Techlore Talks
Techlore Talks

Techlore Talks

Techlore

Overview
Episodes

Details

Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, they're on this show. Topics include: privacy tools and technologies, cybersecurity threats and defenses, open-source software, surveillance and digital rights, encryption, tech policy, and digital sovereignty. New episodes released regularly. Subscribe and join the community at techlore.tech.

Recent Episodes

Bitwarden on Zero Knowledge Encryption, Open Source Trust, and the LastPass Breach
APR 18, 2026
Bitwarden on Zero Knowledge Encryption, Open Source Trust, and the LastPass Breach
Most people think their passwords are safe. Most people are wrong. Henry sits down with Ryan Luibrand, Senior Product Marketing Manager at Bitwarden, to cover why open source changes the trust equation, the LastPass data breach, how KDF algorithms work, whether storing your TOTP codes in your password manager is a good idea, and more.🔗 SOURCES & LINKSWritten breakdown: https://techlore.tech/password-manager-security-explained-with-bitwarden/Bitwarden: https://bitwarden.comPrivacy Policy: https://bitwarden.com/privacy/Compliance & Audit Reports: https://bitwarden.com/compliance/Security White Paper: https://bitwarden.com/help/bitwarden-security-white-paper/Security Readiness Kit: https://bitwarden.com/resources/bitwarden-security-readiness-kit/HackerOne Bug Bounty: https://hackerone.com/bitwardenGitHub: https://github.com/bitwarden ⏱️ TIMESTAMPS(00:00) - INTRO (00:52) - RYAN'S BACKGROUND (02:07) - BITWARDEN ORIGINS (03:09) - BITWARDEN TEAM (03:29) - FUNDING (06:18) - OPEN SOURCE (08:18) - AUDITS (10:11) - FORKING (11:19) - INTERNAL VS. COMMUNITY DEVELOPMENT (12:21) - SELF-HOSTING (14:13) - NEW NATIVE APPS (16:38) - ARE PASSWORD MANAGERS SECURE? (21:08) - WHY USE A DEDICATED PW MANAGER? (23:08) - CONCERNS WITH THE CLOUD (25:39) - ARGON2 (29:16) - USERNAME KEY GENERATION (31:06) - LASTPASS DATA BREACH (37:17) - WHAT CAN BITWARDEN SEE? (39:40) - WHERE IS BITWARDEN DATA HOSTED? (40:18) - GOVERNMENT REQUESTS (41:08) - "EGGS IN ONE BASKET" ARGUMENT (43:57) - 2FA & BITWARDEN AUTHENTICATOR (47:39) - PASSKEYS (49:04) - COMMUNITY VS. ENTERPRISE (50:17) - RYAN'S SETUP + ADVICE (53:45) - THIRD PARTY INTEGRATIONS (54:20) - AI (56:16) - PRICING (57:15) - F-DROID APP? (57:54) - LINUX APP? (58:12) - MORE THOUGHTS ON CLOUD SECURITY (59:10) - FINAL THOUGHTS (59:55) - WHAT'S NEXT? 🎥 VIDEOWatch on YouTube 🧡 SUPPORT TECHLOREKeep Techlore Talks independent & growing: ★ Support this podcast ★
play-circle icon
61 MIN
Age Verification Laws and Free Software: A Legal Expert Tells Us What's Actually at Stake
APR 14, 2026
Age Verification Laws and Free Software: A Legal Expert Tells Us What's Actually at Stake
Age verification laws are spreading fast, but most coverage is either panic or dismissal, with very little clarity on what these laws actually say, who they apply to, or what they mean for free software. In this episode of Techlore Talks, Henry sits down with Jithendra Palepu, who has a legal background and Free Software Foundation Europe volunteer, to actually make sense of it. Age verification, age estimation, age gating, and self-declaration—why the difference matters enormously. We examine what California's AB 1628 actually requires, we discuss why MidnightBSD's decision to ban California users may have backfired against the very principles it was trying to protect, and so much more. If you've had strong reactions to these laws but struggled to fully back them up, this one's for you.🔗 SOURCES & LINKS• Free Software Foundation Europe: https://fsfe.org• FSFE — Youth Hacking for Freedom: https://fsfe.org/activities/yh4f/• Software Freedom Conservancy: https://sfconservancy.org• Keep Android Open: https://keepandroidopen.org/ ⏱️ TIMESTAMPS(00:00) - INTRO (02:43) - DEFINING AGE VERIFICATION (05:15) - THE REAL CONCERN (09:59) - SELF-DECLARATION (13:14) - SERVICE VS. OS AGE VERIFICATION (19:34) - RESPONSIBILITY (23:23) - MIDNIGHTBSD & SYSTEMD (25:27) - LINUX CARVE-OUTS? (27:54) - SHARED & SECONDHAND DEVICES? (29:42) - APPLE + DMA (32:59) - WHAT'S THE OVERALL NARRATIVE? (37:57) - JITHENDRA'S & FSFE'S CONCERNS (42:21) - DO ANY LAWS GET THIS RIGHT? (44:33) - WHO IS DOING THE VERIFICATION? (45:03) - DATA LEAK RESPONSIBILITY (46:37) - OS-LEVEL AGE VERIFICATION IN EU (48:04) - YOUNG DEVELOPERS (49:14) - ENFORCEABILITY (50:54) - ACTIONABLE ADVICE (52:42) - HOW TO FACILITATE DISCUSSIONS (54:37) - HOW TO FOLLOW 🎥 VIDEOWatch on YouTube 🧡 SUPPORT TECHLOREKeep Techlore Talks independent & growing: ★ Support this podcast ★
play-circle icon
57 MIN
Telecom Insider Explains What Your Carrier Actually Sees (Cape Interview)
MAR 28, 2026
Telecom Insider Explains What Your Carrier Actually Sees (Cape Interview)
Most people think turning off location services protects them from being tracked. It doesn't. In this interview, David Dunn from privacy-focused cellular provider Cape breaks down what carriers actually collect, how threats like IMSI catchers and SIM swaps work, and how Cape is building a mobile network specifically designed to minimize that exposure.🔗 SOURCES & LINKS• Cape: https://www.cape.co• Cape + Proton collab: https://www.cape.co/cape-and-proton⏱️ TIMESTAMPS00:00:00 INTRO00:01:01 WHAT CELLULAR CARRIERS SEE00:02:50 THE CONCERNS00:04:08 ABUSE OF DATA00:05:28 LTT SIM SWAP ATTACK00:06:33 PHONE CALL BEHIND-THE-SCENES00:12:24 CELL TOWER TRIANGULATION & GEOFENCING00:15:32 LOCATION SERVICES00:16:25 CALL DATA & SMS RECORDS00:19:24 SMS VS. EMAIL SECURITY00:20:23 SIM SWAPPING + IMSI CATCHERS00:24:09 CELL TOWER TRIANGULATION + GEOFENCING SOLUTIONS00:26:38 CALL DATA RECORD + SMS SOLUTIONS00:28:48 WI-FI CALLING00:30:54 SS7 SIGNALING ATTACK PROTECTION00:32:25 4G VS. 5G PRIVACY00:36:34 USER AGENTS + CUSTOM ROMS00:42:15 DEVICE PROTECTION00:46:06 CAPE'S APPROACH00:55:01 MOBILE CORE00:59:18 CDR DELETION01:00:06 IMSI ROTATION01:00:52 OTHER USER CONFIGURABLE OPTIONS01:04:05 PHONE NUMBER REPUTATION01:05:29 ISSUES WITH PRIVACY TOOLS01:08:22 OBSCURA01:10:48 REGISTRATION01:13:04 TRUST & VERIFICATION01:15:37 COMPATIBILITY01:17:33 AVAILABILITY01:17:54 ROAMING01:18:36 LAW ENFORCEMENT REQUESTS01:21:15 PALANTIR01:23:25 PROTON PARTNERSHIP01:25:05 WHO IS CAPE FOR?01:26:43 TELL US SOMETHING SHOCKING01:29:28 OUTRO🎥 VIDEOWatch on YouTube 🧡 SUPPORT TECHLOREKeep Techlore Talks independent & growing: ★ Support this podcast ★
play-circle icon
91 MIN