Sunday, February 27, 2011

Tin Foil Hat Show - Episode 008

Episode 8.  My first "Tech Talk" episode where I will dive into the Trucrypt software.  I do hope that someone out there might actually discover that privacy on a personal computer does still exist and can be accomplished wihtout needing to be an elite hacker or a programmer.  I would be remiss if I didn't confess that I hope to hear feedback on this episode to see how people besides myself use the software in their day-to-day and keep their personal private data secure and way from prying eyes.

Third instalment of the podcast review segment appears in this episode.  I reviewed No Agenda and their political podcast which has it's own unique "tin foil hat" qualities too.

The new episode should be in your favorite podcatcher for download already. If you haven't added me to your podcatcher software, please add the RSS feed on the right.

The podcast is also available to play directly online at the Fuzion Podcast Network.

For the instructions to get the show notes please see the instructions as posted in the post for the first episode. These instructions haven't changed.

Feedback as always is welcome, or you can contact me by any of the other methods listed here on this blog. Please remember that the show is very new and still settling in, but constructive criticisms are always appreciated.

Enjoy and please do send me feedback and corrections, it can only make the show better. A permanent link to the show's rss feed is listed on the right side of the blog.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License.


Anonymous said...

I liked the Truecrypt/Dropbox combo.

I never tried it because of dropbox' autoupdate-feature, I feared that the volume would get nerfed. I used to sftp the volume to my homeserver each time I changed something at work, gone are those days.

Great podcast!

Anonymous said...

I'm listening to Cyberspeak-Show's 16 Jan. 2011 podcast about prefetch files and it reminded me of this podcast...a quick warning about hidden encrypted files and Windows prefetch files based on Cyberspeak's podcast. If you open a file from a truecrypt hidden encrypted area, the Windows prefetch file lists the direct path to the file still, so the hidden encrypted area is compromised. I don't know that this has been addressed just yet.