All Episodes

June 6, 2025 • 22 mins
Helpful episodes to listen to first

4 Strategies for Picking Your Priorities

Questions we answer in this episode

What does Makani love building?

What is a Security Stack?

How do you build one?

What is the twist on our usual Call-to-Actions for this series?

Episode summary

A Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.

You build a Security Stack using The Bulletproof Stack Formula, which consists of 4 Phases, 5 Questions, and 6 Layers.

Call to action

Please build this awesome system together with me by sharing your thoughts. Does the idea of a "Security Stack" make sense to you so far? Let me know on the forum.

Get the FREE Bulletproof My Identity Starter Kit

Get help from Makani

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
Welcome to Super Simple Security Principles. I'm Nick Jackson and I wanna love computers.

(00:07):
They don't love me back. I'm learning how to stay safe online from my good buddy
and master guardian, Makani Mason. He wrote his first computer program at the age of six,
sealing his fate as a computer geek. That's it. He knows his stuff, folks.

(00:33):
Now he spends his time teaching people like me and you how to stay ahead of the digital threats
we face and those bad guys. He keeps it simple and we love it. Learn along with me each week.
I'll ask the questions and make sure he keeps it super relevant and super simple for us.

(00:58):
If I can do it, you can do it too. This is episode 66. What is a security stack?
All right, we're gonna do things a little different in this episode. You're gonna hear
it in our call to action. You're gonna hear it at the beginning. So I'm gonna sound off on what
we're gonna discuss in Squishy's terms, in my terms. So please know that this is gonna be me

(01:25):
sounding off on what we're about to learn. So in today's episode, we're gonna be hearing about
Makani as a problem solver and a builder. And folks, I gotta tell you a story about
Mr. Master Guardian. He is a gamer. In case you haven't heard him talk about games,

(01:46):
he's a gamer. One of my favorite things that he loves to do is he builds entire
complicated strategies of defense only. He builds a defense because he loves to protect.
He loves to keep people safe. You know, he's always told me, I'll be the defense,

(02:11):
you be the offense, which is really kind of fun because he's always got my back.
So guys, I wanted to give you that insight because guess what? We're gonna be talking
about how he's gonna simplify security stacks and help this non-tech geek. He's gonna explain to us
how to build one and what they do for us. So, and guess what? He's gonna be answering

(02:37):
some really cool questions. So here's the questions with no further ado.
What does Makani love building? What is a security stack? How do you build one?
What is the twist on our usual call to action in this series?

(02:59):
All right, buddy. Dude, you got me totally intrigued, man. Because A, I have no clue
what a security stack is. So man, where do we start today?
Well, thanks for that story, Nick. And it's true, I do. I love playing the defense and healer is a
common role in games too. And I do like building. And actually that's, it was a perfect lead into

(03:24):
where I plan on starting because the theme that you talked about that I love building,
the name I have for that is systems. I love building systems. And I love learning systems
too. I love like math, obviously we know. Grammar is a system that I enjoy. Even human kind of funny

(03:45):
systems, color-coded personality types. I love magic systems in books. Anyway, I could go on.
I love systems because they help us understand, help us communicate, talk about complex concepts,
and they help us build with them. That's right. So in this case, I want to build a system for

(04:15):
building. Well, yeah. So the system I want is for building security stacks.
As a software developer, that's one of my strengths is building systems. And I want to take that to
online security because there are a lot of already, there are a lot of systems for online
security out there. Lots of acronyms, lots of approaches. But the problem is they're all built

(04:41):
for techies. So that's where I come in, kind of my unique role is I want to build systems that
anyone can use. And we've talked about the 4P formula. I feel like that's one anyone can use.
And so this next one is the, well, so the thing we're going to be building is security stacks.

(05:06):
And a little bit later, we'll talk about the formula that I have and discuss two possible
names that I have for it. All right. That gives us kind of the structure about how we do it. So
this is all going to be a little bit kind of abstract, which is where I think, but I'm going
to try to put as much concrete detail with it as possible. So it's not confusing, but it's kind of

(05:30):
laying out the tools. And then as we work through the series, we will go through a ton of concrete
examples. So if anything is, you know, remains like fuzzy or kind of too abstract or academic or
whatever, it won't be. And I'm going to try to keep it concrete from the get go. But anyway, that's,

(05:51):
yeah, does that make sense? That makes total sense. Yeah. And I'll add this caveat too.
It's not finished, right? We're going to call it in beta, right? So I'm looking to help from you,
Nick. I'll be consulting with Kem regularly, right? You, you know, you've got your role of
keeping it simple and make sure that every piece is understandable to you and our listeners. And

(06:17):
Kim helps with a lot of things. And anyway, together we'll kind of bring this awesomeness
to release to version one, you know? Yeah.
Okay. So let's answer the question, at least in part, what is a security stack? Yeah.

(06:38):
So one way to describe it is, is it's one part of your bigger personal security plan. It's like
a sub plan focused on one area. So you might have one security stack related to phishing,
another one for email, and a third for online shopping. Yeah. And each stack is built from

(07:02):
layers of protection that work together, like we've talked about every episode, basically,
to defend and protect that in that specific area. Okay. Now, long-term, we're going to have some
cool visuals and pictures and things we can have, you know, to help illustrate this as well. But
we're going to do our best to describe it verbally for today. Yeah. Yeah, for sure. Absolutely.

(07:28):
Absolutely. So part of what we look at is my choice of phrase security stack.
Yeah. Yeah. That was actually one of my questions is, help illustrate a security stack for me.
Yeah. Well, so that phrase, you'll see it online in security or online security in general. But

(07:49):
the reason I picked it is not just because it sounds good or even because it's fun to say,
because it's alliteration, which I like, but it's because a stack is ordered, right? Like a
layered cake or a foundation of a house, the stuff at the bottom supports everything above that.
Right? Okay. The order matters. That's basically the whole point of a stack is just that

(08:14):
the order matters. The order matters. Okay. It's not just a random selection of things.
So we're taking and we're building the infrastructure with our security stacks of
the order we want to protect ourselves in. Is that correct? Well, so say we're talking about
a security stack about phishing. Yeah. And so we would say, okay, what is the most important

(08:37):
first layer for phishing? Oh, gotcha. Gotcha. That would be the bottom one.
And then the next most important, and then the next most important. Okay. Okay. Okay. So these
stacks remain individualized for the area of concern. It's never blended. Yeah. Okay. Well,

(08:59):
so sort of, because I mean, the thing is, yes, absolutely. But you can also look at it in
different ways. So, because if you talk about a security stack for phishing, for email, for online
shopping, and, you know, say you have 10 different ones, well, there's going to be a lot of overlap
those. So you could also kind of take a unified version and shove them all together. It's just

(09:21):
not very practical in terms of building it up individually. But if you're looking at what your
overall plan looks like, there's certainly going to be a lot of overlap. And so you could
put them together if that makes sense. Yeah, that makes sense. Perfect. Okay.
I got how they were. This is pretty cool. This is kind of, the thought I had is, like, you're

(09:43):
kind of building your army in a way. Like, oh, okay, well, I'm going to need this many foot soldiers.
I'm going to need this many jets. I'm going to need this many, you know. Yes. That's exactly,
that is exactly the idea. Yep. Right. We want to, we've been talking about these disjointed
individual layers or troop types in this metaphor, right? Yeah. And so the security

(10:08):
stacks are kind of the next level of organization where we start taking those layers and grouping
them, organizing them for specific purposes. Let's go. Okay. I get it, man. I get it.
Okay, good. So in the last episode, we talked about, you know, priorities. Yeah. Right. Yeah.
And those are our strategies for picking an area that we want to focus on first or next for our

(10:32):
security stack. Right. Okay. Yeah. And so today's episode and the next three, and this will wrap up
um, how we actually then put that together. Okay. So the, uh, trying to think. Okay. So

(10:57):
there's, I totally derailed you. I'm sorry. No, no, not at all. No, you didn't, you know,
you did not derail me at all. I just kind of, yeah. I'm pumped now. Cause I look at what we're
about to do and it's like, okay, legitimately, like I'm building my army here now, but I'm

(11:19):
formulating a plan. And like, um, the bottom layers are going to be my most important, you
know? And like, I'm pumped, man. Like this is going to be fun. Yeah. No. And you didn't throw
me off at all. It's just, sometimes I have like a thought and then it like, you know how you get
that thought and then it like runs away before you spit it out. You know? Anyway, one of kind

(11:42):
of those things, but I think I got it back. So the, the name, so the first name I chose for this
formula was the Bulletproof Stack Formula. Okay. What, and so the reason why I chose that obviously
is of course related to Bulletproof Dojo and overall theming of Bulletproof, right? Makes
sense. And it kind of conveys what I'm trying to do here in terms of being comprehensive.

(12:08):
But here's another possible candidate name that I kind of like better in a different way.
And that is the 3D Stack Formula. 3D? Yeah. And here's why. Okay. So the point of this formula,
well, let me actually, before we get into the name, let me just tell you what it consists of,
because it has three parts. Okay. It's four phases, five questions, and six layers. So we

(12:36):
go four, five, six, you know, easy to remember, right? Four, five, six. Okay. Well, technically
we would go three, four, five, six, right? If we did the 3D. Oh, right. Yeah. The three parts of
them. Yeah, exactly. Well, that's part of it. That's part of the reason why the 3D, right?
Right. But also the 3D is, it's not just like, you know, because 3D is familiar, but the whole

(13:01):
idea with 3D versus 2D, right, is it gives, it's like more realistic, right? It's more complete.
Not just 2D on the screen, it's two dimensions. Like, and when we're talking about your security
stack or your plan, what we want to make sure that we do, and this is the whole point of this
formula, is to make sure we are thinking about all the different aspects from all the different

(13:23):
angles. And each of the four phases, each of the five questions, each of the six layers
accomplishes that same purpose in just a different way. It's helping us make sure that we cover
that security stack and approach the layers that we're selecting
intelligently. Does that make sense? Yeah. And so it's like some people, you know,

(13:48):
they, they focus on just this one dimension or even just this one part of one dimension,
you know, because that's the service they provide and that's fine, right? But like what we don't
sell any services other than teaching you how to do this, obviously. Right. And so our goal
is to make sure we look at it comprehensively, all the tools, all the things you can learn,

(14:12):
and that's our goal. So anyway, those are, those are the two names. And like I said,
I'm kind of leaning towards 3D now that I, now that I thought, you know, thought of it, but yeah.
When we get to our twists on our usual call to actions for this series,

(14:34):
I'll weigh in on my thoughts, just so I can get the last word.
Sounds good. Well, and actually I think that's all I have to say before our call to action,
because really, yeah. So in the next three episodes, we're going to dive into each of those.
Okay. And so that's kind of where I, you know, I mean, it's always hard to determine where to

(14:55):
break, but I just, I wanted to have enough time to go into each of those in enough depth
and not try to shoe them or shoehorn them in here. So it's just kind of the introduction
and that's, so that's, yeah, that's all I've got for today.
Sweet. I love it, man. I love it. That was, okay. So let me put my plug in. I know you love 3D

(15:17):
because it's realistic, you know, like it's, it's, you're seeing it on such a broad scope.
Yeah. So we're, we're truly going to call on our listeners because you surprised me with this.
You wouldn't let me in on your little secret. So I'm going to add my own twist to it. So for

(15:38):
those listeners that love Makani's 3D and that resonates with them, let us know. If you're like
Squish here, you know, me, do they get to see my nickname on the, on the screen? Does it come
up as Squishy? Do they even know that's my preferred name? I don't know. It does for me

(16:00):
right now, but I'm not sure in our, in our video. Anyways. So you, if you agree with me and you like,
was it Security Dojo? Oh, well the Bulletproof Stack Formula. Bulletproof. Yes. If you're like
me and you're like Bulletproof, because when he said three, four, five, six, my immediate thoughts

(16:24):
were, Hey, look, we're building an army. Let's get Bulletproof. Like we're going to build our
defense first. So if Bulletproof resonates with you, we want to hear from you, you know, vote
Team Squish. You like 3D. I get it. I get it. He is our master guardian after all, you know,

(16:49):
you can weigh in on him. My feelings won't be hurt at all, but I love Bulletproof.
I mean, like I used to tell my kids when they would worry about dad, I'd be like, don't worry
about that. He's 10 feet tall and Bulletproof. Am I? No, but I love that phrase. Right. So

(17:10):
can we get him to weigh in? Well, yeah, absolutely. Well, and that's my call to action.
Okay. But so let me, I got to, I personally got to do a small rebuttal though,
because I totally with you on the Bulletproof and that's obviously why I went there. Right.
And you know, our overall kind of, if we're going to pick one theme of everything we do,

(17:34):
right. It's going to be Bulletproof still is absolutely. And so I guess maybe I'm kind of
like, you know, keeping that, you know, in my back pocket. I'm like, there's something,
there might be some other, you know, formula or rule or something that I want to throw Bulletproof
on, you know? Right. Right. I just want to, you know, keep that available for me since this is

(17:56):
another good one, you know, but. Didn't you say there were multiple types of Bulletproof vests?
Yeah, there are. Absolutely. Well, and Hey, we could call it the 3D Bulletproof stack formula.
There we go. We could give them three options. If you want us to get along,
you can vote for option three. Yeah. So you say we should be harmonious in this relationship.

(18:22):
Go ahead and vote for that. That's right. Yeah. So I'll give them the expanded version of the,
the call to action though. And it kind of set the stage for the rest of the series. Right.
Because as I mentioned in the beginning, you know, we're actively building this system.
Yeah. And so I'm asking basically for your help in shaping it. And so, you know, the call to

(18:50):
actions are going to be, instead of like the usual, something to do for yourself to, you know,
add a new layer of defense or whatever, it's going to be a call for help instead, you know, for
feedback. And of course the place to do that will be on the forums as the, my preferred, I mean,
you can, if you have my email or whatever, you can do that. But I, I like it on the forum because

(19:13):
then everybody gets to see it. Everybody gets to comment on your thoughts. We get to have a
discussion in the, in the group setting. Yeah. So my specific one for today, each, each time I'm
going to probably have, you know, one question. Yeah. And my question is I know we got you to
the point where you understood it, but what about for our listeners? My question is, does the idea

(19:35):
of a security stack make sense to you so far? Okay. Yeah. This is going to be kind of fundamental.
Yeah. And, you know, obviously we'll be fleshing it out in the, in the next one. So if it doesn't,
it's not the end of the world, but I would like to hopefully have, you know, things make sense at

(19:56):
each stage of the way, and then just kind of expand that understanding and, and vision of it
as we go along, if possible, rather than it being confusing until you get to the very end, if that
makes sense. That's, yeah, that makes total sense. So we want to hear from you sooner rather than
later. So if what's, what's been taught, isn't lining up, if it didn't click for you, we want to

(20:20):
Yep. I like it. Easy enough. Okay. What do you think, man? That was a great episode.
Yeah. You're going to tease him for about next week. Give him a, you know, I was thinking about it,
you know, I'm just going to tease them in the way we should tease them. So next week we're going to

(20:44):
be discussing the first part, and I'm going to put Makani's notes in, the TBD stack formula,
the four phases. We're going to stay with those. Those are going to stay with concrete. The TBD
stack, that's to be determined, folks. So he's still sitting on the fence.

(21:10):
Yep. Yep. So that's why you want to tune in next week. Let's see which way Makani decided to fall.
Did he go to the left? Did he go to the right? Did he decide to fall on the fence itself? So
let's find out which, which route we're going to be going. Shall we? Sounds good. I love it.

(21:31):
Great episode. Are you ready to take action and wondering where to start? Get my bulletproof,
my identity starter kit for free. The seven most vital layers of protection everyone needs.
I'll send you one step at a time and help you if you get stuck. Just go to bulletproofmyid.com

(21:55):
and enter your name and email and I will send you the first step. Again, that's bulletproofmyid.com.
Advertise With Us

Popular Podcasts

United States of Kennedy
Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.