
Unlock Darknet Data Doom with Jack Rhysider from Darknet Diaries
Random but Memorable
The Trusted Device Model
It's end to end encryption. Decryption still happens on device. The thing that I really like is that we've done this in a very much a one password way. It's zero knowledge architecture. Even if any identity provider credentials are compromised, attackers actually still won't be able to access your your one password data which is huge.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.