Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

00:00

I'm Sorry About He Cuff.

We are running out of water. The heaviest burden of the idonat is actually a i computations. And if we are going to be building more deadecenters, then we are also going to be needing more energy to cool them and run them. I think that this sort of purepure, decentrise network that doesn't actually have any a limits on how many devices can actually be connected to the network could actually be a pretty good solution to this problem. It would make me want to use something like that more than trying to convince someone to use brior. There's some trados with the more functionality that people rer comfortable with. But at the same time, i

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app