{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Threat Talks - Your Gateway to Cybersecurity Insights","title":"Resilience Over Fragmentation: The Risk You Can’t Ignore","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/fd554f4d\"></iframe>","width":"100%","height":180,"duration":3386,"description":"The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.Real examples you’ll hear:• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.• How your address book upload leaks other people’s data to platforms.• Why secure doesn’t mean private on platforms that profit from your data.• Age checks done right: passport chip + selective disclosure instead of oversharing.• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.Related ON2IT Content & Referenced Resources• ON2IT: https://on2it.net/• Threat Talks: https://threat-talks.com/• AMS-IX: https://www.ams-ix.net/ams• Yivi (privacy-preserving authentication): https://yivi.app/• PubHubs (privacy-first social platform): https://pubhubs.net/• European alternatives (mentioned): http://european-alternative.eu/• Privacy tools (mentioned): https://privacytools.io/Guest and Host Links: Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ Bart Jacobs: http://www.cs.ru.nl/~bart/If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat...","thumbnail_url":"https://img.transistorcdn.com/zxiRQtIn39fLuEqIC458HdYTjdufBy-QMdJtCYFz97Y/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xN2Q1/NGE1NjBhYWY0ZmY5/NzEyODA5OGU3NDdi/MmNmYi5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}