intelligence agencies were given broad powers by the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018,1 or TOLA Act, to gain access to encrypted communicat</li><li><a title="Internet of Snitches – Purism" rel="nofollow" href="https://puri.sm/posts/internet-of-snitches/">Internet of Snitches – Purism</a> &mdash; Imagine an Internet of Snitches, each scanning whatever data they have access to for evidence of crime. Beyond the OS itself, individual phone apps could start looking for contraband. Personal computers would follow their lead. Home network file servers could pore through photos, videos and file backups for CSAM and maybe even evidence of copyright infringement. Home routers could scan any unencrypted network traffic. Your voice assistant could use machine learning to decide when yelling in a household crosses the line into abuse. Your printer could analyze the documents and photos you send it.</li><li><a title="Reality 2.0 Episode 49: Parler, Ownership, and Open Source" rel="nofollow" href="https://www.reality2cast.com/49">Reality 2.0 Episode 49: Parler, Ownership, and Open Source</a> &mdash; Doc Searls, Katherine Druckman, Petros Koutoupis, and Kyle Rankin talk Parler and platform lock-in, the concept of data, software, and hardware ownership, and the open source social contract.</li><li><a title="Reality 2.0 - Blog - Reality 2.0 Newsletter - November 25, 2020: Owned." rel="nofollow" href="https://www.reality2cast.com/articles/reality-2-0-newsletter-november-25-2020-owned">Reality 2.0 - Blog - Reality 2.0 Newsletter - November 25, 2020: Owned.</a> &mdash; This week’s conversation was rooted in the concept of ownership, including hardware, software, and in the case of platform lock-in, even ownership of ideas. Over the course of nearly an hour, we questioned our ownership of our social media profiles, our photo storage accounts, our MacBooks, and our code.</li><li><a title="Apple Adds a Backdoor to iMessage and iCloud Storage - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2021/08/apple-adds-a-backdoor-to-imesssage-and-icloud-storage.html">Apple Adds a Backdoor to iMessage and iCloud Storage - Schneier on Security</a> &mdash; Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I have been following the details, and discussing it in several different email lists. I don’t have time right now to delve into the details, but wanted to post something.</li><li><a title="Apple Privacy Letter: An Open Letter Against Apple&#39;s Privacy-Invasive Content Scanning Technology" rel="nofollow" href="https://appleprivacyletter.com/">Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology</a> &mdash; An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
Security &amp; Privacy Experts, Cryptographers, Researchers, Professors, Legal Experts and Apple Consumers Decry Apple's Planned Move to Undermine User Privacy and End-to-End Encryption</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about Apple’s new plans to monitor personal devices, and what it means for privacy, ownership, and setting precedence.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Apple&#39;s Plan to &quot;Think Different&quot; About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation" rel="nofollow" href="https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life">Apple's Plan to "Think Different" About Encryption Opens a Backdoor to Your Private Life | Electronic Frontier Foundation</a> &mdash; Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time following the Crypto Wars, you know what this means: Apple is planning to build a backdoor into its data storage system and its messaging system.</li><li><a title="Daring Fireball: Apple’s New ‘Child Safety’ Initiatives, and the Slippery Slope" rel="nofollow" href="https://daringfireball.net/2021/08/apple_child_safety_initiatives_slippery_slope">Daring Fireball: Apple’s New ‘Child Safety’ Initiatives, and the Slippery Slope</a> &mdash; My first advice is to read Apple’s own high-level description of the features, which ends with links to detailed technical documentation regarding the encryption and techniques Apple is employing in the implementations, and “technical assessments” from three leading researchers in cryptography and computer vision.</li><li><a title="Eva on Twitter: &quot;Apple distributed this internal memo this morning, dismissing their critics as &quot;the screeching voices of the minority.&quot; I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you. https://t.co/lLDfxEUIXL&quot; / Twitter" rel="nofollow" href="https://twitter.com/evacide/status/1423748333001080833?s=20">Eva on Twitter: "Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you. https://t.co/lLDfxEUIXL" / Twitter</a> &mdash; Apple distributed this internal memo this morning, dismissing their critics as "the screeching voices of the minority." 

I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.</li><li><a title="GitHub - nadimkobeissi/appleprivacyletter: An open letter against Apple&#39;s new privacy-invasive client-side content scanning." rel="nofollow" href="https://github.com/nadimkobeissi/appleprivacyletter">GitHub - nadimkobeissi/appleprivacyletter: An open letter against Apple's new privacy-invasive client-side content scanning.</a> &mdash; An open letter against Apple's new privacy-invasive client-side content scanning technology.

</li><li><a title="Transactional analysis - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Transactional_analysis">Transactional analysis - Wikipedia</a> &mdash; Transactional analysis (TA) is a psychoanalytic theory and method of therapy wherein social transactions are analyzed to determine the ego state of the communicator (whether parent-like, childlike, or adult-like) as a basis for understanding behavior.[1] In transactional analysis, the communicator is taught to alter the ego state as a way to solve emotional problems. The method deviates from Freudian psychoanalysis which focuses on increasing awareness of the contents of subconsciously held ideas. Eric Berne developed the concept and paradigm of transactional analysis in the late 1950s.[2]</li><li><a title="Reality 2.0 Episode 80: NSO Group&#39;s Pegasus, Stingrays, and Grindr" rel="nofollow" href="https://www.reality2cast.com/80">Reality 2.0 Episode 80: NSO Group's Pegasus, Stingrays, and Grindr</a> &mdash; Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</li><li><a title="The Encryption Debate in Australia: 2021 Update - Carnegie Endowment for International Peace" rel="nofollow" href="https://carnegieendowment.org/2021/03/31/encryption-debate-in-australia-2021-update-pub-84237">The Encryption Debate in Australia: 2021 Update - Carnegie Endowment for International Peace</a> &mdash; In 2018, the heads of Australia’s law enforcement and intelligence agencies were given broad powers by the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018,1 or TOLA Act, to gain access to encrypted communicat</li><li><a title="Internet of Snitches – Purism" rel="nofollow" href="https://puri.sm/posts/internet-of-snitches/">Internet of Snitches – Purism</a> &mdash; Imagine an Internet of Snitches, each scanning whatever data they have access to for evidence of crime. Beyond the OS itself, individual phone apps could start looking for contraband. Personal computers would follow their lead. Home network file servers could pore through photos, videos and file backups for CSAM and maybe even evidence of copyright infringement. Home routers could scan any unencrypted network traffic. Your voice assistant could use machine learning to decide when yelling in a household crosses the line into abuse. Your printer could analyze the documents and photos you send it.</li><li><a title="Reality 2.0 Episode 49: Parler, Ownership, and Open Source" rel="nofollow" href="https://www.reality2cast.com/49">Reality 2.0 Episode 49: Parler, Ownership, and Open Source</a> &mdash; Doc Searls, Katherine Druckman, Petros Koutoupis, and Kyle Rankin talk Parler and platform lock-in, the concept of data, software, and hardware ownership, and the open source social contract.</li><li><a title="Reality 2.0 - Blog - Reality 2.0 Newsletter - November 25, 2020: Owned." rel="nofollow" href="https://www.reality2cast.com/articles/reality-2-0-newsletter-november-25-2020-owned">Reality 2.0 - Blog - Reality 2.0 Newsletter - November 25, 2020: Owned.</a> &mdash; This week’s conversation was rooted in the concept of ownership, including hardware, software, and in the case of platform lock-in, even ownership of ideas. Over the course of nearly an hour, we questioned our ownership of our social media profiles, our photo storage accounts, our MacBooks, and our code.</li><li><a title="Apple Adds a Backdoor to iMessage and iCloud Storage - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2021/08/apple-adds-a-backdoor-to-imesssage-and-icloud-storage.html">Apple Adds a Backdoor to iMessage and iCloud Storage - Schneier on Security</a> &mdash; Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I have been following the details, and discussing it in several different email lists. I don’t have time right now to delve into the details, but wanted to post something.</li><li><a title="Apple Privacy Letter: An Open Letter Against Apple&#39;s Privacy-Invasive Content Scanning Technology" rel="nofollow" href="https://appleprivacyletter.com/">Apple Privacy Letter: An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology</a> &mdash; An Open Letter Against Apple's Privacy-Invasive Content Scanning Technology
Security &amp; Privacy Experts, Cryptographers, Researchers, Professors, Legal Experts and Apple Consumers Decry Apple's Planned Move to Undermine User Privacy and End-to-End Encryption</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 80: NSO Group's Pegasus, Stingrays, and Grindr</title>
  <link>https://www.reality2cast.com/80</link>
  <guid isPermaLink="false">2700f9f7-17d2-474f-91a3-ed7bede78376</guid>
  <pubDate>Fri, 30 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/2700f9f7-17d2-474f-91a3-ed7bede78376.mp3" length="60409945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</itunes:subtitle>
  <itunes:duration>44:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, surveillance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Defending Against Spyware Like Pegasus – Purism" rel="nofollow" href="https://puri.sm/posts/defending-against-spyware-like-pegasus/">Defending Against Spyware Like Pegasus – Purism</a> &mdash; What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?</li><li><a title="Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/21/22587234/amnesty-international-nso-pegasus-spyware-detection-tool-ios-android-guide-windows-mac">Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge</a> &mdash; Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.</li><li><a title="Mobile Verification Toolkit" rel="nofollow" href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit</a> &mdash; Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.</li><li><a title="The FBI Is Locating Cars By Spying On Their WiFi" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2021/07/22/the-fbi-is-using-stingray-smartphone-surveillance-to-locate-cars-and-spy-on-their-wifi/?sh=218804e335c8">The FBI Is Locating Cars By Spying On Their WiFi</a> &mdash; The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.</li><li><a title="Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2021/07/catholic-priest-quits-after-anonymized-data-revealed-alleged-use-of-grindr/">Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica</a> &mdash; In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; Brave stops online surveillance, loads content faster, and uses 35% less battery.1</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Defending Against Spyware Like Pegasus – Purism" rel="nofollow" href="https://puri.sm/posts/defending-against-spyware-like-pegasus/">Defending Against Spyware Like Pegasus – Purism</a> &mdash; What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?</li><li><a title="Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/21/22587234/amnesty-international-nso-pegasus-spyware-detection-tool-ios-android-guide-windows-mac">Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge</a> &mdash; Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.</li><li><a title="Mobile Verification Toolkit" rel="nofollow" href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit</a> &mdash; Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.</li><li><a title="The FBI Is Locating Cars By Spying On Their WiFi" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2021/07/22/the-fbi-is-using-stingray-smartphone-surveillance-to-locate-cars-and-spy-on-their-wifi/?sh=218804e335c8">The FBI Is Locating Cars By Spying On Their WiFi</a> &mdash; The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.</li><li><a title="Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2021/07/catholic-priest-quits-after-anonymized-data-revealed-alleged-use-of-grindr/">Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica</a> &mdash; In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; Brave stops online surveillance, loads content faster, and uses 35% less battery.1</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 79: Your Identity - Twitter Verification, Facial Recognition, and More</title>
  <link>https://www.reality2cast.com/79</link>
  <guid isPermaLink="false">ed19afc1-668f-43a4-8de8-2228cd03bf07</guid>
  <pubDate>Fri, 23 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ed19afc1-668f-43a4-8de8-2228cd03bf07.mp3" length="74500720" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias.</itunes:subtitle>
  <itunes:duration>48:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, facial recognition, twitter, social media, youtube, identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED" rel="nofollow" href="https://www.wired.com/story/opinion-im-not-a-reporter-but-im-verified-as-one-on-twitter/">I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED</a> &mdash; I NEVER CALLED myself a journalist until Twitter made me. I’m an attorney, activist, and faculty member, but it was only by using the “journalist” label that I was able to get one of the most coveted assets in social media, the blue “verified” checkmark. My months-long effort to get verified revealed a system that is stacked against grassroots activists, particularly BIPOC communities.</li><li><a title="Twitter verification requirements - how to get the blue check" rel="nofollow" href="https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts">Twitter verification requirements - how to get the blue check</a> &mdash; 
The blue Verified badge&nbsp; on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic,&nbsp;notable, and active.</li><li><a title="Goodbye, Fleets" rel="nofollow" href="https://blog.twitter.com/en_us/topics/product/2021/goodbye-fleets">Goodbye, Fleets</a> &mdash; We built Fleets as a lower-pressure, ephemeral way for people to share their fleeting thoughts. We hoped Fleets would help more people feel comfortable joining the conversation on Twitter. But, in the time since we introduced Fleets to everyone, we haven’t seen an increase in the number of new people joining the conversation with Fleets like we hoped. Because of this, on August 3, Fleets will no longer be available on Twitter.

</li><li><a title="Black teen barred from skating rink by inaccurate facial recognition - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/15/22578801/black-teen-skating-rink-inaccurate-facial-recognition">Black teen barred from skating rink by inaccurate facial recognition - The Verge</a> &mdash; A facial recognition algorithm used by a local roller skating rink in Detroit wouldn’t let teen Lamya Robinson onto the premises, and accused her of previously getting into a fight at the establishment.</li><li><a title="Algorithmic bias - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Algorithmic_bias">Algorithmic bias - Wikipedia</a> &mdash; Algorithmic bias describes systematic and repeatable errors in a computer system that create unfair outcomes, such as privileging one arbitrary group of users over others. Bias can emerge due to many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. Algorithmic bias is found across platforms, including but not limited to search engine results and social media platforms, and can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the 2018 European Union's General Data Protection Regulation. More comprehensive regulation is needed as emerging technologies become increasingly advanced and opaque.</li><li><a title="Face-Detection Cameras: Glitches Spur Charges of Racism - TIME" rel="nofollow" href="http://content.time.com/time/business/article/0,8599,1954643,00.html">Face-Detection Cameras: Glitches Spur Charges of Racism - TIME</a> &mdash; When Joz Wang and her brother bought their mom a Nikon Coolpix S630 digital camera for Mother's Day last year, they discovered what seemed to be a malfunction. Every time they took a portrait of each other smiling, a message flashed across the screen asking, "Did someone blink?" No one had. "I thought the camera was broken!" Wang, 33, recalls. But when her brother posed with his eyes open so wide that he looked "bug-eyed," the messages stopped.</li><li><a title="Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi" rel="nofollow" href="https://taibbi.substack.com/p/meet-the-censored-matt-orfalea">Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi</a> &mdash; Yes, the government is helping crack down on text messages and Facebook posts, but not to worry. At least your private thoughts are safe, right? Not so fast, found filmmaker Matt Orfalea</li><li><a title="Texas’ social media censorship bill pushes unconstitutional limits on free speech" rel="nofollow" href="https://www.dallasnews.com/opinion/commentary/2021/07/11/texas-social-media-censorship-bill-pushes-unconstitutional-limits-on-free-speech/">Texas’ social media censorship bill pushes unconstitutional limits on free speech</a> &mdash; Amid ongoing allegations that social media platforms are censoring conservatives, regulating Big Tech has become one of the hottest issues across the country. In Texas, Gov. Greg Abbott has called a special legislative session in part to debate and pass content moderation legislation.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman, Doc Searls and Shawn Powers chat about Twitter verification, facial recognition, YouTube moderation, and algorithmic bias.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED" rel="nofollow" href="https://www.wired.com/story/opinion-im-not-a-reporter-but-im-verified-as-one-on-twitter/">I’m Not a Reporter. But I’m Verified as One on Twitter | WIRED</a> &mdash; I NEVER CALLED myself a journalist until Twitter made me. I’m an attorney, activist, and faculty member, but it was only by using the “journalist” label that I was able to get one of the most coveted assets in social media, the blue “verified” checkmark. My months-long effort to get verified revealed a system that is stacked against grassroots activists, particularly BIPOC communities.</li><li><a title="Twitter verification requirements - how to get the blue check" rel="nofollow" href="https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts">Twitter verification requirements - how to get the blue check</a> &mdash; 
The blue Verified badge&nbsp; on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your account must be authentic,&nbsp;notable, and active.</li><li><a title="Goodbye, Fleets" rel="nofollow" href="https://blog.twitter.com/en_us/topics/product/2021/goodbye-fleets">Goodbye, Fleets</a> &mdash; We built Fleets as a lower-pressure, ephemeral way for people to share their fleeting thoughts. We hoped Fleets would help more people feel comfortable joining the conversation on Twitter. But, in the time since we introduced Fleets to everyone, we haven’t seen an increase in the number of new people joining the conversation with Fleets like we hoped. Because of this, on August 3, Fleets will no longer be available on Twitter.

</li><li><a title="Black teen barred from skating rink by inaccurate facial recognition - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/15/22578801/black-teen-skating-rink-inaccurate-facial-recognition">Black teen barred from skating rink by inaccurate facial recognition - The Verge</a> &mdash; A facial recognition algorithm used by a local roller skating rink in Detroit wouldn’t let teen Lamya Robinson onto the premises, and accused her of previously getting into a fight at the establishment.</li><li><a title="Algorithmic bias - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Algorithmic_bias">Algorithmic bias - Wikipedia</a> &mdash; Algorithmic bias describes systematic and repeatable errors in a computer system that create unfair outcomes, such as privileging one arbitrary group of users over others. Bias can emerge due to many factors, including but not limited to the design of the algorithm or the unintended or unanticipated use or decisions relating to the way data is coded, collected, selected or used to train the algorithm. Algorithmic bias is found across platforms, including but not limited to search engine results and social media platforms, and can have impacts ranging from inadvertent privacy violations to reinforcing social biases of race, gender, sexuality, and ethnicity. The study of algorithmic bias is most concerned with algorithms that reflect "systematic and unfair" discrimination. This bias has only recently been addressed in legal frameworks, such as the 2018 European Union's General Data Protection Regulation. More comprehensive regulation is needed as emerging technologies become increasingly advanced and opaque.</li><li><a title="Face-Detection Cameras: Glitches Spur Charges of Racism - TIME" rel="nofollow" href="http://content.time.com/time/business/article/0,8599,1954643,00.html">Face-Detection Cameras: Glitches Spur Charges of Racism - TIME</a> &mdash; When Joz Wang and her brother bought their mom a Nikon Coolpix S630 digital camera for Mother's Day last year, they discovered what seemed to be a malfunction. Every time they took a portrait of each other smiling, a message flashed across the screen asking, "Did someone blink?" No one had. "I thought the camera was broken!" Wang, 33, recalls. But when her brother posed with his eyes open so wide that he looked "bug-eyed," the messages stopped.</li><li><a title="Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi" rel="nofollow" href="https://taibbi.substack.com/p/meet-the-censored-matt-orfalea">Meet the Censored: Matt Orfalea - by Matt Taibbi - TK News by Matt Taibbi</a> &mdash; Yes, the government is helping crack down on text messages and Facebook posts, but not to worry. At least your private thoughts are safe, right? Not so fast, found filmmaker Matt Orfalea</li><li><a title="Texas’ social media censorship bill pushes unconstitutional limits on free speech" rel="nofollow" href="https://www.dallasnews.com/opinion/commentary/2021/07/11/texas-social-media-censorship-bill-pushes-unconstitutional-limits-on-free-speech/">Texas’ social media censorship bill pushes unconstitutional limits on free speech</a> &mdash; Amid ongoing allegations that social media platforms are censoring conservatives, regulating Big Tech has become one of the hottest issues across the country. In Texas, Gov. Greg Abbott has called a special legislative session in part to debate and pass content moderation legislation.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 78: Human ID for Single Sign-On</title>
  <link>https://www.reality2cast.com/78</link>
  <guid isPermaLink="false">9a2cc708-d89f-42c7-8597-3733fcb3ae57</guid>
  <pubDate>Fri, 16 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9a2cc708-d89f-42c7-8597-3733fcb3ae57.mp3" length="73877128" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</itunes:subtitle>
  <itunes:duration>50:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Bastian Purrer and Namik Muduroglu.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Bastian Purrer and Namik Muduroglu.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="humanID | One-Click Anonymous Login" rel="nofollow" href="https://human-id.org/">humanID | One-Click Anonymous Login</a> &mdash; humanID is an anonymous, bot-resistant authentication for safer online communities.

Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Bastian Purrer and Namik Muduroglu about Human ID, their open source anonymous single sign-on solution.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Bastian Purrer and Namik Muduroglu.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="humanID | One-Click Anonymous Login" rel="nofollow" href="https://human-id.org/">humanID | One-Click Anonymous Login</a> &mdash; humanID is an anonymous, bot-resistant authentication for safer online communities.

Non-profit and open source, the project was started in 2018 by the Foundation for New humanID. With the help of Mozilla and Harvard, we’re on a mission to #FixTheInternet.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 77: Musings on Privacy, Remote Work, Health, and More</title>
  <link>https://www.reality2cast.com/77</link>
  <guid isPermaLink="false">46e29dd2-66c2-47a4-8e65-15e5783f1f78</guid>
  <pubDate>Fri, 09 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/46e29dd2-66c2-47a4-8e65-15e5783f1f78.mp3" length="62716097" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Shawn Powers about everything from healthcare to bad weather. Join us for a chat about everything.
</itunes:subtitle>
  <itunes:duration>1:08:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Shawn Powers about everything from healthcare to bad weather. Join us for a chat about everything.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, remote work</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers about everything from healthcare to bad weather. Join us for a chat about everything.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Apple shouldn&#39;t use privacy &amp; security to stave off competition, EU antitrust head warns | AppleInsider" rel="nofollow" href="https://appleinsider.com/articles/21/07/02/eu-antitrust-head-warns-against-apple-using-privacy-security-to-stave-off-competition">Apple shouldn't use privacy &amp; security to stave off competition, EU antitrust head warns | AppleInsider</a> &mdash; Responding to comments made by Apple CEO Tim Cook in June, European Union competition chief Margrethe Vestager said that Apple shouldn't use privacy and security concerns to stifle competition on the App Store.</li><li><a title="Why Google Can&#39;t Bring Itself to Make the Internet Respect Your Privacy | Inc.com" rel="nofollow" href="https://www.inc.com/jason-aten/why-google-cant-bring-itself-to-make-internet-respect-your-privacy.html">Why Google Can't Bring Itself to Make the Internet Respect Your Privacy | Inc.com</a> &mdash; The search giant has delayed the rollout of FLoC, its controversial replacement for third-party cookies, until 2023. 
</li><li><a title="Real Time Lightning Map :: LightningMaps.org" rel="nofollow" href="https://www.lightningmaps.org/#m=oss;t=3;s=0;o=0;b=;ts=0;y=34.6694;x=-85.7812;z=5;d=2;dl=2;dc=0;">Real Time Lightning Map :: LightningMaps.org</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers about everything from healthcare to bad weather. Join us for a chat about everything.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Apple shouldn&#39;t use privacy &amp; security to stave off competition, EU antitrust head warns | AppleInsider" rel="nofollow" href="https://appleinsider.com/articles/21/07/02/eu-antitrust-head-warns-against-apple-using-privacy-security-to-stave-off-competition">Apple shouldn't use privacy &amp; security to stave off competition, EU antitrust head warns | AppleInsider</a> &mdash; Responding to comments made by Apple CEO Tim Cook in June, European Union competition chief Margrethe Vestager said that Apple shouldn't use privacy and security concerns to stifle competition on the App Store.</li><li><a title="Why Google Can&#39;t Bring Itself to Make the Internet Respect Your Privacy | Inc.com" rel="nofollow" href="https://www.inc.com/jason-aten/why-google-cant-bring-itself-to-make-internet-respect-your-privacy.html">Why Google Can't Bring Itself to Make the Internet Respect Your Privacy | Inc.com</a> &mdash; The search giant has delayed the rollout of FLoC, its controversial replacement for third-party cookies, until 2023. 
</li><li><a title="Real Time Lightning Map :: LightningMaps.org" rel="nofollow" href="https://www.lightningmaps.org/#m=oss;t=3;s=0;o=0;b=;ts=0;y=34.6694;x=-85.7812;z=5;d=2;dl=2;dc=0;">Real Time Lightning Map :: LightningMaps.org</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 75: Let's Talk About FLoC Blocking</title>
  <link>https://www.reality2cast.com/75</link>
  <guid isPermaLink="false">6b0961d9-2bff-405d-b771-817e7a14b8b9</guid>
  <pubDate>Fri, 25 Jun 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/6b0961d9-2bff-405d-b771-817e7a14b8b9.mp3" length="92260786" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Drupal Association Community Liaison, Rachel Lawson, and Drupal developer, Tony Savorelli, about Privacy in Drupal and beyond, and protecting ourselves and others on the web.</itunes:subtitle>
  <itunes:duration>1:02:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Drupal Association Community Liaison, Rachel Lawson, and Drupal developer, Tony Savorelli, about Privacy in Drupal and beyond, and protecting ourselves and others on the web.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Rachel Lawson and Tony Savorelli.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Drupal Association Community Liaison, Rachel Lawson, and Drupal developer, Tony Savorelli, about Privacy in Drupal and beyond, and protecting ourselves and others on the web.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Rachel Lawson and Tony Savorelli.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org" rel="nofollow" href="https://www.drupal.org/project/drupal/issues/3209628">Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org</a> &mdash; Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis.

Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users.

See a very informative post by Plausible.

Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.</li><li><a title="Amazon is blocking Google&#39;s FLoC — and that could seriously weaken the system" rel="nofollow" href="https://digiday.com/media/amazon-is-blocking-googles-floc-and-that-could-seriously-weaken-the-fledgling-tracking-system/">Amazon is blocking Google's FLoC — and that could seriously weaken the system</a> &mdash; Amazon is blocking Google’s controversial cookieless tracking and targeting method.

</li><li><a title="Privacy analysis of FLoC" rel="nofollow" href="https://blog.mozilla.org/en/mozilla/privacy-analysis-of-floc/">Privacy analysis of FLoC</a> &mdash; In the current web, trackers (and hence advertisers) associate a cookie with each user. Whenever a user visits a website that has an embedded tracker, the tracker gets the cookie and can thus build up a list of the sites that a user visits. Advertisers can use the information gained from tracking browsing history to target ads that are potentially relevant to a given user’s interests. The obvious problem here is that it involves advertisers learning everywhere you go.&nbsp;</li><li><a title="Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications" rel="nofollow" href="https://ssd.eff.org/">Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications</a> &mdash; We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.</li><li><a title="University of Pennsylvania ScholarlyCommons" rel="nofollow" href="https://repository.upenn.edu/cgi/viewcontent.cgi?article=1554&amp;hx0026;context=asc_papers">University of Pennsylvania ScholarlyCommons</a> &mdash; The Tradeoff Fallacy - How Marketers Are
Misrepresenting American Consumers and
Opening Them up to Exploitation</li><li><a title="Reality 2.0 - Blog - Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple" rel="nofollow" href="https://www.reality2cast.com/articles/reality-2-0-newsletter-june-4-2021-more-tracking-tech-and-apple">Reality 2.0 - Blog - Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple</a> &mdash; After a lengthy discussion in Drupal’s core issue queue by some of Katherine’s favorite people, the upcoming release of Drupal 9.2 will officially block Google’s Federated Learning of Cohorts (FLoC) by default! Similarly, the WordPress and Joomla communities are taking similar measures. With these platforms representing a huge chunk of websites, this must be quite a blow to Google, enough so that a member of Google Chrome’s developer relations team weighed in on the Drupal issue himself. I hope this news inspires you to run off and build a Drupal site, so I’ll just leave this documentation link here just in case.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Drupal Association Community Liaison, Rachel Lawson, and Drupal developer, Tony Savorelli, about Privacy in Drupal and beyond, and protecting ourselves and others on the web.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Rachel Lawson and Tony Savorelli.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org" rel="nofollow" href="https://www.drupal.org/project/drupal/issues/3209628">Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org</a> &mdash; Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis.

Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users.

See a very informative post by Plausible.

Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.</li><li><a title="Amazon is blocking Google&#39;s FLoC — and that could seriously weaken the system" rel="nofollow" href="https://digiday.com/media/amazon-is-blocking-googles-floc-and-that-could-seriously-weaken-the-fledgling-tracking-system/">Amazon is blocking Google's FLoC — and that could seriously weaken the system</a> &mdash; Amazon is blocking Google’s controversial cookieless tracking and targeting method.

</li><li><a title="Privacy analysis of FLoC" rel="nofollow" href="https://blog.mozilla.org/en/mozilla/privacy-analysis-of-floc/">Privacy analysis of FLoC</a> &mdash; In the current web, trackers (and hence advertisers) associate a cookie with each user. Whenever a user visits a website that has an embedded tracker, the tracker gets the cookie and can thus build up a list of the sites that a user visits. Advertisers can use the information gained from tracking browsing history to target ads that are potentially relevant to a given user’s interests. The obvious problem here is that it involves advertisers learning everywhere you go.&nbsp;</li><li><a title="Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications" rel="nofollow" href="https://ssd.eff.org/">Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications</a> &mdash; We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. This is Surveillance Self-Defense : our expert guide to protecting you and your friends from online spying.</li><li><a title="University of Pennsylvania ScholarlyCommons" rel="nofollow" href="https://repository.upenn.edu/cgi/viewcontent.cgi?article=1554&amp;hx0026;context=asc_papers">University of Pennsylvania ScholarlyCommons</a> &mdash; The Tradeoff Fallacy - How Marketers Are
Misrepresenting American Consumers and
Opening Them up to Exploitation</li><li><a title="Reality 2.0 - Blog - Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple" rel="nofollow" href="https://www.reality2cast.com/articles/reality-2-0-newsletter-june-4-2021-more-tracking-tech-and-apple">Reality 2.0 - Blog - Reality 2.0 Newsletter - June 4, 2021: More Tracking Tech and Apple</a> &mdash; After a lengthy discussion in Drupal’s core issue queue by some of Katherine’s favorite people, the upcoming release of Drupal 9.2 will officially block Google’s Federated Learning of Cohorts (FLoC) by default! Similarly, the WordPress and Joomla communities are taking similar measures. With these platforms representing a huge chunk of websites, this must be quite a blow to Google, enough so that a member of Google Chrome’s developer relations team weighed in on the Drupal issue himself. I hope this news inspires you to run off and build a Drupal site, so I’ll just leave this documentation link here just in case.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 74: DeleteMe, Privacy Tools, and Protecting Yourself</title>
  <link>https://www.reality2cast.com/74</link>
  <guid isPermaLink="false">51da9ac1-e3ec-4883-97b3-94a751db594b</guid>
  <pubDate>Sat, 19 Jun 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/51da9ac1-e3ec-4883-97b3-94a751db594b.mp3" length="61060678" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Abine’s Rob Shavell about DeleteMe and other privacy tools, as well as emerging issues like vaccine tracking, AI, and facial recognition.
</itunes:subtitle>
  <itunes:duration>1:07:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Abine’s Rob Shavell about DeleteMe and other privacy tools, as well as emerging issues like vaccine tracking, AI, and facial recognition.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Rob Shavell.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Abine’s Rob Shavell about DeleteMe and other privacy tools, as well as emerging issues like vaccine tracking, AI, and facial recognition.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Rob Shavell.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Remove Personal Info from Google - DeleteMe" rel="nofollow" href="https://joindeleteme.com/">Remove Personal Info from Google - DeleteMe</a></li><li><a title="Redact | Mass Delete your Social Media" rel="nofollow" href="https://redact.dev/">Redact | Mass Delete your Social Media</a> &mdash; The only platform that allows you to automatically clean up your old posts from services like Twitter, Reddit, Facebook, Discord and more all in one place</li><li><a title="DuckDuckGo — Privacy, simplified." rel="nofollow" href="https://duckduckgo.com/">DuckDuckGo — Privacy, simplified.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Abine’s Rob Shavell about DeleteMe and other privacy tools, as well as emerging issues like vaccine tracking, AI, and facial recognition.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Rob Shavell.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Remove Personal Info from Google - DeleteMe" rel="nofollow" href="https://joindeleteme.com/">Remove Personal Info from Google - DeleteMe</a></li><li><a title="Redact | Mass Delete your Social Media" rel="nofollow" href="https://redact.dev/">Redact | Mass Delete your Social Media</a> &mdash; The only platform that allows you to automatically clean up your old posts from services like Twitter, Reddit, Facebook, Discord and more all in one place</li><li><a title="DuckDuckGo — Privacy, simplified." rel="nofollow" href="https://duckduckgo.com/">DuckDuckGo — Privacy, simplified.</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 72: To Opt-In or Not To Opt-In, That is the Question</title>
  <link>https://www.reality2cast.com/72</link>
  <guid isPermaLink="false">d5192ce0-bfc5-4305-b9a7-483943cecf07</guid>
  <pubDate>Fri, 04 Jun 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/d5192ce0-bfc5-4305-b9a7-483943cecf07.mp3" length="27986223" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk about Amazon’s new Sidewalk feature, more about Apple’s opt-out options, and other privacy issues.</itunes:subtitle>
  <itunes:duration>33:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk about Amazon’s new Sidewalk feature, more about Apple’s opt-out options, and other privacy issues.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, apple</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Amazon’s new Sidewalk feature, more about Apple’s opt-out options, and other privacy issues.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Doc Searls Weblog · Apple vs (or plus) Adtech" rel="nofollow" href="http://blogs.harvard.edu/doc/2021/05/29/apple-vs-or-plus-adtech/">Doc Searls Weblog · Apple vs (or plus) Adtech</a> &mdash; If you haven’t seen it yet, watch Apple’s Privacy on iPhone | tracked ad. In it a guy named Felix (that’s him, above) goes from a coffee shop to a waiting room somewhere, accumulating a vast herd of hangers-on along the way. The herd represents trackers in his phone, all crowding his personal space while gathering private information about him.</li><li><a title="Apple’s New Privacy Ad Is Absurd. That’s Why It’s So Brilliant" rel="nofollow" href="https://www.msn.com/en-us/money/smallbusiness/apple-e2-80-99s-new-privacy-ad-is-absurd-that-e2-80-99s-why-it-e2-80-99s-so-brilliant/ar-AAKlQRB">Apple’s New Privacy Ad Is Absurd. That’s Why It’s So Brilliant</a> &mdash; The iPhone maker is taking a much more aggressive stand on whether users should allow tracking. At all.</li><li><a title="How to Find the Mobile Ad ID on Apple and Android Devices?" rel="nofollow" href="https://revealmobile.com/how-to-find-your-mobile-ad-id/">How to Find the Mobile Ad ID on Apple and Android Devices?</a> &mdash; The mobile advertising ID, also known as a mobile ad ID or a MAID, is a sequence of alphanumeric characters assigned to a mobile phone or tablet by the device’s operating system, either iOS or Android.</li><li><a title="Amazon devices will soon automatically share your Internet with neighbors | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2021/05/amazon-devices-will-soon-automatically-share-your-internet-with-neighbors/">Amazon devices will soon automatically share your Internet with neighbors | Ars Technica</a> &mdash; If you use Alexa, Echo, or many other Amazon devices, you have only 10 days until you're opted in to an experiment that leaves your personal privacy and security hanging in the balance.

</li><li><a title="How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED" rel="nofollow" href="https://www.wired.com/story/how-amazon-sidewalk-works/">How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED</a> &mdash; It promises connected convenience. But the ecommerce giant doesn't exactly have an inspiring record when it comes to privacy.
</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Amazon’s new Sidewalk feature, more about Apple’s opt-out options, and other privacy issues.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Doc Searls Weblog · Apple vs (or plus) Adtech" rel="nofollow" href="http://blogs.harvard.edu/doc/2021/05/29/apple-vs-or-plus-adtech/">Doc Searls Weblog · Apple vs (or plus) Adtech</a> &mdash; If you haven’t seen it yet, watch Apple’s Privacy on iPhone | tracked ad. In it a guy named Felix (that’s him, above) goes from a coffee shop to a waiting room somewhere, accumulating a vast herd of hangers-on along the way. The herd represents trackers in his phone, all crowding his personal space while gathering private information about him.</li><li><a title="Apple’s New Privacy Ad Is Absurd. That’s Why It’s So Brilliant" rel="nofollow" href="https://www.msn.com/en-us/money/smallbusiness/apple-e2-80-99s-new-privacy-ad-is-absurd-that-e2-80-99s-why-it-e2-80-99s-so-brilliant/ar-AAKlQRB">Apple’s New Privacy Ad Is Absurd. That’s Why It’s So Brilliant</a> &mdash; The iPhone maker is taking a much more aggressive stand on whether users should allow tracking. At all.</li><li><a title="How to Find the Mobile Ad ID on Apple and Android Devices?" rel="nofollow" href="https://revealmobile.com/how-to-find-your-mobile-ad-id/">How to Find the Mobile Ad ID on Apple and Android Devices?</a> &mdash; The mobile advertising ID, also known as a mobile ad ID or a MAID, is a sequence of alphanumeric characters assigned to a mobile phone or tablet by the device’s operating system, either iOS or Android.</li><li><a title="Amazon devices will soon automatically share your Internet with neighbors | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2021/05/amazon-devices-will-soon-automatically-share-your-internet-with-neighbors/">Amazon devices will soon automatically share your Internet with neighbors | Ars Technica</a> &mdash; If you use Alexa, Echo, or many other Amazon devices, you have only 10 days until you're opted in to an experiment that leaves your personal privacy and security hanging in the balance.

</li><li><a title="How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED" rel="nofollow" href="https://www.wired.com/story/how-amazon-sidewalk-works/">How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED</a> &mdash; It promises connected convenience. But the ecommerce giant doesn't exactly have an inspiring record when it comes to privacy.
</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 71: Tons of Tracking Tech</title>
  <link>https://www.reality2cast.com/71</link>
  <guid isPermaLink="false">fb770dcc-83f0-42a3-967b-64d61b24f836</guid>
  <pubDate>Fri, 28 May 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/fb770dcc-83f0-42a3-967b-64d61b24f836.mp3" length="23318872" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk about Apple’s IDFA, Ford In-Car ads, and more about AirTags.</itunes:subtitle>
  <itunes:duration>27:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk about Apple’s IDFA, Ford In-Car ads, and more about AirTags.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Apple’s IDFA, Ford In-Car ads, and more about AirTags.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Ford Patented In-Car Ads Because We Live In Hell Now" rel="nofollow" href="https://jalopnik.com/ford-patented-in-car-ads-because-we-live-in-hell-now-1846902212">Ford Patented In-Car Ads Because We Live In Hell Now</a> &mdash; I’m all for innovation in the automotive sector, but there are some technologies I simply cannot abide by, and Ford’s newly-patented billboard detector that can read ads and display them inside your car is exactly one of those technologies.</li><li><a title="Apple forcing developers to ditch unique device IDs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2013/03/apple-forcing-developers-to-ditch-unique-device-ids/">Apple forcing developers to ditch unique device IDs | Ars Technica</a> &mdash; 2013 article about the origins of Apple's IDFA.</li><li><a title="Proposal: Treat FLoC like a security concern – Make WordPress Core" rel="nofollow" href="https://make.wordpress.org/core/2021/04/18/proposal-treat-floc-as-a-security-concern/">Proposal: Treat FLoC like a security concern – Make WordPress Core</a> &mdash; Why is this bad? As the Electronic Frontier Foundation explains in their post “Google’s FLoC is a terrible idea“, placing people in groups based on their browsing habits is likely to facilitate employment, housing and other types of discrimination, as well as predatory targeting of unsophisticated consumers.

This is in addition to the privacy concerns of tracking people and sharing their data, seemingly without informed consent – and making it more difficult for legislators and regulators to protect people.</li><li><a title="Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org" rel="nofollow" href="https://www.drupal.org/project/drupal/issues/3209628">Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org</a> &mdash; Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis.

Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users.

See a very informative post by Plausible.

Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.</li><li><a title="Joomla! and FLoC" rel="nofollow" href="https://developer.joomla.org/news/855-joomla-and-floc.html?s=09">Joomla! and FLoC</a> &mdash; Federated Learning of Cohorts (FLoC) proposes a new way for businesses to reach people with relevant content and ads. We explore what this could mean and why we are giving you the choice as to whether to use it or not.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Apple’s IDFA, Ford In-Car ads, and more about AirTags.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Ford Patented In-Car Ads Because We Live In Hell Now" rel="nofollow" href="https://jalopnik.com/ford-patented-in-car-ads-because-we-live-in-hell-now-1846902212">Ford Patented In-Car Ads Because We Live In Hell Now</a> &mdash; I’m all for innovation in the automotive sector, but there are some technologies I simply cannot abide by, and Ford’s newly-patented billboard detector that can read ads and display them inside your car is exactly one of those technologies.</li><li><a title="Apple forcing developers to ditch unique device IDs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2013/03/apple-forcing-developers-to-ditch-unique-device-ids/">Apple forcing developers to ditch unique device IDs | Ars Technica</a> &mdash; 2013 article about the origins of Apple's IDFA.</li><li><a title="Proposal: Treat FLoC like a security concern – Make WordPress Core" rel="nofollow" href="https://make.wordpress.org/core/2021/04/18/proposal-treat-floc-as-a-security-concern/">Proposal: Treat FLoC like a security concern – Make WordPress Core</a> &mdash; Why is this bad? As the Electronic Frontier Foundation explains in their post “Google’s FLoC is a terrible idea“, placing people in groups based on their browsing habits is likely to facilitate employment, housing and other types of discrimination, as well as predatory targeting of unsophisticated consumers.

This is in addition to the privacy concerns of tracking people and sharing their data, seemingly without informed consent – and making it more difficult for legislators and regulators to protect people.</li><li><a title="Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org" rel="nofollow" href="https://www.drupal.org/project/drupal/issues/3209628">Add Permissions-Policy header to block Google FLoC [#3209628] | Drupal.org</a> &mdash; Google is introducing what it calls Federated Learning of Cohorts, which is a way to gather user data without cookies, regardless of whether a website is loading any Google-related trackers. This is enabled starting in Chrome 89, and only in select countries on a trial basis.

Although other major browser vendors are likely against this technology and will presumably not be implementing it, given Chrome’s market share this will become a concerning issue, because it largely remove users’ ability to easily opt out of being tracked—particularly true in the case of less-savvy users.

See a very informative post by Plausible.

Since no one can reasonably expect users to just stop using Chrome, it will be up to responsible developers to block FLoC at the source.</li><li><a title="Joomla! and FLoC" rel="nofollow" href="https://developer.joomla.org/news/855-joomla-and-floc.html?s=09">Joomla! and FLoC</a> &mdash; Federated Learning of Cohorts (FLoC) proposes a new way for businesses to reach people with relevant content and ads. We explore what this could mean and why we are giving you the choice as to whether to use it or not.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 70: Apple AirTags and Privacy</title>
  <link>https://www.reality2cast.com/70</link>
  <guid isPermaLink="false">a8703c90-7ea7-4375-8799-99b520e0e3cb</guid>
  <pubDate>Fri, 14 May 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/a8703c90-7ea7-4375-8799-99b520e0e3cb.mp3" length="35425559" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Tune in to our new episode! Katherine Druckman, Doc Searls, and Petros Koutoupis talk Apple Airtags and privacy.</itunes:subtitle>
  <itunes:duration>42:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Tune in to our new episode! Katherine Druckman, Doc Searls, and Petros Koutoupis talk Apple Airtags and privacy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman, Doc Searls, and Petros Koutoupis talk Apple Airtags and privacy.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="I tracked my kid with Apple&#39;s Airtags to test its privacy features - CNN" rel="nofollow" href="https://www.cnn.com/2021/05/05/tech/airtags-apple-privacy-concerns/index.html">I tracked my kid with Apple's Airtags to test its privacy features - CNN</a> &mdash; I clipped a keychain with one of Apple's tiny new Bluetooth trackers, AirTags, onto my son's book bag and waved goodbye to him on the school bus. I watched on my iPhone's Find My app as the bus stopped at a light a few blocks down from our street.</li><li><a title="Apple AirTags only partly stop stalking - The Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/05/05/apple-airtags-stalking/">Apple AirTags only partly stop stalking - The Washington Post</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tune in to our new episode! Katherine Druckman, Doc Searls, and Petros Koutoupis talk Apple Airtags and privacy.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="I tracked my kid with Apple&#39;s Airtags to test its privacy features - CNN" rel="nofollow" href="https://www.cnn.com/2021/05/05/tech/airtags-apple-privacy-concerns/index.html">I tracked my kid with Apple's Airtags to test its privacy features - CNN</a> &mdash; I clipped a keychain with one of Apple's tiny new Bluetooth trackers, AirTags, onto my son's book bag and waved goodbye to him on the school bus. I watched on my iPhone's Find My app as the bus stopped at a light a few blocks down from our street.</li><li><a title="Apple AirTags only partly stop stalking - The Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/05/05/apple-airtags-stalking/">Apple AirTags only partly stop stalking - The Washington Post</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 68: Signal Snoops On Cellebrite as They Snoop On Us</title>
  <link>https://www.reality2cast.com/68</link>
  <guid isPermaLink="false">9e2c30a0-c7e8-480a-8283-2af1ee331f9a</guid>
  <pubDate>Fri, 30 Apr 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9e2c30a0-c7e8-480a-8283-2af1ee331f9a.mp3" length="62952325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</itunes:subtitle>
  <itunes:duration>1:15:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Kyle Rankin and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#39;s perspective" rel="nofollow" href="https://signal.org/blog/cellebrite-vulnerabilities/">Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective</a> &mdash; Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russia, Venezuela, and China; death squads in Bangladesh; military juntas in Myanmar; and those seeking to abuse and oppress in Turkey, UAE, and elsewhere. A few months ago, they announced that they added Signal support to their software.

Their products have often been linked to the persecution of imprisoned journalists and activists around the world, but less has been written about what their software actually does or how it works. Let’s take a closer look. In particular, their software is often associated with bypassing security, so let’s take some time to examine the security of their own software.

</li><li><a title="Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/australia-anti-encryption-law/">Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog</a> &mdash; the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.</li><li><a title="Australia&#39;s Encryption-Busting Law Could Impact Global Privacy | WIRED" rel="nofollow" href="https://www.wired.com/story/australia-encryption-law-global-impact/">Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED</a> &mdash; Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.
</li><li><a title="P versus NP problem - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/P_versus_NP_problem">P versus NP problem - Wikipedia</a> &mdash; The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly.

</li><li><a title="Data Double Dipping: When Companies Mine Paying Customers – Purism" rel="nofollow" href="https://puri.sm/posts/data-double-dipping-when-companies-mine-paying-customers/">Data Double Dipping: When Companies Mine Paying Customers – Purism</a> &mdash; There’s an old snarky saying among privacy advocates: “If you aren’t paying for something, you are the product!” This updated version of “There’s no such thing as a free lunch” arose in the Internet age among the ever-growing list of free services and apps on the Internet funded by collecting and selling your data to advertisers. If large companies like Google and Facebook are any indication, a lot of money can be made with user data and the more data you collect, the more money you can make.</li><li><a title="Eva Galperin: What you need to know about stalkerware | TED Talk" rel="nofollow" href="https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware">Eva Galperin: What you need to know about stalkerware | TED Talk</a> &mdash; "Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims.</li><li><a title="Reality 2.0 Episode 52: Fragmentation and Outrage of the Week" rel="nofollow" href="https://www.reality2cast.com/52">Reality 2.0 Episode 52: Fragmentation and Outrage of the Week</a> &mdash; Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</li><li><a title="This Is How They Tell Me the World Ends" rel="nofollow" href="https://thisishowtheytellmetheworldends.com/">This Is How They Tell Me the World Ends</a> &mdash; From New York Times cybersecurity reporter Nicole Perlroth, THIS IS HOW THEY TELL ME THE WORLD ENDS is the untold story of the cyber arms trade-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#39;s perspective" rel="nofollow" href="https://signal.org/blog/cellebrite-vulnerabilities/">Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective</a> &mdash; Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russia, Venezuela, and China; death squads in Bangladesh; military juntas in Myanmar; and those seeking to abuse and oppress in Turkey, UAE, and elsewhere. A few months ago, they announced that they added Signal support to their software.

Their products have often been linked to the persecution of imprisoned journalists and activists around the world, but less has been written about what their software actually does or how it works. Let’s take a closer look. In particular, their software is often associated with bypassing security, so let’s take some time to examine the security of their own software.

</li><li><a title="Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/australia-anti-encryption-law/">Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog</a> &mdash; the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.</li><li><a title="Australia&#39;s Encryption-Busting Law Could Impact Global Privacy | WIRED" rel="nofollow" href="https://www.wired.com/story/australia-encryption-law-global-impact/">Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED</a> &mdash; Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.
</li><li><a title="P versus NP problem - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/P_versus_NP_problem">P versus NP problem - Wikipedia</a> &mdash; The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly.

</li><li><a title="Data Double Dipping: When Companies Mine Paying Customers – Purism" rel="nofollow" href="https://puri.sm/posts/data-double-dipping-when-companies-mine-paying-customers/">Data Double Dipping: When Companies Mine Paying Customers – Purism</a> &mdash; There’s an old snarky saying among privacy advocates: “If you aren’t paying for something, you are the product!” This updated version of “There’s no such thing as a free lunch” arose in the Internet age among the ever-growing list of free services and apps on the Internet funded by collecting and selling your data to advertisers. If large companies like Google and Facebook are any indication, a lot of money can be made with user data and the more data you collect, the more money you can make.</li><li><a title="Eva Galperin: What you need to know about stalkerware | TED Talk" rel="nofollow" href="https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware">Eva Galperin: What you need to know about stalkerware | TED Talk</a> &mdash; "Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims.</li><li><a title="Reality 2.0 Episode 52: Fragmentation and Outrage of the Week" rel="nofollow" href="https://www.reality2cast.com/52">Reality 2.0 Episode 52: Fragmentation and Outrage of the Week</a> &mdash; Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</li><li><a title="This Is How They Tell Me the World Ends" rel="nofollow" href="https://thisishowtheytellmetheworldends.com/">This Is How They Tell Me the World Ends</a> &mdash; From New York Times cybersecurity reporter Nicole Perlroth, THIS IS HOW THEY TELL ME THE WORLD ENDS is the untold story of the cyber arms trade-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 63: Is Your Privacy Set by Marketers in Aeron Chairs?</title>
  <link>https://www.reality2cast.com/63</link>
  <guid isPermaLink="false">d75dce6b-474f-4469-80bc-1a49d1442e0a</guid>
  <pubDate>Fri, 26 Mar 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/d75dce6b-474f-4469-80bc-1a49d1442e0a.mp3" length="50285838" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Don Marti and Shawn Powers about realistic data privacy measures, surveillance marketing, and privacy regulation.</itunes:subtitle>
  <itunes:duration>1:00:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Don Marti and Shawn Powers about realistic data privacy measures, surveillance marketing, and privacy regulation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt;&lt;br&gt;
 Special Guests: Don Marti and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, GDPR, CCPA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Don Marti and Shawn Powers about realistic data privacy measures, surveillance marketing, and privacy regulation.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Don Marti and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="CCPA opt out, nerd edition" rel="nofollow" href="https://blog.zgp.org/ccpa-for-nerds/">CCPA opt out, nerd edition</a> &mdash; While we figure out how to make general-purpose CCPA opt-outs practical (feel free to set up a time on Calendly if you want to talk with me about Authorized Agent projects), here’s a quick summary of my current CCPA opt-out tools. This is a prototype only, but does work.</li><li><a title="Resource Conservation and Recovery Act (RCRA) Laws and Regulations | US EPA" rel="nofollow" href="https://www.epa.gov/rcra">Resource Conservation and Recovery Act (RCRA) Laws and Regulations | US EPA</a> &mdash; The Resource Conservation and Recovery Act (RCRA) is the public law that creates the framework for the proper management of hazardous and non-hazardous solid waste.&nbsp;The law describes the waste management program mandated by Congress that gave EPA authority to develop the RCRA program.&nbsp;The term RCRA is often used interchangeably to refer to the law, regulations and EPA policy and guidance.&nbsp;</li><li><a title="Resource Conservation and Recovery Act - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Resource_Conservation_and_Recovery_Act">Resource Conservation and Recovery Act - Wikipedia</a> &mdash; The Resource Conservation and Recovery Act (RCRA), enacted in 1976, is the principal federal law in the United States governing the disposal of solid waste and hazardous waste.[1]</li><li><a title="Global Privacy Control — Take Control Of Your Privacy" rel="nofollow" href="https://globalprivacycontrol.org/">Global Privacy Control — Take Control Of Your Privacy</a> &mdash; Online privacy should be accessible to everyone. It starts with a simpler way to exercise your rights.</li><li><a title="CCPA guidance for authorized agents" rel="nofollow" href="https://privacy.microsoft.com/en-us/ccpa-guidance">CCPA guidance for authorized agents</a> &mdash; The California Consumer Privacy Act of 2018 (“CCPA”) creates a variety of privacy rights for California consumers. Microsoft makes it easy for consumers to exercise their rights, including the rights, via a verifiable request, that we (i) disclose and access what personal data we collect, use, disclose, and sell and (ii) delete the consumer’s personal data. Per the CCPA, consumers may exercise their rights through an authorized agent. This guidance is intended for authorized agents acting on behalf of a consumer looking to exercise the above CCPA rights.</li><li><a title="The State of Authorized Agent Opt Outs Under the California Consumer Privacy Act (PDF)" rel="nofollow" href="https://advocacy.consumerreports.org/wp-content/uploads/2021/02/CR_AuthorizedAgentCCPA_022021_VF_.pdf">The State of Authorized Agent Opt Outs Under the California Consumer Privacy Act (PDF)</a></li><li><a title="Consumer Reports Model State Privacy Act" rel="nofollow" href="https://advocacy.consumerreports.org/research/consumer-reports-model-state-data-privacy-act/">Consumer Reports Model State Privacy Act</a> &mdash; Though consumers have a fundamental right to privacy, there is no comprehensive federal privacy law granting them baseline privacy and security protections. Instead of leaving it to consumers to “opt-in” or “opt-out,” this bill protects consumer privacy by prohibiting companies from engaging in privacy-invasive behaviors.&nbsp;</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Don Marti and Shawn Powers about realistic data privacy measures, surveillance marketing, and privacy regulation.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Don Marti and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="CCPA opt out, nerd edition" rel="nofollow" href="https://blog.zgp.org/ccpa-for-nerds/">CCPA opt out, nerd edition</a> &mdash; While we figure out how to make general-purpose CCPA opt-outs practical (feel free to set up a time on Calendly if you want to talk with me about Authorized Agent projects), here’s a quick summary of my current CCPA opt-out tools. This is a prototype only, but does work.</li><li><a title="Resource Conservation and Recovery Act (RCRA) Laws and Regulations | US EPA" rel="nofollow" href="https://www.epa.gov/rcra">Resource Conservation and Recovery Act (RCRA) Laws and Regulations | US EPA</a> &mdash; The Resource Conservation and Recovery Act (RCRA) is the public law that creates the framework for the proper management of hazardous and non-hazardous solid waste.&nbsp;The law describes the waste management program mandated by Congress that gave EPA authority to develop the RCRA program.&nbsp;The term RCRA is often used interchangeably to refer to the law, regulations and EPA policy and guidance.&nbsp;</li><li><a title="Resource Conservation and Recovery Act - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Resource_Conservation_and_Recovery_Act">Resource Conservation and Recovery Act - Wikipedia</a> &mdash; The Resource Conservation and Recovery Act (RCRA), enacted in 1976, is the principal federal law in the United States governing the disposal of solid waste and hazardous waste.[1]</li><li><a title="Global Privacy Control — Take Control Of Your Privacy" rel="nofollow" href="https://globalprivacycontrol.org/">Global Privacy Control — Take Control Of Your Privacy</a> &mdash; Online privacy should be accessible to everyone. It starts with a simpler way to exercise your rights.</li><li><a title="CCPA guidance for authorized agents" rel="nofollow" href="https://privacy.microsoft.com/en-us/ccpa-guidance">CCPA guidance for authorized agents</a> &mdash; The California Consumer Privacy Act of 2018 (“CCPA”) creates a variety of privacy rights for California consumers. Microsoft makes it easy for consumers to exercise their rights, including the rights, via a verifiable request, that we (i) disclose and access what personal data we collect, use, disclose, and sell and (ii) delete the consumer’s personal data. Per the CCPA, consumers may exercise their rights through an authorized agent. This guidance is intended for authorized agents acting on behalf of a consumer looking to exercise the above CCPA rights.</li><li><a title="The State of Authorized Agent Opt Outs Under the California Consumer Privacy Act (PDF)" rel="nofollow" href="https://advocacy.consumerreports.org/wp-content/uploads/2021/02/CR_AuthorizedAgentCCPA_022021_VF_.pdf">The State of Authorized Agent Opt Outs Under the California Consumer Privacy Act (PDF)</a></li><li><a title="Consumer Reports Model State Privacy Act" rel="nofollow" href="https://advocacy.consumerreports.org/research/consumer-reports-model-state-data-privacy-act/">Consumer Reports Model State Privacy Act</a> &mdash; Though consumers have a fundamental right to privacy, there is no comprehensive federal privacy law granting them baseline privacy and security protections. Instead of leaving it to consumers to “opt-in” or “opt-out,” this bill protects consumer privacy by prohibiting companies from engaging in privacy-invasive behaviors.&nbsp;</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 60: SpaceX, Starlink, and Mozilla State Partitioning</title>
  <link>https://www.reality2cast.com/60</link>
  <guid isPermaLink="false">73f6d2d0-d883-487d-8e46-79a361100186</guid>
  <pubDate>Fri, 05 Mar 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/73f6d2d0-d883-487d-8e46-79a361100186.mp3" length="34604914" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.</itunes:subtitle>
  <itunes:duration>41:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Starlink: SpaceX&#39;s satellite internet project | Space" rel="nofollow" href="https://www.space.com/spacex-starlink-satellites.html">Starlink: SpaceX's satellite internet project | Space</a> &mdash; Starlink is the name of a satellite network that the private spaceflight company SpaceX is developing to provide low-cost internet to remote locations. While SpaceX eventually hopes to have as many as 12,000 satellites in this so-called megaconstellation, the size and scale of the project have flustered astronomers and amateur skywatchers, who fear that the bright, orbiting objects will interfere with observations of the universe. </li><li><a title="Heavens-Above" rel="nofollow" href="https://heavens-above.com/?lat=0&amp;lng=0&amp;loc=Unspecified&amp;alt=0&amp;tz=UCT">Heavens-Above</a> &mdash; Awesome site for space nerds.</li><li><a title="How Starlink Is About To Disrupt The Telecommunications Sector" rel="nofollow" href="https://www.forbes.com/sites/enriquedans/2021/02/23/how-starlink-is-about-to-disrupt-the-telecommunications-sector/?sh=85c043c659ab">How Starlink Is About To Disrupt The Telecommunications Sector</a> &mdash; If the logo doesn’t ring a bell, put it on your radar. Starlink, the satellite telecommunications company created by Elon Musk leveraging SpaceX’s rocket development, continues to complete milestones on schedule and announces that it will offer 300Mbps connectivity services with an approximate latency of 20ms by the end of this year.

In the United States, where the company has garnered a favorable deal that includes $900 million in funding under FCC programs aimed at providing connectivity to rural areas, that’s a very competitive offer, so much so that many ISPs have protested to the FCC claiming that the technology used by the company is experimental, not sufficiently tested, and will cause problems in the future. If you don’t spot that as a clear sign of disruption, you haven’t seen enough disruptions yet.&nbsp;</li><li><a title="Introducing State Partitioning - Mozilla Hacks - the Web developer blog" rel="nofollow" href="https://hacks.mozilla.org/2021/02/introducing-state-partitioning/">Introducing State Partitioning - Mozilla Hacks - the Web developer blog</a> &mdash; State Partitioning is the technical term for a new privacy feature in Firefox called Total Cookie Protection, which will be available in ETP Strict Mode in Firefox 86. This article shows how State Partitioning works inside of Firefox and explains what developers of third-party integrations can do to stay compatible with the latest changes.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk about Starlink, SpaceX and Mozilla’s new state partitioning privacy feature in Firefox.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Starlink: SpaceX&#39;s satellite internet project | Space" rel="nofollow" href="https://www.space.com/spacex-starlink-satellites.html">Starlink: SpaceX's satellite internet project | Space</a> &mdash; Starlink is the name of a satellite network that the private spaceflight company SpaceX is developing to provide low-cost internet to remote locations. While SpaceX eventually hopes to have as many as 12,000 satellites in this so-called megaconstellation, the size and scale of the project have flustered astronomers and amateur skywatchers, who fear that the bright, orbiting objects will interfere with observations of the universe. </li><li><a title="Heavens-Above" rel="nofollow" href="https://heavens-above.com/?lat=0&amp;lng=0&amp;loc=Unspecified&amp;alt=0&amp;tz=UCT">Heavens-Above</a> &mdash; Awesome site for space nerds.</li><li><a title="How Starlink Is About To Disrupt The Telecommunications Sector" rel="nofollow" href="https://www.forbes.com/sites/enriquedans/2021/02/23/how-starlink-is-about-to-disrupt-the-telecommunications-sector/?sh=85c043c659ab">How Starlink Is About To Disrupt The Telecommunications Sector</a> &mdash; If the logo doesn’t ring a bell, put it on your radar. Starlink, the satellite telecommunications company created by Elon Musk leveraging SpaceX’s rocket development, continues to complete milestones on schedule and announces that it will offer 300Mbps connectivity services with an approximate latency of 20ms by the end of this year.

In the United States, where the company has garnered a favorable deal that includes $900 million in funding under FCC programs aimed at providing connectivity to rural areas, that’s a very competitive offer, so much so that many ISPs have protested to the FCC claiming that the technology used by the company is experimental, not sufficiently tested, and will cause problems in the future. If you don’t spot that as a clear sign of disruption, you haven’t seen enough disruptions yet.&nbsp;</li><li><a title="Introducing State Partitioning - Mozilla Hacks - the Web developer blog" rel="nofollow" href="https://hacks.mozilla.org/2021/02/introducing-state-partitioning/">Introducing State Partitioning - Mozilla Hacks - the Web developer blog</a> &mdash; State Partitioning is the technical term for a new privacy feature in Firefox called Total Cookie Protection, which will be available in ETP Strict Mode in Firefox 86. This article shows how State Partitioning works inside of Firefox and explains what developers of third-party integrations can do to stay compatible with the latest changes.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 56: The Age of the Moderator</title>
  <link>https://www.reality2cast.com/56</link>
  <guid isPermaLink="false">c1233c74-9ed4-4d3b-b35c-bf4b956dc3ce</guid>
  <pubDate>Fri, 05 Feb 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/c1233c74-9ed4-4d3b-b35c-bf4b956dc3ce.mp3" length="34610483" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls and Petros Koutoupis talk Twitter's new Birdwatch experiment, Signal's resistance to moderation, and Redditors' impact on the stock market.</itunes:subtitle>
  <itunes:duration>41:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman, Doc Searls and Petros Koutoupis talk Twitter's new Birdwatch experiment, Signal's resistance to moderation, and Redditors' impact on the stock market.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com/56?t=130" target="_blank" rel="nofollow noopener"&gt;[02:06]:&lt;/a&gt; Twitter outsourcing content moderation with expirimental Birdwatch feature.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com/56?t=815" target="_blank" rel="nofollow noopener"&gt;[13:32]:&lt;/a&gt; Signal's founder has pushed back against internal efforts to have some sort of mechanism to prevent misuse of the platform.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com/56?t=1585" target="_blank" rel="nofollow noopener"&gt;[26:25]:&lt;/a&gt; Redditors take on hedge funds and the stock market with Game Stop and others. Robinhood and Discord respond. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Special Guest: Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, Reddit, social media, game stop, finance, wall street bets, Robinhood, social media, Twitter, birdwatch, signal</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Petros Koutoupis talk Twitter&#39;s new Birdwatch experiment, Signal&#39;s resistance to moderation, and Redditors&#39; impact on the stock market.</p>

<p>Show notes:</p>

<p><a href="https://www.reality2cast.com/56?t=130" rel="nofollow">[02:06]:</a> Twitter outsourcing content moderation with expirimental Birdwatch feature.</p>

<p><a href="https://www.reality2cast.com/56?t=815" rel="nofollow">[13:32]:</a> Signal&#39;s founder has pushed back against internal efforts to have some sort of mechanism to prevent misuse of the platform.</p>

<p><a href="https://www.reality2cast.com/56?t=1585" rel="nofollow">[26:25]:</a> Redditors take on hedge funds and the stock market with Game Stop and others. Robinhood and Discord respond. </p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Twitter introduces &#39;Birdwatch&#39; to fight misinformation | Engadget" rel="nofollow" href="https://www.engadget.com/twitter-birdwatch-misinformation-182940288.html">Twitter introduces 'Birdwatch' to fight misinformation | Engadget</a> &mdash; “Birdwatch allows people to identify information in Tweets they believe is misleading and write notes that provide informative context,” Twitter writes in a blog post. “We believe this approach has the potential to respond quickly when misleading information spreads, adding context that people trust and find valuable.”</li><li><a title="Warning Signal: the messaging app’s new features are causing internal turmoil - The Verge" rel="nofollow" href="https://www.theverge.com/22249391/signal-app-abuse-messaging-employees-violence-misinformation">Warning Signal: the messaging app’s new features are causing internal turmoil - The Verge</a> &mdash; Employees worry that, should Signal fail to build policies and enforcement mechanisms to identify and remove bad actors, the fallout could bring more negative attention to encryption technologies from regulators at a time when their existence is threatened around the world.</li><li><a title="The Worst Job in Technology: Staring at Human Depravity to Keep It Off Facebook - WSJ" rel="nofollow" href="https://www.wsj.com/articles/the-worst-job-in-technology-staring-at-human-depravity-to-keep-it-off-facebook-1514398398">The Worst Job in Technology: Staring at Human Depravity to Keep It Off Facebook - WSJ</a> &mdash; Deciding what does and doesn’t belong online is one of the fastest-growing jobs in the technology world—and perhaps the most grueling. The equivalent of 65 years of video are uploaded to YouTube each day. Facebook receives more than a million user reports of potentially objectionable content a day.</li><li><a title="Mind Your Own Business! - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=grZn0Jj8GFg">Mind Your Own Business! - YouTube</a> &mdash; Gladys Kravitz.</li><li><a title="Amazon.com: Shephard&#39;s Drone: A Novel (9780960051908): Frischmann, Brett: Books" rel="nofollow" href="https://www.amazon.com/Shephards-Drone-Novel-Brett-Frischmann/dp/0960051902/">Amazon.com: Shephard's Drone: A Novel (9780960051908): Frischmann, Brett: Books</a></li><li><a title="Amazon.com: The Gift: How the Creative Spirit Transforms the World (9781984897787): Hyde, Lewis: Books" rel="nofollow" href="https://www.amazon.com/Gift-Creative-Spirit-Transforms-World/dp/1984897780/">Amazon.com: The Gift: How the Creative Spirit Transforms the World (9781984897787): Hyde, Lewis: Books</a></li><li><a title="Amazon.com: COMMON AS AIR (9780374532796): Hyde, Lewis: Books" rel="nofollow" href="https://www.amazon.com/Common-Air-Revolution-Art-Ownership/dp/0374532796/">Amazon.com: COMMON AS AIR (9780374532796): Hyde, Lewis: Books</a></li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a></li><li><a title="Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times" rel="nofollow" href="https://www.nytimes.com/2021/01/29/opinion/sunday/facebook-surveillance-society-technology.html">Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times</a> &mdash; We can have democracy, or we can have a surveillance society, but we cannot have both.</li><li><a title="GameStop, Reddit and Robinhood: A full recap of the historic retail trading mania on Wall Street" rel="nofollow" href="https://www.cnbc.com/2021/01/30/gamestop-reddit-and-robinhood-a-full-recap-of-the-historic-retail-trading-mania-on-wall-street.html">GameStop, Reddit and Robinhood: A full recap of the historic retail trading mania on Wall Street</a> &mdash; GameStop mania took Wall Street by storm, thanks to a legion of retail traders glued to the WallStreetBets message board on Reddit.</li><li><a title="Discord bans the r/WallStreetBets server, but new ones have sprung to life - The Verge" rel="nofollow" href="https://www.theverge.com/2021/1/27/22253251/discord-bans-the-r-wallstreetbets-server">Discord bans the r/WallStreetBets server, but new ones have sprung to life - The Verge</a> &mdash; Discord says it did not ban the WallStreetBets server for financial fraud — rather, it was banned because it continued to allow “hateful and discriminatory content after repeated warnings.” The Verge gained access to the server and can confirm the claim that users of the channel were spamming hateful language, including racial slurs.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Petros Koutoupis talk Twitter&#39;s new Birdwatch experiment, Signal&#39;s resistance to moderation, and Redditors&#39; impact on the stock market.</p>

<p>Show notes:</p>

<p><a href="https://www.reality2cast.com/56?t=130" rel="nofollow">[02:06]:</a> Twitter outsourcing content moderation with expirimental Birdwatch feature.</p>

<p><a href="https://www.reality2cast.com/56?t=815" rel="nofollow">[13:32]:</a> Signal&#39;s founder has pushed back against internal efforts to have some sort of mechanism to prevent misuse of the platform.</p>

<p><a href="https://www.reality2cast.com/56?t=1585" rel="nofollow">[26:25]:</a> Redditors take on hedge funds and the stock market with Game Stop and others. Robinhood and Discord respond. </p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Twitter introduces &#39;Birdwatch&#39; to fight misinformation | Engadget" rel="nofollow" href="https://www.engadget.com/twitter-birdwatch-misinformation-182940288.html">Twitter introduces 'Birdwatch' to fight misinformation | Engadget</a> &mdash; “Birdwatch allows people to identify information in Tweets they believe is misleading and write notes that provide informative context,” Twitter writes in a blog post. “We believe this approach has the potential to respond quickly when misleading information spreads, adding context that people trust and find valuable.”</li><li><a title="Warning Signal: the messaging app’s new features are causing internal turmoil - The Verge" rel="nofollow" href="https://www.theverge.com/22249391/signal-app-abuse-messaging-employees-violence-misinformation">Warning Signal: the messaging app’s new features are causing internal turmoil - The Verge</a> &mdash; Employees worry that, should Signal fail to build policies and enforcement mechanisms to identify and remove bad actors, the fallout could bring more negative attention to encryption technologies from regulators at a time when their existence is threatened around the world.</li><li><a title="The Worst Job in Technology: Staring at Human Depravity to Keep It Off Facebook - WSJ" rel="nofollow" href="https://www.wsj.com/articles/the-worst-job-in-technology-staring-at-human-depravity-to-keep-it-off-facebook-1514398398">The Worst Job in Technology: Staring at Human Depravity to Keep It Off Facebook - WSJ</a> &mdash; Deciding what does and doesn’t belong online is one of the fastest-growing jobs in the technology world—and perhaps the most grueling. The equivalent of 65 years of video are uploaded to YouTube each day. Facebook receives more than a million user reports of potentially objectionable content a day.</li><li><a title="Mind Your Own Business! - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=grZn0Jj8GFg">Mind Your Own Business! - YouTube</a> &mdash; Gladys Kravitz.</li><li><a title="Amazon.com: Shephard&#39;s Drone: A Novel (9780960051908): Frischmann, Brett: Books" rel="nofollow" href="https://www.amazon.com/Shephards-Drone-Novel-Brett-Frischmann/dp/0960051902/">Amazon.com: Shephard's Drone: A Novel (9780960051908): Frischmann, Brett: Books</a></li><li><a title="Amazon.com: The Gift: How the Creative Spirit Transforms the World (9781984897787): Hyde, Lewis: Books" rel="nofollow" href="https://www.amazon.com/Gift-Creative-Spirit-Transforms-World/dp/1984897780/">Amazon.com: The Gift: How the Creative Spirit Transforms the World (9781984897787): Hyde, Lewis: Books</a></li><li><a title="Amazon.com: COMMON AS AIR (9780374532796): Hyde, Lewis: Books" rel="nofollow" href="https://www.amazon.com/Common-Air-Revolution-Art-Ownership/dp/0374532796/">Amazon.com: COMMON AS AIR (9780374532796): Hyde, Lewis: Books</a></li><li><a title="The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power: Zuboff, Shoshana: 9781610395694: Amazon.com: Books</a></li><li><a title="Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times" rel="nofollow" href="https://www.nytimes.com/2021/01/29/opinion/sunday/facebook-surveillance-society-technology.html">Opinion | Facebook and the Surveillance Society: The Other Coup - The New York Times</a> &mdash; We can have democracy, or we can have a surveillance society, but we cannot have both.</li><li><a title="GameStop, Reddit and Robinhood: A full recap of the historic retail trading mania on Wall Street" rel="nofollow" href="https://www.cnbc.com/2021/01/30/gamestop-reddit-and-robinhood-a-full-recap-of-the-historic-retail-trading-mania-on-wall-street.html">GameStop, Reddit and Robinhood: A full recap of the historic retail trading mania on Wall Street</a> &mdash; GameStop mania took Wall Street by storm, thanks to a legion of retail traders glued to the WallStreetBets message board on Reddit.</li><li><a title="Discord bans the r/WallStreetBets server, but new ones have sprung to life - The Verge" rel="nofollow" href="https://www.theverge.com/2021/1/27/22253251/discord-bans-the-r-wallstreetbets-server">Discord bans the r/WallStreetBets server, but new ones have sprung to life - The Verge</a> &mdash; Discord says it did not ban the WallStreetBets server for financial fraud — rather, it was banned because it continued to allow “hateful and discriminatory content after repeated warnings.” The Verge gained access to the server and can confirm the claim that users of the channel were spamming hateful language, including racial slurs.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 54: Digital Rights are Human Rights</title>
  <link>https://www.reality2cast.com/54</link>
  <guid isPermaLink="false">0bb77717-6fa2-444e-b8aa-5475a2071cce</guid>
  <pubDate>Fri, 22 Jan 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/0bb77717-6fa2-444e-b8aa-5475a2071cce.mp3" length="46525533" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Evan Greer, Deputy Director of digital rights activism group Fight for the Future about Section 230, politics, de-platforming, and internet policy.</itunes:subtitle>
  <itunes:duration>52:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Evan Greer, Deputy Director of digital rights activism group Fight for the Future about Section 230, privacy, politics, de-platforming, and internet policy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Evan Greer.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, section 230, politics, human rights, digital rights</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Evan Greer, Deputy Director of digital rights activism group Fight for the Future about Section 230, privacy, politics, de-platforming, and internet policy.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Evan Greer.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Evan Greer (@evan_greer) / Twitter" rel="nofollow" href="https://twitter.com/evan_greer">Evan Greer (@evan_greer) / Twitter</a></li><li><a title="Fight for the Future" rel="nofollow" href="https://www.fightforthefuture.org/">Fight for the Future</a> &mdash; We are a group of artists, engineers, activists, and technologists who have been behind the largest online protests in human history, channeling Internet outrage into political power to win public interest victories previously thought to be impossible.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Evan Greer, Deputy Director of digital rights activism group Fight for the Future about Section 230, privacy, politics, de-platforming, and internet policy.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Evan Greer.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Evan Greer (@evan_greer) / Twitter" rel="nofollow" href="https://twitter.com/evan_greer">Evan Greer (@evan_greer) / Twitter</a></li><li><a title="Fight for the Future" rel="nofollow" href="https://www.fightforthefuture.org/">Fight for the Future</a> &mdash; We are a group of artists, engineers, activists, and technologists who have been behind the largest online protests in human history, channeling Internet outrage into political power to win public interest victories previously thought to be impossible.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 52: Fragmentation and Outrage of the Week</title>
  <link>https://www.reality2cast.com/52</link>
  <guid isPermaLink="false">39e46be4-8fde-4626-a7b2-c59d5b5a1c65</guid>
  <pubDate>Fri, 18 Dec 2020 06:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/39e46be4-8fde-4626-a7b2-c59d5b5a1c65.mp3" length="52691817" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</itunes:subtitle>
  <itunes:duration>1:02:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;Katherine (41s):&lt;br&gt;
The concept of fragmentation as it applies to software development. &lt;/p&gt;

&lt;p&gt;Kyle (1m 44s):&lt;br&gt;
[I]f you're an application developer today and you're writing a program, you know, 20 years ago, what you had to do is think about, well, do I want my application to run on windows, Mac, or Linux, or what combination of those? And then depending on your decision, you would pick different frameworks, different languages, maybe, and each individual platform you had, the support basically made you had the fork, the code in many cases.&lt;/p&gt;

&lt;p&gt;Kyle (2m 31s):&lt;br&gt;
I mean, depending on what, what graphical libraries you picked, but these days it's way worse. Because with mobile devices, you've added a couple of extra platforms on top of those three. So now it's not just windows, Mac, or Linux, it's also Android or iOS. And so, and then, so what ends up happening is the developer will say, well, do I want to make a mobile application or do I want to make a desktop application? And then they'll start with that standpoint. And they, or they may say, well, I want to do all of the above, but then there's a minimum of like five different platforms. They have to support them. And all of them are often in different languages, you know, different development, methodologies, different frameworks, different tools to test and build all of that stuff.&lt;/p&gt;

&lt;p&gt;Kyle (3m 16s):&lt;br&gt;
[W]e decided, well, it makes the most sense to avoid fragmentation and have the same operating system that our laptop runs just instead of sort of making an application, porting an application to the phone, let's just make the existing Linux desktop ecosystem as a whole portable to a small screen&lt;/p&gt;

&lt;p&gt;Katherine (10m 1s):&lt;br&gt;
[W]hat's happening now with the new M1 processor the whole idea is that any Mac app can now be, or rather the other way around, any iOS app is now a desktop app, which is interesting because it's sort of the opposite reality.&lt;/p&gt;

&lt;p&gt;Katherine (16m 41s):&lt;br&gt;
[I]t's almost ridiculous to me at this point that I can't just plug in my, if, if I were to have a fancy new iPhone, which I don't, but if I did, why shouldn't I just be able to plug it in? You know, it's a powerful device, it has a massive amount of computing power &lt;/p&gt;

&lt;p&gt;Kyle (19m 43s):&lt;br&gt;
If at all, you know, depending on the provider, Google has had huge problems with, you know, all of these third parties that create custom versions of Android and they never update them. So they've had to go through all of these engineering efforts to try to avoid just the fragmentation in the Android market, with all of these custom Androids that are out there.&lt;/p&gt;

&lt;p&gt;Katherine (31m 28s):&lt;br&gt;
[T]he Amazon halo wearable device because all of the coverage, even, and maybe even, especially in mainstream press outlets has been so bad. I mean, it's, you know, it's not just privacy advocates or, you know, geeks like us who are going really, who thought this was a good idea. The Washington post, which is as they even pointed out owned by Jeff Bezos is just tearing this thing apart.&lt;/p&gt;

&lt;p&gt;Doc (31m 60s):&lt;br&gt;
So the headline Amazon's new health band is the most invasive tech we've ever tested. And then the subhead is even better. It says the halo band asks you to strip down and strap on a microphone. So it can make 3d scans of your body fat and monitor your tone of voice after all that. It still isn't very helpful. &lt;/p&gt;

&lt;p&gt;Katherine (43m 47s):&lt;br&gt;
An article in Gizmodo about schools, us schools, having access to the same technology that federal law enforcement has for breaking into phones. And they use this technology to conduct warrantless searches of student phones.&lt;/p&gt;

&lt;p&gt;Katherine (46m 6s):&lt;br&gt;
[I]t knows everything that you're anxious about. It knows everything that you're curious about. It knows, you know, it knows everything. And yet somehow some school districts and in fact judges, apparently because these, these issues have gone to court, find it perfectly acceptable for a school to be able to hack into somebody’s device. So I, I find this really disturbing. I wonder, Kyle, if you could kind of maybe give us some insight about how, how potentially dangerous this is.&lt;/p&gt;

&lt;p&gt;Kyle (46m 40s):&lt;br&gt;
I mean, I've, I see this trend over and over again, where what will happen is someone will come up with a new invasive technology and it's sort of like boiling the frog kind of thing where you could not, you know, throw this against everybody. Like everyone would rise up and say, this is not okay. But so what you do instead is you start with people with the least possible agency. You can normally, if you have some sort of invasive privacy invasive tech, the first step is to either sell it for stopping terrorism or maybe pedophiles. And then after, after you get sort of a proof of concept there, then you have to expand. If you're selling a product, you need to expand your user base.&lt;/p&gt;

&lt;p&gt;Doc (54m 21s):&lt;br&gt;
Yeah. The weird thing for me is that almost nobody's worked on starting with giving us agency, you know, I mean, we should be able to say, here's privacy. Here's, here's what I've got. You can't see anything. You're not seeing anything we're doing. &lt;/p&gt;

&lt;p&gt;Doc (57m 34s):&lt;br&gt;
That's my message to all of you. We can't do that. And we need to be able to do that, that's why my preference would be for the default to be, you have to default to, I'm not collecting any of your data. Your data is yours. I'm not allowed to do it. I'm only allowed to do it. If you expressly give me informed consent to do it. And then at that point I will do it, but you, but, but if I, if you do nothing, then I can't do it. I can't take any of your data. It's yours. Yeah. Yeah. I mean, it's one of the more quoted things that I've written in the last few years. &lt;/p&gt;

&lt;p&gt;Katherine (58m 58s):&lt;br&gt;
But I kind of feel like we are in the wild West. That's how I feel like when digitally, when we start talking about things like, you know, schools being allowed to quite literally digitally strip search your children, you know, people should be outraged by that&lt;/p&gt;

&lt;p&gt;Kyle (59m 38s):&lt;br&gt;
Well, but that's also because your average parent given the preference, and many of them already do put spyware on their children's phones to track their children, right. Because they want to be able to see everything that their kid did. &lt;/p&gt;

&lt;p&gt;Kyle (1h 0m 18s):&lt;br&gt;
I keep, I keep saying, it's not that people don't care about privacy, as much as they don't understand the implications of what they're giving up, you know? And so I, you know, a lot of parents don't necessarily understand the implications of, of what it normalizes.&lt;br&gt;
 Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, surveillance, software developement</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p>

<p>Show notes:</p>

<p>Katherine (41s):<br>
The concept of fragmentation as it applies to software development. </p>

<p>Kyle (1m 44s):<br>
[I]f you&#39;re an application developer today and you&#39;re writing a program, you know, 20 years ago, what you had to do is think about, well, do I want my application to run on windows, Mac, or Linux, or what combination of those? And then depending on your decision, you would pick different frameworks, different languages, maybe, and each individual platform you had, the support basically made you had the fork, the code in many cases.</p>

<p>Kyle (2m 31s):<br>
I mean, depending on what, what graphical libraries you picked, but these days it&#39;s way worse. Because with mobile devices, you&#39;ve added a couple of extra platforms on top of those three. So now it&#39;s not just windows, Mac, or Linux, it&#39;s also Android or iOS. And so, and then, so what ends up happening is the developer will say, well, do I want to make a mobile application or do I want to make a desktop application? And then they&#39;ll start with that standpoint. And they, or they may say, well, I want to do all of the above, but then there&#39;s a minimum of like five different platforms. They have to support them. And all of them are often in different languages, you know, different development, methodologies, different frameworks, different tools to test and build all of that stuff.</p>

<p>Kyle (3m 16s):<br>
[W]e decided, well, it makes the most sense to avoid fragmentation and have the same operating system that our laptop runs just instead of sort of making an application, porting an application to the phone, let&#39;s just make the existing Linux desktop ecosystem as a whole portable to a small screen</p>

<p>Katherine (10m 1s):<br>
[W]hat&#39;s happening now with the new M1 processor the whole idea is that any Mac app can now be, or rather the other way around, any iOS app is now a desktop app, which is interesting because it&#39;s sort of the opposite reality.</p>

<p>Katherine (16m 41s):<br>
[I]t&#39;s almost ridiculous to me at this point that I can&#39;t just plug in my, if, if I were to have a fancy new iPhone, which I don&#39;t, but if I did, why shouldn&#39;t I just be able to plug it in? You know, it&#39;s a powerful device, it has a massive amount of computing power </p>

<p>Kyle (19m 43s):<br>
If at all, you know, depending on the provider, Google has had huge problems with, you know, all of these third parties that create custom versions of Android and they never update them. So they&#39;ve had to go through all of these engineering efforts to try to avoid just the fragmentation in the Android market, with all of these custom Androids that are out there.</p>

<p>Katherine (31m 28s):<br>
[T]he Amazon halo wearable device because all of the coverage, even, and maybe even, especially in mainstream press outlets has been so bad. I mean, it&#39;s, you know, it&#39;s not just privacy advocates or, you know, geeks like us who are going really, who thought this was a good idea. The Washington post, which is as they even pointed out owned by Jeff Bezos is just tearing this thing apart.</p>

<p>Doc (31m 60s):<br>
So the headline Amazon&#39;s new health band is the most invasive tech we&#39;ve ever tested. And then the subhead is even better. It says the halo band asks you to strip down and strap on a microphone. So it can make 3d scans of your body fat and monitor your tone of voice after all that. It still isn&#39;t very helpful. </p>

<p>Katherine (43m 47s):<br>
An article in Gizmodo about schools, us schools, having access to the same technology that federal law enforcement has for breaking into phones. And they use this technology to conduct warrantless searches of student phones.</p>

<p>Katherine (46m 6s):<br>
[I]t knows everything that you&#39;re anxious about. It knows everything that you&#39;re curious about. It knows, you know, it knows everything. And yet somehow some school districts and in fact judges, apparently because these, these issues have gone to court, find it perfectly acceptable for a school to be able to hack into somebody’s device. So I, I find this really disturbing. I wonder, Kyle, if you could kind of maybe give us some insight about how, how potentially dangerous this is.</p>

<p>Kyle (46m 40s):<br>
I mean, I&#39;ve, I see this trend over and over again, where what will happen is someone will come up with a new invasive technology and it&#39;s sort of like boiling the frog kind of thing where you could not, you know, throw this against everybody. Like everyone would rise up and say, this is not okay. But so what you do instead is you start with people with the least possible agency. You can normally, if you have some sort of invasive privacy invasive tech, the first step is to either sell it for stopping terrorism or maybe pedophiles. And then after, after you get sort of a proof of concept there, then you have to expand. If you&#39;re selling a product, you need to expand your user base.</p>

<p>Doc (54m 21s):<br>
Yeah. The weird thing for me is that almost nobody&#39;s worked on starting with giving us agency, you know, I mean, we should be able to say, here&#39;s privacy. Here&#39;s, here&#39;s what I&#39;ve got. You can&#39;t see anything. You&#39;re not seeing anything we&#39;re doing. </p>

<p>Doc (57m 34s):<br>
That&#39;s my message to all of you. We can&#39;t do that. And we need to be able to do that, that&#39;s why my preference would be for the default to be, you have to default to, I&#39;m not collecting any of your data. Your data is yours. I&#39;m not allowed to do it. I&#39;m only allowed to do it. If you expressly give me informed consent to do it. And then at that point I will do it, but you, but, but if I, if you do nothing, then I can&#39;t do it. I can&#39;t take any of your data. It&#39;s yours. Yeah. Yeah. I mean, it&#39;s one of the more quoted things that I&#39;ve written in the last few years. </p>

<p>Katherine (58m 58s):<br>
But I kind of feel like we are in the wild West. That&#39;s how I feel like when digitally, when we start talking about things like, you know, schools being allowed to quite literally digitally strip search your children, you know, people should be outraged by that</p>

<p>Kyle (59m 38s):<br>
Well, but that&#39;s also because your average parent given the preference, and many of them already do put spyware on their children&#39;s phones to track their children, right. Because they want to be able to see everything that their kid did. </p>

<p>Kyle (1h 0m 18s):<br>
I keep, I keep saying, it&#39;s not that people don&#39;t care about privacy, as much as they don&#39;t understand the implications of what they&#39;re giving up, you know? And so I, you know, a lot of parents don&#39;t necessarily understand the implications of, of what it normalizes.</p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Preventing Fragmentation with the Librem 5 – Purism" rel="nofollow" href="https://puri.sm/posts/preventing-fragmentation-with-the-librem-5/">Preventing Fragmentation with the Librem 5 – Purism</a> &mdash; Fragmentation is a massive problem in computer software development that has only gotten worse with mobile computers. By fragmentation I’m referring to incompatible platforms that require a developer to maintain separate forks of their code. Twenty years ago if you wanted to write software for an end user, you had to decide whether to support Windows, Macs or Linux. Each of those platforms required you to build, test, and maintain different forks of your software.</li><li><a title="Amazon’s Halo Band wearable tracks your voice and body fat, but isn’t helpful - The Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/2020/12/10/amazon-halo-band-review/">Amazon’s Halo Band wearable tracks your voice and body fat, but isn’t helpful - The Washington Post</a> &mdash; The Halo Band asks you to strip down and strap on a microphone so that it can make 3-D scans of your body fat and monitor your tone of voice. After all that, it still isn’t very helpful.</li><li><a title="U.S. Schools Are Buying Cellebrite Phone-Hacking Tech" rel="nofollow" href="https://gizmodo.com/u-s-schools-are-buying-phone-hacking-tech-that-the-fbi-1845862393">U.S. Schools Are Buying Cellebrite Phone-Hacking Tech</a> &mdash; While companies like Cellebrite have partnered with federal and local police for years, that the controversial equipment is also available for school district employees to search students’ personal devices has gone relatively unnoticed—and serves as a frightening reminder of how technology originally developed for use by the military or intelligence services, ranging from blast-armored trucks designed for use in war zones to invasive surveillance tools, keeps trickling down to domestic police and even the institutions where our kids go to learn.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p>

<p>Show notes:</p>

<p>Katherine (41s):<br>
The concept of fragmentation as it applies to software development. </p>

<p>Kyle (1m 44s):<br>
[I]f you&#39;re an application developer today and you&#39;re writing a program, you know, 20 years ago, what you had to do is think about, well, do I want my application to run on windows, Mac, or Linux, or what combination of those? And then depending on your decision, you would pick different frameworks, different languages, maybe, and each individual platform you had, the support basically made you had the fork, the code in many cases.</p>

<p>Kyle (2m 31s):<br>
I mean, depending on what, what graphical libraries you picked, but these days it&#39;s way worse. Because with mobile devices, you&#39;ve added a couple of extra platforms on top of those three. So now it&#39;s not just windows, Mac, or Linux, it&#39;s also Android or iOS. And so, and then, so what ends up happening is the developer will say, well, do I want to make a mobile application or do I want to make a desktop application? And then they&#39;ll start with that standpoint. And they, or they may say, well, I want to do all of the above, but then there&#39;s a minimum of like five different platforms. They have to support them. And all of them are often in different languages, you know, different development, methodologies, different frameworks, different tools to test and build all of that stuff.</p>

<p>Kyle (3m 16s):<br>
[W]e decided, well, it makes the most sense to avoid fragmentation and have the same operating system that our laptop runs just instead of sort of making an application, porting an application to the phone, let&#39;s just make the existing Linux desktop ecosystem as a whole portable to a small screen</p>

<p>Katherine (10m 1s):<br>
[W]hat&#39;s happening now with the new M1 processor the whole idea is that any Mac app can now be, or rather the other way around, any iOS app is now a desktop app, which is interesting because it&#39;s sort of the opposite reality.</p>

<p>Katherine (16m 41s):<br>
[I]t&#39;s almost ridiculous to me at this point that I can&#39;t just plug in my, if, if I were to have a fancy new iPhone, which I don&#39;t, but if I did, why shouldn&#39;t I just be able to plug it in? You know, it&#39;s a powerful device, it has a massive amount of computing power </p>

<p>Kyle (19m 43s):<br>
If at all, you know, depending on the provider, Google has had huge problems with, you know, all of these third parties that create custom versions of Android and they never update them. So they&#39;ve had to go through all of these engineering efforts to try to avoid just the fragmentation in the Android market, with all of these custom Androids that are out there.</p>

<p>Katherine (31m 28s):<br>
[T]he Amazon halo wearable device because all of the coverage, even, and maybe even, especially in mainstream press outlets has been so bad. I mean, it&#39;s, you know, it&#39;s not just privacy advocates or, you know, geeks like us who are going really, who thought this was a good idea. The Washington post, which is as they even pointed out owned by Jeff Bezos is just tearing this thing apart.</p>

<p>Doc (31m 60s):<br>
So the headline Amazon&#39;s new health band is the most invasive tech we&#39;ve ever tested. And then the subhead is even better. It says the halo band asks you to strip down and strap on a microphone. So it can make 3d scans of your body fat and monitor your tone of voice after all that. It still isn&#39;t very helpful. </p>

<p>Katherine (43m 47s):<br>
An article in Gizmodo about schools, us schools, having access to the same technology that federal law enforcement has for breaking into phones. And they use this technology to conduct warrantless searches of student phones.</p>

<p>Katherine (46m 6s):<br>
[I]t knows everything that you&#39;re anxious about. It knows everything that you&#39;re curious about. It knows, you know, it knows everything. And yet somehow some school districts and in fact judges, apparently because these, these issues have gone to court, find it perfectly acceptable for a school to be able to hack into somebody’s device. So I, I find this really disturbing. I wonder, Kyle, if you could kind of maybe give us some insight about how, how potentially dangerous this is.</p>

<p>Kyle (46m 40s):<br>
I mean, I&#39;ve, I see this trend over and over again, where what will happen is someone will come up with a new invasive technology and it&#39;s sort of like boiling the frog kind of thing where you could not, you know, throw this against everybody. Like everyone would rise up and say, this is not okay. But so what you do instead is you start with people with the least possible agency. You can normally, if you have some sort of invasive privacy invasive tech, the first step is to either sell it for stopping terrorism or maybe pedophiles. And then after, after you get sort of a proof of concept there, then you have to expand. If you&#39;re selling a product, you need to expand your user base.</p>

<p>Doc (54m 21s):<br>
Yeah. The weird thing for me is that almost nobody&#39;s worked on starting with giving us agency, you know, I mean, we should be able to say, here&#39;s privacy. Here&#39;s, here&#39;s what I&#39;ve got. You can&#39;t see anything. You&#39;re not seeing anything we&#39;re doing. </p>

<p>Doc (57m 34s):<br>
That&#39;s my message to all of you. We can&#39;t do that. And we need to be able to do that, that&#39;s why my preference would be for the default to be, you have to default to, I&#39;m not collecting any of your data. Your data is yours. I&#39;m not allowed to do it. I&#39;m only allowed to do it. If you expressly give me informed consent to do it. And then at that point I will do it, but you, but, but if I, if you do nothing, then I can&#39;t do it. I can&#39;t take any of your data. It&#39;s yours. Yeah. Yeah. I mean, it&#39;s one of the more quoted things that I&#39;ve written in the last few years. </p>

<p>Katherine (58m 58s):<br>
But I kind of feel like we are in the wild West. That&#39;s how I feel like when digitally, when we start talking about things like, you know, schools being allowed to quite literally digitally strip search your children, you know, people should be outraged by that</p>

<p>Kyle (59m 38s):<br>
Well, but that&#39;s also because your average parent given the preference, and many of them already do put spyware on their children&#39;s phones to track their children, right. Because they want to be able to see everything that their kid did. </p>

<p>Kyle (1h 0m 18s):<br>
I keep, I keep saying, it&#39;s not that people don&#39;t care about privacy, as much as they don&#39;t understand the implications of what they&#39;re giving up, you know? And so I, you know, a lot of parents don&#39;t necessarily understand the implications of, of what it normalizes.</p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Preventing Fragmentation with the Librem 5 – Purism" rel="nofollow" href="https://puri.sm/posts/preventing-fragmentation-with-the-librem-5/">Preventing Fragmentation with the Librem 5 – Purism</a> &mdash; Fragmentation is a massive problem in computer software development that has only gotten worse with mobile computers. By fragmentation I’m referring to incompatible platforms that require a developer to maintain separate forks of their code. Twenty years ago if you wanted to write software for an end user, you had to decide whether to support Windows, Macs or Linux. Each of those platforms required you to build, test, and maintain different forks of your software.</li><li><a title="Amazon’s Halo Band wearable tracks your voice and body fat, but isn’t helpful - The Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/2020/12/10/amazon-halo-band-review/">Amazon’s Halo Band wearable tracks your voice and body fat, but isn’t helpful - The Washington Post</a> &mdash; The Halo Band asks you to strip down and strap on a microphone so that it can make 3-D scans of your body fat and monitor your tone of voice. After all that, it still isn’t very helpful.</li><li><a title="U.S. Schools Are Buying Cellebrite Phone-Hacking Tech" rel="nofollow" href="https://gizmodo.com/u-s-schools-are-buying-phone-hacking-tech-that-the-fbi-1845862393">U.S. Schools Are Buying Cellebrite Phone-Hacking Tech</a> &mdash; While companies like Cellebrite have partnered with federal and local police for years, that the controversial equipment is also available for school district employees to search students’ personal devices has gone relatively unnoticed—and serves as a frightening reminder of how technology originally developed for use by the military or intelligence services, ranging from blast-armored trucks designed for use in war zones to invasive surveillance tools, keeps trickling down to domestic police and even the institutions where our kids go to learn.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 43: Ad Tracking Runs Deep</title>
  <link>https://www.reality2cast.com/43</link>
  <guid isPermaLink="false">8168cd97-a5a3-4103-85ad-3fdc85bd927b</guid>
  <pubDate>Fri, 09 Oct 2020 09:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/8168cd97-a5a3-4103-85ad-3fdc85bd927b.mp3" length="52594284" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about his privacy analysis app, Page X-Ray, ad tracking, and data privacy.</itunes:subtitle>
  <itunes:duration>59:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about his privacy analysis app, Page X-Ray, ad tracking, and data privacy.&lt;/p&gt;

&lt;p&gt;Show Notes: &lt;/p&gt;

&lt;p&gt;00:02:17 Page Xray and Blacklight&lt;br&gt;
00:07:27 While you interact with one web page, who else is harvesting your information?&lt;br&gt;
00:14:13 Listen to which tracker Katherine used for about 10 minute, and promptly removed!&lt;br&gt;
00:15:57 What is malvertising&lt;br&gt;
00:18:55 What about the browser extension privacy trackers?&lt;br&gt;
00:25:54 Who should use PageXray?&lt;br&gt;
00:32:30 What are some good consumer tools?&lt;br&gt;
00:42:26 What is "fingerprinting" and how does a site "fingerprint" you?&lt;br&gt;
00:48:21 Covering your "privates"&lt;br&gt;
00:51:32 Marketers are chasing the shiny object called Digital&lt;br&gt;
00:53:26 what is the ratio of registered domains vs websites vs humans visitors vs real ad impressions?&lt;br&gt;
 Special Guest: Dr. Augustine Fou.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about his privacy analysis app, Page X-Ray, ad tracking, and data privacy.</p>

<p>Show Notes: </p>

<p>00:02:17 Page Xray and Blacklight<br>
00:07:27 While you interact with one web page, who else is harvesting your information?<br>
00:14:13 Listen to which tracker Katherine used for about 10 minute, and promptly removed!<br>
00:15:57 What is malvertising<br>
00:18:55 What about the browser extension privacy trackers?<br>
00:25:54 Who should use PageXray?<br>
00:32:30 What are some good consumer tools?<br>
00:42:26 What is &quot;fingerprinting&quot; and how does a site &quot;fingerprint&quot; you?<br>
00:48:21 Covering your &quot;privates&quot;<br>
00:51:32 Marketers are chasing the shiny object called Digital<br>
00:53:26 what is the ratio of registered domains vs websites vs humans visitors vs real ad impressions?</p><p>Special Guest: Dr. Augustine Fou.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Episode 13: Surveillance Marketing" rel="nofollow" href="https://www.reality2cast.com/13">Episode 13: Surveillance Marketing</a> &mdash; Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about surveillance marketing, ad tech, and privacy.</li><li><a title="Page X-Ray Data Privacy Analysis Featured in Episode 43" rel="nofollow" href="https://www.reality2cast.com/articles/page-xray-data-privacy-analysis">Page X-Ray Data Privacy Analysis Featured in Episode 43</a> &mdash; A brief overview of Page X-Ray.</li><li><a title="FouAnalytics - Ads By Domain" rel="nofollow" href="https://pagexray.fouanalytics.com/">FouAnalytics - Ads By Domain</a> &mdash; Privacy Analytics tool from Dr. Augustine Fou.</li><li><a title="Blacklight – The Markup" rel="nofollow" href="https://themarkup.org/blacklight">Blacklight – The Markup</a> &mdash; A Real-Time Website Privacy Inspector</li><li><a title="Privacy Badger" rel="nofollow" href="https://privacybadger.org/">Privacy Badger</a> &mdash; Privacy extension from the EFF.</li><li><a title="Ghostery: Online Privacy Made Easy" rel="nofollow" href="https://www.ghostery.com/">Ghostery: Online Privacy Made Easy</a> &mdash; Ghostery demystifies online privacy by exposing the forces that lurk behind your screen and enabling you to block them.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; The Brave browser.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about his privacy analysis app, Page X-Ray, ad tracking, and data privacy.</p>

<p>Show Notes: </p>

<p>00:02:17 Page Xray and Blacklight<br>
00:07:27 While you interact with one web page, who else is harvesting your information?<br>
00:14:13 Listen to which tracker Katherine used for about 10 minute, and promptly removed!<br>
00:15:57 What is malvertising<br>
00:18:55 What about the browser extension privacy trackers?<br>
00:25:54 Who should use PageXray?<br>
00:32:30 What are some good consumer tools?<br>
00:42:26 What is &quot;fingerprinting&quot; and how does a site &quot;fingerprint&quot; you?<br>
00:48:21 Covering your &quot;privates&quot;<br>
00:51:32 Marketers are chasing the shiny object called Digital<br>
00:53:26 what is the ratio of registered domains vs websites vs humans visitors vs real ad impressions?</p><p>Special Guest: Dr. Augustine Fou.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Episode 13: Surveillance Marketing" rel="nofollow" href="https://www.reality2cast.com/13">Episode 13: Surveillance Marketing</a> &mdash; Doc Searls and Katherine Druckman talk to Dr. Augustine Fou about surveillance marketing, ad tech, and privacy.</li><li><a title="Page X-Ray Data Privacy Analysis Featured in Episode 43" rel="nofollow" href="https://www.reality2cast.com/articles/page-xray-data-privacy-analysis">Page X-Ray Data Privacy Analysis Featured in Episode 43</a> &mdash; A brief overview of Page X-Ray.</li><li><a title="FouAnalytics - Ads By Domain" rel="nofollow" href="https://pagexray.fouanalytics.com/">FouAnalytics - Ads By Domain</a> &mdash; Privacy Analytics tool from Dr. Augustine Fou.</li><li><a title="Blacklight – The Markup" rel="nofollow" href="https://themarkup.org/blacklight">Blacklight – The Markup</a> &mdash; A Real-Time Website Privacy Inspector</li><li><a title="Privacy Badger" rel="nofollow" href="https://privacybadger.org/">Privacy Badger</a> &mdash; Privacy extension from the EFF.</li><li><a title="Ghostery: Online Privacy Made Easy" rel="nofollow" href="https://www.ghostery.com/">Ghostery: Online Privacy Made Easy</a> &mdash; Ghostery demystifies online privacy by exposing the forces that lurk behind your screen and enabling you to block them.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; The Brave browser.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 37: User Sovereignty and Decentralization, The Sequel</title>
  <link>https://www.reality2cast.com/37</link>
  <guid isPermaLink="false">1a167395-93b3-43a0-a659-7bb4d8e06d7f</guid>
  <pubDate>Fri, 24 Jul 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/1a167395-93b3-43a0-a659-7bb4d8e06d7f.mp3" length="73452961" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman continue their conversation with Dave Huseby about user sovereignty and decentralization, open source culture, cryptography, respectful technology, and more.</itunes:subtitle>
  <itunes:duration>1:27:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman continue their conversation with Dave Huseby, &lt;a href="https://www.hyperledger.org/" target="_blank" rel="nofollow noopener"&gt;Hyperledger&lt;/a&gt;'s Security Maven, about user sovereignty and decentralization, open source culture, cryptography, respectful technology, and more.&lt;/p&gt;

&lt;p&gt;For more about Dave's projects, keep an eye on:&lt;br&gt;
&lt;a href="https://vi.rs" target="_blank" rel="nofollow noopener"&gt;https://vi.rs&lt;/a&gt;&lt;br&gt;
&lt;a href="https://virs-group.slack.com" target="_blank" rel="nofollow noopener"&gt;https://virs-group.slack.com&lt;/a&gt;&lt;br&gt;
&lt;a href="https://medium.com/@dwh_3562" target="_blank" rel="nofollow noopener"&gt;https://medium.com/@dwh_3562&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;00:01:27 The importance of individual sovereignty, autonomy, independence, liberty etc.&lt;br&gt;
00:03:50 Linus doesn't take s#!t off of anybody...&lt;br&gt;
00:06:15 The legislative power shifts&lt;br&gt;
00:11:30 Wizards vs Moguls vs Geeks, who leads the way?!&lt;br&gt;
00:15:03 "Garage Engineering", it's a thing...&lt;br&gt;
00:20:00 Dave's take on passion vs. paycheck&lt;br&gt;
00:21:41 Passion projects&lt;br&gt;
00:31:03 Challenging the power structure, divorcing traffic from it's originators and recipients&lt;br&gt;
00:33:21 Going into cryptography&lt;br&gt;
00:36:54 Social rituals that Facebook has totally F'd up&lt;br&gt;
00:41:32 "Second Life" 'nuff said...&lt;br&gt;
00:43:30 So what are we going to do with that information???&lt;br&gt;
00:46:49 Dave's new project and stepping out of the shadows&lt;br&gt;
00:54:10 The motto is "Respectful Technology"&lt;br&gt;
00:56:20 What is the harm in non-user sovereign systems&lt;br&gt;
(01:06:46 The Jocks vs Nerds paradigm)&lt;br&gt;
01:07:25 The "Earn-it" act Special Guest: Dave Huseby.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, cryptography, user sovereignty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman continue their conversation with Dave Huseby, <a href="https://www.hyperledger.org/" rel="nofollow">Hyperledger</a>&#39;s Security Maven, about user sovereignty and decentralization, open source culture, cryptography, respectful technology, and more.</p>

<p>For more about Dave&#39;s projects, keep an eye on:<br>
<a href="https://vi.rs" rel="nofollow">https://vi.rs</a><br>
<a href="https://virs-group.slack.com" rel="nofollow">https://virs-group.slack.com</a><br>
<a href="https://medium.com/@dwh_3562" rel="nofollow">https://medium.com/@dwh_3562</a></p>

<p>Show notes:</p>

<p>00:01:27 The importance of individual sovereignty, autonomy, independence, liberty etc.<br>
00:03:50 Linus doesn&#39;t take s#!t off of anybody...<br>
00:06:15 The legislative power shifts<br>
00:11:30 Wizards vs Moguls vs Geeks, who leads the way?!<br>
00:15:03 &quot;Garage Engineering&quot;, it&#39;s a thing...<br>
00:20:00 Dave&#39;s take on passion vs. paycheck<br>
00:21:41 Passion projects<br>
00:31:03 Challenging the power structure, divorcing traffic from it&#39;s originators and recipients<br>
00:33:21 Going into cryptography<br>
00:36:54 Social rituals that Facebook has totally F&#39;d up<br>
00:41:32 &quot;Second Life&quot; &#39;nuff said...<br>
00:43:30 So what are we going to do with that information???<br>
00:46:49 Dave&#39;s new project and stepping out of the shadows<br>
00:54:10 The motto is &quot;Respectful Technology&quot;<br>
00:56:20 What is the harm in non-user sovereign systems<br>
(01:06:46 The Jocks vs Nerds paradigm)<br>
01:07:25 The &quot;Earn-it&quot; act</p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman continue their conversation with Dave Huseby, <a href="https://www.hyperledger.org/" rel="nofollow">Hyperledger</a>&#39;s Security Maven, about user sovereignty and decentralization, open source culture, cryptography, respectful technology, and more.</p>

<p>For more about Dave&#39;s projects, keep an eye on:<br>
<a href="https://vi.rs" rel="nofollow">https://vi.rs</a><br>
<a href="https://virs-group.slack.com" rel="nofollow">https://virs-group.slack.com</a><br>
<a href="https://medium.com/@dwh_3562" rel="nofollow">https://medium.com/@dwh_3562</a></p>

<p>Show notes:</p>

<p>00:01:27 The importance of individual sovereignty, autonomy, independence, liberty etc.<br>
00:03:50 Linus doesn&#39;t take s#!t off of anybody...<br>
00:06:15 The legislative power shifts<br>
00:11:30 Wizards vs Moguls vs Geeks, who leads the way?!<br>
00:15:03 &quot;Garage Engineering&quot;, it&#39;s a thing...<br>
00:20:00 Dave&#39;s take on passion vs. paycheck<br>
00:21:41 Passion projects<br>
00:31:03 Challenging the power structure, divorcing traffic from it&#39;s originators and recipients<br>
00:33:21 Going into cryptography<br>
00:36:54 Social rituals that Facebook has totally F&#39;d up<br>
00:41:32 &quot;Second Life&quot; &#39;nuff said...<br>
00:43:30 So what are we going to do with that information???<br>
00:46:49 Dave&#39;s new project and stepping out of the shadows<br>
00:54:10 The motto is &quot;Respectful Technology&quot;<br>
00:56:20 What is the harm in non-user sovereign systems<br>
(01:06:46 The Jocks vs Nerds paradigm)<br>
01:07:25 The &quot;Earn-it&quot; act</p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 35: Bruce Schneier on Truth, Reality, and Contact Tracing</title>
  <link>https://www.reality2cast.com/35</link>
  <guid isPermaLink="false">246859d5-3a8a-4989-8554-1c0cc25b379f</guid>
  <pubDate>Wed, 27 May 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/246859d5-3a8a-4989-8554-1c0cc25b379f.mp3" length="42786586" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Bruce Schneier about Contact Tracing, Digital Identity, hacking, privacy, and regulation.</itunes:subtitle>
  <itunes:duration>51:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to &lt;a href="https://www.schneier.com/" target="_blank" rel="nofollow noopener"&gt;Bruce Schneier&lt;/a&gt; about contact tracing, digital identity, hacking, privacy, and regulation.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;0:00:25: Contact tracing apps&lt;br&gt;
0:02:31: Contract tracing false positive and false negative&lt;br&gt;
0:04:24: Contract tracing apps adoption rate&lt;br&gt;
0:07:36: Katherine agrees apps should build more trust&lt;br&gt;
0:11:44: The 2nd anniversary of the GDPR&lt;br&gt;
0:13:31: Bruce talks about his RSA presentation about the notion of hacking&lt;br&gt;
0:15:26: Katherine dove tails hacking into contact tracing&lt;br&gt;
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)&lt;br&gt;
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?&lt;br&gt;
0:23:28: Do the people we entrust to regulate our tech even understand it?&lt;br&gt;
0:29:10: Should we give the FBI digital forensic capabilities?&lt;br&gt;
0:32:24: Katherine wonders if our cellphones are at all secure&lt;br&gt;
0:36:33: Doc ponders the future of travel&lt;br&gt;
0:38:18: Bruce predicts we're in the midst of a major system reset&lt;br&gt;
0:46:49: The political divide between the way people digest information&lt;br&gt;
0:49:36: Bruce: "Truth wins because it actually conforms to reality."&lt;/p&gt;

&lt;p&gt;Links:&lt;br&gt;
&lt;a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" target="_blank" rel="nofollow noopener"&gt;Bruce Schneier on COVID-19 Contact Tracing Apps&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" target="_blank" rel="nofollow noopener"&gt;Contact-tracing apps are not a solution to the COVID-19 crisis&lt;/a&gt; Special Guest: Bruce Schneier.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, COVID-19, coronavirus, hacking, identity, contact tracing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 34: Privacy and Self-Hosting</title>
  <link>https://www.reality2cast.com/34</link>
  <guid isPermaLink="false">718643ba-7e82-422c-aa87-e099aaad8298</guid>
  <pubDate>Fri, 24 Apr 2020 09:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/718643ba-7e82-422c-aa87-e099aaad8298.mp3" length="63104601" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Robert Douglass about self-hosting collaboration tools, and other current privacy topics.</itunes:subtitle>
  <itunes:duration>1:11:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Robert Douglass of &lt;a href="https://platform.sh/" target="_blank" rel="nofollow noopener"&gt;Platform.sh&lt;/a&gt; about self-hosting collaboration tools, and other current privacy topics.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;0:00:54: Introduction to a couple of tools&lt;/p&gt;

&lt;p&gt;0:02:04: Doc's take on Zoom.&lt;/p&gt;

&lt;p&gt;0:05:13: A lot of what we do online is not especially private.&lt;/p&gt;

&lt;p&gt;0:06:33: Apple and Google and contact tracing.&lt;/p&gt;

&lt;p&gt;0:09:00: Healthcare is a B2B insurance business.&lt;/p&gt;

&lt;p&gt;0:11:15: Health information and advertising.&lt;/p&gt;

&lt;p&gt;0:13:04: Convenience versus privacy.&lt;/p&gt;

&lt;p&gt;0:13:26: SaaS products and convenience, Facebook, Apple. Concerns of the individual versus the concerns of the many.&lt;/p&gt;

&lt;p&gt;0:15:46: The inevitable part where we go dark.&lt;/p&gt;

&lt;p&gt;0:16:02: We're in the weirdest moment in modern civilization.&lt;/p&gt;

&lt;p&gt;0:20:36: Radio, Internet, Television and Trump.&lt;/p&gt;

&lt;p&gt;0:22:21: Bill Gates.&lt;/p&gt;

&lt;p&gt;0:23:45: SaaS collaboration tools and privacy.&lt;/p&gt;

&lt;p&gt;0:27:20: Who can you trust with your data, especially during a pandemic among questionable actors.&lt;/p&gt;

&lt;p&gt;0:28:00: Mattermost&lt;/p&gt;

&lt;p&gt;0:30:23: NextCloud&lt;/p&gt;

&lt;p&gt;0:31:07: Jitsi&lt;/p&gt;

&lt;p&gt;0:33:19: Cost differences.&lt;/p&gt;

&lt;p&gt;0:38:31: ideology and dogmas way easier than real life, right?&lt;/p&gt;

&lt;p&gt;0:39:23: Edward Snowden and Signal.&lt;/p&gt;

&lt;p&gt;0:40:35: Signal vs. What's App.&lt;/p&gt;

&lt;p&gt;0:41:20: Self-hosting and technical skill. Privacy trade-offs.&lt;/p&gt;

&lt;p&gt;0:44:17: Apple watch.&lt;/p&gt;

&lt;p&gt;0:45:12: Pragmatism.&lt;/p&gt;

&lt;p&gt;0:46:58: Zoom and security scrutiny.&lt;/p&gt;

&lt;p&gt;0:50:54: Facebook, privacy, and politics.&lt;/p&gt;

&lt;p&gt;0:55:29: Facebook vs. Google.&lt;/p&gt;

&lt;p&gt;0:56:36: Zoom scrutiny and appeal.&lt;/p&gt;

&lt;p&gt;1:02:11: Conferences, air travel, climate change.&lt;/p&gt;

&lt;p&gt;1:08:07: COVID innovation.&lt;/p&gt;

&lt;p&gt;1:11:23: Stay home, be safe, deploy Mattermost and wash your hands. Special Guest: Robert Douglass.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, hosting, slack, zoom, mattermost, nextcloud, jitsi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Robert Douglass of <a href="https://platform.sh/" rel="nofollow">Platform.sh</a> about self-hosting collaboration tools, and other current privacy topics.</p>

<p>Show notes:</p>

<p>0:00:54: Introduction to a couple of tools</p>

<p>0:02:04: Doc&#39;s take on Zoom.</p>

<p>0:05:13: A lot of what we do online is not especially private.</p>

<p>0:06:33: Apple and Google and contact tracing.</p>

<p>0:09:00: Healthcare is a B2B insurance business.</p>

<p>0:11:15: Health information and advertising.</p>

<p>0:13:04: Convenience versus privacy.</p>

<p>0:13:26: SaaS products and convenience, Facebook, Apple. Concerns of the individual versus the concerns of the many.</p>

<p>0:15:46: The inevitable part where we go dark.</p>

<p>0:16:02: We&#39;re in the weirdest moment in modern civilization.</p>

<p>0:20:36: Radio, Internet, Television and Trump.</p>

<p>0:22:21: Bill Gates.</p>

<p>0:23:45: SaaS collaboration tools and privacy.</p>

<p>0:27:20: Who can you trust with your data, especially during a pandemic among questionable actors.</p>

<p>0:28:00: Mattermost</p>

<p>0:30:23: NextCloud</p>

<p>0:31:07: Jitsi</p>

<p>0:33:19: Cost differences.</p>

<p>0:38:31: ideology and dogmas way easier than real life, right?</p>

<p>0:39:23: Edward Snowden and Signal.</p>

<p>0:40:35: Signal vs. What&#39;s App.</p>

<p>0:41:20: Self-hosting and technical skill. Privacy trade-offs.</p>

<p>0:44:17: Apple watch.</p>

<p>0:45:12: Pragmatism.</p>

<p>0:46:58: Zoom and security scrutiny.</p>

<p>0:50:54: Facebook, privacy, and politics.</p>

<p>0:55:29: Facebook vs. Google.</p>

<p>0:56:36: Zoom scrutiny and appeal.</p>

<p>1:02:11: Conferences, air travel, climate change.</p>

<p>1:08:07: COVID innovation.</p>

<p>1:11:23: Stay home, be safe, deploy Mattermost and wash your hands.</p><p>Special Guest: Robert Douglass.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Robert Douglass of <a href="https://platform.sh/" rel="nofollow">Platform.sh</a> about self-hosting collaboration tools, and other current privacy topics.</p>

<p>Show notes:</p>

<p>0:00:54: Introduction to a couple of tools</p>

<p>0:02:04: Doc&#39;s take on Zoom.</p>

<p>0:05:13: A lot of what we do online is not especially private.</p>

<p>0:06:33: Apple and Google and contact tracing.</p>

<p>0:09:00: Healthcare is a B2B insurance business.</p>

<p>0:11:15: Health information and advertising.</p>

<p>0:13:04: Convenience versus privacy.</p>

<p>0:13:26: SaaS products and convenience, Facebook, Apple. Concerns of the individual versus the concerns of the many.</p>

<p>0:15:46: The inevitable part where we go dark.</p>

<p>0:16:02: We&#39;re in the weirdest moment in modern civilization.</p>

<p>0:20:36: Radio, Internet, Television and Trump.</p>

<p>0:22:21: Bill Gates.</p>

<p>0:23:45: SaaS collaboration tools and privacy.</p>

<p>0:27:20: Who can you trust with your data, especially during a pandemic among questionable actors.</p>

<p>0:28:00: Mattermost</p>

<p>0:30:23: NextCloud</p>

<p>0:31:07: Jitsi</p>

<p>0:33:19: Cost differences.</p>

<p>0:38:31: ideology and dogmas way easier than real life, right?</p>

<p>0:39:23: Edward Snowden and Signal.</p>

<p>0:40:35: Signal vs. What&#39;s App.</p>

<p>0:41:20: Self-hosting and technical skill. Privacy trade-offs.</p>

<p>0:44:17: Apple watch.</p>

<p>0:45:12: Pragmatism.</p>

<p>0:46:58: Zoom and security scrutiny.</p>

<p>0:50:54: Facebook, privacy, and politics.</p>

<p>0:55:29: Facebook vs. Google.</p>

<p>0:56:36: Zoom scrutiny and appeal.</p>

<p>1:02:11: Conferences, air travel, climate change.</p>

<p>1:08:07: COVID innovation.</p>

<p>1:11:23: Stay home, be safe, deploy Mattermost and wash your hands.</p><p>Special Guest: Robert Douglass.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 33: Pandemic Edition</title>
  <link>https://www.reality2cast.com/33</link>
  <guid isPermaLink="false">ece6f616-0a96-4c00-b146-3f074d73ecdf</guid>
  <pubDate>Thu, 26 Mar 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ece6f616-0a96-4c00-b146-3f074d73ecdf.mp3" length="42031975" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin, Petros Koutoupis, and Shawn Powers about the new realities we're facing as a result of COVID-19.</itunes:subtitle>
  <itunes:duration>1:09:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin, Petros Koutoupis, and Shawn Powers about the new realities we're facing as a result of COVID-19.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;0:04:08: How is this situation a little bit different from what we're used to?&lt;/p&gt;

&lt;p&gt;0:04:36: E-learning&lt;/p&gt;

&lt;p&gt;0:06:00: Shawn on e-learning and computer-based training.&lt;/p&gt;

&lt;p&gt;0:08:09: Kids without computer or internet access.&lt;/p&gt;

&lt;p&gt;0:11:31: What is lockdown? What’s on the horizon?&lt;/p&gt;

&lt;p&gt;0:14:14: Remote work, how to do it well.&lt;/p&gt;

&lt;p&gt;0:16:22: What can distributed open source software teams teach everyone?&lt;/p&gt;

&lt;p&gt;0:17:35: This is not normal right now. Don’t judge remote work.&lt;/p&gt;

&lt;p&gt;0:18:56: The chicken suppression system's working.&lt;/p&gt;

&lt;p&gt;0:25:12: Asynchronous communication, time zones.&lt;/p&gt;

&lt;p&gt;0:27:19: This plague may be elevating the Big Bad companies.&lt;/p&gt;

&lt;p&gt;0:30:21: Ethical and privacy concerns.&lt;/p&gt;

&lt;p&gt;0:35:20: Should harvested data be used to save lives?&lt;/p&gt;

&lt;p&gt;0:37:29: Apple privacy&lt;/p&gt;

&lt;p&gt;0:37:49: Fourth amendment concerns.&lt;/p&gt;

&lt;p&gt;0:39:11 Facial recognition.&lt;/p&gt;

&lt;p&gt;0:43:12 Law enforcement and Clearview AI.&lt;/p&gt;

&lt;p&gt;0:44:12: What is the step too far? What are the unintended consequences?&lt;/p&gt;

&lt;p&gt;0:44:44: Local vs. large scale communication.&lt;/p&gt;

&lt;p&gt;0:47:03: Shawn is hopeful.&lt;/p&gt;

&lt;p&gt;0:49:05: Innovation in the works.&lt;/p&gt;

&lt;p&gt;0:52:45: Return to normal?&lt;/p&gt;

&lt;p&gt;0:55:52: Small business.&lt;/p&gt;

&lt;p&gt;0:57:16: Shawn’s bidet.&lt;/p&gt;

&lt;p&gt;0:57:34: What happens to conferences?&lt;/p&gt;

&lt;p&gt;1:02:33 DrupalCon and #vanlife.&lt;/p&gt;

&lt;p&gt;1:07:58 Shawn: Wash your hands. Special Guests: Kyle Rankin, Petros Koutoupis, and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, COVID-19, coronavirus, telecommuting, remote work, WFH</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin, Petros Koutoupis, and Shawn Powers about the new realities we&#39;re facing as a result of COVID-19.</p>

<p>Show notes:</p>

<p>0:04:08: How is this situation a little bit different from what we&#39;re used to?</p>

<p>0:04:36: E-learning</p>

<p>0:06:00: Shawn on e-learning and computer-based training.</p>

<p>0:08:09: Kids without computer or internet access.</p>

<p>0:11:31: What is lockdown? What’s on the horizon?</p>

<p>0:14:14: Remote work, how to do it well.</p>

<p>0:16:22: What can distributed open source software teams teach everyone?</p>

<p>0:17:35: This is not normal right now. Don’t judge remote work.</p>

<p>0:18:56: The chicken suppression system&#39;s working.</p>

<p>0:25:12: Asynchronous communication, time zones.</p>

<p>0:27:19: This plague may be elevating the Big Bad companies.</p>

<p>0:30:21: Ethical and privacy concerns.</p>

<p>0:35:20: Should harvested data be used to save lives?</p>

<p>0:37:29: Apple privacy</p>

<p>0:37:49: Fourth amendment concerns.</p>

<p>0:39:11 Facial recognition.</p>

<p>0:43:12 Law enforcement and Clearview AI.</p>

<p>0:44:12: What is the step too far? What are the unintended consequences?</p>

<p>0:44:44: Local vs. large scale communication.</p>

<p>0:47:03: Shawn is hopeful.</p>

<p>0:49:05: Innovation in the works.</p>

<p>0:52:45: Return to normal?</p>

<p>0:55:52: Small business.</p>

<p>0:57:16: Shawn’s bidet.</p>

<p>0:57:34: What happens to conferences?</p>

<p>1:02:33 DrupalCon and #vanlife.</p>

<p>1:07:58 Shawn: Wash your hands.</p><p>Special Guests: Kyle Rankin, Petros Koutoupis, and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin, Petros Koutoupis, and Shawn Powers about the new realities we&#39;re facing as a result of COVID-19.</p>

<p>Show notes:</p>

<p>0:04:08: How is this situation a little bit different from what we&#39;re used to?</p>

<p>0:04:36: E-learning</p>

<p>0:06:00: Shawn on e-learning and computer-based training.</p>

<p>0:08:09: Kids without computer or internet access.</p>

<p>0:11:31: What is lockdown? What’s on the horizon?</p>

<p>0:14:14: Remote work, how to do it well.</p>

<p>0:16:22: What can distributed open source software teams teach everyone?</p>

<p>0:17:35: This is not normal right now. Don’t judge remote work.</p>

<p>0:18:56: The chicken suppression system&#39;s working.</p>

<p>0:25:12: Asynchronous communication, time zones.</p>

<p>0:27:19: This plague may be elevating the Big Bad companies.</p>

<p>0:30:21: Ethical and privacy concerns.</p>

<p>0:35:20: Should harvested data be used to save lives?</p>

<p>0:37:29: Apple privacy</p>

<p>0:37:49: Fourth amendment concerns.</p>

<p>0:39:11 Facial recognition.</p>

<p>0:43:12 Law enforcement and Clearview AI.</p>

<p>0:44:12: What is the step too far? What are the unintended consequences?</p>

<p>0:44:44: Local vs. large scale communication.</p>

<p>0:47:03: Shawn is hopeful.</p>

<p>0:49:05: Innovation in the works.</p>

<p>0:52:45: Return to normal?</p>

<p>0:55:52: Small business.</p>

<p>0:57:16: Shawn’s bidet.</p>

<p>0:57:34: What happens to conferences?</p>

<p>1:02:33 DrupalCon and #vanlife.</p>

<p>1:07:58 Shawn: Wash your hands.</p><p>Special Guests: Kyle Rankin, Petros Koutoupis, and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 31: Personal Devices are Personal</title>
  <link>https://www.reality2cast.com/31</link>
  <guid isPermaLink="false">56792e70-8a25-4e5f-80a4-4f511964327f</guid>
  <pubDate>Mon, 03 Feb 2020 09:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/56792e70-8a25-4e5f-80a4-4f511964327f.mp3" length="40472077" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin of Purism about mobile phones, their security and privacy vulnerabilities, and Purism's new Librem 5 device.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin, CSO of &lt;a href="https://puri.sm/" target="_blank" rel="nofollow noopener"&gt;Purism&lt;/a&gt;, about mobile phones, their security and privacy vulnerabilities, and Purism's new &lt;a href="https://puri.sm/products/librem-5/" target="_blank" rel="nofollow noopener"&gt;Librem 5&lt;/a&gt; device. Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, mobile phones, hardware</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin, CSO of <a href="https://puri.sm/" rel="nofollow">Purism</a>, about mobile phones, their security and privacy vulnerabilities, and Purism&#39;s new <a href="https://puri.sm/products/librem-5/" rel="nofollow">Librem 5</a> device.</p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin, CSO of <a href="https://puri.sm/" rel="nofollow">Purism</a>, about mobile phones, their security and privacy vulnerabilities, and Purism&#39;s new <a href="https://puri.sm/products/librem-5/" rel="nofollow">Librem 5</a> device.</p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 25: A Chat With Gabriel Weinberg of DuckDuckGo</title>
  <link>https://www.reality2cast.com/25</link>
  <guid isPermaLink="false">c601f5df-320c-4d13-bc7b-29252fe46229</guid>
  <pubDate>Thu, 15 Aug 2019 10:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/c601f5df-320c-4d13-bc7b-29252fe46229.mp3" length="34143124" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Gabriel Weinberg, CEO &amp; Founder of DuckDuckGo, and co-author of _Super Thinking_ and _Traction_.</itunes:subtitle>
  <itunes:duration>42:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Gabriel Weinberg, CEO &amp;amp; Founder of DuckDuckGo, and co-author of &lt;em&gt;Super Thinking&lt;/em&gt; and &lt;em&gt;Traction&lt;/em&gt;. Special Guest: Gabriel Weinberg.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Gabriel Weinberg, CEO &amp; Founder of DuckDuckGo, and co-author of <em>Super Thinking</em> and <em>Traction</em>.</p><p>Special Guest: Gabriel Weinberg.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Gabriel Weinberg, CEO &amp; Founder of DuckDuckGo, and co-author of <em>Super Thinking</em> and <em>Traction</em>.</p><p>Special Guest: Gabriel Weinberg.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 2: Privacy is Personal</title>
  <link>https://www.reality2cast.com/2</link>
  <guid isPermaLink="false">fa82ed49-f5dd-4787-876b-ee77f1dcb0fa</guid>
  <pubDate>Fri, 12 Oct 2018 23:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/fa82ed49-f5dd-4787-876b-ee77f1dcb0fa.mp3" length="25995725" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>27:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman talks to Doc Searls about consumer privacy, Main Street, and heart attacks at Walmart.&lt;/p&gt;

&lt;p&gt;Links mentioned:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/torproject/status/1049370119338713088" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/torproject/status/1049370119338713088&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://customercommons.org/" target="_blank" rel="nofollow noopener"&gt;http://customercommons.org/&lt;/a&gt; &lt;/p&gt;
</description>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman talks to Doc Searls about consumer privacy, Main Street, and heart attacks at Walmart.</p>

<p>Links mentioned:</p>

<p><a href="https://twitter.com/torproject/status/1049370119338713088" rel="nofollow">https://twitter.com/torproject/status/1049370119338713088</a></p>

<p><a href="http://customercommons.org/" rel="nofollow">http://customercommons.org/</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman talks to Doc Searls about consumer privacy, Main Street, and heart attacks at Walmart.</p>

<p>Links mentioned:</p>

<p><a href="https://twitter.com/torproject/status/1049370119338713088" rel="nofollow">https://twitter.com/torproject/status/1049370119338713088</a></p>

<p><a href="http://customercommons.org/" rel="nofollow">http://customercommons.org/</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 1: Digital Privacy</title>
  <link>https://www.reality2cast.com/1</link>
  <guid isPermaLink="false">70d4832f-7b25-44c7-a2e4-52a79f84e251</guid>
  <pubDate>Wed, 03 Oct 2018 23:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/70d4832f-7b25-44c7-a2e4-52a79f84e251.mp3" length="40773298" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>28:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman talks to Doc Searls about digital privacy, wizards and muggles, and boiled frogs.&lt;/p&gt;
</description>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman talks to Doc Searls about digital privacy, wizards and muggles, and boiled frogs.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman talks to Doc Searls about digital privacy, wizards and muggles, and boiled frogs.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
