Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
S6, E260 - How Digital Therapy is Changing Mental Health (and Privacy) Forever
Privacy Please
19 minutes
1 month ago
S6, E260 - How Digital Therapy is Changing Mental Health (and Privacy) Forever
Send us a text A sleepless night, a soft prompt, and a flood of relief—the rise of AI therapy and companion apps is rewriting how we seek comfort when it matters most. We explore why these tools feel so human and so helpful, and what actually happens to the raw, intimate data shared in moments of vulnerability. From CBT-style exercises to memory-rich chat histories, the promise is powerful: instant support, lower cost, and zero visible judgment. The tradeoff is less visible but just as real—m...
Privacy Please
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...