Latest Shows

Listen and Read

The Latest!

WhatsApp, iMessage, Telegram: Unmasking the Security of Today’s Popular Messaging Apps

WhatsApp, iMessage, Telegram: Unmasking the Security of Today’s Popular Messaging Apps

https://craigpeterson.com/radio-show/threats-to-our-privacy-tech-industry-told-privacy-is-not-absolute-and-end-to-end-encryption-should-be-rare/17216/Picture this: you're sitting in your favorite coffee shop, sipping on a perfectly brewed cup of joe ☕, and suddenly, a notification pops up on your phone. It's a message from a friend with exciting news. But wait! 🛑 Have you ever stopped to think about how secure your messaging apps really are? In this digital age, where privacy is at the forefront of our minds, it becomes crucial to know which messaging platforms can protect our personal information like a trusty shield ⚔️. Using secure messaging apps is critical in protecting our private conversations from breaches and surveillance. Opting for encrypted communication is a proactive step in safeguarding our digital privacy. So, What Could Happen? If you're using SMS for communication, your messages travel through a network of service providers without the protection of end-to-end...

Charged for the Future: Shielding Our Lives and Electric Grid Against Solar Threats and EMPs

Charged for the Future: Shielding Our Lives and Electric Grid Against Solar Threats and EMPs

⚡️Attention⚡️ Have you ever thought about what keeps our modern world running smoothly? It's the power grid that's responsible for keeping the lights on, the internet buzzing, and our everyday lives humming along. But have you ever wondered just how safe our electric grid is from potential threats like nuclear electromagnetic pulses (EMPs) or solar mass ejections? Strap in folks, because today we're diving into this electrifying topic that could impact us all. ⚡️Historical Jolt⚡️ Back in the 1850s, when telegraph lines were the internet of the age, a cosmic spectacle—known as the Carrington Event—lit up the skies with auroras so bright that miners in the Rocky Mountains started their breakfast, thinking the sun had risen. This was no ordinary display of nature's beauty; it was a solar mega flare unleashing a massive coronal mass ejection (CME) straight toward Earth. Named after Richard Carrington, the British astronomer who witnessed the solar flare, this event sent telegraph systems...

iPhone Wizardry: Become the Family’s Tech Hero with These 10 Essential Fixes!

iPhone Wizardry: Become the Family’s Tech Hero with These 10 Essential Fixes!

📱⚡️ iPhone Fixes to Make if You’re the Family IT Department This Year ⚡️📱 Hey there, folks! 👋 Are you the go-to techie in your family? The one who gets called upon for all things iPhone related? Well, listen up because I've got some handy tips and tricks to make your life a whole lot easier. This year, let's take charge and fix those pesky iPhone issues once and for all! 💥 Section 1: Ditch the Storage Struggle 💥 Is your phone constantly reminding you that it's running out of storage? It's time to free up some space and get organized. Here's how: ✅ Offload Unused Apps. Advantage: More available storage space, better performance. Benefit: No more worrying about deleting apps just to make room for new ones. Start by going to Settings > General > iPhone Storage. Enable "Offload Unused Apps" to automatically remove rarely used apps while keeping their documents and data intact. Now you can have all your favorite apps without sacrificing precious space. 💥 Section 2: Master the Art of...

Unmasking the eSIM: A Deep-Dive into Mobile Privacy, Security, and the Combat against Hacking

Unmasking the eSIM: A Deep-Dive into Mobile Privacy, Security, and the Combat against Hacking

Chris, a subscriber to my newsletter, recently emailed me to share his experience. Unfortunately, he lost $10,000 due to what appears to have been an "eSIM attack." Such attacks, previously common mainly in the Bitcoin community, are now a wider concern; anyone could potentially become a victim. Our phones hold a vast amount of personal data and sensitive information, from social media apps to mobile banking apps. Nevertheless, the vast amount of personal data and sensitive information we store on them can make us vulnerable to data breaches. In today's world, where secure and convenient mobile connectivity is in high demand, the use of eSIMs has seen a significant rise. The tiny memory chip known as the SIM card plays a crucial role in cell phone operation, as it grants users their unique phone number. But now, a new player has entered the SIM world—the eSIM card. This virtual SIM functions just like a physical one but with the added security of being embedded in your phone's...

Secure Your Cyberspace: A Step-by-Step Blueprint for Dividing Your Digital Domain Between IoT Gadgets and Computers

Secure Your Cyberspace: A Step-by-Step Blueprint for Dividing Your Digital Domain Between IoT Gadgets and Computers

Have you ever felt like your home network is getting too crowded? With the rise of smart devices, it's no wonder our Wi-Fi is feeling a little overwhelmed! But fear not – I'm here to offer you a solution that will make your internet-of-things (IoT) devices feel right at home without compromising the security of your networked computers. That's right, we're talking about splitting your home network! 🏘️😌 In this comprehensive guide, I'll explain everything you need to know about this nifty trick. Whether you're already familiar with the concept or new to the game, we'll cover all the bases. So put on a fresh pot of coffee ☕️☺️ and let me guide you towards a safer and more efficient home networking experience. What Is Splitting Your Home Network All About? Okay, let's break it down. Splitting your home network involves creating separate Wi-Fi networks for different groups of devices within your household. This means giving those pesky but beloved IoT gadgets their own virtual space...

Exposed: Are Your Passwords on the Hacker Hit List? Find Out Now!

Exposed: Are Your Passwords on the Hacker Hit List? Find Out Now!

Did you know that over 8 billion personal records have been exposed to data breaches since 2013? That's right—billions of passwords, emails, and other sensitive information are out there in the digital wild. It's like leaving all your doors unlocked and hoping for the best! Now, you might be wondering if your own personal information has ever been compromised. Let me tell ya, it's a good thing you're here because I've got just the tool to help you out. 🛡️ Meet Have I Been Pwned (HIBP) – a website that tells you if your email or username has been involved in any known data breaches. Hey there, folks! Grab a cup of joe, and let's talk about the nifty features of haveibeenpwned.com. ✨ This website might just be your ticket to online security. So, why should we use it, and how can it help us? Well, I'm glad you asked! Let's dive right in. Peace of Mind with Breach Notifications Have you ever wondered if your personal data has been compromised? 🤔 It's an unsettling thought for sure! But...

AI Gone Wild: Good Luck Getting a Job – The Job Software is Biased Against You

AI Gone Wild: Good Luck Getting a Job – The Job Software is Biased Against You

Today, we're going to talk about something hotter than a lobster pot in July: Artificial Intelligence (AI) and this new buzz around "bias-free" technology. Grab your coffee, buckle up, and let's dive right in! Now, you might have heard chuckles and chortles about this new Google AI thingamajig called Gemini. People are saying it's kookier than a bag of hammers, but let me tell ya, it's serious potatoes. You see, Gemini is supposed to be this shining knight in digital armor, free of bias and as fair as a bean supper. But it's jumping out of the boat before it even gets its feet wet. Let's say you asked this Gemini to whip up some pictures of white folks, and it turns around and says, "No, can do; that's reinforcing some not-so-nice stereotypes." Fair enough. But then, it cranks out images of non-white Vikings and a black George Washington without batting an eye. Well, that's more curious than a cat at a mouse convention. And it ain't just Google wading through the muck. There's...

Shocking Truths Unveiled: The Environmental and Ethical Storm Clouds Looming Over Electric Vehicles

Shocking Truths Unveiled: The Environmental and Ethical Storm Clouds Looming Over Electric Vehicles

Now, are electric vehicles, or EVs as the cool kids call 'em, just for the birds? A hot-off-the-presses piece from Issues & Insights has been stirrin' the pot. Funny enough, or not so funny, depending on your lenses, they claim these shiny, newfangled EVs are churning out more pollution than your grandpappy's ole clunker! So, buckle up. First off, these EVs are a sight heavier than traditional gas guzzlers—a whoppin' 30% more! More heft means those brakes and tires wear down faster than you can say, "Bob's your uncle." As a result, they're spewing out fine particulate matter—that's "soot" to us lay folk—like nobody's business. And that's no good for our green earth. 😷 The electric Ford F-150, also known as the Lightning, weighs roughly 6,500 pounds. This is approximately 1,600 pounds more than its gas-powered cousin. This hefty weight difference is mainly attributed to the massive 1,800-pound battery that powers the electric model. While the additional weight brings particular...

Whispering Through Cyberspace: How to Keep Your Chats Private

Whispering Through Cyberspace: How to Keep Your Chats Private

Imagine chatting with your friend in your favorite coffee shop. You’d expect that conversation to stay between you two, right? But there may be someone listening in. None of their business, right? Now, think about your digital conversations. Not only are most of them not private, most of your online conversations are recorded, analyzed, and your information sold to others. Something we don't think much about. Let's talk about how I keep my conversations private and secure, and how you can too. Understanding End-to-End Encryption End-to-end encryption is like having a secret language between you and your friend. Only you two understand it, even if someone else overhears. When you send a message with end-to-end encryption, it gets scrambled into a code that only the person you’re sending it to can decode. It's vital for keeping your chats private. Apps like WhatsApp and Signal are my go-to because they encrypt messages by default. Remember, not all services have this default setting....