Threat Talks - Your Gateway to Cybersecurity Insights

Resilience Over Fragmentation: The Risk You Can’t Ignore


Listen Later

The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.
In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.

Real examples you’ll hear:
• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.
• How your address book upload leaks other people’s data to platforms.
• Why secure doesn’t mean private on platforms that profit from your data.
• Age checks done right: passport chip + selective disclosure instead of oversharing.
• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).
• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.

  • (00:00) - – Free vs. monetized internet
  • (02:22) - – Facebook: secure ≠ private
  • (05:31) - – WhatsApp vs. Signal trade-offs
  • (07:05) - – Metadata & social graph risk
  • (11:58) - – Attribute-based auth (Yi)
  • (19:55) - – Decentralized login; split keys
  • (28:11) - – PubHubs: private, verified rooms
  • (49:54) - – Continuity: vendor/cable risk
  • (56:01) - – Close & takeaways

  • Related ON2IT Content & Referenced Resources
    • ON2IT: https://on2it.net/
    • Threat Talks: https://threat-talks.com/
    • AMS-IX: https://www.ams-ix.net/ams
    • Yivi (privacy-preserving authentication): https://yivi.app/
    • PubHubs (privacy-first social platform): https://pubhubs.net/
    • European alternatives (mentioned): http://european-alternative.eu/
    • Privacy tools (mentioned): https://privacytools.io/

    Guest and Host Links: 
    Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ 
    Bart Jacobs: http://www.cs.ru.nl/~bart/

    If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.

    Click here to view the episode transcript.


    🔔 Follow and Support our channel! 🔔
    === 
    ► YOUTUBE: https://youtube.com/@ThreatTalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    👕 Receive your Threat Talks T-shirt
    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️
    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    ...more
    View all episodesView all episodes
    Download on the App Store

    Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks