Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

00:00

Are You a Target?

A lot of people are using those tools in a way that's like, they're pretty savvy with it. But at the same time, i'm thinking myself, ike, come on and like, what, you know, that's pretty tractable if you become a target. If you're hoasting very sensitive information, then i hope you're backing it up and having an off sight back up somewhere for that kind of thing. For a lot of other use cases, there's nothing wrong at all with running a v p s or next cloud server on there.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app