126 Lesa's Story

Lesa's identity of being a mother, sister, wife and daughter have dramatically shifted in the last 8 months: Her father had a physician assisted suicide, her daughter moved cross country to model in NYC, and she separated from her husband. She generously shares her story with us uninterrupted and unedited. 

#122 Jennifer Sodini

Jennifer of EvolveAndAscend.com has been a psychic medium since she was a child. We discuss what a psychic is and isn't, living with psychic powers, the importance of imagination, oracle cards, inner work, higher guidance, reclaiming our power, and more. We also explore the fun and the weird: reptilians, artificial intelligence, government conspiracies and similar topics. 

Buy Zener and/or Oracle Cards and grow your psychic powers!

#121 Jill Schock

Jill is a death doula assisting people transition from life to death. We explore the real mystical things that happen as people die: seeing cats, seeing dead people, moving between realities, and more. We also touch on how the work has sharpened her personal clairvoyance and connection to the dream state.


#120 Kelly MacLean

Kelly interviews comedians for her podcast, Tao of Comedy, with a slant toward spirituality and consciousness in LA. Here she explains Shambhala and Chogyum Trungpa. Here we talk about life, death, and much much more. 

Kelly's Podcast

#119 Ani Easton Baker

Ani Easton.png

Ani is a former teacher of students with special needs and is now working on a documentary about sex and sex education. Ani and I meet at her home in LA to talk about education, sex, sexuality, religion, manifestation, death, and more!

#118 Driely Carter

Driely and I have been told that we would get along because we are angry. We're angry?! 

Driely is a photographer also fascinated with anarchy and disruption of power. We hang and chat about our mutual experiences with authority as well as her experience on photographing Kanye, Standing Rock, and more.

Check out her site and follow her on her instagram

#117 Stephanie Losi

Stephanie was a senior Bank Examiner for the Federal Reserve and has promoted security awareness for CERT and others. Today she sits down to talk about what we can and cannot do to protect ourselves and keep our personal information safe. We also geek out about AI for a moment! 

***Check out the MindPod event in LA on March 18th!***

Here are Stephanie's tips:

"1.) To make sure your computer's firewall is on: On a Mac, open System Preferences, open the Security & Privacy preferences, and click the Firewall tab. Bonus: Click on Firewall Options and check Enable Stealth Mode to make your Mac less discoverable. (It will stop responding to some common network reconnaissance techniques.) On a Windows PC, open Control Panel and then Windows Firewall to see the firewall status. If you want to get fancy and try some alternative firewalls for Windows, there are many options, such as ZoneAlarm Free Firewall or Comodo Firewall. You only really need one firewall, so choose the one you prefer. 

2.) Use a VPN on public Wi-Fi networks, whether or not they require a password for access. A VPN encrypts the traffic you are sending over the network, so anyone snooping on traffic won’t be able to decipher yours. I use Witopia, which has good support and is fairly easy to set up, but there are many options. How to use a VPN: Log on to a public Wi-Fi network. Once you are connected, BEFORE doing anything else or visiting any other sites, log in to your VPN service. Then launch your web browser and you can surf more securely. 

3.) Consider a password manager. You can use one that stores passwords on your computer, for example Keychain Access or KeePass, or one that stores passwords online like LastPass. It’s a personal choice. Pluses: You don’t need to type your passwords each time you want to use them. Copying-and-pasting passwords protects you from key loggers (malicious software programs that capture your keystrokes in an attempt to capture your passwords). Caveats: Use a strong master password, and don’t forget it or you could lose access to your passwords permanently (especially with some password managers that store passwords on your computer). Also, be aware that online password managers can be and have been compromised, so be prepared to change your master password promptly if you receive notification of a compromise. 

4.) You can reduce the amount of data stored about your web searches by logging out of your Google account before searching, as well as frequently clearing your browser cookies/history/cache or using Private Browsing or Incognito Mode. If you want to search the web with no trace, consider using DuckDuckGo, which does not track or store search queries at all. For example, to clear your browser data in Chrome: From the Chrome menu, choose Clear Browsing Data and check off as many boxes as you like. Be aware that this will leave you logged out of websites such as Facebook, and you’ll have to log back in later. 

5.) Don’t plug untrusted USB drives (flash drives) or other untrusted devices into your computer. They can introduce malicious software directly to your system. (We didn't discuss this, but I think it's important to mention here.)

6.) Consider hard drive encryption if losing your laptop would be catastrophic from a data-leak perspective. Caveat: If you forget the password to decrypt your hard drive, you will lose access to your data. Some programs allow you to create sub-drives on your hard drive and then encrypt just those sub-drives. Caveat: Same as for whole-drive encryption: Don’t forget the decryption password or you could permanently lose access to your data! 

7.) If you’re taking your smartphone into a high-risk situation (as defined by you), you can remove as many email accounts and apps as you want from your phone. It’s easy to reinstall them later. 

8.) Think of email as a postcard that you send to someone. Other people along the sending path may be able to read it. One possible solution for privacy is Canada-based Hushmail, which allows end-to-end encryption of email messages. Caveat: Both sender and recipient need to have Hushmail accounts with strong passwords and check the “encrypted” box before sending messages with the service. Be aware that Hushmail can decrypt emails on their end and will do so if they get a request that’s enforceable under local laws, so use it for privacy, not illegal activity.

9.) Rather than sending plain-text texts, you can use end-to-end encryption for messaging. Two possible solutions are the Signal app and Off-the-Record Messaging. Remember to periodically delete local messages from your phone/device; otherwise, losing your device could expose all of your messages.

10.) If you’re on Windows, an antivirus program may be useful, but you certainly don’t need to have 20 antivirus programs running at once. Some options include Windows Defender, AVG and Avast, but there are many others. 

Further Reading: There are lots of guides online to securing your computer. One interesting guide is at https://spideroak.com/infosec and gives you some different perspectives on ways to secure your online accounts."



#116 Anonymous 3: The Sex Worker


Our guest today is hiding a secret. She's a 23 year old emerging artist and tells people she is an archivist for an artist to fund her globetrotting lifestyle. She tells others she is a dominatrix. But she's secretly harboring her life as a sex worker.

Historically sex workers have been mocked, ridiculed, shunned, glamorized, and put in boxes. Often only the most vocal workers and activists are heard and dominate the conversation. We decided to share a brief and uncensored account of one young and quiet escort in New York to tell us what she has gone through.

Her mentor who started her career warned her: "you are going to lose your soul." We hear as she explores her new reality and shares her personal life adventure while relating to her soul.

She opens up to us about her life and the thoughts she hasn't been able to express with many others. She sifts through where she's been, where she's at, and where she may or may not be going as well as the intricate emotions attached to balancing her work and life.

She discusses the pain she feels she deserves, earning money, being wrapped in drugs, festishes, loneliness and so much more. 

Music by Noah Lampert.

#115 Elizaveta Porodina


A psychologist turned photographer, Eliza Porodina now creates beautiful surreal images. Together we explore the balance of love and the critic with art; discover aspects of the meta level of the mind; the artificial intelligence; the human soul; death, schizophrenia; stupid shit photographers say, and more. 

Look at Elizaveta's work or follow her on instagram

#114 Sean Dunne & Cass Greener

Sean returns to MDWH along with his girlfriend, Cass. We begin by recognizing the psycho-spiritual war that has consumed our hearts and minds during the political season and beyond. 

Our conversation explores our path forward as a society through the birthing of Generation E: a post consumer all-inclusive generation and movement focused on personal and cultural enlightenment which transcends time, age, ego and place.

We immerse ourselves on tales of our psychedelic experiences and the lessons we've learned along the way. This and more on today's show. 

Listen to the music from today's show on Spotify. Watch Sean's films on his site and check out his podcast on MindPodNetwork.

Recorded live at the Inter-dimensional House of Pancakes in Greenpoint, Brooklyn.