Is Privacy Possible With Crypto?

Is Privacy Possible With Crypto?

Author: The most important weekly tech news + solutions. November 1, 2024 Duration: 10:08

In part 2 of my interview with Rose O’ Leary from DarkFi, I asked about the involvement of the FBI and the IRS in tracing and tracking transactions. I was wondering how DarkFi could potentially safeguard visibility into the blockchain.

What did you think of the answer Rose gave about Monero's ring signature? Do you have any alternative options to propose in this space?



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit tbot.substack.com/subscribe

Hakeem Anwar hosts The #TBOT Show, a weekly podcast dedicated to cutting through the noise of the tech world. Instead of just reporting headlines, this show focuses on the technology news that actually shapes your daily routine, privacy, and digital freedom, explaining why it matters in clear terms. Each episode is designed to be concise and actionable, wrapping up in under twenty minutes. You’ll hear informed analysis and straightforward recommendations on how to navigate the week’s developments. True to its mission, every installment also provides a practical takeaway: this might be a powerful open-source tool you can use, a privacy-enhancing skill to learn, or a sustainable tech solution to implement. It’s a blend of necessary context and usable insight, making it a resource for anyone who wants to understand and take back control of their tech life. Tune in for a focused, efficient update that prioritizes depth over duration, ensuring you stay informed without being overwhelmed. This podcast delivers exactly what its author promises: the most important weekly tech news paired with tangible solutions.
Author: Language: English Episodes: 80

The #TBOT Show with Hakeem Anwar
Podcast Episodes
The TBOT Show | Episode #1 [not-audio_url] [/not-audio_url]

Duration: 22:52
Hey peeps, Its Hakeem! We’ve just released the first episode of the new #TBOT show which will be published every Friday from now on. 🔥 My focus with this show is to give you the most important tech stories every week in…
What Data is Your Phone Gathering? [not-audio_url] [/not-audio_url]

Duration: 2:22
In this clip from my new interview with the Macroaggressions Podcast, I talk about the huge multi billion dollar industry built on Google's AdWords and key information about individual users that are compiled into secret…
Brute Force Hacking Protection on Above Phone [not-audio_url] [/not-audio_url]

Duration: 3:49
In this clip from Above’s Hidden Signs Your Phone is Compromised webinar, I detail how Above Phone will lock out intruders who attempt to use brute force attacks on a pincode to guess the security password on your phone.…
Tools Law Enforcement Uses To Access iPhone, Android [not-audio_url] [/not-audio_url]

Duration: 9:43
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I discuss the importance of keeping your phone locked at all times and how Cellebrite tools can be used by law enforcement to capture and compro…
How GrapheneOS Protects You from Hackers and Malware [not-audio_url] [/not-audio_url]

Duration: 6:49
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I’m getting into the details about how GrapheneOS has hardened memory allocation to protect against various memory based exploits that attempt t…
The Most Common Exploits Found In Apple, iPhone [not-audio_url] [/not-audio_url]

Duration: 5:16
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I dive into how to identify previously used Pegasus malware URL links that were logged by Amnesty International and some of the most common expl…