
Reality 2.0
Katherine Druckman and Doc Searls
All episodes
Best episodes
Top 10 Reality 2.0 Episodes
Goodpods has curated a list of the 10 best Reality 2.0 episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Reality 2.0 for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Reality 2.0 episode by adding your comments to the episode page.

Episode 91: The Metaverse
Reality 2.0
11/05/21 • 52 min
Katherine Druckman and Doc Searls talk to Kyle Rankin about the metaverse of Facebook and beyond, how it may intersect with Web 3 and blockchain, as well as Second Life and the verses that came before.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Kyle Rankin.
Links:
- Snow Crash: Stephenson, Neal: 2015553380958: Amazon.com: Books
- Building a Multibillion-Dollar Company in 18 Months (with Hopin’s Johnny Boufarhat) — Hopin is one of the fastest-growing startups in history. Founder and CEO Johnny Boufarhat joins Azeem Azhar to talk about how he grew the virtual events company from six employees in February 2020, at the start of the Covid-19 pandemic, to more than eight hundred, and a valuation of almost $8 billion, a year and a half later. Johnny explains how he seized the opportunity presented by the pandemic, what it was like learning to lead at one of the fastest-growing startups in history, and why he dreams of a future in which a founder’s location is no impediment to success.
- Nilay Patel on Facebook’s Reckoning With Reality—And the Metaverse-Size Problems Yet to Come | Vanity Fair — After a decade covering the Zucks, Googles, and Ubers of the scene, the Verge editor in chief reflects on tech’s troublesome relationship with the rest of the world.
- Facebook’s fatal flaws. Facebook is doomed. | by Doc Searls | Medium — Nobody can fix this. Facebook is doomed. True, all companies are mortal. (Geoffrey West has been telling us how and why for years.) But Facebook is actually designed to fail in a world that stops tolerating the way Facebook works, and can’t quit working.
- The Metaverse Was Lame Even Before Facebook - The Atlantic — It was terrible then, and it’s terrible now.

01/21/22 • 78 min
Doc Searls and Katherine Druckman talk to Dave Huseby about privacy, cryptography, and authentic data.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Dave Huseby.
Links:
- Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems | The White House — This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs.
- Guess which government doesn't want you to use end-to-end encryption — From a privacy point of view, there is much to love about end-to-end encryption, as employed by the likes of WhatsApp. But while users may delight in the knowledge that their communication is free from surveillance, there are some groups that have a different opinion.
- I Got Access to My Secret Consumer Score. Now You Can Get Yours, Too. - The New York Times — Little-known companies are amassing your data — like food orders and Airbnb messages — and selling the analysis to clients. Here’s how to get a copy of what they have on you.
- Black Teen Kicked Out Of Roller Rink Over Face Recognition | News | BET — A face recognition-equipped Detroit roller rink reportedly kicked out a Black teen on June 10 after misidentifying her as a person who’d allegedly gotten into a fight there in March.
- The principles of user sovereignty | by dwh | UX Collective — The first time I heard the phrase “user sovereignty” was while working at Mozilla on the Firefox web browser. Firefox ostensibly follows user sovereign design principles and respects its users. Mozilla has even baked it into their list of design principles on page 5 of the Firefox Design Values Booklet. But what does “user sovereignty” actually mean and what are the principles that define user-sovereign design?
- A Unified Theory of Decentralization | by dwh | The Startup | Medium — All networks begin as only one thing; one neuron, one cell, one chip, one computer, or one user. One entity alone is not a network, but it is the starting point for understanding the unified theory of decentralization. One entity is fully sovereign, it has no connections to anything else that might influence or control it. One entity in isolation is empowered to act however it wants to strive for whatever results it seeks.
- The Web was Never Decentralized. Redecentralize the web is a fantasy | Design Warp — There are so many people today focused on “re-decentralizing the web.” They have a popular belief that when the web was invented it was a wonderfully optimistic vision of decentralization, governed by democratic principles and full of free information available...

07/02/21 • 62 min
Katherine Druckman and Doc Searls talk to Brian Fox about voting systems, open source, work in the post-covid era, blockchain, programming languages, and more.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Brian Fox.
Links:
- Brian Fox (computer programmer) - Wikipedia — Brian Jhan Fox (born 1959) is an American computer programmer and free software advocate. He is the original author of the GNU Bash shell, which he announced as a beta in June 1989.[1] He continued as the primary maintainer of bash until at least early 1993.[2][3] Fox also built the first interactive online banking software in the U.S. for Wells Fargo in 1995,[4] and he created an open source election system in 2008.
- Opinion | To Protect Voting, Use Open-Source Software - The New York Times — Although Russian hackers are reported to have tried to disrupt the November election with attacks on the voting systems of 39 states, the consensus of the intelligence community is that they were probably unsuccessful in their efforts to delete and alter voter data. But another national election is just 15 months away, and the risk that those working on behalf of President Vladimir Putin of Russia could do real damage — and even manage to mark your ballot for you or altering your vote — remains. Since the debacle of the 2000 election (remember hanging chads?) American election machinery has been improved to reduce the chances of mis-tallying votes, outright fraud and attacks by hackers. These improvements brought with them a new concern: lack of software security. Most voting machines’ software can now be easily hacked. This is in large part because the current voting systems use proprietary software based on Microsoft’s operating system.
- Gerald Jay Sussman - Wikipedia — Gerald Jay Sussman (born February 8, 1947) is the Panasonic Professor of Electrical Engineering at the Massachusetts Institute of Technology (MIT). He received his S.B. and Ph.D. degrees in mathematics from MIT in 1968 and 1973 respectively. He has been involved in artificial intelligence (AI) research at MIT since 1964. His research has centered on understanding the problem-solving strategies used by scientists and engineers, with the goals of automating parts of the process and formalizing it to provide more effective methods of science and engineering education. Sussman has also worked in computer languages, in computer architecture and in Very Large Scale Integration (VLSI) design.[1]
- Lisp (programming language) - Wikipedia — Lisp (historically LISP) is a family of programming languages with a long history and a distinctive, fully parenthesized prefix notation.[3] Originally specified in 1958, Lisp is the second-oldest high-level programming language in widespread use today. Only Fortran is older, by one year.[4][5] Lisp has changed since its early days, and many dialects have existed over its history. Today, the best-known general-purpose Lisp dialects are Racket, Common Lisp, Scheme and Clojure.
- Pwnie Awards - Wikipedia — The Pwnie Awards recognize both excellence and incompetence in the field of information security. Winners are selected by a committee of security industry professionals from nominations collected from the information security community.[2] The awards are presented yearly at the Black Hat Security Conference.[3]
- Z shell - Wikipedia — The Z shell (Zsh) is a Unix shell that can be used as an interactive login shell and as a command interpreter for shell scripting. Zsh is an extended Bourne shell with many...

06/11/21 • 37 min
Katherine Druckman, Doc Searls, and Shawn Powers discuss Apple's new privacy features, the Anom app, and the problems with cloud storage.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Special Guest: Shawn Powers.
Links:
- Apple unveils new privacy features, digital IDs and changes to FaceTime. - The New York Times — Apple once again took aim at the vast digital-advertising industry on Monday and unveiled a number of changes to protect iPhones users’ privacy and strengthen its position as a gatekeeper between consumers and the rest of the digital industry.
- The FBI operated an 'encrypted' chat app for organized criminals | Engadget — The FBI covertly ran an encrypted communications platform for years that allowed it to intercept 20 million messages from international criminal organizations. Hundreds of arrests have been made across 18 countries as part of the investigation known as Operation Trojan Shield. Suspects, including members of the Italian Mafia and outlaw motorcycle gangs, are among those that have been charged. Australian Police, who helped conceive the sting, have arrested 224 offenders and seized 3.7 tonnes of drugs and $44.9 million in cash and assets.
- Everything you can’t do on an iPhone - The Washington Post — I’ve used an iPhone for the past 12 years, and like most of you I am not looking to change. But we’ve become so accustomed to restrictions Apple built into the iPhone, we don’t even realize how we’re contorting ourselves to comply — or what we’re missing out on. One sign we’re being manipulated by a monopoly is when it’s hard to even consider an alternative. Apple says it’s protecting our security and privacy, but it has become clear that locking down our iPhones is also about controlling us so Apple can make more money.
- iOS 15, iCloud Updates: All the Big Privacy News From WWDC '21 — It wouldn’t be an Apple event without a nod to the company’s pro-privacy stance. As part of its annual Worldwide Developer’s Conference (WWDC) keynote this year, the company announced some major privacy upgrades that will come with iOS 15 and iCloud—here are some of the biggest.

02/12/21 • 44 min
Katherine Druckman and Doc Searls talk facial recognition AI using our photos for training, and how we collectively negotiate our own privacy online.
Reality 2.0 around the web:
Site/Blog/Newsletter
FaceBook
Twitter
YouTube
Mastodon
Links:
- This new tool can tell you if your online photos are helping train facial recognition systems - CNN — Exposing.ai, unveiled in January, lets you know whether photos you've posted to image-sharing site Flickr have been used to advance this controversial application of artificial intelligence by allowing you to search more than 3.6 million photos in six facial-recognition image datasets.
- Check if your photos were used in AI surveillance research projects — Check if your Flickr photos were used to build face recognition
- Clearview AI’s Facial Recognition App Called Illegal in Canada - The New York Times — Canadian authorities declared that the company needed citizens’ consent to use their biometric information, and told the firm to delete facial images from its database.
- This 'Anonymizer' Tool Replaces Your Face With a Fake to Trick Facial Recognition | Debugger — Try the Anonymizer tool to create a fake face that looks like you
- Doc Searls Weblog · About face — We know more than we can tell.
- Facebook CIA Project: The Onion News Network ONN - YouTube
- Sun on Privacy: 'Get Over It' | WIRED — "You have zero privacy anyway," Scott McNealy told a group of reporters and analysts Monday night at an event to launch his company's new Jini technology. "Get over it."
- The Andromeda Strain - MichaelCrichton.com
- A Vast Web of Vengeance - The New York Times — Outrageous lies destroyed Guy Babcock’s online reputation. When he went hunting for their source, what he discovered was worse than he could have imagined.
- Canadian Woman Accused of Defaming Dozens Online Is Arrested in Toronto - The New York Times — Nadire Atas, a Canadian woman who wrote thousands of online posts defaming her perceived enemies, was arrested on Tuesday by the police in Toronto. She was charged with crimes including harassment and libel, a Toronto police spokeswoman said.
- CORE Response: Community Organized Relief Effort — Together, we save lives.

08/15/19 • 42 min
Doc Searls and Katherine Druckman talk to Gabriel Weinberg, CEO & Founder of DuckDuckGo, and co-author of Super Thinking and Traction.
Special Guest: Gabriel Weinberg.

01/17/23 • 55 min
Doc Searls and Katherine Druckman talk to Dan Miller of Opus Research about the future of Speech and AI.
Site/Blog/Newsletter
FaceBook
Twitter
Mastodon
Special Guest: Dan Miller.
Links:
- Dan Miller, Author at — Dan Miller has over 25 years experience in marketing, business development and corporate strategy for telecom service providers, computer makers and application software developers. Dan founded Opus Research in 1985 and helped define the Conversational Commerce marketplace by authoring scores of reports, advisories and newsletters addressing business opportunities that reside where automated speech leverages Web services, mobility and enterprise software infrastructure.
- Eze Lanza: "Have you heard of https://you...." - Mastodon Canada — Have you heard of https://you.com ? The search engine added #chatGTP style chatbot. It's not perfect but these are examples of what the future of AI could look like.
- You.com | The AI Search Engine You Control
- Say Goodbye to CCaaS: How The Conversational Cloud Will Evolve in 2022 - — Here are the trends that should inform enterprise investment and deployment of Conversational AI, Cloud-based Contact Centers and Intelligent Assistance in the coming year.

Episode 128: Folder Full of HTML
Reality 2.0
10/08/22 • 43 min
When Doc is away, Katherine and Shawn Powers play! (With Static HTML generators) Katherine and Shawn talk about Hugo, a static site generator, WordPress, and the content creator life.
Site/Blog/Newsletter
FaceBook
Twitter
Mastodon
Special Guest: Shawn Powers.
Links:
- The world’s fastest framework for building websites | Hugo — Hugo is one of the most popular open-source static site generators. With its amazing speed and flexibility, Hugo makes building websites fun again.
- Shawn Powers on Twitter: "I’ve fallen in NerdLove with @GoHugoIO, and it’s all @KatherineD’s fault. The https://t.co/ihNrCjqxrb website is now generated with Hugo... and it’s glorious. I have SO much to learn, but it’s really super awesome-sauce wonderful." / Twitter
- shawnp0wers
- techno-tim/littlelink-server: A lightweight, open source, and self-hosted alternative to linktree in a Docker container! — LittleLink-Server is based on the great work from littlelink, a lightweight DIY alternative to services like Linktree and many.link. LittleLink and LittleLink-Server is built using Skeleton, a dead simple, responsive boilerplate—we just stripped out some additional code you wouldn't need and added in branded styles for popular services. 😊
- Git-based CMS for Hugo, Next.js, Gatsby, Jekyll, Nuxt.js, Hexo, Eleventy, Docusaurus, Gridsome and more. | Forestry.io — Give your editors the power of Git. Create, edit, and instant preview Markdown-based sites.

09/24/22 • 36 min
Doc Searls and Katherine Druckman talk about Hachette v. Internet Archive, a lawsuit targeting the Internet Archive that aims to prevent them from lending ebooks.
Site/Blog/Newsletter
FaceBook
Twitter
Mastodon
Links:
- Hachette v. Internet Archive | Electronic Frontier Foundation — The Electronic Frontier Foundation (EFF), with co-counsel Durie Tangri, is defending the Internet Archive against a lawsuit that threatens its Controlled Digital Lending (CDL) program.
- What Does the Blockbuster Antitrust Trial Against Penguin Random House Mean for the Future of Libraries? - Internet Archive Blogs — The publishing industry is large and powerful—by some accounts, it generates nearly $100 billion in revenue worldwide. The United States Department of Justice has accused big publishers of abusing that power in the past, by conspiring with each other to raise the price of e-books. More recently, Penguin Random House has been in the legal crosshairs for an alleged abuse of power, as the Justice Department sues to stop its proposed (and allegedly anticompetitive) acquisition of Simon & Schuster.
- Internet Archive Opposes Publishers in Federal Lawsuit - Internet Archive Blogs — On Friday, September 2, we filed a brief in opposition to the four publishers that sued Internet Archive in June 2020: Hachette Book Group, Harper Collins Publishers, John Wiley & Sons, and Penguin Random House. This is the second of three briefs from us that will help the Court decide the case.
- The Future of Online Lending: A Discussion of Controlled Digital Lending and Hachette with the Internet Archive | Berkman Klein Center — The Internet Archive offers Controlled Digital Lending (CDL), where it lends digital copies of books to patrons — but ensures that the number of books owned is equal to the number loaned. Through the Open Library, the Internet Archive aims to “make all the published works of humankind available to everyone in the world.”
- Mike Masnick on Twitter: "Shit. I *wish* the vaccine came with 5G internet access..." / Twitter

Episode 129: Communication Breakdown
Reality 2.0
10/15/22 • 42 min
Doc Searls, Katherine Druckman, and Shawn Powers talk communication breakdown in social media, its impact on our culture, and what technical solutions may exist.
Site/Blog/Newsletter
FaceBook
Twitter
Mastodon
Special Guest: Shawn Powers.
Links:
- Why the Past 10 Years of American Life Have Been Uniquely Stupid - The Atlantic — What would it have been like to live in Babel in the days after its destruction? In the Book of Genesis, we are told that the descendants of Noah built a great city in the land of Shinar. They built a tower “with its top in the heavens” to “make a name” for themselves. God was offended by the hubris of humanity and said: Look, they are one people, and they have all one language; and this is only the beginning of what they will do; nothing that they propose to do will now be impossible for them. Come, let us go down, and confuse their language there, so that they will not understand one another’s speech. The text does not say that God destroyed the tower, but in many popular renderings of the story he does, so let’s hold that dramatic image in our minds: people wandering amid the ruins, unable to communicate, condemned to mutual incomprehension.
- Democracy in the Next Cycle of History | Jonathan Haidt - YouTube — Jonathan Haidt sees that we have entered a social-psychological phase change that was initiated in 02009 when social media platforms introduced several fateful innovations that changed the course of our society and disintegrated our consensus on reality. In this conversation with Long Now co-founders Stewart Brand and Kevin Kelly, Haidt presses on questions of technological optimism, morality vs ethics, teen mental health, possible platform tweaks that could reduce the damage and just how long this next cycle of history could last. Prompted by Haidt's piece on Why The Past 10 Years of American Life Have Been Uniquely Stupid, this discussion offers a behind the scenes look at the thinking going into Haidt's next book; release slated for the fall of 02023.
Show more best episodes

Show more best episodes
FAQ
How many episodes does Reality 2.0 have?
Reality 2.0 currently has 156 episodes available.
What topics does Reality 2.0 cover?
The podcast is about Open Source, Security, Infosec, Podcasts, Technology, Privacy, Linux and Cybersecurity.
What is the most popular episode on Reality 2.0?
The episode title 'Episode 156: AI: The New Tool for Individual Empowerment?' is the most popular.
What is the average episode length on Reality 2.0?
The average episode length on Reality 2.0 is 53 minutes.
How often are episodes of Reality 2.0 released?
Episodes of Reality 2.0 are typically released every 7 days.
When was the first episode of Reality 2.0?
The first episode of Reality 2.0 was released on Oct 4, 2018.
Show more FAQ

Show more FAQ