
Sign up to save your podcasts
Or


Send us a text
That heart-stopping moment when a stranger messages you with eerily accurate personal details about your family and work history, threatening exposure unless you comply with their demands. It happened to one of us recently, highlighting the increasingly sophisticated nature of digital extortion attempts in today's connected world.
We dive deep into this growing threat, sharing firsthand experience with targeted extortion attempts that go far beyond generic spam. These scammers have evolved, gathering enough specific information to make their threats feel credible—naming family members, listing past employers, and somehow connecting to secure messaging platforms like Signal. We break down exactly what to do (and what NOT to do) when facing such situations, explaining why maintaining your composure and refusing to engage is crucial.
Beyond personal digital security, we examine the seismic shift in America's tech landscape with Trump's executive order requiring a $100,000 fee per H-1B visa worker. This policy effectively ends decades of wage suppression practices where companies hired foreign workers at significantly lower salaries than their American counterparts. With approximately 730,000 current H-1B holders in the US, this change could create hundreds of thousands of high-paying American jobs within a year.
Meanwhile, major infrastructure systems face alarming vulnerabilities to cyber attacks. Heathrow Airport's recent disruptions and Jaguar Land Rover's manufacturing shutdown (expected to cost over a billion euros) highlight the "Tootsie Pop" security model prevalent in industrial systems: hard outer defenses but soft, vulnerable interiors. As digital threats evolve on all fronts, both individuals and organizations must adopt more sophisticated approaches to security.
Whether you're concerned about personal digital safety or interested in the economic impacts of changing tech policies, this episode provides practical insights to navigate our increasingly complex digital landscape. Subscribe for more analysis at the intersection of technology, security, and public policy.
Support the show
Communicate with us directly on x.com by joining the Good Old Boys community! https://x.com/i/communities/1887018898605641825
Check out Gene's other podcasts -
podcast.sirgene.com and unrelenting.show
Read Ben's blog and see product links at namedben.com
Listen to Amy Clare Smith Music
Can't donate?
By Gene and Ben5
44 ratings
Send us a text
That heart-stopping moment when a stranger messages you with eerily accurate personal details about your family and work history, threatening exposure unless you comply with their demands. It happened to one of us recently, highlighting the increasingly sophisticated nature of digital extortion attempts in today's connected world.
We dive deep into this growing threat, sharing firsthand experience with targeted extortion attempts that go far beyond generic spam. These scammers have evolved, gathering enough specific information to make their threats feel credible—naming family members, listing past employers, and somehow connecting to secure messaging platforms like Signal. We break down exactly what to do (and what NOT to do) when facing such situations, explaining why maintaining your composure and refusing to engage is crucial.
Beyond personal digital security, we examine the seismic shift in America's tech landscape with Trump's executive order requiring a $100,000 fee per H-1B visa worker. This policy effectively ends decades of wage suppression practices where companies hired foreign workers at significantly lower salaries than their American counterparts. With approximately 730,000 current H-1B holders in the US, this change could create hundreds of thousands of high-paying American jobs within a year.
Meanwhile, major infrastructure systems face alarming vulnerabilities to cyber attacks. Heathrow Airport's recent disruptions and Jaguar Land Rover's manufacturing shutdown (expected to cost over a billion euros) highlight the "Tootsie Pop" security model prevalent in industrial systems: hard outer defenses but soft, vulnerable interiors. As digital threats evolve on all fronts, both individuals and organizations must adopt more sophisticated approaches to security.
Whether you're concerned about personal digital safety or interested in the economic impacts of changing tech policies, this episode provides practical insights to navigate our increasingly complex digital landscape. Subscribe for more analysis at the intersection of technology, security, and public policy.
Support the show
Communicate with us directly on x.com by joining the Good Old Boys community! https://x.com/i/communities/1887018898605641825
Check out Gene's other podcasts -
podcast.sirgene.com and unrelenting.show
Read Ben's blog and see product links at namedben.com
Listen to Amy Clare Smith Music
Can't donate?

227,699 Listeners

26,120 Listeners

5,951 Listeners

62,902 Listeners

425 Listeners

2,015 Listeners

9,438 Listeners

12,874 Listeners

22 Listeners

43,997 Listeners

40,098 Listeners

252 Listeners

10 Listeners

16 Listeners

9 Listeners

16,722 Listeners