Artwork

Content provided by Henry Ng. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Henry Ng or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Antidetect Browsers: Empowering Users to Decide What Personal Data to Disclose with Michael Levit, CEO and Co-founder of Tempest

43:18
 
Share
 

Manage episode 363355717 series 3427778
Content provided by Henry Ng. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Henry Ng or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this episode of Ethical Data, Explained, Henry Ng is joined by Michael Levit, CEO and Co-founder of Tempest to discuss privacy-based browsers - what technology they are built on, how they ensure user privacy, how they differ from VPN and proxies, and much more.
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!

Quotes


1. “How individuals can protect their privacy? Well, other than the obvious go download Tempest today. A browser and a proxy, I think, are two wonderful places to start. If you're going to do nothing else, do those two things.
2. “There's probably a certain amount of data leakage that's going from the search engine to the third-party provider, especially if you click on an ad. There is a certain amount of protection by using a private browser. That browser may restrict your IP address. It may get rid of your fingerprint. It will do a variety of things that will restrict the amount of information that's leaking. A VPN or a proxy will restrict your native IP address and so it will keep that private. There are certain proxies that will rotate your IP address as you use it. And as you do that, that will further help and insulate. And you can use all of these together and each time you layer. And you can just keep adding these layers and the more layers, the better. It tastes better. And so if you could use a private search engine with a private browser, with a proxy and VPN, the world gets better and better. ”
3. “There are lots of data that needs to be shared. So it turns out that if you take away too much data, life gets really complicated and hard. And one of the big ones is passwords."

3 questions we ask all guests:


1. Who in the world of Tech/Data Michael would take out for lunch?
Tim Berners-Lee - an English computer scientist best known as the inventor of the World Wide Web.
2. What piece of software Michael couldn't imagine life without?
Google flights

3. What real-life problem did Michael solve using data?
Michael maintains his phone number anonymous (partly to protect himself from spam calls) by using Phoner.

Episode Resources


If you enjoyed this episode then please either:


Subscribe, rate, and review the "Ethical Data, Explained" podcast on Apple Podcasts.
Follow the "Ethical Data, Explained" podcast on Spotify.
Follow the "Ethical Data, Explained" podcast on Google Podcasts.
Watch full episodes of the "Ethical Data, Explained" podcast on YouTube.
To know more about SOAX visit the website.
Ethical Data, Explained is handcrafted by our friends over at: fame.so
  continue reading

10 episodes

Artwork
iconShare
 
Manage episode 363355717 series 3427778
Content provided by Henry Ng. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Henry Ng or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
In this episode of Ethical Data, Explained, Henry Ng is joined by Michael Levit, CEO and Co-founder of Tempest to discuss privacy-based browsers - what technology they are built on, how they ensure user privacy, how they differ from VPN and proxies, and much more.
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!

Quotes


1. “How individuals can protect their privacy? Well, other than the obvious go download Tempest today. A browser and a proxy, I think, are two wonderful places to start. If you're going to do nothing else, do those two things.
2. “There's probably a certain amount of data leakage that's going from the search engine to the third-party provider, especially if you click on an ad. There is a certain amount of protection by using a private browser. That browser may restrict your IP address. It may get rid of your fingerprint. It will do a variety of things that will restrict the amount of information that's leaking. A VPN or a proxy will restrict your native IP address and so it will keep that private. There are certain proxies that will rotate your IP address as you use it. And as you do that, that will further help and insulate. And you can use all of these together and each time you layer. And you can just keep adding these layers and the more layers, the better. It tastes better. And so if you could use a private search engine with a private browser, with a proxy and VPN, the world gets better and better. ”
3. “There are lots of data that needs to be shared. So it turns out that if you take away too much data, life gets really complicated and hard. And one of the big ones is passwords."

3 questions we ask all guests:


1. Who in the world of Tech/Data Michael would take out for lunch?
Tim Berners-Lee - an English computer scientist best known as the inventor of the World Wide Web.
2. What piece of software Michael couldn't imagine life without?
Google flights

3. What real-life problem did Michael solve using data?
Michael maintains his phone number anonymous (partly to protect himself from spam calls) by using Phoner.

Episode Resources


If you enjoyed this episode then please either:


Subscribe, rate, and review the "Ethical Data, Explained" podcast on Apple Podcasts.
Follow the "Ethical Data, Explained" podcast on Spotify.
Follow the "Ethical Data, Explained" podcast on Google Podcasts.
Watch full episodes of the "Ethical Data, Explained" podcast on YouTube.
To know more about SOAX visit the website.
Ethical Data, Explained is handcrafted by our friends over at: fame.so
  continue reading

10 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide