Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Plaintext with Rich
APIs: The Control Points Hiding Inside Every App
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
You tap a button and a ride shows up. You check out online and your bank approves it in seconds. It feels automatic. But nothing in software is automatic. Something received a request, decided it was valid, did some work, and sent back a response. That something is an API.
This episode breaks down what APIs actually are, why they exist, when to use them, and why they matter far more than most people realize. It starts with a restaurant analogy that makes the concept click, then walks through how modern software is built from modular pieces that coordinate through structured requests and responses. From there, it covers the four ways APIs quietly fail: weak identity, excessive permissions, blindly trusted input, and missing guardrails for automation abuse. The episode closes with a four-step starter kit for treating every API like the security-critical control point it is, covering authentication, authorization, data minimization, and abuse prevention.
Whether you're a business leader trying to understand what your engineering team means by "API security" or a professional who wants the concept explained without the jargon, Plaintext with Rich makes it clear.
Is there a topic/term you want me to discuss next? Text me!!
YouTube more your speed? → https://links.sith2.com/YouTube
Apple Podcasts your usual stop? → https://links.sith2.com/Apple
Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
Follow the human behind the microphone → https://links.sith2.com/linkedin
Need another way to reach me? That’s here → https://linktr.ee/rich.greene
Framing The Invisible Magic
SPEAKER_00Tap a button in one app and a ride shows up. You check out online and your bank approves it in seconds. You refresh a dashboard and the numbers change in real time. It feels automatic, but nothing in software is automatic. Something received a request, decided it was valid, did some work, and sent back a response. APIs are the mechanism that makes that chain of events reliable instead of accidental. Welcome to Plain Text with Rich. Today we're breaking down APIs, what they are, why they exist, when to use them, and why they matter more than most people realize. Let's start with the translation because API sounds like something reserved for back-end engineers and people who enjoy arguing about server logs. Now you don't need a computer science degree to understand this. You just need to understand how structured requests work. API stands for Application Programming Interface. Plaintext version, it's a documented way for one system to ask another system to perform a specific action or return specific data. That's it. Now let's make it concrete. Imagine a restaurant. You sit down and order a burger. You're not allowed in the kitchen, you don't grab ingredients, you don't cook your own food. Instead, you interact with a menu and a server. You place a request in a format the kitchen understands. The kitchen does the work, the server brings back the result. That server and menu layer is the API. It's not the kitchen, it's not the food, it's the controlled way to ask for outcomes without being handed the entire system. Software works the same way. When one app needs something from another system, a payment approved, a map loaded, a profile updated, it doesn't rummage through the other system's internals. It sends a structured request through an API. The receiving system evaluates it, processes it, and sends back a response. Think about request decision response. That pattern is everywhere. So, when do you use an API? Well, you use an API anytime one system needs something it doesn't already have and needs it reliably, repeatedly, and in real time. Pulling shipping rates into an e-commerce site or connecting a counter to a scheduling tool, charging a credit card through a payment processor, displaying weather data in an application. APIs are best when the need is ongoing and dynamic. If you just need a one-time export of data, something like a file transfer might be more simpler. But if systems need to coordinate it constantly, APIs are the mechanism. Now let's talk about why they exist at all. Well, modern software is rarely one giant block of code. It's modular. Again, payments might live in one service, user accounts in another, inventory somewhere else entirely. APIs are how these pieces cooperate without being fused together. They allow teams to build, update, and scale parts, well, independently. Now, that flexibility is powerful, but here's the part most people miss. An API isn't just a connection, it's access to capability. If an API can create a user, issue a refund, change a password, or retrieve customer data, well then whoever can successfully call that API, well, they can trigger those actions. That's why APIs are security critical. So how do APIs fail? Well, not usually in dramatic ways, they fail in ordinary, predictable ways. Well, first, weak identity. If the API doesn't strongly verify who's calling it, anyone who discovers the endpoint can start making requests. That's why APIs use credentials like keys or tokens. The exact mechanism varies, but the purpose is consistent. Prove the caller is authorized to ask. Second is excessive permissions. Even if the caller is legitimate, the API might return more data than necessary or allow actions beyond what the user should control. That's broken access controls. Well, in plain terms. Now the system forgot to enforce boundaries. Third, trusting input. APIs accept data, IDs, quantities, names, parameters. If the system assumes those inputs are always well formed or honest, it can be manipulated into doing unintended work. Sometimes that leads to data exposure, maybe corrupted systems, sometimes just to massive bills from, well, uncontrolled automation. Our fourth thing is no guardrails. APIs are built for automation, which means requests can happen at machine speed without rate limiting, logging, and monitoring. An API can be abused thousands of times per minute. And automation really amplifies mistakes. So what does good look like? Well, here's your plain text API starter kit. We have four moves. Move number one, treat every API like it's exposed. Even if it's labeled internal, credentials leak, systems get misconfigured, networks blur. Design as if someone unexpected will eventually find it. Move number two, separate authentication from authorization. Authentication answers who are you? Authorization answers, what are you allowed to do? You need both working correctly. Move number three, minimize what you return. Only send back the data required for the task. Every extra field is, well, future risk. And move number four, build in controls for abuse. These are those rate limits, logging, alerts for unusual behavior, and a fast way to revoke credentials if something leaks. Because the day an API key ends up in the wrong place is not the day you want to discover you have no kill switch. So let's bring this home. An API is a structured way for one system to request work or data from another system. They exist because modern products are made of many moving parts, and those parts need consistent, predictable coordination. They become dangerous when identity is weak, permissions are sloppy, inputs are blindly trusted, or automation is left unchecked. If you remember one thing, remember this. An API is a control point, and control points deserve design. Got a security question you want to explain like a normal human would? Email, DMs, comments all work. Smoke signals are fine, just keep them legible. I read them all and I will get back to you. If this episode helped, share it with someone who'd actually benefit. This has been Plain Text with Rich. 10 minutes, one topic, no panic. I'll see you all next time.