← All Tags

#network-security

12 episodes

#2104: VPN Metadata Leaks and How to Close Them

A VPN isn't magic. Learn how DNS and SNI leaks expose your browsing, and what encrypted DNS and ECH actually do to fix it.

privacycybersecuritynetwork-security

#1908: Cloudflare Bot Controls: Getting the Balance Right

AI bots are crawling the web like a bank heist. Are Cloudflare's new controls protecting your content, or just helping Google?

cybersecurityai-agentsnetwork-security

#1876: Signal Bars Are a Lie: How to Read Your Real Connection

Those signal bars are a lie. Learn the real numbers—RSRP, RSRQ, SINR—that tell you if your connection is actually good.

wirelessnetwork-securitysignal-processing

#1872: DMARC: The Bouncer for Your Email

SMTP is broken. DMARC is the fix. Learn why your emails might vanish after April 2026 and how to stop domain spoofing.

cybersecuritynetwork-securitydmarc

#1869: How Your Phone Screams Without Service

No signal, no SIM, no problem. Discover the hidden GSM radio channel that hijacks your phone to scream warnings, and why it works when everything e...

telecommunicationsemergency-preparednessnetwork-security

#1847: The Home Lab Blackout: Fixing Servers From a Beach

Your server is down and you're miles away. Learn the three simple checks that keep your home lab alive and how to get back in when the front door i...

home-labhardware-engineeringnetwork-security

#1758: The Internet's Physical Bread Delivery System

Netflix doesn't stream from California to Jerusalem. It uses local boxes in your city. Here's how the internet physically moves data to you.

edge-computingnetwork-securityfiber-optics

#1656: Self-Hosted GPS Tracker Access via VPS Relay

Learn how to securely expose home servers to the internet using a VPS relay, avoiding risky port forwarding.

home-labnetwork-securityvpn

#1654: Home Lab Security: Locking Down Your Smart Home

Learn how to prevent a single compromised container from taking over your entire home network and smart devices.

home-labsmart-homenetwork-security

#1008: The Geo-Blocking Fallacy: Beyond Digital Borders

IP addresses are no longer reliable. Learn how TLS fingerprinting and behavioral analysis are replacing the outdated digital border.

network-securitydigital-identitymetadata-analysiscyber-espionagegeo-blocking

#186: How Many Routers Does JFK Actually Need?

Ever wonder how thousands of people stay connected at JFK? Join Herman and Corn as they dive into the massive scale of airport networking.

airport-wifiwi-fi-7network-security

#140: Shadow Webs: The Secret Military Internet Explained

Herman and Corn explore the "shadow internet," revealing how military networks use air gaps, dark fiber, and data diodes to stay secure.

shadow-internetmilitary-networkssiprnetdark-fibercybersecurity