Latest Episodes
8
Those Pesky Privacy Policies: Lorrie Cranor, Carnegie Mellon University
Does anyone actually read privacy policies? What's in them, and why can't we usually understand them? On our second season finale, we’ll talk with ...
7
When It’s Best to Let A.I. Go Unused: Annette Zimmermann, Harvard University and University of York
Annette Zimmermann makes the provocative argument that there are times it might be better to take cutting-edge artificial intelligence tools and leave them unused....
0
How to Fend Off a SIM-card Attack on Your Cell Phone: Kevin Lee, Princeton University
Kevin Lee recently co-wrote a fascinating study about how easy it is for an attacker to gain control of another person’s cell phone. From...
5
The Security Flaws of Online Learning: Mihir Kshirsagar, Princeton University
Are online learning platforms really secure? Mihir Kshirsagar co-wrote a paper that spells out in startling detail everything you’ve wondered about -- but didn’t...
4
A few easy tips to up your privacy game: David Sherry, Princeton University
How can you can improve your privacy in your everyday use of web browsers, email, text messaging and other apps? Our guest is David...
3
How Search Engines Show Their Bias: Orestis Papakyriakopoulos, Princeton University, and Arwa Michelle Mboya, MIT
Today’s guests have written a study about the Google Search engine, and the subtle – and not-so-subtle – ways in which it shows its...