
Sign up to save your podcasts
Or


Gabriel Custodiet gives the floor to Urban Hacker to give a ground-level history of the Tor network, one of the most important privacy projects in digital history. Urban Hacker begins with Tor's predecessors, such as mixed networks and remailers. He explains Tor's origins in the hands of the US Navy, how China altered its trajectory, and how its basic features work. He finishes with practical tips about when and when not to use Tor.
Guest Links → https://urbanhacker.net/ → https://twitter.com/realUrbanHacker → https://t.me/Realurbanhacker (Telegram) → https://tallycoin.app/@realurbanhacker/the-orange-pill-simulator-zzjq3lmF (Urban Hacker's Bitcoin game)
MY PREMIUM NEWSLETTER → http://watchmanstorch.com → Join my exclusive privacy community
MY PRIVACY TUTORIALS → https://escapethetechnocracy.com/ (including consulting) → https://watchmanprivacy.com (Gabriel's personal site) → https://twitter.com/watchmanprivacy
SUPPORT INDEPENDENT GONZO TECHNO-ADVENTURE JOURNALISM → No sponsors. No ads. Just truth. → https://watchmanprivacy.com/donate.html
Timeline
0:00 – Introduction 2:16 – Predecessors to Tor: remailers and mix networks 8:00 – Drawbacks of remailers 11:14 – Inception of Tor network 15:21 – How does Tor network function? 19:59 – How does Tor gain prominence? 25:00 – Tor vs VPN 27:30 – Challenges of Tor throughout its history 34:02 – Various ways to make use of Tor 37:47 – When should we not use Tor? 41:42 – Should we adjust Tor settings? 42:34 – Proper Tor etiquette 44:08 – Urban Hacker's Bitcoin game: The Orange Pill Simulator
#WatchmanPrivacy #TorNetwork #Tor #BitcoinPrivacy
By Gabriel Custodiet4.7
7474 ratings
Gabriel Custodiet gives the floor to Urban Hacker to give a ground-level history of the Tor network, one of the most important privacy projects in digital history. Urban Hacker begins with Tor's predecessors, such as mixed networks and remailers. He explains Tor's origins in the hands of the US Navy, how China altered its trajectory, and how its basic features work. He finishes with practical tips about when and when not to use Tor.
Guest Links → https://urbanhacker.net/ → https://twitter.com/realUrbanHacker → https://t.me/Realurbanhacker (Telegram) → https://tallycoin.app/@realurbanhacker/the-orange-pill-simulator-zzjq3lmF (Urban Hacker's Bitcoin game)
MY PREMIUM NEWSLETTER → http://watchmanstorch.com → Join my exclusive privacy community
MY PRIVACY TUTORIALS → https://escapethetechnocracy.com/ (including consulting) → https://watchmanprivacy.com (Gabriel's personal site) → https://twitter.com/watchmanprivacy
SUPPORT INDEPENDENT GONZO TECHNO-ADVENTURE JOURNALISM → No sponsors. No ads. Just truth. → https://watchmanprivacy.com/donate.html
Timeline
0:00 – Introduction 2:16 – Predecessors to Tor: remailers and mix networks 8:00 – Drawbacks of remailers 11:14 – Inception of Tor network 15:21 – How does Tor network function? 19:59 – How does Tor gain prominence? 25:00 – Tor vs VPN 27:30 – Challenges of Tor throughout its history 34:02 – Various ways to make use of Tor 37:47 – When should we not use Tor? 41:42 – Should we adjust Tor settings? 42:34 – Proper Tor etiquette 44:08 – Urban Hacker's Bitcoin game: The Orange Pill Simulator
#WatchmanPrivacy #TorNetwork #Tor #BitcoinPrivacy

1,888 Listeners

577 Listeners

1,775 Listeners

439 Listeners

3,365 Listeners

933 Listeners

499 Listeners

776 Listeners

430 Listeners

322 Listeners

372 Listeners

1,826 Listeners

123 Listeners

20 Listeners

31 Listeners