Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

CHAPTER

Self Host, Self Hoasting, Self Hosting - It's Not One Click and You're Done.

i see people get quickly beraded by veterans of security and privacy that cindo start to bark. If you want mass adoption of decentralized or open source software, you have to be approachable. You have to make it easy for them to get started somewhere. I'vement this before to selfto, to self host at next cloud, though it's getting a lot easier. But my point is that it does take some effort, but it's worth it if you're trying to pursue the breakaway from e cloud or google or drop box,. The support is the open source community and the forum.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner