Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

00:00

Is There a Way Out?

i think there is a way out of this, and it's in these projects. The first thing i would recommend is to identify the different ways they communicate them most. A look at sinning up for a different email through tu donota or proton male lava bit. And use a passwork manager, whether it's bit warden or k pass x c. These are just a few basic things that you could start doing without installing anything on your phone.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app