Artwork

Content provided by Joe Patti and Adam Roth, Joe Patti, and Adam Roth. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joe Patti and Adam Roth, Joe Patti, and Adam Roth or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ep. 10: Internet Privacy - Hardcore Edition

49:38
 
Share
 

Manage episode 364434473 series 3467081
Content provided by Joe Patti and Adam Roth, Joe Patti, and Adam Roth. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joe Patti and Adam Roth, Joe Patti, and Adam Roth or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

For part two of our series on Internet privacy, we talk about playing in the big leagues: How dissidents, journalists, whistleblowers and others with tough adversaries can protect themselves using tools like Tor and Tails.

Links to resources we mention:
Tor
Tails
Qubes OS
Signal

We don’t just talk about security. If you have a security problem you need to solve, we can help. Reach us at feedback@securitycocktailhour.com or @SecCocktailHour on Twitter.

  continue reading

35 episodes

Artwork
iconShare
 
Manage episode 364434473 series 3467081
Content provided by Joe Patti and Adam Roth, Joe Patti, and Adam Roth. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joe Patti and Adam Roth, Joe Patti, and Adam Roth or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

For part two of our series on Internet privacy, we talk about playing in the big leagues: How dissidents, journalists, whistleblowers and others with tough adversaries can protect themselves using tools like Tor and Tails.

Links to resources we mention:
Tor
Tails
Qubes OS
Signal

We don’t just talk about security. If you have a security problem you need to solve, we can help. Reach us at feedback@securitycocktailhour.com or @SecCocktailHour on Twitter.

  continue reading

35 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide