This Conversation Could Save You Thousands of Dollars
Quick Read
Summary
Takeaways
- ❖Cybercrime is the third-largest economy globally, surpassing Germany and Japan combined.
- ❖Every online action builds a 'digital footprint' that is recorded and potentially exploited.
- ❖Incognito mode does not hide your activity from websites; it only prevents local browser history storage.
- ❖Free public Wi-Fi is often unencrypted, allowing others to view your data.
- ❖Software updates primarily patch security vulnerabilities and 'holes' that hackers exploit.
- ❖Never use your real birthday, name, or phone number online if not essential; create an alternate persona.
- ❖Avoid posting vacation photos while still away to prevent social engineering and home burglaries.
- ❖Do not save login information in unencrypted notes or directly in your browser.
- ❖Security questions (e.g., mother's maiden name) are easily discoverable via open-source intelligence (OSINT).
- ❖Unplug from public USB chargers to avoid 'juice jacking,' which can extract data or install malware.
- ❖Do not assume hackers aren't interested in you; they target easy opportunities for money.
- ❖The top two hacking methods are reusing passwords and sophisticated call/phishing scams.
- ❖Implement a family 'safe word' to verify identities during potential voice cloning scams.
- ❖Be wary of Venmo scams where money is sent from stolen cards, then requested back.
- ❖Prioritize credit card use over debit cards for better fraud protection.
- ❖After a data breach, immediately update passwords, enable multi-factor authentication, and freeze your credit.
- ❖Parents should use child accounts, block messages, and set apps to private mode on their children's devices.
- ❖Turn off the ability to enable airplane mode from your phone's lock screen to prevent thieves from disabling tracking.
- ❖Use AI tools like ChatGPT to summarize lengthy privacy policies and identify data collection practices.
- ❖Regularly review app permissions for camera, microphone, and location access, turning off what isn't essential.
Insights
1Cybercrime's Scale and Personal Impact
The cybercrime economy is the world's third-largest, generating more revenue than the economies of Germany and Japan combined. This scale means cyber scams are not a matter of 'if' but 'when' for individuals. People often feel shame after being scammed, which prevents open discussion and proactive protection.
Caitlyn Sarian states, 'cyber scams are massive right now. And actually, that economy is the third largest economy in the world.' She adds, 'It's more than I think Germany and Japan's economy combined. So, it's not a matter of if it happens to people, it's a matter of when.'
2Digital Footprint and Incognito Mode Misconceptions
Your 'digital footprint' encompasses every online action, including apps, games, websites, and accounts. All this data is recorded. Contrary to popular belief, incognito mode only prevents your browser from saving cookies and tags locally; websites still track your activity.
Sarian defines cyber security as 'protecting your digital footprint. And your digital footprint is pretty much every single thing you do online.' She clarifies incognito mode: 'That is incognito for your browser... that website is still able to see that you went on that website.'
3The Dangers of Free Wi-Fi and Unsecured Connections
Free Wi-Fi is not truly 'free'; you are the product, with your data being collected and sold. Open public Wi-Fi is often unencrypted, meaning data transmitted (like banking information or private messages) can be intercepted by skilled individuals. Websites with 'HTTP' instead of 'HTTPS' (the 's' stands for secure) are particularly vulnerable.
Sarian states, 'If there's any free product or app, you are the product.' She explains that on open Wi-Fi, messages are 'flying through cyerspace' unencrypted, allowing anyone 'to go in and out of that tunnel and see what you're doing.' She highlights 'HTTPS' as the indicator for a secure website.
4Software Updates as Security Patches
Many software updates are not just for new features but are critical security patches. They fix 'holes' or vulnerabilities that hackers have discovered and exploited. Enabling automatic updates ensures these flaws are quickly addressed, strengthening your digital defenses.
Sarian explains, 'The way that software updates work is usually the software has a hole in it, like a flaw, a vulnerability... The reason why a lot of software updates happen is to patch that hole.' She estimates '90% of software updates are to to fix some type of bug or vulnerability.'
5Juice Jacking and USB Charging Risks
Plugging your phone into public USB charging ports (e.g., in hotels or airports) can expose you to 'juice jacking.' When you 'trust this device' to charge, it can also send and receive data, potentially allowing malicious actors to download information or install malware onto your phone. Charging directly from a wall outlet avoids this risk.
Sarian describes 'juice jacking' where public USB plugs, when 'trusted,' can 'send and receive things from that port.' She advises, 'Just plug it into a wall. That can't happen in a wall.'
6Password Vulnerabilities and Scammer Psychology
Reusing passwords or using slight variations of a 'base password' (e.g., 'password1', 'password123') makes accounts highly vulnerable. Hackers use algorithms to generate thousands of variations in seconds. Scammers also exploit human psychology, creating urgent, fear-based scenarios (e.g., impersonating law enforcement) to pressure victims into making rash decisions, often involving crypto payments.
Sarian explains hackers can 'run 10 algorithm that runs 10,000 variations of that base password that was leaked' to access accounts. She details scam calls where impersonators 'know exactly like the psychology behind getting you to react,' using threats of arrest and demanding crypto.
7Protecting Against Identity Theft with Credit Freezes
In the event of a data breach, identity theft is a primary concern. Freezing your credit with the three major credit bureaus (Experian, Equifax, TransUnion) prevents new accounts from being opened in your name. This is a simple, free, 'one-and-done' action that can be temporarily unfrozen when needed for loans or new credit cards.
Sarian advises, 'The main thing I tell people freeze your credit because the issue with those like breaches is identity theft.' She notes, 'they can't commit identity theft if they can't open any accounts in your name and they won't be able to open accounts in your name if you freeze your credit.'
8Voice Cloning and Family Safe Words
Sophisticated voice cloning scams use publicly available audio (podcasts, social media) to impersonate individuals and trick loved ones into sending money. Implementing a family 'safe word' provides a crucial verification mechanism to confirm a caller's identity during suspicious interactions.
Sarian describes scammers 'using our voice from public podcast episodes, TV shows, whatever... to stitch together a few words and try to scam your loved ones.' She suggests a 'safe word' so a family member can ask, 'Can you please tell me your family safe word?'
9The Venmo Scam Mechanism
A prevalent Venmo scam involves fraudsters sending money from stolen credit cards to a victim, then claiming it was a mistake and requesting the money back. When the original stolen card transaction is reversed, the victim is left out of pocket because they willingly sent their own money to the scammer.
Sarian details how scammers 'send you money on Venmo... from stolen cards' and then ask, 'Can you please send the money back?' She explains, 'because it's a stolen card, those charges get reversed, but you don't get reversed because you willingly sent them the money.'
10Camera Hacking and Physical Covers
Cameras on laptops, doorbells, and baby monitors are vulnerable to hacking, especially if passwords are reused or if they're connected to open, unsecured Wi-Fi networks. Hackers can gain access to view or even speak through these cameras. A simple, inexpensive camera cover for laptops is a basic physical defense.
Sarian warns that if 'you're reusing passwords... they just mess with you and they can like talk through the camera. They can watch the camera.' She recounts a story of an old boss whose laptop camera was hacked, and advises, 'I just put on a camera cover.'
11AI for Privacy Policy Analysis
Privacy policies are intentionally complex and legalistic, making it difficult for users to understand what data is being collected and shared. Utilizing AI tools like ChatGPT, Gemini, or Perplexity to summarize these policies can quickly reveal red flags regarding sensitive data collection (e.g., biometric, health) and third-party sharing.
Sarian suggests, 'I take that privacy policy, I actually throw it into chat GBT or Gemini or Perplexity... and I say, 'Hey, can you please tell me like the highlevel issues that like might come about like what are they collecting?'' She notes policies are 'meant to confuse you.'
12Managing App Permissions
Many apps automatically gain extensive permissions upon installation, including access to your camera, microphone, and precise location. These permissions allow apps like Instagram, Facebook, and TikTok to scan your camera roll for content ideas, even unposted photos. Regularly reviewing and limiting these permissions ('only while using the app' or 'limit access to one photo') is crucial.
Sarian advises checking if an app 'has access to your camera? Does it have access to your microphone? And does it have access to your location? All three of those things. If it doesn't need it, turn it off.' She cites social media apps 'scanning the camera roll that you have not posted to give you ideas.'
Bottom Line
AI is being used to scrape public data (wedding registries, social media, news) to build comprehensive profiles in seconds, making it easy to answer security questions or craft highly personalized scams.
Traditional security questions based on personal facts are no longer secure. This necessitates creating 'alternate personas' with made-up answers for online accounts to prevent easy data exploitation.
Develop AI-powered tools that proactively identify and alert users to their publicly exposed personal data across various platforms, offering automated deletion or obfuscation services.
Biometric data (facial scans, fingerprints, eye patterns) is unique and unchangeable, making its compromise highly problematic. Wearable technology collects extensive personal health and behavioral data, which can be aggregated by AI to create deep individual profiles.
Users must weigh the convenience of biometric authentication (e.g., TSA PreCheck) against the permanent risk of its compromise. Extreme privacy-conscious individuals may opt out of wearables or use tools like infrared-shielding glasses to disrupt biometric surveillance.
Innovate in personal biometric data protection, offering secure, decentralized storage or 'on-device' processing that prevents data from leaving the user's control. Create consumer-friendly privacy hardware that actively disrupts surveillance without hindering device functionality.
The ability to turn off airplane mode from a locked phone screen is a critical vulnerability, as thieves immediately use it to prevent tracking. Disabling this quick-access feature significantly improves the chances of locating a stolen device.
This small, often overlooked setting is a significant security oversight in smartphone design. Changing this setting is a simple, high-impact action to protect a lost or stolen phone.
Smartphone manufacturers could enhance default security settings to prevent quick disabling of tracking features from locked screens, making it a standard 'out-of-the-box' protection.
Lessons
- Update all key account passwords to be strong and unique; enable multi-factor authentication (MFA) using an authenticator app, not SMS.
- Enable automatic software updates on all devices and applications to ensure immediate patching of security vulnerabilities.
- Freeze your credit with Experian, Equifax, and TransUnion to prevent identity theft; unfreeze only when necessary for new loans or credit.
- Pause for 9 seconds before clicking any link in emails or messages; if unsure, call the sender directly using a verified number.
- Limit your online digital footprint by using an alias/alternate persona for non-essential sign-ups, and consider using data deletion services like Incogn to scrub personal information from the internet.
- Review app permissions on your phone, specifically for camera, microphone, and location access, and turn off anything not essential for the app's function.
- Set a family 'safe word' to verify identities during suspicious calls or messages, especially those involving urgent money requests.
- Avoid public USB charging ports; use a wall outlet or your own power bank.
- Do not answer calls from unknown numbers, and remove your name from your voicemail greeting to prevent voice cloning and data confirmation.
- Be skeptical of any unsolicited money transfers (e.g., Venmo) and never send money back to unknown senders.
The 5 Essential Cyber Security Routines
**Passwords:** Identify all key online accounts (banks, social media, email) and create strong, unique passwords for each. Enable multi-factor authentication (MFA) wherever possible, preferably using an authenticator app. Consider a password manager or a locked note on your phone for storage.
**Software Updates:** Turn on automatic software updates for all operating systems, applications, and devices. These updates frequently patch security vulnerabilities that hackers exploit.
**Freeze Your Credit:** Contact the three major credit bureaus (Experian, Equifax, TransUnion) to freeze your credit. This prevents identity thieves from opening new accounts in your name. You can temporarily unfreeze it when you need to apply for credit.
**9-Second Rule:** Before clicking any link in an email or message, pause for 9 seconds. Use this time to inspect the sender's email address, hover over the link to see the URL, and consider if the request is legitimate. If in doubt, call the sender directly using a known, verified number.
**Limit Online Data:** Reduce your digital footprint by creating an 'alternate persona' (different name, phone number, email) for non-essential online sign-ups. Utilize data deletion services (e.g., Incogn) to remove your personal information from data broker websites. Regularly review and limit app permissions for camera, microphone, and location access.
Notable Moments
Caitlyn's manager received a handwritten letter with a picture of her house, threatening extortion because her address was publicly available online.
This illustrates the extreme real-world danger of publicly available personal information and how scammers use OSINT to target individuals with highly personalized threats.
A follower of Caitlyn's had their baby monitor hacked, with a random man's voice heard talking to the baby, due to password reuse.
This highlights the terrifying vulnerability of smart home devices and the critical importance of unique, strong passwords for all connected cameras and monitors.
An Olympic-bound teenage athlete was extorted after sharing private photos with someone he thought was a 'cute girl' he met online, who was actually a scammer.
This emphasizes the severe risks of online interactions for children and teenagers, particularly 'sextortion' scams, and the need for open communication and parental oversight.
Quotes
"Cyber security is not for experts. It's literally for everyone. We use it every day and it's not supposed to be a scary word."
"It's not a matter of if it happens to people, it's a matter of when."
"If there's any free product or app, you are the product."
"Password is the number one most popular password that is still used to this day."
"Everyone is going to be an easy target because we were never taught how to protect ourselves."
Q&A
Recent Questions
Related Episodes

Bombing Beirut, Back To Butler & Melania’s Mission | The Tim Dillon Show #491
"Tim Dillon offers his unfiltered, satirical takes on Trump's alleged staged assassination, Israel's 'total war' in Beirut, California's tech-driven economic disparity, the existential threat of AI, and Melania Trump's defense against Epstein allegations."

PBS News Hour full episode, April 9, 2026
"This episode unpacks the fragile US-Iran truce, Israel's strikes in Lebanon, the dangers of Anthropic's powerful new AI model 'Mythos,' and Ukraine's escalating military desertion crisis."

Banker Launders Millions for Colombian Cartel
"Raised in a Colombian cartel family, a young banker leverages his position to launder millions for drug traffickers, only to face arrest, a four-year legal battle, and a profound spiritual transformation."

Trump PANICS as TOP AIDES make CONFESSION ON WAR!!!
"Top aides to Donald Trump are allegedly confessing that the war in Iran is catastrophic and not being won, while Trump remains detached and makes controversial military leadership changes."