DiscoverClosed Network Privacy PodcastEpisode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One
Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Update: 2022-04-051
Share

Description

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails.


Subscribe to The Hated One on YouTube - https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q


Ways You Can Support The Podcast - 


Direct Donations and tips on our support page


https://www.closedntwrk.com/support/


Follow Me On Twitter - https://twitter.com/closedntwrk


Download a Podcast 2.0 app. We recommend Breez or Fountain. You can load them up with Bitcoin / Sats and stream sats to the podcast.


https://podcastindex.org/apps - NEWPODCASTAPPS.COM


Leave a review for the podcast, you can do this by visiting https://www.closedntwrk.com/reviews/


Reviews are greatly appreciated and of course share the podcast with friends or family



Comments 
loading
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Simon Walsh