Artwork

Contenido proporcionado por Seth For Privacy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Seth For Privacy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Network privacy via i2p w/ idk and Sadie

1:00:16
 
Compartir
 

Manage episode 322032850 series 2932360
Contenido proporcionado por Seth For Privacy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Seth For Privacy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the show

  continue reading

Capíttulos

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 episodios

Artwork

Network privacy via i2p w/ idk and Sadie

Opt Out

40 subscribers

published

iconCompartir
 
Manage episode 322032850 series 2932360
Contenido proporcionado por Seth For Privacy. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Seth For Privacy o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the show

  continue reading

Capíttulos

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida