How Security Analysts Work

Published: Feb. 7, 2020, 10 a.m.

b'

We explain how to delete "off-Facebook activity," discuss a Google Photos data leak, a Twitter phone number issue, and a man who created a traffic jam with a wagon full of smartphones. We then explain how security analysts work, discussing a developer who wanted to know why his Wacom drawing tablet had a privacy policy, and worked out what data the device was sending to a server.

\\n\\n

Show Notes:

\\n\\n\\n\\n

Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com. First-time buyers can save 40% by using coupon code PODCAST19 at checkout.

'