Simon

Episode 14 – Mobile Phone Update – Proton Buys Simple Login – Utah Privacy Legislation

Mobile Phone Update – Back to using GrapheneOS. Challenges in self hosting, ProtonMail Buys SimpleLogin. Facebook users angry after accounts locked for no reason https://www.bbc.com/news/technology-60959811 Utah To Become The Fourth State to Pass Privacy Legislatio https://www.jdsupra.com/legalnews/utah-to-become-the-fourth-state-to-pass-5622298/ ProtonMail Buys SimpleLogin https://fossbytes.com/protonmail-buys-simplelogin/ https://techcrunch.com/2022/04/08/proton-buys-simplelogin/ – vanceD comes to a close For Those Looking For VanceD Download https://ufile.io/k3t0bspo  …

Read More

Episode 13 – Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails. Subscribe to The Hated One on YouTube – https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q Ways You Can Support The Podcast –  Direct Donations and tips on our support page https://www.closedntwrk.com/support/ Follow Me On Twitter – https://twitter.com/closedntwrk Download a Podcast 2.0…

Read More

Episode 12 – Collab with “The Hated One” YouTube Personality

I had the pleasure of speaking with “The Hated One” the popular YouTube personality that has been making videos for several years about privacy, mass surveillance and geo political issues. In this episode we cover the following topics: – Why privacy matters – Paying for privacy – Privacy optimism  – Challenges of self hosting –…

Read More

Episode 11 – Security Tips – Apps I Use – 2FA – TOTP

In a time where there are more attacks than ever on your digital accounts, it’s important to know how to protect yourself against malware, phising attacks, and SIM highjacking. This threat can be greatly reduced by using 2FA or two-factor authentication. Twitter 2FA text service was secretly helping governments locate people, obtain call logs https://9to5mac.com/2022/02/09/twitter-2fa-text-privacy/…

Read More

Episode 10 – Digital Sovereignty With Bitcoin & Self Hosting

– Why it is important to be vigilant about your digital logins and who has access to them. – Relationships that don’t end well, business relationships and disgruntled friends or family member – How to setup your own self hosting server and why – Don’t be intimidated to run a server. It’s easier than you…

Read More

Episode 9 – Data Privacy Day – Privacy RUNDOWN

Data Privacy Day – January 28, 2022 Browsing Safely – TOR, Brave Browser with TOR, Ublock Origin, Privacy Badger Using a VPN to secure traffic on public networks – iVPN, Proton VPN are wha tI use Password Manager – Yes, I will continue talking about them – I use Bitwarden Encrypted Communications – Signal, Threema,…

Read More

Episode 8 – Data Breaches & Privacy – Pixel Pro & 6 – NON KYC BTC

Topics –  – Apple Wallet and Personal Data Storage  – Public Health will start gathering Canadians’ cellphone location data – Canadian Surveillance Concerns  – NON KYC Bitcoin Way You Can Support The Podcast – Direct Donations and tips on our support page https://closednetwork.io/support/ Download a Podcast 2.0 app. We recommend Breez or Fountain. You can…

Read More

Episode 7 – The State Of Internet Censorship – Mobile Updates & News

Mobile Phone Update, Censorship – TOR & Decentralization  Way You Can Support The Podcast –  Direct Donations and tips on our support page https://www.closedntwrk.com/support/ Download a Podcast 2.0 app. We recommend Breez or Fountain. You can load them up with Bitcoin / Sats and stream sats to the podcast. https://podcastindex.org/apps – NEWPODCASTAPPS.COM Leave a review…

Read More

Episode 6 – Let’s Talk Privacy, Mobile Phones and Bitcoin

Join us for a laid back conversation with my brother Michael. We discuss mobile phones, Linux, privacy and of course Bitcoin and cryptocurrency. Kick back and relax and hangout while we have some pointed conversations around Michael’s experience using CalyxOS on a Google Pixel 4 XL and his journey to a more private digital life….

Read More

Episode 5 – Privacy & Compartmentalization – Using Aliases / Mobile Phone separation

– Separation of personal identity from other identities online. These are referred to as pseudonyms or Nyms. It is important to create different online Nyms to protect your personal identity and reduce your attack vectors. Create different accounts to use for social media, online shopping profiles (Use Privacy.com for purchases) and any other web service…

Read More