
Sign up to save your podcasts
Or


Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. By knowing how to limit who has access to our information and questioning why we need to share personal details, we can protect our identity and rights at a time when data collection is expected. In this episode, Tim Jensen will elaborate on the basic principles of individual privacy. We will explore controlling access to oneself, limiting trust to safeguard privacy, refraining from using privacy as an excuse for unlawful actions, and all about the other fundamentals.
Standout Quotes:
Key Takeaways:
Episode Timeline: [00:58] Controlling Access to Ourselves [01:48] Personal Privacy vs. Legal Responsibility [02:39] Limiting Trust [06:29] Trust on a Need-to-Know Basis [14:21] Aliases and Password Managers [16:18] Balancing Trust and Convenience [25:26] Mindset and Behavior Over Technology [27:47] Proactive Prevention [29:20] Your Role in Safeguarding Personal Data [33:16] Data Backup [37:07] Decentralize Control
By Tim JensenWelcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. By knowing how to limit who has access to our information and questioning why we need to share personal details, we can protect our identity and rights at a time when data collection is expected. In this episode, Tim Jensen will elaborate on the basic principles of individual privacy. We will explore controlling access to oneself, limiting trust to safeguard privacy, refraining from using privacy as an excuse for unlawful actions, and all about the other fundamentals.
Standout Quotes:
Key Takeaways:
Episode Timeline: [00:58] Controlling Access to Ourselves [01:48] Personal Privacy vs. Legal Responsibility [02:39] Limiting Trust [06:29] Trust on a Need-to-Know Basis [14:21] Aliases and Password Managers [16:18] Balancing Trust and Convenience [25:26] Mindset and Behavior Over Technology [27:47] Proactive Prevention [29:20] Your Role in Safeguarding Personal Data [33:16] Data Backup [37:07] Decentralize Control