Podcast appearances and mentions of michael bazzell

  • 23PODCASTS
  • 45EPISODES
  • 56mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 9, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about michael bazzell

Latest podcast episodes about michael bazzell

Bitcoin, Blockchain, and the Technologies of Our Future

https://youtu.be/1g0RzOGxe40Step-by-Step Privacy Hardening:Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac's privacy.In this video, we walk you through privacy expert Michael Bazzell's recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.00:00 Apple promises only THEY will abuse your data02:20 Purchasing Your Mac03:14 Choose a Model03:41 Used Devices: Update, Reformat, Install OS08:28 Initial Setup11:32 WiFi and Bluetooth11:50 OS Firewall13:14 Notifications14:16 Airdrop, Siri, and Sharing15:33 Gatekeeper18:26 Analytics and Ads19:01 Time20:15 Filevault22:02 Dock, Wallpaper and Finder25:35 Application Firewall / 3rd Party Apps28:09 ConclusionApple does build decent privacy tools—but they definitely don't make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here:https://inteltechniques.com/book7.htmlBrought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Politicology
[+] Enemies of Privacy [PREVIEW]

Politicology

Play Episode Listen Later Nov 25, 2024 46:41


To unlock Politicology+ visit politicology.com/plus Mike Madrid, Liam Donovan, Lucy Caldwell, and Ron Steslow discuss the national security risks that data harvesting presents, the need for stronger protections for privacy, and how privacy is necessary for other rights in the digital age.  Related reading: Wired-Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany | WIRED Extreme Privacy by Michael Bazzell - https://inteltechniques.com/book7.html Learn more about your ad choices. Visit megaphone.fm/adchoices

The Watchman Privacy Podcast
126 - 10 Things I Learned from Michael Bazzell

The Watchman Privacy Podcast

Play Episode Listen Later Sep 30, 2024 23:04


I discuss the privacy legend Michael Bazzell and why he is still the standard.   WATCHMAN PRIVACY → https://watchmanprivacy.com (Including privacy consulting) → https://twitter.com/watchmanprivacy → https://escapethetechnocracy.com/   CRYPTO DONATIONS →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy (Monero) →https://btcpay0.voltageapp.io/apps/3JDQDSj2rp56KDffH5sSZL19J1Lh/pos (BTC)   Music by Karl Casey @ White Bat Audio

Bitcoin, Blockchain, and the Technologies of Our Future
Ditch SMS! How to convince your friends

Bitcoin, Blockchain, and the Technologies of Our Future

Play Episode Listen Later Aug 23, 2024 10:46


https://youtu.be/s9Ux8DFgMSMhttps://odysee.com/@NaomiBrockwell:4/ditch-sms:1Most of our conversations are digital, and our privacy hinges on our ability to convince others to use a private messaging platform. Getting friends and family to switch isn't easy though!Here are some strategies you can try, ranging from educational methods, to downright sneakiness!00:00 We have all decided to never answer our phone again02:12 Its Easy02:47 Privacy Leaks04:29 Response Delay05:45 Missed Connection06:37 Daily Reward08:35 App-Switching Fatigue09:10 It's Worth the EffortConvincing people to switch to a more private messaging app can be tough, but it's definitely not something you should give up on. Persistence and patience are key. By encouraging better habits you really are making a more private world, starting in your own backyard.We got all our suggestions from Michael Bazzell's book, "Extreme Privacy": https://amzn.to/3BLZ1gqDigital version: https://inteltechniques.com/book7.html (non affiliate link)Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.

Pretend Radio
How to find people who don't want to be found

Pretend Radio

Play Episode Listen Later Mar 26, 2024 33:59


I recently spoke at the Triangle Content Creators Meetup in Raleigh, NC, about using OSINT techniques to locate and research your next guest. OSINT stands for Open Source Intelligence. As a journalist, I've teamed up with brilliant hackers like Mishaal Khan and Michael Bazzell to uncover new information about my subjects.  In this talk, I explain how Alan Logan and I exposed Frank Abagnale and how Mishaal Khan and I investigated the Stalker case. I thought you might find this interesting.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

Bitcoin, Blockchain, and the Technologies of Our Future
Stop Your Programs Reporting Your Activity with Little Snitch

Bitcoin, Blockchain, and the Technologies of Our Future

Play Episode Listen Later Mar 8, 2024 13:35


https://youtu.be/_0EiqiPuR4Qhttps://open.lbry.com/@NaomiBrockwell:4/Little-Snitch:7Our computers constantly talk to servers across the internet without us realizing, sharing information about our activities. Most of us don't even realize how many programs are silently connecting to the internet and sharing data. It usually happens without our explicit consent. But we can block these connections. On Mac, you can use a program called Little Snitch.In this video we look at the data is silently transmitted from our computer through things like telemetry, and show you how to use Little Snitch to regain control over the data leaving your computer.00:00 Your Computer's SECRET WHISPERS01:39 Data Leaving Your Computer04:02 Little Snitch Walkthrough10:13 Bazzell's Settings10:35 A Note About Alerts and Rules11:48 ConclusionUsing a reverse firewall like Little Snitch can be very revealing about how much data is silently being transmitted from our computer. Simply becoming aware of this can help us make better decisions with the tech we use.Our suggestions come from privacy expert Michael Bazzell, and we highly recommend you check out his site: https://inteltechniques.com/blog/2021/08/18/macos-telemetry-updateLittle Snitch can be found here: obdev.atThere is a similar product that apparently doesn't have the same granular functionality but is free called Lulu. I haven't tested it though, so you're on your own there!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

David Bombal
#450: They're watching you

David Bombal

Play Episode Listen Later Jan 29, 2024 73:58


Is it possible to have Privacy in 2024? I ask Andy Yen (CEO of Proton) this and other very important questions about being anonymous and private on the Internet in 2024. // Books Mentioned // Extreme Privacy: What it takes to disappear by Michael Bazzell: https://amzn.to/3Hcz23m Linux Basics for Hackers by Occupy the Web: https://amzn.to/3RUC69d How to Hack like a Ghost by Sparc Flow: https://amzn.to/3NS8WWY If it's smart, it's vulnerable by Mikko Hypponen: https://amzn.to/4aGV2AK // Proton Affiliate LINKS // Proton Mail: https://go.getproton.me/SHs9 Proton VPN: https://go.getproton.me/SHsA // Andy's SOCIAL // X: https://twitter.com/andyyen Proton Blog: https://proton.me/blog/author/ayen LinkedIn: https://www.linkedin.com/in/andy-yen-... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X / Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:45 - Andy Yen, CEO of Proton // How Proton started 03:52 - Recommended books 04:31 - Is it possible to have privacy in 2024? 07:36 - Privacy vs Anonymity 09:39 - "Privacy is a human need" 10:41 - How to be more private 11:53 - Google's business model 13:45 - How to be more private (continued) 15:20 - How Apple uses your data 16:51 - The Proton and French activist case 20:52 - Proton Mail's encryption explained 23:14 - The Proton and French activist case (continued) 25:48 - The UK Online Safety Act explained 32:15 - How Proton's public keys work 36:51 - No logs on Proton VPN 38:41 - Switzerland and their privacy laws 40:25 - TOR vs VPN 43:32 - Proton's ecosystem 45:20 - Proton Pass and Proton Sentinel // Leaked passwords 52:42 - Basics on how to get privacy in 2024 57:02 - Advanced ways to get privacy 01:03:13 - Recommended messaging apps 01:06:19 - The worry of A.I. in 2024 01:07:58 - Why encryption in email is needed // SMTP (Simple Mail Transfer Protocol) explained 01:11:12 - Proton vs Google 01:13:28 - Conclusion vpn proton mail proton vpn proton tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #wifi #iphone #android

David Bombal
#448: Free OSINT course and resources: How you can get started in 2024

David Bombal

Play Episode Listen Later Jan 22, 2024 63:19


Big thanks to Brilliant for sponsoring this video! First 200 people that sign up will get a special discount. Get started with a free 30 day trial and 20% discount: https://Brilliant.org/DavidBombal // Free OSINT course // Introduction to OSINT course: https://www.myosint.training/courses/... // Griffin's Start me page // Start me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... // Course LINKS (Affiliate) // All OSINT Course Bundle (all our OSINT courses for 1 price): https://www.myosint.training/bundles/... Core OSINT courses in OSINT Immersion bundle: https://www.myosint.training/bundles/... // Previous YouTube videos // Deep Dive OSINT: • Deep Dive OSINT (Hacking, Shodan and ... OSINT Social Media: • OSINT social media: Are you crazy to ... OSINT tools to track you down: • OSINT tools to track you down. You ca... OSINT: You can't hide: • OSINT: You can't hide // Your privacy... // Micah Hoffman's SOCIAL// X: / webbreacher LinkedIn: / micahhoffman Micah's Personal Blog: https://webbreacher.com // Griffin Glynn's SOCIAL // X: / hatless1der LinkedIn: / griffin-g Griffin's Personal Blog: https://hatless1der.com Griffin's Start.me Resources: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... // My OSINT Training SOCIAL // OSINT Training: https://myosint.training OSINT Newsletter: https://myosint.link/newsletter X / Twitter: / myosinttrainer LinkedIn: / my-osint-training YouTube: / @myosinttraining // Resources SHARED // My OSINT Training (MOT) free courses: Introduction to OSINT: https://www.myosint.training/courses/... Careers Using OSINT Skills: https://www.myosint.training/courses/... or on YouTube: • Careers in OSINT Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...) // Books REFERENCE // Deep Dive by Rae Baker: https://amzn.to/3tWocvg OSINT Techniques Resources for Uncovering Online Information by Michael Bazzell: https://amzn.to/3O6Ljdj // David's SOCIAL // Discord: / discord X / Twitter: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com osint open-source intelligence open source intelligence tools osint curious geolocation geolocation game facebook instagram google bing yandex geolocation google geolocation bing you cannot hide social media warning about social media google dorks dorks google osintgram osint framework osint tools osint tv osint ukraine osint tutorial osint course osint instagram osint framework tutorial cyber security information security open-source intelligence open source intelligence sans institute cybersecurity training cyber security training information security training what is osint open source artificial intelligence cyber hack privacy nsa oscp ceh Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #osint #cyber #privacy

Pretend Radio
1510: How to Disappear Revisited

Pretend Radio

Play Episode Listen Later Jan 16, 2024 54:42


Dartanyon A. Williams (DAW) stole his parents' identities at the age of 15. Unfortunately, they weren't his last victims. Dartanyon, who also goes by DAW, claims he has stolen thousands of identities. So many that he's lost count. It's rare to hear firsthand from an identity thief. In this episode, Dartanyon How to steal someone's identity How did he do it? He had many tactics. But the most proven technique was paying off restaurant employees, car dealerships, and tax preparation companies. These employees served as double agents. When no one was looking, they would collect customers' social security numbers and smuggle them to DAW. Today, DAW's life of crime is behind him. He even ran for Congress for the U.S. House of Representatives. How to protect your identity These days, it's just as easy to steal your identity from a breached database. Everything an identity thief needs to steal your identity is already online. What can you do to protect yourself?  Click here to see if your email has been involved in a breached database: https://haveibeenpwned.com/ Freezing your credit and setting up a fraud alert I've taken the extreme step of freezing my credit. It's actually not really that extreme. In fact, it's quite easy. In this episode, you'll hear how simple it is to lock down your credit so that no one can assume your identity.  Michael Bazzell, a privacy consultant, walks me through the credit freeze process. For more details, download his step-by-step guide.  Essentially, get a free credit report from one of the credit bureaus, then ask them to freeze your credit. This way, no one can open a line of credit under your name. If you ever need to unfreeze your credit, it's easy. Just unfreeze your credit by going online or with a quick phone call.  Equifax Online: https://www.equifax.com/personal/credit-report-services/credit-freeze/ Experian Online: https://www.experian.com/freeze/center.html TransUnion Online: https://service.transunion.com/dss/orderStep1_form.page   If you just stumbled on this page, start with part 1. Michael Bazzell To learn more about Michael Bazzell, check out his website IntelTechniques.com Learn more about your ad choices. Visit podcastchoices.com/adchoices

house congress freezing disappear daw michael bazzell dartanyon
The Lockdown - Practical Privacy & Security
005 - Brave vs Firefox, and When Privacy Goes Wrong

The Lockdown - Practical Privacy & Security

Play Episode Listen Later Nov 24, 2023 30:07


In this week's show, Ray Heffer gives a farewell to Michael Bazzell's Privacy, Security, and OSINT show. Also, speculation about living in a faraday cage continues, and the reasons Firefox is still better than Brave for privacy and security. Ray also talks about when privacy techniques go wrong, with his lockout from Privacy.com.This episode was recorded on November 22nd, 2023Follow me on Twitter @privacypodThis week's episode:IntroductionNotable mention for Michael BazzellNew website and Twitter accountWhy I don't use Brave and the reasons Firefox is still the best optionWhen Privacy Techniques Go WrongLinks mentioned in the show:MITRE ATT&CK (Credentials from Web Browsers): https://attack.mitre.org/techniques/T1555/003/MITRE ATT&CK (Password Managers): https://attack.mitre.org/techniques/T1555/005/Tor Project Recommendations: https://support.torproject.org/tbb/tbb-9/Brave (VPN Services) Issue: https://github.com/brave/brave-browser/issues/33726Citi Virtual Credit Cards: https://www.cardbenefits.citi.com/Products/Virtual-Account-NumbersCiti (True Name) Card: https://banking.citi.com/cbol/updatemyname/default.htmIronVest (Formerly Abine Blur): https://ironvest.com/pricing/Wise Virtual Card (UK): https://wise.com/gb/virtual-card/Intro music: The Lockdown"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." - Marcus Aurelius

Podcast Junkies
320 Jack Rhysider - Exploring Digital Frontiers: A Journey Through Technology, Podcasting, and Privacy

Podcast Junkies

Play Episode Listen Later Jul 17, 2023 52:44 Transcription Available


This episode, I speak with Jack Rhysider, host of DarkNet Diaries. We discuss the evolution of technology, and the rise of AI. Jack's passion for audio storytelling shone through as he shared how he crafts each episode of DarkNet Diaries, uncovering riveting stories of cybersecurity. We covered branding in podcasting, the impact of unique artwork, and how exciting collaborations arise in the podcasting world. We also dove into privacy concerns, China's ownership of TikTok, and the implications of data collection. Jack shared his insights on cybersecurity's impact on society and individuals, the importance of privacy in our tech-driven world, and what the future holds for DarkNet Diaries. Join us for this captivating (and sometimes scary) adventure through the realms of technology, podcasts, and privacy.Episode SponsorFocusrite – http://pcjk.es/vocasterFullCast – https://fullcast.co/Key Takeaways0:02:14 - AOL's Attempt to Control Internet Access 0:06:45 - No-Code and AI Tools Evolution 0:10:20 - The Advantages of AI in Healthcare 0:16:18 - Endless Stories in Cybersecurity 0:22:41 - Journalists and Storytelling Opportunities 0:25:32 - Concerns About Privacy and Data Breaches 0:32:56 - Navigating Privacy and Cybersecurity Challenges 0:37:08 - Inspiring Online Privacy and Career PathsTweetable Quotes"Even today, if you ask people what's the internet, they're going to say Google or a website. But there's more to it. I mean, Zoom isn't Google, right? The phone calls aren't Google, like there's a lot of things that are going on on the internet." "I think the era of, I'm going to go to school and I'm going to get a job, and I'm going to have that job for life is over. We have to redefine ourselves every five or ten years and get a whole new skill set, because technology is advancing in a rapid way and it's not something you can just set for your life anymore." "The 2000s is where we really ruined our privacy and it's going to take us decades to put that back together. Even when you trust a company like your healthcare provider, and then they have a data breach and now China knows everything about your health records, it's like why is this even a thing?"Resources MentionedOut on the Wire: The Storytelling Secrets of the New Masters of Radio by Jessica Abel - https://www.amazon.com/Out-Wire-Storytelling-Secrets- Masters/dp/0385348436 Extreme Privacy: What It Takes to Disappear by Michael Bazzell - https://www.amazon.com/Extreme-Privacy-Takes-Disappear- America/dp/1093757620 DarkNetDiaries - https://darknetdiaries.com/ Jack on LinkedIn - https://www.linkedin.com/in/jack-rhysider-02922a167/Jack's Email - jack@darknetdiaries.com Jack's Twitter - https://twitter.com/jackrhysider Jack's Instagram -

The OSINTion
Episode 6 - Exploring the Intersection of OSINT and Red Teaming with Rey Bango

The OSINTion

Play Episode Listen Later Mar 9, 2023 71:31


Joe and Ray discuss how OSINT is used in offensive security scenarios, focusing on the importance of doing in-depth research. In order to properly use OSINT, Ray explains that it is essential to identify and map out the risks associated with an organization, as well as to do research to understand the company's structure, assets, and resources. He emphasizes that it is important to look at where the information lies, in order to get an idea of who the key people are within an organization. This could include looking for patterns in social media accounts, websites, and other sources to uncover insight on those individuals. Ray also advises that when doing the legwork, it is important to not only look at public sources, but to dig deeper. By using OSINT, companies can better understand their adversaries and develop a more effective security strategy. He further explains that it is important to constantly monitor the situation, as adversaries often change their tactics or target different areas. With the right tools and strategies in place, organizations can stay one step ahead of potential threats and be better prepared to respond. Links Discussed: Dehashed: https://www.dehashed.com HaveIBeenPwned: https://www.haveibeenpwned.com SecurityTrails: https://www.securitytrails.com View DNS: https://www.viewdns.info DNS Dumpster: https://www.dnsdumpster.com Snapchat Map: https://map.snapchat.com Trace Labs Kali: https://www.tracelabs.org/initiatives/osint-vm Raspberry Pis: https://www.raspberrypi.com/ Free Digital Ocean Credit: https://m.do.co/c/ab5f75969c8a Phone Infoga: https://github.com/sundowndev/phoneinfoga CSI Linux: https://csilinux.com/ Flare VM: https://github.com/mandiant/flare-vm Parrot OS: https://www.parrotsec.org/ Kali Linux: https://www.kali.org/ Axiom: https://github.com/pry0cc/axiom SANS SIFT: https://www.sans.org/tools/sift-workstation/ Volatility Framework: https://www.volatilityfoundation.org/ Shodan: https://www.shodan.io Michael Bazzell's Extreme Privacy: https://inteltechniques.com/book7.html Michael Bazzell's Website: https://inteltechniques.com/ Joe's Podcast with Michael Bazzell: https://osint.mobi/michael-bazzell-podcast Joe's Podcast with Justin Seitz: https://osint.mobi/justin-seitz-podcast Justin Seitz's Hunchly: https://www.hunchly.com Justin Seitz's Python for OSINT Training: https://www.automatingosint.com Imagga: https://imagga.com/ Infoga: https://github.com/The404Hacking/Infoga Joe's Podcast with Joe Vest: https://osint.mobi/red-team-podcast Contacting Rey: Twitter: https://twitter.com/reybango The OSINTion Links: https://linktr.ee/TheOSINTion Twitch: https://twitch.tv/theosintion YouTube: https://osint.mobi/youtube The OSINTion Training: On-Demand: https://academy.theosintion.com Live Training: https://www.theosintion.com/courses --- Send in a voice message: https://podcasters.spotify.com/pod/show/the-osintion/message Support this podcast: https://podcasters.spotify.com/pod/show/the-osintion/support

Killer Heart To Hearts
Protecting Ourselves from Cyber Sleuths with PI, Megan Kohls

Killer Heart To Hearts

Play Episode Play 45 sec Highlight Listen Later Oct 24, 2022 40:28


Stalking can show in many different forms. We begin with the case of Rebecca Schaeffer, an up and coming actress who became the victim of an obsessed fan in 1989. Then we bring the conversation to the 21st century where cyber sleuthing is one of the most prominent forms of stalking. We dive deep with a Private Investigator who has some very helpful tips on how to prevent ourselves from being the next victim.Rebecca Schaeffer - Source Material:Wikipedia - Rebecca SchafferE! News ArticleWikipedia - Driver's Policy Protection ActWikipedia - Robert John BardoWikipedia - Restraining OrderUPI NewsIn Conversation with Megan Kohls - References:Great online privacy resources from Michael Bazzell: https://inteltechniques.com/links.htmlLast Week Tonight with John Oliver segment on Data Brokers: https://www.youtube.com/watch?v=wqn3gR1WTcACheck if your information was exposed in a data breach: https://breachdirectory.org/index.htmlE-mail: killerhearttohearts@gmail.comInstagramFacebookTwitter

Bitcoin Dad Pod
Episode 43: TickTok Activated Softforks with Paul Sztorc

Bitcoin Dad Pod

Play Episode Listen Later Oct 7, 2022 135:04


Intro Edward Chancellor Devil Take the Hindmost (https://www.edwardchancellor.com/) Mercea Popeski's best quotes (https://twitter.com/pete_rizzo_/status/1409128764903206912) courtesy of Pete Rizzo And his "former lover's" blog (https://t.co/KIflJGCVYb) News Swan aquires the company (https://archive.ph/vKD8k) behind Specter wallet (https://archive.ph/M2MWL) Tornado Cash Developer Alexey Pertsev still being held 7 weeks without charge (https://www.theblock.co/post/174016/arrested-tornado-cash-developer-alexey-pertsev-appeal-rejected) and Dutch authorities are selling his car? When Taproot? (https://whentaproot.org/) tracks taproot integration in projects and provides education to developers, bitcoin upgrades can take time to become widespread (https://buybitcoinworldwide.com/stats/segwit-adoption/) Economics A modern look at the Trinity Study (https://web.archive.org/web/20110806210437/http://www.aaii.com/journal/article/retirement-savings-choosing-a-withdrawal-rate-that-is-sustainable?utm_source=sitesearch&utm_medium=click) and what it says about human's search for monetary stability (https://web.archive.org/web/20110708072619/http://wpfau.blogspot.com/2010/10/trinity-study-retirement-withdrawal.html) The Trinity Study tried to debunk a 10% withdrawl rate, not support a 4% rate The Blues and the Greens (https://www.lesswrong.com/posts/6hfGNLf4Hg5DXqJCF/a-fable-of-science-and-politics), one of Paul's favorite allegories Some detail and texture of the early 20th century gold standard (https://m.youtube.com/watch?v=_Gqn4WWvvNM) The Apple Card is worse than subprime (https://www.cnbc.com/2022/09/12/goldmans-gs-apple-card-business-has-a-surprising-subprime-problem.html), turns out making phones doesn't make you a good CC issuer? A primer on bond investing (https://www.lynalden.com/bond-investing/) from Lyn Alden as a way to think about the Privacy ErgoBTC contributes to privacy guru Michael Bazzell's pro-privacy magazine (https://www.nobsbitcoin.com/unredacted-4/) Speaking of Michael Bazzell, his guide on a DIY credit freeze (https://inteltechniques.com/freeze.html) is a must do for all people in the USA Software Updates Fountain podcast app now supports a queue (https://archive.ph/KbiNt) and carplay - Chris seemed to think that was important Bitcoin Education Lopp on encrypted cloud backups (https://blog.lopp.net/how-to-securely-back-up-data-to-cloud-storage/) ZeroSync - an instant blockchain syncronization proof (https://github.com/lucidLuckylee/zerosync/tree/main/docs) might allow nodes to instantly sync to the bitcoin mainchain Uses bitcoin's assumeValid (https://bitcoincore.org/en/2017/03/08/release-0.14.0/#assumed-valid-blocks) flag and implements utreexo (https://dci.mit.edu/utreexo) In Bitcoin Optech #219 (https://bitcoinops.org/en/newsletters/2022/09/28/) Anthony Towns describes a bitcoin fork for testing soft fork proposals on Signet, useful for Drivechains? Paul discusses alternative drivechain activation methods (https://bitcoinops.org/en/newsletters/2022/09/21/) Feedback Remember to get in touch bitcoindadpod@protonmail.com or @bitcoindadpod on twitter Consider joining the matrix channel (https://matrix.to/#/#bitcoin:jupiterbroadcasting.com) using a matrix client like element (https://element.io/get-started) Boosts Lopp's bitcoin resources (https://www.lopp.net/bitcoin-information.html) for learning about all aspects of bitcoin Paul's drive chain (https://www.drivechain.info/) resources Run a drive chain here (https://www.drivechain.info/releases/index.html) Corrections None today! Value for Value Podcasting 2.0 to support an indepenent podcasting ecosystem (https://podcastindex.org/) Recomended Podcasting2.0 apps: Fountain (https://www.fountain.fm/) podcast app (Android) Podverse (https://podverse.fm/) (Cross platform and self hostable) Castamatic (https://apps.apple.com/us/app/castamatic-podcast-player/id966632553) (Apple)+ Podcasting 2.0 to support an indepenent podcasting ecosystem (https://podcastindex.org/) Sponsors and Acknowledgements The Adopting Bitcoin Conference (https://adoptingbitcoin.org/2022/) Novem ber 15, 16 & 17, 2022 in El Salvador, use promo code BITCOINDAD for a 21% di scount Music by Lesfm from Pixabay Self Hosted Show (https://selfhosted.show/) courtesy of Jupiter Broadcasting (https://www.jupiterbroadcasting.com/)

David Bombal
#391: You are in a Cyber War. Don't be a dumb*** and try to ignore it

David Bombal

Play Episode Listen Later Jul 4, 2022 83:04


You are in a Cyber War. Don't try to ignore what is going on. Learn the Art of Cyberwarfare. An Investigator's Guide to Espionage, Ransomware and Organized Cybercrime. // MENU // 00:00 - Don't be a dumb*** 00:23 - Introducing//Jon Dimaggio 00:30 - Journey to Cyberwarfare 03:08 - How Jon Started Writing Professionally 06:45 - From Fired to Symantec 10:22 - Dealing with Difficult People in Charge 12:49 - How to Become an Overnight Success 16:52 - The Art of Cyberwarfare 23:43 - Who This Book is For 27:07 - Jon's Writing Assistant 27:59 - Advanced Persistent Threat//Different Animal 35:12 - WanaCry // How Jon Got Into Ransomware 42:21 - Why APTs Need to Be Handled Differently 44:54 - The Battle to Spread Awareness of APTs 47:56 - Ukraine//Election Hacking 49:50 - What to Do When Facing APTs 54:15 - Open Source As An Alternative 56:09 - How to Contact Jon 58:30 - Finding Cybercriminals//The Darkweb 1:04:45 - How to Get Into Cyberwarfare 1:10:19 - Hacking Certifications 1:14:59 - The Book Jon Uses For OSINT Tools 1:17:30 - Do the Heavy Lifting to Accomplish Your Dreams 1:20:40 - Thank You & Final Thoughts // Books // The Art of Cyberwarfare by Jon DiMaggio: https://amzn.to/3btDJJz Open Source Intelligence Techniques by Michael Bazzell: https://amzn.to/3xTnAVd // Jon's SOCIAL // Twitter: https://twitter.com/Jon__DiMaggio LinkedIn: https://www.linkedin.com/in/jondimaggio/ // David's SOCIAL // Discord: https://discord.gg/davidbombal Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube Main Channel: https://www.youtube.com/davidbombal YouTube Tech Channel: https://youtube.com/channel/UCZTIRrEN... YouTube Clips Channel: https://www.youtube.com/channel/UCbY5... YouTube Shorts Channel: https://www.youtube.com/channel/UCEyC... Apple Podcast: https://davidbombal.wiki/applepodcast Spotify Podcast: https://open.spotify.com/show/3f6k6gE... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com cyberwar cyber warfare cyberwire cyber security cyber war ukraine russia ukraine cyber attack cyber security career cyberwar russia cyber security course cyber security analyst cyber security interview questions cyber security engineer stuxnet stuxnet explained stuxnet virus malware election hacking ukraine russia ukraine cyberwar russia cyberwar iran cyberwarfare nsa usa cyberwar osint titan rain red october regin north korea russian ukraine news russia news russia ukraine war hacking cyber war on russia cyber warrior ukraine war russia ukraine crisis ukraine invasion russia ukraine conflict vladimir putin info sec russia ukraine conflict video russia ukraine news ukraine news ukraine news russia hacker hacked hacktivisim cybersec infosec info ec proxy chains tor hack russia Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #cyberwar #hacking #ransomware

Pretend Radio
S604: How to disappear part 4

Pretend Radio

Play Episode Listen Later Sep 18, 2020 54:08


Confessions of a former identity thief  Dartanyon A. Williams stole his parents' identities at the age of 15. Unfortunately, they weren’t his last victims. Dartanyon, who also goes by DAW, claims he has stolen thousands of identities. So many that he lost count.  How to steal someone’s identity How did he do it? He had many tactics. But the most proven technique was paying off employees at restaurants, car dealerships, and tax preparation companies. These employees served as double agents. When no one was looking, they would collect customer social security numbers and smuggle them to DAW. Today, DAW’s life of crime is behind him. He’s currently running for congress this November for the U.S. House to represent Louisiana's 6th Congressional District.  How to protect your identity These days, it’s just as easy to steal your identity from a breached database. Everything an identity thief needs to steal your identity is already online. What can you do to protect yourself?  Click here to see if your email has been involved in a breached database: https://haveibeenpwned.com/ Freezing your credit and setting up a fraud alert I’ve taken the extreme step of freezing my credit. It’s actually not really that extreme. In fact, it’s quite easy. In this episode, you’ll hear how simple it is to lock down your credit so that no one can assume your identity.  Michael Bazzell, a privacy consultant, walks me through the credit freeze process. For more details, download his step-by-step guide.  Essentially, get a free credit report from one of the credit bureaus, then ask them to freeze your credit. This way, no one can open a line of credit under your name. If you ever need to unfreeze your credit, it’s easy. Just unfreeze your credit by going online or with a quick phone call.  Equifax Online: https://www.equifax.com/personal/credit-report-services/credit-freeze/ Experian Online: https://www.experian.com/freeze/center.html TransUnion Online: https://service.transunion.com/dss/orderStep1_form.page Michael Bazzell To learn more about Michael Bazzell, check out his website IntelTechniques.com and listen to his podcast The Privacy, Security, & OSINT show.  I also recommend you buy a copy of Extreme Privacy: What it takes to disappear. Learn more about your ad choices. Visit megaphone.fm/adchoices

Pretend Radio
S603: How to disappear part 3

Pretend Radio

Play Episode Listen Later Sep 4, 2020 61:26


In the last two episodes, you heard from Michael Bazzell a privacy expert whose job is to make people disappear. But who is he? Why is he so passionate about privacy? And how exactly does he make people disappear? I'm going to do my best to figure him out.  It turns out Michael Bazzell eats his own dog food. He's pretty much an invisible man. I have no idea where he lives or what he looks like. I've spent hours talking to Michael these past few months hoping that he will slip up and let out some detail about his private life. Nope. This guy is locked down and takes his privacy seriously.  If you want to disappear, here is a checklist of things you’ll need to get started: First, you’ll need a copy of Michael Bazzell’s book titled Extreme Privacy: What it takes to disappear. A secure VPN to protect your location. Michael Bazzell says that a VPN is probably the single most important item on this list.  A Faraday bag for your smartphone like this one.  For more resources, make sure to visit inteltechniques.com. And make sure to check out Michael Bazzell’s podcast The Privacy, Security, & OSINT Show. It's time to reevaluate your digital privacy. Everything you need to know in order to live off the digital grid. Learn more about your ad choices. Visit megaphone.fm/adchoices

Pretend Radio
S6E2: How to disappear part 2

Pretend Radio

Play Episode Listen Later Aug 21, 2020 45:09


In the last episode, we talked about the wrong way to disappear. Faking your own death rarely works. But did you know that there are real people out there who legitimately need to fade away into society?  Who needs to disappear? There are many reasons to live anonymously. However, we’ve broken it down to four different archetypes: the executive, the celebrity, the victim, and the government employee.  The executive CEOs and business executives are easy targets. They take all the credit when things go right. But they’re also responsible any time something goes wrong. And when that happens they have to minimize the threat. It could be a disgruntled employee, or they'be a target because of their wealth. Recently, a Silicon Valley CEO was kidnapped and murdered by two former employees. Hear tactics executives use to live privately. The celebrity Today’s celebrities are more accessible than ever. Stars like Taylor Swift, Eminem, and UFC fighter Anthony Smith have had their homes broken into. Alison Sweeney, from Days of our Lives and the Biggest Loser, talks about balancing the limelight with basic privacy rights.  The victim Often times, domestic violence victims need to disappear in order to survive. Hear the story on how one victim fled her attacker.  The government employee Judges and prosecutors are often targets of intimidation and death threats. And police are targets too due to the heightened attention on police brutality and racial profiling. Learn how government employees eliminate the threat by making themselves impossible to find. This series is a collaboration with Michael Bazzell. In the next few episodes, we’re going to show you to successfully vanish from society. You too can live undetected. It’s not just for wealthy CEOs.  For more than 20 years, Michael Bazzell worked on behalf of the US government investigating computer crimes. He was also a consultant on the hacker show Mr. Robot. He no longer works for the government. These days, Michael Bazzell helps people disappear. ---- Get Michael Bazzell's book: Extreme Privacy: What it takes to disappear Affiliate link disclaimer. Learn more about your ad choices. Visit megaphone.fm/adchoices

Pretend Radio
S6E1: How to disappear part 1

Pretend Radio

Play Episode Listen Later Aug 7, 2020 40:52


Did Olivia Newton-John’s Former Boyfriend Fake His Own Death?Faking your own death is almost always a bad idea. Hear the story of Patrick McDermott, Olivia Newton John’s boyfriend, who many believe staged his own death.  The wrong way to disappear People have been playing dead since the beginning of time. There’s really no way of knowing for how long this has been going on. But I can imagine that the illusion of dying is closely correlated with the concept of debt. If you owe someone lots of money, you have two options: either pay it or run away.  Patrick McDermott, Olivia Newton-John’s missing boyfriend, had every reason to run away. His film work had dried up and he owed his ex-wife thousands of dollars in back child support. It took 10 days for anyone to realize he was missing. Olivia Newton-John wasn’t looking for him because they had just recently broken up. It wasn’t until he didn’t show up to pick up his son that his ex-wife noticed something was wrong. But people can’t just run away without leaving behind clues.   Patrick McDermott was last seen after going on an overnight fishing trip. Was McDermott lost at sea or was he just on the run? The truth is, no one wanted to find out. His ex-wife filed a claim on his life insurance. And Olivia Newton John wanted the whole thing put behind her. When the manager of the marina was asked about McDermott’s whereabouts, he said that Patrick McDermott’s name was indeed on the ship’s manifesto. And there was something else. He left behind his tackle box. Inside, they found his wallet, driver’s license, and car keys.  Why would anyone want to fake their own death? I haven’t seen any real study on this topic but I can imagine that there are many reasons why someone would want to leave their own life behind and start fresh. It could be forbidden love like in Romeo and Juliet. Or it can be greed—like someone trying to cash in on their own life insurance policy. When it comes to dying, people have many different motivations.  How to disappear with Michael Bazzell This series is a collaboration with Michael Bazzell, a privacy consultant and host of The PRIVACY, SECURITY, & OSINT Show. We’re going to show you the wrong way and the right way to disappear.  Buy the book: Extreme Privacy: What it takes to disappear by Michael Bazzell: https://amzn.to/2XFm4of A special thanks to Philip Klein. If you want to read more about Patrick McDermott’s disappearance, check out the book “Lost at Sea: The hunt for Patrick McDermott.” Buy the book: Lost at Sea https://amzn.to/3ihMjcf Affiliate link disclaimer. Learn more about your ad choices. Visit megaphone.fm/adchoices

The OSINT Curious Project
Episode 24 - TikTok investigation techniques, more on Instagram and the new IntelTechniques Book! And more!

The OSINT Curious Project

Play Episode Listen Later Nov 10, 2019 57:38


People in this Episode: Ginsberg5150 Sector035 Technisette Micah Dutch_Osintguy Links to what we discussed New OSINT Curious logo! https://twitter.com/OsintCurious/status/1187624103231967232 Tiktok https://twitter.com/OsintCurious/status/1187624103231967232 https://twitter.com/sinwindie/status/1189364481085890562 https://twitter.com/IntelTechniques/status/1188493096499105792 Instagram https://twitter.com/Sector035/status/1187479840233885696 https://twitter.com/osintcombine/status/1187908145223352320 LinkedIn – https://www.osintcombine.com/post/corporate-profiling-advanced-linkedin-searching-more OSINT4Good – https://twitter.com/Europol/status/1187657027050528768 ISIS Attack map – https://twitter.com/TomaszRolbiecki/status/1188849963138191361 AirBnB Scam – https://www.vice.com/en_us/article/43k7z3/nationwide-fake-host-scam-on-airbnb Michael Bazzell's new book – https://inteltechniques.com/book1.html Firefox customization for OSINT – https://blogpirate.net/2019/10/31/how-to-make-firefox-an-essential-tool-for-osint/ Vortimo b3 – http://vortimo.com/beta3/ Using 10-K and public business data in OSINT – https://www.managerisks.net/new-blog/2019/10/29/season-11-or-so-you-want-to-be-an-open-source-researcher https://blog.google/products/search/search-language-understanding-bert/ nlp processing Bert by google brings new dimension to searching google Self Promotion Micah – At the SANS CDI (Washington, DC) event in December, anyone taking a class at the event can participate in the Tracelabs Missing Persons CTF! https://www.sans.org/event/cyber-defense-initiative-2019/bonus-sessions/19390/#bonus-box --- Support this podcast: https://anchor.fm/osintcurious/support

The OSINTion
OSINT TECHNIQUES (WITH MICHAEL BAZZELL)

The OSINTion

Play Episode Listen Later Mar 30, 2018 65:29


OSINT Techniques (with Michael Bazzell) Advanced Persistent Security Podcast Episode 40 Guest:Michael Bazzell March 30, 2018 If you enjoy this podcast, be sure to give us a 5 Star Review and ... The post OSINT TECHNIQUES (WITH MICHAEL BAZZELL) first appeared on Advanced Persistent Security. --- Send in a voice message: https://podcasters.spotify.com/pod/show/the-osintion/message Support this podcast: https://podcasters.spotify.com/pod/show/the-osintion/support

osint michael bazzell advanced persistent security
Advanced Persistent Security
OSINT TECHNIQUES (WITH MICHAEL BAZZELL)

Advanced Persistent Security

Play Episode Listen Later Mar 30, 2018 65:30


OSINT Techniques (with Michael Bazzell) Advanced Persistent Security Podcast Episode 40 Guest:Michael Bazzell March 30, 2018 If you enjoy this podcast, be sure to give us a 5 Star Review and ...

The Social-Engineer Podcast
Ep. 103 - How To Be A Good Parent With Michael Bazzell

The Social-Engineer Podcast

Play Episode Listen Later Mar 12, 2018 53:12


Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI's Cyber Crimes Task Force where he focused on open source intelligence, hacking cases, and personal data removal methods. As an active investigator for multiple organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions. He has trained thousands of individuals in the use of his investigative techniques and privacy control strategies. This month Michael talks about: Some actionable OSINT tips you can use now! His new book that you must read Tips on parenting, that we doubt you will want to follow His VM operating system that contains so many tools it could make an OSINT'er drool So much more....   Make sure to check out his Twitter Account: inteltechniques and his podcast The Complete Privacy & Security Podcast Micahel's new book: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information is a must read and he recommends our listeners check out: Salt: A World History by Mark Kurlansky We know you will enjoy this episode!

Purple Squad Security
Episode 22 – Open Source Intelligence Techniques with Michael Bazzell

Purple Squad Security

Play Episode Listen Later Mar 4, 2018 33:29


Nothing helps out security more than information.  Heck, it's the first part of our professions name!  In Infosec, knowledge is key and sometimes we need to roll up our sleeves to get the information we need from various open source outlets.  I'm fortunate to have as a guest on this episode the man who literally wrote the book on OSINT techniques, Michael Bazzell.  We discuss OSINT techniques as well as his recently updated book.  Have yourself a listen and hear the advice Michael has for starting your own OSINT adventures. Some links of interest: https://inteltechniques.com/ Open Source Intelligence Techniques, 6th Edition Buscador - OSINT OS https://michaelbazzell.com/forum.html Want to reach out to the show?  There's a few ways to get in touch! Show's Twitter: @PurpleSquadSec John's Twitter: @JohnsNotHere Podcast Website: purplesquadsec.com Sign-Up for our Slack community: https://signup.purplesquadsec.com John's Peerlyst Profile: https://www.peerlyst.com/users/john-svazic Thanks for listening, and I will talk with you all again next time.Find out more at http://purplesquadsec.com

heck slack osint michael bazzell open source intelligence techniques
Paul's Security Weekly TV
Michael Bazzell, OSINT & Privacy Consultant - Paul's Security Weekly #548

Paul's Security Weekly TV

Play Episode Listen Later Feb 19, 2018 48:55


Michael Bazzell spent 18 years as a government computer crime investigator. He joins Paul and crew this week for an interview! Full Show Notes: https://wiki.securityweekly.com/Episode548 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.comsecurityweekly

consultants privacy osint paul asadoorian michael bazzell joffthyer paul's security weekly
Paul's Security Weekly (Video-Only)
Michael Bazzell, OSINT & Privacy Consultant - Paul's Security Weekly #548

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Feb 17, 2018 48:55


Michael Bazzell spent 18 years as a government computer crime investigator. He joins Paul and crew this week for an interview! Full Show Notes: https://wiki.securityweekly.com/Episode548 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.comsecurityweekly

consultants privacy osint paul asadoorian michael bazzell joffthyer paul's security weekly
Paul's Security Weekly (Podcast-Only)
They Stole My Shoes - Paul's Security Weekly #548

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Feb 16, 2018 138:17


This week, Steve Tcherchian, CISO and Director of Product Management of XYPRO Technology joins us for an interview! In our second feature interview, Paul speaks with Michael Bazzell, OSINT & Privacy Consultant! In the news, we have updates from Google, Bitcoin, NSA, Microsoft, and more on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode548   Visit https://www.securityweekly.com/psw for all the latest episodes!

Paul's Security Weekly
They Stole My Shoes - Paul's Security Weekly #548

Paul's Security Weekly

Play Episode Listen Later Feb 16, 2018 138:17


This week, Steve Tcherchian, CISO and Director of Product Management of XYPRO Technology joins us for an interview! In our second feature interview, Paul speaks with Michael Bazzell, OSINT & Privacy Consultant! In the news, we have updates from Google, Bitcoin, NSA, Microsoft, and more on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode548   Visit https://www.securityweekly.com/psw for all the latest episodes!

Advanced Persistent Security
2017 Holiday Podcaster’s Podcast (NSF Kids/Work)

Advanced Persistent Security

Play Episode Listen Later Dec 22, 2017 82:49


2017 Holiday Podcaster’s Podcast (NSF Kids/Work) ADVANCED PERSISTENT SECURITY   December 22, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on ...

Radical Personal Finance
482-The Equifax Data Breach: Background, How It Affects You, and the Minimum Steps You Need to Take to Protect Yourself

Radical Personal Finance

Play Episode Listen Later Sep 15, 2017 57:50


Today we tackle the Equifax security breach. This is the most damaging release of personal information ever. And you need to take it seriously. You must assume that you have been affected. At this point, I see no reason to even trust the official Equifax website. Here's why. Clark Howard's excellent credit freeze guide: http://clark.com/personal-finance-credit/credit-freeze-and-thaw-guide/ Another excellent one by the Justin Carroll and Michael Bazzell: https://privacy-training.com/CreditFreeze.pdf I forgot to mention this on the show, but here's a link for those of you who are readers of the resources. The IRS seems to use social media to find people committing tax fraud. Source: http://taxprof.typepad.com/taxprof_blog/2017/08/the-irs-is-mining-taxpayer-data-on-social-media-in-violation-of-federal-privacy-law.html The official Equifax response website: www.equifaxsecurity2017.com Why the Equifax breach is possibly the worst leak of personal information ever. What should you do if your data was hacked? The novel I mentioned: True Faith And Allegiance, a Tom Clancy novel by Mark Greaney

Ah Ha Moments for Success
Episode 6 - Digital Innovation Expert, Speaker - Amber Mac

Ah Ha Moments for Success

Play Episode Listen Later Jun 18, 2017 25:10


Amber Mac, Speaker, Author, Host, Entrepreneur on Ah-Ha Moments for Success Podcast with Anita Heidema I am an entrepreneur, bestselling author, blogger, keynote speaker, and TV/radio host. I started my career during the dot-com boom in San Francisco and have since been at the forefront of reporting on and participating in digital innovation. OFFICIAL BIO: AMBER MAC, PRESIDENT, AMBERMAC MEDIA Amber Mac(Arthur) started her career in San Francisco and Boston during the dot-com boom in the late 1990s. As a strategist for Razorfish and Director of Marketing for an e-procurement software company, she spent four years in the technology start-up trenches. Amber left the start-up world to join Microsoft to build one of the first female-focused lifestyle portals. In 2006, with her brother, she started her own digital agency called Konnekt. The company’s first client was world-renowned business coach, Tony Robbins. Her company’s clients include Microsoft Xbox, Ford Motor Company, Tony Robbins, Canada Goose, Fast Company, PayPal, Canadian Blood Services, and many more leading organizations. “With few equals,” writes YouTube co-founder Steve Chen, “MacArthur continues to demonstrate a keen insight towards the continually evolving fabric of the social web.” In 2010, she wrote the national bestselling business book Power Friending (Portfolio: New York).  In 2016, she co-wrote an Internet safety book called Outsmarting Your Kids Online (with security expert Michael Bazzell). Amber has keynoted more than 300 events around the world.  Topics include business innovation, Internet of things, online safety, and what it takes for companies to adapt and grow. She is a regular business host and expert for Fast Company, CNN, Bloomberg TV, CBS, BNN, The Marilyn Denis Show, and Sirius Radio. She was recently hired to serve as an entrepreneur advisor on a new reality pilot called Dream Funded: Let the Crowd Decide, created by Mark Burnett. As a child, Amber attended a two-room country schoolhouse and shared a party telephone line with neighboring houses. She is now recognized internationally as an innovation and technology leader. https://ambermac.com/about/   ABOUT ANITA HEIDEMA I am many things to many people but mostly a Mindset Coach and Business Strategist to entrepreneurs who want to live powerful, passionate, rich free life. It all starts with knowing where you are with our “Rich Life and Business” download here http://anitaheidema.com/richlife/ I am also a speaker, TV Host, NLP Practitioner, Hypnotherapist, Author to Amazon best-seller Vitality Knocks, creator of Mind Your Business Class, Mind School & Ah-ha! Business Academy for entrepreneurs, 21-Day Journey to Success and various meditations and other programs for business and leadership success. As Hypnotherapist and Travel creator of “Getaway to Find Your Way”, I create programs and destination getaways and online programs that build your mindset and strategies for business and leadership success. I have a personal passion for promoting awareness for Lewy Body Dementia to as many people as possible as early diagnosis is extremely important. I have created a foundation “The Fenna Heidema Lewy Body Foundation” in my mother’s name. I love sharing and learning about cooking, travel, books, personal mind control, business strategies, health with special attention to brain health, our aging population and memory and brain power issues. My Motto is “Instill an internal legacy to live life fully and to your true potential. Learn, experience and love”. I live this in my life and business every day and love helping others. I created tools and programs to create Ah-ha! moments for entrepreneurs and their business that produce the riches and freedom they desire. I was a 27-year professional, corporate management advocate that had the bottom pulled out from under me. With this ah-ha moment, I knew what I was made of. My mindset and strategies created the business I am leading and the financial freedom and time I desired. I am never looking back. I share all the tools I have in all my programs so you can have all you desire as well. I bring true joy and passion to everything I do. I love seeing my amazing entrepreneurs succeed. You are what you think and do. Make it happen today. To Your Success, Happiness & Ah Ha Moments, Anita

Radical Personal Finance
461-How to Protect Your Financial Privacy and Keep Your Accounts Secure: Interview with Justin Carroll from the Complete Privacy and Security Podcast

Radical Personal Finance

Play Episode Listen Later May 26, 2017 110:08


What do dentists who shoot lions, publicists who make jokes in poor taste on Twitter and Indiana pizza makers have in common? Their lives were suddenly and irrevocably changed for the worst while doing something that they could never have predicted would lead to it.Avoiding catastrophe is an important pillar of the wealth building strategy that I promote through Radical Personal Finance. As personal finance enthusiasts, we are one of the most prudent groups of people on this planet: we build our emergency funds, insure against negative events, diversify our investments and make careful choices about our spending.Radical Personal Finance is, however, about going beyond the obvious and into the territory of things less commonly considered, but just as important. I want you to be prepared to deal with a hurricane, becoming a refugee, dealing with food scarcity or even the possibility of getting arrested. In my experience as a financial advisor, it has often frustrated me with how little care is sometimes taken to ensure the client’s financial security, despite the good intentions of most people in the industry. But why is this possible? The answer is that most people care even less about their data. It’s shocking to discover how vulnerable we actually make ourselves by not taking simple security measures when using bank accounts, email and social media - vulnerable not only to a loss privacy but potentially to a very real financial loss. I’ve taken an interest in this subject a while ago, and have been really impressed by the book The Complete Privacy and Security Desk Reference which stood out in a field where information is often cursory or out of date. That is why I invited co-author Justin Carroll to Radical Personal Finance to talk about real, actionable ways in which you can become more secure and protect your privacy. This article contains some of the best tools mentioned in our discussion, though for a more complete picture I recommend that you listen to the episode above and purchase the book itself. But This Won’t Happen to Me I often get this objection: “I’m not doing anything wrong - why should I be concerned about privacy?”. Here’s an analogy that I’ve found helpful in explaining why I promote these ideas:Do you remember the time when every phone call was a party line? Anyone in the household could pick up another receiver and there was very little one could do about it at the time. Now, however, you do have a choice - do you want to make everything you search for, consume, talk about as well as access to all of your accounts and purchase history a party line? Complete privacy and security are very difficult to achieve, but some very simple steps and tools can protect you from most of the headaches in the future. Another thing to consider is this: You may not be a target right now - but you may become one in the future as your wealth increases, you endorse unpopular political or religious perspectives or just live your life the usual way, as the stories at the beginning of this article illustrate. This may be a decade from now, but to prevent it you must build the skills and the mindset starting today, because you don’t know what circumstances you will face in the future through no fault of your own, and you can’t control things after the fact. Some simple tools and habits that have a great impact: Accounts and Passwords You are at great risk if you use the same or the same few passwords for all of your accounts. You will see this warning often and for good reason when creating new accounts: it only takes one company to be breached (who didn’t store your data properly) and an attacker gains access to all of your accounts. Alternatively, it’s often enough if they just gain access to your main email and phone account (which isn’t very difficult) and that opens up everything else. Using a different strong password for every account mitigates some of this risk.Less often mentioned, but equally important is using different and random usernames. Is your email address firstandlast@gmail.com? You’ve just given away an important piece of the puzzle to would-be attacker. The problem often is safely storing and remembering all of these account names and passwords - that’s where a password manager comes into play. Using LastPass (more convenient) or KeePass (more secure) can make the process a whole lot easier and secure. Two-Factor Authentication Nowadays you can often see a website offering (or requiring) you to enter a code from a text message in addition to your password. This is a form of two-factor authentication: an attacker job is made more difficult since he needs access to both your account name and password as well as your phone number. Unfortunately, phone numbers are often accessed by social engineers (who exploit human psychology) or accounts are simply hacked into, making this method not particularly secure. What I recommend instead is that you use Authy or Google Authenticator on your smartphone. This works in a similar way, but you need actual physical access to your device (as opposed to just the number) which significantly enhances your security. For even more security, you could purchase a YubiKey, which is a special piece of hardware dedicated entirely to two-factor authentication. Encrypted Communication Even though we rarely send long and heartfelt email anymore, there’s still a lot of important information that someone can gain from reading the emails that you send and receive. The same is true for instant messaging and phone calls.I encourage people who own an iOS to use Facetime Audio instead of calling and to use Signal (iOS and Android) for instant messaging - both of which are encrypted. Setting up email encryption used to be somewhat difficult, but tools such as Proton Mail offers end-to-end encrypted communication. You can also encrypt sensitive documents with a password using Adobe Acrobat Pro (Windows) or Preview (Mac). Don’t Trust Your Financial Advisor (or Your Bank) Just because someone is in the financial industry, it doesn’t mean that they take good care of your information. Bank accounts sometimes have worse-than-average security - make no difference and use the same tools and principles that you would with any other account.The same is true with financial advisors, accountants etc. Your information is not always stored appropriately - sometimes physical copies are kept that are not secured, sometimes administrative staff has access to digital documents, sometimes your information may be shared between financial advisors at the same firm.Make sure to compartmentalize information: think carefully if that person or organization really needs this or that particular piece of information, and try not give a complete picture whenever possible. This way, if there’s a breach at a particular firm, that information alone will not be enough to impersonate you or access your other accounts. Use Cash Whenever Possible Show me your bank statement, and I’ll tell you who you are. How much could I learn about you knowing where you shop, where you get your morning coffee, where you fill up your car, where you eat your lunch and what kind of shops you visit? All this information can paint quite an accurate picture of you - there’s no reason to offer it up on a silver plate.Use cash whenever you can - it’s not so hard to get used to (again). Maintaining Privacy in Online Payments with Burner Credit Cards Sometimes you can’t get around using a card - but by sharing your bank-issued credit/debit card details when making purchases, you are losing control over the transaction. Most of the time, everything stays win-win, but in contentious situations it’s often a problem if the merchant has all of your details. In addition, unauthorized spurious charges have been known to occur, sometimes in foreign countries, which drain your time and energy to deal with. Using services such as Privacy.com, SudoPay (connected with Apple Pay) and Blur you can create credit cards that work only for one transaction, or are used for only one merchant. This also means that you don’t have to use your real name or address when making these payments, protecting you from when (often inevitably) the merchant’s database gets compromised.In addition, you can also set up additional email addresses and phone numbers - this way, for instance, you can share one virtual number with friends and family, and another virtual one to important accounts, that way your accounts stay safe even if your actual phone number is compromised. Act Now The tools here are some of the lowest hanging fruit available to you right now to ensure that your assets and your information stay safe. I’ve gone into even more strategies with Justin in the podcast episode that this article was based on - including owning a car and a house as well maintaining a mailing address as privately as possible. You can find our discussion above this article, or in iTunes. I also wholeheartedly endorse Justin’s and Michael’s book on the subject, as well as their podcast. Proper prudent planning beats trying to fight the fires after the fact. Take the steps today to protect yourself so you aren’t caught off guard in the coming decade! I am available if you’d like to have a phone conversation on this subject. Here are all the resources mentioned in the podcast episode: Justin Carroll’s and Michael Bazzell’s podcast: https://itunes.apple.com/us/podcast/the-complete-privacy-security-podcast/id1165843330?mt=2 Justin Carroll’s and Michael Bazzell’s book: https://www.yourultimatesecurity.guide/books.html Encrypted PDFs on Windows: https://acrobat.adobe.com/uk/en/acrobat/acrobat-pro.html Encrypted messenger: Signal Encrypted email: https://protonmail.com/ Password manager: http://keepass.info/ Password manager: https://www.lastpass.com/ Two-Factor Authentication: Google Authenticator Two-Factor Authentication: https://authy.com/ Two-Factor Authentication: https://www.yubico.com/products/yubikey-hardware/ Buying car privately with New Mexico LLC: https://jjluna.com/Resources-LLCs Defense against private investigators: JJ Luna How to Stay Invisible https://www.amazon.com/gp/product/1250010454/ Secrets of Super Thief https://www.amazon.com/Secrets-Superthief-John-MacLean/dp/0425056457/ True Faith and Allegiance https://www.amazon.com/Clancy-True-Faith-Allegiance-Novel/dp/0399176810 Open Source Intelligence Techniques: https://inteltechniques.com/book1.html Credit Freeze: https://www.consumer.ftc.gov/articles/0497-credit-freeze-faqs Credit Freeze: https://radicalpersonalfinance.com/credit-score-management/ Virtual Credit Cards: https://privacy.com Virtual Credit Cards, Phone Numbers and Email Addresses: https://sudopay.com/ Virtual Credit Cards, Email Addresses: https://dnt.abine.com/

The Social-Engineer Podcast
Ep. 092 - The Trouble With Dating Michael Bazzell

The Social-Engineer Podcast

Play Episode Listen Later Apr 9, 2017 57:18


Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on computer crime investigations and OSINT. He has trained thousands of individuals in the use of his investigative techniques. He also served as the technical advisor for the television hacker drama "Mr. Robot". His books "Open Source Intelligence Techniques" and "Hiding from the Internet" have been best sellers in both the United States and Europe. On this wonderfully Honrsby-Free edition of the SEPodcast we get to discuss: Michael's brand new VM for OSINT-ers - Buscador Tips to dig even deeper for OSINT How far is too far with Michael? Michele get's dating info from Michael - hot tips. And so much more.   Michael recommends the book Playing Dead: A Journey Through the World of Death Fraud Check it out and follow him on twitter at @IntelTechniques  

AQ's Blog & Grill
Amber Mac | Outsmarting Your Kids Online

AQ's Blog & Grill

Play Episode Listen Later Feb 15, 2017 14:05


Speaker, author and social media thought-leader Amber Mac joins us in studio to discuss her book ‘Outsmarting Your Kids Online’. She shares a bit about the process of self-publishing the work with co-author Michael Bazzell after being inspired by Guy Kawasaki. A book, a business, TV and radio shows and a busy social life is a lot to balance. Amber credits her multi-level success to working with great partners and loving what she does. It may surprise some to learn that Amber grew up in PEI, Canada, going to school in a one-room schoolhouse. A big imagination and big dreams led her to beginning her career in San Francisco. Amber and Alan discuss the new trends in live streaming, which brands are getting it right, and how, from individuals to big media companies, “shift is happening!” Amber provides advice to young adults looking to leverage social media to jump-start their careers and build a personal brand, sharing an inspiring example to follow. Amber Mac’s book ‘Outsmarting Your Kids Online: A Safety Handbook for Overwhelmed Parents’ is available on Amazon in both print and as an eBook.   0:00 - Introduction 1:20 - Self-publishing for the first time 2:00 - Taking content live 4:10 - Practicing what you preach 5:35 - From PEI to San Francisco 6:47 - Outsmarting your kids online 8:00 - Advice to young adults in branding and social media use 10:23 - Going live: Who's doing it right and why 12:30 - Measuring social success 13:10 - What's next for Amber Mac   About Our Guest Amber Mac is a bestselling author, speaker, TV/radio host and entrepreneur. She is the President of agency Konnekt Digital Engagement who sees clients such as Ford Motor Company, Fast Company, Paypal and Microsoft Xbox. Amber is a regular business host and expert for Fast Company, CNN, Bloomberg, and CBS. She began her career during the dot-com boom in San Francisco and has been at the forefront of digital innovation ever since.

The Feed with Amber Mac & Michael B
INTERVIEW: Security expert Justin Carroll on two factor authentication - TF051

The Feed with Amber Mac & Michael B

Play Episode Listen Later Jun 10, 2016 9:04


Every day we hear horror stories about online hacking.  Most recently, experts are recommending that social media users enable two-factor authentication.  Sounds like a simple thing, but a lot of people still don't understand how it works.  On a recent special episode of The Feed, Amber Mac & Michael Bazzell talk to Justin Carroll about how this extra layer of protection can help.

The Police Podcast
Amber Mac(Arthur) and Michael Bazzell

The Police Podcast

Play Episode Listen Later Jun 8, 2016 26:03


Two incredible power houses in their own fields joined forces to help parents writing the book, "Outsmarting Your Kids Online - A Safety Handbook For Overwhelmed Parents".   I read this book in about two days. I know some of you could do it in about three hours. It's an easy read but more importantly it's got immediately actionable things you can do to help protect your family. Amber and Michael talk about the must do's, the need to do's and the should do's that can make an immediate difference in your awareness and knowledge of not only what is happening in your children's life, but what they are doing in their online environment.  More importantly than that, you can recognize the hazards and dangers that might be knocking on their virtual door trying to get into their real world.  Amber and Michael have shared their expertise in the cyber world with you in this book in a way that even the most tech challenged individual can get what they are talking about, relate it to your life and show you just how important the information is.  Think you know everything there is to know? Think again. I've studied both Amber and Michael. I've listened to them teach, I've read their books, I've taken their courses and this book still taught me plenty.  ABOUT MICHAEL AND AMBER... Amber Mac(Arthur) started her career in San Francisco and Boston during the dot-com boom in the late 1990s. As a strategist for Razorfish and Director of Marketing for an e-procurement software company, she spent four years in the technology start-up trenches. Amber left the start-up world to join Microsoft to build one of the first female-focused lifestyle portals. In 2006, with her brother, she started her own digital agency called Konnekt. The company’s first client was world-renowned business coach, Tony Robbins. Her company’s clients include Microsoft Xbox, Ford Motor Company, Tony Robbins, Canada Goose, Fast Company, PayPal, Canadian Blood Services, and many more leading organizations. In 2010, she wrote the national bestselling business book Power Friending (Portfolio: New York).  Amber has keynoted more than 250 events around the world, in which she addresses the topic of business innovation and what it takes for companies to adapt and grow. Michael Bazzell spent 18 years as a government computer crime investigator. During the majority of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on "Hackers" and various computer crime investigations. As an active investigator for multiple organizations, he has been involved in numerous high-tech criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and high level computer intrusions. He has trained thousands of individuals in the use of his investigative techniques.  Michael currently works and resides in Washington, D.C. He also serves as the technical advisor for the television hacker drama "Mr. Robot" on the USA network. His books "Open Source Intelligence Techniques" and "Hiding from the Internet" have been best sellers in both the United States and Europe. They are used by several government agencies as training manuals for intelligence gathering and securing personal information.    You can find them online everywhere, but for simplicity sake, I'll share their websites and their Twitter links: Amber  Web Twitter   Michael Web Twitter   BONUS: For you Mr. Robot fans, off air I got Michael to open up about Season Two...OMG!!! You will love it...well, at least I think you will. He wouldn't say a word other than he's excited about it and look for it JULY 13!!! If you're not one of the first five to email for your free copy, then click this link to buy the book from Amazon.

The Feed with Amber Mac & Michael B
TF051 - PRIVACY & SECURITY SPECIAL with Amber Mac and Michael Bazzell

The Feed with Amber Mac & Michael B

Play Episode Listen Later May 28, 2016 51:15


Is Amber keeping the information on her smartphone safe? Michael shares three important smartphone privacy and security tips. Also on the show, security consultant and co-author of The Complete Privacy & Security Desk Reference, Justin Carroll talks about two-factor authentication and what it means for everyday online users.  Plus, Michael and Amber answer a parent's question about how to keep kids safe on the Internet...without making them paranoid.  Finally, today's best social media monitoring apps for parents, caregivers, and educators. 

The Feed with Amber Mac & Michael B
TF050 - Security expert Michael Bazzell on Outsmarting Your Kids Online.

The Feed with Amber Mac & Michael B

Play Episode Listen Later May 25, 2016 52:16


Think all of the info on your Facebook account is private?  Michael Bazzell dives into Aron's account to reveal hidden content.  Plus, Don Tapscott joins us to talk about his new book and the future of money.  Also on the show, Lift dissects its new chat bot, Elevator, which helps clients get answers about medical marijuana.  Thanks to our partner, Casper - One Perfect Mattress, for supporting this week's episode of #TheFeed.

The Feed with Amber Mac & Michael B
TF028 - Mr. Robot's Michael Bazzell on hackable holiday gifts.

The Feed with Amber Mac & Michael B

Play Episode Listen Later Dec 2, 2015 51:05


We talk to one of Mr. Robot's Tech Advisors, Michael Bazzell, about this year's most hackable holiday gifts. Plus, Bloomberg's Gerrit De Vynk gives us the lowdown on the Blackberry Priv.  Also, tech teacher Brian Aspinall tells us why Minecraft if good for our kids.

robots bloomberg minecraft holiday gifts hackable brian aspinall blackberry priv michael bazzell
Paul's Security Weekly TV
Security Weekly #440 - Interview with Michael Bazzell

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2015 48:09


This week we interview Michael Bazzell author of "Open Source Intelligence Techniques", "Hiding from the Internet" and the technical advisor for TV hacker drama "Mr. Robot" on the USA network. For a list of relevant links, visit our wiki: http://wiki.securityweekly.com/wiki/index.php/Episode440#Interview:_Michael_BazzellSecurity Weekly Web Site: http://securityweekly.comHack Naked Gear: http://shop.securityweekly.comFollow us on Twitter: @securityweekly

united states tv internet robots hiding security weekly michael bazzell open source intelligence techniques
Paul's Security Weekly
Security Weekly #440 - Interview with Michael Bazzell, Stories of the Week

Paul's Security Weekly

Play Episode Listen Later Nov 10, 2015 82:46


Interview with Michael Bazzell This week we interview Michael Bazzell author of "Open Source Intelligence Techniques", "Hiding from the Internet" and the technical advisor for TV hacker drama "Mr. Robot" on the USA network. For a list of relevant links, visit our wiki: http://wiki.securityweekly.com/wiki/index.php/Episode440#Interview:_Michael_Bazzell   Security News - Canadian Encryption This week, Paul and the crew discusses the million dollar bug bounty for iPhones and why it may be legal to hack your car. For a full list of stories talked about during the show, visit our wiki: http://wiki.securityweekly.com/wiki/index.php/Episode440#Stories_of_the_Week_-_7:00PM-8:00PM Security Weekly Web Site: http://securityweekly.com Hack Naked Gear: http://shop.securityweekly.com Follow us on Twitter: @securityweekly

united states tv stories interview internet iphone robots hiding security weekly michael bazzell open source intelligence techniques hack naked gear
Paul's Security Weekly (Video-Only)
Security Weekly #440 - Interview with Michael Bazzell

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Nov 5, 2015 48:09


This week we interview Michael Bazzell author of "Open Source Intelligence Techniques", "Hiding from the Internet" and the technical advisor for TV hacker drama "Mr. Robot" on the USA network. For a list of relevant links, visit our wiki: http://wiki.securityweekly.com/wiki/index.php/Episode440#Interview:_Michael_Bazzell Security Weekly Web Site: http://securityweekly.com Hack Naked Gear: http://shop.securityweekly.com Follow us on Twitter: @securityweekly

united states tv internet robots security hiding hacking security weekly michael bazzell open source intelligence techniques hack naked gear
Paul's Security Weekly (Podcast-Only)
Paul's Security Weekly #440 - Interview with Michael Bazzell

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Nov 3, 2015 82:46


michael bazzell paul's security weekly
The Feed with Amber Mac & Michael B
TF015 - Mr. Robot's tech expert Michael Bazzell on making a realistic TV hacker series.

The Feed with Amber Mac & Michael B

Play Episode Listen Later Aug 30, 2015 51:11


AmberMac and Michael B speak to Mr. Robot's cybersecurity expert Michael Bazzell on what it takes to make a TV hacker series realistic.  Plus, Intel shows off 5 laptops for back to school and what happens when Vine star @Brittlestar heads to the wax museum with the Property Brothers.

The Social-Engineer Podcast
Ep. 059 – Legal Stalking and Other Scary Tales from Michael Bazzell

The Social-Engineer Podcast

Play Episode Listen Later Jul 14, 2014 74:01


Information is the life blood of the social engineer.  Knowing how to obtain, locate, catalog and use all the info and their resources can be a daunting job.  Our guest this month, Michael Bazzell, has made a career out of it. July 14, 2014 - See more at: http://www.social-engineer.org/podcast/ep-059-legal-stalking-scary-tales-michael-bazzell/#sthash.e5PTAVyW.dpuf