{"id":95946,"date":"2022-08-04T02:17:26","date_gmt":"2022-08-04T09:17:26","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95946"},"modified":"2022-08-04T02:17:26","modified_gmt":"2022-08-04T09:17:26","slug":"tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/","title":{"rendered":"Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251"},"content":{"rendered":"<p>Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+GipEyApq?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Tom Cruise is showing up everywhere: landing his helicopter in an English family&#8217;s garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers. <\/p>\n<ul>\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/av\/uk-england-coventry-warwickshire-58322732\" target=\"_blank\" rel=\"noopener\">&#8216;Tom Cruise is in my Warwickshire garden&#8217;<\/a><\/li>\n<li><a href=\"https:\/\/pagesix.com\/2022\/08\/02\/tom-cruise-apologizes-for-ruining-couples-hike-before-jumping-off-cliff\/\" target=\"_blank\" rel=\"noopener\">Tom Cruise apologizes for interrupting couple\u2019s hike before jumping off cliff<\/a><\/li>\n<li><a href=\"https:\/\/www.expressvpn.com\/blog\/how-to-spot-a-deepfake-video\/\" target=\"_blank\" rel=\"noopener\">How to spot a deepfake video &#8211; featuring Tom Cruise as Iron Man<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/07\/29\/app-store-fake-crypto-apps-letter\/\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s App Store Comes Under the Spotlight for How It Handles Fake Crypto Apps<\/a><\/li>\n<li><a href=\"https:\/\/privacyis1st.medium.com\/abuse-of-the-mac-appstore-investigation-6151114bb10e\" target=\"_blank\" rel=\"noopener\">Investigation report about the abuse of the Mac App Store<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2022\/07\/29\/iphone-sideloading-malware-android\/\" target=\"_blank\" rel=\"noopener\">Apple blasts Android malware in fierce pushback against iOS sideloading<\/a><\/li>\n<li><a href=\"https:\/\/onestore.nokia.com\/asset\/210870\" target=\"_blank\" rel=\"noopener\">Nokia Threat Intelligence Report 2021<\/a><\/li>\n<li><a href=\"https:\/\/www.techradar.com\/news\/google-pushes-back-deadline-for-killing-tracking-cookies-in-chrome\" target=\"_blank\" rel=\"noopener\">Google pushes back deadline for killing off third-party cookies in Chrome (again) to H2 2024<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-3-200-apps-leak-twitter-api-keys-some-allowing-account-hijacks\/\" target=\"_blank\" rel=\"noopener\">Over 3,200 apps leak Twitter API keys, some allowing account hijacks<\/a><\/li>\n<li><a href=\"https:\/\/www.cbsnews.com\/news\/earth-spinning-faster-than-usual-shortest-day-ever\/\" target=\"_blank\" rel=\"noopener\">Earth is spinning faster than usual and had its shortest day ever<\/a><\/li>\n<li><a href=\"https:\/\/www.ietf.org\/timezones\/data\/leap-seconds.list\" target=\"_blank\" rel=\"noopener\">Leap Seconds List &#8211; IETF<\/a><\/li>\n<li><a href=\"https:\/\/www.cnet.com\/tech\/computing\/tech-giants-try-banishing-the-leap-second-to-stop-internet-crashes\/\" target=\"_blank\" rel=\"noopener\">Why One Critical Second Can Wreak Havoc on the Internet<\/a><\/li>\n<li><a href=\"https:\/\/engineering.fb.com\/2022\/07\/25\/production-engineering\/its-time-to-leave-the-leap-second-in-the-past\/\" target=\"_blank\" rel=\"noopener\">It\u2019s time to leave the leap second in the past<\/a><\/li>\n<li><a href=\"https:\/\/www.wired.com\/2012\/07\/leap-second-glitch-explained\/\" target=\"_blank\" rel=\"noopener\">The Inside Story of the Extra Second That Crashed the Web<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Year_2038_problem\" target=\"_blank\" rel=\"noopener\">Year 2038 problem<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tom Cruise is showing up everywhere: landing his helicopter in an English family&#8217;s garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Tom Cruise is showing up everywhere: landing his helicopter in an English family&#039;s garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tom Cruise and the Leap Second - Intego Mac Podcast Episode 251 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Tom Cruise is showing up everywhere: landing his helicopter in an English family&#039;s garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T09:17:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/\",\"name\":\"Tom Cruise and the Leap Second - Intego Mac Podcast Episode 251 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage\"},\"datePublished\":\"2022-08-04T09:17:26+00:00\",\"dateModified\":\"2022-08-04T09:17:26+00:00\",\"description\":\"Tom Cruise is showing up everywhere: landing his helicopter in an English family's garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251\",\"datePublished\":\"2022-08-04T09:17:26+00:00\",\"dateModified\":\"2022-08-04T09:17:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage\"},\"wordCount\":264,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Tom Cruise is showing up everywhere: landing his helicopter in an English family's garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/","og_locale":"en_US","og_type":"article","og_title":"Tom Cruise and the Leap Second - Intego Mac Podcast Episode 251 - The Mac Security Blog","og_description":"Tom Cruise is showing up everywhere: landing his helicopter in an English family's garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-08-04T09:17:26+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/","name":"Tom Cruise and the Leap Second - Intego Mac Podcast Episode 251 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage"},"datePublished":"2022-08-04T09:17:26+00:00","dateModified":"2022-08-04T09:17:26+00:00","description":"Tom Cruise is showing up everywhere: landing his helicopter in an English family's garden; interrupting hikers and leaping off a cliff; and even in deepfake videos. We also look at the leap second, and how taking away one second in time could wreak havoc on computers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Tom Cruise and the Leap Second &#8211; Intego Mac Podcast Episode 251","datePublished":"2022-08-04T09:17:26+00:00","dateModified":"2022-08-04T09:17:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#webpage"},"wordCount":264,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/tom-cruise-and-the-leap-second-intego-mac-podcast-episode-251\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oXw","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95946"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95946"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95946\/revisions"}],"predecessor-version":[{"id":95947,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95946\/revisions\/95947"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}