Privacy & Security Podcast For All
Closed Ntwrk

Closed Ntwrk

Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information:

Recent Episodes

Episode 15 - With "The Hated One - Donations vs. Sponsor, Mobile OS Security, Bitcoin, Listener Questions & More

April 14, 2022

This episode is a collaborative podcast with the YouTube Personality "The Hated One". This is our third episode together and we discuss sponsored content versus listener supported, Graphene OS is the most secure phone OS, Bi…

Episode 14 - Mobile Phone Update - Proton Buys Simple Login - Utah Privacy Legislation

April 11, 2022

Mobile Phone Update - Back to using GrapheneOS. Challenges in self hosting, ProtonMail Buys SimpleLogin. Facebook users angry after accounts locked for no reason Utah To Become Th…

Episode 13 - Threat Modeling, Hacking Tails and Peer-to-Peer Decentralization / W The Hated One

April 5, 2022

Closed Ntwrk and The Hated One meet again for another podcast episode! We discus Cwtch, Briar, threat models, and Tails. Subscribe to The Hated One on YouTube - Ways Y…

Episode 12 - Collab with "The Hated One" YouTube Personality

March 21, 2022

I had the pleasure of speaking with "The Hated One" the popular YouTube personality that has been making videos for several years about privacy, mass surveillance and geo political issues. In this episode we cover the follow…

Episode 11 - Security Tips - Apps I Use - 2FA - TOTP

March 9, 2022

In a time where there are more attacks than ever on your digital accounts, it's important to know how to protect yourself against malware, phising attacks, and SIM highjacking. This threat can be greatly reduced by using 2FA…

Episode 10 - Digital Sovereignty With Bitcoin & Self Hosting

Feb. 23, 2022

- Why it is important to be vigilant about your digital logins and who has access to them. - Relationships that don't end well, business relationships and disgruntled friends or family membe - How to setup your own self host…

Recent Blog Posts

Take Control Of Online Purchases and Subscriptions

How to make online purchases shielding your identity from potential scams and sites that have data leaks.