<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://howhackshappen.net/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>How Hacks Happen</title>
		<atom:link href="https://howhackshappen.net/feed/podcast/how-hacks-happen/" rel="self" type="application/rss+xml"/>
		<link>https://howhackshappen.net/podcasts/how-hacks-happen/</link>
		<description>Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet. &nbsp;</description>
		<lastBuildDate>Thu, 18 Sep 2025 21:22:39 +0000</lastBuildDate>
		<language>en-us</language>
		<copyright>© 2025 How Hacks Happen</copyright>
		<itunes:subtitle></itunes:subtitle>
		<itunes:author>Many Worlds Productions</itunes:author>
		<itunes:type>episodic</itunes:type>
		<itunes:summary>Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet. &nbsp;</itunes:summary>
		<itunes:owner>
			<itunes:name>Many Worlds Productions</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:image href="https://howhackshappen.net/wp-content/uploads/2025/09/g6t2949bnp3dutzm9gh57g0hy9ss.jpg"></itunes:image>
			<image>
				<url>https://howhackshappen.net/wp-content/uploads/2025/09/g6t2949bnp3dutzm9gh57g0hy9ss.jpg</url>
				<title>How Hacks Happen</title>
				<link>https://howhackshappen.net/podcasts/how-hacks-happen/</link>
			</image>
		<itunes:category text="True Crime">
		</itunes:category>
		<itunes:category text="News">
									<itunes:category text="Tech News"></itunes:category>
							</itunes:category>
		<itunes:category text="Technology">
							</itunes:category>
		<googleplay:author><![CDATA[Many Worlds Productions]]></googleplay:author>
						<googleplay:description>Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet. &nbsp;</googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<googleplay:image href="https://howhackshappen.net/wp-content/uploads/2025/09/g6t2949bnp3dutzm9gh57g0hy9ss.jpg"></googleplay:image>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>238b5345-d46f-5fe5-8d59-762d7aba34f9</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.12.0" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.9.4</generator>

<item>
	<title>Bug Bounties: Getting Paid to Hack</title>
	<link>https://howhackshappen.net/podcast/bug-bounties-getting-paid-to-hack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bug-bounties-getting-paid-to-hack</link>
	<pubDate>Sun, 14 Sep 2025 11:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/bug-bounties-getting-paid-to-hack/</guid>
	<description><![CDATA[<p>The finale of HBO&apos;s Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/bug-bounties-getting-paid-to-hack/">Bug Bounties: Getting Paid to Hack</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[The finale of HBO&apos;s Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat ha]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>The finale of HBO&apos;s Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/bug-bounties-getting-paid-to-hack/">Bug Bounties: Getting Paid to Hack</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17839102-bug-bounties-getting-paid-to-hack.mp3" length="16984329" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[The finale of HBO&apos;s Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays [&#8230;]
The post Bug Bounties: Getting Paid to Hack first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[The finale of HBO&apos;s Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays [&#8230;]
The post Bug Bounties: Getting Paid to Hack first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Red Team: The Best Job in Cybersecurity (Until You Get Arrested)</title>
	<link>https://howhackshappen.net/podcast/red-team-the-best-job-in-cybersecurity-until-you-get-arrested/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=red-team-the-best-job-in-cybersecurity-until-you-get-arrested</link>
	<pubDate>Sun, 07 Sep 2025 11:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/red-team-the-best-job-in-cybersecurity-until-you-get-arrested/</guid>
	<description><![CDATA[<p>What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/red-team-the-best-job-in-cybersecurity-until-you-get-arrested/">Red Team: The Best Job in Cybersecurity (Until You Get Arrested)</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/red-team-the-best-job-in-cybersecurity-until-you-get-arrested/">Red Team: The Best Job in Cybersecurity (Until You Get Arrested)</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17801212-red-team-the-best-job-in-cybersecurity-until-you-get-arrested.mp3" length="20593989" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of [&#8230;]
The post Red Team: The Best Job in Cybersecurity (Until You Get Arrested) first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of [&#8230;]
The post Red Team: The Best Job in Cybersecurity (Until You Get Arrested) first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Random Number Generators Pt 3: Under the Hood</title>
	<link>https://howhackshappen.net/podcast/random-number-generators-pt-3-under-the-hood/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=random-number-generators-pt-3-under-the-hood</link>
	<pubDate>Sun, 31 Aug 2025 13:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/random-number-generators-pt-3-under-the-hood/</guid>
	<description><![CDATA[<p>What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We&apos;ll even do a simple exercise you [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-3-under-the-hood/">Random Number Generators Pt 3: Under the Hood</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We&apos;ll even do a simple exercise you [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-3-under-the-hood/">Random Number Generators Pt 3: Under the Hood</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17759435-random-number-generators-pt-3-under-the-hood.mp3" length="17203153" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We&apos;ll even do a simple exercise you [&#8230;]
The post Random Number Generators Pt 3: Under the Hood first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We&apos;ll even do a simple exercise you [&#8230;]
The post Random Number Generators Pt 3: Under the Hood first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Random Number Generators Pt 2: Unsecure Devices</title>
	<link>https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=random-number-generators-pt-2-unsecure-devices-2</link>
	<pubDate>Sun, 24 Aug 2025 23:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices-2/</guid>
	<description><![CDATA[<p>Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices-2/">Random Number Generators Pt 2: Unsecure Devices</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices-2/">Random Number Generators Pt 2: Unsecure Devices</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17709117-random-number-generators-pt-2-unsecure-devices.mp3" length="17652672" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]
The post Random Number Generators Pt 2: Unsecure Devices first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]
The post Random Number Generators Pt 2: Unsecure Devices first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Random Number Generators Pt 2: Unsecure Devices</title>
	<link>https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=random-number-generators-pt-2-unsecure-devices</link>
	<pubDate>Sun, 24 Aug 2025 23:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/?podcast=random-number-generators-pt-2-unsecure-devices</guid>
	<description><![CDATA[<p>Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices/">Random Number Generators Pt 2: Unsecure Devices</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure ]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-2-unsecure-devices/">Random Number Generators Pt 2: Unsecure Devices</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17709117-random-number-generators-pt-2-unsecure-devices.mp3" length="17652672" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]
The post Random Number Generators Pt 2: Unsecure Devices first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources [&#8230;]
The post Random Number Generators Pt 2: Unsecure Devices first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Random Number Generators Pt 1: Cheating at Video Games</title>
	<link>https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=random-number-generators-pt-1-cheating-at-video-games-2</link>
	<pubDate>Tue, 19 Aug 2025 17:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games-2/</guid>
	<description><![CDATA[<p>This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games-2/">Random Number Generators Pt 1: Cheating at Video Games</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encrypti]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games-2/">Random Number Generators Pt 1: Cheating at Video Games</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17690401-random-number-generators-pt-1-cheating-at-video-games.mp3" length="16946126" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]
The post Random Number Generators Pt 1: Cheating at Video Games first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]
The post Random Number Generators Pt 1: Cheating at Video Games first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Random Number Generators Pt 1: Cheating at Video Games</title>
	<link>https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=random-number-generators-pt-1-cheating-at-video-games</link>
	<pubDate>Tue, 19 Aug 2025 17:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/?podcast=random-number-generators-pt-1-cheating-at-video-games</guid>
	<description><![CDATA[<p>This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games/">Random Number Generators Pt 1: Cheating at Video Games</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encrypti]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/random-number-generators-pt-1-cheating-at-video-games/">Random Number Generators Pt 1: Cheating at Video Games</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17690401-random-number-generators-pt-1-cheating-at-video-games.mp3" length="16946126" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]
The post Random Number Generators Pt 1: Cheating at Video Games first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. [&#8230;]
The post Random Number Generators Pt 1: Cheating at Video Games first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Payday Loans: A Very American Scam</title>
	<link>https://howhackshappen.net/podcast/payday-loans-a-very-american-scam-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=payday-loans-a-very-american-scam-2</link>
	<pubDate>Sun, 10 Aug 2025 12:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/payday-loans-a-very-american-scam-2/</guid>
	<description><![CDATA[<p>Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/payday-loans-a-very-american-scam-2/">Payday Loans: A Very American Scam</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it wor]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/payday-loans-a-very-american-scam-2/">Payday Loans: A Very American Scam</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17646682-payday-loans-a-very-american-scam.mp3" length="17020692" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]
The post Payday Loans: A Very American Scam first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]
The post Payday Loans: A Very American Scam first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Welcome to Season 5!</title>
	<link>https://howhackshappen.net/podcast/welcome-to-season-5-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=welcome-to-season-5-2</link>
	<pubDate>Sun, 10 Aug 2025 12:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/podcast/welcome-to-season-5-2/</guid>
	<description><![CDATA[<p>New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let&apos;s do some more!   Send us a text Support the show Join our Patreon to listen ad-free!</p>
<p>The post <a href="https://howhackshappen.net/podcast/welcome-to-season-5-2/">Welcome to Season 5!</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let&apos;s do some more!   Send us a text Support the show Join our Patreon to listen ad-free!
The post Welcome to Season 5! first appear]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let&apos;s do some more!   Send us a text Support the show Join our Patreon to listen ad-free!</p>
<p>The post <a href="https://howhackshappen.net/podcast/welcome-to-season-5-2/">Welcome to Season 5!</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17646954-welcome-to-season-5.mp3" length="526218" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let&apos;s do some more!   Send us a text Support the show Join our Patreon to listen ad-free!
The post Welcome to Season 5! first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let&apos;s do some more!   Send us a text Support the show Join our Patreon to listen ad-free!
The post Welcome to Season 5! first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Payday Loans: A Very American Scam</title>
	<link>https://howhackshappen.net/podcast/payday-loans-a-very-american-scam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=payday-loans-a-very-american-scam</link>
	<pubDate>Sun, 10 Aug 2025 12:00:00 +0000</pubDate>
	<dc:creator><![CDATA[Many Worlds Productions]]></dc:creator>
	<guid isPermaLink="false">https://howhackshappen.net/?podcast=payday-loans-a-very-american-scam</guid>
	<description><![CDATA[<p>Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/payday-loans-a-very-american-scam/">Payday Loans: A Very American Scam</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></description>
	<itunes:subtitle><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it wor]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]</p>
<p>The post <a href="https://howhackshappen.net/podcast/payday-loans-a-very-american-scam/">Payday Loans: A Very American Scam</a> first appeared on <a href="https://howhackshappen.net"></a>.</p>]]></content:encoded>
	<enclosure url="https://pdcn.co/e/www.buzzsprout.com/1241654/episodes/17646682-payday-loans-a-very-american-scam.mp3" length="17020692" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]
The post Payday Loans: A Very American Scam first appeared on .]]></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Many Worlds Productions]]></itunes:author>	<googleplay:description><![CDATA[Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don&apos;t know how it works. Find out how [&#8230;]
The post Payday Loans: A Very American Scam first appeared on .]]></googleplay:description>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
