Shadow Markets: Dangers and Risks in Digital Systems Podcast Por Dr Paul Watters arte de portada

Shadow Markets: Dangers and Risks in Digital Systems

Shadow Markets: Dangers and Risks in Digital Systems

De: Dr Paul Watters
Escúchala gratis

OFERTA POR TIEMPO LIMITADO | Obtén 3 meses por US$0.99 al mes

$14.95/mes despues- se aplican términos.

Shadow Markets explores the parts of the digital world that rarely make headlines but have real consequences. From online crime and unsafe technologies to policy blind spots and design failures, each episode translates research into plain-language explanations of how digital systems shape everyday life.


Bought to you by Cyberstronomy Pty Ltd. We work with private and public sector clients in government, law enforcement, banking and finance, education and R&D, to protect critical assets from cyber attacks through research and education.

© 2026 Shadow Markets: Dangers and Risks in Digital Systems
Episodios
  • Episode 3 - Is Your Illicit Streaming Device Part of a Global Botnet?
    Jan 8 2026

    In this episode, we dive into the research behind a growing and largely invisible cyber risk: illicit streaming devices (ISDs) embedded in homes worldwide.

    Building on my recent research paper published on SSRN, this episode explores how low-cost Android-based streaming boxes - often marketed for free or cut-price access to premium content - create systemic cybersecurity, consumer safety, and national-scale risk. For years, researchers suspected these devices were being repurposed as residential proxies, surveillance nodes, and attack infrastructure.

    Now, the Kimwolf botnet provides the smoking gun.

    We examine how Kimwolf demonstrates, at scale, what the research warned about:

    • Millions of compromised Android TV boxes and set-top devices quietly enrolled into a global botnet
    • Devices abused as residential proxy endpoints, masking criminal activity behind ordinary households
    • Botnet-driven DDoS attacks measured in tens of terabits per second
    • A supply chain problem where insecure firmware, abandoned updates, and grey-market distribution make remediation almost impossible

    This episode connects academic findings with real-world threat intelligence, showing how illicit streaming devices have evolved from copyright-infringing gadgets into critical cyber-risk infrastructure - often without the knowledge or consent of the people who plug them in.

    If you own a “fully-loaded” streaming box, work in cybersecurity, policy, law enforcement, or digital harm prevention - or simply want to understand how living-room devices are reshaping the global threat landscape - this episode explains why Kimwolf changes everything.

    Más Menos
    15 m
  • Episode 2 - Blocking Pornography: A 20 Year Retrospective
    Jan 2 2026

    In this episode, The Digital Gatekeeper: Beyond the Keyword, we revisit a landmark 2004 study by Dr Paul Watters and Wai Han Ho and place its findings squarely inside today’s heated debates over internet freedom, censorship, and child protection.

    At a time when governments increasingly reach for blunt policy tools - such as platform-wide bans, age-gating mandates, and keyword-based filtering - the episode argues that these approaches repeat a long-standing technical failure: confusing content safety with content suppression. Drawing on empirical evidence, the episode shows how simplistic keyword blocking not only misses harmful material but also systematically overblocks legitimate political, medical, and social discourse.

    The episode explains how the 2004 research demonstrated that pornographic content has a measurable structural and statistical fingerprint - from image-to-link ratios and page connectivity to constrained vocabulary patterns - that can be identified with high accuracy using probabilistic (Bayesian) models. Crucially, this approach allows filters to be tuned for context: stricter in child-focused environments, and deliberately less biased where access to lawful speech matters.

    By contrasting “digital hammers” with probabilistic “scalpels,” the episode reframes contemporary policy debates. Rather than treating safety and freedom as mutually exclusive, it argues that intelligent, context-aware content analysis offers a path to protect children without collapsing into censorship.

    The episode closes with a warning that policy choices which ignore decades of technical evidence risk repeating the same mistakes - at greater scale and with greater harm to democratic access, education, and civil liberties.

    Más Menos
    13 m
  • Episode 1 - Illicit Streaming Devices as Cyber Weapons - Evidence from Taiwan
    Dec 28 2025

    Illicit Streaming Devices (ISDs) are often marketed as low-cost alternatives for accessing pirated content, but emerging research shows they pose far more serious risks. In this episode of Shadow Markets, we summarise empirical findings from a study of ISDs circulating in Taiwan, examining how modified media players and their required third-party applications create significant cybersecurity exposure.

    Drawing on systematic testing, the research shows that a substantial proportion of applications used to operate these devices contain malicious code, including tools for data exfiltration, advertising fraud, and remote device control. Once deployed at scale, compromised ISDs can be recruited into botnets such as Mirai, effectively transforming private households into distributed infrastructure capable of supporting large-scale cyber attacks.

    The episode explores how these risks intersect with organised cybercrime, malware supply chains, and national-level security concerns. It concludes by outlining evidence-based mitigation strategies, including market controls, domain blocking, and consumer education, aimed at reducing the downstream harm created by high-risk, pirated hardware.

    Más Menos
    15 m
Todavía no hay opiniones