This Week in Tech (Audio)

TWiT 1061: Amy's Crazy Husband - Can One Build a Truly Anonymous Laptop?

December 8, 2025

Key Takeaways Copied to clipboard!

  • The Supreme Court's Cox-Sony copyright case centers on secondary liability for ISPs and raises significant, yet largely unaddressed, First Amendment concerns regarding online speech facilitation. 
  • Legislative efforts for age verification are expanding beyond pornography to include products like skin cream, prompting concerns about widespread privacy erosion and potential VPN bans to enforce these laws. 
  • Brian Wolf successfully built a nearly anonymous laptop using a Mulvad VPN purchased with cash via a prepaid card and initial setup at public libraries, demonstrating the technical feasibility of deep digital disassociation, though legal process remains a threat. 
  • Using a trusted VPN like ExpressVPN is crucial for data security because free VPNs offer no privacy protection, and ExpressVPN utilizes RAM-only servers that wipe data upon reboot. 
  • New FDA-approved glasses (Stellist/Lexotica) work by blurring the peripheral retina to break the feedback loop that causes the eyeball to grow larger, thereby slowing the progression of myopia in children. 
  • Recent executive departures at Apple are viewed by some panelists as normal end-of-year organizational shifts, contrasting with the more significant strategic instability signaled by Meta's deep cuts to its Metaverse budget. 
  • Mandatory return-to-office policies, like the one announced by Instagram, are viewed by some panelists as a pretext for driving away older employees, potentially raising ethical and legal concerns. 
  • The potential acquisition of Warner Brothers by Netflix sparks debate over whether Netflix intends to prioritize streaming exclusivity by ending theatrical releases or if prestige and creator demands will force them to maintain traditional movie windows. 
  • The discussion highlights the ongoing internal debate at Netflix regarding whether it should prioritize its identity as a technology company or a content studio, which influences its strategic decisions like major acquisitions. 

Segments

Guest Introductions and Broadway
Copied to clipboard!
(00:00:00)
  • Key Takeaway: Amy Webb is a Broadway producer whose current production, ‘Chess,’ is a successful revival of a geopolitical musical originally conceived from a concept album.
  • Summary: Amy Webb is a Broadway producer for the musical ‘Chess,’ which originated from a concept album by Tim Rice and ABBA members Bjorn and Benny. The musical centers on a US versus USSR chess match, involving themes of defection and romance. The current Broadway revival at the Imperial Theater is already breaking records.
Cox-Sony Copyright Case
Copied to clipboard!
(00:07:35)
  • Key Takeaway: The Cox-Sony copyright case before the Supreme Court hinges on whether ISPs can be held secondarily liable for user infringement, particularly concerning the requirement to terminate repeat infringers.
  • Summary: The case questions the scope of secondary liability for Internet Service Providers (ISPs) like Cox, who are conduit platforms, not storage platforms under DMCA 512C. Cox lost its DMCA safe harbor in a prior case (BMG v. Cox) for failing to terminate users based on infringement notices. Justice Alito was noted for making sensible points regarding the difficulty of identifying individuals from IP addresses, contrasting with concerns about kicking users off the internet, which the court previously deemed an unacceptable remedy even for severe crimes.
First Amendment Omission in SCOTUS
Copied to clipboard!
(00:17:15)
  • Key Takeaway: A major criticism of the Cox-Sony oral arguments is the near-total omission of First Amendment arguments concerning platforms facilitating online expression.
  • Summary: Despite the case involving liability for third-party actions on internet platforms, the First Amendment was largely ignored during arguments, except in amicus briefs filed by Cox supporters like the ACLU and the government. Justice Sotomayor used an analogy comparing ISP access to providing a gun, which Cox failed to counter by emphasizing the speech implications of internet access facilitation.
Age Verification Overreach
Copied to clipboard!
(00:37:26)
  • Key Takeaway: Age verification mandates are rapidly expanding beyond pornography protection to include unrelated physical products like skincare, driven by lawmakers who are now considering banning VPNs to enforce these location-based rules.
  • Summary: Legislation in states like Alabama and California is mandating age verification for purchasing items such as cosmetics containing Vitamin A or alpha hydroxy acids. This trend is seen as a form of ‘book banning’ that eliminates online anonymity and privacy for all users. Lawmakers are recognizing that VPNs circumvent these state-specific age verification laws, leading to discussions about banning VPN technology.
Building Anonymous Laptop
Copied to clipboard!
(00:44:12)
  • Key Takeaway: Brian Wolf successfully constructed a laptop designed to be untraceable by using a Mulvad VPN purchased anonymously and employing hardware tricks like rotating MAC addresses.
  • Summary: The project began when Brian Wolf sought to bypass geo-restrictions for the Tour de France broadcast, leading to an experiment in creating a fully disassociated computer. He bypassed Microsoft account requirements, purchased Mulvad VPN access via a prepaid card at Best Buy, and used public library Wi-Fi for the initial connection. Friends confirmed the setup’s robustness by failing to de-anonymize it during penetration testing, though the use of modern laptops limits hardware-level MAC address spoofing.
VPN Security and ExpressVPN
Copied to clipboard!
(00:58:07)
  • Key Takeaway: Using a VPN is essential for security on public networks, and trusted paid services like ExpressVPN utilize RAM-based, ephemeral servers to ensure no trace of user activity remains after disconnection.
  • Summary: Connecting to unencrypted public Wi-Fi exposes data to hackers who can use tools like a Wi-Fi pineapple to impersonate trusted access points and steal personal data. ExpressVPN encrypts traffic via a secure tunnel and operates its servers entirely in RAM, meaning data is wiped upon disconnection, preventing residual tracking.
VPN Security and ExpressVPN Features
Copied to clipboard!
(00:59:26)
  • Key Takeaway: Free VPNs fail to protect privacy, whereas ExpressVPN uses RAM-only servers that are sandboxed and wiped upon disconnection, leaving no trace.
  • Summary: Hackers can profit by selling stolen network data, making secure encryption vital. ExpressVPN creates an encrypted tunnel, and its servers run in RAM, ensuring data cannot be written to the hard drive. Furthermore, their custom Debian OS reboots daily, wiping the hard drive completely, making data recovery virtually impossible.
Myopia Treatment Technology
Copied to clipboard!
(01:03:08)
  • Key Takeaway: Myopia progression is linked to the peripheral retina being in sharp focus, which stimulates the eye to grow larger, increasing retinal detachment risk.
  • Summary: The FDA-approved Stellist glasses aim to slow myopia by keeping central vision sharp while blurring the periphery, breaking the growth feedback loop. Acquired nearsightedness is exploding due to constant close-up screen use without changing focal lengths. The physical eyeball grows larger with high myopia, stretching the retina and significantly increasing the risk of detachment.
Advanced Retinal Imaging
Copied to clipboard!
(01:09:35)
  • Key Takeaway: Retinal imaging technology exists, like the Optos scanner, that can capture 230 degrees of the inside of the eyeball using lasers, though it requires bulky equipment.
  • Summary: Heads-up display light projected onto the retina is perceived as coming from far away, which is necessary to prevent eye strain and headaches. The technology to paint the retina with a laser image is already present in large scanners like the Optos Retina Scanner. Future AR glasses are expected to shrink this laser-painting technology for a more seamless experience.
Drug Toxicity and Eye Care
Copied to clipboard!
(01:12:05)
  • Key Takeaway: New targeted cancer drugs, like the folate alpha receptor drug Elihir, can cause temporary eye damage by attacking rapidly growing corneal stem cells.
  • Summary: Corneal stem cells are one of the fastest-growing tissues in the body, second only to the stomach lining. Damage to these cells can lead to recurrent corneal erosions, exposing sensitive nerves. Eye care professionals may need continuing education to manage toxicity from these newer, highly specific adjuvant treatments.
Apple Executive Departures Analysis
Copied to clipboard!
(01:33:39)
  • Key Takeaway: The departure of Apple design chief Alan Dye, while noted, is considered less significant than the potential exit of Apple Silicon lead Johnny Srouji, and some view the overall executive movement as normal Q4 turnover.
  • Summary: Several high-profile executives, including the design chief and the head of AI efforts, are leaving Apple, leading to speculation about internal issues. Apple’s AI strategy may involve integrating Google’s Gemini, evidenced by hiring a former Gemini product manager to lead their efforts. Some internal reports suggest relief over Alan Dye’s departure due to dissatisfaction with recent UI changes like Liquid Glass.
Meta’s Metaverse Budget Cuts
Copied to clipboard!
(01:39:57)
  • Key Takeaway: Meta is reportedly cutting its Metaverse budget by up to 30%, causing its stock to rise, signaling a pivot away from heavy investment in VR/AR hardware.
  • Summary: Meta has lost over $70 billion in its Reality Labs division since 2021, making the budget cuts a fiscally responsible move supported by the market. Mark Zuckerberg’s ability to rapidly change company direction, from social network to metaverse to AI, is enabled by his controlling super-voting shares. Meta’s open-sourcing of the powerful Llama models is crucial for broader AI innovation outside of proprietary systems.
AI Native Devices and Privacy Trade-offs
Copied to clipboard!
(01:44:59)
  • Key Takeaway: The next wave of AI-native devices requires continuous recording, and while privacy concerns are high now, the utility of having an AI assistant that remembers everything will likely lead the public to accept the trade-off.
  • Summary: Early AI devices like the Humane Pin and Rabbit R1 struggled, but the next generation focuses on AI assistance powered by recorded data. The value proposition of an AI companion that can search and analyze one’s entire day is expected to outweigh initial squeamishness regarding constant recording. Data transfer during acquisitions, like Limitless by Meta, highlights the unresolved legal issue of data ownership transfer.
Return to Office Mandates Rationale
Copied to clipboard!
(01:58:17)
  • Key Takeaway: Return-to-office mandates at large corporations are suspected to be a convenient alternative to layoffs, intended to weed out less engaged, tenured employees rather than being driven by cost savings or real estate needs.
  • Summary: For smaller, flexible companies, the value of in-person interaction is recognized, but mandates are concentrated in very large corporations. This strategy allows companies to refresh their workforce without the formal process and negative press associated with layoffs. The massive spending on new commercial real estate, like JP Morgan’s new NYC tower, is not necessarily the primary driver for these mandates.
Workforce Reduction Tactics
Copied to clipboard!
(02:00:33)
  • Key Takeaway: Forcing employees back to the office via mandates is seen as an unethical pretext to encourage older, long-tenured workers to quit rather than face formal layoffs.
  • Summary: The panel debates whether return-to-office mandates are a convenient alternative to layoffs, potentially targeting older employees in their 50s. This strategy is viewed by some as unethical because it avoids formal termination processes, forcing employees to resign. Long-term employees who have not gained external experience may be disproportionately affected by such maneuvers.
Netflix’s Warner Bros. Acquisition Motives
Copied to clipboard!
(02:08:37)
  • Key Takeaway: Netflix’s potential acquisition of Warner Brothers raises speculation that they might aim to eliminate theatrical releases, which compete with their core streaming business, despite CEO Ted Sarandos’s public statements supporting theatrical windows.
  • Summary: The potential $87.2 billion acquisition of Warner Brothers by Netflix is being analyzed for its strategic implications, including the fate of theatrical film releases. While Sarandos stated they would continue theatrical releases, he indicated a desire to shorten the exclusive windows before films move to streaming. The deal structure suggests linear networks like CNN might be spun off, similar to the Disney/Fox transaction, leaving valuable IP like Harry Potter and HBO content for Netflix.
Student Cell Phone Ban Effectiveness
Copied to clipboard!
(02:32:27)
  • Key Takeaway: Research from Florida indicates that enforcing cell phone bans during the school day leads to significant improvements in student test scores, supporting Singapore’s move to ban smartphones entirely during school hours.
  • Summary: Singapore announced a full-day ban on smartphone use for all students, even during breaks. This aligns with research from Florida showing that implementing cell phone bans correlates with significant gains in student test scores. Panelists noted that children who grow up without constant screen access often do not develop an immediate need for it, contrasting with the potential withdrawal symptoms seen when access is suddenly removed, as is happening in Australia.
RoboCop Statue Erection in Detroit
Copied to clipboard!
(02:38:14)
  • Key Takeaway: A 15-year-long Kickstarter campaign for a bronze RoboCop statue in Detroit finally succeeded when the statue was installed at Toscano’s, a local market, after being rejected by the Michigan Science Center.
  • Summary: The bronze RoboCop statue, funded by a 2010 Kickstarter campaign, was finally erected in Detroit, the fictional setting of the film. The statue was initially rejected by the Michigan Science Center, leaving it warehoused until Toscano’s, an entertainment district, agreed to host it. The move is expected to generate significant local traffic for the market.
Benefits of Hand Gestures in Public Speaking
Copied to clipboard!
(02:40:04)
  • Key Takeaway: Analysis of TED Talks suggests that speakers who use hand gestures appear more competent and persuasive to the audience.
  • Summary: A study analyzing thousands of TED Talks concluded that using hand gestures during presentations enhances the speaker’s perceived competence. This contrasts with environments like courtrooms, where using hands extensively is often discouraged or restricted by cultural norms.
Forcing Twitter Trademark Abandonment
Copied to clipboard!
(02:41:05)
  • Key Takeaway: A petition has been filed to force X (formerly Twitter) to abandon its trademark, arguing that Elon Musk’s stated intent to stop using the ‘Twitter’ brand constitutes abandonment in commerce.
  • Summary: A Delaware corporation filed a petition arguing that since Elon Musk publicly stated he would bid adieu to the Twitter brand, the trademark should be deemed abandoned because it is no longer being used in commerce. The petitioner, which predates Twitter, previously settled a reverse confusion lawsuit with the company. Trademark law generally requires active use of a mark to maintain registration rights.
Cybersecurity: Thinkst Canary Honeypot
Copied to clipboard!
(02:26:53)
  • Key Takeaway: The Thinkst Canary is a silent, hardware-based honeypot that impersonates network devices to detect malicious actors or insiders immediately upon their first interaction, offering alerts via multiple channels.
  • Summary: The Thinkst Canary device functions as a highly effective honeypot, impersonating various network assets like servers or NAS devices down to the MAC address level. It remains completely silent until a bad actor attempts to access it, at which point it immediately telegraphs their presence via SMS, email, or webhooks. The creators, who have experience training governments in penetration testing, offer a 60-day money-back guarantee, noting that customers rarely return the product.