
Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One
Closed Network Privacy Podcast
00:00
How Can You Change Your Threat Model by Crossing the Borders?
For most people, i would not recommend them to put their passwords and sensitive files on the cloud. But if you are crossing the border and you know that you could be forced to unlock your devices, then it's better to have no devices at all or just keep your devices completely empty. And in that case, i'm going to have my back up in the cloud, temporarily, and anonymously, of course.
Transcript
Play full episode