Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization | The Hated One w/ Closed Ntwrk
The Hated One The Hated One
431K subscribers
18,626 views
0

 Published On Apr 1, 2022

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails.
Support independent research and analysis by joining my Patreon page:   / thehatedone  

Timestamps:
00:00:00 The Hated One remembers to be a human
00:01:50 The comments and feedback from the previous episode
00:03:20 Correcting our mistake - spelling out Cwtch.im
00:04:32 Cwtch vs Briar
00:09:00 Configuring Brair to run with full-device Orbot
00:11:30 The limitation of peer-to-peer networks without an internet connection
00:16:40 Different ways of incentivizing decentralized networks
00:29:00 User experience has to be easy - Closed Ntwrk's issues with Briar
00:30:15 The Hated One dies mid podcast
00:36:10 Tradeoffs of centralized and decentralized platforms
00:38:15 Threat models
00:39:24 Closed Ntwrk's biggest mistake of his entire life (he will burn in hell for this)
00:50:57 Threat models are fluid
00:55:05 The benefits of VPS self-hosting
01:22:00 The benefits of diverse opinion and threat models
01:29:00 More bloomerism and hopium
01:35:30 The different approaches to teaching privacy by THO and Closed Ntwrk
01:45:00 Small open source developers are fighting the big tech
01:54:30 What's the first and the most important step to start your privacy journey
02:07:50 Assume your security will be breached
02:13:50 How the FBI hired Facebook to hack a Tails user

Follow me:
  / the_hatedone_  
  / thehatedone  

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

show more

Share/Embed