Firewalls & Security
OPNsense, VPNs, stateful inspection, encryption
12 episodes
The Geometry of Secrets: How SSH Keys Protect the Web
Ever wonder why your SSH keys are so secure? Herman and Corn dive into the "trapdoor" math and elliptic curves powering the modern web.
Beyond the Squiggly Line: How Digital Signatures Work
Think a digital signature is just a picture of your name? Think again. Herman and Corn dive into the math and hardware behind secure PDFs.
The Telemetry Trap: Why Your Devices Won't Stop Talking
Herman and Corn dive into the hidden world of telemetry, exploring why our devices phone home and whether "anonymous" data is actually a myth.
Goodbye 2FA: Why Passkeys are the Future of Security
Tired of hunting for 2FA codes? Herman and Corn explore how passkeys are killing the password and making the internet faster and more secure.
Digital Fingerprints: The Secret Math Saving Your Data
Learn why those random strings of characters on download pages are the only thing keeping your files safe from corruption and hackers.
The Invisible Roads: Can BGP Hijacking Break Encryption?
Explore how BGP hijacking allows governments to reroute the web, threatening privacy and exposing metadata despite encrypted apps like Signal.
Beyond HTTPS: Securing Your Digital Shadow with Private DNS
Think HTTPS protects everything? Think again. Learn how Private DNS hides your browsing habits from ISPs and advertisers in this deep dive.
The Secret Language of Security: CVEs and CrowdSec
Discover the hidden plumbing of the internet, from the global CVE catalog to how tools like CrowdSec create a digital neighborhood watch.
The Open Door: How Fast Can Hackers Find Your Server?
Think your new server is safe? Think again. Herman and Corn discuss why an unprotected server can be found and hacked in under 60 seconds.
The Invisible War: Inside the World of State-Sponsored APTs
They don't just hack; they move in. Discover how state-sponsored APTs stay hidden in networks for years and the signatures they leave behind.
VPNs: Privacy Myth vs. Reality
VPNs: privacy savior or marketing hype? We expose the truth behind the grand claims and technical realities.
Secure Messaging: Beyond the Buzzwords
Is your secure messaging truly private? We expose the hidden truths behind E2EE, cloud backups, and corporate ownership.