Loose Leaf Security is an independently produced podcast from Liz Denys and Geoffrey Thomas about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we break down complex digital security and privacy topics into accessible primers and practical takeaways.

You can find Loose Leaf Security on many podcast clients or stream our episodes in your web browser. You can also follow us on Twitter, Instagram, and Facebook.

In addition to podcast episodes, we'll also be covering some security- and privacy-related topics in blog-style articles, where we can go into more detail than we could in an episode. We also send out a weekly newsletter that includes a practical tip about improving your personal digital security, short summaries of relevant security news, and any thought-provoking articles we've seen about digital privacy and security.

If you're new to Loose Leaf Security, you might want to check out our archives for some suggestions on where to start and a complete list of our episodes, articles, and reference materials.

Our latest episode:

Covering your webcams

Liz and Geoffrey take a look at how attackers compromise webcams and discuss why it's worth physically covering them. Malware and alleged threats of malware are only some of the avenues attackers take to access other people's webcams; vulnerabilities in legitimate software, like the recent Zoom security flaw, can also be exploited. Additionally, sharing ownership of your devices with another party like your school district or workplace may leave you and your webcams exposed. In the news, the FTC fines Facebook, weaknesses in Apple's iMessage and Visual Voicemail, and U2F support added to Firefox for Android.

Covering your webcams episode art

Continue reading for the show notes and complete transcript…

Other recent episodes:

  • Password managers: how they should work and when they didn't: Liz and Geoffrey discuss password manager extensions in depth: everything from how they keep your passwords safe from malicious websites to how they sync your passwords between your devices to how they've made mistakes in the past. If you haven't… (June 27, 2019)
  • Two-factor tidying: With a wide variety of possible two-factor authentication methods, it's difficult to keep track of which ones you're using - and which ones you could be using. Liz and Geoffrey talk about their personal strategies and how to handle difficult cases… (May 16, 2019)
  • Using a password manager effectively: In a deeper exploration of password manager browser extensions and features for sharing as well as a survey of alternatives to password managers, Liz and Geoffrey go back to the topic of Loose Leaf Security's very first episode and discuss how… (March 20, 2019)

See all of our episodes sorted by release date, most recent first.

Our latest article:

Loose Leaf Security Weekly, Issue 11

Hello! The chill in New York provided us the perfect excuse to curl up with a blanket and a pot of tea while making sure the last of our accounts with an authenticator app as a second factor had those authenticator apps configured on both our current phones and backup phones. One of Liz's accounts is an unused Snapchat namespace grab (an account that goes entirely unused but exists so no one else can use Liz's most commonly used username), and Liz was particularly unhappy to have to download the Snapchat app and temporarily give it camera access just to reconfigure two-factor authentication.

If someone forwarded this to you, you can sign up yourself at https://looseleafsecurity.com/newsletter.

Tip of the week

If you want to upload a photo from your phone to a service like social media or email, there are usually two ways to do it: you can open the service's app and access your photo library or camera from there, or you can take a photo and use your phone's "Share" feature to send it to the service. Sharing a photo via the first approach will often prompt you to give the app direct access to …

Continue reading…

Other recent articles:

  • Loose Leaf Security Weekly, Issue 10: Hello again! As the sun rises later and later each day, we're finding ourselves really appreciating the value of a cup of hot tea in the morning - nothing fancy or elaborate, just plain, good tea before we head out the door. In the same way, as the… (November 8, 2019)
  • Loose Leaf Security Weekly, Issue 9: Happy Friday! We hope you had a good Halloween and didn't get any candies laced with marijuana as police departments had been warning about - but of course you didn't, it's an urban legend, much like the fears from a few decades ago about candies… (November 1, 2019)
  • Loose Leaf Security Weekly, Issue 8: Did you know that October is National Cybersecurity Awareness Month? We just found out, though we try to be aware of cybersecurity all the time. It feels a lot like having a tea month when you could be drinking delicious tea all year. (Did you know… (October 25, 2019)

See all of our articles sorted by release date, most recent first.