Episode Transcript
Transcripts are displayed as originally observed. Some content, including advertisements may have changed.
Use Ctrl + F to search
0:01
We all depend on interconnectivity
0:04
to get things done. Our
0:06
phones, our cars, wearable technology,
0:08
and at our jobs, especially
0:10
if they're technical jobs, it's amplified. It
0:14
feels like everything has to be
0:16
integrated. There's APIs, platforms that need
0:18
to talk to systems that we
0:20
never touch. But
0:22
in some industries, there's a
0:24
desire, or more like a need, to
0:27
have everything locked down, isolated.
0:31
That's because those industries may
0:33
deal in sensitive information, data
0:35
that a hacker would drool over. But
0:38
these environments still need to do the same
0:40
things that other environments do. They
0:43
still need to store and manage that data,
0:45
ensure its accuracy. They still need to
0:48
provide space for developers to create and
0:50
innovate. But how? And
0:53
what is it like to work in that type
0:55
of environment? This
1:00
is Compiler, an original podcast
1:02
from Red Hat. I'm
1:04
Angela Andrews. And I'm Kim
1:07
Wong. We go beyond
1:09
the buzzwords in jargon and simplify
1:11
tech topics. Today's episode,
1:13
we're connecting the dots on
1:15
disconnected networks. Angela,
1:21
in the spirit of being accurate,
1:24
I spoke to someone
1:26
who has expertise in
1:28
disconnected networks. Oh yes,
1:31
yes. I
1:34
spoke to Josie Pfeiffer, a
1:36
Red Hat consultant. She's based
1:38
in Europe. Josie focuses on
1:40
infrastructure and security. She works
1:42
with customers who use disconnected
1:44
open shift clusters. A
1:47
disconnected open chef cluster is basically
1:49
an environment that isn't directly connected
1:51
to the internet, so you can
1:53
also call it Air Gop. It's.
1:56
Air. Gap does that sound familiar? Angela:
1:58
That is the word that the buzz
2:01
air get. Yes, I'll admit I didn't
2:03
know a lot about air Gap Networks
2:05
when I was going into doing this
2:07
episode. K So I did some research
2:09
and I found a great article that
2:12
was written Actually buy another Red Hatter
2:14
architect Steven Wilson who I'll read from
2:16
the article. the article. And. Air Gap
2:18
network is one that is self contained
2:20
but has no external or internet. Connectivity.
2:24
Networks are often air gapped as
2:26
an extreme security method for government
2:28
or corporate projects that require confidentiality
2:30
or secrecy. In a nutshell, that
2:33
is a perfect definition for what
2:35
an air gapped network is. The
2:38
level of security and
2:41
privacy that you need for
2:43
an environment like this must be
2:45
high. You cannot
2:48
have some sort of external
2:50
threat coming into
2:52
your network. So you
2:54
have to coordinate off in such
2:56
a way that everything works within
2:59
but nothing from the outside gets
3:01
in unless it's absolutely purposeful
3:03
and with very good reason.
3:06
Right. Usually via sneaker
3:08
net. Sneaker net? Do you remember
3:10
sneaker net? No. Maybe.
3:13
Wait. Let's go back.
3:15
Okay. All right. Let's
3:17
go all the way back. So I know our listeners
3:19
here, when they hear the term sneaker net, some of
3:22
them are saying, oh, I remember sneaker net. And
3:24
then we have some folks that are like, oh, what's
3:26
sneaker net? Okay. So
3:28
back in the day, when you wanted to
3:30
take a piece of data or file from
3:33
one machine to
3:35
another and maybe they
3:37
weren't networked, maybe they were, but they
3:39
weren't on the same, whatever, you
3:41
would get up and your sneakers would
3:44
walk across the floor and you'd have your
3:46
little floppy disk in your hand and
3:48
you'd go stick it in the other
3:50
system. That's what sneaker net
3:53
is. Oh wow. Okay. So
3:55
you're just like hand walking it from one
3:57
computer to another. Basically.
4:00
And I didn't say floppies. Yes, he did
4:02
say floppies of wow. Okay, so our it.
4:04
I guess that and that that tracks with
4:06
some other things I was reading about. Air
4:08
Gap Networks okay or eight Sleep or net
4:11
As I say something today. He
4:15
thinks I understand why it that
4:17
sister as rak sister is a
4:19
group of nodes that are like
4:21
working together and impairment right? That
4:23
is correct. And now we know.
4:26
Disconnected Network or an Air Gap
4:28
network is a self contained network
4:30
that does it connect the internet
4:32
or any other outside networks. Faith
4:34
that is correct. So what's the
4:36
difference between a disconnected network and
4:39
I disconnected cluster? Well. This.
4:41
Is me guessing here and
4:43
but a cluster. Is. Disconnected
4:45
is it lives in a
4:48
disconnect network rights so it
4:50
can be. Clustered
4:52
meaning. It sharing
4:55
network and storage. Like
4:57
it's sharing resources together with other
4:59
clusters. Better in the same network,
5:01
you can have a cluster in
5:03
one network. And a cluster in
5:05
another network and never the twain shall
5:07
meet. Now and it's
5:09
something that's only done when
5:11
the utmost security is needed.
5:14
So. It's not something
5:16
you just do for fun
5:19
of saw mostly just because
5:21
these organizations are highly regulated.
5:23
So financial services companies are
5:26
insurance companies. Urbanization the time
5:28
sensitive. States are all sorts of
5:30
air for example. But here's the
5:33
thing. many of the same things
5:35
that are in. A regular
5:37
more like open network for network
5:39
was connected to a cloud server,
5:41
for example. Also need to
5:44
be in an air gap network.
5:46
He still have the same things that need to
5:48
be done. Does that make sense? The
5:51
same bells and whistles are happening and disconnected.
5:53
Networks that they are in, regular
5:55
networks that are connected to each
5:57
other, And the Internet. And right that
5:59
is. It seems to have to
6:01
do the things they saw the do
6:03
the things. they still have to store
6:06
data, they have to still do file
6:08
sharing that's usually done and he Ftp
6:10
or trivial file transfer protocol is healing.
6:13
File transfers in a server, A, clients,
6:15
and disconnected networks. There's other components like
6:17
web servers, dns, cetera. But what are
6:20
the difficulties here? Shows.
6:23
He says for the opensaf cluster.
6:25
Itself there is the inability to
6:28
get updates from an external source.
6:30
The. Cluster Com Phone home so
6:32
to speak you for example Com
6:35
Fats upgrades that you can just
6:37
poof issue routed through the series.
6:39
Good customer with them. have to
6:42
operate their own internal registry that
6:44
the closer can connect to we
6:46
want to you. Seen the latest
6:48
and greatest teams of security. To
6:51
make sure that you're not running
6:54
a system that has known vulnerabilities
6:56
in that sounds. You want
6:58
the latest features? Are you
7:01
happy? To
7:03
fix things that you need
7:05
for that, there's a platform.
7:07
upgrades fastest to run the
7:09
basic open chest. And there's
7:11
a catalogue which as far operators expressing
7:14
like the Ups or for open chest
7:16
where you can install all kinds of
7:18
out on stop trying on top of
7:21
open chest and that add more functionality
7:23
to the costs are. What
7:25
I saw. In a
7:27
disconnected environment. You. Still need
7:30
to have updates and the latest
7:32
and greatest operators and things of
7:34
that nature one an individual would
7:36
do in a disconnect in environments
7:39
they wouldn't say. well were disconnected.
7:41
We are unable to perform these
7:43
tasks. Know you're doing this your
7:46
own version of Sneaker Net. And
7:49
set of to your next door
7:51
neighbor you're going to Red Hat
7:54
and you're downloading this latest version
7:56
or this image and what you're
7:58
gonna. Do is your. Going to check
8:01
the have to that, You're going to
8:03
make sure that the contents that Red
8:05
Hat has said this is what you're
8:08
downloading. You're going to confirm that when
8:10
you downloaded. You. Are make sure
8:12
that that's the exact same pass that
8:14
Bread had his said if anything has
8:17
changed, say there was a man in
8:19
the middle, there was some sort of
8:21
nefarious behavior and you download said package
8:24
and you ran the has in the
8:26
house was difference. You'd never use it.
8:28
So there's this level of checking that
8:30
you would have to do when you
8:33
downloaded anything from somewhere else. to bring
8:35
it into a disconnected environment. you'd have
8:37
to make sure that the integrity of
8:40
said files. Would be what they said they
8:42
were. The integrity was still
8:44
intact. Before you brought. It in
8:46
to you're disconnected network. My
8:49
boots And try an analogy. So.
8:52
Let's. Say you did order something from
8:54
amazon. And. Your package arrives at
8:57
your doorstep. Than
8:59
you might like. Look up on the
9:01
edges and you'd see if someone killed
9:03
off the sticky tape. On ads on
9:06
that is basically the into a
9:08
teacher it seeing if someone tampered
9:10
with the perception of it's okay
9:12
to deploy and to the closer.
9:15
Well. The need for that layer
9:17
of security is clear to. You.
9:20
Me: Josie: A lot of people listening,
9:22
but just in case it wasn't this,
9:24
plenty of rules and compliance steps to
9:26
ensure that things are kept locked up
9:28
pretty tight. For. Financial
9:31
services companies for example, their regular
9:33
audits and they need to get
9:35
the rubber stamp that they're compliance
9:38
with certain standards. And that's
9:40
a tricky part because different countries,
9:42
different standards, different regulations to follow,
9:44
and the punishment can be severe
9:47
for companies that failed to meet
9:49
the criteria. So Switzerland
9:51
for example of for have
9:53
a strong national regulatory body
9:56
that imposes additional requirements on
9:58
top and. The com. of
10:00
not meeting them can for one be
10:02
financial and so there could be fines
10:04
if you don't meet them and
10:07
it could also mean that if you're
10:09
a bank for example that they revoke
10:11
your license to operate as a bank.
10:14
High stakes yeah very but
10:17
that's good right? Well
10:19
if you're an avid online shopper like me
10:22
it is. It's good to
10:24
know that these networks are in
10:26
place they're protecting your information. But
10:30
how does one ensure the data handled
10:32
within a disconnected network is accurate if
10:35
it's not able to connect to
10:37
another service to ensure that accuracy?
10:39
People aren't static and neither is their
10:41
information. A network doesn't
10:43
just sit on the data it needs to
10:45
move it around use it process
10:47
it update it when it's needed Josie
10:50
breaks down the concept of
10:52
mirroring something that happens often
10:54
and disconnected environments. So
10:57
mirroring is basically just taking
10:59
something that exists in this
11:02
public registry and putting it
11:04
one-to-one into your internal disconnected
11:07
registry. Then it will
11:09
take the release images and
11:11
operator images from our official
11:13
Red Hat registries and will
11:16
mirror them to an internal
11:18
registry. The cluster will expect
11:20
things to be at the
11:22
official Red Hat registry location
11:24
but through that mapping it
11:26
can then find them in
11:28
the disconnected registry. Alright
11:31
so this internal registry what
11:33
mirroring does is since it can't
11:35
get information from outside the network
11:38
it's taking something that exists and putting
11:40
it into an internal disconnected registry and
11:43
then the cluster will
11:46
find and correctly identify data through
11:48
mapping to that local registry that's
11:50
on-premises. That sounds about right. Bam!
11:52
I got it. It tracks. Yes.
11:55
Okay. Well Disconnected
11:58
clusters, air gaps in the. Work
12:00
Fair. Restrictive for very good
12:02
reasons. But as things
12:04
keep changing and tech said that
12:07
change how we think about them
12:09
up Next we further examined the
12:11
need for air gaps networking and
12:13
find out how shifts and available
12:16
sack may affect our feelings around
12:18
security vs. innovation. Sit tight, will
12:20
be back. We.
12:26
Left off with Josie explaining
12:28
the functionality of disconnected opensaf
12:31
clusters. But. It made me
12:33
think more broadly. It
12:35
all seems safe and invisible to bad
12:38
actors, but at some point the data
12:40
needs to be transferred into a public
12:42
cloud or some other networks in order
12:45
for it to be used effectively. and
12:47
there's still a layer of security there,
12:49
something that many of us are familiar
12:52
with encryption. Whenever you go
12:54
from Amazon and you put in your
12:56
current details for example, Because
12:58
for some time and processing service
13:01
in the background of service for
13:03
like after past p three orders
13:05
to be allowed to processor cards
13:07
a term they have to show
13:09
that they're a humbling your data
13:11
no secure away on that they
13:14
have encryption and between and the
13:16
network to make sure the card
13:18
numbers and just love trouble for
13:20
anyone. But. That's still up.
13:23
Quite a vulnerability to the data
13:25
is moving from the super secure
13:27
environment to a service. was attackers
13:29
just kind of congregate in places
13:31
where the air gap soft and
13:33
the services began. It kind of
13:35
reminds me of my heroes season
13:37
Eight. He said the season malware
13:40
and a lot of the attacks
13:42
that be covered in that season
13:44
they all took place at kinda
13:46
like the point that's nearest the
13:48
user themselves and that's because of
13:50
the lot of. the access to talk
13:52
to flat seasons they said as that's kind
13:54
of like the point of vulnerability that a
13:56
lot of bad actors identify some in not
13:58
necessarily these like people have
14:01
this kind of very glamorized image of
14:03
hacking where people are hacking into these
14:05
super secure environments. But in all actualities,
14:07
these people are very smartly, if you're
14:10
thinking about it, they're going for the
14:12
weakest link in the chain. You couldn't
14:14
have said it any better. It's literally
14:16
the weakest link in the chain and
14:19
it's usually the end user. Yep.
14:22
You know, the company that
14:24
has their data moving in
14:26
this air gapped environment, they
14:28
can't control what's happening on
14:30
a client. So the best
14:32
way to do these
14:34
nefarious things is the low
14:36
hanging fruit. Yeah. Go to the end
14:38
user. They don't have what
14:40
these huge environments have. They don't
14:43
have the networking team and the
14:45
security team and the DevOps
14:47
team and the OpenShift team. They
14:49
don't have all that. They have
14:51
their little computers and, you know,
14:53
who they bought them
14:55
from gave them 90 days worth of
14:58
antivirus and spyware. We're
15:00
just trying to do our best out here. Definitely
15:03
the weakest link. Yeah. And
15:06
there's the issue of convenience and
15:08
ease of use, right? The data in
15:10
these networks and clusters are used for
15:12
businesses, businesses that need to be able
15:14
to move fast for customers that aren't
15:17
as security focused. I know
15:19
for me, I just want my shoes. I
15:21
don't really think about, you know,
15:23
PCI and I mean,
15:25
I should and you shouldn't have to. No,
15:28
like, I mean, like as a technologist, I
15:30
feel like I should as a consumer, you
15:32
know, I just want my shoes. I'm not
15:34
really thinking about the part that security and
15:36
encryption and disconnected networks play in my online
15:39
retail therapy. And you just said a
15:41
lot right there. We should be thinking
15:44
about it because we
15:46
are putting our information,
15:48
our financial information into
15:51
some box on
15:53
a browser, right? On
15:55
some network. If we're home, we probably
15:57
have a little bit more security. heaven
16:00
forbid we're sitting in a coffee
16:03
shop on some free Wi-Fi without
16:05
a VPN. Don't
16:07
get me started there. Looking to my left, looking
16:09
to my right, trying to avoid your gain. Exactly.
16:13
We have a part to play. You
16:16
know, the URL. Is
16:18
it the little lock on it? Is it
16:20
encrypted? That's the small part. You
16:22
know, do we have a VPN on? Are
16:24
we better off
16:26
using our phone as a hotspot as
16:28
opposed to using some free Wi-Fi, you
16:31
know, on the on the back of
16:33
a refrigerator somewhere. Like we
16:35
should be more mindful of
16:37
the part we play in
16:40
securing our data. I
16:43
want to step even a little bit further
16:45
back from like the end user or the
16:47
end consumer and talk about businesses and people
16:49
who are providing services directly to users. Like
16:51
if you have a store, if you're selling
16:53
the shoes to me, if I'm buying the
16:55
shoes from you, how much knowledge
16:57
and how much kind of consideration should
16:59
you be giving to these types of
17:01
situations? That's interesting because
17:03
now there are a lot of companies
17:06
who focus on just that. On
17:09
the transaction, on moving money
17:12
from one person's account to another.
17:15
And those businesses are hired by
17:17
maybe the smaller business to take
17:19
some of the onus off of
17:21
them. So are we writing the
17:23
code for protecting people's data? No,
17:25
we're going to enlist the help
17:27
of someone else. But there are
17:29
things, you know, me as the
17:31
small business owner, what can I
17:33
do? Are the systems
17:36
that are running my whatever, are they up
17:38
to date? Are they on the latest versions
17:40
of software? Are the workstations
17:42
and kiosks, you know, in my business,
17:44
are they up to date? So there's
17:47
a lot of moving parts. And
17:49
there are a lot of people who need to
17:52
be a part of this
17:54
solution as opposed to being a part
17:56
of the problem and saying, well, not
17:59
my problem. No, we all have
18:01
a part to play in that. I
18:03
like that. Not passing the book. No. Either
18:06
to the customer or to like a larger
18:08
kind of like enterprise level tech company. I
18:10
feel like it's a shared responsibility when you're
18:12
talking about security. It is. Yeah.
18:15
So we want to do that retail therapy.
18:18
We're going to make sure that the site
18:20
that we go to and put in our
18:22
credit card information is encrypted. We're
18:24
not going to be like, this is such a
18:26
deal. And
18:28
not do some hard due diligence and
18:30
start typing in those 16 digits. But
18:33
Angela, my shoes though. That's where
18:35
things go wrong. Yeah. Okay.
18:38
All right. I got to show some restraint. I have
18:40
to put my own credit card information before these pumps
18:43
that I really like. Okay. That's
18:45
fine. Little bit. Okay.
18:49
But, you know, I started
18:51
thinking about the future and obviously
18:53
everyone in tech is always looking
18:55
ahead. Right. Always. And
18:58
in this room for further advancement within an
19:00
air gapped environment, I imagine it
19:02
to be with this restricted environment by
19:04
default. What does it
19:06
mean for technologists that work in
19:08
these spaces? How can they be
19:10
more innovative, like looking forward? So
19:13
the client I'm with at the moment actually is
19:15
already experimenting with AI. And
19:18
you can either create your own
19:21
models based on the data in
19:23
those disconnected systems and then use
19:26
them in there. Or there
19:28
are some really cool open source models
19:30
that you can just put in there
19:32
and maybe train them with data
19:34
on top of that as well. That's
19:37
really interesting to me. Yes.
19:39
So again, if you're introducing
19:42
something that's outside of your
19:45
disconnected environment into your disconnected
19:47
environment, there has to be
19:50
some analysis and
19:52
checking in place. And
19:54
as we're hearing about data and
19:56
AI, we need to know where
19:59
this data is coming from. Right? So
20:01
being able to trust the source. How
20:04
are we vetted? How is that
20:07
being vetted? And because this is
20:09
such new technology, there's so
20:11
much more growth that's going to be happening.
20:13
And we'll hear more and more about this as we
20:15
go on. Yeah. Josie
20:19
thinks that that's a long way down the road. And to
20:22
your point, Angela, this is all very new. We're not
20:24
quite there yet. I'm
20:27
still a bit skeptical of how
20:29
much can be automated directly with
20:31
AI. If we think of
20:33
a very classic use case
20:35
that the user opens
20:38
a service desk ticket because something
20:40
isn't working. At the moment, I
20:42
don't really see AI being able
20:44
to work with a
20:46
lack of information still. So
20:49
if I just think about some
20:51
service desk tickets, I generally get
20:53
it's usually lacking a lot of
20:55
information and context. If
20:57
I think I'm putting in a query to AI
20:59
and I want AI to
21:01
solve my problem for me
21:03
efficiently without giving additional information,
21:05
then I don't think that's
21:08
very realistic at the moment. So
21:11
don't you worry. We're still
21:14
going to need, at least in
21:16
these disconnected networks we're talking about today, we're still
21:18
going to need a lot of really great people
21:20
to solve problems. That's not going
21:23
away any time soon. No. If
21:25
anything, this is a burgeoning
21:27
field of study. This is
21:29
where people can start making
21:32
their mark and understanding how
21:34
do we bring this new
21:36
technology into these types of
21:38
environments safely and
21:40
securely with reliable data.
21:43
I think we're at the tip of the
21:45
iceberg. There are going to
21:47
be pretty smart people out there trying to
21:49
solve this exact problem. It's
21:52
just a matter of time to see
21:55
how effectively that problem is solved and
21:57
in which Use cases this can be used.
21:59
used for are so. Stay tuned.
22:02
We're not there yet. so everyone stay
22:04
put. You know we don't have to
22:06
worry about the robots just yet. not.
22:08
You know that we're always improving and
22:11
heading toward. What she's mentioning, Before.
22:16
We parted ways. I asked to
22:18
the what she likes about working
22:20
and these super restrictive environments. Despite
22:23
the difficulties and inconveniences, she says
22:25
working around restrictions can actually help
22:27
people to become creative problem solvers.
22:30
I. Think you have to be
22:32
a nerd for a to be
22:34
rewarding. Just enjoys solving problems and
22:37
interesting ways and using. Technology.
22:39
To find new ways to
22:42
solve problems. Chelsea. Is
22:44
just the type of technologist that
22:46
I absolutely. Adore! Really, they
22:49
are. Creative. They're
22:51
curious, they liked to solve
22:54
problems, and it's all about.
22:56
Working smarter, not harder. I
23:00
didn't know a lot about disconnected
23:03
networks. Word this cut it open
23:05
surpluses before I started digging into
23:07
the research. and there's a cyber
23:09
security kind of aspect. There's these
23:11
assets as environments for engineers and
23:13
developers said spur innovation sake and
23:15
said we make sure that like
23:17
the people are security for this
23:19
across not just a network but
23:21
also cross entire kind of ecosystem.
23:23
An entire experience like for a
23:25
customer of right and customer to
23:27
have their data as he protected.
23:29
There's so. Much to say again to
23:32
in this episode of so the whole nature
23:34
of it is kind of like a Black
23:36
Labs and the sneaker net and the very
23:38
kind of practical aspects of. Having
23:41
these kind of lock down isolated
23:43
systems but then knowing that these
23:45
systems exist to house day as
23:47
that's very sensitive but there needs
23:49
to be consideration for what happened
23:51
said data. Once it's be that
23:54
environment I feel like there's a
23:56
lot for technologists is still think
23:58
about and discuss and. They'll try
24:00
to like wrap their heads around even
24:02
though. And sure that the systems like
24:05
these have been around for forever. I'm
24:07
sure there are a lot of
24:09
our listeners who aren't familiar with
24:11
air gap environments in this is
24:13
yes, their first foray into this
24:16
topic. I'm hoping we have listeners
24:18
that work a nice air gap
24:20
environments and they have a lot
24:22
of experience is that maybe even
24:24
those who work in traditional environment
24:27
they can probably share it so
24:29
I'd like to hear from both
24:31
sides. what are your thoughts on
24:33
this episode? my folks working and
24:35
air depth environments? What. Are some
24:37
of the behaviors that people in
24:40
traditional and Burma's could take from
24:42
air gap environments: Anything that you
24:44
listen to and learned and enjoyed.
24:46
Or maybe eyes were open to?
24:48
We'd love to hear it, so
24:51
hit us up on are so
24:53
shows at Red Hat always use
24:55
the hashtag compiler Podcasts Let's talk
24:57
more about these disconnected environments I'd
24:59
like to hear. You have to
25:02
say. And. If you
25:04
are a part of the team that protects me
25:06
and my data on something for my. Seasons. I
25:08
salute you. And
25:16
that does it for. The episode of
25:18
Compiler Today's Produced By Me.
25:21
Ten walks with Johan, Philippines and
25:23
Kirilenko. I said thank you to
25:25
our guests Chelsea Pfeiffer and a
25:28
special shout out to Steven Wilson
25:30
says article on Disconnected Networks to
25:32
help save this episode. Victoria.
25:35
Lawton loves a good integrity
25:37
check. Special. Thanks to
25:40
Brett doesn't are audio engineer
25:42
is Christie said. Are
25:44
Thieves. I was composed by Marianne. Shudder.
25:47
Are all Your Team
25:49
Includes: Brent Seminole Leave
25:51
Day Stephanie Wunderlich might
25:53
As Sir Nick Burns
25:56
Aaron Williamson Parenting Gera
25:58
Know Rachel or Tell
26:00
Devon Hope Mike Hampton
26:02
Ocean, Matthews Cage Johnson,
26:04
Alex Trouble Seat and
26:06
The Mystical Mira. Cyril.
26:09
If you like today's episode means that don't
26:12
keep it to yourself Father So rate the
26:14
show and leave us a review on your
26:16
platform of choice. Chat with someone you know.
26:18
it really helps us out. Thank you so
26:21
much for listening. We'll see you next time.
26:23
The I was the on the sneaker net.
26:27
The Firebird wasn't theory, but.
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More