11 episodes

Intimate conversations with a diverse array of real-world hackers for "good," including a ransomware negotiator, an NSA recruit, a lock picker, a missionary, a hactivist, a hacker couple raising hacker kids, and many more. Hosted by Jeremy N. Smith, author of Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien."

The Hacker Next Door Jeremy N. Smith

    • Technology

Intimate conversations with a diverse array of real-world hackers for "good," including a ransomware negotiator, an NSA recruit, a lock picker, a missionary, a hactivist, a hacker couple raising hacker kids, and many more. Hosted by Jeremy N. Smith, author of Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien."

    Lock Picker Deviant Ollam

    Lock Picker Deviant Ollam

    Legendary lock picker Deviant Ollam explains the thought process of physically breaking into a building, the two golden rules of lock picking, and why 20,000+ hackers hanging out and hacking together (in Las Vegas!) improve security for us all.

    Follow Deviant at https://deviating.net, https://twitter.com/deviantollam, and https://www.youtube.com/user/DeviantOllam. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 29 min
    Ransomware Negotiator Karen Sprenger

    Ransomware Negotiator Karen Sprenger

    LMG Security COO Karen Springer discusses digital hostage negotiations, the top two qualities to look for in hiring a hacker, and a typical day in a hacker office.

    Follow LMG and Karen at https://lmgsecurity.com and https://twitter.com/grl_geek. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 23 min
    Black Hat Hacker Skylar Rampersaud

    Black Hat Hacker Skylar Rampersaud

    Black hat hacker Skylar Rampersaud discusses digital warfare, the mindset of an attacker, and being recruited (as a 15-year-old!) by the NSA.

    Follow Immunity Inc. and Skylar at https://www.immunityinc.com and https://twitter.com/NotWindow. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 25 min
    Hacker for Charity Johnny Long

    Hacker for Charity Johnny Long

    Hackers for Charity founder Johnny Long discusses Google hacking, finding God, and bringing the hacker spirit to philanthropy.

    Follow Hackers for Charity and Johnny at https://www.hackersforcharity.org and https://twitter.com/ihackstuff. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 22 min
    Hacker Parents Caroline Hardin and Grant Dobbe

    Hacker Parents Caroline Hardin and Grant Dobbe

    Hacker couple and parents Caroline Hardin and Grant Dobbe discuss hackathons, makerspaces, and raising the next generation of hacker kids.

    Follow Caroline and Grant at https://twitter.com/carolinescastle and https://twitter.com/guy_mcdudefella. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 23 min
    Hardware Hacker Joe Grand

    Hardware Hacker Joe Grand

    Hardware hacker extraordinaire Joe Grand on testifying before Congress as a 22-year-old, helping launch the autonomous vehicle industry, and turning badges into...flamethrowers.

    Follow Joe at http://www.grandideastudio.com and https://twitter.com/joegrand. Follow Jeremy at http://jeremynsmith.com and https://twitter.com/jeremynsmith. Learn more about Breaking and Entering at http://jeremynsmith.com/breaking-and-entering.html.

    • 24 min

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Apple Events (audio)
Apple
Apple Events (video)
Apple
The TED AI Show
TED
Deep Questions with Cal Newport
Cal Newport

You Might Also Like

Darknet Diaries
Jack Rhysider
Hacked
Hacked
Malicious Life
Malicious Life
CyberWire Daily
N2K Networks
Security Now (Audio)
TWiT
The Joe Rogan Experience
Joe Rogan