The Lockdown - Practical Privacy & Security

029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS


Listen Later

In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robots.txt. I discuss why the “assume breach” mentality just leaves the doors wide open, using examples from Kevin Mitnick’s 1981 Pacific Bell infiltration to modern ransomware groups like Scattered Spider who breached MGM and Marks & Spencer through social engineering.

I also cover practical tactics for using public Wi-Fi, data curation techniques, the invisible surveillance net including Stingray devices, and provide a deep dive into GrapheneOS covering user profiles, app sandboxing, network controls, sensor permissions, and the proper use of sandboxed Google Play services.

In this week’s episode:

  1. Ghost in the Source Capture the Flag challenge results
  2. The military mindset problem in cybersecurity
  3. Strategic use of public Wi-Fi for account creation and privacy techniques
  4. Data curation tactics, and “Minimizing What Can Be Known”
  5. Invisible surveillance net and Stingray devices
  6. GrapheneOS discussion on user profiles, app sandboxing, network controls, sensors permissions, sandboxed Google Play services, and security architecture

Matrix Community Rooms

  • Matrix Community Space - https://matrix.to/#/#psysecure:matrix.org

Individual Room Links:

  • https://matrix.to/#/#lockdown-general:matrix.org
  • https://matrix.to/#/#lockdown-podcast:matrix.org
  • https://matrix.to/#/#lockdown-intro:matrix.org

Show Links:

  • Noam Chomsky on Internet Privacyhttps://www.youtube.com/watch?v=QIWsTMcBrjQ
  • Noam Chomsky on Advertising - https://www.youtube.com/watch?v=PfIwUlY44CM
  • TryHackMe Platform - https://tryhackme.com
  • Hack the Box - https://hackthebox.com
  • Wired Article on DNC Stingray Surveillance - https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/
  • IntelTechniques Data Removal Guide - https://inteltechniques.com/workbook.html
  • Optery Data Broker Removal - https://optery.com
  • Graphene OS - https://grapheneos.org
“We’re dragons. We’re not supposed to live by other people’s rules.”

- Hajime Ryudo

★ Support this podcast on Patreon ★
...more
View all episodesView all episodes
Download on the App Store

The Lockdown - Practical Privacy & SecurityBy Ray Heffer

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

25 ratings


More shows like The Lockdown - Practical Privacy & Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,979 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

265 Listeners

Hacked by Hacked

Hacked

183 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,009 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

312 Listeners

Click Here by Recorded Future News

Click Here

414 Listeners

TFTC: A Bitcoin Podcast by Marty Bent

TFTC: A Bitcoin Podcast

765 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,909 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

EverydaySpy Podcast by Andrew Bustamante

EverydaySpy Podcast

654 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

Watchman Privacy by Gabriel Custodiet

Watchman Privacy

71 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

167 Listeners

THE Bitcoin Podcast by Walker America

THE Bitcoin Podcast

35 Listeners