Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
S6, E256 - The Invisible Trade: How Data Brokers Profit from Your Life
Privacy Please
20 minutes
3 months ago
S6, E256 - The Invisible Trade: How Data Brokers Profit from Your Life
Send us a text You click "agree," you swipe a loyalty card, you browse online – every digital breadcrumb you leave is being collected, but not just by the apps and websites you use. Welcome to the world of data brokers, a multi-billion-dollar, hidden industry that aggregates, analyzes, and profits from your most intimate personal information. In this special episode from Privacy Please, we pull back the curtain on this shadowy ecosystem. Discover: What a data broker is and how they differ fro...
Privacy Please
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...