Send us a text You click "agree," you swipe a loyalty card, you browse online – every digital breadcrumb you leave is being collected, but not just by the apps and websites you use. Welcome to the world of data brokers, a multi-billion-dollar, hidden industry that aggregates, analyzes, and profits from your most intimate personal information. In this special episode from Privacy Please, we pull back the curtain on this shadowy ecosystem. Discover: What a data broker is and how they differ fro...
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text You click "agree," you swipe a loyalty card, you browse online – every digital breadcrumb you leave is being collected, but not just by the apps and websites you use. Welcome to the world of data brokers, a multi-billion-dollar, hidden industry that aggregates, analyzes, and profits from your most intimate personal information. In this special episode from Privacy Please, we pull back the curtain on this shadowy ecosystem. Discover: What a data broker is and how they differ fro...
Send us a text The digital world can be treacherous, especially when you're looking for a safe space to share your most vulnerable thoughts. Today's story about the Tea app breach will make you rethink every "anonymous" platform you've ever trusted. Tea promised women complete anonymity, a digital sanctuary where they could share dating horror stories, relationship struggles, and deeply personal confessions too raw for other platforms. Thousands believed this promise, uploading personal phot...
Send us a text For decades, Chris Hansen’s iconic catchphrase, "Why don't you have a seat?" was the prelude to exposing predators in the real world. Now, his hunt has moved into the metaverse. His target is Roblox, the global gaming platform used by over 70 million people daily, most of whom are children. Hansen and his team allege the platform is a "cesspool" and a "hunting ground" for criminals, while Roblox maintains its safety systems are robust. In this special report, "Privacy Ple...
Send us a text Digital privacy is under siege from all sides, and we're bringing you the latest developments along with a major announcement about our growing privacy-focused network. This week has seen a flood of significant data breaches across critical sectors. Air France-KLM and Workday experienced major incidents, with the latter connected to a broader campaign targeting Salesforce CRM systems. These breaches highlight the vulnerability of systems storing vast amounts of customer ...
Send us a text It starts with a strange letter in the mail. A car loan you never applied for. A credit card you don't own. A digital ghost is quietly living your life, and you have no idea how it got the keys. When you turn to one of the silent guardians of your financial identity for help, you find only chaos, confusion, and a company that seems to be a danger to itself. This week on Digital Fallout, we tell the true story of one of history's most catastrophic data breaches. It's a tale of s...
Send us a text It started with a few flickering screens in a Danish office. Within minutes, a digital plague had paralyzed global trade, leaving the world's largest shipping company powerless and its massive vessels adrift. But this attack wasn't for ransom—it was for pure destruction. In the premiere of Digital Fallout, we uncover the story of a geopolitical cyber weapon that escaped its cage and the unbelievable, accidental miracle that saved a global empire from permanent deletion. This is...
Send us a text We explore how cybercriminals fell victim to their own security mistakes and examine major attacks targeting corporate SharePoint environments. Privacy legislation advances with new protections for children and groundbreaking AI accountability measures in Minnesota. • Cybercrime forum exposes member data through database misconfiguration • SharePoint under active attack with remote code execution vulnerabilities • California passes enhanced children's privacy legislation...
Send us a text The US military has issued a stark warning to all forces to operate under the assumption that their networks have been compromised by Salt Typhoon, a sophisticated threat actor with ties to the Chinese government. This breach highlights the urgency for organizations to adopt Zero Trust principles as cyber warfare becomes the new battlefield. • Zero Trust is a framework, not a single product or technology • The first tenant of Zero Trust is treating networks as already compromi...
Send us a text The European Parliament has released a groundbreaking 175-page study concluding that AI companies' practice of training on copyrighted material without permission constitutes mass reproduction not covered by current laws. This study recommends transforming the landscape through an opt-in system, radical transparency requirements, and fair compensation models for creators whose work trains AI systems. • EU study reveals AI companies are treating the internet like a free "all-yo...
Send us a text Cameron and Gabe dive into Healthline Media's record-breaking $1.55 million settlement for CCPA violations, examining whether such penalties are sufficient deterrents against improper sharing of sensitive health data. • Healthline violated CCPA by sharing sensitive user health data with advertisers without proper consent • First U.S. regulatory action against a company for disclosing "inferred sensitive data" • Violation included failing to provide mechanisms to opt out of sen...
Send us a text Several popular Chrome extensions, including privacy and security tools, have been found leaking sensitive data through unencrypted HTTP and hard-coded credentials in their code. Security is both hard and easy - hard because of existing unencrypted protocols and trust placed in developers, but easy because fundamental security practices should be common knowledge in 2025. • Chrome extensions including DualSafe Password Manager and Avast Online Security are leaking sensitive us...
Send us a text We explore the recent LexisNexus data breach that exposed sensitive personal information of over 364,000 individuals through a third-party platform accessing their GitHub account. This incident highlights critical vulnerabilities in how data brokers handle our most sensitive information and raises questions about regulatory oversight. • Data exposed included names, date of birth, phone numbers, social security numbers, and driver's license numbers • The breach occurred when so...
Send us a text Gabe and Cameron dive into the unseen dangers of AI systems, exploring how inherent biases shape our perception and how prompt injection attacks pose serious security threats. • Generative AI models contain built-in biases based on their training data, favoring Western and particularly North American perspectives • A recent study shows ChatGPT-4 with personalization is more persuasive than humans 64.4% of the time • Most users accept AI outputs without questioning the underlyi...
Send us a text ProPublica's investigation reveals the National Shooting Sports Foundation has been secretly sharing gun buyers' personal information, including underwear sizes, for political purposes. This privacy breach raises serious concerns about data exploitation even in industries that publicly position themselves as defenders of individual rights. • Gun owners group demands federal investigation into firearms industry data sharing • Personal data shared included underwear sizes and wa...
Send us a text Privacy Please News, for hitting big topics quickly with a hint of sarcasm to bring some joy and knowledge. This week, we hit on the latest privacy events in tech with a satirical perspective on how your data is being shared, sold, and exploited. From Google's dramatic stance on sharing search data to state-sponsored hackers dominating zero-day exploits, this episode highlights the absurdity of our current digital privacy landscape. • Google CEO Sundar Pichai compares sh...
Send us a text Cameron and Gabe return after a brief hiatus to explore major developments in security, privacy, and resilience. They dive into insights from the IAPP conference and VeeamOn, examining how AI governance and outdated privacy tools are reshaping the industry landscape. • AI governance frameworks dominated IAPP discussions with companies "building the plane as they're flying" • Verizon's Data Breach Report debunks overblown AI security fears, showing real risks are data leakage a...
Send us a text Privacy threats continue to escalate as human error undermines even the most secure systems, from military officials accidentally exposing classified information to Russian hackers targeting encrypted messaging apps. • Signal security breach occurred when defense officials accidentally added a reporter to their encrypted group chat discussing sensitive military operations • Russian-linked attackers targeting Signal users through QR code vulnerabilities, tricking users into lin...
Send us a text Privacy threats are intensifying across multiple fronts, from genetic data vulnerabilities at 23andMe to corporate violations and messaging app security concerns. Cameron Ivey breaks down three urgent privacy issues and provides practical guidance on protecting your digital footprint in an increasingly vulnerable online landscape. • 23andMe users should consider deleting their genetic data immediately due to bankruptcy proceedings that could compromise privacy protections • La...
Send us a text We explore how uncertainty and chaos create both vulnerabilities and opportunities in privacy and security. Amid global turmoil, cybersecurity professionals must adopt a bias toward action to counter increased threats that thrive in chaotic environments. • Chaos serves as a smoke screen for malicious actors, just as DOS attacks once distracted from network intrusions • Recent Ghost ransomware attack affected 70 countries but received less attention due to global uncertainty • ...
Send us a text Today's episode dives into the intersection of AI behavior and digital security concerns. We discuss a startling incident involving a malfunctioning AI robot and explore a new ransomware threat known as Ghost. • Overview of an AI robot incident that raised ethical concerns • Examination of Asimov's Laws of Robotics and their relevance • Introduction to Ghost ransomware and its impact on multiple industries • Discussion on backup security strategies and ...
Send us a text The emergence of quantum computing presents a unique set of challenges and opportunities for data security and privacy. As Microsoft reveals its new quantum chip, the industry must prepare for the significant threats that stable quantum computing poses to existing encryption methods. • Microsoft announces a new quantum processing chip • Potential risks to encryption and data security • Industry skepticism toward claims of rapid advancements • Understand...
Send us a text You click "agree," you swipe a loyalty card, you browse online – every digital breadcrumb you leave is being collected, but not just by the apps and websites you use. Welcome to the world of data brokers, a multi-billion-dollar, hidden industry that aggregates, analyzes, and profits from your most intimate personal information. In this special episode from Privacy Please, we pull back the curtain on this shadowy ecosystem. Discover: What a data broker is and how they differ fro...