
Free Daily Podcast Summary
The most recent episodes — sign up to get AI-powered summaries of each one.
KDE Linux marks the desktop environment team's first official operating system release, breaking away from three decades of dependence on third-party Linux distributors. This immutable distribution delivers KDE's software directly to users without the modifications, delays, and political interference that have historically plagued desktop Linux experiences. The new operating system employs an immutable architecture that maintains five cached system versions, allowing users to instantly revert problematic updates without reinstalling or lengthy troubleshooting sessions. This approach eliminates common Linux distribution issues including package conflicts, broken updates, and configuration inconsistencies between different installations. While core system components remain protected, users retain complete control over their home directories and software installation through Flatpak, Snap, AppImage, and containerized environments. KDE Linux addresses longstanding frustrations with traditional distribution models where users receive filtered, modified versions of KDE software months after upstream releases. Distribution maintainers previously applied their own configurations, branding, and political preferences, creating inconsistent experiences that didn't reflect KDE developers' original vision. The direct delivery model ensures users experience authentic KDE implementations without compromises dictated by downstream distributor agendas. Developers benefit significantly from the streamlined development environment, saving 45GB of storage space compared to traditional source building configurations. Compilation times decrease dramatically since only modified components require rebuilding rather than entire dependency chains. Most importantly, developers can test code in identical environments where end users will actually run their software, eliminating bugs that only appear in specific configurations. The official distribution enables KDE to establish direct relationships with hardware manufacturers without showing favoritism toward particular Linux distributions. Future enhancements include automatic home directory encryption and intuitive backup systems using btrfs technology. While the centralized model creates potential supply chain vulnerabilities, it provides stronger protection against system-level attacks compared to traditional mutable distributions that allow extensive system modifications. Show more ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Introduction to KDE Linux Discussion 01:31 How Distros Modified KDE for 30 Years 02:59 KDE's Immutable System Architecture 03:38 Software Installation Through Multiple Methods 03:51 Developer Benefits and Space Savings 04:36 Testing Code in Real User Environments 04:43 Wayland Technology Discussion 10:04 VirtualBox Compatibility Issues 11:05 Direct Hardware Manufacturer Relationships 12:30 Immutable Architecture Reliability Benefits #kde #linux #distro ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: [email protected] 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: <a href="https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S" targe
A dying cancer patient lost $32,000 in medical funds when Steam-hosted malware drained his crypto wallet during a live broadcast. The game "Block Blasters" appeared legitimate on Steam's platform but contained sophisticated crypto-draining malware targeting browser wallets like Phantom and Solflare. rastalandTV, battling stage four cancer, desperately needed creator fees from his meme coin to fund treatment after his family went bankrupt from medical costs. Scammers specifically researched his condition, tracked his streaming schedule, and crafted their social engineering attack to exploit his financial desperation. The malware activated instantly when he downloaded the executable directly from Steam during his livestream. Despite receiving over 100 user reports about the malicious game, Valve's removal process crawled at bureaucratic speed while real victims suffered financial damage. The malware remained available for download on Steam's platform, proving their security promises worthless. Steam Workshop hosts similar malware threats for games like Cities Skylines, revealing Valve's platform has become a commercialized malware distribution system with minimal oversight. Within hours, over 50 malware researchers and OSINT specialists mobilized independently. VirusUnderground and cybersecurity professionals reverse-engineered the attack, identified the criminals in Argentina, and exposed their entire operation faster than any corporate security team or government agency could respond. They traced the thieves through telegram accounts, Steam identities, and cryptocurrency wallet addresses after the criminals made critical operational security mistakes. The crypto community immediately rallied. Alex Becker donated $32,500 to replace the stolen funds completely, while EasyEatsBodega contributed another $10,000. The cancer token's market cap surged to $632,000 through pure solidarity, generating new creator fees for treatment. The attackers learned a critical lesson: targeting vulnerable cancer patients triggers the internet's most dangerous hunters who work faster and more effectively than institutions that failed to protect innocent victims. Show more ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Cancer Patient Needs Medical Funds From Crypto 01:42 Stage Four Cancer Destroys Family Finances 02:58 Steam Game Offers Easy Money To Dying Man 04:24 Block Blasters Malware Drains $32K Live On Stream 06:41 Cancer Patient Watches Life Savings Stolen 08:20 Crypto Community Replaces Stolen Medical Funds 11:42 Internet Researchers Hunt Down Steam Scammers 14:17 Malware Analysis Exposes Criminal Operation 16:15 Steam Ignores 100 Reports While Victims Suffer 18:33 Cancer Patient Recovers From Steam Security Failure 22:00 Why Internet Justice Beats Corporate Security #scam #crypto ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: [email protected] 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: https://www.amazon.com/stores/Sam-Bent/
Sources: https://www.sambent.com/the-surveillance-architect-running-signal-engineering Signal just rolled out centralized backups, and the guy who announced it has quite the resume. Jim O'Leary, Signal's VP of Engineering since 2019, spent the previous eight years building surveillance infrastructure at Twitter and Facebook. Show more At Twitter from 2011-2015, O'Leary built behavioral anomaly detection systems—essentially surveillance to track and flag "unusual" user activity. Perfect timing for the Arab Spring when governments desperately needed to track protesters. Then he went straight to Facebook during their worst privacy scandals from 2015-2019, managing security teams with multimillion-dollar budgets and running their "Privacy IMOCs"—the damage control teams that handled Cambridge Analytica, the Onavo VPN spying operation that Apple banned, and the $5 billion FTC fine. This is the same guy who helped Facebook eliminate competition by absorbing WhatsApp and Instagram into their surveillance machine. When Facebook bought WhatsApp for $19 billion, O'Leary was there ensuring they could properly surveil those 2 billion new users. He literally managed the fake privacy tool Onavo VPN that secretly spied on teenagers to track competing apps. Now he's implementing Signal's new backup system that stores your entire message history on their servers, protected by a single key you're supposed to write down somewhere. No local backup option. Just centralized storage with paid tiers creating financial records through payment processors. Signal knew their desktop encryption keys were stored in plaintext for six years and only fixed it after public outrage. Commercial forensics tools routinely decrypt Signal databases from seized devices. Yet instead of fixing these fundamental security issues, they're building centralized repositories of user communications under the guidance of Facebook's former surveillance architect. The revolving door between surveillance capitalism and "privacy" organizations couldn't be more obvious. ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Signal's New Centralized Backup Feature 01:21 Who The Hell Is Jim O'Leary? 05:08 Building Twitter's Behavioral Surveillance Systems 06:05 Managing Facebook During Cambridge Analytica 08:17 Running Facebook's Privacy Damage Control Teams 09:25 The Onavo VPN Spying Operation 11:29 Microsoft Health Vault and Medical Surveillance 13:29 The Pattern Across Jim's Career 17:02 Signal's Desktop Keys Stored in Plaintext for 6 Years 22:25 Commercial Forensics Already Crack Signal 26:51 The Backup Key Vulnerability 29:19 Payment Records Create Surveillance Trail 31:41 Metadata Correlation Attacks 33:46 Why No Local Backup Option? 35:54 Cross-Platform Restore Security Nightmare 38:38 Signal Complies With Every Court Order 40:17 Your Backups Become Evidence Archives 42:01 Operational Security Recommendations 43:32 Final Thoughts on Privacy Theater #signal #privacy ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: <a href="https://www.facebook.com/TheOfficialSamBent/" target="_blank" rel="noopener noref
Apple just delivered a crushing blow to government surveillance overreach. The UK government secretly demanded that Apple build a permanent backdoor into iCloud encryption that would have compromised the privacy of millions of users worldwide. This wasn't about unlocking one phone for a specific case. British authorities wanted Apple to completely redesign its Advanced Data Protection feature to give governments permanent access to encrypted photos, messages, and personal data stored in iCloud. The demand came through something called a Technical Capabilities Notice under the UK's notorious "Snoopers Charter" law. Apple refused to comply and chose a brilliant resistance strategy instead. Rather than building backdoors, the company simply disabled advanced encryption for all new UK iCloud users. This move exposed the government's surveillance demands to public scrutiny and forced British officials to explain why their citizens deserved weaker privacy protection than users in other countries. The turning point came when US intelligence agencies intervened. Trump administration officials, including Director of National Intelligence Tulsi Gabbard, pressured the UK to abandon their backdoor demands. American lawmakers warned that weakening Apple's encryption would create security vulnerabilities that could be exploited by foreign adversaries and criminal hackers. This victory proves that determined resistance against surveillance overreach actually works. Apple's willingness to accept business costs and legal risks rather than compromise user security sent a clear message to governments worldwide: backdoor demands will face fierce opposition. The UK's humiliating retreat establishes an important precedent. Other governments considering similar surveillance demands now know they'll face significant pushback from both tech companies and international allies. While the broader war over encryption continues, Apple's successful resistance demonstrates that privacy advocates can win major battles against the surveillance state when they refuse to back down. Show more ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Surveillance State Suffers a Setback 00:54 Most Significant Privacy Victory Since San Bernardino 01:49 UK Demands Global Backdoor Access to iCloud 02:16 The Technical Capabilities Notice Under Snoopers Charter 03:07 How the Snoopers Charter Legislation Passed 03:44 Apple Disables Advanced Data Protection in UK 05:40 Escalation Beyond the San Bernardino Case 06:38 American Intervention Proves Decisive 08:44 Congressional Warning About Foreign Cyber Attack 10:53 Why Meta and Google Received No Similar Demands 12:00 Legal Framework Enabling Government Coercion 15:07 Apple's Transparency Strategy Forces Accountability #privacy #uk ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: contact@sambent.com 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: https://www.amazon.com/stores/Sam-Bent/autho
Your "secure" 16-character password gets cracked in seconds while someone's "password123" remains unbreakable for decades. The difference isn't complexity—it's key stretching, the billion-dollar security method most companies refuse to implement. Banks, social media platforms, and major corporations store your passwords like amateurs, prioritizing server speed over your security. Meanwhile, a properly configured WordPress blog offers better protection than Fortune 500 companies. Key stretching transforms each password guess from microseconds into expensive computational warfare, forcing attackers to burn thousands in electricity and hardware per attempt. This economic barrier terrifies surveillance agencies more than encryption. The NSA complains about "going dark" when criminals use proper password storage because dragnet surveillance becomes financially impossible. Mass data breaches depend on weak security to remain profitable—fix the storage, collapse the entire stolen credential marketplace. Modern algorithms like Argon2 and bcrypt weaponize mathematics against attackers, making graphics cards useless and specialized cracking hardware economically stupid. Yet companies choose profit margins over protection, leaving users vulnerable while claiming they care about security. Your operational security depends on understanding why password strength comes from cost, not complexity. Choose services that implement proper key stretching or remain defenseless against billion-dollar surveillance operations. Show more ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00 Why Your Password Doesn't Matter 01:20 How Password Storage Actually Works 03:40 The Evolution of Key Stretching Algorithms 05:27 How Companies Screw You Over 08:16 Economic Warfare Against Surveillance #password #opsec #infosec ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: contact@sambent.com 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S 🌐 Dread (Onion Link): http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/doingfedtime 🌐 Pitch (Onion Link): http://pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@doingfedtime 🐙 GitHub: https://github.com/DoingFedTime 👾 Reddit (User Account): https://www.reddit.com/user/reservesteel9/ 📽️ Rumble: https://rumble.com/c/SamBent 🛡️ Breach Forums (Onion Link): http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/User-SamBent 📸 Instagram: https://www.instagram.com/sambentoffical/ 📌 Pinterest: <a href="https://www.pinterest.com/DoingFedTime/" target="_blank" re
Your "secure" 16-character password gets cracked in seconds while someone's "password123" remains unbreakable for decades. The difference isn't complexity—it's key stretching, the billion-dollar security method most companies refuse to implement. Banks, social media platforms, and major corporations store your passwords like amateurs, prioritizing server speed over your security. Meanwhile, a properly configured WordPress blog offers better protection than Fortune 500 companies. Key stretching transforms each password guess from microseconds into expensive computational warfare, forcing attackers to burn thousands in electricity and hardware per attempt. This economic barrier terrifies surveillance agencies more than encryption. The NSA complains about "going dark" when criminals use proper password storage because dragnet surveillance becomes financially impossible. Mass data breaches depend on weak security to remain profitable—fix the storage, collapse the entire stolen credential marketplace. Modern algorithms like Argon2 and bcrypt weaponize mathematics against attackers, making graphics cards useless and specialized cracking hardware economically stupid. Yet companies choose profit margins over protection, leaving users vulnerable while claiming they care about security. Your operational security depends on understanding why password strength comes from cost, not complexity. Choose services that implement proper key stretching or remain defenseless against billion-dollar surveillance operations.
For over 10 years, he's operated at every level of darknet markets - from carding forums to multi-million dollar platforms. This is the unfiltered reality they don't teach you: Show more The evolution of scams: From simple carding to sophisticated exit strategies that still work today Infrastructure insights: How markets really operate behind the scenes (and why they always collapse) Psychological warfare: How one forged document can destroy a marketplace overnight The Christmas Massacre: An inside look at the 45-minute market implosion that changed everything DEF CON's darknet challenge: What really happened that year He'll share never-before-seen screenshots, chat logs, and operational details that reveal why no market lasts forever. Whether you're a researcher, journalist, or just curious - this is the uncensored history of the darknet's most infamous moments. References: Wired — "The Most Dangerous People on the Internet" Darknet Diaries Podcast — Episodes on Youtube Dread Forum Archives — Market complaints, phishing post-mortems PGP-Verified Statements — Active market admins & Dread staff DEF CON 30 Darknet Contest Reports — Post-event analysis Chainalysis Crypto Crime Reports — Wallet manipulation trends Godman666 godman666 has operated in the darknet’s criminal underbelly for over a decade. Starting with carding at 16, he moved to spam operations before rising through Silk Road and Tor carding forums. He built phishing empires, sold hacking tools, and ran infrastructure for major markets—including engineering the darknet’s largest phishing operation after a fallout with Empire Market’s staff. A backend role at a top market later ended in financial sabotage (ask about Christmas 2019). Recognized in Wired’s "The Most Dangerous People on the Internet" (2022), he shifted to offshore legal warfare takedown arbitrage, Wikipedia edits, and creative compliance. DEF CON’s Darknet Market Contest? Sabotaged by a hangover. Show less
Sacramento residents discovered their utility company has been secretly feeding their private energy data to police without warrants, leading to a massive surveillance operation that generated $94 million in fines. This explosive investigation reveals how SMUD transformed smart meters into government spy devices, monitoring when you shower, sleep, or use appliances. Show more Innocent homeowners faced armed police raids for using electricity to power medical equipment or mine cryptocurrency. One resident was forced outside in his underwear at gunpoint, while another disabled veteran was threatened with arrest for refusing warrantless entry. The surveillance threshold dropped dramatically from 7,000 to just 2,800 kilowatt hours per month, making air conditioning use suspicious in Sacramento's brutal heat. Internal documents expose how SMUD analysts actively mined customer data for police, checking over 10,000 homes in a single month. Despite California law explicitly prohibiting utilities from sharing precise meter data without warrants, SMUD violated these protections daily for a decade. The Electronic Frontier Foundation's lawsuit could reshape smart meter privacy nationwide. With the October 2025 court decision approaching, every American with a smart meter needs to understand how their utility company might be spying on them right now. ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Sacramento's Secret Smart Meter Surveillance Program 02:18 How SMUD Violated State Law for a Decade 04:20 Supreme Court Precedent: Why This Violates Your Rights 07:44 The October 2025 Court Case That Changes Everything 09:08 From Drug Enforcement to Mass Surveillance #smartmeter #privacy #EFF ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: contact@sambent.com 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S 🌐 Dread (Onion Link): http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/doingfedtime 🌐 Pitch (Onion Link): http://pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@doingfedtime 🐙 GitHub: https://github.com/DoingFedTime 👾 Reddit (User Account): https://www.reddit.com/user/reservesteel9/ 📽️ Rumble: https://rumble.com/c/SamBent 🛡️ Breach Forums (Onion Link): http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/User-SamBent 📸 Instagram: https://www.instagram.com/sambentoffical/ 📌 Pinterest: https://www.pinterest.com/DoingFedTime/ ☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆ The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. By watchin
Free AI-powered daily recaps. Key takeaways, quotes, and mentions — in a 5-minute read.
Get Free Summaries →Free forever for up to 3 podcasts. No credit card required.
Listeners also like.
HELLO! Welcome to my page! I'm Sam Bent. Thanks for stopping by! Activist, Defcon Speaker, Author, Hacker, ExDarknet Vendor, Youtuber, Coffee Addict, and all around Nerd. On this channel, I talk about a lot of stuff, mostly stuff centered around in
AI-powered recaps with compact key takeaways, quotes, and insights.
Get key takeaways from DoingFedTime in a 5-minute read.
Stay current on your favorite podcasts without falling behind.
It's a free AI-powered email that summarizes new episodes of DoingFedTime as soon as they're published. You get the key takeaways, notable quotes, and links & mentions — all in a quick read.
When a new episode drops, our AI transcribes and analyzes it, then generates a personalized summary tailored to your interests and profession. It's delivered to your inbox every morning.
No. Podzilla is an independent service that summarizes publicly available podcast content. We're not affiliated with or endorsed by DoingFedTime.
Absolutely! The free plan covers up to 3 podcasts. Upgrade to Pro for 15, or Premium for 50. Browse our full catalog at /podcasts.
DoingFedTime covers topics including News. Our AI identifies the specific themes in each episode and highlights what matters most to you.
Free forever for up to 3 podcasts. No credit card required.
Free forever for up to 3 podcasts. No credit card required.