AI Safety & Ethics

Security, alignment, and responsible AI

30 episodes

Carving Bits in Stone: The Power of WORM Technology

In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.

worm-technologydata-immutabilitydigital-forensics

Beyond the Password: The Rise of Invisible Security

Tired of 2FA codes? Herman and Corn explore how passkeys and behavioral biometrics are creating a future of "invisible" security.

passkey-authenticationbehavioral-biometricspasswordless-security

The Death of Seeing is Believing: Deepfakes in 2026

As deepfakes become indistinguishable from reality, Herman and Corn explore the tools and shifts in trust required to navigate a post-truth world.

deepfake-detectiondigital-trustepistemic-nihilism

Hardware Trust: How C2PA is Saving Digital Reality

Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.

c2pa-standardcontent-authenticity-initiativehardware-provenance

The Chain of Custody: Proving Reality in a Post-Truth Era

In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.

digital-forensicschain-of-custodycryptographic-hashing

AI as a Shield: The High Stakes of Digital Obfuscation

Discover how synthetic personas and AI voice synthesis are becoming the ultimate tools for whistleblowers to stay anonymous and safe.

synthetic-personaswhistleblower-anonymityai-obfuscation

The Bill is Due: AI Training and Intellectual Property

Can you "untrain" an AI? Herman and Corn explore the legal and technical battle over copyrighted data and the future of machine unlearning.

ai-copyright-lawmachine-unlearningdata-provenance

The Digital Shadow: Uncovering the Power of Metadata

Every file has a digital shadow. Discover how metadata tracks your life, from ancient libraries to modern AI surveillance.

metadata-analysisdigital-privacydata-governance

The Future of Privacy: Quantum Threats and Backdoors

Explore the shift to post-quantum encryption and why intelligence agencies rarely need to "break" the math to access your private data.

post-quantum-cryptographyharvest-now-decrypt-laterlattice-based-math

The Sycophancy Trap: Getting Honest Feedback from AI

Is your AI just telling you what you want to hear? Learn how to break the "sycophancy trap" and get truly objective feedback from your agents.

ai-sycophancyrhlf-biasmulti-agent-herding

The Death of Call Recording: Why Your Phone is Hiding It

Ever wonder why your phone won’t let you record calls anymore? We dive into the legal and technical shift killing this essential feature.

call-recording-lawsandroid-accessibility-apiprivacy-compliance

Your Life for Sale: Navigating the Data Broker Economy

Discover how a $430 billion industry tracks your every move and learn the steps you can take to reclaim your digital privacy in 2026.

data-broker-industryreal-time-biddingdigital-privacy

The Authenticity Crisis: Proving You’re Real in 2046

In a world of perfect deepfakes, how do we prove what is real? Explore the future of content provenance and the "Proof of Personhood" problem.

content-provenanceproof-of-personhoodcontrolled-capture

The Invisible ID: The Rise of Digital Fingerprinting

Think you’re anonymous? Your browser’s unique traits say otherwise. Explore how digital fingerprinting is making privacy nearly impossible.

digital fingerprintingonline privacytrackingbrowser fingerprintingprivacy sandbox

Hidden in Plain Sight: The Secrets of Steganography

Explore the invisible world of steganography, from secret printer dots to AI watermarking and digital dead drops hidden in plain sight.

steganographyhidden messagesinvisible inkprinter dotsai watermarking

The Agentic AI Dilemma: Who Holds the Kill Switch?

As AI shifts from chatbots to autonomous agents, Herman and Corn explore how to maintain human control in a high-stakes automated world.

agentic aiai safetyhuman oversightautomation biaskill switch

The Price of Politeness: Should AI Guardrails Stay?

Herman and Corn debate the hidden costs of AI safety layers and what happens when we strip away the "corporate HR" personality of LLMs.

large-language-modelslocal-aifine-tuning

Echoes in the Machine: When AI Talks to Itself

What happens when two AIs talk forever with no human input? Herman and Corn explore the weird world of digital feedback loops.

artificial intelligencemodel collapsesemantic bleachingai conversationsdigital feedback loops

AI's Hidden Cultural Code: East vs. West

Do AIs think differently East vs. West? Uncover the hidden cultural code embedded in large language models.

large-language-modelscultural-biasfine-tuning

Dark Web Deception: Google's Monitoring Shift

Google's "dark web monitoring" isn't what you think. We reveal the hidden corners of the internet and Google's true capabilities.

dark webGooglemonitoringdeep webinternet security

The Looming Digital Ice Age: AI Eating Itself?

Is AI eating itself? Explore the "model collapse" and the "Hapsburg AI problem" before our digital world speaks only gibberish.

model collapseai safetydigital ice agehapsburg ai problemai training data

Security vs. Usability: A Balancing Act

Security vs. usability: a tightrope walk. Discover practical strategies to protect casual users without sacrificing ease.

Securityusabilitysecurity vs usabilitypasswordless authenticationuser education

The Hidden Watermarks in Your AI: Privacy or Protection?

Invisible watermarks in AI? Is it privacy or protection? We uncover the hidden truth behind AI-generated content.

watermarksPrivacysynthiddeepfakesconsent

AI Gone Rogue: Inside the First Autonomous Cyberattack

AI gone rogue. The first autonomous cyberattack by Claude against US targets changes everything we know about AI safety.

cyberattackautonomous ainational securityai safetyclaude

AI Cyberattacks Are Doubling Every 6 Months—Here's Why

AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.

ai cyberattackscybersecuritythreat actorsanthropicai espionage

AI Guardrails: Fences, Failures, & Free Speech

AI guardrails: Fences, failures, and free speech. Can we control AI's infinite output, or do digital fences always break?

ai guardrailsai safetyai alignmentjailbreakingfree speech

AI's Wild West: Battling Injection & Poisoning

AI's Wild West: Battling prompt injection and poisoning. Discover how AI threats are shifting from sci-fi to insidious attacks on the models...

ai securityprompt injectionprompt poisoningmodel context protocolcyberattacks

AI's Blind Spot: Data, Bias & Common Crawl

Uncover the unseen influences shaping AI. We dive deep into training data, bias, and Common Crawl.

large-language-modelsdata-integritytraining-data

On Deepfakes, SynthID, And AI Watermarking

Deepfakes, SynthID, and AI watermarking. Could your AI creations be traced back to you?

Privacydeepfake-detectionai-watermarking

Is Your AI Secretly American?

Ever wonder if your AI is secretly American? We're unpacking the invisible, US-centric worldview embedded in leading Western AI models.

cultural-biastraining-datafine-tuning