Artwork

Inhoud geleverd door Seth For Privacy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Seth For Privacy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Network privacy via i2p w/ idk and Sadie

1:00:16
 
Delen
 

Manage episode 322032850 series 2932360
Inhoud geleverd door Seth For Privacy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Seth For Privacy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the show

  continue reading

Hoofdstukken

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 afleveringen

Artwork

Network privacy via i2p w/ idk and Sadie

Opt Out

40 subscribers

published

iconDelen
 
Manage episode 322032850 series 2932360
Inhoud geleverd door Seth For Privacy. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Seth For Privacy of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Have you heard about i2p but aren't sure where it fits into your network privacy toolkit? This episode, we're sitting down with Sadie and IDK from i2p to chat about i2p's approach to privacy, it's use-cases, and how it compares to similar tools like the Tor network.
More about idk and Sadie:

More about i2p:

Opt Out's Sponsors:

Supporting Opt Out:

Support the show

  continue reading

Hoofdstukken

1. Network privacy via i2p w/ idk and Sadie (00:00:00)

2. Sadie and idk introduce themselves and what i2p does (00:01:17)

3. What was it that woke you up to the need for personal privacy? (00:02:44)

4. What prompted the creation of i2p? (00:09:08)

5. What is i2p and how does it work? (00:11:37)

6. What would you hope users get from using i2p? (00:14:33)

7. Is i2p similar to the Tor daemon? (00:17:07)

8. What should people be aware of when self-hosting i2p? (00:21:29)

9. A shoutout to Opt Out's sponsors (00:26:17)

10. What settings or features should listeners take a look at or become familiar with when starting to use i2p? (00:27:38)

11. What are some limitations users should be aware of? (00:28:29)

12. How does i2p compare with other anonymity networks like Tor? What makes i2p better/unique? (00:38:13)

13. How is metadata protected compared to the Tor network? (00:42:15)

14. How does i2p handle Sybil attacks or malicious nodes? (00:43:13)

15. How does i2p compare with (or work together with) VPNs? (00:48:03)

16. How is i2p organized, and how is it funded or made sustainable? (00:53:49)

17. How can listeners help support what you're doing with i2p? (00:57:40)

40 afleveringen

Todos los episodios

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding