Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

CHAPTER

Are You a Target?

A lot of people are using those tools in a way that's like, they're pretty savvy with it. But at the same time, i'm thinking myself, ike, come on and like, what, you know, that's pretty tractable if you become a target. If you're hoasting very sensitive information, then i hope you're backing it up and having an off sight back up somewhere for that kind of thing. For a lot of other use cases, there's nothing wrong at all with running a v p s or next cloud server on there.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner