Closed Network Privacy Podcast cover image

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Network Privacy Podcast

CHAPTER

Did You Find How Much Money Ty Spend on This?

Fbi showed its more targeted methods potentially danonymise tory users. So did you find, did you find how much money ty spend on this? I am looking for i'm sure it was a lot. Ye, it's an old one, i think, it's from 20 19, maybe cado. And that ones from august eighth, 20 sevent is unrelated. But ye, either this basly just means that you're not, even if youre using tails or you're using hunicks or something like there's still a chance, if someone wants it bad enough, nothere, they're going to find you.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner