privacy

Episode 7 – The State Of Internet Censorship – Mobile Updates & News

Mobile Phone Update, Censorship – TOR & Decentralization  Way You Can Support The Podcast –  Direct Donations and tips on our support page https://www.closedntwrk.com/support/ Download a Podcast 2.0 app. We recommend Breez or Fountain. You can load them up with Bitcoin / Sats and stream sats to the podcast. https://podcastindex.org/apps – NEWPODCASTAPPS.COM Leave a review…

Read More

Episode 6 – Let’s Talk Privacy, Mobile Phones and Bitcoin

Join us for a laid back conversation with my brother Michael. We discuss mobile phones, Linux, privacy and of course Bitcoin and cryptocurrency. Kick back and relax and hangout while we have some pointed conversations around Michael’s experience using CalyxOS on a Google Pixel 4 XL and his journey to a more private digital life….

Read More

Episode 5 – Privacy & Compartmentalization – Using Aliases / Mobile Phone separation

– Separation of personal identity from other identities online. These are referred to as pseudonyms or Nyms. It is important to create different online Nyms to protect your personal identity and reduce your attack vectors. Create different accounts to use for social media, online shopping profiles (Use Privacy.com for purchases) and any other web service…

Read More

Episode 4 – Surveillance Capitalism – Why & How To Protect Your Data – Nextcloud

Please feel free to post a review or make a donation at https://closednetwork.io In this episode we discuss the reasons of why to protect your data including your personal cloud files. We discuss different open source and paid alternatives to store your most precious files, photos, contacts and more. Privacy is not inherent with the…

Read More

Episode 3 – Practical Steps To Be More Private And Secure

In this episode I talk about some very simple and practical applications and techniques to start safeguarding your personal information. These can be implemented on day 1 of your privacy journey.    I discuss the following: – Securing purchasing transactions with the use of https://privacy.com – Implementing “sudo” profiles with virtual phone numbers, email and…

Read More