
Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One
Closed Network Privacy Podcast
Are You a Target?
A lot of people are using those tools in a way that's like, they're pretty savvy with it. But at the same time, i'm thinking myself, ike, come on and like, what, you know, that's pretty tractable if you become a target. If you're hoasting very sensitive information, then i hope you're backing it up and having an off sight back up somewhere for that kind of thing. For a lot of other use cases, there's nothing wrong at all with running a v p s or next cloud server on there.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.