About Counter Surveil

Schedule

We stream live every Monday at 7 PM EST on YouTube, featuring in-depth technical discussions, live demonstrations, and Q&A sessions with our community. All streams are archived and available with comprehensive show notes for future reference.

Counter Surveil is a weekly cybersecurity podcast and live stream dedicated to exploring the intersection of technology, privacy, and digital rights. We believe in empowering individuals with the knowledge and tools needed to protect their digital lives in an increasingly surveilled world.

Quick Stats

Episodes: 247
Subscribers: 45.2K
Total Views: 2.8M
Founded: 2021
[*] System Status: OPERATIONAL
[*] Encryption: AES-256-GCM
[*] Connection: SECURE
[!] Next Stream: Monday 7PM EST

Recent Streams

● LIVE
LIVE NOW

LIVE: Zero-Day Vulnerability Deep Dive - CVE-2025-XXXX Analysis

🔴 578 watching ⏱️ Started 45 min ago

Breaking down the latest critical vulnerability affecting major cloud providers. Live reverse engineering and exploit development.

1:23:45

Privacy in the Age of AI: Protecting Your Digital Footprint

👁️ 12.5K views 📅 2 days ago

Comprehensive guide to maintaining privacy while AI systems become increasingly invasive. Tools, techniques, and countermeasures.

2:15:30

Building Your Own Hardware Security Module from Scratch

👁️ 8.3K views 📅 5 days ago

Complete walkthrough of designing and implementing a custom HSM using open-source hardware. Includes PCB design and firmware development.

1:45:22

OSINT Techniques: Advanced Reconnaissance Without Getting Caught

👁️ 15.7K views 📅 1 week ago

Master class in Open Source Intelligence gathering. Learn professional techniques while maintaining operational security.

56:18

Quantum Computing Threats to Current Encryption Standards

👁️ 9.2K views 📅 2 weeks ago

Understanding post-quantum cryptography and preparing for the coming paradigm shift in information security.

3:02:45

Live Hack: Penetration Testing a Fortune 500 Company (Authorized)

👁️ 42.1K views 📅 2 weeks ago

Real-time authorized penetration test with full methodology explanation. From reconnaissance to post-exploitation.

1:18:33

Mobile Device Forensics: What Your Phone Knows About You

👁️ 11.8K views 📅 3 weeks ago

Deep dive into mobile forensics tools and techniques. Learn what data can be extracted and how to protect yourself.

2:30:15

Reverse Engineering Malware: Dissecting APT Group Techniques

👁️ 18.9K views 📅 1 month ago

Complete analysis of recent APT campaigns. IDA Pro, Ghidra, and dynamic analysis techniques demonstrated.

1:05:42

Anonymous Browsing: TOR, I2P, and Beyond

👁️ 22.4K views 📅 1 month ago

Comprehensive guide to anonymous networks. Configuration, operational security, and common mistakes to avoid.

Show Notes Archive

EP 247 Jan 12, 2025

Zero-Day Vulnerability Deep Dive - CVE-2025-XXXX Analysis

Topics Covered:

  • CVE-2025-XXXX technical breakdown
  • Exploit development walkthrough
  • Mitigation strategies for cloud providers
  • Q&A: Patch management best practices

Resources:

Tools Mentioned:

IDA Pro, Ghidra, ROPgadget, pwntools, Metasploit

EP 246 Jan 5, 2025

Privacy in the Age of AI: Protecting Your Digital Footprint

Topics Covered:

  • AI data collection methods
  • Browser fingerprinting countermeasures
  • Privacy-focused AI alternatives
  • Data poisoning techniques

Resources:

Tools Mentioned:

uBlock Origin, Privacy Badger, LocalCDN, Canvas Blocker, Tor Browser

EP 245 Dec 29, 2024

Building Your Own Hardware Security Module from Scratch

Topics Covered:

  • HSM architecture fundamentals
  • PCB design with KiCad
  • Secure element integration
  • Firmware development in Rust

Resources:

Tools Mentioned:

KiCad, OpenSCAD, Rust, OpenOCD, Logic Analyzer, Oscilloscope

EP 244 Dec 22, 2024

OSINT Techniques: Advanced Reconnaissance Without Getting Caught

Topics Covered:

  • Advanced Google dorking techniques
  • Social media intelligence gathering
  • Maintaining operational security
  • Automated OSINT with Python

Resources:

Tools Mentioned:

Maltego, theHarvester, Shodan, Recon-ng, SpiderFoot, OSINT Framework

Hosts & Contributors

JD

John "Zero" Davis

Lead Host / Security Researcher

Former NSA analyst turned privacy advocate. 15+ years in offensive security and digital rights activism.

Cryptography OSINT Malware Analysis
SR

Sarah "Cipher" Rodriguez

Co-Host / Privacy Specialist

EFF contributor and Tor Project volunteer. Specializes in operational security and anonymous communications.

Privacy Tools OpSec Threat Modeling
MK

Mike "Kernel" Kim

Technical Contributor / Hardware Expert

Hardware hacker and embedded systems specialist. Creator of multiple open-source security tools.

Hardware Security IoT Radio Hacking
AT

Alex "Tr4c3" Thompson

Guest Host / Forensics Expert

Digital forensics investigator and incident response specialist. SANS instructor and conference speaker.

Digital Forensics Incident Response Memory Analysis

Secure Communication Guidelines

🔐
PGP Encrypted Email: Preferred for sensitive communications. Public keys available on Keybase.
🧅
SecureDrop: For anonymous tips and whistleblowing. Access via Tor Browser only.
💬
Signal/Matrix: For real-time encrypted messaging. Verify safety numbers before sharing sensitive info.
📧
ProtonMail: All @countersurveil.net addresses hosted on ProtonMail for enhanced privacy.

Join Our Community