
004 - The Psychology of Social Engineering
11/06/23 • 20 min
Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on November 06, 2023
This week's episode:
1. I'm back!
2. Traveling to London and Los Angeles
3. A major privacy invasion for Jennifer Lawrence
4. The Psychology of social engineering
Intro music: The Lockdown
"To be yourself in a world that is constantly trying to make you something else is the greatest accomplishment." - Ralph Waldo Emerson
Welcome to episode four of The Lockdown - The Practical Privacy and Security podcast.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on November 06, 2023
This week's episode:
1. I'm back!
2. Traveling to London and Los Angeles
3. A major privacy invasion for Jennifer Lawrence
4. The Psychology of social engineering
Intro music: The Lockdown
"To be yourself in a world that is constantly trying to make you something else is the greatest accomplishment." - Ralph Waldo Emerson
Previous Episode

003 - The Invisible Net, and Why I use GrapheneOS
Welcome to episode three of The Lockdown - The Practical Privacy and Security podcast.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on April 09, 2023
This week's episode:
1. The case of Zachary McCoy
2. Why do all this?
3. The Apple Ecosystem
4. My experience with GrapheneOS
Get GrapheneOS: https://grapheneos.org/
The case of Zachary McCoy:
https://www.theguardian.com/us-news/2021/sep/16/geofence-warrants-reverse-search-warrants-police-google
Tracking Phones, Google Is a Dragnet for the Police:
https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html
Denmark frees 32 inmates over flaws in phone geo-location evidence:
https://www.theguardian.com/world/2019/sep/12/denmark-frees-32-inmates-over-flawed-geolocation-revelations
Intro music: The Lockdown
"The rights of one are as sacred as the rights of a million." - Eugene V. Debs
Next Episode

ZERO TRUST | FRIDAY FIELD NOTES
In this week’s FRIDAY FIELD NOTES, Ray Heffer discusses the Zero Trust security model, a framework that's revolutionizing how organizations protect their critical systems and data. Diving into the depths of cybersecurity, we clear up common myths and misinterpretations surrounding Zero Trust, illuminating its role as not just a defensive strategy but a comprehensive approach to modern threats.
Zero Trust operates on the principle of "never trust, always verify," but what does this mean in practice? Zero Trust doesn't just look outward; it recognizes that threats also come from the inside. By assuming that a breach is not just possible, but has already happened, Zero Trust strategies are uniquely positioned to mitigate damage by insiders, whether malicious or accidental.
Follow on Twitter (X): @privacypod
Support the show: https://www.patreon.com/TheLockdown
This episode was recorded on November 09, 2023
This week's episode:
- Introduction and Brill is living in a Faraday cage
- How we got to Zero Trust by understadning the Cyber Kill Chain
- The Principals of Zero Trust
- Recommended Zero Trust Frameworks
NIST Zero Trust Architecture (SP 800-207): https://csrc.nist.gov/pubs/sp/800/207/final
CISA Zero Trust Maturity Model: https://www.cisa.gov/zero-trust-maturity-model
Cyber Kill Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Intro music: The Lockdown
"Security is always seen as too much until the day it is not enough." — William H. Webster
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/the-lockdown-practical-privacy-and-security-265598/004-the-psychology-of-social-engineering-36223119"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to 004 - the psychology of social engineering on goodpods" style="width: 225px" /> </a>
Copy