4.8 • 1K Ratings
🗓️ 16 October 2018
⏱️ 41 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | And centuries before a return Centuries before Aristotle, Cleopatra or Jesus Christ worked the earth, the Chinese were |
0:29.8 | building walls. In ancient times, there were defenses between warring ethnically Chinese tribes. |
0:38.0 | A thousand years later, walls were erected to keep out war-mongering Mongols. Today the Great Wall of China remains a standing |
0:46.0 | relic of those times. But walls are about more than just military defense. |
0:52.8 | They are a means of enforcing separation between peoples. |
0:56.8 | We say communities are gated when they isolate group of common tradition or wealth. |
1:03.0 | Artificial borders such as the Berlin Wall create teams on either side, |
1:08.0 | separating the good from the bad. For China, walls have always been about not just kinetic but ideological |
1:16.7 | war. The Mongols were violent conquerors sure but they were also seen as |
1:22.0 | barbaric brutish. |
1:24.0 | Their mere presence threatened to taint the more pure Chinese way of life. |
1:29.0 | In this sense, the Great Wall kept out not just foreign armies, but foreign cultures. |
1:37.0 | The Great Wall of our era was built with very much the same purpose in mind. |
1:42.4 | This wall, however, is perhaps even more imposing, more threatening |
1:46.6 | than the real Great Wall of China is. And it's not an earthen wall, it's not a stone wall, it's a firewall. You probably have a firewall |
1:59.1 | installed on your computer or your router at home. |
2:02.9 | It functions perhaps less like a wall than a gate or a door. |
2:07.7 | Filtering incoming data to allow legitimate network packets through and keeping unwanted malicious packets from making |
2:14.9 | chaos on your machine. Just as your front door or front gate allows you to discern who can |
2:21.2 | come into your home and when, so too do firewalls, try the best to give you full |
2:27.2 | control of what information is allowed entry onto your computer. |
2:32.7 | For two decades now, China has viewed their entire national internet in much the same way |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.