
Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One
Closed Network Privacy Podcast
The Best Approach to Security Layers
You should assume that a breach will happen, and the best way to prepare for a breach is to incript your own data. Take an inventory of every ap you have on your phone - it's great if you can steal them all. Most web sites are very good progressive webser meaning they perform almost as well or even better than their native browser. You know, i never really thought about it like that, but it's, it's true. The thing is that, ah, the world is evil. There's always going to be someone who's going to try to exploit that."
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.