DIVI Crypto Podcast Episode 78: Privacy Interview with Seth Estrada

In this episode, Steve welcomed Seth Estrada, popularly known as mineyourbiz on Youtube, to uncover the basics of privacy hygiene up to the encrypting voice applications.

Learning Privacy Basics
According to Seth, regular text messages are very insecure. Notifications are visible to your carrier and other parties, along with the chain of custody of your messages. For example, if you’re using an application that is available on both your desktop and phone, you could still encrypt voice chat and texts. They just added a wireless or wifi calling from the desktop.

As a beginner, you need to ensure that you’re aware of the applications that you’re downloading. Also, having a good VPN would help you cover tracks online. Seth dispelled the myth about VPNs enabling you to become hidden in the State. You’re more like throwing advertising trackers off of your scent. So a little bit more of your data, privacy is preserved that way.

Email Spectrum
Based on the readings that Seth had done, email is fundamentally broken when it comes to privacy. Even when you do have an encrypted email and service, there are parts of the email communication that simply cannot be encrypted ever. When you’re writing for a subject line or headline, note that there are parts of the email that will always be visible whether you are sending an encrypted email, and you can then decrypt it using public keys.

Seth recommended using desktop email clients like Thunderbird, which is the desktop counterpart to Firefox. Adding some encryption plugins that allow you to use GPG, desktop encryption, or sign a GPG key, would also work as you conditionally allow other people to open up those emails. It’s getting all the various moving parts to work correctly. It's just a way to a more comfortable to go sign up for a proton mail account and ask people who you regularly contact to sign up for a proton mail account.

Every Monday, Seth release weekly interviews with developers and community members, sometimes privacy leaders. They also provide some blog posts, but they’re selective with what they publish. Finally, they also sell merchandise that is purchasable with crypto natively. The company custody those funds because they’re selling the merchandise as legally as they can.