Latest episodes
![17. Chat control? The Stasi look like amateurs compared to this sh*te](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
17. Chat control? The Stasi look like amateurs compared to this sh*te
Vulnerable By Design,![16. How to build a timeline (Twitter's version)](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
16. How to build a timeline (Twitter's version)
Vulnerable By Design,![15. Disposable Bodies (Reading Health Communism)](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
15. Disposable Bodies (Reading Health Communism)
Vulnerable By Design,![14. ChatGPT and Existential Angst](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
14. ChatGPT and Existential Angst
Vulnerable By Design,![13. What is the Fediverse?](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
13. What is the Fediverse?
Vulnerable By Design,![12. All We Need is Your Face](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
12. All We Need is Your Face
Vulnerable By Design,![11. Normal](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
11. Normal
Vulnerable By Design,![10. Cross-cultural privacy](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
10. Cross-cultural privacy
Vulnerable By Design,![9. Molotov](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
9. Molotov
Vulnerable By Design,![8. The Papers 005: Misinformation, Cycling in Dublin, Apologies](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
8. The Papers 005: Misinformation, Cycling in Dublin, Apologies
Vulnerable By Design,![7. Subprime Attention: Will Ad Bubbles Collapse the Internet?](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
7. Subprime Attention: Will Ad Bubbles Collapse the Internet?
Vulnerable By Design,![6. The Essay: Like](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
6. The Essay: Like
Vulnerable By Design,![5. The Papers: Edit Wars (On a Wiki)](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
5. The Papers: Edit Wars (On a Wiki)
Vulnerable By Design,![4. The Papers: Got Phished](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
4. The Papers: Got Phished
Vulnerable By Design,![3. The Essay: Can You See My Slides?](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
3. The Essay: Can You See My Slides?
Vulnerable By Design,![2. The Papers: Big Tech Lobbying](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)
2. The Papers: Big Tech Lobbying
Vulnerable By Design,![1. The Papers: Algorithmic Accountability](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F1002%2Ffe32ca7a-5ac2-4be7-bc9e-63e14cf1b8e9.png)