『Plaintext with Rich』のカバーアート

Plaintext with Rich

Plaintext with Rich

著者: Rich Greene
無料で聴く

このコンテンツについて

Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?


Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!

© 2026 Plaintext with Rich
エピソード
  • From Shared Secrets To Secure Proof: Why Passkeys Win
    2026/01/09

    Your name or username doesn’t unlock an account—reused secrets do. We dig into why the internet’s copy‑and‑paste approach to passwords keeps failing and show how passkeys flip the model from disclosure to proof. With a device‑bound private key and simple gestures like a tap or a glance, sign‑ins get faster while phishing and credential stuffing lose their fuel. No more shared secrets to steal, replay, or resell.

    We walk through what passwordless really means, not the hype: identity proven with something you have and something you are, anchored by public‑key cryptography. You’ll hear why phishing resistance comes from origin binding, how passkeys eliminate reuse, and where support tickets drop when resets vanish. Then we slow down on the trade‑offs. Device loss and account recovery are the new attack surface, so we break down the real risks—weak backups, stale phone numbers, and social engineering at support—and how to close those gaps without adding friction.

    To get you moving, we share a practical plan: protect core accounts starting with email, then Apple, Google, or Microsoft, your password manager, and financial logins. Turn on passkeys where offered, keep strong MFA where they aren’t, prefer apps or hardware keys over SMS, and lock down recovery with verified contacts, backup codes, and at least one additional trusted device. Along the way, we debunk common myths—no, sites don’t keep your biometrics; no, passwordless isn’t a magic shield; yes, daily use is simpler than passwords while planning shifts to recovery.

    Ready to trade memorized secrets for proof and speed? Subscribe, share this episode with someone who needs a safer login, and leave a review to tell us which account you’ll upgrade first.

    Is there a topic/term you want me to discuss next? Text me!!

    続きを読む 一部表示
    9 分
  • Quantum Threats, Plain Answers
    2026/01/02

    A thief can steal your secrets without opening a single box. That’s the unsettling reality behind harvest now, decrypt later the strategy that makes quantum risk a present-day problem for data with a long shelf life. We unpack how today’s public key cryptography underpins trust on the internet and why future quantum machines could unravel that trust for traffic already captured.

    We start by breaking down encryption in plain language fast, shared-secret systems for bulk protection and public key systems for identity, key exchange, and signatures. From there, we explain where quantum computing changes the game: not by magic, but by accelerating the math that secures TLS handshakes, VPNs, code signing, email gateways, and certificate chains. If attackers record those exchanges now, they can potentially decrypt or forge them later when new tools arrive.

    Then we get practical with a post-quantum roadmap you can act on. Identify long-life data that would still cause harm years from now. Build a crypto inventory across web connections, certificates, databases, backups, and signing workflows so you know where to upgrade. Design for crypto agility with modular libraries instead of hard-coded algorithms. Press vendors for clear post-quantum plans and timelines, and consider hybrid approaches that pair classical and PQC during the transition. We also cover cleanup of legacy crypto, better backup protection, and straightforward steps for non-security folks: update devices, use reputable platforms, enable strong authentication, and replace outdated hardware.

    We close by clearing up common myths: quantum isn’t science fiction, encryption won’t become useless, and waiting is the real risk for long-life data. The path forward is steady and informed progress without panic. If this breakdown helped, subscribe, share it with someone who handles sensitive data, and leave a quick review so others can find Plain Text With Rich. Got a security topic you want decoded? Send it our way and we’ll tackle it next.

    Is there a topic/term you want me to discuss next? Text me!!

    続きを読む 一部表示
    8 分
  • Inside The Dark Web Market For Stolen Identities
    2026/01/02

    Your data doesn’t vanish after a breach it enters a market. We break down the dark web as a logistics layer for cybercrime, not a mythical place, and show how stolen credentials and identity records are bundled, priced, and resold based on freshness, completeness, and volume. The result isn’t always a dramatic wipeout; it’s usually slow, quiet harm that surfaces as odd charges, medical bills you don’t recognize, and loan denials that make no sense.

    We start by stripping away myths: the dark web isn’t separate from the internet and it isn’t inherently evil. Anonymity tools serve journalists and activists as much as criminals, but that same privacy enables large-scale trade of stolen data. From breach to buyer, we map the roles intruders, brokers, and fraud operators and explain why news headlines are a poor compass for personal risk. Utility, not publicity, drives what gets used, when it gets used, and how often it returns to bite you.

    Then we get practical. We shift the mindset from “breach as event” to “breach as exposure” and outline moves that actually lower risk: change passwords when incidents occur, use a password manager to stop cross-site reuse, turn on multi-factor authentication, and monitor the right channels credit reports, bank statements, and insurance portals on a schedule. We also talk about shrinking the data attackers can sell by closing old accounts, removing saved cards, and questioning why services hold sensitive details indefinitely. Good security accepts that some breaches happen and focuses on limiting what leaks, how long it stays valuable, and how fast you can recover.

    If this helped you see the bigger picture, subscribe for more plain-language security, share it with someone who needs it, and leave a review so others can find the show.

    Is there a topic/term you want me to discuss next? Text me!!

    続きを読む 一部表示
    7 分
まだレビューはありません