Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
S6, E253 - Have a Seat in the Metaverse: The Chris Hansen vs. Roblox Investigation
Privacy Please
15 minutes
4 months ago
S6, E253 - Have a Seat in the Metaverse: The Chris Hansen vs. Roblox Investigation
Send us a text For decades, Chris Hansen’s iconic catchphrase, "Why don't you have a seat?" was the prelude to exposing predators in the real world. Now, his hunt has moved into the metaverse. His target is Roblox, the global gaming platform used by over 70 million people daily, most of whom are children. Hansen and his team allege the platform is a "cesspool" and a "hunting ground" for criminals, while Roblox maintains its safety systems are robust. In this special report, "Privacy Ple...
Privacy Please
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...