privacy

Episode 12 – Collab with “The Hated One” YouTube Personality

I had the pleasure of speaking with “The Hated One” the popular YouTube personality that has been making videos for several years about privacy, mass surveillance and geo political issues. In this episode we cover the following topics: – Why privacy matters – Paying for privacy – Privacy optimism  – Challenges of self hosting –…

Read More

Episode 11 – Security Tips – Apps I Use – 2FA – TOTP

In a time where there are more attacks than ever on your digital accounts, it’s important to know how to protect yourself against malware, phising attacks, and SIM highjacking. This threat can be greatly reduced by using 2FA or two-factor authentication. Twitter 2FA text service was secretly helping governments locate people, obtain call logs https://9to5mac.com/2022/02/09/twitter-2fa-text-privacy/…

Read More

Episode 10 – Digital Sovereignty With Bitcoin & Self Hosting

– Why it is important to be vigilant about your digital logins and who has access to them. – Relationships that don’t end well, business relationships and disgruntled friends or family member – How to setup your own self hosting server and why – Don’t be intimidated to run a server. It’s easier than you…

Read More

Episode 9 – Data Privacy Day – Privacy RUNDOWN

Data Privacy Day – January 28, 2022 Browsing Safely – TOR, Brave Browser with TOR, Ublock Origin, Privacy Badger Using a VPN to secure traffic on public networks – iVPN, Proton VPN are wha tI use Password Manager – Yes, I will continue talking about them – I use Bitwarden Encrypted Communications – Signal, Threema,…

Read More

Episode 8 – Data Breaches & Privacy – Pixel Pro & 6 – NON KYC BTC

Topics –  – Apple Wallet and Personal Data Storage  – Public Health will start gathering Canadians’ cellphone location data – Canadian Surveillance Concerns  – NON KYC Bitcoin Way You Can Support The Podcast – Direct Donations and tips on our support page https://closednetwork.io/support/ Download a Podcast 2.0 app. We recommend Breez or Fountain. You can…

Read More

Episode 7 – The State Of Internet Censorship – Mobile Updates & News

Mobile Phone Update, Censorship – TOR & Decentralization  Way You Can Support The Podcast –  Direct Donations and tips on our support page https://www.closedntwrk.com/support/ Download a Podcast 2.0 app. We recommend Breez or Fountain. You can load them up with Bitcoin / Sats and stream sats to the podcast. https://podcastindex.org/apps – NEWPODCASTAPPS.COM Leave a review…

Read More

Episode 6 – Let’s Talk Privacy, Mobile Phones and Bitcoin

Join us for a laid back conversation with my brother Michael. We discuss mobile phones, Linux, privacy and of course Bitcoin and cryptocurrency. Kick back and relax and hangout while we have some pointed conversations around Michael’s experience using CalyxOS on a Google Pixel 4 XL and his journey to a more private digital life….

Read More

Episode 5 – Privacy & Compartmentalization – Using Aliases / Mobile Phone separation

– Separation of personal identity from other identities online. These are referred to as pseudonyms or Nyms. It is important to create different online Nyms to protect your personal identity and reduce your attack vectors. Create different accounts to use for social media, online shopping profiles (Use Privacy.com for purchases) and any other web service…

Read More

Episode 4 – Surveillance Capitalism – Why & How To Protect Your Data – Nextcloud

Please feel free to post a review or make a donation at https://closednetwork.io In this episode we discuss the reasons of why to protect your data including your personal cloud files. We discuss different open source and paid alternatives to store your most precious files, photos, contacts and more. Privacy is not inherent with the…

Read More

Episode 3 – Practical Steps To Be More Private And Secure

In this episode I talk about some very simple and practical applications and techniques to start safeguarding your personal information. These can be implemented on day 1 of your privacy journey.    I discuss the following: – Securing purchasing transactions with the use of https://privacy.com – Implementing “sudo” profiles with virtual phone numbers, email and…

Read More