<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[Reps4Thor]]></title>
    <link>https://reps4thor.com</link>
    <atom:link href="https://media.rss.com/reps4thor/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p>Welcome to Reps4Thor — a weekly deep dive into the systems behind the screen. We talk cloud platforms, security failures, internet outages, and the technical decisions that quietly shape everyday life online. Each episode turns complex topics into plain-English stories you can follow — whether you’re a curious beginner or a seasoned nerd who wants the details without the fluff.</p>]]></description>
    <generator>RSS.com 2026.401.141116</generator>
    <lastBuildDate>Fri, 17 Apr 2026 14:56:41 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[William Spurlin]]></copyright>
    <itunes:image href="https://media.rss.com/reps4thor/20251223_091245_6d0353c3f9c8de60daae1a4164070727.jpg"/>
    <podcast:guid>14584ae4-fad7-5e10-b223-14d75b5c3e6b</podcast:guid>
    <image>
      <url>https://media.rss.com/reps4thor/20251223_091245_6d0353c3f9c8de60daae1a4164070727.jpg</url>
      <title>Reps4Thor</title>
      <link>https://reps4thor.com</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>William Spurlin</podcast:license>
    <itunes:author>Reps4Thor</itunes:author>
    <itunes:owner>
      <itunes:name>Reps4Thor</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Technology"/>
    <itunes:category text="Science"/>
    <podcast:txt purpose="applepodcastsverify">61019e70-e0d4-11f0-be0a-cbbf82c26f2d</podcast:txt>
    <podcast:medium>podcast</podcast:medium>
    <item>
      <title><![CDATA[2 Million Devices, 1.7 Billion Commands: How Kimwolf Broke Into Home Networks]]></title>
      <itunes:title><![CDATA[2 Million Devices, 1.7 Billion Commands: How Kimwolf Broke Into Home Networks]]></itunes:title>
      <description><![CDATA[<p>A botnet called Kimwolf has quietly turned everyday living-room devices—especially off-brand Android TV boxes—into a global attack platform. Researchers say it pushed ~1.7 billion DDoS commands in 72 hours, with estimated capacity approaching ~30 Tbps, and grew to ~1.8–2 million infected devices across 200+ countries/regions.</p><p></p><p>In this episode, we break down how Kimwolf scaled so fast without phishing: attackers abused the residential proxy ecosystem to tunnel into home networks, then hunted for devices exposing ADB (Android Debug Bridge)—a factory/testing feature that can provide powerful control when left open. Once inside, it’s a quick path to install malware, join the botnet, and start proxying traffic or participating in DDoS waves.</p><p></p><p>Why this matters: Kimwolf isn’t just about knocking sites offline. A large share of activity focuses on proxying—selling or abusing your home IP as a relay for criminal traffic—making attacks look like they’re coming from “normal” residential connections.</p><p></p><p>What you’ll learn:</p><p></p><ul><li>How residential proxies can become a “hall pass” into internal home networks</li><li>Why cheap uncertified Android TV boxes are a repeat target</li><li>Practical defenses: guest/IoT networks, device audits, and when to unplug a risky box</li><li>Signs of compromise: unexpected traffic, overheating at idle, slow internet, weird outbound connections</li></ul><p></p><p>Check if your IP was seen in Kimwolf-related traffic (copy/paste link): <a target="_blank" rel="noopener noreferrer nofollow" href="https://synthient.com/check">https://synthient.com/check</a></p><p>Keywords/tags: Kimwolf, botnet, DDoS, Android TV box, ADB, residential proxies, IoT security, home network security, cybersecurity</p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2428990</link>
      <enclosure url="https://content.rss.com/episodes/362165/2428990/reps4thor/2026_01_04_21_25_34_2e97dd5a-1208-4c01-8e18-131f80bdcb76.mp3" length="11148827" type="audio/mpeg"/>
      <guid isPermaLink="false">458589bc-b15f-462d-9b9f-d225a0b9480f</guid>
      <itunes:duration>696</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 27 Jan 2026 05:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20260104_090132_8467bc2ce6e08d0c722bcec9e508066b.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2428990/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[UPnP, WPS, and Other “Convenience” Traps on Home Routers]]></title>
      <itunes:title><![CDATA[UPnP, WPS, and Other “Convenience” Traps on Home Routers]]></itunes:title>
      <description><![CDATA[<p>This week on Reps4Thor Weekly, we tackle the most underrated piece of everyday cybersecurity: your home network. In plain English, we break down how your modem, router, and Wi-Fi actually work, what attackers typically go after in home environments, and why most “hacks” are really just weak passwords, outdated firmware, and risky default settings.</p><p></p><p>Then we walk through a practical one-hour hardening routine you can do today—no IT degree required. You’ll learn what to change, what to disable, and how to segment your devices so your “smart” gadgets don’t share the same trust level as your phone and work laptop.</p><p></p><p>What we cover:</p><p></p><ul><li>Router admin passwords and why defaults are dangerous</li><li>Firmware updates that actually matter</li><li>Disabling remote admin access (unless you truly need it)</li><li>WPA3/WPA2 settings and choosing a strong Wi-Fi password</li><li>Guest networks and basic segmentation for IoT devices</li><li>Why UPnP and WPS can be security foot-guns</li><li>How to audit connected devices and kick off anything suspicious</li><li>A simple “one hour” checklist challenge to lock it all down</li></ul><p></p><p></p><p>Keywords/tags:</p><p>cybersecurity, home network, Wi-Fi security, router, firmware, WPA3, WPA2, UPnP, WPS, IoT security, guest network, privacy, Reps4Thor</p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2428656</link>
      <enclosure url="https://content.rss.com/episodes/362165/2428656/reps4thor/2026_01_04_18_27_43_fec643e1-4f48-46a4-a541-a7b4977fca80.mp3" length="14127204" type="audio/mpeg"/>
      <guid isPermaLink="false">7d141460-1cf8-4dff-9ef9-e6cf26e12417</guid>
      <itunes:duration>882</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 20 Jan 2026 05:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20260104_060141_e144acfad3af4b24d264ebcbdad1f111.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2428656/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[The Complete Metroid Lore Run: Zero Mission → Dread, with Prime 4 on Deck]]></title>
      <itunes:title><![CDATA[The Complete Metroid Lore Run: Zero Mission → Dread, with Prime 4 on Deck]]></itunes:title>
      <description><![CDATA[<p>Full spoiler warning: this episode covers major story beats and endings across the Metroid series.</p><p></p><p>This week, we run the entire Metroid timeline end-to-end—how the Chozo shaped the galaxy, why Metroids were created, how the Space Pirates and the Federation keep turning existential threats into “tools,” and how Samus Aran becomes the pivot point that holds the whole saga together.</p><p></p><p>We connect the 2D mainline arc (the core story from Metroid/Zero Mission through Dread) with the Metroid Prime era (Phazon, Dark Samus, and the long-running setup that feeds into Metroid Prime 4: Beyond). We also talk about how the series’ themes stay consistent even as games explore different corners of the timeline: containment, corruption, and control—who gets to hold the most dangerous thing in the room, and what it costs.</p><p></p><p>Games covered (in timeline order):</p><p>Metroid: Zero Mission</p><p>Metroid Prime</p><p>Metroid Prime Hunters</p><p>Metroid Prime 2: Echoes</p><p>Metroid Prime 3: Corruption</p><p>Metroid Prime: Federation Force</p><p>Metroid Prime 4: Beyond</p><p>Metroid: Samus Returns</p><p>Super Metroid</p><p>Metroid: Other M</p><p>Metroid Fusion</p><p>Metroid Dread</p><p></p><p>Tags/keywords:</p><p>Metroid, Samus Aran, Nintendo, Metroid Prime, Metroid Dread, Chozo, Space Pirates, Phazon, X Parasite, Lore, Timeline, Story Explained</p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2428547</link>
      <enclosure url="https://content.rss.com/episodes/362165/2428547/reps4thor/2026_01_04_17_29_53_e5da1e37-0acb-40fd-8e6e-275609834793.mp3" length="20533682" type="audio/mpeg"/>
      <guid isPermaLink="false">b19f55a1-e2c9-42b5-aca2-6282aef3eacc</guid>
      <itunes:duration>1283</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 13 Jan 2026 05:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20260104_050151_19be1b57e0d8d4cd9477b9aaf97e8ea2.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2428547/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[Deepfakes & Voice Clones: Spot the Fake Without Losing Your Mind]]></title>
      <itunes:title><![CDATA[Deepfakes & Voice Clones: Spot the Fake Without Losing Your Mind]]></itunes:title>
      <description><![CDATA[<p>This week on Reps4Thor Weekly, we break down deepfakes, voice cloning, and synthetic media in plain English—what’s actually easy to fake, what’s harder to fake, and why the real danger is how fast trust can erode online. You’ll learn a simple “spot the fake” mindset that doesn’t require forensic skills, plus practical verification habits for clips, screenshots, and viral posts.</p><p></p><p>We also cover the most real-world threat for everyday people right now: AI voice scams. You’ll get a clean, repeatable protocol to shut them down—break the channel, verify identity, slow the transaction—without panicking or overthinking it. End result: calmer decisions, fewer gotchas, and a brain that doesn’t auto-download outrage.</p><p></p><p>Episode Challenge: Set a shared secret or code phrase with the people who matter, and use it anytime a message involves urgency, money, or sensitive info.</p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2415383</link>
      <enclosure url="https://content.rss.com/episodes/362165/2415383/reps4thor/2025_12_27_15_17_56_583a2b81-8a8e-4002-9baa-726d42060c7e.mp3" length="12220892" type="audio/mpeg"/>
      <guid isPermaLink="false">c20d8552-c9e9-4932-8de6-0fb09ccc51a2</guid>
      <itunes:duration>763</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 06 Jan 2026 05:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20251227_031254_246729c708e78e8ef8fdcb6effd856c8.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2415383/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[Cloudflare and the Global Network]]></title>
      <itunes:title><![CDATA[Cloudflare and the Global Network]]></itunes:title>
      <description><![CDATA[<p>Reps4Thor Weekly returns with a plain-English breakdown of Cloudflare: what it is, what it actually does on the internet, and why it can feel like “half the web is down” when major infrastructure hiccups. We cover how Cloudflare works as a global edge layer for DNS, security, and content delivery, why that scale makes it a huge force multiplier for speed and protection, and how that same centralization can amplify outages when something goes sideways.</p><p></p><p>We also walk through recent Cloudflare outage case studies, what Cloudflare said caused them, why rapid global config changes can create big blast radiuses, and what “fail small” resilience strategies look like when you’re operating at internet scale. You’ll leave with a clearer mental model of modern web dependencies and a simple weekly challenge to map the critical services your favorite sites rely on.</p><p></p><p>Key takeaways:</p><p></p><ul><li>What Cloudflare is (CDN, DNS, reverse proxy, WAF, DDoS protection, bot management, and more)</li><li>Why shared infrastructure makes outages feel “global”</li><li>How configuration rollouts can trigger fast, wide impact</li><li>Practical lessons for builders: know your dependencies, plan for edge impairment, and verify your incident playbook</li></ul><p></p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2415381</link>
      <enclosure url="https://content.rss.com/episodes/362165/2415381/reps4thor/2025_12_27_15_15_19_b46a8fa7-e82c-49a1-bec5-aeba93bac534.mp3" length="14941388" type="audio/mpeg"/>
      <guid isPermaLink="false">ec5e5661-1ace-4ee0-b706-30a65e891e7b</guid>
      <itunes:duration>933</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 30 Dec 2025 05:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20251227_031216_d5c2af5a6fd910582437f6d3b9f487c3.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2415381/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[Signal in the Noise: Welcome to Reps4Thor Weekly]]></title>
      <itunes:title><![CDATA[Signal in the Noise: Welcome to Reps4Thor Weekly]]></itunes:title>
      <description><![CDATA[<p>Welcome aboard, operators. This is the kickoff episode of Reps4Thor Weekly—a practical, human take on cybersecurity, privacy, tech culture, and staying sharp without turning into a full-time IT department. Today: the “Signal in the Noise” filter for headlines, the top real-world threats (credential attacks, social engineering, and session/device compromise), a 15-minute weekly hardening ritual, and one habit that nukes phishing: refusing to fall for manufactured urgency. Wraps with a legal mini-challenge to map your account exposure and fix the weakest link.</p>]]></description>
      <link>https://rss.com/podcasts/reps4thor/2409317</link>
      <enclosure url="https://content.rss.com/episodes/362165/2409317/reps4thor/2025_12_23_22_07_18_2a8dfa86-03ec-4688-9438-3851b08a4dec.mp3" length="12774654" type="audio/mpeg"/>
      <guid isPermaLink="false">5e429306-034f-4fed-99ba-33ae0f3adf8a</guid>
      <itunes:duration>798</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 23 Dec 2025 22:08:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/reps4thor/ep_cover_20251223_101216_1ed81bf14ce1e73f01f8c85e10609938.jpg"/>
      <podcast:transcript url="https://transcripts.rss.com/362165/2409317/transcript" type="text/vtt"/>
    </item>
  </channel>
</rss>