Logo
    Search

    Podcast Summary

    • Understanding Business Analytics and PersuasionAnalyzing site visits, sales sources, and effective channels through Squarespace's Insights can help businesses improve their websites and build effective marketing strategies. Historical anecdotes like Gregor McGregor's scheme showcase the power of persuasion, whether it's used for growth or deception.

      Having access to valuable analytics can significantly help businesses grow. This was discussed in relation to Squarespace, a platform that offers Insights to its users, enabling them to learn about their site visits, sales sources, and effective channels. By analyzing top keywords, popular products, and content, businesses can improve their websites and build effective marketing strategies. Squarespace offers a free trial at squarespace.com/stuff, and new customers can save 10% using the code STUFF upon purchase. Meanwhile, in a different context, a historical anecdote was shared about Gregor McGregor, a con man who, in the early 19th century, fashioned himself as the prince of a non-existent place called Poyo, promising settlers riches in oil, rubies, gold, and timber. Despite the place being non-existent, he managed to sell stock and rights to this supposed land to 250 settlers, most of whom died on the journey to find it. McGregor moved on to France and continued his scheme, showcasing an impressive level of confidence and audacity even during his trial. In essence, both examples illustrate the power of information and persuasion, whether it's used for growing a business or deceiving people. In the former case, accurate analytics lead to informed decisions and growth, while in the latter case, misinformation led to devastating consequences.

    • Understanding the tactics of con artistsBe aware of potential scams, stay vigilant, and don't fall for 'something for nothing' schemes. Remember, making money requires effort and you can't cheat an honest person.

      We are all potential targets for con artists, who use our weaknesses, such as greed or loneliness, to deceive us. These individuals, often traveling frequently to avoid detection, use their intelligence and charisma to manipulate us into believing their "something for nothing" schemes. Con artists, who can be of any gender, use various tactics, such as appealing to our lust or preying on the elderly or ignorant. Studies suggest that we are conned an average of eight to twelve times a day. It's important to remember that you can't cheat an honest person and that making money requires effort. The movie "Wall Street" serves as a reminder of the dangers of greed and the consequences that come with falling for a confidence scheme. Stay vigilant and use your better judgment to avoid becoming a victim.

    • Exploring the World of Grifters: Con Artists and Their TechniquesGrifters, or professional con artists, use various techniques to deceive people, from traveling Bible salesmen to quick street scams. However, these actions are unethical and go against moral and ethical values.

      Grifters, or professional con artists, have been around for a long time and have used various techniques to deceive people. The discussion touched upon traveling Bible salesmen, who were actually con artists, and the movie "The Grifters" as an example of top-notch con man films. We also explored street cons, which are quick scams usually resulting in a small take of a few hundred dollars or less. However, it was emphasized that these cons are unethical and wrong, as they involve deceiving people and taking their money. The conversation also mentioned the various terms used to describe con artists, such as flim flam man, shamada, sashista, bunko man, grifter, swindler, hustler, and bamboozler. Ultimately, it's important to remember that engaging in cons goes against moral and ethical values.

    • Greed leads to cons and scamsGreed can cloud judgment, making people vulnerable to scams and cons, leading to financial losses and unwanted consequences.

      Greed can lead people to fall for cons and scams, causing them to lose money and sometimes even end up with unwanted consequences. In the first example, a dog owner was tricked into selling his dog to a store owner for a large sum of money after being approached by a second con artist who pretended the dog was a valuable pedigree breed. The dog, however, was not valuable, and the second con artist never returned. In the second example, the pigeon drop scam involves two people discovering a "lost" bag of money and agreeing to split it, only for one of the con artists to replace the money with coupons or other worthless items. The takeaway is that greed can cloud people's judgment and lead them to make poor decisions, making them vulnerable to being cheated. It's important to remain cautious and skeptical, especially when dealing with unfamiliar situations or people.

    • Common quick tricks and deceit in street consStay alert to common street scams like pigeon drop and three card money, which rely on surprise and distraction to deceive victims and can lead to financial loss

      Street cons, also known as short cons, are common scams often involving quick tricks and deceit. For instance, the pigeon drop involves a con artist offering a ring or other item, claiming it's valuable, and asking for a smaller sum of money in exchange. Another example, three card money, involves manipulating cards to make the queen appear in different locations. These cons rely on the element of surprise and distraction to deceive unsuspecting victims. It's important to note that these cons are typically short-term and not as elaborate as business or internet scams. However, they can still result in significant financial loss. Be aware of these common street cons and always remain vigilant to protect yourself from potential scams.

    • Discussing Ponzi schemes, multi-level marketing, social media, and website designLearned about the differences between Ponzi schemes and multi-level marketing, the legitimacy of some MLMs, the benefits of social media platforms like Zigazoo for kids, and the ease of creating websites with Squarespace's Fluid Engine

      While discussing various topics, we touched upon the concept of Ponzi schemes and multi-level marketing. A Ponzi scheme is an unsustainable business model where people pass money upwards, with only those at the top receiving payouts. It's based on deceit and relies on new investors to keep the scheme running. Multi-level marketing, on the other hand, can have a pyramid structure but isn't necessarily a scheme. Some legitimate companies, such as Pampered Chef or Tupperware, use this model. The key difference lies in the focus on selling a product or service, rather than just recruiting new members. Another topic we explored was the use of social media platforms like Zigazoo, which offers a safe and moderated environment for kids to share content and interact with friends. Lastly, we discussed Squarespace and its Fluid Engine, a next-generation website design system that makes it easier for anyone to create and customize websites. Overall, our conversation covered various topics, including business models, social media, and website design. We also touched upon the importance of understanding the differences between legitimate business structures and schemes.

    • Beware of vague businesses or individualsStay cautious of businesses or individuals with unclear products, payouts, or large upfront payments, as they may be pyramid schemes or scams.

      It's important to be cautious when dealing with businesses or individuals who are vague about their products, payouts, or require large upfront payments. These signs could indicate a potential pyramid scheme or scam, such as the Nigerian money transfer scam or advanced fee fraud. Once you've fallen for a scam, it can be difficult to get your money back and the scam artists may continue to ask for more money. Be wary of long-con scams that promise big returns but require additional investments. Additionally, be skeptical of offers that seem too good to be true, even if they come in the form of seemingly legitimate products or services. Remember, if something feels off, trust your instincts and walk away.

    • Beware of hidden fees and deceptive practicesStay informed and cautious to avoid falling victim to scams, read contracts carefully, and be skeptical of unexpected fees or demands.

      Some individuals and businesses engage in deceptive practices to make a profit, regardless of the quality of their products or services. The DVD seller discussed earlier is an example of someone making money through a seemingly legitimate business model, but with fine print that allows him to profit even when customers request refunds. Similarly, home improvement scams can take various forms, from shoddy work by contractors to fake inspectors claiming necessary repairs. Consumers should be cautious and do their due diligence before agreeing to any transactions, especially those involving significant investments. Another important lesson is the importance of understanding contracts and the potential consequences of not adhering to payment schedules. Overall, it's crucial to remain skeptical and informed to avoid falling victim to scams.

    • Beware of financial scamsStay cautious of offers that seem too good to be true, ask for identification and information, and trust your instincts to avoid potential scams.

      It's important to be cautious and skeptical of offers that seem too good to be true, especially when it comes to financial matters. The discussion highlighted various scams, such as debt erasure schemes and mortgage refinance scams, where individuals can lose their hard-earned assets or fall into deeper debt. The speakers emphasized the importance of not being greedy and avoiding solicitations, especially those using outdated marketing methods. They advised asking for identification and information, and being wary of vague business cards or suspicious behavior. Remember, if something seems too good to be true, it probably is. Always do your due diligence and trust your instincts to avoid potential scams.

    • Staying vigilant against con artists and scamsBe aware of potential scams, use safe platforms, and protect yourself and loved ones from falling victim to con artists.

      Being vigilant against con artists and scams is crucial, especially when dealing with significant amounts of money. The confidence of con artists often relies on their victims feeling embarrassed and hesitant to report the crime. Stories like Count Victor Lustig's selling of the Eiffel Tower twice serve as reminders of the lengths con artists will go to deceive people. In today's world, the digital landscape also poses new risks, such as unethical individuals selling faulty products or services. For instance, a man once sold a machine that only produced one $100 bill every six hours, but people still paid thousands of dollars for it, believing it was a legitimate printing machine. Moreover, when it comes to protecting children online, it's essential to use safe and moderated social media platforms like Zigazoo. Unlike other social media networks, Zigazoo is designed specifically for kids, with no commenting, text messaging, or AI. This platform ensures a fun and secure environment for children to share their content and connect with friends. By being aware of potential scams and utilizing safe platforms, we can all take steps to protect ourselves and our loved ones from falling victim to con artists.

    • Preparing for Easter with CVS and exploring con artist moviesCVS offers Easter preparation with in-store pickup and a wide selection, while listeners discuss classic con artist movies like 'The Sting' and 'House of Games'.

      CVS makes it easy to prepare for Easter with convenient in-store pickup and a wide selection of items for baskets and hunts. Meanwhile, if you're in the mood for a good con artist movie, consider classics like "The Sting," "House of Games," "Catch Me if You Can," and "Confidence." Glenn Gary Glen Ross and "The Spanish Prisoner," both written by David Mamet, are also worth watching. And for those unfamiliar with the genre, an article on howstuffworks.com can serve as a helpful reference. As for listener mail, a fan of the podcast expressed gratitude for its ability to provide entertainment and distraction from the mundane, and suggested adding a young, hip new member to the team. In other news, no consensus was reached on the best con man movie of all time, with suggestions ranging from "The Baltimore Bullet" to "Dirty Rotten Scoundrels." Despite not having seen some of these films, the conversation showcased the group's passion for the genre and their willingness to explore new recommendations.

    • Seeking Expert Advice on Open Source ComputingListeners were advised to reach out to an expert for in-depth discussions on open source computing, share their experiences of being conned, connect on social media, use Zigazoo during spring break, and consider CVS for Easter basket essentials with free in-store pickup.

      The podcast duo, Stuff Podcast, appreciates their listeners' enthusiasm but cannot add a third member to their team, nor can they explain open source computing in a 30-minute episode. They suggested reaching out to another expert, Strickland, for such a topic. The podcast also encouraged listeners to share their experiences of being conned and invited them to connect on social media platforms like Facebook and Twitter. Additionally, they promoted the use of Zigazoo, a safe social media network for kids, during spring break. Lastly, they reminded listeners of the upcoming Easter holiday and the convenience of free in-store pickup at CVS for Easter basket essentials.

    Recent Episodes from Stuff You Should Know

    Selects: How Restaurant Health Inspections Work

    Selects: How Restaurant Health Inspections Work

    If you've ever worked in a restaurant, you know the feeling that occurs when the health inspector pays a visit. While nerve wracking, it's the best insurance patrons have that their food will be prepared and served in a proper environment. Learn all about how these inspections work, from their past history to current incarnation, in this classic episode.

    See omnystudio.com/listener for privacy information.

    Stuff You Should Know
    enJune 29, 2024

    Whistling!

    Whistling!

    Whistling is pretty cool when you think about it because it can mean many things, from simple happy tunes to legit communication. Learn all about this ubiquitous skill today. 

    See omnystudio.com/listener for privacy information.

    Stuff You Should Know
    enJune 25, 2024

    The Big Episode on Wikipedia

    The Big Episode on Wikipedia

    Wikipedia changed the world. Before it came along, you had to go to the library to get the answers you sought. And you and your friends had to just agree to disagree on facts. And as the internet grew and commercialized, Wikipedia remains free and open.

    See omnystudio.com/listener for privacy information.

    Stuff You Should Know
    enJune 20, 2024

    Related Episodes

    OSINT Scraping with Python - Ryan Hays - PSW #656

    OSINT Scraping with Python - Ryan Hays - PSW #656

    With bug bounties becoming more and more main stream for organizations. The bounty hunters are turning to more and more automation. Open source intelligence gathering can be automated with the use of python and a handful of other opensource tools such as Recon-NG, Amass, and others.

     

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode656

    The Dangerous Realm - PSW #656

    The Dangerous Realm - PSW #656

    This week, we welcome Jerry Chen, Co-Founder of Firewalla, to discuss Work From Home Cyber Security! In our second segment, we welcome Ryan Hays, Offensive Security Manager at RSA Security, to talk about OSINT Scraping with Python! In the Security News, Cisco Releases Security Advisory for Telnet Vulnerability in IOS XE Software, Firefox 78 is out with a mysteriously empty list of security fixes, Python Arbitrary File Write Prevention: The Tarbomb, New Lucifer DDoS Botnet Targets Windows Systems with Multiple Exploits, Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking, and how the Internet is too unsafe, and why we need more hackers!

     

    Show Notes: https://wiki.securityweekly.com/PSWEpisode656

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly

    Tracking a serial conman: 'Who The Hell is Hamish?'

    Tracking a serial conman: 'Who The Hell is Hamish?'
    Tracy Hall had been separated from her husband for over a year when she first met a man called Max Tavita via a dating app. He seemed witty, charming, intelligent, and attractive....a successful investment advisor with a sensitive side. He'd also been struck by terrible tragedy: he told her that as a 6-year-old he'd been in a plane crash that killed his parents, and left him an orphan. And then there was his job in New York...he apparently worked in the World Trade Centre, knew lots of people who died on 9-11, and had been walking underneath the Twin Towers when the first plane hit. But in 'Who The Hell is Hamish?' from 'The Australian' newspaper (presented by Greg Bearup) it becomes clear that Max Tavita isn't who he says he is.

    The Dangerous Realm - PSW #656

    The Dangerous Realm - PSW #656

    This week, we welcome Jerry Chen, Co-Founder of Firewalla, to discuss Work From Home Cyber Security! In our second segment, we welcome Ryan Hays, Offensive Security Manager at RSA Security, to talk about OSINT Scraping with Python! In the Security News, Cisco Releases Security Advisory for Telnet Vulnerability in IOS XE Software, Firefox 78 is out with a mysteriously empty list of security fixes, Python Arbitrary File Write Prevention: The Tarbomb, New Lucifer DDoS Botnet Targets Windows Systems with Multiple Exploits, Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking, and how the Internet is too unsafe, and why we need more hackers!

     

    Show Notes: https://wiki.securityweekly.com/PSWEpisode656

    Visit https://www.securityweekly.com/psw for all the latest episodes!

     

    Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

    Follow us on Twitter: https://www.twitter.com/securityweekly

    Like us on Facebook: https://www.facebook.com/secweekly