Listen "Resilience Over Fragmentation: The Risk You Can’t Ignore"
Episode Synopsis
The internet promised freedom. Now it monetizes you. The trade-off? Convenience for control.In this episode, Lieuwe Jan Koning and Prof. Jacobs reveal how scattered tools like meta and X create security gaps—and how one policy, fewer interfaces, and less data shared cut exposure and keep operations running.Real examples you’ll hear:• The neighborhood chat stuck on WhatsApp—and how switching to Signal breaks dependency.• How your address book upload leaks other people’s data to platforms.• Why secure doesn’t mean private on platforms that profit from your data.• Age checks done right: passport chip + selective disclosure instead of oversharing.• Patient groups and municipalities using PubHubs for private, verified rooms (no ads).• Continuity risk in the real world: federated login outages, US-dependent authenticators, transatlantic cable cuts, and a court moving email to ProtonMail to stay operational.(00:00) - – Free vs. monetized internet
(02:22) - – Facebook: secure ≠ private
(05:31) - – WhatsApp vs. Signal trade-offs
(07:05) - – Metadata & social graph risk
(11:58) - – Attribute-based auth (Yi)
(19:55) - – Decentralized login; split keys
(28:11) - – PubHubs: private, verified rooms
(49:54) - – Continuity: vendor/cable risk
(56:01) - – Close & takeaways
Related ON2IT Content & Referenced Resources• ON2IT: https://on2it.net/• Threat Talks: https://threat-talks.com/• AMS-IX: https://www.ams-ix.net/ams• Yivi (privacy-preserving authentication): https://yivi.app/• PubHubs (privacy-first social platform): https://pubhubs.net/• European alternatives (mentioned): http://european-alternative.eu/• Privacy tools (mentioned): https://privacytools.io/Guest and Host Links: Lieuwe Jan Koning (ON2IT Co-Founder): https://www.linkedin.com/in/lieuwejan/ Bart Jacobs: http://www.cs.ru.nl/~bart/If this helped you strengthen your Zero Trust policy, subscribe, like, and share. New episodes weekly. Follow Threat Talks on YouTube, Spotify, and Apple Podcasts.Click here to view the episode transcript.
🔔 Follow and Support our channel! 🔔=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
More episodes of the podcast Threat Talks - Your Gateway to Cybersecurity Insights
WSUS RCE: Update Weaponized
16/12/2025
From Hacker to Hero
03/12/2025
The Npm Worm Outbreak
25/11/2025
Inside the SalesLoft Breach
18/11/2025
The Secret Diplomats Fighting Cyber Wars
04/11/2025
Patch Smarter, Not Harder
28/10/2025
Why Your Cyber Hygiene Matters?
14/10/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.