Networking & Infrastructure

Networks, security, and system administration

24 episodes

#2226: When Quantum Breaks Everything

Quantum computers will shatter RSA and elliptic-curve encryption—but the real danger is data being stolen and stored right now, waiting to be decry...

post-quantum-cryptographycryptographycybersecurity

#2126: Wi-Fi Power and Channel Interference Explained

Stop screaming at your phone: how UniFi transmit power settings actually cause dead zones.

wirelesszigbeesmart-home

#2104: VPN Metadata Leaks and How to Close Them

A VPN isn't magic. Learn how DNS and SNI leaks expose your browsing, and what encrypted DNS and ECH actually do to fix it.

privacycybersecuritynetwork-security

#2103: AI Firewalls: Spotting Bombs on an Encrypted Conveyor Belt

With 95% of web traffic encrypted, firewalls can't read packets. Here's how AI analyzes metadata to detect threats without decryption.

cybersecurityai-agentsiot-protocols

#2097: Why Hopping Beats Hiding: The Physics of Survival

Forget just encrypting data—learn why hopping frequencies and bursting signals are the real secrets to staying invisible and alive.

electronic-warfaretelecommunicationsmilitary-strategy

#2096: Why 6G Is Just Lightbulbs with Extra Steps

We hit the physics wall: why 6G needs smart mirrors, not brute force, to beat concrete and rain.

telecommunicationswirelessinfrastructure

#2080: Android vs. Israel's Air Raid Alerts

Why your phone might sleep through a siren, and how traffic lights could save your life.

israelemergency-preparednessinfrastructure

#1944: PostgreSQL: The Thirty-Year Miracle

How does a volunteer-run database power the New York Stock Exchange and survive every tech trend without burning out?

open-sourcedistributed-systemsreliability

#1933: Building a Phone Chain to Signal Underground

Old phones can create a lifeline when signals fail, but physics and hardware impose harsh limits.

androidbattery-technologyemergency-preparedness

#1924: Build Your Own App Store for Linux and Android

Stop manually copying files. Learn how to host your own authenticated repositories for .deb and APK files using simple static web servers.

open-sourcehome-labsoftware-development

#1921: The Three-Second Heartbeat That Keeps Israel Safe

Why a civilian website sends an empty JSON payload every three seconds, even during peacetime, and what it reveals about mission-critical architect...

israelnetworkingfault-tolerance

#1920: InfluxDB vs. Postgres: The Time-Series Showdown

We compare specialized time-series databases like InfluxDB against traditional SQL options like Postgres with Timescale extensions.

data-storagedistributed-systemssoftware-development

#1908: Cloudflare Bot Controls: Getting the Balance Right

AI bots are crawling the web like a bank heist. Are Cloudflare's new controls protecting your content, or just helping Google?

cybersecurityai-agentsnetwork-security

#1878: How to Never Drop a Call Again: The Magic of Cellular Bonding

Combine Starlink, 5G, and LTE into one unbreakable stream, even from a mountain peak.

networkingtelecommunicationssatellite-operations

#1877: Why Submarines Use the Same Spectrum as Your Phone

From submarine commands to credit card taps, explore the invisible physics dividing the radio spectrum.

wirelesssatellite-operationselectronic-warfare

#1876: Signal Bars Are a Lie: How to Read Your Real Connection

Those signal bars are a lie. Learn the real numbers—RSRP, RSRQ, SINR—that tell you if your connection is actually good.

wirelessnetwork-securitysignal-processing

#1872: DMARC: The Bouncer for Your Email

SMTP is broken. DMARC is the fix. Learn why your emails might vanish after April 2026 and how to stop domain spoofing.

cybersecuritynetwork-securitydmarc

#1871: Bunker Internet: How to Get a Signal Through Concrete

Stranded in a bomb shelter with no signal? Here’s the engineering to get internet through two meters of concrete.

emergency-preparednessnetworkingelectronic-warfare

#1869: How Your Phone Screams Without Service

No signal, no SIM, no problem. Discover the hidden GSM radio channel that hijacks your phone to scream warnings, and why it works when everything e...

telecommunicationsemergency-preparednessnetwork-security

#1848: Why Cloud Bills Can Hit $100K Overnight

From recursive loops to AI agents spending your money, we unpack the terrifying speed of cloud cost disasters.

cloud-computingai-agentsfinancial-fraud

#1782: Jenkins, GitHub, or Tekton? Picking Your 2025 CI/CD Engine

Jenkins is still the COBOL of DevOps, but the "one size fits all" model is dead. Here’s how to pick your pipeline.

software-developmentopen-sourceai-inference

#1768: Why Can't My Phone Work in a Bomb Shelter?

Thick concrete kills cell signals, but SMS and mesh networks can break through the silence.

#1758: The Internet's Physical Bread Delivery System

Netflix doesn't stream from California to Jerusalem. It uses local boxes in your city. Here's how the internet physically moves data to you.

edge-computingnetwork-securityfiber-optics

#1697: Git Hooks: Your Code's Last Line of Defense

Stop shipping secrets and PII to GitHub. Here's how pre-commit hooks automate security for solo developers.

securitydata-integritygit-hooks