Ethical Data, Explained
Antidetect Browsers: Empowering Users to Decide What Personal Data to Disclose with Michael Levit, CEO and Co-founder of Tempest
In this episode of Ethical Data, Explained, Henry Ng is joined by Michael Levit, CEO and Co-founder of Tempest to discuss privacy-based browsers - what technology they are built on, how they ensure user privacy, how they differ from VPN and proxies, and much more.
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!
Spoiler: privacy-based browsers are not about making your browsing 100% anonymous (that would not be a pleasant experience) but about highlighting sensitive areas and letting you decide whether you want to share your data or not.
Tune in for more!
Quotes
1. “How individuals can protect their privacy? Well, other than the obvious go download Tempest today. A browser and a proxy, I think, are two wonderful places to start. If you're going to do nothing else, do those two things.”
2. “There's probably a certain amount of data leakage that's going from the search engine to the third-party provider, especially if you click on an ad. There is a certain amount of protection by using a private browser. That browser may restrict your IP address. It may get rid of your fingerprint. It will do a variety of things that will restrict the amount of information that's leaking. A VPN or a proxy will restrict your native IP address and so it will keep that private. There are certain proxies that will rotate your IP address as you use it. And as you do that, that will further help and insulate. And you can use all of these together and each time you layer. And you can just keep adding these layers and the more layers, the better. It tastes better. And so if you could use a private search engine with a private browser, with a proxy and VPN, the world gets better and better. ”
3. “There are lots of data that needs to be shared. So it turns out that if you take away too much data, life gets really complicated and hard. And one of the big ones is passwords."
3 questions we ask all guests:
1. Who in the world of Tech/Data Michael would take out for lunch?
2. What piece of software Michael couldn't imagine life without?
Google flights
Google flights
3. What real-life problem did Michael solve using data?
Michael maintains his phone number anonymous (partly to protect himself from spam calls) by using Phoner.
Episode Resources
If you enjoyed this episode then please either:
Subscribe, rate, and review the "Ethical Data, Explained" podcast on Apple Podcasts.
Follow the "Ethical Data, Explained" podcast on Spotify.
Follow the "Ethical Data, Explained" podcast on Google Podcasts.
Watch full episodes of the "Ethical Data, Explained" podcast on YouTube.
To know more about SOAX visit the website.
Ethical Data, Explained is handcrafted by our friends over at: fame.so