Complete Privacy & Security Podcast E083

Complete Privacy & Security Podcast

Complete Privacy & Security Podcast E083: This Week In Privacy

This week we talk about Firefox privacy extensions, Apple security changes, Copperhead OS, PIA no-logging, Wire support, and our new book.

Subscribe at:




KeePassXC Browser:

Firefox Containers:


CP&SDR Volume II:

Apple closing USB vulnerability:

Cooperhead OS Dead?

PIA Logging tested again:

Wire iOS browser integration:
My original article
Follow-up article

Equifax successfully sued:

DEFENSE: Locate the link to your profile, email with the subject line removal.

1. I slowly been trying to de-google-fy my life. One issue I’ve had as a heavy Youtube user I’ve been trying to watch without getting my browser fingerprint and ip tracked. Do you have any other suggestions or simplifications.

2. Cloudfare offers a DNS service to as an alternative to, say, Google’s DNS service. What do you think of this? If VPN is not an option for someone, would this be a recommended option (instead of, say, OpenDNS)?

The Complete Privacy and Security Desk Reference Vol. I

The Complete Privacy and Security Desk Reference Vol. II

Michael’s Website

Justin’s Website

4 thoughts on “Complete Privacy & Security Podcast E083”

  1. After listening to today’s podcast I looked up your newest book on Amazon. I wanted to check and see if Volume 2 also includes updates from Volume 1? “After 100 pages of updates from the previous volume (Digital)”. Reading this makes me think that by ordering Volume 2 you get the best of both worlds, information on digital and physical security. Is this the case or do I really need to buy both books? Thanks for all you guys do!

    1. Buy Vol II first and see if you still need Vol I. There are a lot of references to information contained in Volume I.

  2. Hello,
    Some comment on your last podcast. I use a modified Tor Browser for canvas spoofing…

    While it makes sense in theory – (two different VPN providers cascaded)
    A better (faster) option might be a single VPN provider and their proxy server.

    Tor Browser has good fingerprint protection but slow.
    It can be faster that firefox when configured to use a VPN proxy.

    For IP Isolation I use Mullvad VPN:
    (requires using Mullvad VPN on PC.)
    – Download and install a seperate instance of tor browser in in its own directory.
    – Set the proxy to the socks5 proxy of the VPN provider. (Google: Tor Browser – no tor)
    A super fast Browser – without Tor – proxied through your VPN with a seperate Socks5 IP address.

    I’ve contacted Mullvad support requesting multiple socks5 proxy connections through their VPN.
    Maybe 5 different browser proxy IP addresses per VPN connection.

    It would be nice if each browser tab had a seperate IP, however,
    installing 5 instances of tor browser without tor wouldn’t be a bad compromise for now.
    –> Fast, No fingerprints, and each instance has its own IP.
    Hopefully a VPN provider will allow single location – multiple proxy addresses on their VPN servers soon.

    1. Interesting strategy – I like it!

      One other thing I’d like to correct is NoScript’s permissions. I wish there was a way (or I knew of the way) to make NoScript permissions apply only to to a single set of containers.

      Thanks for writing in!

Leave a Reply

Your email address will not be published.