
Firewalls Don't Stop Dragons Podcast Zero-Knowledge Proofs
Jan 26, 2026
They explore zero-knowledge proofs and playful analogies that show how you can prove knowledge without revealing secrets. Coverage includes age-verification risks and privacy-friendly ways to confirm identity. The show also highlights malware hidden in images, data-stealing browser extensions, mass location leaks from ad bidding, and law enforcement redaction failures exposing surveillance logs.
AI Snips
Chapters
Transcript
Episode notes
Extensions Can Smuggle Malware Via Images
- Browser extensions are effectively apps with broad permissions and can be malware vectors.
- Malicious campaigns hid loaders in PNG images to bypass static code checks.
Limit And Audit Browser Extensions
- Treat browser extensions like apps and limit installs and permissions.
- Disable rarely used extensions and remove suspicious ones immediately.
RTB Leaks Location Data Widely
- Real-time bidding exposes detailed location data across many apps without developers' knowledge.
- Ad-auction participation lets brokers harvest device coordinates at scale.
