Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Introduction
00:00 • 3min
The Onion Routing, and the Meta Data Protection
03:00 • 2min
A Brief History of the Cryptocurrency Space
05:07 • 2min
Session vs Other Messaging Applications?
07:10 • 3min
Is a Decentralized Network Really Important?
10:31 • 3min
The Onion Routing Approach
13:51 • 6min
Is the Turn Networknatively Working?
19:25 • 2min
Is the Servico Network Stronger Than the Tor Network?
20:56 • 3min
How Long Does It Take to Get the God Flag?
23:33 • 2min
Is There a Long Term Civil Attack Protection?
25:21 • 2min
Is There a Difference Between the Signal Zone and the Signal Protocol?
27:28 • 4min
Session Protection Protocol - What Is It and How Does It Work?
31:40 • 2min
The Practical Application of Cryptographic Deniability in Ford Secrecy
33:51 • 5min
How to Roll Your Own Cryptocurrency
38:38 • 2min
The Sponsors of Opt Out, Cake Wallet and Local Manero
41:05 • 4min
What's the Key Problem for Bootstrapping Something Like Session?
45:27 • 3min
What's the Main Thing About Session?
48:39 • 3min
How to Self Host a Session?
51:13 • 3min
The Key Benefits of Being Ecentralized Network
53:46 • 4min
Reproducible Builds for Android
57:34 • 2min
Is the Token a Tool Against Sibil Resistance?
01:00:04 • 4min
Is This a Pump and Dump?
01:04:21 • 3min
Is There an End to End to Outit in the Oxon Network?
01:07:40 • 4min