Know a Little More
About SIM Swaps
You may have heard that using text messages as a second factor or 2FA code to protect your logins is less secure than other forms like apps or keys. You may even know this is because of something called SIM Swapping. Are there any legitimate uses/functions to swapping/cloning?
Featuring Tom Merritt.
Full episode transcript here.
View all episodes
4. About Word Processors21:30The word processor never got "invented" as such, it just slowly developed out of things like typewriters and even slowly merged from electronic appliances into software. To understand the origin of the word processor you and I would recognize, the one with bold, italic, underline, we need to follow the journey of future space tourist Charles Simonyi.Featuring Tom Merritt.Episode transcript available here.
3. About the Computer Mouse18:56You all know what a mouse is. It’s so common, that you probably don't even think that much about why it's called a mouse. But back in 1968, the man generally credited with the invention of the mouse, Douglas Engelbart, had to apologize for what was certainly a silly name.Featuring Tom Merritt.Full episode transcript here.
2. About Hypertext14:02You may have used them hundreds of times today, but the origin of hypertexts dates all the way back to at least 1963.Featuring Tom Merritt.Full episode transcript here.
1. About the Mother of All Demos16:28In a single 90 minute presentation, Douglas Englebart showcased technologies that would eventually find their way into nearly every computer you've ever used. And he did it in 1968.Featuring Tom Merritt.
9. About Public Key Cryptography (May 2023 Update)15:21Passkeys use something called public key cryptography. They have your public key. And because it’s public, it doesn’t matter if anyone gets it. That public key and your private key combine to validate who you are. But how does that work? Wouldn’t they have to know something besides the public key that’s unique to you? No. That’s the brilliance of it.Featuring Tom Merritt.Link to show notes here.
8. About Section 230 (May 2023 Update)21:33We update the history of Section 230 in light of the recent Supreme Court decisions. What it is, what it isn't and how those decisions affected or didn't affect the future of the "safe harbor" law in the US.Featuring Tom Merritt.Full episode transcript here.
7. About the DMCA (Updated)22:49By 1998 the US had passed its Digital Millennium Copyright Act. And partly because the US generates so much copyrightable material, and partly just because it’s the US and is a little pushy on the world stage, the DMCA became the de facto way of handling copyright protections on the internet around the world.But what is it? Why did we need the DMCA or the WIPO copyright treaty at all?Let's help you Know a Little more about the DMCAFeaturing Tom Merritt.Full episode transcript available here.
6. About Taiwan36:18Taiwan is at once one of the most vexing political situations on the globe and one of the most important to the world of technology.But few people understand how it got to be either. And understanding that is essential to understanding what might happen next and how that matters a LOT for the technology industry.Let's help you Know a Little More about Taiwan.Featuring Tom Merritt.This episode has been updated to correctly name the original four members of the United Nations Security Council.Full episode transcript here.
5. About OpenAI18:10There's a lot of fear uncertainty and doubt being spread about OpenAI. So let's help you straighten out what it is and what it isn't.Featuring Tom Merritt.Full transcript here.