Privacy vs Reality
Easy Prey15 Huhti

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time job. That gap between what sounds easy and what's actually realistic is where a lot of people get stuck.

My guest today is Yael Grauer, a freelance investigative technology reporter who covers privacy, security, digital freedom, hacking, and mass surveillance. She also works as a program manager of cybersecurity research at Consumer Reports, where she manages Security Planner, a free resource that provides customized guidance to help people stay safe online.

We discuss what actually matters when it comes to protecting yourself, why so much of the responsibility ends up on individuals, and how to approach security in a way that's realistic. She explains where the biggest risks tend to come from, what people often overlook, and how to make practical decisions without turning it into something that takes over your time.

Show Notes:
  • [01:02] Yael explains her role at Consumer Reports and how she moved from investigative reporting into security and privacy work.
  • [04:26] Long lists of security steps can overwhelm people, often leading to inaction.
  • [06:52] Real progress requires pressure on companies and policymakers, not just individuals.
  • [09:41] Security advice quickly becomes outdated as platforms and settings constantly change.
  • [12:34] App permissions and privacy settings are often confusing and inconsistent across platforms.
  • [16:30] Panic and stress can make even simple security decisions harder in the moment.
  • [19:50] A practical approach is focusing on the risks most likely to affect you first.
  • [20:19] Media and pop culture create unrealistic expectations about hacking and surveillance.
  • [25:22] Yael shares personal examples of falling for phishing attempts despite her expertise.
  • [27:30] Timing and context can make anyone vulnerable, even those who understand the risks.
  • [30:00] The way you pay matters, with credit cards offering better protection in many cases.
  • [33:24] Social media platforms often fail to respond effectively to compromised accounts.
  • [36:27] Concerns about surveillance often center on location tracking and shared data.
  • [39:38] Tools meant for serious crimes can gradually be used for less critical enforcement.
  • [43:15] Clear, readable privacy policies help people make informed decisions about their data.
  • [45:08] Privacy isn't gone, but maintaining it requires ongoing effort and awareness.
  • [47:20] Data broker opt-out tools show progress, though they don't fully solve the problem.
  • [52:00] Different state laws create inconsistent protections and added complexity.
  • [55:13] Final advice focuses on taking small, practical steps instead of trying to do everything at once.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit