Artwork

Kandungan disediakan oleh Henry Ng. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Henry Ng atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !

Antidetect Browsers: Empowering Users to Decide What Personal Data to Disclose with Michael Levit, CEO and Co-founder of Tempest

43:18
 
Kongsi
 

Manage episode 363355717 series 3427778
Kandungan disediakan oleh Henry Ng. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Henry Ng atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
In this episode of Ethical Data, Explained, Henry Ng is joined by Michael Levit, CEO and Co-founder of Tempest to discuss privacy-based browsers - what technology they are built on, how they ensure user privacy, how they differ from VPN and proxies, and much more.
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!

Quotes


1. “How individuals can protect their privacy? Well, other than the obvious go download Tempest today. A browser and a proxy, I think, are two wonderful places to start. If you're going to do nothing else, do those two things.
2. “There's probably a certain amount of data leakage that's going from the search engine to the third-party provider, especially if you click on an ad. There is a certain amount of protection by using a private browser. That browser may restrict your IP address. It may get rid of your fingerprint. It will do a variety of things that will restrict the amount of information that's leaking. A VPN or a proxy will restrict your native IP address and so it will keep that private. There are certain proxies that will rotate your IP address as you use it. And as you do that, that will further help and insulate. And you can use all of these together and each time you layer. And you can just keep adding these layers and the more layers, the better. It tastes better. And so if you could use a private search engine with a private browser, with a proxy and VPN, the world gets better and better. ”
3. “There are lots of data that needs to be shared. So it turns out that if you take away too much data, life gets really complicated and hard. And one of the big ones is passwords."

3 questions we ask all guests:


1. Who in the world of Tech/Data Michael would take out for lunch?
Tim Berners-Lee - an English computer scientist best known as the inventor of the World Wide Web.
2. What piece of software Michael couldn't imagine life without?
Google flights

3. What real-life problem did Michael solve using data?
Michael maintains his phone number anonymous (partly to protect himself from spam calls) by using Phoner.

Episode Resources


If you enjoyed this episode then please either:


Subscribe, rate, and review the "Ethical Data, Explained" podcast on Apple Podcasts.
Follow the "Ethical Data, Explained" podcast on Spotify.
Follow the "Ethical Data, Explained" podcast on Google Podcasts.
Watch full episodes of the "Ethical Data, Explained" podcast on YouTube.
To know more about SOAX visit the website.
Ethical Data, Explained is handcrafted by our friends over at: fame.so
  continue reading

10 episod

Artwork
iconKongsi
 
Manage episode 363355717 series 3427778
Kandungan disediakan oleh Henry Ng. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Henry Ng atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
In this episode of Ethical Data, Explained, Henry Ng is joined by Michael Levit, CEO and Co-founder of Tempest to discuss privacy-based browsers - what technology they are built on, how they ensure user privacy, how they differ from VPN and proxies, and much more.
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!

Quotes


1. “How individuals can protect their privacy? Well, other than the obvious go download Tempest today. A browser and a proxy, I think, are two wonderful places to start. If you're going to do nothing else, do those two things.
2. “There's probably a certain amount of data leakage that's going from the search engine to the third-party provider, especially if you click on an ad. There is a certain amount of protection by using a private browser. That browser may restrict your IP address. It may get rid of your fingerprint. It will do a variety of things that will restrict the amount of information that's leaking. A VPN or a proxy will restrict your native IP address and so it will keep that private. There are certain proxies that will rotate your IP address as you use it. And as you do that, that will further help and insulate. And you can use all of these together and each time you layer. And you can just keep adding these layers and the more layers, the better. It tastes better. And so if you could use a private search engine with a private browser, with a proxy and VPN, the world gets better and better. ”
3. “There are lots of data that needs to be shared. So it turns out that if you take away too much data, life gets really complicated and hard. And one of the big ones is passwords."

3 questions we ask all guests:


1. Who in the world of Tech/Data Michael would take out for lunch?
Tim Berners-Lee - an English computer scientist best known as the inventor of the World Wide Web.
2. What piece of software Michael couldn't imagine life without?
Google flights

3. What real-life problem did Michael solve using data?
Michael maintains his phone number anonymous (partly to protect himself from spam calls) by using Phoner.

Episode Resources


If you enjoyed this episode then please either:


Subscribe, rate, and review the "Ethical Data, Explained" podcast on Apple Podcasts.
Follow the "Ethical Data, Explained" podcast on Spotify.
Follow the "Ethical Data, Explained" podcast on Google Podcasts.
Watch full episodes of the "Ethical Data, Explained" podcast on YouTube.
To know more about SOAX visit the website.
Ethical Data, Explained is handcrafted by our friends over at: fame.so
  continue reading

10 episod

Semua episod

×
 
Loading …

Selamat datang ke Player FM

Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.

 

Panduan Rujukan Pantas

Podcast Teratas