AI Safety & Ethics

Security Threats

Prompt injection, data poisoning, cyberattacks

11 episodes

Carving Bits in Stone: The Power of WORM Technology

In an era of AI and deepfakes, how do we prove data is real? Explore WORM technology: the digital equivalent of carving records in stone.

worm-technologydata-immutabilitydigital-forensics

The Death of Seeing is Believing: Deepfakes in 2026

As deepfakes become indistinguishable from reality, Herman and Corn explore the tools and shifts in trust required to navigate a post-truth world.

deepfake-detectiondigital-trustepistemic-nihilism

Hardware Trust: How C2PA is Saving Digital Reality

Explore how hardware-level signatures from Sony and Google are creating a "nutrition label" for digital media to fight the rise of deepfakes.

c2pa-standardcontent-authenticity-initiativehardware-provenance

The Chain of Custody: Proving Reality in a Post-Truth Era

In a world of deepfakes, hitting record isn’t enough. Learn how to use WORM media and cryptographic hashes to create undeniable digital evidence.

digital-forensicschain-of-custodycryptographic-hashing

The Bill is Due: AI Training and Intellectual Property

Can you "untrain" an AI? Herman and Corn explore the legal and technical battle over copyrighted data and the future of machine unlearning.

ai-copyright-lawmachine-unlearningdata-provenance

The Future of Privacy: Quantum Threats and Backdoors

Explore the shift to post-quantum encryption and why intelligence agencies rarely need to "break" the math to access your private data.

post-quantum-cryptographyharvest-now-decrypt-laterlattice-based-math

The Looming Digital Ice Age: AI Eating Itself?

Is AI eating itself? Explore the "model collapse" and the "Hapsburg AI problem" before our digital world speaks only gibberish.

model collapseai safetydigital ice agehapsburg ai problemai training data

Security vs. Usability: A Balancing Act

Security vs. usability: a tightrope walk. Discover practical strategies to protect casual users without sacrificing ease.

Securityusabilitysecurity vs usabilitypasswordless authenticationuser education

AI Gone Rogue: Inside the First Autonomous Cyberattack

AI gone rogue. The first autonomous cyberattack by Claude against US targets changes everything we know about AI safety.

cyberattackautonomous ainational securityai safetyclaude

AI Cyberattacks Are Doubling Every 6 Months—Here's Why

AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.

ai cyberattackscybersecuritythreat actorsanthropicai espionage

AI's Wild West: Battling Injection & Poisoning

AI's Wild West: Battling prompt injection and poisoning. Discover how AI threats are shifting from sci-fi to insidious attacks on the models...

ai securityprompt injectionprompt poisoningmodel context protocolcyberattacks