Bigger Insights Privacy & Security Podcast

Welcome to Bigger Insights Privacy & Security

The transcript can be viewed here.

Description

The Bigger Insights Privacy & Security podcast helps you live a more private and secure life by exposing the latest threats to your privacy and security and teaching you how to mitigate them. The goal of this podcast is to give you the education and insights you need to protect yourself, your family, your business, and your assets from all kinds of threats, whether those be:

  1. Corporate surveillance and tracking
  2. Device and browser fingerprinting
  3. Creepy and malicious advertisements
  4. Data breaches
  5. Account takeovers
  6. Ransomware and other malware
  7. Social engineering, phishing, spamming, and scamming

We’ll also be discussing many apps, services, devices, and operating systems including:

  1. Security Tools: Password managers, security keys, multi-factor authentication, encryption (drives, PGP, communications, documents, DNS), virtual machines (VM)
  2. Privacy Tools: VPNs, Tor Network, browsers and extensions, email alias services, virtual payment cards, metadata removal
  3. End-to-end encrypted email, text messaging, VOIP, documentation, file transfer and syncing between devices
  4. Mobile devices, PCs, IoT devices, “smart” devices, security systems
  5. Private and secure desktop OS: Linux, Qubes OS, TAILS, Whonix
  6. Private and secure mobile OS: GrapheneOS, CalyxOS

Bigger Insights is about sovereignty and resilience. In addition to our podcast and blog content, we provide consulting services to clients like you in one-on-one sessions. We help our clients achieve their goals and secure their future through finance, security, privacy, and technology. If you like this content, see our Finance and Technology podcasts as well.

Platforms

We publish our episodes here (below) as well as on other platforms. Feel free to listen and subscribe to our podcasts anywhere you prefer. If you would like for us to publish to a different platform, please let us know.

Apple - Badge - Logo and Icon - Purple - Listen On - White Text - Black Background
Spotify - Badge - Listen On - Green and White Text - Black Background
Pandora - Logo - Icon - Badge - Listen On - Podcast
Pocket Casts - Badge - Listen On - Black Text - White Background

Episodes

Security - Software - Email - Computer Screen Privacy & Security

Email is Insecure – Here’s How to Improve Email Security

Email was never designed to be private or secure, so not surprisingly, it is neither private, nor secure. In the previous episode, we explained the reasons why as well as the risks inherent to email. However, email is so prevalent that it is unfortunately a necessary evil. In this episode, ...
Listen →
Email - Mobile Phone - Privacy and Security - Technology - Hands Privacy & Security

Email is Insecure – Stop Using it for Sensitive Communications

Email is the primary means of sending messages and documents for many people. Unfortunately, email was never designed to be private or secure. Over time, we’ve developed several tools and techniques to help make it more secure. But at the end of the day, no matter how uncomfortable it makes ...
Listen →
Cybersecurity - Privacy and Security - Virtual Private Network (VPN) Privacy & Security

Are Virtual Private Networks (VPNs) Useless Honeypot Scams?

You may have heard others in the privacy and security community call virtual private networks (VPNs) “useless”, “scams”, or “honeypots”, but is this actually the case? There are certainly a lot of sketchy VPNs and creators who shill them, but does that invalidate the thesis for using a VPN? We ...
Listen →
Defense - Defending - Boxer - Boxing - Fighting Privacy & Security

Defending GrapheneOS and Daniel Micay

Trouble has been brewing between Daniel Micay, GrapheneOS, and the privacy and security community for several months. This has culminated in Daniel, the founder of GrapheneOS, stepping down as lead developer of the project in late May, 2023. In this episode, we go over this issue in some detail and ...
Listen →
Mobile Phone - Cell Phone - Flip Phone - Dumb Phone - Man Using Flip Phone Privacy & Security

Should You Use a Dumb Phone for Privacy & Security?

The constant stream of news regarding mobile phone spyware (e.g. Pegasus) and hacks may have you wondering – should you use a dumb phone for privacy and security? We often see criminals in movies and TV using dumb phones as burners, but does this really make you more private and ...
Listen →
Delete Facebook - Social Media - Corporate Surveillance - Creepy Privacy & Security

Finding, Sanitizing, and Closing Old Accounts

You probably have more accounts than you realize - perhaps dozens that you’ve opened over the years and forgotten about. Every account you have is a potential liability in terms of your privacy and security. In this episode, we detail: 1. Techniques for finding accounts you’ve forgotten about; 2. Why ...
Listen →

Disclaimer

Bigger Insights, LLC, an Ohio limited liability company (“we”, “our”, or “us”), provides general educational information on various topics in our podcasts, as a public service, which should not be construed as professional, financial, real estate, business, tax, legal, marital/relationship, family planning, health, or other advice. The content in our podcasts only represents opinions and views expressed by the authors of said content. See our full Disclaimer for more details.

Bigger Insights Privacy & Security Blog

Description

The Bigger Insights Privacy & Security blog helps you live a more private and secure life by exposing the latest threats to your privacy and security and teaching you how to mitigate them. The goal of this blog is to give you the education and insights you need to protect yourself, your family, your business, and your assets from all kinds of threats, whether those be:

  1. Corporate surveillance and tracking
  2. Device and browser fingerprinting
  3. Creepy and malicious advertisements
  4. Data breaches
  5. Account takeovers
  6. Ransomware and other malware
  7. Social engineering, phishing, spamming, and scamming

We’ll also be discussing many apps, services, devices, and operating systems including:

  1. Security Tools: Password managers, security keys, multi-factor authentication, encryption (drives, PGP, communications, documents, DNS), virtual machines (VM)
  2. Privacy Tools: VPNs, Tor Network, browsers and extensions, email alias services, virtual payment cards, metadata removal
  3. End-to-end encrypted email, text messaging, VOIP, documentation, file transfer and syncing between devices
  4. Mobile devices, PCs, IoT devices, “smart” devices, security systems
  5. Private and secure desktop OS: Linux, Qubes OS, TAILS, Whonix
  6. Private and secure mobile OS: GrapheneOS, CalyxOS

Bigger Insights is about sovereignty and resilience. In addition to our blog and podcast content, we provide consulting services to clients like you in one-on-one sessions. We help our clients achieve their goals and secure their future through finance, security, privacy, and technology. If you like this content, see our Finance and Technology blogs as well.

Posts

Mobile Phone - Cell Phone - Flip Phone - Dumb Phone - Man Using Flip Phone

Should You Use a Dumb Phone for Privacy & Security?

The constant stream of news regarding mobile phone spyware (e.g. Pegasus) and hacks may have you wondering – should you use a dumb phone for privacy and security? We often see criminals in movies and TV using dumb phones as burners, but does this really make you more private and secure relative to using a smart phone? We answer these questions in this episode, as well as impart some cold, hard truths about the privacy and security implications of voice (PSTN) and SMS. Finally, we wrap up by explaining some of the ways you can improve the security of your ...
Read More →
Cybersecurity - Password Manager - Lock - Nodes

Don’t Use LastPass, Use These Instead

LastPass is better than nothing, but is it the best password manager for you? We discuss pros, cons, and alternatives worth considering. LastPass has a lot going for it: Many features, good MFA support, handy password tools, emergency access, etc. However, LastPass has many issues to consider. LastPass has a terrible security track record - not something you want from a security service. Go to Wikipedia and read how many incidents they’ve had. In 2022, a hacker breached their corporate vault and stole their users’ vaults. We’ve since discovered that some users vaults are unnecessarily vulnerable to being cracked and ...
Read More →
Lawyer - Attorney - Law - Justice - Using Mobile Phone - Smiling - Man in Suit

Why Lawyers Should Care About Privacy & Security

On October 1, 2015, attorney Karla Salas received a highly-personalized text message about a wake for her friend’s deceased father. This message contained a link, which she clicked on. It was a targeted attack. In an instant, her phone had been hacked by a sophisticated spyware tool called Pegasus. She is not alone. In an unrelated incident, an anonymous UK attorney was targeted by the same spyware, this time through WhatsApp messages. If you’re thinking, “I’m not a high-profile lawyer working on a high-profile case, so I’ve got nothing to worry about.”, you’re mistaken. According to the Coveware, small and ...
Read More →
VPN - NordVPN - Privacy and Security - Use a More Trustworthy VPN

Don’t Use NordVPN, Use These Instead

If you’ve spent any time researching VPNs, you’ve probably heard of NordVPN. It’s basically in every top VPN review list. However, is it really as good as the marketers claim? We discuss the pros and cons of NordVPN, based on our own experiences, so you can make an informed decision. Please note that, as of the time of this writing: As of the time of this writing, we have no affiliations with any VPN provider We have neither been paid, nor requested by anyone to write any portion of this post The Good Side of NordVPN Let’s start out on ...
Read More →
QR Code Scanning - QR Code Dangers - Think Twice Before Scanning that Next QR Code - Malware - Phishing - Corporate Surveillance

Think Twice Before Scanning that Next QR Code

Being in the security industry can be downright depressing. Your neighborhood friendly system administrators and IT managers are probably questioning their lives at this very moment. As threats and threat actors become more sophisticated at an alarming rate, we still struggle with convincing everyday users to perform even the most basic security tasks. One of those tasks is inspecting links before you click on them. You can make a link appear as one URL, but point to a different one. For example, https://duckduckgo.com actually points to https://biggerinsights.com. When users don’t inspect links, this makes phishing and other attacks like shooting fish ...
Read More →
Cybersecurity - Login - Username - Password - Biometrics - Password Manager

Why You Need a Password Manager

If you’re not using a password manager, your passwords, accounts, and data are vulnerable. Do your passwords contain the names of your pet, spouse, or kids? What about phone numbers, dates, travel destinations, sports, or hobbies? Hackers understand how people create passwords and have powerful tools for cracking them. If you’re reusing passwords, you’re at high risk of multiple accounts being breached in a credential stuffing attack. Your passwords need to be unique enough to not be in password dictionaries, which contain billions of passwords. They also need to be strong enough to avoid being brute-forced by devices that can ...
Read More →
Virtual Private Network (VPN) - Connecting to VPN - Should You Use a VPN

Should You Use a Virtual Private Network (VPN)?

A Virtual Private Network (VPN) is networking technology intended to improve your privacy and security online or between networks. If you’ve spent any time in the privacy community, you’ve realized that there are a lot of heated and binary opinions, particularly around VPNs. The more devout members typically recommend that you only use the Tor network. Although Tor has a lot to offer, and VPNs certainly have their faults, the answer isn’t this black and white. For the purposes of this post, we’ll focus on commercially-available VPNs for personal use, particularly in regard to privacy. IP Address Tracking Before we ...
Read More →

Disclaimer

Bigger Insights, LLC, an Ohio limited liability company (“we”, “our”, or “us”), provides general educational information on various topics in our blogs, as a public service, which should not be construed as professional, financial, real estate, business, tax, legal, marital/relationship, family planning, health, or other advice. The content in our blogs only represents opinions and views expressed by the authors of said content. See our full Disclaimer for more details.

Privacy & Security

What We Offer

Our Insights Services Experience Expertise

Your Privacy Security Sovereignty Peace of Mind

Why We're Different

We Take a Comprehensive Approach

We take a comprehensive approach to building a successful future that you’d be hard-pressed to find elsewhere. The services we provide our clients are engineered not only to satisfy their privacy and security goals, but to do so within a framework that takes their financial and technology needs into account as well.

We Focus on Our Clients' Needs

Every client’s situation is different in terms of risk tolerance, threat model, family matters, financial means, etc. We focus on tailoring our services to each client’s specific situation and needs. For example, an iPhone may be the best choice for one client, whereas a Google Pixel with GrapheneOS may be the best choice for another.

We Are Flexible

Have a 9-5? We’ve got you covered after hours. Most of our work is done electronically, so we can spend more time being productive and less time commuting, parking, etc. We communicate with our clients using a range of secure, privacy-respecting technologies.

We Are Creative

Many of the privacy and security services we offer can be researched, tested, and implemented on your own. However, balancing privacy and security with living a successful life requires a delicate balance of knowledge, experience, and creativity. Our clients leverage our insights so they can achieve their goals without investing the time, R&D, and agony (frankly) that comes along with mastering privacy and security on your own.

We Are Honest

We tell our clients what they need to hear – the whole story – not just what our clients want to hear. The professional services industry is riddled with advisors who will only do or say what they think their clients want, rather than acting truly in their best interest.

We Have Integrity

We can admit when your needs are beyond the scope of what we have to offer.

Next Steps

Please review our FAQ if you have questions or reservations. Fill out the brief form at the bottom of the page or contact us directly to schedule a complimentary initial consultation. We’ll be happy to discuss how we can serve you in a convenient web meeting. You have nothing to lose but a moment of your time.

Scroll to Top