
Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One
Closed Network Privacy Podcast
How Can You Change Your Threat Model by Crossing the Borders?
For most people, i would not recommend them to put their passwords and sensitive files on the cloud. But if you are crossing the border and you know that you could be forced to unlock your devices, then it's better to have no devices at all or just keep your devices completely empty. And in that case, i'm going to have my back up in the cloud, temporarily, and anonymously, of course.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.