How to Avoid Scammy Tech with Ken from Computer Clan
Easy Prey27 Jul 2022

How to Avoid Scammy Tech with Ken from Computer Clan

Advertisements can manipulate us and depict a product that doesn't actually work. The challenge is knowing if the technology does what they say it does. Today's guest is Ken from Computer Clan. Ken, or commonly known as Crazy Ken, has been running the Computer Clan YouTube channel since September of 2007. He posts tech videos about rare and retro tech, new tech, and even has a series about scammy tech products. Whether you are a tech whiz or a beginner, it doesn't matter. Ken will bring the knowledge, science, entertainment, and even debunk a few scams along the way.

Show Notes:
  • [0:51] - Computer Clan is one of the longest running tech focused YouTube channels. Ken shares the channel's background.
  • [2:28] - The channel is celebrating its 15th anniversary and now is Ken's full time job.
  • [3:06] - Ken shared how a tech product advertisement gave him the idea to debunk false advertisements in videos.
  • [4:27] - When he was younger, Ken made a purchase and experienced the disappointment of advertisements that promise more than they offer.
  • [7:38] - A big red flag to look for is the cheesy video ad that promises things that seem miraculous.
  • [8:40] - Another ad feature that can be used ethically, but can also be abused are those fake countdown timers on websites.
  • [9:47] - Review sections of a product are not always accurate. If you take a closer look, some of the comments are the same.
  • [11:45] - If there is a bad experience, even if there isn't a review, people do tell their friends. Be careful about perfect reviews.
  • [12:37] - Ken shares a story about ads that steal video footage from other companies.
  • [14:10] - There are a lot of ways to find stock footage, but many fake ads pull footage from copyrighted material.
  • [16:57] - Some of the products might not be odd, but Ken says that some of the clickbait ads are strange.
  • [18:21] - In the early days of Covid, people took advantage to create ads that claim more than is possible.
  • [20:25] - Ken shares some products that he thought would be a scam that actually turned out to work fine, but the ads were misleading.
  • [22:40] - During his videos, Ken even sometimes has a fire extinguisher handy.
  • [24:19] - Urgency could be a red flag.
  • [25:30] - Ken shares some of the products he is looking at to debunk the ad and the product.
  • [27:20] - The educational element of the Computer Clan YouTube channel can show you that although not all products are fake, they may not be what you need.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5