Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation

In this episode we discuss a recent Twitter security incident that caused private tweets sent to Twitter Circles to become visible to unintended recipients.

Next, we discuss the collaboration between Apple and Google to develop a specification for detecting and alerting users of unauthorized tracking using devices like AirTags.

Finally, we explore the US government’s engagement with major technology companies and AI experts to address the risks associated with generative artificial intelligence (AI). We analyze the White House initiatives and the call for increased regulatory measures in the AI field.

** Links mentioned on the show *

Twitter says ‘security incident’ exposed private Circle tweets

Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices

White House unveils AI rules to address safety and privacy

** Watch this episode on YouTube **

** Thank you to our sponsors! **


Visit to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit:

** Subscribe and follow the podcast **

Join the Shared Security Community on Reddit:

Subscribe on YouTube:

Watch and Subscribe on Odysee (YouTube alternative)

Follow us on Mastodon:

Follow us on Twitter:


Subscribe on your favorite podcast app:

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors:

Leave us a rating and review:

Contact us:

The post Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation appeared first on Shared Security Podcast.

*** This is a Security Bloggers Network syndicated blog from Shared Security Podcast authored by Tom Eston. Read the original post at: