<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cc="http://web.resource.org/cc/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
  <channel>
    <atom:link href="https://atlbitlab.com/podcast/sovereign-computing/feed" rel="self" type="application/rss+xml"/>
    <title>The Sovereign Computing Show</title>
    <pubDate>Tue, 15 Apr 2025 09:30:00 +0000</pubDate>
    <lastBuildDate>Tue, 16 Sep 2025 15:45:13 GMT</lastBuildDate>
    <generator>ATL BitLab</generator>
    <link>https://atlbitlab.com/podcast</link>
    <language>en-us</language>
    <copyright>2024</copyright>
    <docs>https://atlbitlab.com/podcast</docs>
    <managingEditor>atlbitlab-podcast.yard076@slmail.me (atlbitlab-podcast.yard076@slmail.me)</managingEditor>
    <itunes:summary>The Sovereign Computing Show is a podcast where we teach you how to take back control of your devices. Sovereign Computing means you own your technology, not the other way around. Hosted by Jordan Bravo and recorded in Atlanta's freedom-tech hackerspace, this show teaches you about topics like self-hosting, privacy, and other digital freedom tools.</itunes:summary>
    <image>
      <url>https://atlbitlab.com/podcast/sovereign-computing/sovereign-computing-poster.jpg</url>
      <title>ATL BitLab Podcast</title>
      <link>https://atlbitlab.com/podcast</link>
    </image>
    <itunes:author>ATL BitLab</itunes:author>
    <itunes:category text="Technology"/>
    <itunes:category text="Society &amp; Culture">
      <itunes:category text="Philosophy"/>
    </itunes:category>
    <itunes:image href="https://atlbitlab.com/podcast/sovereign-computing/sovereign-computing-poster.jpg"/>
    <itunes:explicit>false</itunes:explicit>
    <itunes:owner>
      <itunes:name>ATL BitLab</itunes:name>
      <itunes:email>atlbitlab-podcast.yard076@slmail.me</itunes:email>
    </itunes:owner>
    <description>The Sovereign Computing Show is a podcast where we teach you how to take back control of your devices. Sovereign Computing means you own your technology, not the other way around. Hosted by Jordan Bravo and recorded in Atlanta's freedom-tech hackerspace, this show teaches you about topics like self-hosting, privacy, and other digital freedom tools.</description>
    <itunes:type>episodic</itunes:type>
    <podcast:locked owner="atlbitlab-podcast.yard076@slmail.me">no</podcast:locked>
    <item>
      <title>SOV-022: Matt Hill from Start9 - The Sovereign Computing Show</title>
      <itunes:title>SOV-022: Matt Hill from Start9 - The Sovereign Computing Show</itunes:title>
      <pubDate>Tue, 16 Sep 2025 15:27:00 +0000</pubDate>
      <guid isPermaLink="false">d44c3dea-ae6e-40e2-8872-c080553c7251</guid>
      <link>https://atlbitlab.com/podcast/sov-022-matt-hill-start9</link>
      <podcast:transcript url="https://static.libsyn.com/p/assets/c/c/f/9/ccf94ab836c2316816c3140a3186d450/SOV022_-_Matt_Hill.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Start9 CEO Matt Hill joins Jordan Bravo to discuss the evolution of sovereign computing and the upcoming StartOS 0.4.0 release. Learn about Start9's mission to democratize server administration, their revolutionary new networking capabilities, plans for an open-source router, and innovative community programs for scaling support and development. Plus: why dignity matters as much as privacy and security in computing.</p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/sov-022-matt-hill-start9">https://atlbitlab.com/podcast/sov-022-matt-hill-start9</a></p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:00 Opening Quote: Sovereign Computing Definition</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:33 Introduction and Show Sponsorship</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:51 Welcome and Sovereign Computing Origins</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">03:21 What is Sovereign Computing?</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:54 Privacy vs Confidentiality and the Dignity Factor</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">06:15 The Undignified Reality of Modern Computing</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">08:37 Making Server Administration Accessible</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:00 Democratizing Advanced Computing Skills</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">11:42 Familiar User Experience Design Philosophy</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">14:09 Learning from Mobile OS Evolution</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:45 Bringing Linux Admin Experience "Above the Hood"</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:05 StartOS Evolution: From 0.0.1 to 0.3.5.1</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">19:28 Dependency Management and Configuration Breakthroughs</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">20:17 Moving from Docker to Custom Container Runtime</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">21:33 StartOS 0.4.0: Complete Architecture Rewrite</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">24:44 Two Years of Development Hell and Breakthrough</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">26:30 Custom LXC Container Runtime Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">27:35 Advanced Networking Capabilities in 0.4.0</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">28:29 Granular Interface Control Example</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">31:49 Private Domains and DNS Management</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">35:06 The "Digital IKEA" Philosophy</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">36:34 VPN Tunneling and Network Abstractions</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">37:57 Start9 vs Tailscale Comparison</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">41:13 Router Hardware Prototypes and Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">46:47 Router as Standalone vs Integrated Product</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">52:00 StartOS and Router Integration Benefits</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">53:26 Router Release Timeline: Not Before Mid-2026</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">54:44 Community Tech Program: Scaling Support</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:00:18 Community Developer Program Announcement</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:05:02 Package Development and Crowdfunding Model</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:11:56 AI in Development: Limited but Useful</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:17:01 Self-Hosting AI Challenges and Hardware Limitations</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:24:37 TabConf 2025: Workshop and Package Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:26:55 Conclusion</p> </li> </ul> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Start9 CEO Matt Hill joins Jordan Bravo to discuss the evolution of sovereign computing and the upcoming StartOS 0.4.0 release. Learn about Start9's mission to democratize server administration, their revolutionary new networking capabilities, plans for an open-source router, and innovative community programs for scaling support and development. Plus: why dignity matters as much as privacy and security in computing.</p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/sov-022-matt-hill-start9">https://atlbitlab.com/podcast/sov-022-matt-hill-start9</a></p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:00 Opening Quote: Sovereign Computing Definition</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:33 Introduction and Show Sponsorship</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:51 Welcome and Sovereign Computing Origins</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">03:21 What is Sovereign Computing?</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:54 Privacy vs Confidentiality and the Dignity Factor</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">06:15 The Undignified Reality of Modern Computing</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">08:37 Making Server Administration Accessible</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:00 Democratizing Advanced Computing Skills</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">11:42 Familiar User Experience Design Philosophy</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">14:09 Learning from Mobile OS Evolution</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:45 Bringing Linux Admin Experience "Above the Hood"</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:05 StartOS Evolution: From 0.0.1 to 0.3.5.1</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">19:28 Dependency Management and Configuration Breakthroughs</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">20:17 Moving from Docker to Custom Container Runtime</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">21:33 StartOS 0.4.0: Complete Architecture Rewrite</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">24:44 Two Years of Development Hell and Breakthrough</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">26:30 Custom LXC Container Runtime Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">27:35 Advanced Networking Capabilities in 0.4.0</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">28:29 Granular Interface Control Example</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">31:49 Private Domains and DNS Management</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">35:06 The "Digital IKEA" Philosophy</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">36:34 VPN Tunneling and Network Abstractions</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">37:57 Start9 vs Tailscale Comparison</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">41:13 Router Hardware Prototypes and Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">46:47 Router as Standalone vs Integrated Product</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">52:00 StartOS and Router Integration Benefits</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">53:26 Router Release Timeline: Not Before Mid-2026</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">54:44 Community Tech Program: Scaling Support</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:00:18 Community Developer Program Announcement</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:05:02 Package Development and Crowdfunding Model</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:11:56 AI in Development: Limited but Useful</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:17:01 Self-Hosting AI Challenges and Hardware Limitations</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:24:37 TabConf 2025: Workshop and Package Development</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:26:55 Conclusion</p> </li> </ul> <p> </p>]]></content:encoded>
      <enclosure length="84511440" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV022_-_Matt_Hill.mp3?dest-id=4796587"/>
      <itunes:duration>01:28:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Start9 CEO Matt Hill joins Jordan Bravo to discuss the evolution of sovereign computing and the upcoming StartOS 0.4.0 release. Learn about Start9's mission to democratize server administration, their revolutionary new networking capabilities, plans...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>SOV-021: Google Kills Android Sideloading: The iOS-ification Begins - The Sovereign Computing Show</title>
      <itunes:title>SOV-021: Google Kills Android Sideloading: The iOS-ification Begins - The Sovereign Computing Show</itunes:title>
      <pubDate>Thu, 04 Sep 2025 08:49:00 +0000</pubDate>
      <guid isPermaLink="false">821890d4-cdb6-4cbb-81d4-8d35484dd67a</guid>
      <link>https://atlbitlab.com/podcast/sov-021-google-kills-android-sideloading-metadata-surveillance-state</link>
      <itunes:image href="https://static.libsyn.com/p/assets/8/f/2/7/8f27e44c6dd2178316c3140a3186d450/sov-021-Google_Kills_Android_Sideloading__The_iOS-ification_Begins_1.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/8/f/2/7/8f27e44c6dd21783d959afa2a1bf1c87/SOV_021_Is_Google_Killing_Android.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Google is making Android more like iOS by blocking "sideloading" of unverified apps starting next year. Jordan Bravo breaks down why "sideloading" is a psyop term designed to make normal software installation seem dangerous, how Google's new developer KYC requirements will kill freedom tech, and why this gradual "boiling of the frog" approach threatens projects like GrapheneOS. Plus a chilling reminder from former NSA/CIA director Michael Hayden: "We kill people based on metadata."</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/sov-021-google-kills-android-sideloading-metadata-surveillance-state"> https://atlbitlab.com/podcast/sov-021-google-kills-android-sideloading-metadata-surveillance-state</a></p> <p dir="ltr"> </p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:00 Opening Quote: Satoshi KYC Example</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:41 Introduction and Show Sponsorship</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:59 Solo Episode Format and Holiday Week</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">02:47 Google Blocks Android Sideloading Starting 2026</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">03:12 "Sideloading" is a Psyop Term</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:24 Apple's Security vs Freedom Model</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:44 Google's New Developer KYC Requirements</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">06:28 Developer Identity Verification Requirements</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">07:14 Impact on Freedom Technologies - Satoshi Example</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">07:47 GrapheneOS and De-Googled Android Safe (For Now)</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">08:43 Android Source Code Becoming Closed</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:02 Hope for Future Mobile Operating Systems</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:51 Ladybird Browser as Example of Ground-Up Development</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">11:19 State of Mobile Linux</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12:07 Email and Boost Support Information</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12:34 Metadata Collection: Signal vs WhatsApp Comparison</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">-13:23 Signal's Minimal Metadata Footprint</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">13:43 WhatsApp Uses Signal Protocol but Collects Metadata</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:11 What Metadata Can Reveal About You</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:34 Michael Hayden Quote: "We Kill People Based on Metadata"</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">16:38 Breaking Down the Hayden Quote</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">17:30 Importance of Minimizing Metadata Leakage</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:00 Fighting Back Against Surveillance State</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:24 Conclusion and Next Episode Preview</p> </li> </ul> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Google is making Android more like iOS by blocking "sideloading" of unverified apps starting next year. Jordan Bravo breaks down why "sideloading" is a psyop term designed to make normal software installation seem dangerous, how Google's new developer KYC requirements will kill freedom tech, and why this gradual "boiling of the frog" approach threatens projects like GrapheneOS. Plus a chilling reminder from former NSA/CIA director Michael Hayden: "We kill people based on metadata."</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/sov-021-google-kills-android-sideloading-metadata-surveillance-state"> https://atlbitlab.com/podcast/sov-021-google-kills-android-sideloading-metadata-surveillance-state</a></p> <p dir="ltr"> </p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:00 Opening Quote: Satoshi KYC Example</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">00:41 Introduction and Show Sponsorship</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">01:59 Solo Episode Format and Holiday Week</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">02:47 Google Blocks Android Sideloading Starting 2026</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">03:12 "Sideloading" is a Psyop Term</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:24 Apple's Security vs Freedom Model</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">04:44 Google's New Developer KYC Requirements</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">06:28 Developer Identity Verification Requirements</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">07:14 Impact on Freedom Technologies - Satoshi Example</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">07:47 GrapheneOS and De-Googled Android Safe (For Now)</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">08:43 Android Source Code Becoming Closed</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:02 Hope for Future Mobile Operating Systems</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">10:51 Ladybird Browser as Example of Ground-Up Development</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">11:19 State of Mobile Linux</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12:07 Email and Boost Support Information</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12:34 Metadata Collection: Signal vs WhatsApp Comparison</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">-13:23 Signal's Minimal Metadata Footprint</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">13:43 WhatsApp Uses Signal Protocol but Collects Metadata</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:11 What Metadata Can Reveal About You</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">15:34 Michael Hayden Quote: "We Kill People Based on Metadata"</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">16:38 Breaking Down the Hayden Quote</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">17:30 Importance of Minimizing Metadata Leakage</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:00 Fighting Back Against Surveillance State</p> </li> </ul> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">18:24 Conclusion and Next Episode Preview</p> </li> </ul> <p> </p>]]></content:encoded>
      <enclosure length="18764803" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV_021_Is_Google_Killing_Android.mp3?dest-id=4796587"/>
      <itunes:duration>19:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>CIA,Signal,NSA,WhatsApp,cypherpunk,GrapheneOS,Android sideloading,Google Play Store,developer KYC,metadata surveillance,mobile privacy,freedom tech</itunes:keywords>
      <itunes:subtitle>Google is making Android more like iOS by blocking "sideloading" of unverified apps starting next year. Jordan Bravo breaks down why "sideloading" is a psyop term designed to make normal software installation seem dangerous, how Google's new developer...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>The Real Cost of "Free" Software - The Sovereign Computing Show (SOV020)</title>
      <itunes:title>The Real Cost of "Free" Software - The Sovereign Computing Show (SOV020)</itunes:title>
      <pubDate>Tue, 26 Aug 2025 17:35:00 +0000</pubDate>
      <guid isPermaLink="false">8a0f037e-9626-4ebf-a351-d514c25fa542</guid>
      <link>https://atlbitlab.com/podcast</link>
      <itunes:image href="https://static.libsyn.com/p/assets/8/a/9/b/8a9b1ca0bd74133016c3140a3186d450/sov-020-The_Real_Cost_of__Free__Software_1.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/f/e/1/b/fe1b63c1ce276a41d959afa2a1bf1c87/Sovereign_Computing__Software_Business_Models_Deep_Dive.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Not all "free" software is actually free - you're often paying with your data, privacy, or through deceptive subscription traps. In this episode, Jordan Bravo and Stephen DeLorme break down the business models behind the software you use daily, from ethical freemium approaches like Tailscale to exploitative data harvesting like Gmail. They explore managed hosting models, the pros and cons of subscriptions versus one-time payments, and expose dark patterns that trick users into unwanted charges. Plus updates on Jordan's private SIM card journey and news about Google's forced Android changes and Linux desktop growth.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-choose-sovereign-software"></a><a href="https://atlbitlab.com/podcast/sov-020-real-cost-of-software">https://atlbitlab.com/podcast/sov-020-real-cost-of-software</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Jordan's Opening Quote on Data-Subsidized Software</p> <p dir="ltr">00:38 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:56 Welcome and Contact Information</p> <p dir="ltr">02:22 Jordan's Private SIM Card Update</p> <p dir="ltr">02:48 - The "Pick Two" Dilemma: Private, Fast, Convenient</p> <p dir="ltr">03:17 - Mint Mobile: Private and Fast but Inconvenient</p> <p dir="ltr">04:03 - AT&T Prepaid: Convenient but Extremely Slow (3 vs 913 Mbps)</p> <p dir="ltr">05:09 - US Mobile Blocks Anonymous Payment Methods</p> <p dir="ltr">05:50 News: Google Forced to Open Android in Epic Games Victory</p> <p dir="ltr">07:51 - Court Orders Google to Stop Monopolistic Practices</p> <p dir="ltr">08:55 - Implications for Alternative App Stores</p> <p dir="ltr">10:29 News: Linux Desktop Market Share Hits 6%</p> <p dir="ltr">11:26 - Steam Deck and Gaming Driving Adoption</p> <p dir="ltr">12:44 - Steam's Proton Compatibility Layer</p> <p dir="ltr">14:07 - Privacy-Focused Users and Celebrity Endorsements</p> <p dir="ltr">16:49 - AI/ML Workloads Favor Linux</p> <p dir="ltr">17:57 Main Topic: Software Business Models</p> <p dir="ltr">18:42 - Why Business Models Matter for Users</p> <p dir="ltr">19:33 - Paying for Good Software vs "Free" Alternatives</p> <p dir="ltr">20:17 Unethical Model: Data-Subsidized "Free" Software</p> <p dir="ltr">20:43 - Gmail Example: How "Free" Services Really Work</p> <p dir="ltr">22:58 Ethical Model: Tailscale's Enterprise Freemium Approach</p> <p dir="ltr">25:12 - Pure Freemium vs Data Collection Hybrid</p> <p dir="ltr">26:47 - When Freemium Goes Wrong</p> <p dir="ltr">27:17 Managed Hosting: Element and Nextcloud Examples</p> <p dir="ltr">29:10 One-Time Payment vs Subscription Models</p> <p dir="ltr">29:46 - Adobe's Transition to Creative Cloud</p> <p dir="ltr">31:07 - Accessibility vs Long-Term Value Trade-offs</p> <p dir="ltr">33:21 - The Rise of Overpriced SaaS Tools</p> <p dir="ltr">36:39 - Importance of Transparent Pricing Models</p> <p dir="ltr">38:22 Dark Patterns and Deceptive Practices</p> <p dir="ltr">39:10 - Jordan's Examples of Subscription Traps</p> <p dir="ltr">40:00 - Stephen's ClassPass Cancellation Nightmare</p> <p dir="ltr">43:09 - Multiple Deceptive Pattern Types Identified</p> <p dir="ltr">44:44 - Hall of Shame: Major Companies Using Dark Patterns</p> <p dir="ltr">46:04 Conclusion: Choosing Ethical Software Business Models</p> <p dir="ltr"> </p> <p dir="ltr">Links</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://jordan.bravo.cc/">Jordan Bravo</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://fountain.fm/show/4t1HXmRckxOWlBYU7ZbA">Boost in on</a> <a href="http://fountain.fm">Fountain.FM</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.theverge.com/news/717440/google-epic-open-play-store-emergency-sta"> Epic Games vs Google Court Decision</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.zdnet.com/article/think-linux-desktop-market-share-isnt-over-6-this-15-million-system-scan-says-otherwise/"> Linux Desktop Market Share Statistics</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.deceptive.design/types">Deceptive Patterns Types and Examples</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://youtu.be/lm51xZHZI6g">"How I Broke Up With Adobe" by James Lee (Animation)</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.youtube.com/watch?v=pVI_smLgTY0">PewDiePie's "I Installed Linux (so should you)"</a></p> </li> </ul> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Not all "free" software is actually free - you're often paying with your data, privacy, or through deceptive subscription traps. In this episode, Jordan Bravo and Stephen DeLorme break down the business models behind the software you use daily, from ethical freemium approaches like Tailscale to exploitative data harvesting like Gmail. They explore managed hosting models, the pros and cons of subscriptions versus one-time payments, and expose dark patterns that trick users into unwanted charges. Plus updates on Jordan's private SIM card journey and news about Google's forced Android changes and Linux desktop growth.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-choose-sovereign-software"></a><a href="https://atlbitlab.com/podcast/sov-020-real-cost-of-software">https://atlbitlab.com/podcast/sov-020-real-cost-of-software</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Jordan's Opening Quote on Data-Subsidized Software</p> <p dir="ltr">00:38 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:56 Welcome and Contact Information</p> <p dir="ltr">02:22 Jordan's Private SIM Card Update</p> <p dir="ltr">02:48 - The "Pick Two" Dilemma: Private, Fast, Convenient</p> <p dir="ltr">03:17 - Mint Mobile: Private and Fast but Inconvenient</p> <p dir="ltr">04:03 - AT&T Prepaid: Convenient but Extremely Slow (3 vs 913 Mbps)</p> <p dir="ltr">05:09 - US Mobile Blocks Anonymous Payment Methods</p> <p dir="ltr">05:50 News: Google Forced to Open Android in Epic Games Victory</p> <p dir="ltr">07:51 - Court Orders Google to Stop Monopolistic Practices</p> <p dir="ltr">08:55 - Implications for Alternative App Stores</p> <p dir="ltr">10:29 News: Linux Desktop Market Share Hits 6%</p> <p dir="ltr">11:26 - Steam Deck and Gaming Driving Adoption</p> <p dir="ltr">12:44 - Steam's Proton Compatibility Layer</p> <p dir="ltr">14:07 - Privacy-Focused Users and Celebrity Endorsements</p> <p dir="ltr">16:49 - AI/ML Workloads Favor Linux</p> <p dir="ltr">17:57 Main Topic: Software Business Models</p> <p dir="ltr">18:42 - Why Business Models Matter for Users</p> <p dir="ltr">19:33 - Paying for Good Software vs "Free" Alternatives</p> <p dir="ltr">20:17 Unethical Model: Data-Subsidized "Free" Software</p> <p dir="ltr">20:43 - Gmail Example: How "Free" Services Really Work</p> <p dir="ltr">22:58 Ethical Model: Tailscale's Enterprise Freemium Approach</p> <p dir="ltr">25:12 - Pure Freemium vs Data Collection Hybrid</p> <p dir="ltr">26:47 - When Freemium Goes Wrong</p> <p dir="ltr">27:17 Managed Hosting: Element and Nextcloud Examples</p> <p dir="ltr">29:10 One-Time Payment vs Subscription Models</p> <p dir="ltr">29:46 - Adobe's Transition to Creative Cloud</p> <p dir="ltr">31:07 - Accessibility vs Long-Term Value Trade-offs</p> <p dir="ltr">33:21 - The Rise of Overpriced SaaS Tools</p> <p dir="ltr">36:39 - Importance of Transparent Pricing Models</p> <p dir="ltr">38:22 Dark Patterns and Deceptive Practices</p> <p dir="ltr">39:10 - Jordan's Examples of Subscription Traps</p> <p dir="ltr">40:00 - Stephen's ClassPass Cancellation Nightmare</p> <p dir="ltr">43:09 - Multiple Deceptive Pattern Types Identified</p> <p dir="ltr">44:44 - Hall of Shame: Major Companies Using Dark Patterns</p> <p dir="ltr">46:04 Conclusion: Choosing Ethical Software Business Models</p> <p dir="ltr"> </p> <p dir="ltr">Links</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://jordan.bravo.cc/">Jordan Bravo</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://fountain.fm/show/4t1HXmRckxOWlBYU7ZbA">Boost in on</a> <a href="http://fountain.fm">Fountain.FM</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.theverge.com/news/717440/google-epic-open-play-store-emergency-sta"> Epic Games vs Google Court Decision</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.zdnet.com/article/think-linux-desktop-market-share-isnt-over-6-this-15-million-system-scan-says-otherwise/"> Linux Desktop Market Share Statistics</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.deceptive.design/types">Deceptive Patterns Types and Examples</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://youtu.be/lm51xZHZI6g">"How I Broke Up With Adobe" by James Lee (Animation)</a></p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href= "https://www.youtube.com/watch?v=pVI_smLgTY0">PewDiePie's "I Installed Linux (so should you)"</a></p> </li> </ul> <p> </p>]]></content:encoded>
      <enclosure length="45041083" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Sovereign_Computing__Software_Business_Models_Deep_Dive.mp3?dest-id=4796587"/>
      <itunes:duration>46:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>freemium,Epic Games,dark patterns,data harvesting,subscription models,Google monopoly,software business models,deceptive patterns,managed hosting,open source business models,Linux desktop,private SIM cards</itunes:keywords>
      <itunes:subtitle>Not all "free" software is actually free - you're often paying with your data, privacy, or through deceptive subscription traps. In this episode, Jordan Bravo and Stephen DeLorme break down the business models behind the software you use daily, from...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>How to Choose Sovereign Software - The Sovereign Computing Show (SOV019)</title>
      <itunes:title>How to Choose Sovereign Software - The Sovereign Computing Show (SOV019)</itunes:title>
      <pubDate>Tue, 12 Aug 2025 11:00:00 +0000</pubDate>
      <guid isPermaLink="false">b266d358-2804-46a1-a355-8963e076a006</guid>
      <link>https://atlbitlab.com/podcast/how-to-choose-sovereign-software</link>
      <itunes:image href="https://static.libsyn.com/p/assets/a/e/0/e/ae0e31325d70f106d959afa2a1bf1c87/sov-019-How-to-Choose-Sovereign-Software_1.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/9/9/f/c/99fc325187313c3dd959afa2a1bf1c87/SOV-019_Software.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Not all software is created equal when it comes to digital sovereignty. In this episode, Jordan Bravo and Stephen DeLorme break down their framework for evaluating software that respects your freedom and privacy. They cover why open source isn't always a guarantee, how to spot healthy vs abandoned projects on GitHub, the importance of data export capabilities, and sustainable business models that won't disappear overnight. Plus, news about Samsung killing bootloader unlocks, EU age verification requirements, and reviews of new authenticator apps from Proton and Ente.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-choose-sovereign-software"></a><a href="https://atlbitlab.com/podcast/how-to-choose-sovereign-software">https://atlbitlab.com/podcast/how-to-choose-sovereign-software</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Jordan's Opening Quote on Software Choice</p> <p dir="ltr">00:27 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:45 Welcome and Contact Information</p> <p dir="ltr">01:55 News: Samsung Kills Custom ROM Support</p> <p dir="ltr">02:53 - No More Bootloader Unlocks on Samsung Devices</p> <p dir="ltr">04:48 - Security Trade-offs with Unlocked Bootloaders</p> <p dir="ltr">05:50 - Samsung's Motivations: Security vs Control</p> <p dir="ltr">07:43 News: EU Age Verification Requirements</p> <p dir="ltr">08:40 - Digital Sovereignty Alarm from Privacy Advocates</p> <p dir="ltr">09:42 - EU's Contradictory Privacy Stance</p> <p dir="ltr">12:39 - Decentralized Identity vs Google Monopoly</p> <p dir="ltr">14:52 Proton Authenticator: Google Authenticator Alternative</p> <p dir="ltr">16:32 - Open Source 2FA with Zero-Knowledge Sync</p> <p dir="ltr">18:04 - Security Concerns of All-in-One Solutions</p> <p dir="ltr">22:50 - Standalone App, No Proton Account Required</p> <p dir="ltr">23:41 Ente Auth: Self-Hostable 2FA Alternative</p> <p dir="ltr">24:55 - F-Droid Support and Open Source Commitment</p> <p dir="ltr">25:48 Main Topic: How to Choose Sovereign Software</p> <p dir="ltr">26:11 - Open Source as a Starting Point</p> <p dir="ltr">26:56 - Cross-Platform and Alternative App Stores</p> <p dir="ltr">27:36 - No Vendor Lock-In and Data Export</p> <p dir="ltr">28:35 - Why Software Choice Matters Long-Term</p> <p dir="ltr">29:48 Stephen's Framework for Evaluating Software</p> <p dir="ltr">30:17 - Investigating "Open Source" Claims</p> <p dir="ltr">31:38 - Checking GitHub Activity and Maintenance</p> <p dir="ltr">34:58 - How to Evaluate GitHub Projects Live Demo</p> <p dir="ltr">38:11 - Understanding GitHub Issues as Health Indicators</p> <p dir="ltr">42:27 - Contributors and Community Health</p> <p dir="ltr">43:38 - Open Standards and File Formats</p> <p dir="ltr">46:29 - UI/UX Quality Matters for Daily Drivers</p> <p dir="ltr">50:32 - Sustainable Business Models and Monetization</p> <p dir="ltr">54:34 Conclusion and Future Episode Tease</p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Not all software is created equal when it comes to digital sovereignty. In this episode, Jordan Bravo and Stephen DeLorme break down their framework for evaluating software that respects your freedom and privacy. They cover why open source isn't always a guarantee, how to spot healthy vs abandoned projects on GitHub, the importance of data export capabilities, and sustainable business models that won't disappear overnight. Plus, news about Samsung killing bootloader unlocks, EU age verification requirements, and reviews of new authenticator apps from Proton and Ente.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-choose-sovereign-software"></a><a href="https://atlbitlab.com/podcast/how-to-choose-sovereign-software">https://atlbitlab.com/podcast/how-to-choose-sovereign-software</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Jordan's Opening Quote on Software Choice</p> <p dir="ltr">00:27 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:45 Welcome and Contact Information</p> <p dir="ltr">01:55 News: Samsung Kills Custom ROM Support</p> <p dir="ltr">02:53 - No More Bootloader Unlocks on Samsung Devices</p> <p dir="ltr">04:48 - Security Trade-offs with Unlocked Bootloaders</p> <p dir="ltr">05:50 - Samsung's Motivations: Security vs Control</p> <p dir="ltr">07:43 News: EU Age Verification Requirements</p> <p dir="ltr">08:40 - Digital Sovereignty Alarm from Privacy Advocates</p> <p dir="ltr">09:42 - EU's Contradictory Privacy Stance</p> <p dir="ltr">12:39 - Decentralized Identity vs Google Monopoly</p> <p dir="ltr">14:52 Proton Authenticator: Google Authenticator Alternative</p> <p dir="ltr">16:32 - Open Source 2FA with Zero-Knowledge Sync</p> <p dir="ltr">18:04 - Security Concerns of All-in-One Solutions</p> <p dir="ltr">22:50 - Standalone App, No Proton Account Required</p> <p dir="ltr">23:41 Ente Auth: Self-Hostable 2FA Alternative</p> <p dir="ltr">24:55 - F-Droid Support and Open Source Commitment</p> <p dir="ltr">25:48 Main Topic: How to Choose Sovereign Software</p> <p dir="ltr">26:11 - Open Source as a Starting Point</p> <p dir="ltr">26:56 - Cross-Platform and Alternative App Stores</p> <p dir="ltr">27:36 - No Vendor Lock-In and Data Export</p> <p dir="ltr">28:35 - Why Software Choice Matters Long-Term</p> <p dir="ltr">29:48 Stephen's Framework for Evaluating Software</p> <p dir="ltr">30:17 - Investigating "Open Source" Claims</p> <p dir="ltr">31:38 - Checking GitHub Activity and Maintenance</p> <p dir="ltr">34:58 - How to Evaluate GitHub Projects Live Demo</p> <p dir="ltr">38:11 - Understanding GitHub Issues as Health Indicators</p> <p dir="ltr">42:27 - Contributors and Community Health</p> <p dir="ltr">43:38 - Open Standards and File Formats</p> <p dir="ltr">46:29 - UI/UX Quality Matters for Daily Drivers</p> <p dir="ltr">50:32 - Sustainable Business Models and Monetization</p> <p dir="ltr">54:34 Conclusion and Future Episode Tease</p> <p> </p>]]></content:encoded>
      <enclosure length="53322069" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV-019_Software.mp3?dest-id=4796587"/>
      <itunes:duration>55:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>cross-platform,sustainable business models,vendor lock-in,self-hosting,sovereign software,open source evaluation,GitHub analysis,data export,Samsung bootloader,EU age verification,Proton Authenticator,Ente Auth</itunes:keywords>
      <itunes:subtitle>Not all software is created equal when it comes to digital sovereignty. In this episode, Jordan Bravo and Stephen DeLorme break down their framework for evaluating software that respects your freedom and privacy. They cover why open source isn't...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title><![CDATA[Private GPS & Maps: Ditch Google and Apple - The Sovereign Computing Show (SOV018)]]></title>
      <itunes:title><![CDATA[Private GPS & Maps: Ditch Google and Apple - The Sovereign Computing Show (SOV018)]]></itunes:title>
      <pubDate>Tue, 29 Jul 2025 13:18:00 +0000</pubDate>
      <guid isPermaLink="false">fa695b73-6c74-4497-9034-a0a826ce469d</guid>
      <link>https://atlbitlab.com/podcast/private-gps-and-maps</link>
      <itunes:image href="https://static.libsyn.com/p/assets/1/c/4/b/1c4b477ba9dc9557d959afa2a1bf1c87/sov-018-Private_GPS__Maps__Ditch_Google_and_Apple.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/5/9/e/0/59e089cd992966f016c3140a3186d450/SOV_018_Maps__GPS.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Your location data is one of the most sensitive pieces of information you share, but are you trusting Google and Apple with every place you go? In this episode, Jordan Bravo and Stephen DeLorme explore private alternatives to mainstream navigation apps that don't track your movements. They cover privacy-focused options like Magic Earth and Organic Maps built on Open Street Maps, reveal how to use Waze on GrapheneOS without Google Play Services, and discuss the ultimate privacy solution: standalone Garmin GPS devices. Plus, news about Proton's new AI assistant Lumo and the company's concerning move away from Switzerland due to emerging surveillance laws.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/private-gps-and-maps">https://atlbitlab.com/podcast/private-gps-and-maps</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Why Privacy Laws Can't Be Trusted - Jordan's Opening Quote</p> <p dir="ltr">00:10 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:32 Welcome and Contact Information</p> <p dir="ltr">02:27 News: Proton Announces Lumo AI Assistant</p> <p dir="ltr">03:35 - Proton's Privacy Claims for Lumo</p> <p dir="ltr">05:31 - Testing Lumo's Capabilities and Models</p> <p dir="ltr">12:22 - Privacy Trade-offs vs Google/OpenAI</p> <p dir="ltr">13:28 - Proton vs Big Tech Business Models</p> <p dir="ltr">15:10 - Proton Moving Infrastructure Out of Switzerland</p> <p dir="ltr">16:21 - Swiss Privacy Laws Under Threat</p> <p dir="ltr">17:18 - Jordan's Take on Privacy Law Volatility</p> <p dir="ltr">17:35 - European "Euro Stack" Initiative</p> <p dir="ltr">20:27 Main Topic: Private GPS and Navigation</p> <p dir="ltr">21:12 Introduction to Open Street Maps</p> <p dir="ltr">22:00 Magic Earth: Premium Privacy Navigation App</p> <p dir="ltr">23:50 - $0.99/year pricing model</p> <p dir="ltr">24:48 - Jordan's experience with Magic Earth</p> <p dir="ltr">26:20 - Search limitations vs Google Maps</p> <p dir="ltr">29:22 Organic Maps: Free but Limited UX</p> <p dir="ltr">30:40 Waze on GrapheneOS: Surprising Discovery</p> <p dir="ltr">33:14 Garmin Standalone GPS: Ultimate Privacy</p> <p dir="ltr">34:30 - Benefits of dedicated navigation device</p> <p dir="ltr">37:24 - Garmin dash cam capabilities</p> <p dir="ltr">38:22 - Garmin watches for privacy-conscious users</p> <p dir="ltr">39:39 BTC Map: Bitcoin Business Directory</p> <p dir="ltr">43:00 Mapbox for Developers</p> <p dir="ltr">45:28 Boost Segment: Anonymous and Keith Sharp</p> <p dir="ltr">47:17 Conclusion and Contact Information</p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Your location data is one of the most sensitive pieces of information you share, but are you trusting Google and Apple with every place you go? In this episode, Jordan Bravo and Stephen DeLorme explore private alternatives to mainstream navigation apps that don't track your movements. They cover privacy-focused options like Magic Earth and Organic Maps built on Open Street Maps, reveal how to use Waze on GrapheneOS without Google Play Services, and discuss the ultimate privacy solution: standalone Garmin GPS devices. Plus, news about Proton's new AI assistant Lumo and the company's concerning move away from Switzerland due to emerging surveillance laws.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/private-gps-and-maps">https://atlbitlab.com/podcast/private-gps-and-maps</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Why Privacy Laws Can't Be Trusted - Jordan's Opening Quote</p> <p dir="ltr">00:10 Introduction and ATL BitLab Sponsorship</p> <p dir="ltr">01:32 Welcome and Contact Information</p> <p dir="ltr">02:27 News: Proton Announces Lumo AI Assistant</p> <p dir="ltr">03:35 - Proton's Privacy Claims for Lumo</p> <p dir="ltr">05:31 - Testing Lumo's Capabilities and Models</p> <p dir="ltr">12:22 - Privacy Trade-offs vs Google/OpenAI</p> <p dir="ltr">13:28 - Proton vs Big Tech Business Models</p> <p dir="ltr">15:10 - Proton Moving Infrastructure Out of Switzerland</p> <p dir="ltr">16:21 - Swiss Privacy Laws Under Threat</p> <p dir="ltr">17:18 - Jordan's Take on Privacy Law Volatility</p> <p dir="ltr">17:35 - European "Euro Stack" Initiative</p> <p dir="ltr">20:27 Main Topic: Private GPS and Navigation</p> <p dir="ltr">21:12 Introduction to Open Street Maps</p> <p dir="ltr">22:00 Magic Earth: Premium Privacy Navigation App</p> <p dir="ltr">23:50 - $0.99/year pricing model</p> <p dir="ltr">24:48 - Jordan's experience with Magic Earth</p> <p dir="ltr">26:20 - Search limitations vs Google Maps</p> <p dir="ltr">29:22 Organic Maps: Free but Limited UX</p> <p dir="ltr">30:40 Waze on GrapheneOS: Surprising Discovery</p> <p dir="ltr">33:14 Garmin Standalone GPS: Ultimate Privacy</p> <p dir="ltr">34:30 - Benefits of dedicated navigation device</p> <p dir="ltr">37:24 - Garmin dash cam capabilities</p> <p dir="ltr">38:22 - Garmin watches for privacy-conscious users</p> <p dir="ltr">39:39 BTC Map: Bitcoin Business Directory</p> <p dir="ltr">43:00 Mapbox for Developers</p> <p dir="ltr">45:28 Boost Segment: Anonymous and Keith Sharp</p> <p dir="ltr">47:17 Conclusion and Contact Information</p> <p> </p>]]></content:encoded>
      <enclosure length="46121471" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV_018_Maps__GPS.mp3?dest-id=4796587"/>
      <itunes:duration>48:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>Waze,GrapheneOS,Garmin GPS,GPS privacy,navigation apps,Open Street Maps,Magic Earth,Organic Maps,Proton Lumo,standalone GPS,Bitcoin map</itunes:keywords>
      <itunes:subtitle>Your location data is one of the most sensitive pieces of information you share, but are you trusting Google and Apple with every place you go? In this episode, Jordan Bravo and Stephen DeLorme explore private alternatives to mainstream navigation...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>The Cypherpunk Manifesto - The Sovereign Computing Show (SOV017)</title>
      <itunes:title>The Cypherpunk Manifesto - The Sovereign Computing Show (SOV017)</itunes:title>
      <pubDate>Tue, 22 Jul 2025 14:38:00 +0000</pubDate>
      <guid isPermaLink="false">d03747d5-f8cc-4bc1-af3c-45ef1a8f2439</guid>
      <link>https://atlbitlab.com/podcast/cypherpunk-manifesto</link>
      <itunes:image href="https://static.libsyn.com/p/assets/6/e/d/3/6ed3ade299f0e248d959afa2a1bf1c87/sov-017-The_Cypherpunk_Manifesto.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/e/4/4/8/e44849b015466bad16c3140a3186d450/SOV017_The_Cypherpunk_Manifesto.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Jordan Bravo and Stephen DeLorme dive deep into Eric Hughes' groundbreaking 1993 Cypherpunk Manifesto, exploring how this foundational document predicted Bitcoin, anonymous transaction systems, and modern digital privacy tools. They discuss the historical context of cryptography being illegal, the evolution from military-controlled encryption to widespread adoption, and how today's privacy-focused services like Mullvad exemplify the manifesto's principles. The hosts examine why "cypherpunks write code" and how this philosophy continues to drive sovereign computing solutions today.</p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/running-your-own-bitcoin-lightning-node"> </a><a href= "https://atlbitlab.com/podcast/cypherpunk-manifesto">https://atlbitlab.com/podcast/cypherpunk-manifesto</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Introduction and Bitcoin's Anonymous Transaction Systems </p> <p dir="ltr">00:33 Welcome and ATL BitLab Sponsorship </p> <p dir="ltr">01:54 New Dedicated Sovereign Computing Show Feed Announcement </p> <p dir="ltr">03:23 Introduction to the Cypherpunk Manifesto </p> <p dir="ltr">04:16 Reading Eric Hughes' Cypherpunk Manifesto (1993) </p> <p dir="ltr">10:47 Analysis: Bitcoin as Anonymous Transaction System </p> <p dir="ltr">2:04 Minimum Information Transactions (Mullvad, IVPN Examples) </p> <p dir="ltr">13:11 Historical Context of Personal Computers and the Web </p> <p dir="ltr">16:47 When Cryptography Was Illegal - Military Weapon Classification </p> <p dir="ltr">20:51 Supreme Court Rules Encryption as Free Speech </p> <p dir="ltr">22:21 Bitcoin White Paper as Cypherpunk Goals Implementation </p> <p dir="ltr">24:28 Satoshi's Use of Decades of Cryptographic Research</p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Jordan Bravo and Stephen DeLorme dive deep into Eric Hughes' groundbreaking 1993 Cypherpunk Manifesto, exploring how this foundational document predicted Bitcoin, anonymous transaction systems, and modern digital privacy tools. They discuss the historical context of cryptography being illegal, the evolution from military-controlled encryption to widespread adoption, and how today's privacy-focused services like Mullvad exemplify the manifesto's principles. The hosts examine why "cypherpunks write code" and how this philosophy continues to drive sovereign computing solutions today.</p> <p dir="ltr">Show Notes: <a href= "https://atlbitlab.com/podcast/running-your-own-bitcoin-lightning-node"> </a><a href= "https://atlbitlab.com/podcast/cypherpunk-manifesto">https://atlbitlab.com/podcast/cypherpunk-manifesto</a></p> <p dir="ltr"> </p> <p dir="ltr">00:00 Introduction and Bitcoin's Anonymous Transaction Systems </p> <p dir="ltr">00:33 Welcome and ATL BitLab Sponsorship </p> <p dir="ltr">01:54 New Dedicated Sovereign Computing Show Feed Announcement </p> <p dir="ltr">03:23 Introduction to the Cypherpunk Manifesto </p> <p dir="ltr">04:16 Reading Eric Hughes' Cypherpunk Manifesto (1993) </p> <p dir="ltr">10:47 Analysis: Bitcoin as Anonymous Transaction System </p> <p dir="ltr">2:04 Minimum Information Transactions (Mullvad, IVPN Examples) </p> <p dir="ltr">13:11 Historical Context of Personal Computers and the Web </p> <p dir="ltr">16:47 When Cryptography Was Illegal - Military Weapon Classification </p> <p dir="ltr">20:51 Supreme Court Rules Encryption as Free Speech </p> <p dir="ltr">22:21 Bitcoin White Paper as Cypherpunk Goals Implementation </p> <p dir="ltr">24:28 Satoshi's Use of Decades of Cryptographic Research</p> <p> </p>]]></content:encoded>
      <enclosure length="34783923" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV017_The_Cypherpunk_Manifesto.mp3?dest-id=4796587"/>
      <itunes:duration>36:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>encryption,Bitcoin,cryptography,Mullvad,digital privacy,open source,proof of work,mailing list,Eric Hughes,Satoshi Nakamoto,IVPN,sovereign computing,Adam Back,Cypherpunk Manifesto,anonymous transactions,RSA algorithm,Hash Cash,digital signatures</itunes:keywords>
      <itunes:subtitle>Jordan Bravo and Stephen DeLorme dive deep into Eric Hughes' groundbreaking 1993 Cypherpunk Manifesto, exploring how this foundational document predicted Bitcoin, anonymous transaction systems, and modern digital privacy tools. They discuss the...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Privacy Violations and Self-Hosting Wins - The Sovereign Computing Show (SOV016)</title>
      <itunes:title>Privacy Violations and Self-Hosting Wins - The Sovereign Computing Show (SOV016)</itunes:title>
      <pubDate>Wed, 16 Jul 2025 13:10:00 +0000</pubDate>
      <guid isPermaLink="false">77db68bc-585f-4d8b-b964-0fddd3a63e69</guid>
      <link>https://atlbitlab.com/podcast</link>
      <itunes:image href="https://static.libsyn.com/p/assets/2/8/5/7/2857386c59399d5816c3140a3186d450/sov-015-anonymous-website-hosting-and-domains-20250716-wc53r0miwa.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/f/7/2/1/f721386da44655e3d959afa2a1bf1c87/SOV016_-_Random_Show.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">Jordan Bravo and Stephen DeLorme return with a news-packed episode covering the latest privacy violations and surveillance schemes. They discuss Trump's plan to create a master database of Americans using Palantir, WhatsApp AI accidentally leaking user phone numbers, Meta and Yandex exploiting Android phones to track browsing habits, and Ford's patent for cars that report speeding drivers. Plus, Jordan shares updates on his sovereign computing journey including anonymous phone services, Alby Hub lightning setup, and self-hosted lightning addresses.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: https://atlbitlab.com/podcast</p> <p dir="ltr"> </p> <p dir="ltr">00:00 Introduction and Digital Footprint Philosophy</p> <p dir="ltr">00:35 Welcome to Sovereign Computing Show</p> <p dir="ltr">00:51 ATL BitLab Sponsorship</p> <p dir="ltr">01:55 Production Updates and Schedule Changes</p> <p dir="ltr">03:18 News: Trump Taps Palantir for Master Database on Americans</p> <p dir="ltr">06:02 Discussion: Government Data Collection Reality</p> <p dir="ltr">08:50 Advice: Minimizing Digital Footprints</p> <p dir="ltr">09:42 Personal Anecdote: Marketing Work with Surveillance Tech</p> <p dir="ltr">13:17 News: WhatsApp AI Mistakenly Shares User's Phone Number</p> <p dir="ltr">18:07 Analysis: LLM Context and Security Rules</p> <p dir="ltr">24:01 WhatsApp Metadata and AI Concerns</p> <p dir="ltr">24:59 News: Meta and Yandex Android Tracking Exploit</p> <p dir="ltr">28:34 Technical Details: localhost Port Listening</p> <p dir="ltr">30:56 Instagram Microphone Surveillance Discussion</p> <p dir="ltr">34:23 News: Ford Patents Car Surveillance Technology</p> <p dir="ltr">38:37 Future of Autonomous Vehicles and Privacy</p> <p dir="ltr">40:06 Privacy Alternative: Toyota Hilux No-Frills Truck</p> <p dir="ltr">42:08 Jordan's Sovereign Computing Updates</p> <p dir="ltr">42:31 Text Verify for Anonymous Phone Verification</p> <p dir="ltr">45:12 Steven's Experience with Simple Login App</p> <p dir="ltr">48:01 Mint Mobile Payment Issues and AT&T Alternative</p> <p dir="ltr">49:55 Self-Hosting: Albi Hub Lightning Node Setup</p> <p dir="ltr">51:48 Self-Custodial Podcast Boosts with Podverse</p> <p dir="ltr">52:09 Self-Hosted Lightning Address with RustDress</p> <p dir="ltr">54:20 Nix Package Repository Work</p> <p dir="ltr">55:05 Wrap-up and Contact Information</p> <p dir="ltr">55:46 Outro and Bitcoin Tips</p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">Jordan Bravo and Stephen DeLorme return with a news-packed episode covering the latest privacy violations and surveillance schemes. They discuss Trump's plan to create a master database of Americans using Palantir, WhatsApp AI accidentally leaking user phone numbers, Meta and Yandex exploiting Android phones to track browsing habits, and Ford's patent for cars that report speeding drivers. Plus, Jordan shares updates on his sovereign computing journey including anonymous phone services, Alby Hub lightning setup, and self-hosted lightning addresses.</p> <p dir="ltr"> </p> <p dir="ltr">Show Notes: https://atlbitlab.com/podcast</p> <p dir="ltr"> </p> <p dir="ltr">00:00 Introduction and Digital Footprint Philosophy</p> <p dir="ltr">00:35 Welcome to Sovereign Computing Show</p> <p dir="ltr">00:51 ATL BitLab Sponsorship</p> <p dir="ltr">01:55 Production Updates and Schedule Changes</p> <p dir="ltr">03:18 News: Trump Taps Palantir for Master Database on Americans</p> <p dir="ltr">06:02 Discussion: Government Data Collection Reality</p> <p dir="ltr">08:50 Advice: Minimizing Digital Footprints</p> <p dir="ltr">09:42 Personal Anecdote: Marketing Work with Surveillance Tech</p> <p dir="ltr">13:17 News: WhatsApp AI Mistakenly Shares User's Phone Number</p> <p dir="ltr">18:07 Analysis: LLM Context and Security Rules</p> <p dir="ltr">24:01 WhatsApp Metadata and AI Concerns</p> <p dir="ltr">24:59 News: Meta and Yandex Android Tracking Exploit</p> <p dir="ltr">28:34 Technical Details: localhost Port Listening</p> <p dir="ltr">30:56 Instagram Microphone Surveillance Discussion</p> <p dir="ltr">34:23 News: Ford Patents Car Surveillance Technology</p> <p dir="ltr">38:37 Future of Autonomous Vehicles and Privacy</p> <p dir="ltr">40:06 Privacy Alternative: Toyota Hilux No-Frills Truck</p> <p dir="ltr">42:08 Jordan's Sovereign Computing Updates</p> <p dir="ltr">42:31 Text Verify for Anonymous Phone Verification</p> <p dir="ltr">45:12 Steven's Experience with Simple Login App</p> <p dir="ltr">48:01 Mint Mobile Payment Issues and AT&T Alternative</p> <p dir="ltr">49:55 Self-Hosting: Albi Hub Lightning Node Setup</p> <p dir="ltr">51:48 Self-Custodial Podcast Boosts with Podverse</p> <p dir="ltr">52:09 Self-Hosted Lightning Address with RustDress</p> <p dir="ltr">54:20 Nix Package Repository Work</p> <p dir="ltr">55:05 Wrap-up and Contact Information</p> <p dir="ltr">55:46 Outro and Bitcoin Tips</p> <p> </p>]]></content:encoded>
      <enclosure length="54290067" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV016_-_Random_Show.mp3?dest-id=4796587"/>
      <itunes:duration>56:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>privacy,surveillance,Palantir,self-hosting,WhatsApp AI,Meta tracking,Android exploits,Ford patents,text verification,lightning node,Alby Hub,government database</itunes:keywords>
      <itunes:subtitle>Jordan Bravo and Stephen DeLorme return with a news-packed episode covering the latest privacy violations and surveillance schemes. They discuss Trump's plan to create a master database of Americans using Palantir, WhatsApp AI accidentally leaking...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>How to Get an Anonymous Website - The Sovereign Computing Show (SOV015)</title>
      <itunes:title>How to Get an Anonymous Website - The Sovereign Computing Show (SOV015)</itunes:title>
      <pubDate>Tue, 08 Jul 2025 11:00:00 +0000</pubDate>
      <guid isPermaLink="false">90861fbb-c8d0-4abe-a448-25bdb8723ca2</guid>
      <link>https://atlbitlab.com/podcast/anonymous-website-hosting-and-domains</link>
      <itunes:image href="https://static.libsyn.com/p/assets/c/5/a/2/c5a2d7852b59e94516c3140a3186d450/sov-015-anonymous-website-hosting-and-domains.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/e/5/e/7/e5e797ed170f2e08d959afa2a1bf1c87/SOV015_-_Final_Cut.srt" type="application/srt"/>
      <description><![CDATA[<p dir="ltr">In today's digital landscape, having your own website is more important than ever for true digital independence. Jordan Bravo and Stephen DeLorme explain how to register domain names and set up web hosting with minimal personal information and maximum privacy. They cover Bitcoin-accepting registrars, anonymous VPS providers, and how the domain name system really works. Plus, they discuss a controversial Bitcoin update proposal that highlights why running your own node matters.</p> <p dir="ltr">Show Notes: https://atlbitlab.com/podcast/anonymous-website-hosting-and-domains</p> <p dir="ltr">00:00 Why Own Websites Beat Social Media Platforms </p> <p dir="ltr">00:35 Introduction and ATL BitLab Sponsorship </p> <p dir="ltr">01:55 Welcome and Contact Information </p> <p dir="ltr">02:26 News: Bitcoin Core Pull Request to Remove OP_Return Limits </p> <p dir="ltr">07:29 Why This PR Highlights the Importance of Running Your Own Node </p> <p dir="ltr">11:22 Main Topic: Private Domain Names and Hosting </p> <p dir="ltr">12:35 Minimizing Personal Information When Registering Domains </p> <p dir="ltr">13:29 NameCheap: Domain Registration with Bitcoin </p> <p dir="ltr">15:57 Using Fake Information and Domain Privacy Guard </p> <p dir="ltr">17:15 Domain Takedown Threat Model </p> <p dir="ltr">20:18 DNSSEC for Enhanced Security </p> <p dir="ltr">21:21 PorkBun: Another Private Domain Registrar </p> <p dir="ltr">21:54 Private Hosting Options Introduction </p> <p dir="ltr">22:54 Hostinger VPS Services </p> <p dir="ltr">24:11 1984 Hosting in Iceland </p> <p dir="ltr">24:46 Flokinet in Iceland </p> <p dir="ltr">25:17 Why Personal Websites Matter in the Social Media Age </p> <p dir="ltr">29:46 Websites vs. Censorship-prone Social Media Platforms </p> <p dir="ltr">31:36 Avoiding Services Like LinkTree </p> <p dir="ltr">35:01 Technical Side Discussion: How Domain Names Work </p> <p dir="ltr">35:30 How ICANN, Registries, and Registrars Interoperate </p> <p dir="ltr">40:14 How Authorities Can Take Down Domain Names </p> <p dir="ltr">42:33 Trade-offs with Different TLDs (.com vs alternatives) </p> <p dir="ltr">47:56 Boost Segment and Listener Appreciation</p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p dir="ltr">In today's digital landscape, having your own website is more important than ever for true digital independence. Jordan Bravo and Stephen DeLorme explain how to register domain names and set up web hosting with minimal personal information and maximum privacy. They cover Bitcoin-accepting registrars, anonymous VPS providers, and how the domain name system really works. Plus, they discuss a controversial Bitcoin update proposal that highlights why running your own node matters.</p> <p dir="ltr">Show Notes: https://atlbitlab.com/podcast/anonymous-website-hosting-and-domains</p> <p dir="ltr">00:00 Why Own Websites Beat Social Media Platforms </p> <p dir="ltr">00:35 Introduction and ATL BitLab Sponsorship </p> <p dir="ltr">01:55 Welcome and Contact Information </p> <p dir="ltr">02:26 News: Bitcoin Core Pull Request to Remove OP_Return Limits </p> <p dir="ltr">07:29 Why This PR Highlights the Importance of Running Your Own Node </p> <p dir="ltr">11:22 Main Topic: Private Domain Names and Hosting </p> <p dir="ltr">12:35 Minimizing Personal Information When Registering Domains </p> <p dir="ltr">13:29 NameCheap: Domain Registration with Bitcoin </p> <p dir="ltr">15:57 Using Fake Information and Domain Privacy Guard </p> <p dir="ltr">17:15 Domain Takedown Threat Model </p> <p dir="ltr">20:18 DNSSEC for Enhanced Security </p> <p dir="ltr">21:21 PorkBun: Another Private Domain Registrar </p> <p dir="ltr">21:54 Private Hosting Options Introduction </p> <p dir="ltr">22:54 Hostinger VPS Services </p> <p dir="ltr">24:11 1984 Hosting in Iceland </p> <p dir="ltr">24:46 Flokinet in Iceland </p> <p dir="ltr">25:17 Why Personal Websites Matter in the Social Media Age </p> <p dir="ltr">29:46 Websites vs. Censorship-prone Social Media Platforms </p> <p dir="ltr">31:36 Avoiding Services Like LinkTree </p> <p dir="ltr">35:01 Technical Side Discussion: How Domain Names Work </p> <p dir="ltr">35:30 How ICANN, Registries, and Registrars Interoperate </p> <p dir="ltr">40:14 How Authorities Can Take Down Domain Names </p> <p dir="ltr">42:33 Trade-offs with Different TLDs (.com vs alternatives) </p> <p dir="ltr">47:56 Boost Segment and Listener Appreciation</p> <p> </p>]]></content:encoded>
      <enclosure length="47874391" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV015_-_Final_Cut.mp3?dest-id=4796587"/>
      <itunes:duration>49:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>privacy,sovereignty,DNS,VPS,ICANN,NameCheap,DNSSEC,PorkBun,web hosting,Bitcoin payments,self-hosting,domain registration,Hostinger,1984 Hosting,Flokinet,domain privacy</itunes:keywords>
      <itunes:subtitle>In today's digital landscape, having your own website is more important than ever for true digital independence. Jordan Bravo and Stephen DeLorme explain how to register domain names and set up web hosting with minimal personal information and maximum...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Bitcoin Sovereignty: Running Your Own Full Node - The Sovereign Computing Show (SOV014)</title>
      <itunes:title>Bitcoin Sovereignty: Running Your Own Full Node - The Sovereign Computing Show (SOV014)</itunes:title>
      <pubDate>Wed, 14 May 2025 15:37:00 +0000</pubDate>
      <guid isPermaLink="false">9a9d4020-3fff-4b29-9245-c3505a742165</guid>
      <link>https://atlbitlab.com/podcast/bitcoin-sovereignty-running-your-own-full-node</link>
      <itunes:image href="https://static.libsyn.com/p/assets/b/c/a/5/bca50d8b4ed3e827d959afa2a1bf1c87/sov-014-bitcoin-sovereignty-running-your-own-full-node.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/5/0/0/a/500a4e3b4e89daac16c3140a3186d450/SOV014.srt" type="application/srt"/>
      <description><![CDATA[<p>Bitcoin is built on the principle of not trusting third parties, but are you trusting someone else's node to validate your transactions? In this episode, Jordan Bravo and Stephen DeLorme explore why running your own Bitcoin and Lightning nodes is crucial for true financial sovereignty. They break down the hardware requirements, software options like Umbrel and Start OS, and how to connect popular wallets to your own node. Plus, news about Thunderbird's new email service and the concerning bankruptcy sale of 23andMe's genetic data.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/bitcoin-sovereignty-running-your-own-full-node"> https://atlbitlab.com/podcast/bitcoin-sovereignty-running-your-own-full-node</a></p> <p dir="ltr">00:00 Why You Should Run Your Own Bitcoin Node </p> <p dir="ltr">00:39 Introduction to The Sovereign Computing Show </p> <p dir="ltr">00:55 ATL BitLab Sponsorship Information </p> <p dir="ltr">01:58 Welcome and Contact Information </p> <p dir="ltr">02:46 News: Thunderbird's New Email Service </p> <p dir="ltr">06:29 News: 23andMe's Data Bankruptcy Sale </p> <p dir="ltr">10:15 Main Topic: Bitcoin & Lightning Node Setup </p> <p dir="ltr">13:28 The Philosophy of Verifying Your Own Transactions </p> <p dir="ltr">18:00 Bitcoin Node Hardware Requirements </p> <p dir="ltr">19:07 Bitcoin vs. Lightning Nodes Explained </p> <p dir="ltr">21:59 Setting Up a Bitcoin Node with Umbrel or Start OS</p> <p dir="ltr">24:42 Hardware Recommendations: From Raspberry Pi to Mini PCs </p> <p dir="ltr">26:26 System Requirements and Performance Considerations </p> <p dir="ltr">34:20 Connecting Wallets to Your Node (Phoenix, Blue Wallet, Sparrow) </p> <p dir="ltr">38:01 Lightning Node Options: LND, Core Lightning, Alby Hub </p> <p dir="ltr">40:01 Software Ecosystem Around Lightning Nodes </p> <p dir="ltr">42:24 PhoenixD for Developers </p> <p dir="ltr">46:22 User Feedback on Mobile Operating Systems </p> <p dir="ltr">50:24 Conclusion</p>]]></description>
      <content:encoded><![CDATA[<p>Bitcoin is built on the principle of not trusting third parties, but are you trusting someone else's node to validate your transactions? In this episode, Jordan Bravo and Stephen DeLorme explore why running your own Bitcoin and Lightning nodes is crucial for true financial sovereignty. They break down the hardware requirements, software options like Umbrel and Start OS, and how to connect popular wallets to your own node. Plus, news about Thunderbird's new email service and the concerning bankruptcy sale of 23andMe's genetic data.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/bitcoin-sovereignty-running-your-own-full-node"> https://atlbitlab.com/podcast/bitcoin-sovereignty-running-your-own-full-node</a></p> <p dir="ltr">00:00 Why You Should Run Your Own Bitcoin Node </p> <p dir="ltr">00:39 Introduction to The Sovereign Computing Show </p> <p dir="ltr">00:55 ATL BitLab Sponsorship Information </p> <p dir="ltr">01:58 Welcome and Contact Information </p> <p dir="ltr">02:46 News: Thunderbird's New Email Service </p> <p dir="ltr">06:29 News: 23andMe's Data Bankruptcy Sale </p> <p dir="ltr">10:15 Main Topic: Bitcoin & Lightning Node Setup </p> <p dir="ltr">13:28 The Philosophy of Verifying Your Own Transactions </p> <p dir="ltr">18:00 Bitcoin Node Hardware Requirements </p> <p dir="ltr">19:07 Bitcoin vs. Lightning Nodes Explained </p> <p dir="ltr">21:59 Setting Up a Bitcoin Node with Umbrel or Start OS</p> <p dir="ltr">24:42 Hardware Recommendations: From Raspberry Pi to Mini PCs </p> <p dir="ltr">26:26 System Requirements and Performance Considerations </p> <p dir="ltr">34:20 Connecting Wallets to Your Node (Phoenix, Blue Wallet, Sparrow) </p> <p dir="ltr">38:01 Lightning Node Options: LND, Core Lightning, Alby Hub </p> <p dir="ltr">40:01 Software Ecosystem Around Lightning Nodes </p> <p dir="ltr">42:24 PhoenixD for Developers </p> <p dir="ltr">46:22 User Feedback on Mobile Operating Systems </p> <p dir="ltr">50:24 Conclusion</p>]]></content:encoded>
      <enclosure length="73879800" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV014.mp3?dest-id=4796587"/>
      <itunes:duration>51:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Bitcoin is built on the principle of not trusting third parties, but are you trusting someone else's node to validate your transactions? In this episode, Jordan Bravo and Stephen DeLorme explore why running your own Bitcoin and Lightning nodes is...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Sovereign AI: Using LLMs Without Sacrificing Privacy - The Sovereign Computing Show (SOV013)</title>
      <itunes:title>Sovereign AI: Using LLMs Without Sacrificing Privacy - The Sovereign Computing Show (SOV013)</itunes:title>
      <pubDate>Tue, 29 Apr 2025 13:17:00 +0000</pubDate>
      <guid isPermaLink="false">4ed4f2ac-2d2e-4d52-b0a4-352c6be1654e</guid>
      <link>https://atlbitlab.com/podcast/sovereign-ai-using-llms-without-sacrificing-privacy</link>
      <itunes:image href="https://static.libsyn.com/p/assets/b/1/6/d/b16d17ed88df9e27d959afa2a1bf1c87/sov-013-sovereign-ai-using-llms-without-sacrificing-privacy.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/a/1/d/6/a1d6398adad0b9c4d959afa2a1bf1c87/sov-013-sovereign-ai-using-llms-without-sacrificing-privacy.srt" type="application/srt"/>
      <description><![CDATA[<div> <div>AI assistants like ChatGPT and Claude are powerful tools, but they come with significant privacy trade-offs. In this episode, Jordan Bravo and Stephen DeLorme explore practical approaches to using AI without surrendering your data to big tech companies. They compare privacy-focused third-party services that use confidential computing (like Maple) and local storage options (like Venice.AI) before diving into running open-source models entirely on your own hardware with tools like Ollama, GPT4All, and LM Studio. They also reveal how your Smart TV might take screenshots of what you're watching through Automatic Content Recognition (ACR) and share steps to disable this intrusive tracking.</div> <div> </div> <div>Show Notes: <a href= "https://atlbitlab.com/podcast/sovereign-ai-using-llms-without-sacrificing-privacy"> https://atlbitlab.com/podcast/sovereign-ai-using-llms-without-sacrificing-privacy</a></div> <div> </div> <div>00:00 Introduction to The Sovereign Computing Show</div> <div>00:42 ATL BitLab Sponsorship Information</div> <div>01:45 Welcome and Show Contact Information</div> <div>02:09 Smart TVs and Automatic Content Recognition (ACR)</div> <div>03:58 How ACR Surveillance Works in Smart TVs</div> <div>05:23 The Creepy Reality of TV Screenshot Tracking</div> <div>08:33 Solutions for Smart TV Privacy Concerns</div> <div>10:47 Unplugging Your Smart TV from the Internet</div> <div>11:51 Main Topic: Using AI and LLMs Privately</div> <div>12:44 Understanding LLMs vs. Other Generative AI</div> <div>14:51 The Privacy Problem with Major LLM Providers</div> <div>16:44 Private Third-Party AI Providers</div> <div>16:44 Maple and Confidential Computing</div> <div>22:32 Venice.AI with Local Storage</div> <div>27:28 Kagi AI's Privacy Trade-offs</div> <div>30:49 The Privacy Spectrum of AI Services</div> <div>33:38 Self-Hosting LLMs and Local Models</div> <div>34:22 Ollama for Running Local Models</div> <div>37:25 Running Models Without Internet Connection</div> <div>38:43 OpenWebUI for Graphical Interface</div> <div>41:35 GPT4All for User-Friendly Local AI</div> <div>43:03 LM Studio with Integrated Interface</div> <div>44:55 Hardware Limitations for Local LLMs</div> <div>46:15 Local Image Generation</div> <div>46:47 Stable Diffusion Web UI</div> <div>48:09 ComfyUI for Artist-Friendly Workflows</div> <div>51:50 ATL BitLab AI Meetup Information</div> <div>53:11 Conclusion and Contact Information</div> <div>53:40 Show Outro and Support Details</div> </div>]]></description>
      <content:encoded><![CDATA[ AI assistants like ChatGPT and Claude are powerful tools, but they come with significant privacy trade-offs. In this episode, Jordan Bravo and Stephen DeLorme explore practical approaches to using AI without surrendering your data to big tech companies. They compare privacy-focused third-party services that use confidential computing (like Maple) and local storage options (like Venice.AI) before diving into running open-source models entirely on your own hardware with tools like Ollama, GPT4All, and LM Studio. They also reveal how your Smart TV might take screenshots of what you're watching through Automatic Content Recognition (ACR) and share steps to disable this intrusive tracking.   Show Notes: <a href= "https://atlbitlab.com/podcast/sovereign-ai-using-llms-without-sacrificing-privacy"> https://atlbitlab.com/podcast/sovereign-ai-using-llms-without-sacrificing-privacy</a>   00:00 Introduction to The Sovereign Computing Show 00:42 ATL BitLab Sponsorship Information 01:45 Welcome and Show Contact Information 02:09 Smart TVs and Automatic Content Recognition (ACR) 03:58 How ACR Surveillance Works in Smart TVs 05:23 The Creepy Reality of TV Screenshot Tracking 08:33 Solutions for Smart TV Privacy Concerns 10:47 Unplugging Your Smart TV from the Internet 11:51 Main Topic: Using AI and LLMs Privately 12:44 Understanding LLMs vs. Other Generative AI 14:51 The Privacy Problem with Major LLM Providers 16:44 Private Third-Party AI Providers 16:44 Maple and Confidential Computing 22:32 Venice.AI with Local Storage 27:28 Kagi AI's Privacy Trade-offs 30:49 The Privacy Spectrum of AI Services 33:38 Self-Hosting LLMs and Local Models 34:22 Ollama for Running Local Models 37:25 Running Models Without Internet Connection 38:43 OpenWebUI for Graphical Interface 41:35 GPT4All for User-Friendly Local AI 43:03 LM Studio with Integrated Interface 44:55 Hardware Limitations for Local LLMs 46:15 Local Image Generation 46:47 Stable Diffusion Web UI 48:09 ComfyUI for Artist-Friendly Workflows 51:50 ATL BitLab AI Meetup Information 53:11 Conclusion and Contact Information 53:40 Show Outro and Support Details ]]></content:encoded>
      <enclosure length="78405044" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/sov-013-sovereign-ai-using-llms-without-sacrificing-privacy.mp3?dest-id=4796587"/>
      <itunes:duration>54:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>Maple,privacy,AI,surveillance,ACR,LLM,OpenAI,confidential computing,Stable Diffusion,Smart TV,Ollama,local models,GPT4All,LM Studio,Venice.AI,Kagi,OpenWebUI,privacy-first,self-hosting,sovereign computing</itunes:keywords>
      <itunes:subtitle>AI assistants like ChatGPT and Claude are powerful tools, but they come with significant privacy trade-offs. In this episode, Jordan Bravo and Stephen DeLorme explore practical approaches to using AI without surrendering your data to big tech...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>The Truth About VPNs: Beyond the Marketing Hype - The Sovereign Computing Show (SOV012)</title>
      <itunes:title>The Truth About VPNs: Beyond the Marketing Hype - The Sovereign Computing Show (SOV012)</itunes:title>
      <pubDate>Tue, 22 Apr 2025 09:30:00 +0000</pubDate>
      <guid isPermaLink="false">05eb76b0-6ada-4a70-8638-346f1810654b</guid>
      <link>https://atlbitlab.com/podcast/the-truth-about-vpns-beyond-marketing-hype</link>
      <itunes:image href="https://static.libsyn.com/p/assets/5/9/9/f/599fdd70e237541116c3140a3186d450/sov-012-the-truth-about-vpns-beyond-marketing-hype.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/9/0/a/8/90a8b98842d3943716c3140a3186d450/The_Truth_About_VPNs__Beyond_the_Marketing_Hype_-_The_Sovereign_Computing_Show_SOV012.srt" type="application/srt"/>
      <description><![CDATA[<p>Jordan Bravo and Stephen DeLorme break down the reality of Virtual Private Networks (VPNs) beyond the marketing hype. They explore what problems VPNs actually solve—hiding your IP address from websites, concealing your browsing from ISPs, and encrypting traffic—while addressing their limitations and downsides. Jordan and Stephen compare VPNs with Tor, examine trusted providers including Proton VPN, Mullvad, IVPN, and the innovative Obscura, and discuss the frustrating trend of websites blocking VPN users. Learn practical advice for incorporating VPNs into your digital sovereignty toolkit and why you should stand up for your right to privacy online.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/the-truth-about-vpns-beyond-marketing-hype"> https://atlbitlab.com/podcast/the-truth-about-vpns-beyond-marketing-hype</a></p> <p dir="ltr">00:00 Introduction to The Sovereign Computing Show </p> <p dir="ltr">00:35 ATL BitLab Sponsorship Information </p> <p dir="ltr">01:55 Welcome and Episode Overview </p> <p dir="ltr">02:07 Updates and Errata from Previous Episodes </p> <p dir="ltr">05:06 White House Signal Group Security Mishap </p> <p dir="ltr">12:17 Amazon Echo Privacy Changes </p> <p dir="ltr">15:24 Main Topic: Understanding VPNs </p> <p dir="ltr">16:33 Problem #1: How VPNs Hide Your IP Address </p> <p dir="ltr">17:56 VPNs vs. Tor: Centralization and Trust Models</p> <p dir="ltr">21:30 VPN Performance vs. Tor Performance </p> <p dir="ltr">23:05 Problem #2: Hiding Browsing from ISP Surveillance </p> <p dir="ltr">24:49 Problem #3: Traffic Encryption Benefits</p> <p dir="ltr">25:35 VPN Provider Reviews </p> <p dir="ltr">25:57 - Proton VPN: Features and Netflix Compatibility</p> <p dir="ltr">27:32 - Mullvad: Privacy Features and Cross-Platform Support</p> <p dir="ltr">30:08 - IVPN: Privacy-Focused Alternative </p> <p dir="ltr">32:07 - Obscura: The VPN That Can't Log Activity </p> <p dir="ltr">36:46 Downsides of Using VPNs </p> <p dir="ltr">38:12 Website Blocking and VPN Discrimination </p> <p dir="ltr">42:38 Conclusion and Recommendations </p> <p dir="ltr">43:44 Show Outro and Support Information</p>]]></description>
      <content:encoded><![CDATA[<p>Jordan Bravo and Stephen DeLorme break down the reality of Virtual Private Networks (VPNs) beyond the marketing hype. They explore what problems VPNs actually solve—hiding your IP address from websites, concealing your browsing from ISPs, and encrypting traffic—while addressing their limitations and downsides. Jordan and Stephen compare VPNs with Tor, examine trusted providers including Proton VPN, Mullvad, IVPN, and the innovative Obscura, and discuss the frustrating trend of websites blocking VPN users. Learn practical advice for incorporating VPNs into your digital sovereignty toolkit and why you should stand up for your right to privacy online.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/the-truth-about-vpns-beyond-marketing-hype"> https://atlbitlab.com/podcast/the-truth-about-vpns-beyond-marketing-hype</a></p> <p dir="ltr">00:00 Introduction to The Sovereign Computing Show </p> <p dir="ltr">00:35 ATL BitLab Sponsorship Information </p> <p dir="ltr">01:55 Welcome and Episode Overview </p> <p dir="ltr">02:07 Updates and Errata from Previous Episodes </p> <p dir="ltr">05:06 White House Signal Group Security Mishap </p> <p dir="ltr">12:17 Amazon Echo Privacy Changes </p> <p dir="ltr">15:24 Main Topic: Understanding VPNs </p> <p dir="ltr">16:33 Problem #1: How VPNs Hide Your IP Address </p> <p dir="ltr">17:56 VPNs vs. Tor: Centralization and Trust Models</p> <p dir="ltr">21:30 VPN Performance vs. Tor Performance </p> <p dir="ltr">23:05 Problem #2: Hiding Browsing from ISP Surveillance </p> <p dir="ltr">24:49 Problem #3: Traffic Encryption Benefits</p> <p dir="ltr">25:35 VPN Provider Reviews </p> <p dir="ltr">25:57 - Proton VPN: Features and Netflix Compatibility</p> <p dir="ltr">27:32 - Mullvad: Privacy Features and Cross-Platform Support</p> <p dir="ltr">30:08 - IVPN: Privacy-Focused Alternative </p> <p dir="ltr">32:07 - Obscura: The VPN That Can't Log Activity </p> <p dir="ltr">36:46 Downsides of Using VPNs </p> <p dir="ltr">38:12 Website Blocking and VPN Discrimination </p> <p dir="ltr">42:38 Conclusion and Recommendations </p> <p dir="ltr">43:44 Show Outro and Support Information</p>]]></content:encoded>
      <enclosure length="63981063" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/The_Truth_About_VPNs__Beyond_the_Marketing_Hype_-_The_Sovereign_Computing_Show_SOV012.mp3?dest-id=4796587"/>
      <itunes:duration>44:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>Obscura,Signal,encryption,VPN,anonymity,Mullvad,WireGuard,digital privacy,Virtual Private Network,Bitcoin payments,IP address,Tor network,ISP surveillance,data brokers,Proton VPN,IVPN,Tailscale,anonymous accounts,website blocking</itunes:keywords>
      <itunes:subtitle>Jordan Bravo and Stephen DeLorme break down the reality of Virtual Private Networks (VPNs) beyond the marketing hype. They explore what problems VPNs actually solve—hiding your IP address from websites, concealing your browsing from ISPs, and...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Choosing a Sovereign Mobile Operating System - The Sovereign Computing Show (SOV011)</title>
      <itunes:title>Choosing a Sovereign Mobile Operating System - The Sovereign Computing Show (SOV011)</itunes:title>
      <pubDate>Wed, 02 Apr 2025 02:13:00 +0000</pubDate>
      <guid isPermaLink="false">a79b28c2-1f7e-4931-946e-3fb25ce7f0ba</guid>
      <link>https://atlbitlab.com/podcast/choosing-a-sovereign-mobile-operating-system</link>
      <itunes:image href="https://static.libsyn.com/p/assets/6/8/6/9/6869727ff7cdb33ed959afa2a1bf1c87/sov-011-choosing-a-sovereign-mobile-operating-system.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/f/2/f/1/f2f1dde3b2f5fb05d959afa2a1bf1c87/Choosing_a_Sovereign_Mobile_Operating_System_-_The_Sovereign_Computing_Show_SOV011.srt" type="application/srt"/>
      <description><![CDATA[<p>Your smartphone is a computing device just like our desktop and laptop computers. How can you have a smartphone that isn't surveilled, censored, controlled, and constrained? Jordan discusses the challenges and solutions for achieving self-sovereignty with mobile devices. He critiques the limitations of iOS and explores the emerging landscape of Linux mobile devices. The episode focuses on de-Googled Android solutions like CalyxOS and GrapheneOS, elaborating on the latter's security features and compatibility with Google Pixel devices. Jordan also provides practical advice on acquiring and setting up these devices for enhanced privacy. Tune in to learn how you can reclaim control over your smartphone and boost your digital security.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/choosing-a-sovereign-mobile-operating-system"> https://atlbitlab.com/podcast/choosing-a-sovereign-mobile-operating-system</a></p> <p> 00:00 Understanding Google Play Services and Its Privileges</p> <p>00:34 Welcome to the Sovereign Computing Show</p> <p>00:50 Introduction to Sovereign Computing and ATL BitLab</p> <p>01:54 Episode Overview and Listener Interaction</p> <p>02:57 Challenges of Achieving Self-Sovereignty with Smartphones</p> <p>04:41 Exploring Mobile Operating Systems: iOS Limitations</p> <p>06:39 Linux Mobile Devices: Pine Phone and Mecha Comet</p> <p>09:34 Android as a Viable Option for Self-Sovereign Computing</p> <p>11:03 De-Googled Android: CalyxOS and GrapheneOS</p> <p>12:54 GrapheneOS: The Best Option for Privacy and Security</p> <p>15:56 Purchasing and Installing GrapheneOS on Google Pixel</p> <p>23:00 Using GrapheneOS and Alternative App Stores</p> <p>28:52 Listener Feedback and Future Topics</p> <p>31:47 Conclusion and Support Information</p>]]></description>
      <content:encoded><![CDATA[<p>Your smartphone is a computing device just like our desktop and laptop computers. How can you have a smartphone that isn't surveilled, censored, controlled, and constrained? Jordan discusses the challenges and solutions for achieving self-sovereignty with mobile devices. He critiques the limitations of iOS and explores the emerging landscape of Linux mobile devices. The episode focuses on de-Googled Android solutions like CalyxOS and GrapheneOS, elaborating on the latter's security features and compatibility with Google Pixel devices. Jordan also provides practical advice on acquiring and setting up these devices for enhanced privacy. Tune in to learn how you can reclaim control over your smartphone and boost your digital security.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/choosing-a-sovereign-mobile-operating-system"> https://atlbitlab.com/podcast/choosing-a-sovereign-mobile-operating-system</a></p> <p> 00:00 Understanding Google Play Services and Its Privileges</p> <p>00:34 Welcome to the Sovereign Computing Show</p> <p>00:50 Introduction to Sovereign Computing and ATL BitLab</p> <p>01:54 Episode Overview and Listener Interaction</p> <p>02:57 Challenges of Achieving Self-Sovereignty with Smartphones</p> <p>04:41 Exploring Mobile Operating Systems: iOS Limitations</p> <p>06:39 Linux Mobile Devices: Pine Phone and Mecha Comet</p> <p>09:34 Android as a Viable Option for Self-Sovereign Computing</p> <p>11:03 De-Googled Android: CalyxOS and GrapheneOS</p> <p>12:54 GrapheneOS: The Best Option for Privacy and Security</p> <p>15:56 Purchasing and Installing GrapheneOS on Google Pixel</p> <p>23:00 Using GrapheneOS and Alternative App Stores</p> <p>28:52 Listener Feedback and Future Topics</p> <p>31:47 Conclusion and Support Information</p>]]></content:encoded>
      <enclosure length="46889537" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Choosing_a_Sovereign_Mobile_Operating_System_-_The_Sovereign_Computing_Show_SOV011.mp3?dest-id=4796587"/>
      <itunes:duration>32:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Your smartphone is a computing device just like our desktop and laptop computers. How can you have a smartphone that isn't surveilled, censored, controlled, and constrained? Jordan discusses the challenges and solutions for achieving self-sovereignty...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Bypass App Store Censorship With These Tools - The Sovereign Computing Show (SOV010)</title>
      <itunes:title>Bypass App Store Censorship With These Tools - The Sovereign Computing Show (SOV010)</itunes:title>
      <pubDate>Tue, 25 Mar 2025 20:06:00 +0000</pubDate>
      <guid isPermaLink="false">1b81c960-f2bb-42a5-9c2b-bba49d810c90</guid>
      <link>https://atlbitlab.com/podcast/bypass-app-store-censorship</link>
      <itunes:image href="https://static.libsyn.com/p/assets/a/e/8/4/ae84aaa31a510e18d959afa2a1bf1c87/sov-010-bypass-app-store-censorship.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/6/4/5/6/64567d2a4d60c1cd16c3140a3186d450/Bypass_App_Store_Censorship_With_These_Tools_-_The_Sovereign_Computing_Show_SOV010.srt" type="application/srt"/>
      <description><![CDATA[<p>In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss the challenges of app store censorship and explore various alternatives to the Google Play and Apple App Stores. They dive into the Aurora Store, Obtainium, F-Droid, Zap Store, and Accrescent, examining how these platforms can help preserve user privacy and circumvent censorship. Learn about the benefits and limitations of each alternative and get insights on how to take back control of your device's app ecosystem.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/bypass-app-store-censorship">https://atlbitlab.com/podcast/bypass-app-store-censorship</a></p> <p>00:00 Introduction to Apple's App Store Policies</p> <p>00:35 Welcome to the Sovereign Computing Show</p> <p>00:52 ATL BitLab: A Hub for Tech Enthusiasts</p> <p>02:04 Contacting the Show and Listener Interaction</p> <p>03:22 Updates on Private Payments</p> <p>06:27 Main Topic: App Store Censorship</p> <p>07:15 Examples of App Store Censorship</p> <p>10:35 Epic Games vs. Apple</p> <p>14:08 Damus and the Zapping Feature</p> <p>18:34 The Mutiny Wallet Story</p> <p>25:30 Phoenix Wallet and Centralized App Stores</p> <p>27:15 Solutions: Alternative App Stores</p> <p>29:37 Privacy Concerns with Google Play Store</p> <p>31:09 Introducing Obtainium: Open Source App Store</p> <p>33:52 Exploring F-Droid: The Original Alternative App Store</p> <p>38:55 Zap Store: A Social Connection App Store</p> <p>43:27 Accrescent: A Promising New App Store</p> <p>53:11 The Future of Sovereign Computing</p> <p>53:49 Conclusion and Contact Information</p>]]></description>
      <content:encoded><![CDATA[<p>In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss the challenges of app store censorship and explore various alternatives to the Google Play and Apple App Stores. They dive into the Aurora Store, Obtainium, F-Droid, Zap Store, and Accrescent, examining how these platforms can help preserve user privacy and circumvent censorship. Learn about the benefits and limitations of each alternative and get insights on how to take back control of your device's app ecosystem.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/bypass-app-store-censorship">https://atlbitlab.com/podcast/bypass-app-store-censorship</a></p> <p>00:00 Introduction to Apple's App Store Policies</p> <p>00:35 Welcome to the Sovereign Computing Show</p> <p>00:52 ATL BitLab: A Hub for Tech Enthusiasts</p> <p>02:04 Contacting the Show and Listener Interaction</p> <p>03:22 Updates on Private Payments</p> <p>06:27 Main Topic: App Store Censorship</p> <p>07:15 Examples of App Store Censorship</p> <p>10:35 Epic Games vs. Apple</p> <p>14:08 Damus and the Zapping Feature</p> <p>18:34 The Mutiny Wallet Story</p> <p>25:30 Phoenix Wallet and Centralized App Stores</p> <p>27:15 Solutions: Alternative App Stores</p> <p>29:37 Privacy Concerns with Google Play Store</p> <p>31:09 Introducing Obtainium: Open Source App Store</p> <p>33:52 Exploring F-Droid: The Original Alternative App Store</p> <p>38:55 Zap Store: A Social Connection App Store</p> <p>43:27 Accrescent: A Promising New App Store</p> <p>53:11 The Future of Sovereign Computing</p> <p>53:49 Conclusion and Contact Information</p>]]></content:encoded>
      <enclosure length="79556808" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Bypass_App_Store_Censorship_With_These_Tools_-_The_Sovereign_Computing_Show_SOV010.mp3?dest-id=4796587"/>
      <itunes:duration>55:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss the challenges of app store censorship and explore various alternatives to the Google Play and Apple App Stores. They dive into the Aurora Store, Obtainium,...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>3 Ways to Stop Doxing Your Bitcoin - The Sovereign Computing Show (SOV009)</title>
      <itunes:title>3 Ways to Stop Doxing Your Bitcoin - The Sovereign Computing Show (SOV009)</itunes:title>
      <pubDate>Tue, 18 Mar 2025 14:00:00 +0000</pubDate>
      <guid isPermaLink="false">acf890aa-61ed-4f41-a045-1604bb15f2a9</guid>
      <link>https://atlbitlab.com/podcast/3-ways-stop-doxing-your-bitcoin</link>
      <itunes:image href="https://static.libsyn.com/p/assets/1/d/e/4/1de44a42bdd23a2bd959afa2a1bf1c87/sov-009-3-ways-stop-doxing-your-bitcoin.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/f/c/0/4/fc04c0d302cb26e6d959afa2a1bf1c87/3_Ways_to_Stop_Doxing_Your_Bitcoin_-_The_Sovereign_Computing_Show_SOV009.srt" type="application/srt"/>
      <description><![CDATA[<p>Jordan Bravo and Stephen DeLorme delve into the importance and methods of acquiring non-KYC Bitcoin. They explore peer-to-peer platforms like HodlHodl, RoboSats, and Bisq, discussing their unique features, privacy benefits, and how to effectively use them. Learn how to navigate these decentralized networks to maintain control over your Bitcoin transactions while avoiding the pitfalls of KYC (Know Your Customer) regulations. This episode is a must-listen for anyone focused on enhancing their financial privacy.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/3-ways-stop-doxing-your-bitcoin">https://atlbitlab.com/podcast/3-ways-stop-doxing-your-bitcoin</a></p> <p>00:00 Introduction</p> <p>00:21 Welcome to the Sovereign Computing Show</p> <p>00:37 ATL BitLab Sponsorship and Community</p> <p>01:41 Podcast Announcements and Corrections</p> <p>02:46 Exploring Private Payment Methods</p> <p>05:11 eSIM Data and Speed Test Results</p> <p>11:11 Private Web Browsers and Firefox Controversy</p> <p>19:21 Acquiring Non-KYC Bitcoin</p> <p>33:01 Currency Exchange Dispute</p> <p>34:26 Understanding Exchange Rate Slippage</p> <p>36:11 Peer-to-Peer Platform Annoyances</p> <p>37:10 Introduction to RoboSats</p> <p>38:14 Using RoboSats for Private Transactions</p> <p>47:14 Exploring Bisq for Non-KYC Bitcoin</p> <p>55:16 Decentralization and User Experience</p> <p>59:17 Final Thoughts and Tips</p>]]></description>
      <content:encoded><![CDATA[<p>Jordan Bravo and Stephen DeLorme delve into the importance and methods of acquiring non-KYC Bitcoin. They explore peer-to-peer platforms like HodlHodl, RoboSats, and Bisq, discussing their unique features, privacy benefits, and how to effectively use them. Learn how to navigate these decentralized networks to maintain control over your Bitcoin transactions while avoiding the pitfalls of KYC (Know Your Customer) regulations. This episode is a must-listen for anyone focused on enhancing their financial privacy.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/3-ways-stop-doxing-your-bitcoin">https://atlbitlab.com/podcast/3-ways-stop-doxing-your-bitcoin</a></p> <p>00:00 Introduction</p> <p>00:21 Welcome to the Sovereign Computing Show</p> <p>00:37 ATL BitLab Sponsorship and Community</p> <p>01:41 Podcast Announcements and Corrections</p> <p>02:46 Exploring Private Payment Methods</p> <p>05:11 eSIM Data and Speed Test Results</p> <p>11:11 Private Web Browsers and Firefox Controversy</p> <p>19:21 Acquiring Non-KYC Bitcoin</p> <p>33:01 Currency Exchange Dispute</p> <p>34:26 Understanding Exchange Rate Slippage</p> <p>36:11 Peer-to-Peer Platform Annoyances</p> <p>37:10 Introduction to RoboSats</p> <p>38:14 Using RoboSats for Private Transactions</p> <p>47:14 Exploring Bisq for Non-KYC Bitcoin</p> <p>55:16 Decentralization and User Experience</p> <p>59:17 Final Thoughts and Tips</p>]]></content:encoded>
      <enclosure length="88170869" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/3_Ways_to_Stop_Doxing_Your_Bitcoin_-_The_Sovereign_Computing_Show_SOV009.mp3?dest-id=4796587"/>
      <itunes:duration>01:01:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Jordan Bravo and Stephen DeLorme delve into the importance and methods of acquiring non-KYC Bitcoin. They explore peer-to-peer platforms like HodlHodl, RoboSats, and Bisq, discussing their unique features, privacy benefits, and how to effectively use...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>How to Make Private Payments - The Sovereign Computing Show (SOV008)</title>
      <itunes:title>How to Make Private Payments - The Sovereign Computing Show (SOV008)</itunes:title>
      <pubDate>Tue, 11 Mar 2025 09:30:00 +0000</pubDate>
      <guid isPermaLink="false">0ff4538f-f240-4732-a33c-c9bbed060b47</guid>
      <link>https://atlbitlab.com/podcast/how-to-make-private-payments</link>
      <itunes:image href="https://static.libsyn.com/p/assets/9/e/2/c/9e2c75c433b792d6d959afa2a1bf1c87/sov-008-how-to-make-private-payments.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/4/e/7/b/4e7b60b99074f791d959afa2a1bf1c87/How_to_Make_Private_Payments_-_The_Sovereign_Computing_Show_SOV008.srt" type="application/srt"/>
      <description><![CDATA[<p>Whenever you pay for things with a debit/credit card, you're exposing yourself. In this episode, Jordan and Stephen discuss tools you can use to regain some control and privacy with your payments. They cover using Bitcoin & Lightning, virtual debit cards, gift cards, and cash.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-make-private-payments">https://atlbitlab.com/podcast/how-to-make-private-payments</a></p> <p>00:00 Introduction and Reframing Privacy</p> <p>00:29 Welcome to the Sovereign Computing Show</p> <p>00:45 ATL BitLab Sponsorship</p> <p>01:46 Introduction to Private Payments</p> <p>02:32 Using Bitcoin for Private Payments</p> <p>03:33 Challenges with On-Chain Bitcoin Privacy</p> <p>07:11 Exploring Lightning Network for Privacy</p> <p>11:36 Why Payment Privacy Matters</p> <p>22:15 Using Bitcoin and Lightning to Buy Gift Cards</p> <p>25:59 Using Bit Refill for Instant Gift Card Purchases</p> <p>26:29 Exploring The Bitcoin Company</p> <p>28:12 Introduction to Privacy.com</p> <p>29:25 How Privacy.com Protects Your Information</p> <p>37:56 Privacy.com Pricing and Downsides</p> <p>43:59 Listener Boosts and Feedback</p> <p>48:14 Contacting and Supporting the Show</p> <p>50:49 Conclusion and Final Thoughts</p>]]></description>
      <content:encoded><![CDATA[<p>Whenever you pay for things with a debit/credit card, you're exposing yourself. In this episode, Jordan and Stephen discuss tools you can use to regain some control and privacy with your payments. They cover using Bitcoin & Lightning, virtual debit cards, gift cards, and cash.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/how-to-make-private-payments">https://atlbitlab.com/podcast/how-to-make-private-payments</a></p> <p>00:00 Introduction and Reframing Privacy</p> <p>00:29 Welcome to the Sovereign Computing Show</p> <p>00:45 ATL BitLab Sponsorship</p> <p>01:46 Introduction to Private Payments</p> <p>02:32 Using Bitcoin for Private Payments</p> <p>03:33 Challenges with On-Chain Bitcoin Privacy</p> <p>07:11 Exploring Lightning Network for Privacy</p> <p>11:36 Why Payment Privacy Matters</p> <p>22:15 Using Bitcoin and Lightning to Buy Gift Cards</p> <p>25:59 Using Bit Refill for Instant Gift Card Purchases</p> <p>26:29 Exploring The Bitcoin Company</p> <p>28:12 Introduction to Privacy.com</p> <p>29:25 How Privacy.com Protects Your Information</p> <p>37:56 Privacy.com Pricing and Downsides</p> <p>43:59 Listener Boosts and Feedback</p> <p>48:14 Contacting and Supporting the Show</p> <p>50:49 Conclusion and Final Thoughts</p>]]></content:encoded>
      <enclosure length="74474827" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/How_to_Make_Private_Payments_-_The_Sovereign_Computing_Show_SOV008.mp3?dest-id=4796587"/>
      <itunes:duration>51:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords>privacy,bitcoin,Lightning Network,pay with privacy</itunes:keywords>
      <itunes:subtitle><![CDATA[Whenever you pay for things with a debit/credit card, you're exposing yourself. In this episode, Jordan and Stephen discuss tools you can use to regain some control and privacy with your payments. They cover using Bitcoin & Lightning, virtual...]]></itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Is Your Web Browser Spying on You? - The Sovereign Computing Show (SOV007)</title>
      <itunes:title>Is Your Web Browser Spying on You? - The Sovereign Computing Show (SOV007)</itunes:title>
      <pubDate>Tue, 04 Mar 2025 14:20:00 +0000</pubDate>
      <guid isPermaLink="false">9a862a82-d49f-48b4-80b2-82ea721473c5</guid>
      <link>https://atlbitlab.com/podcast/is-your-web-browser-spying-on-you</link>
      <itunes:image href="https://static.libsyn.com/p/assets/2/0/7/8/20780beedfe79b4416c3140a3186d450/sov-007-is-your-web-browser-spying-on-you.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/a/6/d/7/a6d742f1c2f78fabd959afa2a1bf1c87/SOV007_-_Is_Your_Web_Browser_Spying_on_You_.srt" type="application/srt"/>
      <description><![CDATA[<p>Google Chrome is not just a browser; it's a surveillance tool. In this episode of the Sovereign Computing Show, Jordan Bravo and Steven DeLorme delve into why Chrome collects vast amounts of your data and discuss more private alternatives. They explore various browsers like Firefox, Brave, and the up-and-coming Ladybird, as well as private search engines such as DuckDuckGo, StartPage, and Kagi. Learn how to take back control of your web browsing experience with privacy-focused tools and strategies.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/is-your-web-browser-spying-on-you">https://atlbitlab.com/podcast/is-your-web-browser-spying-on-you</a></p> <p>00:00 Google Chrome: The Spy in Your Browser</p> <p>00:36 Welcome to the Sovereign Computing Show</p> <p>00:52 Sponsorship and Community at ATL BitLab</p> <p>02:02 Boosting and Interacting with the Show</p> <p>02:58 Apple's Encryption Battle with the UK Government</p> <p>04:57 The US Government's Stance on Encryption</p> <p>17:13 Choosing Private Web Browsers and Search Engines</p> <p>18:24 Why You Should Avoid Google Chrome and Microsoft Edge</p> <p>22:56 The Benefits of Using Brave Browser</p> <p>27:48 Exploring Firefox as a Private Browser Option</p> <p>29:17 The Importance of Firefox in the Browser Ecosystem</p> <p>30:07 Nostalgia for Firefox's Early Days</p> <p>31:55 The Rise of Brave and Other Chromium Forks</p> <p>33:00 Introducing Ladybird: A New Browser on the Horizon</p> <p>34:25 Essential Browser Extensions for Privacy and Ad Blocking</p> <p>37:55 Mobile Browsers and Syncing Solutions</p> <p>46:28 Exploring Alternative Search Engines</p> <p>54:27 Listener Boosts and Podcasting 2.0 Apps</p> <p>56:05 Closing Remarks and How to Support the Show</p>]]></description>
      <content:encoded><![CDATA[<p>Google Chrome is not just a browser; it's a surveillance tool. In this episode of the Sovereign Computing Show, Jordan Bravo and Steven DeLorme delve into why Chrome collects vast amounts of your data and discuss more private alternatives. They explore various browsers like Firefox, Brave, and the up-and-coming Ladybird, as well as private search engines such as DuckDuckGo, StartPage, and Kagi. Learn how to take back control of your web browsing experience with privacy-focused tools and strategies.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/is-your-web-browser-spying-on-you">https://atlbitlab.com/podcast/is-your-web-browser-spying-on-you</a></p> <p>00:00 Google Chrome: The Spy in Your Browser</p> <p>00:36 Welcome to the Sovereign Computing Show</p> <p>00:52 Sponsorship and Community at ATL BitLab</p> <p>02:02 Boosting and Interacting with the Show</p> <p>02:58 Apple's Encryption Battle with the UK Government</p> <p>04:57 The US Government's Stance on Encryption</p> <p>17:13 Choosing Private Web Browsers and Search Engines</p> <p>18:24 Why You Should Avoid Google Chrome and Microsoft Edge</p> <p>22:56 The Benefits of Using Brave Browser</p> <p>27:48 Exploring Firefox as a Private Browser Option</p> <p>29:17 The Importance of Firefox in the Browser Ecosystem</p> <p>30:07 Nostalgia for Firefox's Early Days</p> <p>31:55 The Rise of Brave and Other Chromium Forks</p> <p>33:00 Introducing Ladybird: A New Browser on the Horizon</p> <p>34:25 Essential Browser Extensions for Privacy and Ad Blocking</p> <p>37:55 Mobile Browsers and Syncing Solutions</p> <p>46:28 Exploring Alternative Search Engines</p> <p>54:27 Listener Boosts and Podcasting 2.0 Apps</p> <p>56:05 Closing Remarks and How to Support the Show</p>]]></content:encoded>
      <enclosure length="82544131" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV007_-_Is_Your_Web_Browser_Spying_on_You_.mp3?dest-id=4796587"/>
      <itunes:duration>57:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Google Chrome is not just a browser; it's a surveillance tool. In this episode of the Sovereign Computing Show, Jordan Bravo and Steven DeLorme delve into why Chrome collects vast amounts of your data and discuss more private alternatives. They...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title><![CDATA[How to Get Secure & Sovereign Personal File Storage  - The Sovereign Computing Show (SOV006)]]></title>
      <itunes:title><![CDATA[How to Get Secure & Sovereign Personal File Storage  - The Sovereign Computing Show (SOV006)]]></itunes:title>
      <pubDate>Tue, 25 Feb 2025 14:09:00 +0000</pubDate>
      <guid isPermaLink="false">f963fd69-b56e-48a5-844d-4c2389cebe6e</guid>
      <link>https://atlbitlab.com/pocast/how-to-get-secure-sovereign-personal-file-storage</link>
      <itunes:image href="https://static.libsyn.com/p/assets/6/b/7/b/6b7b784880e6eeb016c3140a3186d450/sov-006-how-to-get-secure-sovereign-personal-file-storage.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/8/2/3/0/82309cea74a1c44dd959afa2a1bf1c87/How_to_Get_Secure__Sovereign_Personal_File_Storage_-_The_Sovereign_Computing_Show_SOV006.srt" type="application/srt"/>
      <description><![CDATA[<p>In this episode of the Sovereign Computing Show, hosts Jordan Bravo and Stephen DeLorme delve into the importance of self-hosting to maintain control over your digital data. They highlight the benefits of using NextCloud, an open-source suite that can replace Google Drive, iCloud, and other big tech solutions. They discuss various hosting options, including third-party providers like enclaive.io and the ease of self-hosting with StartOS. The episode also explores how to setup photo and file syncing, and why this approach enhances your digital sovereignty.</p> <p>Show Notes: <a href= "https://atlbitlab.com/pocast/how-to-get-secure-sovereign-personal-file-storage"> https://atlbitlab.com/pocast/how-to-get-secure-sovereign-personal-file-storage</a></p> <p>00:00 Introduction and Personal Experience</p> <p>00:33 Welcome to the Sovereign Computing Show</p> <p>00:50 Sponsorship and Community at ATL BitLab</p> <p>02:01 Discussion on DOGE and Data Security</p> <p>08:35 Minimizing Your Digital Footprint</p> <p>17:13 Boosting and Main Topic Introduction</p> <p>17:55 Self-Hosted Files with NextCloud</p> <p>20:50 Confidential Computing and Enclaive.io</p> <p>26:02 NextCloud Features and Getting Started</p> <p>37:14 Alternative Self-Hosting Solutions</p> <p>42:32 Conclusion and Call to Action</p>]]></description>
      <content:encoded><![CDATA[<p>In this episode of the Sovereign Computing Show, hosts Jordan Bravo and Stephen DeLorme delve into the importance of self-hosting to maintain control over your digital data. They highlight the benefits of using NextCloud, an open-source suite that can replace Google Drive, iCloud, and other big tech solutions. They discuss various hosting options, including third-party providers like enclaive.io and the ease of self-hosting with StartOS. The episode also explores how to setup photo and file syncing, and why this approach enhances your digital sovereignty.</p> <p>Show Notes: <a href= "https://atlbitlab.com/pocast/how-to-get-secure-sovereign-personal-file-storage"> https://atlbitlab.com/pocast/how-to-get-secure-sovereign-personal-file-storage</a></p> <p>00:00 Introduction and Personal Experience</p> <p>00:33 Welcome to the Sovereign Computing Show</p> <p>00:50 Sponsorship and Community at ATL BitLab</p> <p>02:01 Discussion on DOGE and Data Security</p> <p>08:35 Minimizing Your Digital Footprint</p> <p>17:13 Boosting and Main Topic Introduction</p> <p>17:55 Self-Hosted Files with NextCloud</p> <p>20:50 Confidential Computing and Enclaive.io</p> <p>26:02 NextCloud Features and Getting Started</p> <p>37:14 Alternative Self-Hosting Solutions</p> <p>42:32 Conclusion and Call to Action</p>]]></content:encoded>
      <enclosure length="63131019" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/How_to_Get_Secure__Sovereign_Personal_File_Storage_-_The_Sovereign_Computing_Show_SOV006.mp3?dest-id=4796587"/>
      <itunes:duration>43:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>In this episode of the Sovereign Computing Show, hosts Jordan Bravo and Stephen DeLorme delve into the importance of self-hosting to maintain control over your digital data. They highlight the benefits of using NextCloud, an open-source suite that can...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Your Phone Number Is Compromised - The Sovereign Computing Show (SOV005)</title>
      <itunes:title>Your Phone Number Is Compromised - The Sovereign Computing Show (SOV005)</itunes:title>
      <pubDate>Tue, 18 Feb 2025 10:30:00 +0000</pubDate>
      <guid isPermaLink="false">b718d425-47de-452c-8128-07b5e75deb87</guid>
      <link>https://atlbitlab.com/podcast/your-phone-number-is-compromised</link>
      <itunes:image href="https://static.libsyn.com/p/assets/a/e/7/9/ae7994d46915f029d959afa2a1bf1c87/sov-005-your-phone-number-is-compromised.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/b/a/3/b/ba3b403be908e848d959afa2a1bf1c87/Your_Phone_Number_Is_Compromised_-_The_Sovereign_Computing_Show_SOV005.srt" type="application/srt"/>
      <description><![CDATA[<p>You might not realize it but your phone number is undermining your privacy and digital sovereignty. In this episode of the Sovereign computing show, Jordan Bravo and Stephen DeLorme discuss the problems with the typical setup that most of use have with phone numbers, SIM cards, & cellular data. Then they detail steps you can take to fix the problem by decoupling phone numbers from service providers, using VoIP numbers, eSIMs, and other tools.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/your-phone-number-is-compromised">https://atlbitlab.com/podcast/your-phone-number-is-compromised</a></p> <p>00:00 Embracing the Sovereign Computing Mindset<br /> 00:50 Introduction to the Sovereign Computing Show<br /> 01:05 Sponsorship and Community at ATL BitLab<br /> 02:12 Discussion on UK Government's Demand to Apple<br /> 04:56 Importance of Open Source and Decentralized Trust<br /> 08:17 Approaching Phone Numbers in a Self-Sovereign Manner<br /> 09:53 Decoupling Phone Numbers from Identity<br /> 16:07 Using JMP.chat for Private Phone Numbers<br /> 21:30 Privacy-Respecting Cellular Data Providers<br /> 23:08 Switching to eSIM: A Simple Guide<br /> 23:45 Privacy-Preserving Payment Methods<br /> 24:14 Using Virtual Debit Cards for Privacy<br /> 24:57 Challenges with Prepaid Visa Cards<br /> 26:38 Mint Mobile: Data and Phone Number Separation<br /> 27:24 Exploring Other Providers: US Mobile and Silent Link<br /> 30:54 The Importance of Owning Your Phone<br /> 32:38 Recap and Final Thoughts<br /> 38:07 Listener Boosts and Feedback<br /> 39:48 Closing Remarks and Support</p>]]></description>
      <content:encoded><![CDATA[<p>You might not realize it but your phone number is undermining your privacy and digital sovereignty. In this episode of the Sovereign computing show, Jordan Bravo and Stephen DeLorme discuss the problems with the typical setup that most of use have with phone numbers, SIM cards, & cellular data. Then they detail steps you can take to fix the problem by decoupling phone numbers from service providers, using VoIP numbers, eSIMs, and other tools.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/your-phone-number-is-compromised">https://atlbitlab.com/podcast/your-phone-number-is-compromised</a></p> <p>00:00 Embracing the Sovereign Computing Mindset 00:50 Introduction to the Sovereign Computing Show 01:05 Sponsorship and Community at ATL BitLab 02:12 Discussion on UK Government's Demand to Apple 04:56 Importance of Open Source and Decentralized Trust 08:17 Approaching Phone Numbers in a Self-Sovereign Manner 09:53 Decoupling Phone Numbers from Identity 16:07 Using JMP.chat for Private Phone Numbers 21:30 Privacy-Respecting Cellular Data Providers 23:08 Switching to eSIM: A Simple Guide 23:45 Privacy-Preserving Payment Methods 24:14 Using Virtual Debit Cards for Privacy 24:57 Challenges with Prepaid Visa Cards 26:38 Mint Mobile: Data and Phone Number Separation 27:24 Exploring Other Providers: US Mobile and Silent Link 30:54 The Importance of Owning Your Phone 32:38 Recap and Final Thoughts 38:07 Listener Boosts and Feedback 39:48 Closing Remarks and Support</p>]]></content:encoded>
      <enclosure length="58645254" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Your_Phone_Number_Is_Compromised_-_The_Sovereign_Computing_Show_SOV005.mp3?dest-id=4796587"/>
      <itunes:duration>40:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>You might not realize it but your phone number is undermining your privacy and digital sovereignty. In this episode of the Sovereign computing show, Jordan Bravo and Stephen DeLorme discuss the problems with the typical setup that most of use have...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <title>3 Things About Email You Lost Control of (and How to Fix It) - The Sovereign Computing Show (SOV004)</title>
      <itunes:title>3 Things About Email You Lost Control of (and How to Fix It) - The Sovereign Computing Show (SOV004)</itunes:title>
      <pubDate>Wed, 12 Feb 2025 10:30:00 +0000</pubDate>
      <guid isPermaLink="false">c991586f-0995-4d70-9c90-e054faa3d722</guid>
      <link>https://atlbitlab.com/podcast/three-things-about-email-you-lost-control-of-how-to-fix-it</link>
      <itunes:image href="https://static.libsyn.com/p/assets/e/8/c/c/e8cc059083eaec4f16c3140a3186d450/sov-004-three-things-about-email-you-lost-control-of-how-to-fix-it.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/7/4/e/b/74eb8e2d2a1e4ec3d959afa2a1bf1c87/Three_Things_About_Email_You_Lost_Control_of_and_How_to_Fix_It_-_The_Sovereign_Computing_Show_SOV004.srt" type="application/srt"/>
      <description><![CDATA[<p>Discover how to regain control over your email in this episode of the Sovereign Computing Show with Jordan Bravo and Stephen DeLorme. They outline the three main points of control we’ve lost in the modern age. Learn about domain separation, alternate email providers, and the power of email aliases to protect your privacy and digital life. Jordan and Stephen provide actionable tips and tools, including how to use SimpleLogin for email aliases, employing different email clients, and even self-hosting your email server.</p> <p>Show Notes: https://atlbitlab.com/podcast/three-things-about-email-you-lost-control-of-how-to-fix-it</p> <p> </p> <p> </p>]]></description>
      <content:encoded><![CDATA[<p>Discover how to regain control over your email in this episode of the Sovereign Computing Show with Jordan Bravo and Stephen DeLorme. They outline the three main points of control we’ve lost in the modern age. Learn about domain separation, alternate email providers, and the power of email aliases to protect your privacy and digital life. Jordan and Stephen provide actionable tips and tools, including how to use SimpleLogin for email aliases, employing different email clients, and even self-hosting your email server.</p> <p>Show Notes: https://atlbitlab.com/podcast/three-things-about-email-you-lost-control-of-how-to-fix-it</p> <p> </p> <p> </p>]]></content:encoded>
      <enclosure length="67300175" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Three_Things_About_Email_You_Lost_Control_of_and_How_to_Fix_It_-_The_Sovereign_Computing_Show_SOV004.mp3?dest-id=4796587"/>
      <itunes:duration>46:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Discover how to regain control over your email in this episode of the Sovereign Computing Show with Jordan Bravo and Stephen DeLorme. They outline the three main points of control we’ve lost in the modern age. Learn about domain separation,...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Your Messaging Apps Are Not Private - The Sovereign Computing Show (SOV003)</title>
      <itunes:title>Your Messaging Apps Are Not Private - The Sovereign Computing Show (SOV003)</itunes:title>
      <pubDate>Tue, 04 Feb 2025 10:30:00 +0000</pubDate>
      <guid isPermaLink="false">35eca353-800e-4cf1-be2d-fde6e1628770</guid>
      <link>https://atlbitlab.com/podcast/your-messaging-apps-are-not-private</link>
      <itunes:image href="https://static.libsyn.com/p/assets/8/c/6/c/8c6c64cdb14459e9d959afa2a1bf1c87/sov-003-your-messaging-apps-are-not-private.jpg"/>
      <podcast:transcript url="https://static.libsyn.com/p/assets/3/d/c/4/3dc485df20644d1416c3140a3186d450/Your_Messaging_Apps_Are_Not_Private_-_The_Sovereign_Computing_Show_SOV003.srt" type="application/srt"/>
      <description><![CDATA[<div>You might think that nobody can read your private messages, but chances are, the apps you are using are not as private as you think. In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss how to enhance digital privacy by replacing everyday messaging apps with more secure and sovereign options. They review various messaging applications like Signal, Matrix, and SimpleX, and delve into their benefits and drawbacks.</div> <div> </div> <div>Show Notes: <a href= "https://atlbitlab.com/podcast/your-messaging-apps-are-not-private"> https://atlbitlab.com/podcast/your-messaging-apps-are-not-private</a></div> <div> </div> <div>00:00 Introduction to the Sovereign Computing Show</div> <div>00:16 Sponsorship and Community at ATL BitLab</div> <div>01:28 Deep Dive into Instant Messengers</div> <div>02:23 The Importance of End-to-End Encryption</div> <div>04:02 Privacy vs. Security: A Complex Relationship</div> <div>06:47 Shifting Perceptions of Encrypted Messaging</div> <div>10:50 Exploring Popular Messaging Apps</div> <div>21:33 Signal: The Gold Standard for Privacy</div> <div>29:07 Managing Sensitive Credentials with Disappearing Messages</div> <div>30:45 The Fun and Practicality of Ephemeral Messaging</div> <div>31:18 Signal in Pop Culture and Username Features</div> <div>32:25 Introduction to Matrix and Element</div> <div>33:47 Self-Hosting and Federation in Matrix</div> <div>35:25 Matrix vs. Other Messaging Protocols</div> <div>37:57 Exploring SimpleX: A Unique Messaging App</div> <div>39:19 Understanding SimpleX's Server Model</div> <div>45:33 Boostergrams and Listener Feedback</div> <div>56:01 Wrapping Up and Final Thoughts</div> <div> </div>]]></description>
      <content:encoded><![CDATA[You might think that nobody can read your private messages, but chances are, the apps you are using are not as private as you think. In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss how to enhance digital privacy by replacing everyday messaging apps with more secure and sovereign options. They review various messaging applications like Signal, Matrix, and SimpleX, and delve into their benefits and drawbacks.   Show Notes: <a href= "https://atlbitlab.com/podcast/your-messaging-apps-are-not-private"> https://atlbitlab.com/podcast/your-messaging-apps-are-not-private</a>   00:00 Introduction to the Sovereign Computing Show 00:16 Sponsorship and Community at ATL BitLab 01:28 Deep Dive into Instant Messengers 02:23 The Importance of End-to-End Encryption 04:02 Privacy vs. Security: A Complex Relationship 06:47 Shifting Perceptions of Encrypted Messaging 10:50 Exploring Popular Messaging Apps 21:33 Signal: The Gold Standard for Privacy 29:07 Managing Sensitive Credentials with Disappearing Messages 30:45 The Fun and Practicality of Ephemeral Messaging 31:18 Signal in Pop Culture and Username Features 32:25 Introduction to Matrix and Element 33:47 Self-Hosting and Federation in Matrix 35:25 Matrix vs. Other Messaging Protocols 37:57 Exploring SimpleX: A Unique Messaging App 39:19 Understanding SimpleX's Server Model 45:33 Boostergrams and Listener Feedback 56:01 Wrapping Up and Final Thoughts  ]]></content:encoded>
      <enclosure length="82154215" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Your_Messaging_Apps_Are_Not_Private_-_The_Sovereign_Computing_Show_SOV003.mp3?dest-id=4796587"/>
      <itunes:duration>57:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>You might think that nobody can read your private messages, but chances are, the apps you are using are not as private as you think. In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme discuss how to enhance digital...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
    <item>
      <title><![CDATA[Mastering Calendars & Contacts - The Sovereign Computing Show (SOV002)]]></title>
      <itunes:title><![CDATA[Mastering Calendars & Contacts - The Sovereign Computing Show (SOV002)]]></itunes:title>
      <pubDate>Tue, 28 Jan 2025 10:30:00 +0000</pubDate>
      <guid isPermaLink="false">83716e02-f325-4e0a-b86b-7f8b03764683</guid>
      <link>https://atlbitlab.com/podcast/mastering-calendar-contact-freedom</link>
      <itunes:image href="https://static.libsyn.com/p/assets/e/8/d/e/e8de00af50bf9d8ed959afa2a1bf1c87/sov-002-mastering-calendar-contact-freedom.jpg"/>
      <description><![CDATA[<p>Ready to break free from big tech's grip on your digital life? In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme delve into the essential first steps of reclaiming your privacy by managing your own calendars and contacts. They explore various self-sovereign options, from using Proton's encrypted services to setting up Nextcloud and lightweight WebDAV servers. Learn how to seamlessly integrate these tools with your mobile and desktop devices, ensuring your sensitive personal data stays under your control. Don't miss this essential guide to taking the next steps in your sovereign computing journey.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/mastering-calendar-contact-freedom">https://atlbitlab.com/podcast/mastering-calendar-contact-freedom</a></p> <div> <div>- 00:00 Introduction to the Sovereign Computing Show</div> <div>- 00:16 Sponsorship and Community at ATL BitLab</div> <div>- 01:20 Today's Topic: Calendars and Contacts</div> <div>- 05:59 Proton: A Secure Alternative</div> <div>- 16:13 Exploring WebDAV and Open Standards</div> <div>- 20:16 NextCloud: The Open Source Productivity Suite</div> <div>- 24:31 Data Breaches and Company Size</div> <div>- 25:15 Setting Up and Using NextCloud</div> <div>- 25:59 Syncing Calendars and Contacts</div> <div>- 30:19 Understanding Calendar and Contact Formats</div> <div>- 34:50 Public Calendars with GitHub</div> <div>- 39:41 Self-Hosting NextCloud and Alternatives</div> <div>- 42:49 Cross-Platform Syncing Solutions</div> <div>- 46:13 Wrapping Up and Final Thoughts</div> </div>]]></description>
      <content:encoded><![CDATA[<p>Ready to break free from big tech's grip on your digital life? In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme delve into the essential first steps of reclaiming your privacy by managing your own calendars and contacts. They explore various self-sovereign options, from using Proton's encrypted services to setting up Nextcloud and lightweight WebDAV servers. Learn how to seamlessly integrate these tools with your mobile and desktop devices, ensuring your sensitive personal data stays under your control. Don't miss this essential guide to taking the next steps in your sovereign computing journey.</p> <p>Show Notes: <a href= "https://atlbitlab.com/podcast/mastering-calendar-contact-freedom">https://atlbitlab.com/podcast/mastering-calendar-contact-freedom</a></p>  - 00:00 Introduction to the Sovereign Computing Show - 00:16 Sponsorship and Community at ATL BitLab - 01:20 Today's Topic: Calendars and Contacts - 05:59 Proton: A Secure Alternative - 16:13 Exploring WebDAV and Open Standards - 20:16 NextCloud: The Open Source Productivity Suite - 24:31 Data Breaches and Company Size - 25:15 Setting Up and Using NextCloud - 25:59 Syncing Calendars and Contacts - 30:19 Understanding Calendar and Contact Formats - 34:50 Public Calendars with GitHub - 39:41 Self-Hosting NextCloud and Alternatives - 42:49 Cross-Platform Syncing Solutions - 46:13 Wrapping Up and Final Thoughts ]]></content:encoded>
      <enclosure length="68607938" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/Mastering_Calendars__Contacts_-_The_Sovereign_Computing_Show_SOV002.mp3?dest-id=4796587"/>
      <itunes:duration>47:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>Ready to break free from big tech's grip on your digital life? In this episode of the Sovereign Computing Show, Jordan Bravo and Stephen DeLorme delve into the essential first steps of reclaiming your privacy by managing your own calendars and...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Jordan Bravo</itunes:author>
    </item>
    <item>
      <title>Sovereign Computing: Reclaiming Your Digital Freedom - The Sovereign Computing Show (SOV001)</title>
      <itunes:title>Sovereign Computing: Reclaiming Your Digital Freedom - The Sovereign Computing Show (SOV001)</itunes:title>
      <pubDate>Tue, 21 Jan 2025 10:30:00 +0000</pubDate>
      <guid isPermaLink="false">1d5be83a-654c-473a-9c80-416a2b960020</guid>
      <link>https://atlbitlab.com/podcast/what-is-sovereign-computing</link>
      <itunes:image href="https://static.libsyn.com/p/assets/0/b/2/2/0b22de47950a9cce16c3140a3186d450/sov-001-what-is-sovereign-computing-20250120-dnsvlnssyz.jpg"/>
      <description><![CDATA[<p>What is sovereign computing? Jordan and Stephen discuss taking back control of your technology to protect your data and ensure that the tools you use are serving your best interest and not the interests of third-parties. Show Notes: https://atlbitlab.com/podcast/what-is-sovereign-computing</p>]]></description>
      <content:encoded><![CDATA[<p>What is sovereign computing? Jordan and Stephen discuss taking back control of your technology to protect your data and ensure that the tools you use are serving your best interest and not the interests of third-parties. Show Notes: https://atlbitlab.com/podcast/what-is-sovereign-computing</p>]]></content:encoded>
      <enclosure length="51472171" type="audio/mpeg" url="https://traffic.libsyn.com/secure/df8567bc-e914-4b5d-a8d0-4112060a5a23/SOV001_-_Introduction_to_Sovereign_Computing_2025-01-20.mp3?dest-id=4796587"/>
      <itunes:duration>35:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:keywords/>
      <itunes:subtitle>What is sovereign computing? Jordan and Stephen discuss taking back control of your technology to protect your data and ensure that the tools you use are serving your best interest and not the interests of third-parties. Show Notes:...</itunes:subtitle>
      <itunes:episodeType>full</itunes:episodeType>
    </item>
  </channel>
</rss>