Episode 002-The Complete Privacy & Security Podcast

Posted on October 15th, 2016

We have released our second episode of The Complete Privacy & Security Podcast. This podcast will explain how to become digitally invisible.

Listen now at https://privacy-training.com/podcast.html


Show Notes


Chapter Twelve: Smartphone Security
CopperheadOS
CCleaner weaknesses
Security apps aren’t always best practice

Chapter Fourteen: Data in Motion
PIA FBI Warrant

Chapter Sixteen: Disinformation
IDI / sampleandsavings.com

Chapter Seventeen: Future Habits
Canary Tokens

Chapter Nineteen: Secure Communications (Email)
Protonmail free/pro Features Update

Chapter Twenty: Secure Communications (Voice)
Cryptocat
Signal FBI Request

Chapter Twenty-One: Secure File Deletion
Reiterate futility on SSD

Chapter Twenty-Two: Stateless Operating Systems
Qubes

Chapter Twenty-Three: Web Publishing
Blog Reader: How do you publish information or ideas on the Internet while remaining anonymous, so that you can stay out of reach of governments which have anti-freedom of speech laws on their books?


Privacy Discussion


TrueCrypt vs. VeraCrypt?


Listener Questions


Filed under Podcast, Privacy, Uncategorized |

Comments are closed.

Previous Posts