S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)

S4 - Episode 003 – Hackers Love You...And Your Overshared Instagram Posts! (w/ Wes Kussmaul)

Author: Jason Popillion and Kevin Pentecost April 10, 2025 Duration: 1:29:29

In this thought-provoking episode of the Cyber Distortion Podcast, we're joined by Wes Kussmaul, a visionary in the realm of secure online identities and the founder of Delphi Internet Services Corporation—the company behind the Kussmaul Encyclopedia, the world's first computerized encyclopedia and one of the earliest forms of hypertext. With over three decades of experience building secure online spaces, Wes brings a unique blend of historical perspective and forward-thinking innovation to the conversation around privacy, authentication, and identity protection.

 

As digital threats evolve, so must our understanding of how we prove who we are online. Wes breaks down the role of public and private key cryptography in securing not just our communications, but our very identities and intellectual property. Through vivid analogies and real-world examples, he illustrates how Public Key Infrastructure (PKI) can serve as the backbone of a more trustworthy internet—one where authenticity and privacy aren't afterthoughts, but foundations.

We also explore his groundbreaking work with Reliable Identities, an initiative focused on reestablishing digital trust in an age of phishing, spoofing, and identity theft. Wes shares why the current system of usernames and passwords is fundamentally flawed—and how we can replace it with something far more secure and future-proof.

Whether you're a cybersecurity expert, a tech enthusiast, or simply curious about the future of online trust, this episode will reshape how you view identity in the digital world. Tune in to hear from one of the internet's earliest innovators on how we can protect who we are—and what we create—online.

Wes is the author of several books about privacy and authenticity, including Quiet Enjoyment (2004), Own Your Privacy (2007), The Future Needs You (2007), and Don't Get Norteled (2014). He is also an individual adherent of the International Union of Latin Notaries and has been appointed a Notary Ambassador by the National Notary Association.

Wes received his BS in Physics from the University of Central Missouri in 1971 while serving in the US Air Force at Whiteman Air Force Base (SAC).

Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

 

CITATIONS:

LinkedIn: https://www.linkedin.com/in/weskussmaul/

Wes' Personal Website: https://weskussmaul.com/about-wes/

Authentiverse: https://authentiverse.net

Authenticity Alliance:

https://www.whatisauthenticity.com/

City of Osmio:

https://www.osmio.ch/our-name.html

Buy Wes' Books:

https://www.pkipress.com/

 The Authenticity Institute:

https://www.authenticityinstitute.com/index.html

More information on Sutton Smith (a.k.a. Sutton Love):

https://www.reversecanarymission.org/person/sutton-smith-66936d96d1a13a06fe312995

Sutton's Instagram:

https://www.instagram.com/sutton.loves/


Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 61

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 005 – Third Party Risk – It's not Me, It's You! [not-audio_url] [/not-audio_url]

Duration: 1:20:01
HE'S BAAAAAAACK!! In this episode, we RE-visit with our very first guest, Benjamin Hall. Ben has served as a virtual CISO, and serves as Sr. Information Security Consultant at Heartland Business Systems. With experience…
S2 - Episode 004 - "AI and ChatGPT is Scary Sh*t! – Part II" [not-audio_url] [/not-audio_url]

Duration: 43:36
In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology! Kevin and Jason wrap up their discussion with Justin "Hutch" Hut…
S2 - Episode 003 - "AI and ChatGPT is Scary Sh*t! – Part I" [not-audio_url] [/not-audio_url]

Duration: 55:03
What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today's exciting episode, Jason and Kevin discuss the incredible wor…
S2 - Episode 002 – 2022 Breaches and Some Retrospection [not-audio_url] [/not-audio_url]

Duration: 1:21:06
In this exciting second episode of the new season, we're offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on! BREACHES We start by spending time on 5 of the top breaches th…
S2 - Episode 001 – The Dark Web Revisited [not-audio_url] [/not-audio_url]

Duration: 1:14:40
WE ARE BACK! Happy 2023 friends… In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we're coming wit…
S1 - Episode 014 – Women in Cybersecurity - Part II [not-audio_url] [/not-audio_url]

Duration: 42:52
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 013 – Women in Cybersecurity - Part I [not-audio_url] [/not-audio_url]

Duration: 46:00
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 012 – Unraveling the Zero Trust Mystery [not-audio_url] [/not-audio_url]

Duration: 1:22:23
If you're like many others in information security, you too may struggle with understanding the concept and basic premise of "zero trust." Well, we have good news for you! After this episode, you can rest-assured that we…
S1 - Episode 011 – The Fine Art of Social Engineering [not-audio_url] [/not-audio_url]

Duration: 1:07:03
In this exciting episode, we cover the very fascinating topic of "Social Engineering" aka: Human Hacking! Anyone that lives in Cybersecurity knows that the weakest link in any company's cyber defenses is sitting between…
S1 - Episode 010 – Doomsday Breach Prepping - 101 [not-audio_url] [/not-audio_url]

Duration: 53:10
When the world comes crumbling down and your entire existence is burning to the ground, will you be prepared to handle it? What am I talking about anyway? The post-breach apocalypse, of course. What else?! You see, we ha…