POPULARITY
Are you looking to achieve high performance and mastery, in service of your neighbours, community, and society? Itching to increase your competence, effectiveness, and impact, with just Three Easy Steps? The Srsly...
Tom Uren and Amberleigh Jack talk about the Salesloft Drift incident. It is a great example of the sprawling impact that the breach of a single service provider can have. We expect these single-compromise-large-blast-radius attacks will become the new norm. They also talk about Apple's Memory Integrity Enforcement, which promises to be a big step forward for memory safety on Apple devices. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about Google starting a cyber disruption unit. It's a sign of the times but could also point the way forward for policymakers looking to involve the private sector in government-endorsed efforts to strike back in cyberspace. They also talk about cyber security authorities from 13 different countries pegging Salt Typhoon to three Chinese companies. That's a lot of countries, but Tom wonders whether attribution is just viewed as a cost of doing business for the Chinese government. And it turns out that Apple's dispute with the UK government about encrypted iCloud data has not yet been resolved, despite media reports to the contrary. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about proposed legislation that would allow the President to license private sector hackers to go after cybercrime groups. The bill won't pass, but letting hackers loose on industrial-scale scam farms actually makes sense. They also talk about Microsoft's blind spot regarding China. It has trusted China-based engineers with sensitive work, and is now only just realising that China's security interests are not compatible with Microsoft's. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about a new report that looks at how Russian cyber security firms have adapted since the country's invasion of Ukraine. These firms are doing surprisingly well financially. It turns out that in an era of great power competition, picking sides is not just necessary, it is also a winning strategy. They also discuss Russia effectively killing foreign messenger services to promote its own WeChat-like service and claims that the UK has backed down on its Apple encryption order. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about a recent hack of the US courts document management system. It's about as bad as can be, with multiple threat actors including states and possibly even drug cartels rummaging around in there, possibly for years. They also discuss Microsoft's involvement in an Israeli surveillance system and the head of Australia's security organisation's blunt warning about espionage. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about how recent SharePoint exploitation is a blow-by-blow repeat of the 2021 Microsoft Exchange mass compromise event. The international response to that clearly didn't deter Chinese hackers, so it is time to try something different. They also talk about recent cases where outsourcing IT services has come with increased risk. Convenient, cheap, secure, pick any two. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about Huawei's contract to manage storage for Spain's lawful intercept system. News broke this week that Spain had signed a €12 million contract, but it turns out Huawei has been involved in the system since 2004! They also discuss arrests in the UK of four individuals associated with Scattered Spider. The criminal resumés of two of the suspects support the idea that there are key individuals with outsize impact. But they also reinforce that the online communities they are involved in act as training grounds for cyber criminals. Arrests will slow hacks, not stop them. This episode is also available on Youtube. Show notes
Tom Uren and Amberleigh Jack talk about our developing understanding of the group that people call Scattered Spider. Independent security firms agree that there are a small number of key people that are driving the group's outrageous success. That gives us hope that targeted action might stem the bleeding. They also talk about data leaks from China's cyber espionage ecosystem that are for sale on a data leak site. These look to contain actionable information from a counterintelligence point of view. And Tom wonders if a market for espionage-as-a-service will develop? This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray discuss warnings about Iranian cyber attacks on US critical infrastructure. Despite many many warnings, there have been no actual attacks and they discuss the reasons why Iran would want to avoid escalatory cyber attacks. They also talk about how the FBI is struggling to deal with the democratisation of surveillance and data analysis, what the agency calls Ubiquitous Technical Surveillance (UTS). A Department of Justice audit of the FBI's response finds the threat from UTS is real and that sources have been murdered. But it seems that the FBI just doesn't care. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about a new report that compares Chinese and American 0day pipelines. The US is narrowly focussed on acquiring exquisitely stealthy and reliable exploits, while China casts a far broader net. That was fine in the past, but as 0days get harder and harder to find, the report argues that the US needs to change the way it goes about getting them. The pair also talk about Cyber Command supporting the US bomb strikes against Iranian nuclear facilities. We like to believe in magic cyber capabilities, but we suspect the truth was far more mundane in this case. This episode is also available on Youtube. Show notes Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
Tom Uren and Patrick Gray talk about a Minnesota man who used people-search services to locate, stalk and eventually murder political targets. They also discuss purported hacktivist group Predatory Sparrow weighing in on the Iran-Israel conflict. It has attacked Iran's financial system including a bank associated with the Iranian Revolutionary Guard Corp and also burnt USD$90 million worth of cryptocurrency from an Iranian exchange This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about how a Trump executive order has scaled back the government's cyber security ambitions. The carrots and sticks that would have been used to encourage organisations to adopt stricter security standards are gone. They also discuss North Korea's use of AI in its IT worker scam and the emergence of espionage-as-a-service… perhaps. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about how Operation Endgame, the multinational law enforcement effort to tackle ransomware is approaching the problem holisitically. It's tackling the enablers of ransomware and although it won't eliminate the crime, it'll make it harder for criminals. They also discuss the spyware app that helped to dismantle the Syrian regime, at least maybe a little bit, and how Russian military intelligence's sabotage and assasination unit got into cyber operations. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about Russian DanaBot malware developers making a tailored variant of their malware specifically for espionage. This fills in some of the blanks on the exact relationship between Russian criminals and the country's intelligence services. They also discuss a US Director of National Intelligence initiative to centralise the purchase of commercially acquired information. Although this information can be used maliciously, having a one-stop-shop should make it easier to check that it is being used responsibly. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about how Telegram took down the two largest ever criminal marketplaces recently. They used Telegram for all their communications and had collectively sold over USD$30 billion in illicit products. The pair discuss why Telegram is now cooperating with authorities after historically being reluctant and whether this assistance will continue. They also discuss how Meta is awash with scam advertisements and how Chinese mobile app encryption is suspiciously awful. This episode is also available on Youtube. Show notes
In this special edition of the Seriously Risky Business podcast Patrick Gray speaks with former NSA Cybersecurity Director Rob Joyce and former director of the CIA's Center for Cyber Intelligence Andy Boyd. The talk about what offensive cyber could look like under Trump 2.0, and the shake-up the intelligence community is going through under various White House initiatives. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about how the US is planning to take the gloves off in cyberspace and conduct much more aggressive offensive cyber operations. US responses to cyber espionage have not been very aggressive to date, but Tom is not convinced that cyber punches are required, so much as blows that really hurt. The pair also discuss TeleMessage, the Signal clone the Trump cabinet has been using. The app managed to sidestep certification and assessment processes and ended up being used by various agencies in the US government. And the White House. It's a mystery how this happened. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about a SentinelOne report about how it is constantly targeted by both cybercriminal and state-backed hackers. Security firms are high-value targets, so constant attacks on them are the new normal. They also discuss an article that calls Signal “a kind of dark matter of American politics and media”. Many policy discussions occur on the app, and this explains the Trump administration's extensive use of the app. This episode is also available on Youtube. Show notes
Tom Uren and Adam Boileau talk about how scam compound criminal syndicates are responding to strong government action by moving operations overseas. It's good they are being affected, but they are shifting into new countries that don't have the ability to counter industrial-scale transnational organised crime. They also discuss CISA's Secure by Design initiative and that key people behind the program have left the organisation. Given prospective job cuts at CISA it is hard to see the initiative getting a lot of love, but international cyber security authorities should pick up the slack. This episode is also available on Youtube. Show notes Cyberfraud in the Mekong reaches inflection point, UNODC reveals
*sneezes* W-WEGMANS! Gazuntite. I'm not gonna lie, if I lived closer to this place I'd be there all the time. Whole Foods Trader Joe's Wegmans. Honestly? Ranked? Trader Joe's Wegmans Wegmans. lol. Whole Foods is a necessary evil. {Enter The Multiverse} No, I want the half Can't go all the way Enough is enough And a hand is a hand And a handout is ransom, Spare me the note Spare me the selfish suicide concepts Spare me the alter The coaxial The collar The caller— Whatever you call me Spare me the mantras Stop talking. Long throat violence, Oh, I onkybhope to know you (Or I don't) I only hope to notice m Oh long Johnson Quick sermons and a few soft passwords A couple ardvsrks on a long top showman A couple bad barks from the dog And work for the foreman Who are you after (Not god) Have been forgiven? Is fhat a question. I marked it as such And still j walked up The lock in the bathtub did honors Did honors Did run today Who are you for Not the office Not the John Not the forerunner Oe the forward Who are you, god talker? Who are you Was often the question asked And you want to do all you want Home alone The devil runs From behind her nothing soft Anymore Awkward And then unearthed I saw you were watched, stalking Also Pulled back on my reigns, the horse Does bit the bite down And then some soaked offer Was Half you are, where Wear the volume down Wear your art hard Or suffer, Gaga! GAGA WHERE ARE YOU? LADY GAGA I'M ON A HORSE target GAGA! LADY GAGA I'M ON A HORSE, I SAID. BUT WHERE?! NEAR ENOUGH THET YOU CAN HEAR ME, LIKE, OBVIOUSLY, BUT FAR ENOUGH AWAY THAT YOU CAN'T SEE ME ON A HORSE. ARE YOU COMING?! NEGATIVE. WELL— WHY NOT?! THE HORSE WONT MOVE! JUMP OFF THEN. IMPOSSIBLE. WHY IS JUMPING OFF A HORSE IMPOSSIBLE WHEN YOURE LADY GAGA ITS BECAUSE I'M LADY GAGA THAT THIS IS IMPOSSIBLE FOR MULTIPLE REASONS WHAT— JUMP OFF OF THE— NEGATIVE. THERE ARE MULTIPLE FACTORS CONTRIBUTING TO THIS IMPOSSIBILITY. WHY ARE THEY YELLING. Omg shut up 2 bit horse jumper Target Target Stalker Stalker Obi wan kanobi! Sheeeeeeer forces! What is this? Bad cheerleaders. WHY ARE WE YELLING?! Oh. We're fighting. Oh, that makes sense, What kind of fighting. Sword— unh— FIGHTING. Oh, okay. Why is lady Gaga on a horse?! Cause she's just like that sometimes. *shrugs, but on a horse— obviously dressed elaborately enough that yes, jumping off of the horse would be practically LADY GAGA No, completely. —Completely impossible. I wanna watch you eat spicy hot wings. In a sweater. But I left handed magic to Can't- that Cancelled I hope it was cashmere Or Calvin Klein I'll retract, Meditate and then Redact that Maybe Fantasize Glamourize that for a lifetime Pull the knife out of my back, And then sample it. I wanna watch you eat hotwings. That's—- What I want. GAGA. PLEASE! LADY GAGA I'm sorry— he's not moving. THIS IS URGENT. LADY GAGA I know it's urgent. My lack of yelling does not negate that it isn't, but. BUT WHAT? *yawns* I'm getting sleepy. [LADY GAGA falls asleep atop the horse; only then does the horse begin to move, however— it appears as though GAGA is now completely unconscious. But those shoes. Egad. Bro. lol. Why is this? I'm… my writers blocks are not fun, practical, or progressive. They're just. [LADY GAGA fights and defeats an entire battle completely unconscious atop a horse.] Isn't technically the horse… fighting. No, and I'll explain to you why. Omgz *spoiler* [lady Gaga IS the horse] Why. What the fuck. Fuck these shapeshifters. Fuck everything right now. What the fuck did I just watch. WHAT DID I JUST SEEEEEEEEEE Dedede…fleetleum, fleetleflum… “Fleedleflum?” Ahem!? Dude, you are a villain. WHAT, BECAUSE I SAID “FLEETLEFLUM” *fleedleflum AHEM! I SETH MEYERS is revealed as the villain… Again. WHAT! WHY! I THOUGHT I WAS THE VILLAIN. you said you didn't want it! THEN I ADJUSTED. Well, too late. WHAT. Nice. Hehe. WHAT THE ACTUAL FUCK! I WENT METHOD. A-for effort, I guess? WHATEVER A-FOR-EFFORT. I JUST COMMITTED A LOT OF EVIL SHIT For what FOR THEATRICAL AND ENTERTAINMENT PURPOSES. Well. “WELL?” Like what. Like— Tax Fraud. Ahem. Nice. [beat] Seth, you got the part. Yesssss! Booyah. Maybe you can take some method lessons and pointers from your friend here— Salt of the earth! — Mr. Evil tax fraud man. RYAN REYNOLDS *deflates* Later. Where are you going? I'm going to do Pilates. Because I'm rich. (Everyone just kind of nods in agreement.) L E G E N D S STEPHEN COLBERT runs at full speed down the street towards the house at which his formerly youthful self “recently” disappeared during a thunderstorm. Oh look. It's little Stevie! You recognize me?! OF COURSE I DO! You're the big hotshot anchorman on TV, but I remember… I don't have—time— Suddenly, he sees it— the radio tower which apparently transported him into this, a distant future, but also a remarkably odd parallel of reality which seems to have been sprung from his own timeline. Where is this going? We'll see. Apparently, I'm reanimated; Certain parts just don't work, I'm factory reset And radiated Aggrandized to carry out this task And then cease to be A zombie, if you will A corpse responding to light energy inside of me So when I leave, I'm not sleeping I'm decomposing Deteriorating I stay hydrated to keep my eyes involved In the light almost as if The illusion is existence— However, I know better It's simply a simulation I mutated against my better judgement Just for this focus Aspirations as if Aggressions could be achiviments At any rate A talking head Who are you? Done for now. Who are you! Done for now. Who are you? A far cry Dust in the wind, And I'm sure so for aure That the places I've been Are more often television location sequences Than not. Aha, who are you? The plot. Then who are I? A handsome damsel. Hark. But not to wake, I form again To dream of you And then Cease to be, My honor, So that may I call To wish a gasp upon a cantered breath, I scream to wake And then you, a glisten, Never to count time I waking, Them as sheep, And she who calls I— There, the canter, And there I wake to know I, Call I, My bare and lay truth So that There waking, calls I now The scream of shadow Mercy, yonder But not waiting, I cherish To bark. …. …. Wt— Now I could see how my energy was moving; I had to write as much as I could before my media update. Intentional brainwash. Suddenly, it all made me so nervous. Programming. Then again, It didn't matter, really, in the end. 6 hours. There was nothing more daunting Than the approaching courier for Whole Foods market And Instacart simultaneously because it meant Somehow, That I had an album coming out. Eagle eye, And to say the brown soul May go extinct Eagle eye Give me a bite of your Adam's Apple I want to taste you I want to know fortune Through the glory of love In the wonder of your arms I want to know nothing but Love in your eyes And in your mind, My heart MAYA RUDOLPH I feel weird. FRED … ARMISEN This is getting intense. That's probably it. AMY POEH—LER No. AMY PH— No. OF COURSE IT IS. ITS SUPPOSED TO BE. why are you yelling? IM NOT YELLING. I'M SPEAKING IN CAPITAL LETTERS. TINA FEY …there's a difference! RACHEL WITH A ‘T'? Maybe DRATCH YEAH there IS. Okay, where are we going with this? Shh. Not yet. I AM PRINCESS SHAMALAMADINGDONG. WHY? It's sketch comedy. Does it HAVE to have motive? You're right— but it at least has to have a plot. Meanwhile… SETH MEYERS'S wand has been stolen. Hey. Yes? There was..a… ??? There was a, like a— like a — ?? There was like, a number two pencil here. …there still is. No, like a very— like, a specific— There's— a bunch of them here. No— Just like always. No, it's. [Blank stares] N—nevermind. Wait— What's up. 1, 2, 3, 4– who am I forgetting? ARSENIO HALL Not yet, Arsenio; We're still on strike force 5! Where's Jimmy Kimmel! Meanwhile, in Jimmy Kimmel's lair. JIMMY KIMMEL (MWAHAHA MWAHAHAHAHAHAHAHAHAHA MWAHAHAHAHAHAHAHAHAHAHAHAHAHAH) Uh. Wow. Yeah. Okay. For Shits and giggles— Oma goash. Waw. Yah. I knuh. Just waw. Uhh… Idk. The weird SNL sketches all apparently have their own time— AANG APPA, YIP YIP! APPA FUCK OFF— WOAH. OKAY. Yeah, not everything should be live action. Seconded. — lines…. Ahem. Waw. Srsly. However, this live action magic school bus. [SCHOOL BUS CARAPULTING TOWADS FIREY DEMISE WITH NO POSSIBLE RESOLVE IN SIGHT]. *doom* Wild. Why. Yoooooo. The world needed that. Anyway. JIMMY KIMMEL MWAHAHAHAHAHAHHAHAHAHA HAHAHAHAHAHAHAHAHA GUILLERMO JAJAJAJAJAJAJAJAJJAJAJAJAJJAJAJAJAJAJA JIMMY KIMMEL MWAHAHAHAHAHAHAHAHAHAHAHAHAHA GUELLERMO Wait— —is that his name? Maybe. I might just be racist. Well, it's not Carlos. U MEANWHILE, ALSO, ON WISTERIA LANE GABBI CARLOS! GET BACK HERE! Damn. How are these people still at it? Apparently wer're in TV WORLD. Ahem. It's TV LAND. No, it's {Enter The Multiverse} AHEM. {Enter The Multiverse} [The Festival Project.™] COPYRIGHT © THE FESTIVAL PROJECT 2019-2025 | THE COMPLEX COLLECTIVE. © ALL RIGHTS RESERVED. © -Ū. [REDACTED]
Tom Uren and Patrick Gray discuss Trump's order singling out Chris Krebs, former head of CISA, that requires investigations into Krebs and also punishes his employer. It is a move deliberately designed to chill dissent and they look at what the cyber security industry will likely do in response, which is probably not much. The pair also discuss what is being interpreted as an admission that Chinese senior leadership is behind the Volt Typhoon hacking of US critical infrastructure. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray discuss Trump's recent firing of General Timothy Haugh, the head of NSA and Cyber Command. Tom dives into the implications and thinks why this is not good news for the agencies. They also discuss Europe losing faith in the US intelligence commitments that underpin transatlantic data flows. That would be bad news for US tech companies. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray discuss how North Korean IT worker scam is shifting towards Europe and employing tactics that make it more dangerous. They also discuss why Signalgate was a massive security failure. We learnt this week that US cabinet members were in multiple Signal groups discussing different topics. Phone hacking is not uncommon, an adversary states will be able to take advantage of the intelligence in these conversations. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray discuss how the Signalgate messages betray an alarming lack of security nous at the highest levels of the US natsec leadership. It's head-scratchingly bad. They also discuss the possibility the Trump Administration will reconstitute the CSRB. The Board wasn't perfect, but in our view it is better to get it started again rather than waiting for reviews to determine its perfect form. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray discuss how China's Ministry of State Security is increasingly doxxing and threatening Taiwanese APT operators. In some ways this mirrors the US strategy of naming and shaming Chinese cyber operators in indictments that contain lots of supporting information. But although MSS statements are filled with propaganda rather than technical detail, naming Taiwanese military hackers has some bite. They also discuss Russia's ‘shadow war' sabotage campaign across Europe. The Russian campaign mostly relies on traditional sabotage and finding local proxies to throw bombs. But it does make sense for Western governments to respond with destructive cyber operations. This episode is also available on Youtube. Show notes CSIS report on Russia's 'Shadow War'
Tom Uren and Patrick Gray discuss how X is actively engaging in political interference outside the US. The risks mirror those of TikTok. American legislators moved against TikTok because it could potentially be a powerful tool for the Chinese government to interfere with American political discourse. X is a realised threat, not a potential one, so we expect that foreign governments will start to consider a ban. They also explore why mass firing of probationary employees in NSA and intelligence agencies is particularly damaging. This episode is also available on Youtube. Show notes
In this podcast Tom Uren and Patrick Gray discuss how Starlink is providing an internet lifeline for scam compounds that have had their internet access cut by Thai authorities. Starlink has a very poor track record dealing with unauthorised use, but it is time for the company to develop the processes to keep on top of these problems. They also discuss how President Trump's actions that favour Russia will make Five Eyes partners take stock, particularly when it comes to HUMINT intelligence sharing. Finally they examine the did-it-happen-or-not stand-down of US Cyber Command's Russian operations. This episode is also available on Youtube. Show notes
Tom Uren and Patrick Gray talk about the White House apparently considering kicking Canada out of the Five Eyes intelligence alliance to apply pressure on the country. It's a terrible idea and even thinking about it undermines the strength of the alliance. They also discuss Sweden's proposed legislation that would order apps like WhatsApp and Signal to store messages so they could be provided under warrant to authorities. The story is a vignette of the ongoing encryption debate, but we think apps like Signal will leave the country rather than comply. Finally, they talk about how the illicit cryptocurrency ecosystem is evolving in response to government action such as takedowns and sanctions. This episode is also available on Youtube. Show notes
In this podcast Tom Uren and Patrick Gray talk about the idea of launching a retaliatory campaign to hack Chinese telcos in response to Salt Typhoon's targeting of US ones. US Senator Mark Warner floated the idea as a way to persuade the Chinese government to pull back Salt Typhoon, but we think that kind of campaign has merit regardless. They also discuss how Samoa's CERT calling out APT40 is a big deal. It's striking to see a small country of 200,000 people calling out Chinese hacking. This episode is also available on Youtube. Show notes
Mark and Bill are joined by two north-of-the-border podcasters, Shawn Vulliez and Aaron Moritz, who incorporate both improv and philosophy in their dirty leftist podcast. We simulate conversation as competing knowers-of-the-good-life and talk about using improv for political purposes. Note that this was recorded back in December when we were in the thick of Luigi Mangione fever and not yet consumed with daily Presidential antics. You can choose to watch this on unedited video, if you choose. Hear more at philosophyimprov.com. Support the podcast and listen ad-free at philosophyimprov.com/support. Check out other Evergreen Podcast offerings.
In this podcast Tom Uren and Patrick Gray talk about Apple's refusal to obey a UK government order to provide the capability to access to encrypted iCloud data. Its the latest round in the ongoing government vs technology fights over warrant-proof encryption, and again it looks like governments will lose. They also talk about good news in the fight against ransomware. Government actions are putting pressure on the cyber criminal ecosystem, splintering groups and even making it hard to for crooks to convert cryptocurrency to hard cash. This episode is also available on Youtube. Show notes
UPDATED AUDIO: An earlier version of this podcast audio contained an editing mistake that desynchronised Patrick and Tom's audio. In this podcast Tom Uren and Patrick Gray talk about the cyber espionage implications of Chinese AI firm DeepSeek's recently released models. They will certainly be picked up by various APT crews to try and accelerate their campaigns. They also discuss the UK NCSC's attempt to quantify ‘comedy bugs' and whether EU sanctions against Russian military intelligence officers for a five-year-old cyber espionage campaign targeting Estonia are pointless. This episode is also available on Youtube. Show notes
Harbinger Showcase is a weekly podcast featuring highlights from Canada's #1 coast-to-coast community of politically and socially progressive podcasts. On this week's episode we look at 70 years of Israel/Palestine history on SRSLY WRONG, explain why immigrants aren't to blame for the housing crisis on OATS FOR BREAKFAST, break down the state of Canadian journalism in 2025 with Rachel Gilmore on THE NORTH STATE and look back at the 2001 New Politics Initiative campaign to strengthen links between the NDP and social, environmental and anti-globalization movements on ALBERTA ADVANTAGE.The Harbinger Media Network includes 77 podcasts focusing on social, economic and environmental justice and featuring journalists, academics and activists on shows like The Breach Show, Tech Won't Save Us, Press Progress Sources & more.Harbinger Showcase is syndicated for community and campus radio and heard every week on CKUT 90.3FM in Montreal, at CFUV 101.9FM in Victoria, on CJUM 101.5FM and CKUW 95.9FM in Winnipeg, at CiTR 101.9FM and CFRO 100.5FM in Vancouver, at CJTM in Toronto and at CJBU 107.3FM in Sydney, Nova Scotia.Financial support on this episode is courtesy of THE ALBERTA ADVANTAGE - find out more about Calgary's #1 podcast albertaadvantagepod.com. Find out more about the network, subscribe to the weekly newsletter and support our work at harbingermedianetwork.com.
Gather your family around the tape player for the yearly tradition of listening to the SRSLY WRONG christmas special,. In this classic sketch episode, we follow Jelcinda, the personal lawyer of an embattled and controversial Santa Claus, as she discovers the true meaning of christmas.
In this podcast Tom Uren and Patrick Gray talk about the likelihood that the incoming Trump administration will end the ‘dual-hat' arrangement where a single officer leads both US Cyber Command and the National Security Agency. This would result in Cyber Command outranking NSA and could prioritise cyber disruption operations over intelligence collection. That would be a bad outcome. They also talk about how changes to SEC disclosure rules have led to an outpouring of corporate drivel and how WhatsApp became an everything app. This episode is also availble on Youtube. Show notes
In this podcast Tom Uren and Patrick Gray talk about the US Federal Communications Commission effort to get US telcos to lift their security game and compares it to UK and Australian efforts. The US is very late to the game, and improving security is a huge job. They also talk about Chinese cyber actors continuing to pointlessly sow chaos and how an influence campaign in Romania is an absolute disaster for TikTok. This episode is also available on Youtube.
In this podcast Tom Uren and Adam Boileau talk about the continued importance of hack and leak operations. They didn't really affect the recent US presidential election, but they are still a powerful tool for vested interests to influence public policy. They also discuss the police bust of MATRIX, yet another encrypted messenger that is marketed to criminals and designed to resist police surveillance. The crimephone landscape is splintering due to the constant drumbeat of police success. This episode is also available on Youtube.
In this podcast Tom Uren and Patrick Gray talk about the Australian Government's extraordinary legislation that will retrospectively ensure that warrants used for the An0m crimephone sting operation are valid. They also discuss a sterling CISA red team report and the naiveté of Microsoft's Vice Chair and President Brad Smith. This episode is also available on Youtube.
In this podcast Tom Uren and Patrick Gray talk about what the People's Liberation Army cyber operators have been up to. They used to be China's most visible cyber operators but have since disappeared. They also discuss the shift towards widespread exploitation of 0days, particularly in enterprise perimeter devices. This episode is also available on Youtube.
Shawn Vulliez from SRSLY Wrong joins me to discuss the new collection of David Graeber essays, The Ultimate Hidden Truth of the World. Shawn and I talk about the tyranny of economics and how Graeber gave us permission to reveal that the emperor of economics has no clothes.Warning: Contains discussion of the recent election. Stay away if you just can't handle it anymore. I understand.
In this podcast Tom Uren and Patrick Gray talk about what to expect from President Trump's second term. Trump is an activist president who believes in using state power, so intelligence agencies will be pushed to conduct more audacious or even outrageous covert operations. They also discuss concerns about a new UN cybercrime treaty that is set for a vote at the General Assembly and the Canadian government's curious decision to force the closure of TikTok's local offices. This episode is also available on Youtube.
In this podcast Tom Uren and Patrick Gray talk about the Snowflake hack after the person allegedly responsible was arrested in Canada. Telegram is involved at all sorts of levels and Tom wonders if this crime would have occurred if Telegram didn't exist. They also discuss the impact of the Chinese hack of US telcos and Sophos' five-year cyber knife fight with Chinese APT crews. This episode is also available on Youtube.
Which fork should you use on a first polyamorous date? Do you have to let your partner be the little spoon all the time? We pondered these and other burning questions in the Finale episode of Season Three. Srsly though, here's the etiquette and advice we gathered for this episode, if you don't want to listen to 80 mins of our charming banter: Let your partners consent into information about your interactions with other partners (esp sexy stuff) Be careful of collecting too many partners/spreading yourself too thin. Try not to over-curate yourself. Be authentically who you are and let partners meet you there. Everyone is tender. Treat them as human, not just means to the experiences you want. Take responsibility for ending relationships when they aren't working anymore. Be kind but direct. Be honest up front about your capacity. Talk about the parameters of the relationship early and often. Make sure your partners know how 'out' as poly you are (so you don't embarass them when you run into acquaintances in public together). Seek deeper connections, rather than more; the relationships that you're yearning for might be the ones that you're already in. TikTokers we mentioned who you should follow: @newtononmonogamy @polyphiliablog mistakescast@gmail.com * https://www.instagram.com/mistakescast/ Logo design by roy franklin: www.whateverfactory.org
Hard to believe Srsly Wrong is ten years old. Come celebrate a decade of utopian podcasting with Shawn and Aaron as they reminisce and reflect on the show, answering listener questions alongside...