Privacy vs Reality
Easy Prey15 Apr

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time job. That gap between what sounds easy and what's actually realistic is where a lot of people get stuck.

My guest today is Yael Grauer, a freelance investigative technology reporter who covers privacy, security, digital freedom, hacking, and mass surveillance. She also works as a program manager of cybersecurity research at Consumer Reports, where she manages Security Planner, a free resource that provides customized guidance to help people stay safe online.

We discuss what actually matters when it comes to protecting yourself, why so much of the responsibility ends up on individuals, and how to approach security in a way that's realistic. She explains where the biggest risks tend to come from, what people often overlook, and how to make practical decisions without turning it into something that takes over your time.

Show Notes:
  • [01:02] Yael explains her role at Consumer Reports and how she moved from investigative reporting into security and privacy work.
  • [04:26] Long lists of security steps can overwhelm people, often leading to inaction.
  • [06:52] Real progress requires pressure on companies and policymakers, not just individuals.
  • [09:41] Security advice quickly becomes outdated as platforms and settings constantly change.
  • [12:34] App permissions and privacy settings are often confusing and inconsistent across platforms.
  • [16:30] Panic and stress can make even simple security decisions harder in the moment.
  • [19:50] A practical approach is focusing on the risks most likely to affect you first.
  • [20:19] Media and pop culture create unrealistic expectations about hacking and surveillance.
  • [25:22] Yael shares personal examples of falling for phishing attempts despite her expertise.
  • [27:30] Timing and context can make anyone vulnerable, even those who understand the risks.
  • [30:00] The way you pay matters, with credit cards offering better protection in many cases.
  • [33:24] Social media platforms often fail to respond effectively to compromised accounts.
  • [36:27] Concerns about surveillance often center on location tracking and shared data.
  • [39:38] Tools meant for serious crimes can gradually be used for less critical enforcement.
  • [43:15] Clear, readable privacy policies help people make informed decisions about their data.
  • [45:08] Privacy isn't gone, but maintaining it requires ongoing effort and awareness.
  • [47:20] Data broker opt-out tools show progress, though they don't fully solve the problem.
  • [52:00] Different state laws create inconsistent protections and added complexity.
  • [55:13] Final advice focuses on taking small, practical steps instead of trying to do everything at once.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Avsnitt(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mars 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mars 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mars 45min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
svenska-fall
spar
aftonbladet-daily
flashback-forever
politiken
rss-sanning-konsekvens
rss-expressen-dok
motiv
rss-vad-fan-hande
rss-krimreportrarna
blenda-2
ett-rent-noje
grans
kungligt
rss-aftonbladet-krim
svd-ledarredaktionen
rss-frandfors-horna