

Privacy Please
A Problem Lounge Show
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand.In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect their privacy.Please subscribe and help us reach more people! This podcast is part of The Problem Lounge network — conversations about the problems shaping our world, from digital privacy to everyday life.
Episodes
Mentioned books

Nov 7, 2025 • 8min
S6, E259 - Patch Tool Turns Predator
Send us Fan MailIn this episode of Privacy Please, host Cameron Ivey discusses significant security threats, including a critical vulnerability in Microsoft's WSUS, a major data breach at the University of Pennsylvania, and the emergence of sophisticated malware known as Glassworm. The conversation highlights the importance of cybersecurity measures and the potential consequences of negligence in IT security.Support the show

Oct 23, 2025 • 13min
S6, E258 - The Synthetic Star: The AI Influencer Earning More Than You
Send us Fan MailShe has millions of followers, lands six-figure brand deals, and lives a life of curated perfection. The only catch? She isn't real. She was entirely created by artificial intelligence.Welcome to the unsettling world of synthetic influencers.In this compelling episode of Privacy Please, we dive deep into the booming industry of AI-generated online personalities. Discover:The Technology: How advanced AI image generators, 3D modeling, and Large Language Models combine to create hyper-realistic avatars and their compelling "personalities."The Business Case: Why major brands and marketing agencies are investing millions in digital beings that offer total control, scalability, and no risk of scandal.The Privacy & Ethical Dilemmas: We explore the "uncanny valley" of trust, the impact of deception by design, the new extremes of unrealistic beauty standards, and the potential for these AI personas to be used for sophisticated scams or propaganda.The Future of Authenticity: What does the rise of the synthetic star mean for human creativity, genuine connection, and the very definition of "real" in our digital world?It's a future that's already here, shaping what we see, what we buy, and even what we believe.Key Topics Covered:What are virtual/synthetic influencers?Examples: Lil Miquela, Aitana Lopez, Shudu GramAI technologies used: image generation, 3D modeling, LLMsReasons for their rise: control, cost, scalability, data collectionEthical concerns: deception, parasocial relationships with AIImpacts: unrealistic standards, displacement of human creators, potential for malicious use (scams, propaganda)Debate around regulation and disclosure for AI-generated contentThe future of authenticity and trust onlineConnect with Privacy Please:Website: theproblemlounge.comYouTube: https://www.youtube.com/@privacypleasepodcastSocial Media:LinkedIn: https://www.linkedin.com/company/problem-lounge-networkResources & Further Reading (Sources Used / Suggested):Federal Trade Commission (FTC):Guidelines on disclosure for influencers (relevant for future AI disclosure discussions)Academic Research:Studies on parasocial relationships with media figures (can be applied to AI)Research on the ethics of AI and synthetic media.Industry Insights:Reports from marketing agencies on virtual influencer trendsArticles from tech publications (e.g., Wired, The Verge, MIT Tech Review) covering Lil Miquela and similar figures.Support the show

Oct 3, 2025 • 30min
S6, E257 - How Apple’s New Chip Rewrites Mobile Security
Send us Fan MailWe unpack how Apple’s Memory Integrity Enforcement changes the rules of mobile security by rebuilding memory architecture, not just adding guardrails. We weigh who should upgrade now, what this means for Android, and why people remain the biggest risk.• memory corruption explained with apartment analogy• why NOP sleds and heap sprays fail under MIE• tags, type segregation, and synchronous checks at runtime• market-share vs design: Apple, Windows, Android trade-offs• Pegasus, zero-click exploits, and threat profiles• game hacking parallels: reading vs corrupting memory• should you upgrade: high-risk users vs everyday users• why architecture-level security beats bolt-on toolsSupport the show

Sep 26, 2025 • 18min
S6, E256 - The Invisible Trade: How Data Brokers Profit from Your Life
Send us Fan MailYou click "agree," you swipe a loyalty card, you browse online – every digital breadcrumb you leave is being collected, but not just by the apps and websites you use. Welcome to the world of data brokers, a multi-billion-dollar, hidden industry that aggregates, analyzes, and profits from your most intimate personal information.In this special episode from Privacy Please, we pull back the curtain on this shadowy ecosystem. Discover:What a data broker is and how they differ from typical tech companies.Where they get your data – from public records and online activity to your shopping habits and app usage.Who they sell your data to – marketers, financial institutions, insurers, political campaigns, and even law enforcement.The alarming real-world impacts, from hyper-targeted ads and scams to potential discrimination and exploitation.This industry operates with minimal regulation in the United States, leaving most consumers vulnerable.Actionable steps you can take right now to reclaim some control over your personal information, including data removal requests and essential digital hygiene.It's an invisible trade happening without your consent, and you are the product. Listen now to understand the true price of your digital life.Key Topics Covered:What are data brokers?Sources of personal data collectionTypes of data collected (demographics, health, financial, behavioral)Who buys data broker profiles?Impacts: targeted ads, scams, discrimination, political targetingLack of federal regulation in the U.S.Consumer rights (e.g., CCPA)Steps to protect your privacy from data brokersData removal servicesDigital hygiene best practicesConnect with Privacy Please:Website: https://theproblemlounge.com/YouTube: https://www.youtube.com/@privacypleasepodcast7446Social Media:LinkedIn: https://www.linkedin.com/company/problem-lounge-networkResources & Further Reading (Sources Used):Federal Trade Commission (FTC):Data Brokers: A Call for Transparency and Accountability (FTC Report, 2014) FTC consumer advice on data brokers and privacyConsumer Reports:Articles and investigations into data brokers and data removal servicesElectronic Frontier Foundation (EFF):Privacy resources, including "Surveillance Capitalism" explanationsCalifornia Consumer Privacy Act (CCPA):Official information on consumer rights in CaliforniaIdentity Theft Resource Center (ITRC):Information on scams and data exposureAcxiom, Oracle, Epsilon, Experian, etc.Support the show

Sep 15, 2025 • 48min
S6, E255 - Privacy, Law, and Emerging Tech: A Conversation with Sonia Siddiqui
Send us Fan MailPrivacy and cybersecurity leader Sonia Siddiqui joins us to explore the collision between emerging technologies and privacy regulations, offering insights on how companies can navigate this complex landscape while building trust.• Sonia's journey from aspiring architect to privacy expert, motivated by the intersection of civil rights and privacy• The growing gap between rapid technological innovation and slower-moving regulatory frameworks• Examining real-world tensions like WorldCoin's iris scanning under GDPR's biometric data provisions• Why privacy should be a core business enabler rather than just a compliance checkbox• The importance of implementing privacy by design as a living process that evolves with technology• Why principles-based regulation allows for better adaptation to new technologies than prescriptive rules• The inseparable relationship between privacy and security in building customer trust• How privacy professionals can stay current through professional networks, podcasts, and continuous learning• Essential privacy resources including "The Unwanted Gaze" and "Dieterman's Field Guide to Privacy"Find Sonia and her privacy consulting practice at tamarack.solutions or connect with her at the upcoming AI conference in Boston.Support the show

Sep 5, 2025 • 4min
S6, E254 - The Tea App Breach: When Safe Spaces Turn Dangerous
Send us Fan MailThe digital world can be treacherous, especially when you're looking for a safe space to share your most vulnerable thoughts. Today's story about the Tea app breach will make you rethink every "anonymous" platform you've ever trusted.Tea promised women complete anonymity, a digital sanctuary where they could share dating horror stories, relationship struggles, and deeply personal confessions too raw for other platforms. Thousands believed this promise, uploading personal photos and sharing intimate details of their lives. Then security researchers made a chilling discovery: Tea's entire database sat completely unprotected on the internet. No password required. The numbers are staggering: 72,000 private images including selfies and IDs, plus 1.1 million direct messages containing confessions about abortion, sexual assault, infidelity, and more, all exposed. But the story takes an even darker turn when someone created "T-Spill," weaponizing this stolen data by turning private photos into ranking games and mapping personal information to real locations. This wasn't just a technical failure; it was a profound betrayal that turned a supposed sanctuary into what can only be described as a predator's playground.As the FBI investigates and lawsuits mount, we're left with uncomfortable questions about digital trust. How do we balance our need for connection with the reality that our most vulnerable moments are only as protected as the people building these platforms? The next time an app promises total privacy, remember Tea and maybe wait to see how they handle their first crisis before sharing your deepest secrets. Subscribe to Privacy Plays for more deep dives into breaches that expose the very human cost of our connected world, and check out our expanded content on the Problem Lounge Network.Support the show

Aug 28, 2025 • 14min
S6, E253 - Have a Seat in the Metaverse: The Chris Hansen vs. Roblox Investigation
Send us Fan MailFor decades, Chris Hansen’s iconic catchphrase, "Why don't you have a seat?" was the prelude to exposing predators in the real world. Now, his hunt has moved into the metaverse. His target is Roblox, the global gaming platform used by over 70 million people daily, most of whom are children. Hansen and his team allege the platform is a "cesspool" and a "hunting ground" for criminals, while Roblox maintains its safety systems are robust.In this special report, "Privacy Please" goes beyond the headlines to investigate the clash. We explore the platform's design, from the "Avatar Loophole" that allows bad actors to bypass chat filters to the recommendation algorithm that can lead young users down dangerous paths. Is this a simple case of a company needing to moderate more, or is the very business model that made Roblox a multi-billion dollar success also its greatest safety vulnerability?Credited Resources & Further ReadingPrimary Sources & Reporting:Takedown Across America with Chris Hansen: Official platform for Hansen's ongoing investigations and reporting.Roblox Corporate Statements & Community Standards: Official statements and policies from Roblox regarding their safety and moderation efforts.WIRED/Bloomberg Reporting: Recent articles from major tech publications that have investigated platform safety issues on Roblox and similar metaverse platforms.Common Sense Media: A non-profit organization that provides independent reviews and ratings for media and technology, often analyzing the safety features of platforms like Roblox.(Note: As this is an ongoing investigation, it's recommended to reference the most current news articles and official press releases from the time of recording for the most up-to-date information.)Support the show

Aug 20, 2025 • 41min
S6, E252 - Who Really Owns Your Digital Self?
Send us Fan MailDigital privacy is under siege from all sides, and we're bringing you the latest developments along with a major announcement about our growing privacy-focused network. This week has seen a flood of significant data breaches across critical sectors. Air France-KLM and Workday experienced major incidents, with the latter connected to a broader campaign targeting Salesforce CRM systems. These breaches highlight the vulnerability of systems storing vast amounts of customer data and raise serious questions about the security of our critical infrastructure. As we discuss these events, we examine the ripple effects they create and what organizations should be doing differently.The question of who truly owns your digital identity emerges as a central theme in our conversation. Most people don't realize that when using third-party authentication providers like Google or Facebook, they're surrendering control of their identity. Every "Login with Facebook" click allows these companies to track when and where that identity is used across the digital landscape. We explore self-sovereign identity as an alternative approach, where individuals control their own verification infrastructure rather than relying on tech giants.We also tackle the paradox at the heart of data minimization efforts. For years, companies have been told that "data is the new oil" or "currency," yet are now expected to minimize collection. This contradiction makes implementing privacy principles challenging. As we put it: "You told me I'm sitting on gold, and now you want me to minimize it?"Beyond these discussions, we share exciting news about our expansion into a network featuring three distinct shows. In addition to Privacy Please, we're launching "Problem Lounge," exploring the messiness of being human in our technology-driven world, and "Decoded," a technical deep-dive with privacy engineer Jake that will explore privacy-enhancing technologies, cookie audits, and the intersection of privacy and AI.Visit our new website at theproblemlounge.com to learn more about our expanding network and how you can become part of the conversation around privacy in the digital age.Support the show

Aug 14, 2025 • 6min
S6, E251 - Digital Fallout: The Keepers of Your Secrets
Send us Fan MailIt starts with a strange letter in the mail. A car loan you never applied for. A credit card you don't own. A digital ghost is quietly living your life, and you have no idea how it got the keys. When you turn to one of the silent guardians of your financial identity for help, you find only chaos, confusion, and a company that seems to be a danger to itself.This week on Digital Fallout, we tell the true story of one of history's most catastrophic data breaches. It's a tale of staggering corporate negligence, a botched public response that became a dark comedy, and a 76-day silent heist where the identities of 147 million people were stolen.What happens when the keepers of our most valuable secrets simply forget to lock the door?Show Notes: SourcesThis story was pieced together from numerous public records, government reports, and in-depth investigative journalism. For those who want to learn more about the 2017 Equifax breach, these are the key sources we consulted:The official report from the U.S. Government Accountability Office (GAO) titled "Data Protection: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach," which provides a definitive timeline and analysis of the failures.Federal Trade Commission (FTC) public statements and court filings related to the landmark global settlement with Equifax.In-depth reporting from security journalist Brian Krebs (KrebsOnSecurity), who meticulously covered the botched response, including the fake phishing sites promoted by Equifax's own Twitter account.Technical explainers from outlets like WIRED magazine that broke down the Apache Struts vulnerability and how it was exploited.Ongoing coverage of the corporate and financial fallout from The New York Times and The Wall Street Journal during September and October 2017.The public testimony of former Equifax CEO Richard Smith before the U.S. House Committee on Energy and Commerce, where many of the internal failures were brought to light.Support the show

Aug 2, 2025 • 9min
S6, E250 - Digital Fallout: The Day the World Stood Still
Send us Fan MailIt started with a few flickering screens in a Danish office. Within minutes, a digital plague had paralyzed global trade, leaving the world's largest shipping company powerless and its massive vessels adrift. But this attack wasn't for ransom—it was for pure destruction. In the premiere of Digital Fallout, we uncover the story of a geopolitical cyber weapon that escaped its cage and the unbelievable, accidental miracle that saved a global empire from permanent deletion. This is the story of how our physical world hangs by a fragile digital thread.Show Notes: SourcesOur story today was built on the foundation of incredible investigative journalism from reporters who covered this event extensively. For listeners who want to dive deeper into the story of the NotPetya attack, these are the primary sources we recommend:"The Untold Story of NotPetya, the Most Devastating Cyberattack in History," an article by Andy Greenberg for WIRED magazine, forms the core of the public narrative regarding Maersk's experience.The book "Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers" by Andy Greenberg provides deep context on the attackers and the geopolitical landscape.Financial and logistical impact reporting from The New York Times, The Wall Street Journal, and Reuters was published in the weeks and months following the June 2017 attack.Public statements and quarterly financial reports from A.P. Møller-Maersk detailing the incident's operational and financial costs.Support the show


