<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 16 May 2026 07:26:08 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Reality 2.0 - Episodes Tagged with “Security”</title>
    <link>https://www.reality2cast.com/tags/security</link>
    <pubDate>Wed, 08 Oct 2025 16:00:00 -0400</pubDate>
    <description>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</description>
    <language>en</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where tech meets reality. Navigating technology, privacy, security and open source. </itunes:subtitle>
    <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
    <itunes:summary>Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as  Linux and open source and other current issues.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>technology, privacy, open source, linux, security, cybersecurity, infosec, FOSS, FLOSS</itunes:keywords>
    <itunes:owner>
      <itunes:name>Katherine Druckman and Doc Searls</itunes:name>
      <itunes:email>podcast@reality2cast.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Episode 159: Building Sustainable Open Source: Keeping the Lights On</title>
  <link>https://www.reality2cast.com/159</link>
  <guid isPermaLink="false">17443c1d-8638-4285-8d48-a80d3b8cfa3e</guid>
  <pubDate>Wed, 08 Oct 2025 16:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/17443c1d-8638-4285-8d48-a80d3b8cfa3e.mp3" length="27521430" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. </itunes:subtitle>
  <itunes:duration>27:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package managers used widely in both hobbyist and enterprise applications. The conversation touches on the complexities of open source dependency management, the influence of the EU's Cyber Resilience Act, and the interconnectedness of various open source initiatives including the Valkey project. Lori shares insights into the Rust Foundation's outreach efforts and encourages community engagement to ensure open source projects continue to thrive. &lt;/p&gt;

&lt;p&gt;00:00 Welcome and Introduction&lt;br&gt;
00:28 Meet Lori Lorusso from the Rust Foundation&lt;br&gt;
01:58 Open Source Sustainability and the Joint Statement&lt;br&gt;
04:34 Challenges in Open Source Contribution&lt;br&gt;
06:36 The Importance of Supporting Open Source Projects&lt;br&gt;
15:38 The Cyber Resilience Act and Its Implications&lt;br&gt;
21:40 Engaging with the Rust Foundation&lt;br&gt;
24:36 The Value of Open Source Communities&lt;br&gt;
26:33 Conclusion and Upcoming Events&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Lori Lorusso.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, Rust, Security, OpenSSF</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package managers used widely in both hobbyist and enterprise applications. The conversation touches on the complexities of open source dependency management, the influence of the EU&#39;s Cyber Resilience Act, and the interconnectedness of various open source initiatives including the Valkey project. Lori shares insights into the Rust Foundation&#39;s outreach efforts and encourages community engagement to ensure open source projects continue to thrive. </p>

<p>00:00 Welcome and Introduction<br>
00:28 Meet Lori Lorusso from the Rust Foundation<br>
01:58 Open Source Sustainability and the Joint Statement<br>
04:34 Challenges in Open Source Contribution<br>
06:36 The Importance of Supporting Open Source Projects<br>
15:38 The Cyber Resilience Act and Its Implications<br>
21:40 Engaging with the Rust Foundation<br>
24:36 The Value of Open Source Communities<br>
26:33 Conclusion and Upcoming Events</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Lori Lorusso.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship – Open Source Security Foundation" rel="nofollow" href="https://openssf.org/blog/2025/09/23/open-infrastructure-is-not-free-a-joint-statement-on-sustainable-stewardship/">Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship – Open Source Security Foundation</a> &mdash; An Open Letter from the Stewards of Public Open Source Infrastructure
Over the past two decades, open source has revolutionized the way software is developed. Every modern application, whether written in Java, JavaScript, Python, Rust, PHP, or beyond, depends on public package registries like Maven Central, PyPI, crates.io, Packagist and open-vsx to retrieve, share, and validate dependencies. These registries have become foundational digital infrastructure – not just for open source, but for the global software supply chain.</li><li><a title="The Rust Foundation - Official" rel="nofollow" href="https://rustfoundation.org/">The Rust Foundation - Official</a> &mdash; THE RUST FOUNDATION is an independent nonprofit committed to a safe, secure, and sustainable future powered by the Rust programming language.

We believe that investing in the global open-source community is essential to maintaining a healthy and performant technological ecosystem — for individuals and organizations alike.</li><li><a title="xkcd: Dependency" rel="nofollow" href="https://xkcd.com/2347/">xkcd: Dependency</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package managers used widely in both hobbyist and enterprise applications. The conversation touches on the complexities of open source dependency management, the influence of the EU&#39;s Cyber Resilience Act, and the interconnectedness of various open source initiatives including the Valkey project. Lori shares insights into the Rust Foundation&#39;s outreach efforts and encourages community engagement to ensure open source projects continue to thrive. </p>

<p>00:00 Welcome and Introduction<br>
00:28 Meet Lori Lorusso from the Rust Foundation<br>
01:58 Open Source Sustainability and the Joint Statement<br>
04:34 Challenges in Open Source Contribution<br>
06:36 The Importance of Supporting Open Source Projects<br>
15:38 The Cyber Resilience Act and Its Implications<br>
21:40 Engaging with the Rust Foundation<br>
24:36 The Value of Open Source Communities<br>
26:33 Conclusion and Upcoming Events</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Lori Lorusso.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship – Open Source Security Foundation" rel="nofollow" href="https://openssf.org/blog/2025/09/23/open-infrastructure-is-not-free-a-joint-statement-on-sustainable-stewardship/">Open Infrastructure is Not Free: A Joint Statement on Sustainable Stewardship – Open Source Security Foundation</a> &mdash; An Open Letter from the Stewards of Public Open Source Infrastructure
Over the past two decades, open source has revolutionized the way software is developed. Every modern application, whether written in Java, JavaScript, Python, Rust, PHP, or beyond, depends on public package registries like Maven Central, PyPI, crates.io, Packagist and open-vsx to retrieve, share, and validate dependencies. These registries have become foundational digital infrastructure – not just for open source, but for the global software supply chain.</li><li><a title="The Rust Foundation - Official" rel="nofollow" href="https://rustfoundation.org/">The Rust Foundation - Official</a> &mdash; THE RUST FOUNDATION is an independent nonprofit committed to a safe, secure, and sustainable future powered by the Rust programming language.

We believe that investing in the global open-source community is essential to maintaining a healthy and performant technological ecosystem — for individuals and organizations alike.</li><li><a title="xkcd: Dependency" rel="nofollow" href="https://xkcd.com/2347/">xkcd: Dependency</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 158: Reality 2025: Bridging AI, Security, and Open Source Challenges</title>
  <link>https://www.reality2cast.com/158</link>
  <guid isPermaLink="false">8ea62d3e-5d5a-4f8a-8bf4-1e0482e539d1</guid>
  <pubDate>Thu, 03 Jul 2025 13:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/8ea62d3e-5d5a-4f8a-8bf4-1e0482e539d1.mp3" length="35489335" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss  a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potential for AI to assist in personal and professional tasks, and the importance of standardizing and simplifying best practices for AI deployment. The episode wraps up with insights on the innovative 'My Terms' project aimed at flipping the cookie consent model to better respect user privacy. </itunes:subtitle>
  <itunes:duration>34:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss  a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potential for AI to assist in personal and professional tasks, and the importance of standardizing and simplifying best practices for AI deployment. The episode wraps up with insights on the innovative 'My Terms' project aimed at flipping the cookie consent model to better respect user privacy. The hosts also emphasize the importance of constructive conversations and maintaining optimism about the future of technology.&lt;/p&gt;

&lt;p&gt;00:00 Welcome Back to Reality 2.0&lt;br&gt;
00:36 Upcoming Open Source Summit&lt;br&gt;
01:03 Linux Foundation and AI Initiatives&lt;br&gt;
04:20 Apple's Approach to Personal AI&lt;br&gt;
05:11 Challenges of AI and Data Privacy&lt;br&gt;
07:16 Potential of Personal AI Models&lt;br&gt;
11:10 Human Interaction with AI&lt;br&gt;
26:50 Innovations in Cookie Consent&lt;br&gt;
31:08 Commitment to More Frequent Episodes&lt;br&gt;
33:16 Closing Remarks and Future Plans&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, AI, security, cloud native</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss  a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potential for AI to assist in personal and professional tasks, and the importance of standardizing and simplifying best practices for AI deployment. The episode wraps up with insights on the innovative &#39;My Terms&#39; project aimed at flipping the cookie consent model to better respect user privacy. The hosts also emphasize the importance of constructive conversations and maintaining optimism about the future of technology.</p>

<p>00:00 Welcome Back to Reality 2.0<br>
00:36 Upcoming Open Source Summit<br>
01:03 Linux Foundation and AI Initiatives<br>
04:20 Apple&#39;s Approach to Personal AI<br>
05:11 Challenges of AI and Data Privacy<br>
07:16 Potential of Personal AI Models<br>
11:10 Human Interaction with AI<br>
26:50 Innovations in Cookie Consent<br>
31:08 Commitment to More Frequent Episodes<br>
33:16 Closing Remarks and Future Plans</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Kwaai - KwaaiNet" rel="nofollow" href="https://www.kwaai.ai/kwaainet">Kwaai - KwaaiNet</a> &mdash; AI running distributed on a P2P fabric, built

By the People, For the People

Imagine what we can do.</li><li><a title="Open Source Summit North America" rel="nofollow" href="https://events.linuxfoundation.org/open-source-summit-north-america/">Open Source Summit North America</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss  a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potential for AI to assist in personal and professional tasks, and the importance of standardizing and simplifying best practices for AI deployment. The episode wraps up with insights on the innovative &#39;My Terms&#39; project aimed at flipping the cookie consent model to better respect user privacy. The hosts also emphasize the importance of constructive conversations and maintaining optimism about the future of technology.</p>

<p>00:00 Welcome Back to Reality 2.0<br>
00:36 Upcoming Open Source Summit<br>
01:03 Linux Foundation and AI Initiatives<br>
04:20 Apple&#39;s Approach to Personal AI<br>
05:11 Challenges of AI and Data Privacy<br>
07:16 Potential of Personal AI Models<br>
11:10 Human Interaction with AI<br>
26:50 Innovations in Cookie Consent<br>
31:08 Commitment to More Frequent Episodes<br>
33:16 Closing Remarks and Future Plans</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Kwaai - KwaaiNet" rel="nofollow" href="https://www.kwaai.ai/kwaainet">Kwaai - KwaaiNet</a> &mdash; AI running distributed on a P2P fabric, built

By the People, For the People

Imagine what we can do.</li><li><a title="Open Source Summit North America" rel="nofollow" href="https://events.linuxfoundation.org/open-source-summit-north-america/">Open Source Summit North America</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 145: Authenticating Content With Cryptography</title>
  <link>https://www.reality2cast.com/145</link>
  <guid isPermaLink="false">14ed9d2f-3970-4b16-ab04-28755892aefa</guid>
  <pubDate>Fri, 05 May 2023 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/14ed9d2f-3970-4b16-ab04-28755892aefa.mp3" length="55542971" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin about a proposal for authenticating content with cryptographic signing, and saving the internet.</itunes:subtitle>
  <itunes:duration>56:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin about a proposal for authenticating content with cryptographic signing, and saving the internet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about a proposal for authenticating content with cryptographic signing, and saving the internet.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="LLMs break the internet. Signing everything fixes it." rel="nofollow" href="https://subconscious.substack.com/p/llms-break-the-internet-signing-everything">LLMs break the internet. Signing everything fixes it.</a> &mdash; LLMs break the internet. The going rate for GPT-4 is $0.06 per 1000 tokens, or about $0.00008 per word. New open source models like Dolly and StableLM will drop costs even further, and without the content restrictions.

Thought has never been so cheap. Creative expression has never been so accessible. Also spam, phishing, harassment mobs, and mass influence ops have never been so cheap, so accessible.

You thought the internet was a mess before? Get ready for bots that beat the Turing test, synthesize your voice, generate fake social consensus at scale. We’re seeing the beginnings of this already. Expect a tidal wave of spam, identity theft, phishing, ransomware over the next 36 months.

</li><li><a title="See the websites that make AI bots like ChatGPT sound so smart - Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/interactive/2023/ai-chatbot-learning/">See the websites that make AI bots like ChatGPT sound so smart - Washington Post</a> &mdash; AI chatbots have exploded in popularity over the past four months, stunning the public with their awesome abilities, from writing sophisticated term papers to holding unnervingly lucid conversations.

Chatbots cannot think like humans: They do not actually understand what they say. They can mimic human speech because the artificial intelligence that powers them has ingested a gargantuan amount of text, mostly scraped from the internet.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about a proposal for authenticating content with cryptographic signing, and saving the internet.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="LLMs break the internet. Signing everything fixes it." rel="nofollow" href="https://subconscious.substack.com/p/llms-break-the-internet-signing-everything">LLMs break the internet. Signing everything fixes it.</a> &mdash; LLMs break the internet. The going rate for GPT-4 is $0.06 per 1000 tokens, or about $0.00008 per word. New open source models like Dolly and StableLM will drop costs even further, and without the content restrictions.

Thought has never been so cheap. Creative expression has never been so accessible. Also spam, phishing, harassment mobs, and mass influence ops have never been so cheap, so accessible.

You thought the internet was a mess before? Get ready for bots that beat the Turing test, synthesize your voice, generate fake social consensus at scale. We’re seeing the beginnings of this already. Expect a tidal wave of spam, identity theft, phishing, ransomware over the next 36 months.

</li><li><a title="See the websites that make AI bots like ChatGPT sound so smart - Washington Post" rel="nofollow" href="https://www.washingtonpost.com/technology/interactive/2023/ai-chatbot-learning/">See the websites that make AI bots like ChatGPT sound so smart - Washington Post</a> &mdash; AI chatbots have exploded in popularity over the past four months, stunning the public with their awesome abilities, from writing sophisticated term papers to holding unnervingly lucid conversations.

Chatbots cannot think like humans: They do not actually understand what they say. They can mimic human speech because the artificial intelligence that powers them has ingested a gargantuan amount of text, mostly scraped from the internet.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 134: Email Disaster, Encrypted Backups and Chat GPT</title>
  <link>https://www.reality2cast.com/134</link>
  <guid isPermaLink="false">266cec39-0608-4a36-aa09-f96f275c99c8</guid>
  <pubDate>Tue, 13 Dec 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/266cec39-0608-4a36-aa09-f96f275c99c8.mp3" length="51690448" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls, Katherine Druckman, and Shawn have fun with ChatGPT, rant about email disasters, and chat about Apple's new encrypted backups.</itunes:subtitle>
  <itunes:duration>53:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls, Katherine Druckman, and Shawn have fun with ChatGPT, rant about email disasters, and chat about Apple's new encrypted backups.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls, Katherine Druckman, and Shawn have fun with ChatGPT, rant about email disasters, and chat about Apple&#39;s new encrypted backups.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="ChatGPT: Optimizing Language Models for Dialogue" rel="nofollow" href="https://openai.com/blog/chatgpt/">ChatGPT: Optimizing Language Models for Dialogue</a> &mdash; We’ve trained a model called ChatGPT which interacts in a conversational way. The dialogue format makes it possible for ChatGPT to answer followup questions, admit its mistakes, challenge incorrect premises, and reject inappropriate requests. ChatGPT is a sibling model to InstructGPT, which is trained to follow an instruction in a prompt and provide a detailed&nbsp;response.</li><li><a title="AI tells me if AI will write novels. - vlogbrothers on YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=ZMTConHyTYU">AI tells me if AI will write novels. - vlogbrothers on YouTube</a> &mdash; In which a text-generation AI promises John that of course it won't replace him.
</li><li><a title="Apple is adding end-to-end encryption to iCloud backups - The Verge" rel="nofollow" href="https://www.theverge.com/2022/12/7/23498580/apple-end-to-end-encryption-icloud-backups-advanced-data-protection">Apple is adding end-to-end encryption to iCloud backups - The Verge</a> &mdash; / Apple is expanding its iCloud security features and introducing support for security keys for two-factor authentication.</li><li><a title="Rackspace confirms ransomware behind days-long email outage • The Register" rel="nofollow" href="https://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/">Rackspace confirms ransomware behind days-long email outage • The Register</a> &mdash; 
UPDATED Rackspace has admitted a ransomware infection was to blame for the days-long email outage that disrupted services for customers.&nbsp;

The security snafu took down some of Rackspace's hosted Microsoft Exchange services on Friday afternoon.&nbsp;In its most recent update, posted at 0826 Eastern Time on Tuesday, Rackspace said it has now "determined this suspicious activity was the result of a ransomware incident," and has hired a "leading cyber defense firm to investigate."</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls, Katherine Druckman, and Shawn have fun with ChatGPT, rant about email disasters, and chat about Apple&#39;s new encrypted backups.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="ChatGPT: Optimizing Language Models for Dialogue" rel="nofollow" href="https://openai.com/blog/chatgpt/">ChatGPT: Optimizing Language Models for Dialogue</a> &mdash; We’ve trained a model called ChatGPT which interacts in a conversational way. The dialogue format makes it possible for ChatGPT to answer followup questions, admit its mistakes, challenge incorrect premises, and reject inappropriate requests. ChatGPT is a sibling model to InstructGPT, which is trained to follow an instruction in a prompt and provide a detailed&nbsp;response.</li><li><a title="AI tells me if AI will write novels. - vlogbrothers on YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=ZMTConHyTYU">AI tells me if AI will write novels. - vlogbrothers on YouTube</a> &mdash; In which a text-generation AI promises John that of course it won't replace him.
</li><li><a title="Apple is adding end-to-end encryption to iCloud backups - The Verge" rel="nofollow" href="https://www.theverge.com/2022/12/7/23498580/apple-end-to-end-encryption-icloud-backups-advanced-data-protection">Apple is adding end-to-end encryption to iCloud backups - The Verge</a> &mdash; / Apple is expanding its iCloud security features and introducing support for security keys for two-factor authentication.</li><li><a title="Rackspace confirms ransomware behind days-long email outage • The Register" rel="nofollow" href="https://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/">Rackspace confirms ransomware behind days-long email outage • The Register</a> &mdash; 
UPDATED Rackspace has admitted a ransomware infection was to blame for the days-long email outage that disrupted services for customers.&nbsp;

The security snafu took down some of Rackspace's hosted Microsoft Exchange services on Friday afternoon.&nbsp;In its most recent update, posted at 0826 Eastern Time on Tuesday, Rackspace said it has now "determined this suspicious activity was the result of a ransomware incident," and has hired a "leading cyber defense firm to investigate."</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 133: Hardware Supply Chains, Trust Agility, and Avoiding Vendor Lock-in</title>
  <link>https://www.reality2cast.com/133</link>
  <guid isPermaLink="false">042947a0-05c1-4ef0-b935-550032f203cb</guid>
  <pubDate>Tue, 06 Dec 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/042947a0-05c1-4ef0-b935-550032f203cb.mp3" length="65468783" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</itunes:subtitle>
  <itunes:duration>1:08:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Why The U.S. Fell Behind In Phone Manufacturing - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=YdbA7Z8Ae4w">Why The U.S. Fell Behind In Phone Manufacturing - YouTube</a></li><li><a title="JMP: Your phone number on every device" rel="nofollow" href="https://jmp.chat/">JMP: Your phone number on every device</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 on Mastodon" rel="nofollow" href="https://reality2.social/@realty2cast">Reality 2.0 on Mastodon</a></li><li><a title="Explore - Texas Observer Social" rel="nofollow" href="https://texasobserver.social/explore">Explore - Texas Observer Social</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin about hardware supply chains, building the only USA-made mobile phone, trust, open standards, and much more.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Why The U.S. Fell Behind In Phone Manufacturing - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=YdbA7Z8Ae4w">Why The U.S. Fell Behind In Phone Manufacturing - YouTube</a></li><li><a title="JMP: Your phone number on every device" rel="nofollow" href="https://jmp.chat/">JMP: Your phone number on every device</a></li><li><a title="IIW" rel="nofollow" href="https://internetidentityworkshop.com/">IIW</a></li><li><a title="Reality 2.0 on Mastodon" rel="nofollow" href="https://reality2.social/@realty2cast">Reality 2.0 on Mastodon</a></li><li><a title="Explore - Texas Observer Social" rel="nofollow" href="https://texasobserver.social/explore">Explore - Texas Observer Social</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 111: Peer-to-Peer Messaging with Quiet</title>
  <link>https://www.reality2cast.com/111</link>
  <guid isPermaLink="false">ff55ed12-545e-4a70-98a4-2235281bcedf</guid>
  <pubDate>Fri, 13 May 2022 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/ff55ed12-545e-4a70-98a4-2235281bcedf.mp3" length="54958496" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</itunes:subtitle>
  <itunes:duration>1:17:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Holmes Wilson and Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Holmes Wilson and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="GitHub - ZbayApp/monorepo" rel="nofollow" href="https://github.com/ZbayApp/monorepo">GitHub - ZbayApp/monorepo</a> &mdash; An early prototype for a peer-to-peer alternative to Slack and Discord.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project.</p>

<p><a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Holmes Wilson and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="GitHub - ZbayApp/monorepo" rel="nofollow" href="https://github.com/ZbayApp/monorepo">GitHub - ZbayApp/monorepo</a> &mdash; An early prototype for a peer-to-peer alternative to Slack and Discord.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 96: Absolute Privacy Through Cryptography</title>
  <link>https://www.reality2cast.com/96</link>
  <guid isPermaLink="false">59b999ee-edef-4001-a371-d52586e9d4e3</guid>
  <pubDate>Fri, 21 Jan 2022 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/59b999ee-edef-4001-a371-d52586e9d4e3.mp3" length="66324117" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</itunes:subtitle>
  <itunes:duration>1:18:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Dave Huseby.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2022/01/19/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/">Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House</a> &mdash; This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs.&nbsp;</li><li><a title="Guess which government doesn&#39;t want you to use end-to-end encryption" rel="nofollow" href="https://betanews.com/2022/01/18/guess-which-government-doesnt-want-you-to-use-end-to-end-encryption/">Guess which government doesn't want you to use end-to-end encryption</a> &mdash; From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET" rel="nofollow" href="https://www.bet.com/article/2lworg/black-teen-kicked-out-of-roller-rink-over-face-recognition">Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET</a> &mdash; A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.</li><li><a title="The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective" rel="nofollow" href="https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6">The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective</a> &mdash; The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?</li><li><a title="A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium" rel="nofollow" href="https://medium.com/swlh/a-unified-theory-of-decentralization-151d6f39e38">A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium</a> &mdash; All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.</li><li><a title="The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp" rel="nofollow" href="https://medium.com/design-warp/the-web-was-never-decentralized-bb066138c88">The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp</a> &mdash; There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.</li><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium</a> &mdash; All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.</li><li><a title="Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/achieving-absolute-privacy-85460ac9eada">Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium</a> &mdash; Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy. </li><li><a title="Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/zero-architecture-is-the-way-forward-5a0080925c76">Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium</a> &mdash; Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems.
</li><li><a title="𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-theory-of-digital-gates-9cd5073e1cb6">𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium</a> &mdash; In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Dave Huseby.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2022/01/19/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/">Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House</a> &mdash; This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs.&nbsp;</li><li><a title="Guess which government doesn&#39;t want you to use end-to-end encryption" rel="nofollow" href="https://betanews.com/2022/01/18/guess-which-government-doesnt-want-you-to-use-end-to-end-encryption/">Guess which government doesn't want you to use end-to-end encryption</a> &mdash; From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.</li><li><a title="I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/11/04/business/secret-consumer-score-access.html">I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times</a> &mdash; Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.</li><li><a title="Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET" rel="nofollow" href="https://www.bet.com/article/2lworg/black-teen-kicked-out-of-roller-rink-over-face-recognition">Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET</a> &mdash; A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.</li><li><a title="The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective" rel="nofollow" href="https://uxdesign.cc/the-principles-of-user-sovereignty-515ac83401f6">The principles of user sovereignty | by 𝖉𝖜𝖍 | UX Collective</a> &mdash; The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?</li><li><a title="A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium" rel="nofollow" href="https://medium.com/swlh/a-unified-theory-of-decentralization-151d6f39e38">A Unified Theory of Decentralization | by 𝖉𝖜𝖍 | The Startup | Medium</a> &mdash; All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.</li><li><a title="The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp" rel="nofollow" href="https://medium.com/design-warp/the-web-was-never-decentralized-bb066138c88">The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp</a> &mdash; There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available through open access that all of humanity benefited from. They assume that originally all users of the web were well behaved and companies only wanted to help make the world better. Also, they think that somewhere along the line the web fell under the control of irresponsible corporations and governments and was contorted into the “broken and centralized” system that it is today.</li><li><a title="The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-authentic-data-economy-9802da67e1fa">The Authentic Data Economy. Universal Digital Trust at Global Scale | by 𝖉𝖜𝖍 | Medium</a> &mdash; All of us intuitively have a sense of what trust is and how to earn and maintain it as well as how to lose it. Trust never comes for free. The cost of earning trust is consistent trustworthy behavior over time. It forms our reputation in our social circles. But what happens when you have to do business outside of our personal social circles, such as with a new bank, or with a government agency far removed? How is trust established then? How is it transmitted to the distant institution to conduct business and how is it transmitted back? Over human history the solution has been to generate and keep official records about people and their activities. Some examples of official records are: Jane was born on this date, John earned his diploma from this university in this year, Judy received a license to practice medicine.</li><li><a title="Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/achieving-absolute-privacy-85460ac9eada">Achieving Absolute Privacy. Cryptography Always Works, With or… | by 𝖉𝖜𝖍 | Medium</a> &mdash; Absolute privacy on the internet is impossible, today. Why? Because nobody with the power to create it, wants it. The primary revenue model for the internet is based on surveillance making most investors aligned against privacy. </li><li><a title="Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/zero-architecture-is-the-way-forward-5a0080925c76">Zero Architecture is the Way Forward | by 𝖉𝖜𝖍 | Medium</a> &mdash; Inmy two most recent articles I discussed something called “Zero Architecture”. It is a new approach to designing decentralized systems using zero-trust security combined with business logic that operates entirely on zero-knowledge proofs — based on authentic data — and contains zero personally identifiable information. The primary motivation for this new way of thinking is building fully user-sovereign systems that automate regulatory compliance, drive out fraud, as well as eliminate surveillance capitalism and its attendant societal problems.
</li><li><a title="𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium" rel="nofollow" href="https://dwhuseby.medium.com/the-theory-of-digital-gates-9cd5073e1cb6">𝕿𝖍𝖊 𝕿𝖍𝖊𝖔𝖗𝖞 𝖔𝖋 𝕯𝖎𝖌𝖎𝖙𝖆𝖑 𝕲𝖆𝖙𝖊𝖘 | by 𝖉𝖜𝖍 | Medium</a> &mdash; In computer systems it is common to construct digital gates around a service. The most common example is a username and password login gate that does a combination of authentication (i.e. verifying who is accessing the service) and authorization (i.e. what functions of the service can be executed). This approach for gating digital access is being blindly applied — without deeper contemplation — to vaccine passports and digital gates in the physical world with the explicit goal of denying people access to resources that were considered a human right as recently as this past spring. It is time to present a theoretical model describing the oppressive characteristics of naïve pervasive digital gating of real-world access and show why identity cannot be an input available to digital gates.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 93: Quad9 and DNS</title>
  <link>https://www.reality2cast.com/93</link>
  <guid isPermaLink="false">e7f8e7cc-c402-433a-a1d6-619c7395ce49</guid>
  <pubDate>Fri, 03 Dec 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/e7f8e7cc-c402-433a-a1d6-619c7395ce49.mp3" length="72684782" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</itunes:subtitle>
  <itunes:duration>55:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: John Todd and Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, DNS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: John Todd and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Quad9 | A public and free DNS service for a better security and privacy" rel="nofollow" href="https://www.quad9.net/">Quad9 | A public and free DNS service for a better security and privacy</a> &mdash; Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone.</li><li><a title="Pi-hole – Network-wide protection" rel="nofollow" href="https://pi-hole.net/">Pi-hole – Network-wide protection</a> &mdash; Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman, Doc Searls and Kyle Rankin talk to John Todd from Quad9 about DNS, privacy, security and their open DNS recursive service.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: John Todd and Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Quad9 | A public and free DNS service for a better security and privacy" rel="nofollow" href="https://www.quad9.net/">Quad9 | A public and free DNS service for a better security and privacy</a> &mdash; Quad9 is a free service that replaces your default ISP or enterprise Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. This blocking action protects your computer, mobile device, or IoT systems against a wide range of threats such as malware, phishing, spyware, and botnets, and it can improve performance in addition to guaranteeing privacy. The Quad9 DNS service is operated by the Swiss-based Quad9 Foundation, whose mission is to provide a safer and more robust Internet for everyone.</li><li><a title="Pi-hole – Network-wide protection" rel="nofollow" href="https://pi-hole.net/">Pi-hole – Network-wide protection</a> &mdash; Instead of browser plugins or other software on each computer, install Pi-hole in one place and your entire network is protected.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 80: NSO Group's Pegasus, Stingrays, and Grindr</title>
  <link>https://www.reality2cast.com/80</link>
  <guid isPermaLink="false">2700f9f7-17d2-474f-91a3-ed7bede78376</guid>
  <pubDate>Fri, 30 Jul 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/2700f9f7-17d2-474f-91a3-ed7bede78376.mp3" length="60409945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</itunes:subtitle>
  <itunes:duration>44:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guest: Kyle Rankin.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, surveillance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Defending Against Spyware Like Pegasus – Purism" rel="nofollow" href="https://puri.sm/posts/defending-against-spyware-like-pegasus/">Defending Against Spyware Like Pegasus – Purism</a> &mdash; What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?</li><li><a title="Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/21/22587234/amnesty-international-nso-pegasus-spyware-detection-tool-ios-android-guide-windows-mac">Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge</a> &mdash; Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.</li><li><a title="Mobile Verification Toolkit" rel="nofollow" href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit</a> &mdash; Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.</li><li><a title="The FBI Is Locating Cars By Spying On Their WiFi" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2021/07/22/the-fbi-is-using-stingray-smartphone-surveillance-to-locate-cars-and-spy-on-their-wifi/?sh=218804e335c8">The FBI Is Locating Cars By Spying On Their WiFi</a> &mdash; The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.</li><li><a title="Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2021/07/catholic-priest-quits-after-anonymized-data-revealed-alleged-use-of-grindr/">Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica</a> &mdash; In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; Brave stops online surveillance, loads content faster, and uses 35% less battery.1</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Kyle Rankin about NSO group and Pegasus, Stingrays and cars, and surveilling priests.</p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Defending Against Spyware Like Pegasus – Purism" rel="nofollow" href="https://puri.sm/posts/defending-against-spyware-like-pegasus/">Defending Against Spyware Like Pegasus – Purism</a> &mdash; What’s particularly scary about spyware in general, and is true for Pegasus as well, is that victims have no indication they’ve been compromised. Due to how locked down the iPhone is from the end user, detecting Pegasus in particular requires expert forensics techniques. This has left many at-risk iPhone users wondering whether they too are compromised and if so, what do they do?</li><li><a title="Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge" rel="nofollow" href="https://www.theverge.com/2021/7/21/22587234/amnesty-international-nso-pegasus-spyware-detection-tool-ios-android-guide-windows-mac">Here’s how to check your phone for Pegasus spyware using Amnesty’s tool - The Verge</a> &mdash; Amnesty International — part of the group that helped break the news of journalists and heads of state being targeted by NSO’s government-grade spyware, Pegasus — has released a tool to check if your phone has been affected. Alongside the tool is a great set of instructions, which should help you through the somewhat technical checking process. Using the tool involves backing up your phone to a separate computer and running a check on that backup. Read on if you’ve been side-eyeing your phone since the news broke and are looking for guidance on using Amnesty’s tool.</li><li><a title="Mobile Verification Toolkit" rel="nofollow" href="https://docs.mvt.re/en/latest/">Mobile Verification Toolkit</a> &mdash; Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.</li><li><a title="The FBI Is Locating Cars By Spying On Their WiFi" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2021/07/22/the-fbi-is-using-stingray-smartphone-surveillance-to-locate-cars-and-spy-on-their-wifi/?sh=218804e335c8">The FBI Is Locating Cars By Spying On Their WiFi</a> &mdash; The FBI is using a controversial technology traditionally used to locate smartphones as a car tracking surveillance tool that spies on vehicles’ on-board WiFi.</li><li><a title="Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2021/07/catholic-priest-quits-after-anonymized-data-revealed-alleged-use-of-grindr/">Catholic priest quits after “anonymized” data revealed alleged use of Grindr | Ars Technica</a> &mdash; In what appears to be a first, a public figure has been ousted after de-anonymized mobile phone location data was publicly reported, revealing sensitive and previously private details about his life.</li><li><a title="Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser" rel="nofollow" href="https://brave.com/">Secure, Fast &amp; Private Web Browser with Adblocker | Brave Browser</a> &mdash; Brave stops online surveillance, loads content faster, and uses 35% less battery.1</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 68: Signal Snoops On Cellebrite as They Snoop On Us</title>
  <link>https://www.reality2cast.com/68</link>
  <guid isPermaLink="false">9e2c30a0-c7e8-480a-8283-2af1ee331f9a</guid>
  <pubDate>Fri, 30 Apr 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/9e2c30a0-c7e8-480a-8283-2af1ee331f9a.mp3" length="62952325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</itunes:subtitle>
  <itunes:duration>1:15:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Kyle Rankin and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#39;s perspective" rel="nofollow" href="https://signal.org/blog/cellebrite-vulnerabilities/">Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective</a> &mdash; Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russia, Venezuela, and China; death squads in Bangladesh; military juntas in Myanmar; and those seeking to abuse and oppress in Turkey, UAE, and elsewhere. A few months ago, they announced that they added Signal support to their software.

Their products have often been linked to the persecution of imprisoned journalists and activists around the world, but less has been written about what their software actually does or how it works. Let’s take a closer look. In particular, their software is often associated with bypassing security, so let’s take some time to examine the security of their own software.

</li><li><a title="Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/australia-anti-encryption-law/">Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog</a> &mdash; the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.</li><li><a title="Australia&#39;s Encryption-Busting Law Could Impact Global Privacy | WIRED" rel="nofollow" href="https://www.wired.com/story/australia-encryption-law-global-impact/">Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED</a> &mdash; Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.
</li><li><a title="P versus NP problem - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/P_versus_NP_problem">P versus NP problem - Wikipedia</a> &mdash; The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly.

</li><li><a title="Data Double Dipping: When Companies Mine Paying Customers – Purism" rel="nofollow" href="https://puri.sm/posts/data-double-dipping-when-companies-mine-paying-customers/">Data Double Dipping: When Companies Mine Paying Customers – Purism</a> &mdash; There’s an old snarky saying among privacy advocates: “If you aren’t paying for something, you are the product!” This updated version of “There’s no such thing as a free lunch” arose in the Internet age among the ever-growing list of free services and apps on the Internet funded by collecting and selling your data to advertisers. If large companies like Google and Facebook are any indication, a lot of money can be made with user data and the more data you collect, the more money you can make.</li><li><a title="Eva Galperin: What you need to know about stalkerware | TED Talk" rel="nofollow" href="https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware">Eva Galperin: What you need to know about stalkerware | TED Talk</a> &mdash; "Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims.</li><li><a title="Reality 2.0 Episode 52: Fragmentation and Outrage of the Week" rel="nofollow" href="https://www.reality2cast.com/52">Reality 2.0 Episode 52: Fragmentation and Outrage of the Week</a> &mdash; Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</li><li><a title="This Is How They Tell Me the World Ends" rel="nofollow" href="https://thisishowtheytellmetheworldends.com/">This Is How They Tell Me the World Ends</a> &mdash; From New York Times cybersecurity reporter Nicole Perlroth, THIS IS HOW THEY TELL ME THE WORLD ENDS is the untold story of the cyber arms trade-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls chat with Kyle Rankin and Shawn Powers about Signal’s exposure of vulnerabilities in Cellebrite’s mobile device hacking software.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app&#39;s perspective" rel="nofollow" href="https://signal.org/blog/cellebrite-vulnerabilities/">Signal &gt;&gt; Blog &gt;&gt; Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective</a> &mdash; Cellebrite makes software to automate physically extracting and indexing data from mobile devices. They exist within the grey – where enterprise branding joins together with the larcenous to be called “digital intelligence.” Their customer list has included authoritarian regimes in Belarus, Russia, Venezuela, and China; death squads in Bangladesh; military juntas in Myanmar; and those seeking to abuse and oppress in Turkey, UAE, and elsewhere. A few months ago, they announced that they added Signal support to their software.

Their products have often been linked to the persecution of imprisoned journalists and activists around the world, but less has been written about what their software actually does or how it works. Let’s take a closer look. In particular, their software is often associated with bypassing security, so let’s take some time to examine the security of their own software.

</li><li><a title="Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/australia-anti-encryption-law/">Australia’s vague anti-encryption law sets a dangerous new precedent - ProtonMail Blog</a> &mdash; the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups.</li><li><a title="Australia&#39;s Encryption-Busting Law Could Impact Global Privacy | WIRED" rel="nofollow" href="https://www.wired.com/story/australia-encryption-law-global-impact/">Australia's Encryption-Busting Law Could Impact Global Privacy | WIRED</a> &mdash; Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.
</li><li><a title="P versus NP problem - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/P_versus_NP_problem">P versus NP problem - Wikipedia</a> &mdash; The P versus NP problem is a major unsolved problem in computer science. It asks whether every problem whose solution can be quickly verified can also be solved quickly.

</li><li><a title="Data Double Dipping: When Companies Mine Paying Customers – Purism" rel="nofollow" href="https://puri.sm/posts/data-double-dipping-when-companies-mine-paying-customers/">Data Double Dipping: When Companies Mine Paying Customers – Purism</a> &mdash; There’s an old snarky saying among privacy advocates: “If you aren’t paying for something, you are the product!” This updated version of “There’s no such thing as a free lunch” arose in the Internet age among the ever-growing list of free services and apps on the Internet funded by collecting and selling your data to advertisers. If large companies like Google and Facebook are any indication, a lot of money can be made with user data and the more data you collect, the more money you can make.</li><li><a title="Eva Galperin: What you need to know about stalkerware | TED Talk" rel="nofollow" href="https://www.ted.com/talks/eva_galperin_what_you_need_to_know_about_stalkerware">Eva Galperin: What you need to know about stalkerware | TED Talk</a> &mdash; "Full access to a person's phone is the next best thing to full access to a person's mind," says cybersecurity expert Eva Galperin. In an urgent talk, she describes the emerging danger of stalkerware -- software designed to spy on someone by gaining access to their devices without their knowledge -- and calls on antivirus companies to recognize these programs as malicious in order to discourage abusers and protect victims.</li><li><a title="Reality 2.0 Episode 52: Fragmentation and Outrage of the Week" rel="nofollow" href="https://www.reality2cast.com/52">Reality 2.0 Episode 52: Fragmentation and Outrage of the Week</a> &mdash; Doc Searls and Katherine Druckman talk to Kyle Rankin about fragmentation and software development, the Amazon Halo, and surveilling school children.</li><li><a title="This Is How They Tell Me the World Ends" rel="nofollow" href="https://thisishowtheytellmetheworldends.com/">This Is How They Tell Me the World Ends</a> &mdash; From New York Times cybersecurity reporter Nicole Perlroth, THIS IS HOW THEY TELL ME THE WORLD ENDS is the untold story of the cyber arms trade-the most secretive, invisible, government-backed market on earth-and a terrifying first look at a new kind of global warfare.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 62: How Did Disinformation Become the Truth?</title>
  <link>https://www.reality2cast.com/62</link>
  <guid isPermaLink="false">972f4c4c-7450-4bca-8fd0-05f89778f547</guid>
  <pubDate>Fri, 19 Mar 2021 07:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/972f4c4c-7450-4bca-8fd0-05f89778f547.mp3" length="36202696" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</itunes:subtitle>
  <itunes:duration>46:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt;&lt;br&gt;
 Special Guests: Chris Bronk and Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, disinformation, IoT, voice recognition</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Chris Bronk and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com" rel="nofollow" href="https://www.dictionary.com/e/misinformation-vs-disinformation-get-informed-on-the-difference/">“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com</a> &mdash; Disinformation means “false information, as about a country’s military strength or plans, disseminated by a government or intelligence agency in a hostile act of tactical political subversion.” It is also used more generally to mean “deliberately misleading or biased information; manipulated narrative or facts; propaganda.”

So, disinformation is knowingly spreading misinformation. Our first definition of this word gives one major reason why a person or group might want to spread wrong information, but there are many other nefarious motivations lurking behind the creation of disinformation.

</li><li><a title="Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1541758005/">Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books</a> &mdash; In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.</li><li><a title="Tom Clancy, author of the Jack Ryan Novels - Tom Clancy" rel="nofollow" href="https://tomclancy.com/">Tom Clancy, author of the Jack Ryan Novels - Tom Clancy</a></li><li><a title="Amazon.com : john le carré" rel="nofollow" href="https://www.amazon.com/s?k=john+le+carr%C3%A9">Amazon.com : john le carré</a></li><li><a title="Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books" rel="nofollow" href="https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/1250787408/">Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books</a></li><li><a title="Internet-based chastity belts hijacked by malicious hackers | Boing Boing" rel="nofollow" href="https://boingboing.net/2021/01/24/internet-based-chastity-belts-hijacked-by-malicious-hackers.html">Internet-based chastity belts hijacked by malicious hackers | Boing Boing</a> &mdash; Oh man. A bluetooth-controlled chastity belt was the recent victim of a hacker attack. The Cellmate Chastity Cage, made by Chinese company Qiui, was designed so that users are able to lock and unlock their sex partner's penis prison remotely. Users caught in the attack were threatened with having their genitals locked in permanently unless they paid a 0.02 bitcoin (about $270) ransom.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Prof. Chris Bronk, Ph.D. and Petros Koutoupis about disinformation and cyber security, and how they impact our lives, as well as IoT vulnerabilities and voice recognition technology.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Chris Bronk and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com" rel="nofollow" href="https://www.dictionary.com/e/misinformation-vs-disinformation-get-informed-on-the-difference/">“Misinformation” vs. “Disinformation”: Get Informed On The Difference - Dictionary.com</a> &mdash; Disinformation means “false information, as about a country’s military strength or plans, disseminated by a government or intelligence agency in a hostile act of tactical political subversion.” It is also used more generally to mean “deliberately misleading or biased information; manipulated narrative or facts; propaganda.”

So, disinformation is knowingly spreading misinformation. Our first definition of this word gives one major reason why a person or group might want to spread wrong information, but there are many other nefarious motivations lurking behind the creation of disinformation.

</li><li><a title="Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books" rel="nofollow" href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1541758005/">Amazon.com: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (9781541758001): Zuboff, Shoshana: Books</a> &mdash; In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.</li><li><a title="Tom Clancy, author of the Jack Ryan Novels - Tom Clancy" rel="nofollow" href="https://tomclancy.com/">Tom Clancy, author of the Jack Ryan Novels - Tom Clancy</a></li><li><a title="Amazon.com : john le carré" rel="nofollow" href="https://www.amazon.com/s?k=john+le+carr%C3%A9">Amazon.com : john le carré</a></li><li><a title="Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books" rel="nofollow" href="https://www.amazon.com/Active-Measures-History-Disinformation-Political/dp/1250787408/">Amazon.com: Active Measures (9781250787408): Rid, Thomas: Books</a></li><li><a title="Internet-based chastity belts hijacked by malicious hackers | Boing Boing" rel="nofollow" href="https://boingboing.net/2021/01/24/internet-based-chastity-belts-hijacked-by-malicious-hackers.html">Internet-based chastity belts hijacked by malicious hackers | Boing Boing</a> &mdash; Oh man. A bluetooth-controlled chastity belt was the recent victim of a hacker attack. The Cellmate Chastity Cage, made by Chinese company Qiui, was designed so that users are able to lock and unlock their sex partner's penis prison remotely. Users caught in the attack were threatened with having their genitals locked in permanently unless they paid a 0.02 bitcoin (about $270) ransom.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 58: So Someone Stole Your Identity</title>
  <link>https://www.reality2cast.com/58</link>
  <guid isPermaLink="false">f9a2a3d4-2309-4235-89b1-1e69b3882a7d</guid>
  <pubDate>Fri, 19 Feb 2021 07:00:00 -0500</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/f9a2a3d4-2309-4235-89b1-1e69b3882a7d.mp3" length="52271996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Katherine Druckman and Doc Searls talk to Shawn Powers and Kyle Rankin about protecting yourself online, password and security best practices, and a tragic tale.</itunes:subtitle>
  <itunes:duration>1:03:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Katherine Druckman and Doc Searls talk to Shawn Powers and Kyle Rankin about protecting yourself online, password and security best practices, and a tragic tale.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://reality2cast.com/newsletter" target="_blank" rel="nofollow noopener"&gt;Subscribe to our newsletter.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reality 2.0 around the web:&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://www.reality2cast.com" target="_blank" rel="nofollow noopener"&gt;Site/Blog/Newsletter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.facebook.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;FaceBook&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/reality2cast" target="_blank" rel="nofollow noopener"&gt;Twitter&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" target="_blank" rel="nofollow noopener"&gt;YouTube&lt;/a&gt;&lt;br&gt;
&lt;a href="https://linuxrocks.online/@reality2cast" target="_blank" rel="nofollow noopener"&gt;Mastodon&lt;/a&gt; Special Guests: Kyle Rankin and Shawn Powers.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers and Kyle Rankin about protecting yourself online, password and security best practices, and a tragic tale.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Universal 2nd Factor - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">Universal 2nd Factor - Wikipedia</a> &mdash; Universal 2nd Factor (U2F) is an open standard that strengthens and simplifies two-factor authentication (2FA) using specialized Universal Serial Bus (USB) or near-field communication (NFC) devices based on similar security technology found in smart cards.</li><li><a title="Yubico | YubiKey Strong Two Factor Authentication" rel="nofollow" href="https://www.yubico.com/">Yubico | YubiKey Strong Two Factor Authentication</a></li><li><a title="Investing in Real Convergence – Purism" rel="nofollow" href="https://puri.sm/posts/investing-in-real-convergence/">Investing in Real Convergence – Purism</a> &mdash; Real convergence means bringing your desktop computer with you wherever you go. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Katherine Druckman and Doc Searls talk to Shawn Powers and Kyle Rankin about protecting yourself online, password and security best practices, and a tragic tale.</p>

<p><a href="https://reality2cast.com/newsletter" rel="nofollow">Subscribe to our newsletter.</a></p>

<p><strong>Reality 2.0 around the web:</strong><br>
<a href="https://www.reality2cast.com" rel="nofollow">Site/Blog/Newsletter</a><br>
<a href="https://www.facebook.com/reality2cast" rel="nofollow">FaceBook</a><br>
<a href="https://twitter.com/reality2cast" rel="nofollow">Twitter</a><br>
<a href="https://www.youtube.com/channel/UCdvdT3quikpi9sd5SxTGk3Q" rel="nofollow">YouTube</a><br>
<a href="https://linuxrocks.online/@reality2cast" rel="nofollow">Mastodon</a></p><p>Special Guests: Kyle Rankin and Shawn Powers.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Universal 2nd Factor - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Universal_2nd_Factor">Universal 2nd Factor - Wikipedia</a> &mdash; Universal 2nd Factor (U2F) is an open standard that strengthens and simplifies two-factor authentication (2FA) using specialized Universal Serial Bus (USB) or near-field communication (NFC) devices based on similar security technology found in smart cards.</li><li><a title="Yubico | YubiKey Strong Two Factor Authentication" rel="nofollow" href="https://www.yubico.com/">Yubico | YubiKey Strong Two Factor Authentication</a></li><li><a title="Investing in Real Convergence – Purism" rel="nofollow" href="https://puri.sm/posts/investing-in-real-convergence/">Investing in Real Convergence – Purism</a> &mdash; Real convergence means bringing your desktop computer with you wherever you go. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 41: TikTok and App Censorship</title>
  <link>https://www.reality2cast.com/41</link>
  <guid isPermaLink="false">f74f3a01-9791-45eb-90b5-42f9b3188788</guid>
  <pubDate>Fri, 25 Sep 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/f74f3a01-9791-45eb-90b5-42f9b3188788.mp3" length="42619631" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Kyle Rankin and Petros Koutoupis about TikTok and who controls your phone.</itunes:subtitle>
  <itunes:duration>50:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Kyle Rankin and Petros Koutoupis about TikTok and who controls your phone.&lt;/p&gt;

&lt;p&gt;Notes: &lt;/p&gt;

&lt;p&gt;00:00:37 The new contraband - TikTok&lt;br&gt;
00:04:34 Is the US wanting to "play" China and censor?&lt;br&gt;
00:08:19 Will this become an ugly precedent?&lt;br&gt;
00:15:37 We're concerned about the implementation of this ban&lt;br&gt;
00:17:25 The Social Dilemma on Netflix&lt;br&gt;
00:21:11 Your phone is your castle&lt;br&gt;
00:33:10 Defining the harm from mere content &lt;br&gt;
00:44:59 Final thoughts - Portrait mode video&lt;br&gt;
00:48:20 How does a visually impaired person use a phone? See link. Special Guests: Kyle Rankin and Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, TikTok, Censorship, politics</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin and Petros Koutoupis about TikTok and who controls your phone.</p>

<p>Notes: </p>

<p>00:00:37 The new contraband - TikTok<br>
00:04:34 Is the US wanting to &quot;play&quot; China and censor?<br>
00:08:19 Will this become an ugly precedent?<br>
00:15:37 We&#39;re concerned about the implementation of this ban<br>
00:17:25 The Social Dilemma on Netflix<br>
00:21:11 Your phone is your castle<br>
00:33:10 Defining the harm from mere content <br>
00:44:59 Final thoughts - Portrait mode video<br>
00:48:20 How does a visually impaired person use a phone? See link.</p><p>Special Guests: Kyle Rankin and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Trump admin orders TikTok, WeChat gone from app stores on Sunday" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/09/tiktok-wechat-to-be-pulled-from-us-app-stores-as-of-september-20/">Trump admin orders TikTok, WeChat gone from app stores on Sunday</a> &mdash; President Donald Trump signed executive orders banning TikTok and WeChat on August 6. Those orders gave the Department of Commerce a 45-day window to outline what, exactly, a ban would entail. That 45-day period expires on Sunday, September 20, so that is when the bans take effect.

Not only will app stores not be allowed to permit new downloads, but Internet hosting services and content delivery network services will also be banned from "enabling the functioning or the optimization" of the apps, and "directly contracted or arranged Internet transit or peering services" will also be prohibited. All platforms will also be prohibited from providing services through WeChat specifically that allow anyone to transfer funds or process payment within the US.</li><li><a title="Your Phone Is Your Castle" rel="nofollow" href="https://puri.sm/posts/your-phone-is-your-castle/">Your Phone Is Your Castle</a> &mdash; If your home is your physical castle, your phone is your digital castle. More than any other computer, your phone has become the most personal of personal computers and holds the most sensitive digital property a person has</li><li><a title="The Castle Doctrine" rel="nofollow" href="https://medium.com/@dsearls/the-castle-doctrine-45c9abc147e8">The Castle Doctrine</a> &mdash; Since you’re reading this online, let me ask, what’s your house here? What sacred space do you strongly guard, and never suffer to be violated with impunity?</li><li><a title="Video: Voiceover and Braille screen input." rel="nofollow" href="https://www.youtube.com/watch?v=wueLXCbm_KY">Video: Voiceover and Braille screen input.</a> &mdash; Kristy Viers using voiceover and braille screen input to compose a tweet and show navigation.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Kyle Rankin and Petros Koutoupis about TikTok and who controls your phone.</p>

<p>Notes: </p>

<p>00:00:37 The new contraband - TikTok<br>
00:04:34 Is the US wanting to &quot;play&quot; China and censor?<br>
00:08:19 Will this become an ugly precedent?<br>
00:15:37 We&#39;re concerned about the implementation of this ban<br>
00:17:25 The Social Dilemma on Netflix<br>
00:21:11 Your phone is your castle<br>
00:33:10 Defining the harm from mere content <br>
00:44:59 Final thoughts - Portrait mode video<br>
00:48:20 How does a visually impaired person use a phone? See link.</p><p>Special Guests: Kyle Rankin and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p><p>Links:</p><ul><li><a title="Trump admin orders TikTok, WeChat gone from app stores on Sunday" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/09/tiktok-wechat-to-be-pulled-from-us-app-stores-as-of-september-20/">Trump admin orders TikTok, WeChat gone from app stores on Sunday</a> &mdash; President Donald Trump signed executive orders banning TikTok and WeChat on August 6. Those orders gave the Department of Commerce a 45-day window to outline what, exactly, a ban would entail. That 45-day period expires on Sunday, September 20, so that is when the bans take effect.

Not only will app stores not be allowed to permit new downloads, but Internet hosting services and content delivery network services will also be banned from "enabling the functioning or the optimization" of the apps, and "directly contracted or arranged Internet transit or peering services" will also be prohibited. All platforms will also be prohibited from providing services through WeChat specifically that allow anyone to transfer funds or process payment within the US.</li><li><a title="Your Phone Is Your Castle" rel="nofollow" href="https://puri.sm/posts/your-phone-is-your-castle/">Your Phone Is Your Castle</a> &mdash; If your home is your physical castle, your phone is your digital castle. More than any other computer, your phone has become the most personal of personal computers and holds the most sensitive digital property a person has</li><li><a title="The Castle Doctrine" rel="nofollow" href="https://medium.com/@dsearls/the-castle-doctrine-45c9abc147e8">The Castle Doctrine</a> &mdash; Since you’re reading this online, let me ask, what’s your house here? What sacred space do you strongly guard, and never suffer to be violated with impunity?</li><li><a title="Video: Voiceover and Braille screen input." rel="nofollow" href="https://www.youtube.com/watch?v=wueLXCbm_KY">Video: Voiceover and Braille screen input.</a> &mdash; Kristy Viers using voiceover and braille screen input to compose a tweet and show navigation.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 36: User Sovereignty and Decentralization</title>
  <link>https://www.reality2cast.com/36</link>
  <guid isPermaLink="false">b9560abf-e1bc-4486-8bb3-df087a66ae6e</guid>
  <pubDate>Wed, 24 Jun 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/b9560abf-e1bc-4486-8bb3-df087a66ae6e.mp3" length="55977188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls, Katherine Druckman and Petros Koutoupis talk to Dave Huseby about User Sovereignty and Decentralization, Hyperledger, blockchain and security.</itunes:subtitle>
  <itunes:duration>1:09:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls, Katherine Druckman and Petros Koutoupis talk to Dave Huseby, &lt;a href="https://www.hyperledger.org/" target="_blank" rel="nofollow noopener"&gt;Hyperledger&lt;/a&gt;'s Security Maven, about User Sovereignty and Decentralization, Hyperledger, blockchain and security. Special Guests: Dave Huseby and Petros Koutoupis.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, linux, blockchain, decentralized web, user sovereignty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls, Katherine Druckman and Petros Koutoupis talk to Dave Huseby, <a href="https://www.hyperledger.org/" rel="nofollow">Hyperledger</a>&#39;s Security Maven, about User Sovereignty and Decentralization, Hyperledger, blockchain and security.</p><p>Special Guests: Dave Huseby and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls, Katherine Druckman and Petros Koutoupis talk to Dave Huseby, <a href="https://www.hyperledger.org/" rel="nofollow">Hyperledger</a>&#39;s Security Maven, about User Sovereignty and Decentralization, Hyperledger, blockchain and security.</p><p>Special Guests: Dave Huseby and Petros Koutoupis.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 35: Bruce Schneier on Truth, Reality, and Contact Tracing</title>
  <link>https://www.reality2cast.com/35</link>
  <guid isPermaLink="false">246859d5-3a8a-4989-8554-1c0cc25b379f</guid>
  <pubDate>Wed, 27 May 2020 08:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/246859d5-3a8a-4989-8554-1c0cc25b379f.mp3" length="42786586" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle>Doc Searls and Katherine Druckman talk to Bruce Schneier about Contact Tracing, Digital Identity, hacking, privacy, and regulation.</itunes:subtitle>
  <itunes:duration>51:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to &lt;a href="https://www.schneier.com/" target="_blank" rel="nofollow noopener"&gt;Bruce Schneier&lt;/a&gt; about contact tracing, digital identity, hacking, privacy, and regulation.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;/p&gt;

&lt;p&gt;0:00:25: Contact tracing apps&lt;br&gt;
0:02:31: Contract tracing false positive and false negative&lt;br&gt;
0:04:24: Contract tracing apps adoption rate&lt;br&gt;
0:07:36: Katherine agrees apps should build more trust&lt;br&gt;
0:11:44: The 2nd anniversary of the GDPR&lt;br&gt;
0:13:31: Bruce talks about his RSA presentation about the notion of hacking&lt;br&gt;
0:15:26: Katherine dove tails hacking into contact tracing&lt;br&gt;
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)&lt;br&gt;
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?&lt;br&gt;
0:23:28: Do the people we entrust to regulate our tech even understand it?&lt;br&gt;
0:29:10: Should we give the FBI digital forensic capabilities?&lt;br&gt;
0:32:24: Katherine wonders if our cellphones are at all secure&lt;br&gt;
0:36:33: Doc ponders the future of travel&lt;br&gt;
0:38:18: Bruce predicts we're in the midst of a major system reset&lt;br&gt;
0:46:49: The political divide between the way people digest information&lt;br&gt;
0:49:36: Bruce: "Truth wins because it actually conforms to reality."&lt;/p&gt;

&lt;p&gt;Links:&lt;br&gt;
&lt;a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" target="_blank" rel="nofollow noopener"&gt;Bruce Schneier on COVID-19 Contact Tracing Apps&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" target="_blank" rel="nofollow noopener"&gt;Contact-tracing apps are not a solution to the COVID-19 crisis&lt;/a&gt; Special Guest: Bruce Schneier.&lt;/p&gt;
</description>
  <itunes:keywords>technology, privacy, open source, security, COVID-19, coronavirus, hacking, identity, contact tracing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to <a href="https://www.schneier.com/" rel="nofollow">Bruce Schneier</a> about contact tracing, digital identity, hacking, privacy, and regulation.</p>

<p>Show notes:</p>

<p>0:00:25: Contact tracing apps<br>
0:02:31: Contract tracing false positive and false negative<br>
0:04:24: Contract tracing apps adoption rate<br>
0:07:36: Katherine agrees apps should build more trust<br>
0:11:44: The 2nd anniversary of the GDPR<br>
0:13:31: Bruce talks about his RSA presentation about the notion of hacking<br>
0:15:26: Katherine dove tails hacking into contact tracing<br>
0:18:24: Hacking discipline around SSI (Self Sovereign Identity)<br>
0:19:08: Should we need proof of immunity or carry an immunization card/immunity passport?<br>
0:23:28: Do the people we entrust to regulate our tech even understand it?<br>
0:29:10: Should we give the FBI digital forensic capabilities?<br>
0:32:24: Katherine wonders if our cellphones are at all secure<br>
0:36:33: Doc ponders the future of travel<br>
0:38:18: Bruce predicts we&#39;re in the midst of a major system reset<br>
0:46:49: The political divide between the way people digest information<br>
0:49:36: Bruce: &quot;Truth wins because it actually conforms to reality.&quot;</p>

<p>Links:<br>
<a href="https://www.schneier.com/blog/archives/2020/05/me_on_covad-19_.html" rel="nofollow">Bruce Schneier on COVID-19 Contact Tracing Apps</a><br>
<a href="https://www.brookings.edu/techstream/inaccurate-and-insecure-why-contact-tracing-apps-could-be-a-disaster/" rel="nofollow">Contact-tracing apps are not a solution to the COVID-19 crisis</a></p><p>Special Guest: Bruce Schneier.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 4: All About Security</title>
  <link>https://www.reality2cast.com/4</link>
  <guid isPermaLink="false">b712affd-3704-4cd6-9bdd-f2734cc1c2f6</guid>
  <pubDate>Thu, 25 Oct 2018 23:00:00 -0400</pubDate>
  <author>Katherine Druckman and Doc Searls</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/55e8e48a-ae33-492f-bc04-175d577a5a7e/b712affd-3704-4cd6-9bdd-f2734cc1c2f6.mp3" length="24530097" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Katherine Druckman and Doc Searls</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>46:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/55e8e48a-ae33-492f-bc04-175d577a5a7e/cover.jpg?v=5"/>
  <description>&lt;p&gt;Doc Searls and Katherine Druckman talk to Linux Journal's own Kyle Rankin about basic security hardening.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;Download ogg format Special Guest: Kyle Rankin.
&lt;/code&gt;&lt;/pre&gt;
</description>
  <itunes:keywords>cybersecurity, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Linux Journal&#39;s own Kyle Rankin about basic security hardening.</p>

<pre><code>Download ogg format
</code></pre><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Doc Searls and Katherine Druckman talk to Linux Journal&#39;s own Kyle Rankin about basic security hardening.</p>

<pre><code>Download ogg format
</code></pre><p>Special Guest: Kyle Rankin.</p><p><a rel="payment" href="https://www.patreon.com/reality2cast">Support Reality 2.0</a></p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
