{"id":91685,"date":"2020-06-19T02:29:01","date_gmt":"2020-06-19T09:29:01","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91685"},"modified":"2020-06-26T10:28:50","modified_gmt":"2020-06-26T17:28:50","slug":"we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/","title":{"rendered":"Spies can hear you by watching your light bulb &#8211; Intego Mac Podcast Episode 140"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+-MHfh2WO?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>On this episode of the Intego Mac Podcast\u2026 Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple&#8217;s policies. And spies can eavesdrop by watching the variations in light bulbs.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"https:\/\/nostarch.com\/seriouscrypto\" target=\"_blank\" rel=\"noopener noreferrer\">Serious Cryptography &#8211; A Practical Introduction to Modern Encryption by Jean-Philippe Aumasson<\/a><\/li>\n<li><a href=\"https:\/\/www.wiley.com\/en-gb\/Applied+Cryptography%3A+Protocols%2C+Algorithms+and+Source+Code+in+C%2C+20th+Anniversary+Edition-p-9781119096726\" target=\"_blank\" rel=\"noopener noreferrer\">Applied Cryptography: Protocols, Algorithms and Source Code in C by Bruce Schneier<\/a><\/li>\n<li><a href=\"https:\/\/global.oup.com\/academic\/product\/cryptography-a-very-short-introduction-9780192803153?cc=gb&amp;lang=en&amp;\" target=\"_blank\" rel=\"noopener noreferrer\">Cryptography: A Very Short Introduction, by Fred Piper and Sean Murphy<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/ROT13\" target=\"_blank\" rel=\"noopener noreferrer\">ROT13<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2020\/06\/17\/zoom-does-180-on-encryption-plans-bringing-to-free-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zoom does 180 on encryption plans, will bring it to all users including free accounts in July<\/a><\/li>\n<li><a href=\"https:\/\/blog.zoom.us\/wordpress\/2020\/06\/11\/improving-our-policies-as-we-continue-to-enable-global-collaboration\/\" target=\"_blank\" rel=\"noopener noreferrer\">Improving Our Policies as We Continue to Enable Global Collaboration<\/a><\/li>\n<li><a href=\"https:\/\/www.wired.com\/story\/lamphone-light-bulb-vibration-spying\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spies Can Eavesdrop by Watching a Light Bulb&#8217;s Vibrations<\/a><\/li>\n<li><a href=\"https:\/\/daringfireball.net\/linked\/2020\/06\/16\/hey-iap-app-store-dispute\" target=\"_blank\" rel=\"noopener noreferrer\">Basecamp\u2019s New App, Hey, Flagged In App Store Limbo For Not Using In-app Purchase<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-pros-and-cons-of-apples-ios-app-store\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Pros and Cons of Apple\u2019s iOS App Store<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-mac-malware-reveals-google-searches-can-be-unsafe\/\" target=\"_blank\" rel=\"noopener noreferrer\">New Mac malware reveals Google searches can be unsafe<\/a><\/li>\n<li><a href=\"https:\/\/www.virustotal.com\/gui\/home\/upload\" target=\"_blank\" rel=\"noopener noreferrer\">VirusTotal<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple&#8217;s policies. And spies can eavesdrop by watching the variations in light bulbs.  <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[317,273,3715,613,4581],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple&#039;s policies. And spies can eavesdrop by watching the variations in light bulbs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spies can hear you by watching your light bulb - Intego Mac Podcast Episode 140 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple&#039;s policies. And spies can eavesdrop by watching the variations in light bulbs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T09:29:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-26T17:28:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/\",\"name\":\"Spies can hear you by watching your light bulb - Intego Mac Podcast Episode 140 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage\"},\"datePublished\":\"2020-06-19T09:29:01+00:00\",\"dateModified\":\"2020-06-26T17:28:50+00:00\",\"description\":\"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple's policies. And spies can eavesdrop by watching the variations in light bulbs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spies can hear you by watching your light bulb &#8211; Intego Mac Podcast Episode 140\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Spies can hear you by watching your light bulb &#8211; Intego Mac Podcast Episode 140\",\"datePublished\":\"2020-06-19T09:29:01+00:00\",\"dateModified\":\"2020-06-26T17:28:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage\"},\"wordCount\":226,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"App Store\",\"Encryption\",\"Intego Mac Podcast\",\"Spying\",\"Zoom\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple's policies. And spies can eavesdrop by watching the variations in light bulbs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/","og_locale":"en_US","og_type":"article","og_title":"Spies can hear you by watching your light bulb - Intego Mac Podcast Episode 140 - The Mac Security Blog","og_description":"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple's policies. And spies can eavesdrop by watching the variations in light bulbs.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-06-19T09:29:01+00:00","article_modified_time":"2020-06-26T17:28:50+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/","name":"Spies can hear you by watching your light bulb - Intego Mac Podcast Episode 140 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage"},"datePublished":"2020-06-19T09:29:01+00:00","dateModified":"2020-06-26T17:28:50+00:00","description":"Intego has discovered new malware that propagates through poisoned Google search results. Zoom does a couple more u-turns. An App Store controversy is causing people to question Apple's policies. And spies can eavesdrop by watching the variations in light bulbs.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Spies can hear you by watching your light bulb &#8211; Intego Mac Podcast Episode 140"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Spies can hear you by watching your light bulb &#8211; Intego Mac Podcast Episode 140","datePublished":"2020-06-19T09:29:01+00:00","dateModified":"2020-06-26T17:28:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#webpage"},"wordCount":226,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["App Store","Encryption","Intego Mac Podcast","Spying","Zoom"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/we-cant-be-safe-without-a-faraday-cage-intego-mac-podcast-episode-140\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nQN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91685"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91685"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91685\/revisions"}],"predecessor-version":[{"id":91721,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91685\/revisions\/91721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}