Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

CHAPTER

Is There a Way Out?

i think there is a way out of this, and it's in these projects. The first thing i would recommend is to identify the different ways they communicate them most. A look at sinning up for a different email through tu donota or proton male lava bit. And use a passwork manager, whether it's bit warden or k pass x c. These are just a few basic things that you could start doing without installing anything on your phone.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner