Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Ray Heffer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ray Heffer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS

54:26
 
Share
 

Manage episode 493121538 series 3457129
Content provided by Ray Heffer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ray Heffer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.

I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.

In this week’s episode:

  1. Ghost in the Source Capture the Flag challenge results
  2. The military mindset problem in cybersecurity
  3. Strategic use of public Wi-Fi for account creation and privacy techniques
  4. Data curation tactics, and “Minimizing What Can Be Known”
  5. Invisible surveillance net and Stingray devices
  6. GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture

Matrix Community Rooms

Individual Room Links:

Show Links:

“We’re dragons. We’re not supposed to live by other people’s rules.”

- Hajime Ryudo

★ Support this podcast on Patreon ★
  continue reading

31 episodes

Artwork
iconShare
 
Manage episode 493121538 series 3457129
Content provided by Ray Heffer. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ray Heffer or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.

I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.

In this week’s episode:

  1. Ghost in the Source Capture the Flag challenge results
  2. The military mindset problem in cybersecurity
  3. Strategic use of public Wi-Fi for account creation and privacy techniques
  4. Data curation tactics, and “Minimizing What Can Be Known”
  5. Invisible surveillance net and Stingray devices
  6. GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture

Matrix Community Rooms

Individual Room Links:

Show Links:

“We’re dragons. We’re not supposed to live by other people’s rules.”

- Hajime Ryudo

★ Support this podcast on Patreon ★
  continue reading

31 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play