{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/665039d6f749480012b06ac1/6921394039f2ac6a4f8da1b7?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Why This Security Expert Doesn't Use a Phone (Buskill Interview)","description":"<p>Even with encryption and 2FA, if someone steals your logged-in laptop, you're compromised. Michael Altfield created Buskill - an open source USB \"dead man switch\" - to solve this analog attack vector. In this interview, you’ll hear about the real incidents that inspired it, the advocacy work that fueled it, and the collaborative engineering efforts that turned it into a practical tool for protecting sensitive data.</p><p><br></p><p>📱 RESOURCES IN VIDEO:</p><p>• https://tech.michaelaltfield.net/</p><p>• https://buskill.in/</p><p>• https://github.com/BusKill</p><p><br></p><p>Timestamps:</p><p>00:00:00 INTRO</p><p>00:01:43 WHAT GOT YOU INTO SECURITY?</p><p>00:02:32 WHEN DID YOU GET INTO SECURITY?</p><p>00:03:31 WHAT IS A DEAD MAN SWITCH?</p><p>00:04:33 WHY DID YOU DEVELOP BUSKILL?</p><p>00:06:25 WHEN DID YOU START MAKING BUSKILL CABLES?</p><p>00:06:42 HAS THE PRODUCT CHANGED SINCE THEN?</p><p>00:07:42 WHO ELSE IS BUSKILL FOR?</p><p>00:09:08 WHAT OPTIONS CAN BE TRIGGERED?</p><p>00:10:53 IS IT POSSIBLE TO TRIGGER A FALSE OR ALTERNATIVE ENVIRONMENT?</p><p>00:12:16 CAN YOU WIPE ON WINDOWS OR MACOS?</p><p>00:13:40 LINUX INSTALL OPTIONS</p><p>00:14:16 MACOS &amp; WINDOWS INSTALL OPTIONS</p><p>00:14:25 CAN THIS BE DONE ON MOBILE?</p><p>00:16:39 REAL-WORLD BUSKILL EXAMPLES</p><p>00:18:13 BUSKILL COMMUNITY</p><p>00:19:17 BUSKILL + OPEN SOURCE</p><p>00:19:44 STL FILES + 3D PRINTING</p><p>00:20:38 IS IT GOOD TO CREATE IT YOURSELF?</p><p>00:20:50 INTERDICTION</p><p>00:21:42 EDWARD SNOWDEN ON INTERDICTION</p><p>00:23:24 OTHER ACQUISITION METHODS</p><p>00:25:13 NOVACUSTOM PARTNERSHIP</p><p>00:26:00 BUSKILL + NICHE LINUX DISTROS</p><p>00:26:57 QUBES DOM0</p><p>00:28:27 UBUNTU &amp; TAILS</p><p>00:30:02 DOES BUSKILL SUPPORT CHROMEBOOKS?</p><p>00:31:19 GETTING INVOLVED IN PRIVACY + ADVOCACY</p><p>00:33:05 HOW PRIVACY IS VIEWED WORLDWIDE</p><p>00:36:55 PERSONAL CHALLENGES WITH PRIVACY</p><p>00:39:11 GO-TO PRIVACY &amp; SECURITY TIPS</p><p>00:40:11 BUSKILL + SECURITY KEYS?</p><p>00:43:06 SECURITY THROUGH OBSCURITY</p><p>00:45:25 CLOUD-BASED PASSWORD MANAGERS</p><p>00:46:09 LIVING WITHOUT A PHONE</p><p>00:51:57 CAN IT GET WORSE?</p><p>00:53:18 PROPRIETARY BROADBAND</p><p>00:58:49 WHAT DO YOU LIKE ABOUT NOVACUSTOM?</p><p>01:00:56 OUTRO</p><p>—</p><p>Keep Techlore Independent:</p><p>• Patreon: https://www.patreon.com/techlore</p><p>• YouTube Memberships: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg/join</p><p>• All Support Methods: https://techlore.tech/support</p>","author_name":"Techlore"}