Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Easy Prey

Easy Prey

Chris Parker

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
Share icon

All episodes

Best episodes

Top 10 Easy Prey Episodes

Goodpods has curated a list of the 10 best Easy Prey episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Easy Prey for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Easy Prey episode by adding your comments to the episode page.

In this episode, we navigate the ever evolving landscape of messaging app dynamics, examining the challenges and opportunities in striking the right balance between preserving user privacy, ensuring robust security measures, and maintaining accountability in an ever changing digital landscape.

Today’s guest is Kurt Long. Kurt is an entrepreneur with over 25 years of experience in starting, growing, and building Information Security and Privacy businesses. Kurt is the Executive Director of The Long Family Force for Good Foundation which focuses on supporting not-for-profits dedicated to improving the mental health of families and children. Kurt is also the Co-Founder and CEO of BUNKR.

Show Notes:

  • [1:09] - Kurt shares his background and what he does through The Long Family Force for Good Foundation and BUNKR.
  • [5:01] - He found himself interested in technology and the idea of doing something bigger than himself with a team.
  • [9:26] - Currently, Kurt’s work is directed to messaging apps.
  • [13:22] - In the early days of messaging, there was an inherent trust. We didn’t think about the bad guys yet.
  • [15:57] - Communication platforms were never intended to secure communication.
  • [17:31] - Most communication apps now do begin with good intent. Kurt describes WhatsApp as an example until it was purchased by Facebook.
  • [19:50] - We want information and access, but we want safety, too.
  • [21:38] - We have to put trust in someone to strike a balance.
  • [23:41] - The Federal Trade Commission has announced apps that don’t support legal due process and implemented a fine for use of them.
  • [25:56] - Kurt shares a true story that is a great example of inside trade problems in messaging apps.
  • [28:28] - Using secret messaging apps or apps that feature disappearing messages are hard to track. You could be affiliated with someone doing something illegal.
  • [30:29] - Privacy and security do help us retain rights we have.
  • [32:35] - Messaging issues also impact the medical industry.
  • [34:07] - Some countries have legislation that ban secret messaging apps, but they aren’t really being enforced.
  • [36:25] - BUNKR has consumers and public usage in 32 countries worldwide and is popular with families.
  • [37:52] - When companies have more control over their app, there is less criminality involved.
  • [40:02] - This service is invitation based. You cannot receive random messages from anyone you do not invite.
  • [41:55] - “The entire planet deserves to conduct their affairs with dignity at bank level security.”
  • [44:29] - Kurt leans towards following United States laws and legal action, but also has a large legal team to help guide through unusual situations.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

Scammers, like magicians, use distractions and illusions to keep you from realizing what is really going on. They may choose to have you focus on something that is urgent hoping that you’ll make mistakes that you normally wouldn’t.

Today’s guests are Chris Chabris and Dan Simons. Dr. Chabris is a Cognitive Scientist who has taught at Union College in Harvard University and is a fellow of The Association for Psychological Science. His research focuses on decision-making, attention, intelligence, and behavior genetics. Chris received his PhD in Psychology from Harvard University.

Dr. Daniel Simons is a professor of Psychology at the University of Illinois, where he has the Visual Cognitive Laboratory. Dan received his PhD from Cornell University. His research explores the limits of awareness and memory, the reasons why we often are unaware of those limits, and the implications of such limits on our personal and professional lives.

Show Notes:
  • [1:18] - Dan and Chris share their background and what their current roles are in their industry.
  • [3:27] - Why did Dan and Chris decide to write a book together?
  • [6:12] - Stories of victims are engaging and interesting, but these stories don’t focus on why we are fooled.
  • [8:53] - Chris and Dan share the story of a time they were almost scammed.
  • [13:01] - Fictional stories in movies get some things right about what con artists exploit, but real scenarios are not always so precise.
  • [14:52] - We have the ability to focus on a select amount of the information in front of us.
  • [16:39] - There are a lot of different techniques that scammers employ to put you under time pressure.
  • [19:59] - Confirmation bias is the idea that you try to find evidence of what you believe.
  • [21:04] - There are a lot of theories about why we are good at some things and not as good at others.
  • [22:15] - It is logical to trust someone you know, but social media has created the opportunity to trust misinformation.
  • [24:38] - Commitments are assumptions that we make and hold steadfastly to.
  • [26:41] - It is easy to trust someone when you’ve committed to your perception of them.
  • [28:33] - Ask yourself if there is anything you believe that could be proven wrong if you were given new information.
  • [31:01] - External validation is a great source for seeing things you might have missed.
  • [32:48] - There are scams in literally everything, even chess.
  • [38:02] - Are scams increasing or is it awareness of scams that is increasing?
  • [40:26] - All scams employ the same principles. They are always going to rely on the same tricks and tap into the same fears.
  • [42:37] - Dan’s hope is that people will question the information they get and become less accepting.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

Our home IoT devices are constantly being probed for weaknesses so that they can be compromised and used for broader nefarious purposes like cyber warfare. The Ukrainians may be considered some of the best in the world when it comes to defending against cyber warfare because they have been regularly attacked and have been defending their systems for years. Today’s guest is Mikko Hypponen. He has written for The New York Times, Wired, and Scientific American and has lectured at universities like Oxford, Stanford, and Cambridge. Mikko works as the Chief Research Officer for WithSecure and sits on the advisory board of Europol.

Show Notes:
  • [1:11] - Mikko shares his background as an old-school hacker.
  • [2:46] - His mother advised Mikko to pursue this career in the 1980s.
  • [5:23] - Smart devices like doorbells and refrigerators are not configured correctly because security makes the device more expensive.
  • [7:50] - Mikko discusses regulation in Europe and how, most of the time, regulation fails.
  • [9:03] - Many hackable devices wouldn’t be hackable if consumers read the manual.
  • [11:13] - Most malware traffic used to be Windows based but is now Linux based.
  • [12:26] - Many people don’t think that there’s any data that can be stolen from IoT devices, but they are surprisingly powerful.
  • [14:16] - Mikko explains some recent attacks.
  • [15:43] - Medical devices are just as vulnerable as any other IoT device.
  • [17:41] - What is a honeypot?
  • [19:02] - Mikko shares that he has been a victim himself with his credit card number stolen twice.
  • [20:14] - Even experts make mistakes.
  • [21:26] - If you believe you have been hacked or think you are being scammed, take a step back.
  • [23:06] - Mikko describes some of his experience living so near Russia and monitoring cyber warfare.
  • [25:07] - Spying and espionage is a big problem in countries bordering Russia.
  • [30:06] - With invasions in 2022, Ukraine improved many systems.
  • [31:20] - Mikko makes a prediction on what will come next that sounds like Science Fiction, just like cyber war sounded like before.
  • [32:18] - What are Mikko’s thoughts on AI?

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

With the appearance of health taking focus in today’s culture, many are persuaded to try extreme trends to achieve quick weight and health results. Conventional healthcare may not always have the answers we’re looking for but it’s important to not let our fears and concerns be exploited for someone else’s profit.

Today’s guest is Christy Harrison. Christy and a Registered Dietician Nutritionist, Certified Intuitive Eating Counselor, and a journalist who has been covering food, nutrition, and health for more than 20 years. She is the author of two books, The Wellness Trap and Anti-Diet and the producer and host of the podcasts Rethinking Wellness and Food Psych which has helped tens of thousands of people around the world think critically about diet and wellness and culture and develop a more peaceful relationship with food.

Show Notes:
  • [1:05] - Christy shares her background and what she specializes in as a Dietician Nutritionist.
  • [2:19] - Christy describes her past experiences with disordered eating and combined her perspective with her journalism career.
  • [5:15] - Through her own recovery, she discovered her passion for helping others at a large scale.
  • [6:21] - This is not a substitute for physical or mental health advice.
  • [7:20] - There is a long history of how our current societal focus on weight and body shape has evolved.
  • [11:18] - As society developed an anti-fat approach, diets became trendy and scammy weight loss products became prevalent.
  • [13:07] - There’s a lot of motivation for scammers to make money in the health and wellness space as it is a huge industry.
  • [14:22] - Christy shares some history on the first diet book and how we are currently seeing similar trends again.
  • [17:03] - Watch out for anything that purports a product to be a cure-all.
  • [19:16] - While there are problems with mainstream healthcare, anyone who turns fear into a sales pitch is a red flag.
  • [22:02] - A lot of people in ads, especially on social media, are paid to promote a product that they probably have never tried.
  • [23:14] - Be aware of the differences between real studies and anecdotal science-sounding claims.
  • [26:32] - A problem with nutritional research is that it is mostly observational.
  • [28:15] - It’s not all down to the individual. We can certainly do things to make ourselves less susceptible, but the system needs to change.
  • [29:35] - Unless it is coming from your own medical provider who knows you and your needs, be skeptical of medical information.
  • [32:17] - Before adopting a health and wellness practice, you should do research.
  • [33:39] - Check in with yourself on any emotional pull you have.
  • [35:34] - There are also claims from scammers who will say that you have to feel worse to feel better, which isn’t generally the case.
  • [38:37] - Diet culture creates a yo-yo effect for a lot of people.
  • [40:28] - Self efficacy is critical to mental health and dieting takes it away. They have a hugely negative psychological effect.
  • [44:40] - Christy shares some things to consider before making changes to your diet.
  • [46:42] - What are the things you have control over in your life? Don’t demonize yourself for the choices you make when there isn’t anything else you can choose.
  • [47:56] - There isn’t one solution for every single person.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

In this episode, we look at two sides of the Nigerian scam: The emotional, psychological, and financial damage done by scammers and the scammers we often look at as bad people doing bad things. But in some cultures, this is seen as an acceptable career option.

Today’s guest is Ronnie Tokazowski. Ronnie has been fighting Nigerian fraud for the last seven years and has collaborated with both law enforcement and the private sector. He runs a mailing list which collaborates with victims in identifying critical pieces of information around how the fraud works as well as working with romance victims themselves.

Show Notes:
  • [0:53] - Ronnie shares his role as a Principal Threat Advisor and the work he does with Nigerian fraud.
  • [2:10] - Seven years ago, Ronnie saw the increasing trend in Nigerian fraud and is trying to get ahead of it.
  • [3:58] - Scammers operate in a way that is similar to pulling tools out of a toolbox. They know which strategies to use in different situations.
  • [5:44] - Relationships have been built with victims over months or sometimes even years, especially in romance scams.
  • [8:19] - Ronnie explains how emotions are targeted to build relationships with scammers.
  • [10:36] - Business email cybercrime was the number one cybercrime for seven years ago.
  • [11:41] - The more we talk about it, the more victims come forward to talk about their own experience and overcome the social stigma.
  • [12:36] - While not a scam victim, Ronnie explains a scenario in which he questioned his decisions.
  • [15:27] - There are people out there doing the work in Nigeria in getting scammers to leave the career. But it is a huge undertaking.
  • [17:50] - A common scam is to reach out on social media and try to get the target off the platform to talk.
  • [19:18] - Some scammers are victims of human trafficking doing the work against their will.
  • [20:36] - Right now with pig butchering, the belief is that the groups are organized crime groups in China.
  • [22:01] - Ronnie shares the experience in speaking with law enforcement in Nigeria.
  • [23:57] - The connections to different scams are very intricate and sophisticated.
  • [26:21] - In one experiment, gift cards were purchased to give to scammers to track what they did with them.
  • [29:26] - Scammers collaborate together to find “clients” and share their list of victims to facilitate other crimes.
  • [30:50] - Ronnie shares the story of a scammer who collaborated with multiple people and wound up being involved in tons of different types of scams.
  • [33:12] - In Nigeria, there are a lot of tribal religions in play.
  • [34:31] - Many scammers in Nigeria will go through rituals in their attempt to manifest wealth.
  • [37:07] - One of the main motivations for scammers is their experience in poverty.
  • [41:02] - What about government intervention? How is the Nigerian government handling the situation?
  • [42:21] - In some countries, the government is also tied up in the scamming.
  • [45:20] - Two factor authentication is critical to security.
  • [46:26] - For businesses, there should be a process to ensure money is wired correctly when necessary.
  • [48:10] - Ronnie doesn’t recommend investing in crypto right now especially if it sounds too good to be true.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

Recovering from identity crimes can be daunting and take a toll on your entire life, not just financially and emotionally. Once someone gains access to one of your accounts, they can work to manipulate your friends and relatives as well.

Today’s guest is Eva Velasquez. Eva is the President and CEO of The Identity Theft Resource Center. She previously served as the Vice President of Operation for the San Diego Better Business Bureau and for 21 years at the San Diego District Attorney’s Office. She is an author, public speaker, and a recognized expert who has been featured on CBS Mornings, NBC Nightly News, New York Times, NPR, and numerous other media outlets.

Show Notes:
  • [1:02] - Eva describes her role as CEO and President of The Identity Theft Resource Center and what the organization does.
  • [2:11] - Eva began her career in law enforcement and learned firsthand how dismissive we are of victims of identity crimes.
  • [4:26] - The great majority of these crimes go completely uninvestigated.
  • [5:48] - Your energy is best spent on recovering what you’ve lost rather than trying to convict the perpetrator.
  • [8:03] - Identity theft isn’t the only identity crime.
  • [9:47] - Most scams and data breaches at this time can be considered an identity crime.
  • [11:06] - The majority of identity crimes that are reported at The Identity Theft Resource Center are caused by social engineering.
  • [13:42] - If you see some unusual activity or communication on social media from someone you know, let the real person know.
  • [16:17] - Chris shares a strategy for family passwords to verify their identity.
  • [18:11] - There are several different types of identity fraud. A lot of it is credit cards, but it could be other types of loans or accounts.
  • [19:54] - Identity fraud is complicated to solve.
  • [21:00] - Eva shares the story of a victim who was car jacked and has had non-stop identity theft issues.
  • [22:24] - People who are victims of identity theft may even have major problems in getting jobs.
  • [23:42] - The number of victims who have felt suicidal after identity theft has increased year over year.
  • [25:37] - The Identity Theft Resource Center is like AAA roadside assistance. Reach out to them.
  • [28:00] - Eva shares that this is her life’s mission. She would love a world where The Identity Theft Resource Center wasn’t needed.
  • [29:22] - Password management needs to be improved.
  • [31:03] - Multi-factor authorization is absolutely necessary.
  • [33:28] - If you ever get a call from someone claiming to be from your bank, hang up and actually contact your bank using the number on your card.
  • [34:42] - We need to flip our view of “annoying” security measures.
  • [41:57] - Safeguard access to all the accounts you have, even email accounts.
  • [43:16] - It can take anywhere between a day and ten years to resolve identity fraud. It is very situational.
  • [46:03] - It may also be possible for something to appear solved but then it is in remission.
  • [47:20] - There is no shame in asking for help. It is very complicated.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

You may be shocked to know that master manipulators utilize special tactics to impact human behavior and emotions by more than just instilling a sense of urgency. The art of persuasion can be used for both good and evil. Today’s guest is Chris Hadnagy. Chris is the author of five books on the topic of social engineering. He is a professor of social engineering at the University of Arizona as well as the CEO of Social Engineer LLC, the Innocent Lives Foundation, and the Institute for Social Engineering.

Show Notes:
  • [0:57] - Chris shares his background and how he found himself in the field of social engineering and understanding human decision making.
  • [2:38] - It is not the case that only stupid people fall for scams and phishing emails.
  • [4:04] - There is good social engineering and Chris gives some examples.
  • [5:47] - The release of oxytocin is researched to show that it is linked to trust.
  • [7:58] - You can have oxytocin and dopamine separately but together they build a bond.
  • [9:17] - Marketing and advertising land in the gray middle area of social engineering. Is it being used for good or bad?
  • [11:14] - It is important to look at things through the lens of purpose. What is the intent behind it?
  • [12:35] - All social engineering, good and bad, use the same principles. But malicious social engineering triggers different emotions, namely fear.
  • [14:37] - Preying on fear is one way people are socially engineered, but Chris gives an example of how a company as large as Toyota was impacted by the sense of urgency.
  • [17:12] - There are so many stories of social engineering that are extremely plausible and believable.
  • [21:04] - The trend now is to use social media data and information to target people for spear phishing.
  • [22:30] - If you feel any strong emotion after a request, it is a great time to pause and consider if you are being manipulated.
  • [24:21] - If you ever fall for something, don’t let embarrassment make you sweep it under the rug.
  • [27:31] - The idea of an authority figure is a principle to remember, but it doesn’t always work.
  • [30:10] - In some countries, fear of authority isn’t present. But social engineers will look for the weaknesses to exploit in different environments.
  • [31:16] - Voice phishing is currently on the rise.
  • [33:21] - Chris shares about the uptick on LinkedIn requests that even targeted the US military.
  • [35:28] - Although we will see some good from AI, Chris has many concerns.
  • [37:33] - Chris describes some of the classes he teaches at the University of Arizona specifically about Social Engineering.
  • [39:17] - You can take classes online from Chris on Social-Engineer.com.
  • [40:21] - We need to understand social engineering to keep our children safe. Start having conversations early.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode
Easy Prey - Preventing Email Attacks with Kiri Addison
play

05/31/23 • 32 min

Phishing emails are constantly evolving to take advantage of current trends, news, and holidays. Typically poor grammar or the time an email was sent could help you identify if it is authentic. But with AI, these obvious signs may soon disappear.

Today’s guest is Kiri Addison. Kiri is the Detection and Efficacy Product Manager at Mimecast, working on security products to defend against new and evolving threats. Previously she was head of data science for threat intelligence and has worked in the public sector creating systems to detect and prevent cyber attacks and fraud.

Show Notes:
  • [0:59] - Kiri shares her background and what her role is at Mimecast.
  • [3:03] - Email scams are still the number one attack method and they tend to follow trends, news, and holidays.
  • [5:17] - Technology is improving and there is better protection of basic attacks, but with how fast threats evolve, there are still areas of improvement.
  • [7:34] - Kiri shares some statistics on the improvement made after implementing phishing email training.
  • [8:26] - With the use of ChatGPT, our usual red flags to look for will change.
  • [10:12] - In the advice and training by Mimecast, they explain the impact on the end user.
  • [12:08] - Kiri explains some of the different types of security measures available.
  • [13:47] - A lot of companies only implement the training with their employees to check off the compliance.
  • [16:50] - Be suspicious and take some time. Don’t feel pressured.
  • [20:05] - Look for anything abnormal, even if it is something unusual from a sender you know.
  • [21:44] - If you receive word from someone you know but it seems odd, contact the person directly to find out what’s going on.
  • [23:10] - Mimecast works primarily with corporations and businesses, but there are some personal phishing email attempts.
  • [24:44] - Some attacks combine safe sights with malicious links.
  • [26:00] - Kiri describes some of the recent trends they are seeing.
  • [28:58] - As AI evolves, it is going to become harder to protect. However, it all comes down to end user awareness.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

Age appropriate conversations need to be taking place with children on how technology is being used to groom them. Unfortunately, many are already addicted to the dopamine fix and their relationships with a device can numb them to being preyed upon. Today’s guest is John Pizzuro. John serves as CEO of Raven, a lobbying and advocacy group that focuses on protecting children from exploitation. John was a former commander of the New Jersey Internet Crimes Against Children task force and has created a framework for other countries to use to investigate child exploitation.

Show Notes:
  • [0:57] - John shares his background in ICAC and current role as CEO of Raven.
  • [3:08] - With the changes of technology and the availability of it in every household, behavior has changed along with it.
  • [5:01] - Using the internet at home makes the internet feel like a safe place.
  • [6:16] - People manipulate others through language.
  • [7:21] - It is simple to get hooked because of the dopamine fix met with social media.
  • [8:49] - Do social media companies do enough? John says they don’t do anything and they don’t have the ability to moderate.
  • [11:01] - AI is not yet fully understood. How can it be used for good or bad?
  • [13:13] - There has to be a balance between privacy and protection. This is true for everything.
  • [14:15] - Today, we are so polarized and the result is that a solution will not be found.
  • [15:45] - Parents need to have real conversations with their children and the earlier the better. Open communication is important.
  • [17:54] - It’s not talked about openly enough because it is scary to talk about child exploitation.
  • [21:30] - Device addiction is a real problem and generally speaking, there’s a need for instant gratification that distracts us from real relationships.
  • [23:10] - There are communities where people share techniques for grooming and they are extremely popular on the dark web.
  • [24:53] - John shares some terrifying statistics.
  • [26:25] - There are task forces working together to protect children from child exploitation.
  • [28:30] - The task to go through digital evidence is time and resource consuming.
  • [29:28] - What is needed in the US is age appropriate child protection legislation.
  • [31:03] - John explains some of the challenges in current legislation.
  • [32:17] - Do we hold all these tech companies liable?
  • [33:40] - The larger the bill, the more things that people will have a problem with.
  • [36:02] - If we can articulate things the right way, this legislation can make a huge difference.
  • [38:06] - Child advocacy centers are impactful but their funding gets cut.
  • [39:16] - The challenge with research is that researchers move from project to project. And action must be a result of theories.
  • [40:25] - John shares ways you can impact this cause and who to talk to.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode
Easy Prey - Advances in Crypto with Bam Azizi
play

01/17/24 • 44 min

There are so many things to learn about utilizing crypto, understanding the benefits as well as the benefits. It can be used to save time and money, but you need to be careful and only interact with reputable companies. Today’s guest is Bam Azizi. Bam is a tech entrepreneur and the co-founder and CEO of Mesh, which provides FinTech companies with a seamless and secure one-click system for users to transfer their assets for deposit, payment, and payout. He previously founded No Password, a cybersecurity identity company acquired by LogMeIn in 2019.

Show Notes:

  • [0:53] - Bam shares his background and current endeavors with Mesh, of which he is co-founder and CEO.
  • [2:26] - Bam explains how he found himself working in FinTech with his background in cybersecurity.
  • [5:01] - You cannot educate every single user on the planet. People make mistakes all the time and there should be no shame about that.
  • [7:37] - Defense needs to get it right 100% of the time, but to move the scam forward, the scammer only needs to get it right once.
  • [11:01] - Security and compliance act like guardrails.
  • [12:30] - There are mechanisms in place that can protect users, but there are pitfalls and disadvantages.
  • [13:41] - Crypto is like any other type of data, but how it is stored is different.
  • [14:57] - Crypto is inherently secure, but transit becomes a problem.
  • [17:34] - Sometimes, you just don’t know who you are sending money to or if the company receiving funds is legitimate.
  • [19:40] - Bam explains what happens when we initiate a transaction and try to rescind it.
  • [22:02] - We should be able to identify the people interacting with blockchain.
  • [23:40] - The industry wants crypto to be adopted world wide, but if that were to happen, some things need to be accepted.
  • [24:48] - The blame can’t be placed on one entity.
  • [26:40] - One major benefit to crypto is global transfers.
  • [30:44] - There are a lot of moving pieces when it comes to crypto and you never actually see it. It’s hard to think about in-transit security.
  • [33:30] - There is a huge pushback against crypto from banks and financial institutions.
  • [35:09] - Crypto has been demonized to some extent, but as a technology and the advances we will see in coming years, it’s not inherently bad.
  • [37:34] - We can build practices and mechanisms that can prevent collapses.
  • [40:36] - There are some risks in using crypto but some risks are much bigger than others.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:
bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Easy Prey have?

Easy Prey currently has 261 episodes available.

What topics does Easy Prey cover?

The podcast is about News, True Crime, Tech News, Hacking, Podcasts, Scam and Privacy.

What is the most popular episode on Easy Prey?

The episode title 'The Evolution of Digital Identity with Philipp Pointner' is the most popular.

What is the average episode length on Easy Prey?

The average episode length on Easy Prey is 43 minutes.

How often are episodes of Easy Prey released?

Episodes of Easy Prey are typically released every 7 days.

When was the first episode of Easy Prey?

The first episode of Easy Prey was released on Mar 18, 2020.

Show more FAQ

Toggle view more icon

Comments