Bitcoin, Blockchain, and the Technologies of our Future is a podcast series hosted by Naomi Brockwell. Naomi is also the host of the YouTube show "Naomi Brockwell TV" which explores all things tech and crypto, and she is the emcee of the Consensus Blockchain conferences and the D10e Blockchain confe…
Donate to Bitcoin, Blockchain, and the Technologies of Our Future
bitcoin, insightful, host.
Listeners of Bitcoin, Blockchain, and the Technologies of Our Future that love the show mention: naomi,https://youtu.be/gGva7O3czg0https://odysee.com/@NaomiBrockwell:4/without-consent:5Your child already has a digital footprint—before they can even speak. But they didn't create it. You did.Every photo you post, every milestone you share, helps train facial recognition systems and build psychological profiles your child will carry for life. These profiles are sold, scored, and used by companies and governments—long before your child is old enough to understand what privacy even means.In this video, we break down how seemingly harmless posts can fuel surveillance systems, shape algorithmic risk scores, and impact your child's future—from school to jobs to border crossings.00:00 Kids Have No Choice01:08 Data Brokers Are Watching Your Kids01:35 How Children Are Profiled02:31 One Possible Future03:32 Child ID Theft03:50 The Dangers of Toys and Devices05:34 Baby Monitors06:19 Data Collection in Schools06:35 Risks of Hand-Me-Down Tech06:51 Parental Surveillance Apps10:02 Tips to Protect Kids in the Digital Age12:28 Give Your Kids a Fighting ChanceThis isn't about guilt. It's about awareness. And it's about protecting their right to grow up without being boxed in by a digital past they never chose. Learn how to limit your child's data exposure, push back against normalization of surveillance, and give your kids a clean slate.Deutsche Telekom's entire video: https://www.telekom.com/de/medien/medieninformationen/detail/nachricht-von-ella-without-consent-1048362Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/1g0RzOGxe40Step-by-Step Privacy Hardening:Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac's privacy.In this video, we walk you through privacy expert Michael Bazzell's recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.00:00 Apple promises only THEY will abuse your data02:20 Purchasing Your Mac03:14 Choose a Model03:41 Used Devices: Update, Reformat, Install OS08:28 Initial Setup11:32 WiFi and Bluetooth11:50 OS Firewall13:14 Notifications14:16 Airdrop, Siri, and Sharing15:33 Gatekeeper18:26 Analytics and Ads19:01 Time20:15 Filevault22:02 Dock, Wallpaper and Finder25:35 Application Firewall / 3rd Party Apps28:09 ConclusionApple does build decent privacy tools—but they definitely don't make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here:https://inteltechniques.com/book7.htmlBrought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/11P6DdI8HOohttps://odysee.com/@NaomiBrockwell:4/Extensions:6You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.They're reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.In this video, we expose the chilling truth about browser extensions.You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users.And we'll break down why just checking permissions isn't enough—because malicious extensions often ask for the same permissions as the good ones. It's not about what they ask for. It's how they use it.00:00 Extensions can do WHAT00:52 Overview01:34 The Problem with Browser Extensions09:18 How Do We Protect Ourselves10:52 Understand Permissions16:03 Grant Fewer Permissions16:18 Use Extensions Sparingly17:10 Use a Private Browser18:06 Least Privilege18:28 Use Code Review Tools19:07 In SummaryExtensions are more than just “add-ons.” They have access to everything you do online.Before you install another one, watch this video.Special thanks to John Tuckner, Matt Frisbee and Pete Snyder for sharing their expert first-hand knowledge with us!Brought to you by Lee Rennie, Cube Boy, Will Sandoval, Jack Rhysider, and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/tzTtF3vOiq0https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:fEvery time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust'—outdated apps, clutter, and potential privacy risks. In this video, I'll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.00:00 Resist Temptation00:41 App Bloat01:50 Attack Surface02:51 Switch Accounts03:49 ID Tracking04:17 Ghost Data05:27 Habit Traps06:17 Reclaiming Mental Bandwidth07:14 7 Tips10:02 My Thoughts on Restoring From BackupWhen people ask me questions like, how to restore from a backup, my answer is usually: don't. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you'll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/Zo9qHqTDcgMhttps://odysee.com/@NaomiBrockwell:4/Graphene-Install:eYour phone is a tracking device. But it doesn't have to be.One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we'll show you how to use it in a more privacy-preserving way.I'll walk you through how I set up my GrapheneOS device so you can see what's possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!00:00 Spyware is all over our smartphones01:47 Hardware03:03 Purchase05:13 Installation10:24 Setup13:33 App Stores19:32 Secondary Profiles23:46 Your Phone, Your RulesAs difficult as it may seem, it's actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn't about going off grid; it's about making informed choices; and with GrapheneOS, you're taking control of your device, your data, and your digital freedom.Our full phone privacy series:https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=VZbMAB50C2-NAOAMNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellVisit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/AuqOzn9GWTUhttps://odysee.com/@NaomiBrockwell:4/UK-Vs-Apple:aIn an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disabled ADP entirely for UK users. By doing this, Apple alerted the world to the secret order—but it also left UK users vulnerable. Their backups, photos, notes, and more are now accessible to the government.In this video, you'll learn exactly what Apple data is no longer private, and discover privacy-focused alternatives for your files, photos, emails, notes, and more. The UK government is fishing for your personal information—now's the time to ramp up your protections and take control of your digital life.00:00 An Unprecedented Attack03:24 What Kind of Data is Affected03:57 Safari Bookmarks Alternatives04:34 iCloud Drive Alternatives05:38 Notes Alternatives06:06 Reminder Alternatives06:35 Voice Memo Alternatives07:08 Email Alternatives07:37 Contacts Alternatives08:10 Calendar Alternatives08:38 Important Note About ADP09:55 The Privacy Battle AheadApple's removal of Advanced Data Protection in response to the UK's demands is unprecedented among major democracies. If privacy matters to you, it's time to move your sensitive data away from iCloud—and potentially other major providers targeted by similar government demands—to privacy-first alternatives. Protect your information before it's too late.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/NXuRlvJI2N8https://odysee.com/@NaomiBrockwell:4/signal-usernames:7Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don't realize how they work—some mistake them for their profile name, and figuring out how to share or search for usernames can be confusing. Here's what you need to know: how usernames work, how to set yours up, how to find others, and the privacy benefits (and limitations) of this new feature.00:00 Signal's Game-Changing Privacy Upgrade00:51 What Are Signal Usernames? (and Why You Should Use One)01:34 Step-by-Step: Setting Up Your Signal Username02:14 How to Find People on Signal Without a Phone Number03:13 The Pros & Cons of Signal's Username System05:14 Should You Let Signal Access Your Contacts?05:44 How Signal Protects Your Contact List (Explained)06:35 How to Change Your Signal Username Anytime07:42 Hide Your Phone Number on Signal – Here's How08:27 Final Thoughts – Why This Feature MattersSignal's username feature is a big step forward for privacy, helping us move away from phone numbers and take control over the information we share. If you haven't set up your username yet, now's the perfect time. And the best part? You can change it anytime, as often as you like.Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/rKnoP30Q6Ighttps://odysee.com/@NaomiBrockwell:4/Car-hacking:dSecurity researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think.00:00 Car Hacking Doesn't Seem Real01:13 How Sam Got Into Car Hacking04:55 Why Connected Cars Are Not Secure12:11 Types of Attacks Researched14:36 The Subaru Experiment16:53 Kia Connect Research18:11 Tesla Bug Bounty Program23:01 VPN Security23:37 Little Regard for Security of Consumers26:23 Jasper32:52 Tether Hacking34:10 The Problem with ISP Backdoors38:35 Self-Driving Cars39:43 Hacking Driver Accounts43:20 What People Can Do44:34 We Take Our Privacy For Granted Until It Is Summoned47:45 Where We Are Now and Where We Are GoingCars aren't just vehicles anymore—they're data goldmines, storing your messages, photos, and location history. We need to rethink how much personal info we're handing over and who has access to it.Special Thanks to Sam Curry! Check out his blog for his complete research report: https://samcurry.net/hacking-subaruBrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/UgXjxQsyk4whttps://odysee.com/@NaomiBrockwell:4/privacy-101:3In today's hyper-connected world, our personal information is being collected, shared, and sold—often without our knowledge or consent. But here's the good news: you can fight back. More people than ever are waking up to the importance of digital privacy and taking action to protect themselves.The big challenge? Many people don't know where to begin. That's where this video comes in.This Privacy 101 guide is designed for anyone just starting their privacy journey. I'll show you six of the easiest, most impactful steps you can take right now to safeguard your digital life—starting with the basics and building your confidence along the way.We'll cover:
https://youtu.be/E9iPKu1v7oshttps://odysee.com/@NaomiBrockwell:4/year-in-censorship:fOn Dec 31st, 2024 I was invited on to Al Jazeera to discuss internet censorship, the new Australian ban on children under 16 from accessing social media, and whether banning TikTok will help prevent the spreading of misinformation.00:00 Everyone Is Trying to Hijack Our Attention00:38 Introduction to The Stream00:54 Censorship is a Government-Led Effort02:51 The Curious Case of TikTok Bans05:03 It is Never About The ChildrenGovernments, data brokers, and social media companies have a vested interest in filling their giant databases with our information and we know that they can't protect it. There are data breaches every single day. Former president of Cisco John Chambers once said, “there are two types of companies in the world, those that have been hacked and those that don't yet realize they have been hacked”. We need to start taking back the narrative that these entities know what is best for our data, and our lives, or else we risk an Orwellian future we will not be able to reverse.Special Thanks to Al Jazeera and The Stream for inviting me back on the show!Watch the full episode here: https://www.youtube.com/watch?v=dy90CrTr0i0Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/MtHKGaDA30ghttps://odysee.com/@NaomiBrockwell:4/Techno-optimism:bIt's easy to feel pessimistic, even hopeless, about the future of privacy in a world so deeply intertwined with technology. This is because we've been tricked into thinking that powerful technology can only be wielded by powerful entities who want to spy on us.But I'm very much a techno-optimist. In this video I'll explain why I believe that we have all the tools at our disposal to write a better future. I'll also go over some groundbreaking innovations currently in development coming to our near future.In this new digital world of mass surveillance, we're far from powerless – we have every reason to feel energized and excited. For the first time, we have both the technology and the cultural momentum to take back our privacy. But we'll only win it if we stop demonizing technology, and understand that it's only by harnessing the powerful privacy tech at our disposal, building more of it, and incorporating it into our daily lives can we actually break free from our surveillance shackles.00:00 I'm a technophile. You wouldn't think so, though01:30 Why I am a Techno-Optimist03:13 Current Privacy Tools09:19 The Future of Privacy15:14 The Rise of Privacy Culture16:26 A White Pilled Future17:09 Technology Can be a Tool for LiberationBrought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/Hcqh0ZSza50https://odysee.com/@NaomiBrockwell:4/nothing-to-Hide-v7-ODYSEE-20241213-001:a“I have nothing to hide”.It's become a default response from many to overreaching surveillance.When did privacy start being about having something to hide? It used to simply be about having the right to decide for ourselves who gets access to our data. But over the past decade we've lost that choice, and so much of our personal and sensitive information is shared without our knowledge or explicit consent. In this video I want to give you a list of arguments you can use in response to anyone who dismisses the importance of privacy because they “have nothing to hide”.00:00 “I Have Nothing To Hide”01:33 Privacy is About Consent02:35 Nothing to Hide, Everything to Protect04:34 Privacy is NOT Dead05:18 Your Data Is Forever06:03 It's Not About You08:14 Uncertain Future10:10 Surveillance Stifles Creativity and Dissent11:30 Surveillance Isn't About Criminals12:29 Your Data Puts Others at Risk14:25 You Send A Signal With Your Choices16:21 A Fight We Can't Afford to LoseSurveillance is a weapon that is too often used to silence opposition, suppress individuality, and enforce conformity. Privacy is what allows us to think, act, and connect without fear. Without privacy, we lose the ability to dissent, to innovate, and to live freely. The next time someone says, “I have nothing to hide,” remind them of this: Privacy isn't about hiding. It's about protecting your rights, your choices, and your future.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/PPnFJ8PeSsYhttps://odysee.com/@NaomiBrockwell:4/faraday-bags:0Our phones and laptops are like personal tracking devices, constantly emitting signals that map our every move. But what if you could take back control of your privacy without ditching your tech? Enter Faraday bags—a simple yet powerful tool to block unwanted tracking. In this video, I'll show you how Faraday bags work, the privacy threats they protect against, how to pick the right one, and how to test it. Plus, I'll share best practices and what Faraday bags can't do, so you can make the most of this privacy tool.00:00 We Are Wardriving for Google and Apple04:06 How Faraday Bags Work07:07 How Blocking EM Waves Protects Privacy09:26 Choosing a Faraday Bag10:53 Where to Buy a Faraday Bag11:23 Testing a Faraday Bag12:54 Shortcomings13:30 SummaryWith identity theft, unauthorized tracking, and the constant harvesting of your digital activities on the rise, safeguarding your information is simply smart, not extreme. Take control of your privacy and consider adding a Faraday bag to your toolkit—it's an easy, practical step for when you need it most.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/vUQLkHK7eNIhttps://odysee.com/@NaomiBrockwell:4/Byron-Tau:1Your favorite apps might be secretly selling your location and personal data. Governments and shady corporations are buying data from brokers to track your every move—no warrants required. In this interview, I sit down with Byron Tau, author of Means of Control, to uncover the hidden world of secret code in your apps, shady shell companies, and the surveillance economy we've unknowingly accepted. This is a wake-up call for anyone who values their privacy. Watch now to learn how modern tech is being weaponized—and what you can do about it.00:00 We Must Change Social Norms on Privacy05:33 Why the US Purchases Data07:13 Third Party Doctrine09:44 Evolution of Data Collection14:12 The Impact of Mass Data Collection16:10 Insidious Uses for Data19:43 History of Private vs Government Entities24:14 How We Can Push Back27:47 Data Brokers' Devilish Tactics30:14 The Data Broker Industry is MASSIVE32:09 Ways Data Brokers Hide35:24 Real-Time Bidding40:41 Data Brokers Make Money Selling YOUR Data41:51 Codes in Apps49:27 Distinction Between Law Enforcement and Intelligence56:50 The Human Component01:02:03 The Conversation We're NOT Having01:05:26 Why We Should Pay for Tech01:09:18 Chinese vs American Surveillance01:12:32 Solutions [for now]01:14:29 Final ThoughtsThe only way that we can change things is for us to start illuminating the shadows and have a public discussion, so we can decide what we want as a society of individuals.Special thanks to Byron Tau!Links:https://www.penguinrandomhouse.com/books/706321/means-of-control-by-byron-tau/https://www.notus.org/byron-tauBrought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellBecome a privacy accelerationist! privacc.orgTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/CVeZfM0pVyUhttps://odysee.com/@NaomiBrockwell:4/Local-LLM:dAI chatbots are taking over the world. But if you want to guarantee your privacy when using them, running an LLM locally is going to be your best bet. In this video I collaborate with The Hated One to show you how, and to explain some AI terminology so that you understand what's going on.00:00 Your Data is Used to Train Chatbots01:11 Understanding AI Models01:28 LLM02:23 Parameters03:34 Size04:51 AI Engine and UX07:15 Tutorial, courtesy of The Hated One08:07 Ollama12:40 Open Web UI installation13:23 Docker15:30 Setting up Open Web UI16:38 Choose to Take Control of Your DataThe biggest advantage of open source models is that you can fine tune them using your own instructions while keeping all data private and confidential. Why trust your data to someone else when you don't have to?A huge thank you to The Hated One for his tutorial.You can find his playlist for staying anonymous here:https://www.youtube.com/watch?v=G_QsQp7DyjE&list=PLR_ghQEN2SgDLpuLMLa_0hjJZgrlHoi0aBrought to you by NBTV team members: The Hated One, Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/sb6u-TpV-JAhttps://odysee.com/@NaomiBrockwell:4/BRENDAN-EICH:9As we rushed into the Web 2 era, privacy was left behind. There was a naive view that users could consent to something that was impossible to understand. The result was tracking and monitoring of every activity.I chatted to Brendan Eich, the creator of JavaScript, Co-Founder of Brave, and the Co-founder of Mozilla. We talk about how the privacy landscape evolved on the internet, and the future of our technology-driven world.00:00 The Serfs Have to Band Together!00:51 Why Privacy Matters04:30 Privacy Nihilism06:29 The Rise of Extensions11:48 Brave and Ads15:06 Privacy is Now Marketable16:31 Bridging the Divide Between Users19:58 They Are Profiling You21:50 Incentive for Government Control23:30 Tech Optimism24:48 Users Matter Most28:57 Companies Can Make a Big Difference31:47 UBlock Origin and Google33:23 There is No End to Security36:14 Braves Large Movement of Users37:37 Decentralization Pays Off38:00 Users Can Tilt Markets38:55 What the Future Holds39:39 Privacy AccelerationWe need more tools that make it possible to not only maintain privacy, but to still have a user-friendly experience at the same time. We, as users, need to fight back and demand it.Brought to you by NBTV team members: Lee Rennie, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/wcKtnnzsQGkhttps://odysee.com/@NaomiBrockwell:4/content-moderation:9In this interview from Al Jazeera on October 16th, 2024; I discuss the current state of global privacy legislation, ways that we can encourage free speech without censorship, and strategies for the future of privacy around the world.00:00 We Are Getting to a Real Scary Place00:30 Setting Scary Precedents Against Privacy03:17 Striking a Balance05:54 The Future of Privacy is Up the UsersIn an era where the web has converged on just a handful major companies that wield immense control over speech, we are seeing many independent voices drowned out. Instead of suppressing ideas, we can actually call out bad ideas for what they are and we can provide counterpoints. The best way to conquer bad ideas is with better ideas, not by suppressing ideas.Link to full interview: https://www.youtube.com/watch?v=sa1c16uTJVQBrought to you by NBTV team members: Lee Rennie, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/07-IsfTMujohttps://odysee.com/@NaomiBrockwell:4/Pegasus:d7Journalists, activists, and human rights defenders are being targeted and silenced daily by authoritarian governments that fear losing power. One of the deadliest tools used against them is Pegasus—a powerful cyber-surveillance weapon that puts lives at risk.In this interview, I sit down with Laurent Richard, founder of Forbidden Stories and co-author of Pegasus. His team broke the story on Pegasus spyware and built a global network to safeguard journalists working on dangerous stories. Learn how Pegasus operates, the fight to protect freedom of the press, and how we can combat digital surveillance before it's too late.00:00 CyberSurveillance is a Military Weapon01:19 Forbidden Stories04:28 Global Spyware Threat05:17 How Forbidden Stories Broke The Pegasus Story15:40 The Danger of Intelligence Spyware22:59 Privacy is Essential for Democracy26:09 How to Begin Change29:55 CyberSurveillance Needs Regulation32:39 This is Where We Are34:47 Governments Have a Vested Interest in Spyware39:44 Hope Remains43:04 There is a Lot to Do47:37 The Safe Box Network52:20 ConclusionCyber surveillance is a military weapon wielded against civilians, actually putting human lives in danger. We must protect journalists, activists, dissidents, and all vulnerable individuals from powerful, corrupt organizations as they risk everything to expose the truth. Together, we must signal to the world that we demand a future where technology serves us—free from the fear of surveillance.Special Thanks to Laurent Richardhttps://forbiddenstories.org/Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy:https://us.macmillan.com/books/9781250858696/pegasusBrought to you by NBTV team members: Lee Rennie, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/0PbL1GeClQIhttps://odysee.com/@NaomiBrockwell:4/Surveillance-watch:2The surveillance industry operates by design in a shrouded, opaque manner. It's intentionally difficult for the public to understand the vast and intricate network of companies, subsidiaries,partnerships, affiliations, and even the financial backers of data brokers and surveillance-as-a-service companies. I chat with the creator of Surveillance Watch, an activist from Bahrain whose website is a mammoth effort to lift the veil on this industry, revealing the names and connections of clandestine entities, how they are funded, and which countries are using their services.00:00 Data is Being Weaponized Against Absolutely Everyone02:46 Why Surveillance Watch was Created03:58 The Shroud of Secrecy09:26 Overview of the Surveillance Capitalism Industry14:31 Why People Should be Concerned21:06 Long Term Considerations23:03 Testimonial24:09 It Is Not Too Late to Change Online Habits27:24 A Society of Orwellian Double-Speak29:35 Privacy is Not Just About You33:38 The Chilling Effect of Pervasive Surveillance39:54 Explaining the Reality of Threat Levels46:08 It Is Naive to Dismiss Privacy47:38 Your Data WILL Fall Into The Wrong Hands50:46 Explore the Surveillance Watch Website51:53 Submit to Surveillance WatchThe Public is only just starting to understand how deep all of this goes, which is why sites like Surveillance Watch are so vital. It's an incredibly important tool to help people map out the surveillance apparatus in a way that they can really understand.https://www.surveillancewatch.io/Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/NciVkd6ddPohttps://odysee.com/@NaomiBrockwell:4/Zimmermann:fIn the early 90s, Phil Zimmermann, the godfather of privacy, released a groundbreaking encryption program called Pretty Good Privacy, or PGP. This software allowed people to protect their email communications with robust encryption. The government then investigated Phil for 3 years, claiming that by spreading PGP around the world as free encryption software, he was engaging in munitions trafficking and jeopardizing U.S. national security.The battle goes down in history as the first Crypto Wars, against encryption, and it was waged by people all over the world who believed that privacy was a fundamental right.PGP became the most widely used email encryption software in the world. And thanks to his effort to make sure encryption tools remain available to the public, we now have the ability to protect our privacy.But once again we find ourselves in another crypto war, with governments around the globe once again trying to undermine privacy.I chat with Phil about why he created PGP, the current state of global surveillance, and why we must fight for the future of privacy.00:00 Governments Live in a Golden Age of Surveillance00:58 Phil Zimmerman Introduction02:34 Phil's Motivation for Creating PGP05:19 What's at Stake if Government Abolishes Privacy10:50 The Risk of Not Standing Our Ground14:04 Surviving in a World Where Government Policy is Anti-Privacy15:15 How to Create a Groundswell Movement16:14 Highlighting Shifting Baselines18:40 We Need to Obtain and Use Privacy Tools NOW19:43 Governments are Pressuring Companies20:18 Phil's Parting Words of Advice22:08 Policy vs ActionEverything that we do is surveilled and it's not clear that democracy can survive governments having this level of omniscience. However, hope is not lost. By obtaining and using privacy tools now, we can preserve our right to privacy, and make a stand before it's too late.Special thanks to Phil Zimmerman, a true hero of the privacy space!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/rriStH1eTH0https://odysee.com/@NaomiBrockwell:4/Private-AI:fAI is already deeply integrated into our daily digital activities, whether we realize it or not, but it's a double-edged sword: On the one hand it can skyrocket our productivity and skillset. On the other, there are often serious privacy concerns to using it. Do you want to be able to use AI tools, without worrying that companies are collecting everything you're doing? In this video, I talk to two experts working on the privacy side of AI. We discuss the privacy risks of using AI, and how to protect ourselves -- exploring some of the most private platforms and looking at best practices.00:00 AI is Changing the World01:29 Privacy Risks06:09 Solutions07:36 Brave Leo13:00 Venice.ai18:22 Risks and Best Practices22:10 Are you a priv/acc?Especially in an age of AI, we need to be more mindful than ever of the consequences of leaking all of our data in online interactions. Luckily there are plenty of ways we can better protect our privacy. Including by making privacy-conscious choices when we use AI tools themselves. Caring about privacy doesn't mean we have to give up modern technology. Even privacy-conscious people can enjoy AI tools in their lives!Brave AI: https://brave.com/leo/Venice AI: https://venice.ai/Morpheus network: https://mor.org/Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, Reuben Yap, and Naomi Brockwell, with a special thanks to The Hated One The Hated One's anonymity series: https://www.youtube.com/watch?v=G_QsQp7DyjE&list=PLR_ghQEN2SgDLpuLMLa_0hjJZgrlHoi0aTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/T32XfRSaC0whttps://odysee.com/@NaomiBrockwell:4/disappearing-messages:5In today's digital world, nothing is truly secure. Imagine waking up to find that a hacker had posted every conversation you've ever had online. We don't need to keep a permanent trail of all of our digital conversations, that could be hacked at any time, and there are deep psychological effects when we do so. In this video, I make a case for using disappearing messages.00:00 Imagine THIS Nightmare01:48 Your Messages Are At Risk03:14 Damage of Exposure06:39 Psychological Impact08:28 How to Set Up Disappearing Messages09:04 Signal09:30 Whatsapp09:45 Facebook Messenger09:58 Telegram11:08 Session11:42 Protonmail12:44 Tips and Best Practices14:53 ConclusionWhether we're safeguarding sensitive information, limiting our exposure, or simply reducing the clutter of our digital lives, turning on disappearing messages is a small change with significant impact. Disappearing messages are a great tool in your privacy toolbox for this increasingly permanent digital age.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/4sfIBRTcRpUhttps://odysee.com/@NaomiBrockwell:4/HIPAA:7Most people think that HIPAA means that their medical records are kept private. But what if I told you that HIPAA doesn't protect your privacy at all?This is our first video in a series about medical privacy, specifically looking at legislation that stripped individuals of the right to consent to medical data sharing. We focus on what HIPAA actually is, how it came to allow our data to be shared without us even knowing, how we've been tricked into thinking we have privacy, and steps we can take to reclaim control of our medical data.00:00 The State of Medical Privacy is a Mess02:29 What is HIPAA07:39 How Your Data is Shared12:10 The Illusion of Privacy14:48 What Can We Do22:16 We Deserve Medical PrivacyWe deserve privacy in our medical system. Our health information is sensitive, and we should be allowed to protect it. Even while we fight for better medical privacy, please always prioritize your health. Special Thanks to: Twila Brase, Rob Frommer, and Keith Smith for chatting to us!List of doctors who have opted out of the surveillance system:https://jointhewedge.com/Twila's website: https://www.cchfreedom.org/patient-toolbox/Do you want to fight the system and lead a suit against medical data collection? Contact the Institute for Justice: https://ij.org/Keith Smith's Surgery Center:https://surgerycenterok.com/Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/aXhXkXcMXyMhttps://odysee.com/@NaomiBrockwell:4/Fish:e28What do Fish and Privacy have in common? This video will explain. Our expectations of privacy have shifted dramatically in the past few decades. What was once considered outrageous overreach has become normal, and we've lost sight of what a healthy amount of privacy even looks like. It's called shifting-baseline syndrome, first coined in relation to fish populations. This video is based on a fantastic essay by Bruce Schneier and Barath Raghavan: We take stock of how privacy expectations have changed, and think about whether this is really the future we want to be moving towards.00:00 Privacy is Like Fish - Huh?00:38 Our Perception of Privacy04:35 Fish???05:55 Shifting Baselines08:37 Is This the Future We Want?10:43 Privacy is Like My PlantA huge thank you to Bruce Schneier and Barath Raghavan for letting us reproduce their ideas in video form. Original essay: https://spectrum.ieee.org/online-privacyBrought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
https://youtu.be/s9Ux8DFgMSMhttps://odysee.com/@NaomiBrockwell:4/ditch-sms:1Most of our conversations are digital, and our privacy hinges on our ability to convince others to use a private messaging platform. Getting friends and family to switch isn't easy though!Here are some strategies you can try, ranging from educational methods, to downright sneakiness!00:00 We have all decided to never answer our phone again02:12 Its Easy02:47 Privacy Leaks04:29 Response Delay05:45 Missed Connection06:37 Daily Reward08:35 App-Switching Fatigue09:10 It's Worth the EffortConvincing people to switch to a more private messaging app can be tough, but it's definitely not something you should give up on. Persistence and patience are key. By encouraging better habits you really are making a more private world, starting in your own backyard.We got all our suggestions from Michael Bazzell's book, "Extreme Privacy": https://amzn.to/3BLZ1gqDigital version: https://inteltechniques.com/book7.html (non affiliate link)Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
https://youtu.be/c0ZAPaRddfohttps://odysee.com/@NaomiBrockwell:4/Fingerprint-unlock:eShould you use fingerprint unlock on your device? The answer is not going to be the same for everyone. In this video, I look at the benefits and tradeoffs of using fingerprint readers, and try to compare the security of fingerprint unlock vs a pin or password. A major factor to consider is actually what kind of device you have. 00:00 You Asked, I Delivered!00:56 What is Fingerprint Unlock02:13 Should You Use Fingerprint Unlock03:15 Convenience Consideration04:18 Shoulder Surfing Protections04:49 Biometrics are Forever06:30 Brute Forcing12:07 Coercion14:40 SummaryFingerprints are more like usernames than passwords. They're unique, static and identifiable as belonging to you. But Fingerprint security is also very convenient, and for many people shouldn't be ruled out as an option. We are constantly unlocking our phones all through the day. So choose something that will be sustainable for you and is justified by your threat model, otherwise you might drive yourself insane. There is no perfect answer when it comes to phone security, so make a decision based on your unique context.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi Brockwell.Thanks to the GrapheneOS team for always being super helpful!To support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
https://youtu.be/xILGdtI9NPohttps://odysee.com/@NaomiBrockwell:4/Veracrypt:9Our devices contain a treasure trove of private information. We have sensitive work documents, cherished family photos, archives of private communications. You can keep these digital files safe by using encrypted containers, which are secure digital vaults that will help keep your data private. In this video, we explain how use the free, open source encryption program VeraCrypt.00:00 Our Digital Files Are Precious03:29 VeraCrypt04:43 Mounting and Directories Explained06:11 Tutorial13:27 Benefits of VeraCryptOur personal data is the currency of the modern surveillance world. Locking away our personal files behind an encrypted barrier is not just a luxury - it's a necessity.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
https://youtu.be/FloGxOlMSyIhttps://odysee.com/@NaomiBrockwell:4/Phone-Contacts:9The humble Contact List in our phone is a goldmine of data. Each contact is filled with the personal information like names, numbers, email addresses, home addresses, birthdays, work details and social media information. It's the kind of information that data brokers salivate over because it allows unprecedented insight into consumer behavior, political leanings, and even potential vulnerabilities that could be exploited. The worst thing is, it's not even your information that's being taken -- When we don't protect our contacts list, it's the information that OTHERS have entrusted to us that we're sharing. In this video I talk about Contact Lists, why you might not want to store them in your phone or share them with other apps on your device, and finally I'll talk about more private ways to store them.00:00 Your Phone Compromises Your Contacts00:28 Overview00:39 Why Contacts Lists Are Important01:51 Who Sees Our Contact List05:37 Private Ways To Store Contacts06:23 Reviewing App Permissions06:57 Third Party Contact Apps07:53 Encrypted Contact Storage08:43 Graphene: The Ultimate Solution09:57 It's Time to Take Back Control!By disabling automatic cloud syncing, regularly reviewing and managing our apps' contact permissions, and using privacy-focused apps and services, we can reduce the indiscriminate harvesting of our social graph. Our contacts deserve to be treated with the utmost care and respect.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Kieran Mesquita, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellWatch all of the tutorials in our Phone Privacy Playlist HERE: https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NYTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
https://youtu.be/pA0zYTmi5ckhttps://odysee.com/@NaomiBrockwell:4/car-privacy-part-3:1We now know that the data collection in modern cars is out of control -- The question is, how does that data even leave your car? And what, if anything, can you do to stop it?That's what we cover in this video, Part 3 of our car privacy series: SIM cards, WiFi, and OBD ports. We also talk about how companies trick us into handing over our data, things that we can do to push back against this insane overreach that we've somehow normalized, and the giant legal loophole for cars that makes it super easy for law enforcement to collect your data without a warrant. 00:00 Your Car Saw What You Did in the Backseat!02:57 Don't plug in ANYTHING04:41 Satellite and Bluetooth05:47 WiFi06:29 SIM Cards08:22 Find out what's going on!11:10 Shady Tactics14:38 Challenging Data Overreach16:35 Car Warrant Loophole18:00 There is HopeThere currently are no easy fixes to the problem of car surveillance. Car manufacturers currently only see the opportunities that come from selling your data. Let's make sure they also see the opportunity of offering privacy as a feature, by making our voice heard!Special Thanks to: Andrea, Woody, Sam, and David for sharing their expertise!Check out YOUR vehicle's privacy report at: vehicleprivacyreport.comBrought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellWatch Part 1 of our Car Privacy Series:https://www.youtube.com/watch?v=eIryvRwxp9AWatch Part 2 of our Car Privacy Series: https://www.youtube.com/watch?v=Ff9pmaSdZV8To support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the Show.
https://youtu.be/x6jxxcv-d4Qhttps://open.lbry.com/@NaomiBrockwell:4/privacy-screen:cA privacy screen is an ESSENTIAL privacy tool for every tool box.In this video I explain what a privacy screen is, how the technology works, how to apply one to your devices, and go over important tips -- especially if you have a fingerprint reader on your phone screen.00:00 A SPY's favorite tool01:15 What is a Privacy Screen?03:11 How it Works04:31 Tutorial06:03 IMPORTANT TIPS: Fingerprint readers07:54 ConclusionA privacy screen is a simple, affordable way to better protect ourselves from shoulder surfers and would-be thieves. You never know who might be looking over your shoulder, so use a privacy screen to protect your sensitive and private information.Watch all of the tutorials in our Phone Privacy Playlist HERE:https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NYBrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaSupport the Show.
Did you know that apps on your phone can see which other apps you have installed? And that apps can talk to each other and share information, without you realizing? In this video we show you how to stop apps communicating with each other, and look at the scoped storage and sandboxing of apps in GrapheneOS, and what it does and doesn't protect against. 00:00 Apps Can Talk to Each Other02:18 Sandboxing and Using Scored Storage on GrapheneOS04:58 Secondary Profiles10:24 Google Play Services: How To Stop Their Tentacles12:10 Setting Up 2nd Profile Tutorial13:40 ConclusionSecondary profiles are a great privacy tool to add to your toolbox. It's super opaque what the apps on our phones are doing, and using something like GrapheneOS really helps you reclaim your privacy by default.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellWatch all of the tutorials in our Phone Privacy Playlist HERE:https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NYTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the Show.
https://youtu.be/Ff9pmaSdZV8https://odysee.com/@NaomiBrockwell:4/selling-your-car:6Cars are no longer dumb machines -- They're smart devices with hundreds of computers bolted on top that collect information about our activities. Some car companies have even explicitly said in their privacy policies that they collect information about your sexual activity!Given that so much information is stored in our car, what happens when we sell it? Do we just hand this sensitive information off to the next owner? And given the remote capabilities of modern cars, how do we make sure the previous owner can't still access our data when we buy a used car?Here are steps you MUST take when you buy or sell a used car.00:00 Cars Collect Info on Your Sex Life!02:25 Selling Your Car05:18 Renting a Car07:32 Deleting Data from the Head Unit09:11 Buying a Used Car11:59 Asserting Data Rights12:39 Recap13:51 ConclusionNow that we're starting to get a glimpse of what's going on under the hood of car data collection, we can start pushing back against it.Special Thanks to Andrea, Woody, and Sam for lending their expertise!Video 1 in this car privacy series:https://www.youtube.com/watch?v=eIryvRwxp9ABrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the Show.
https://youtu.be/-1khYr697jMhttps://open.lbry.com/@NaomiBrockwell:4/Adv-Data-Protection:eThanks to powerful marketing, privacy is something we've come to immediately associate with Apple. But your iCloud is probably NOT as private as you think. Last year, Apple added E2EE for iCloud backups, with a tool called "Advanced Data Protection”. This setting means that your documents, photos, and other personal information in iCloud are kept private and out of the reach of even Apple itself. BUT, this setting is NOT turned on by default. Unless you have specifically turned on the setting, and set backup users or codes, everything in your iCloud can be read by Apple. And regardless of whether Advanced Data Protection is enabled, some things in the Apple ecosystem are never E2EE, and it's important to know what they are.In this video we explain exactly what is being protected with Advanced Data Protection, how to turn it on, its limitations, and other options that you might use for your backups instead.00:00 Your iCloud is NOT as Private as you Think01:49 Advanced Data Protection Explained02:37 Set Up04:34 Limitations05:48 Alternative Backup Options06:52 SummaryDon't presume that your iPhone is more private than it actually is. If you use Apple's iCloud, absolutely make sure that you have Advanced Data Protection turned on. Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuShout out to All Things Secured - another great resource for digital privacy exploration!https://www.youtube.com/@AllThingsSecuredIf you want awesome iOS and MacOS security and privacy deep dives, I highly recommend following the Mysk research team:https://twitter.com/mysk_coBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the Show.
https://youtu.be/VaUsJvUMUgEhttps://open.lbry.com/@NaomiBrockwell:4/OSINT-photos:8Every picture and video you post spills secrets about you, maybe even revealing where you live. The process of connecting all these dots of our online activities is a practice known as Open Source Intelligence, or OSINT. It's the practice of using all the information available online such as public records, reviews we write, email addresses, usernames, location check ins, and social media, to link together the breadcrumbs of someone's digital life. Jose Monkey has 1.7 million TikTok followers, and shows us how he finds people's exact location just by using OSINT on their videos. We teach you best practices for posting photos and videos online, and how to make sure that you're not giving away more information than you intend.00:00 Every Pic You Post Spills Secrets01:11 OSINT: Breadcrumbs of your digital life02:22 Finding people's EXACT location from videos02:54 Tools to track people05:45 Tips to Protect Yourself When Posting09:23 Beware of the Culture of Oversharing09:55 ConclusionThe practice of using OSINT to piece together our online trail is incredibly powerful, and can lead curious minds right to our digital doorsteps.Special Thanks to Jose Monkey for his delightful expertise and contribution to this piece!You can find his channels here:https://www.youtube.com/channel/UCOZnlN6M4FVIm0_fbrEjUYQhttps://www.tiktok.com/@the_josemonkeyHow to remove metadata from photos:https://youtu.be/OSln3MliFyABrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/C0CyuDEuLsEhttps://open.lbry.com/@NaomiBrockwell:4/Financial-surveillance:eFinancial privacy has practically vanished over the last 50 years. Most people are in denial about it, and still believe that their relationship with their bank or their credit union is confidential -- the reality couldn't be further from that. In this video we walk you through the history of how financial privacy slowly disappeared, and how we built a gargantuan financial surveillance system that no one really understands the extent of.00:00 Financial Privacy is an Illusion02:14 Pre-197003:23 Bank Secrecy Act08:02 Annunzio-Wylie AML Act10:38 Patriot Act12:51 $600 Rule16:17 The Future Ahead18:24 Is This the World We Want?We have slowly built a gargantuan system of unchecked financial surveillance, and it's time to question whether this is the world we want to live in. The first step is just making people aware of how far financial surveillance norms have shifted in just a few decades.Special Thanks to Nicholas Anthony of the Cato Institute for sharing his expertise with us!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/0RhCrb8OCjwhttps://open.lbry.com/@NaomiBrockwell:4/Impact-of-surveillance:bThe current state of privacy is bad. Surveillance today is pervasive, and the effects of this surveillance on the fabric of society is profound. We need to make sure we're fully aware of the consequences of creating a world without privacy.If we want to reclaim privacy in the digital age, the answer is not to throw out our devices, it's to truly embrace technology, and leverage all the new, cutting edge privacy and encryption technologies being developed every day. We are empowered human beings. And many of us aren't just passive enjoyers of technology -- we have a say in the direction that this technology will take, and are helping write its future. It's in our power to make sure that the future we create is the best possible timeline, not the worst.So let's be intentional about the kind of future we want.00:00 1984 vs Reality05:36 Current State of Privacy10:43 Surveillance & The Risk To Freedom18:52 Psychological Impact of Pervasive Surveillance23:37 Recap So Far24:14 What Can We Do33:45 Make Privacy a Human Right35:45 Q&A - Voluntary Surrender of Data39:52 Q&A - “I Have Nothing To Hide”43:45 Q&A - Living up to the title “Private Citizen”44:24 Q&A - Data Hoarding Liability46:45 Q&A - SnapChat49:18 Q&A - How to Change Work Privacy Culture51:18 Q&A - Staying Private in a Cashless SocietyBrought to you by NBTV members: Will Sandoval, Cube Boy, and Naomi BrockwellSpecial thanks to Cactus Con for having me, and helping spread awareness about the importance of privacy!To support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/_0EiqiPuR4Qhttps://open.lbry.com/@NaomiBrockwell:4/Little-Snitch:7Our computers constantly talk to servers across the internet without us realizing, sharing information about our activities. Most of us don't even realize how many programs are silently connecting to the internet and sharing data. It usually happens without our explicit consent. But we can block these connections. On Mac, you can use a program called Little Snitch.In this video we look at the data is silently transmitted from our computer through things like telemetry, and show you how to use Little Snitch to regain control over the data leaving your computer.00:00 Your Computer's SECRET WHISPERS01:39 Data Leaving Your Computer04:02 Little Snitch Walkthrough10:13 Bazzell's Settings10:35 A Note About Alerts and Rules11:48 ConclusionUsing a reverse firewall like Little Snitch can be very revealing about how much data is silently being transmitted from our computer. Simply becoming aware of this can help us make better decisions with the tech we use.Our suggestions come from privacy expert Michael Bazzell, and we highly recommend you check out his site: https://inteltechniques.com/blog/2021/08/18/macos-telemetry-updateLittle Snitch can be found here: obdev.atThere is a similar product that apparently doesn't have the same granular functionality but is free called Lulu. I haven't tested it though, so you're on your own there!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/n_kTzu8NEyghttps://open.lbry.com/@NaomiBrockwell:4/Back-up-Photos-privately:7Photos these days usually stay in digital form. Sometimes we back them up to the cloud for safekeeping: but who is getting access to your sensitive images when you do so? In this video we look at the built-in photo backup options on iPhone and Android, and how private they really are. We also explore more private backup solutions, and how to set them up to happen automatically so that you never have to worry about losing your precious memories ever again. There are some really simple solutions that don't require any technical skill. 00:00 Who ELSE has access to your private photos00:55 iPhone Default Backups02:31 Android Default Backups03:13 Graphene Default Backups04:35 Proton Photos05:42 Self Hosting Photo Backups07:49 Synology11:11 Nextcloud13:09 SummaryDigital memories have become a central part of our lives. I'm really excited that you are treating them with the privacy they deserve. Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/rOtMGJVp2MUhttps://open.lbry.com/@NaomiBrockwell:4/decentralized-storage:6We put a lot of trust in cloud storage providers, presuming that they'll keep our data safe. But what if they're hacked? Or their servers go down? Or what if they decide to just kick us out of our accounts, and we lose all our emails, files, contacts, photos...There's another big problem with centralizing all our storage on a single platform: it turns out the whole world is doing it. Most of the world's data is stored by just 3 companies: Amazon, Microsoft, and Google. In this video we're going to talk about how a handful of companies came to control most of the world's data, how this could put our data in danger and make censorship easier, and we'll explore the new world of decentralized storage, allowing control of the internet to be distributed back to individuals.00:00 The BIG problem with Cloud Storage02:11 The Move Towards Centralized Storage04:13 Risks of Data Centralization07:40 Decentralized Storage Options10:27 The DJ and the War Crimes11:44 Conclusion13:19 WTFWe need to make sure that we are protecting our from loss and censorship. Decentralized storage allows us to return to the ideals of the early internet, that promised a connected world where information flows freely.Special Thanks to Adam Rose and Matt Hamilton for lending their time and expertise!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/RyirQOCUUK8https://open.lbry.com/@NaomiBrockwell:4/Calyx:7Your phone is more than just a communication tool; it's a powerful tracking device, and the SIM card inside is a key reason why. I don't actually have a SIM card in any of my phones, and in this video I'll explain the reasons why. I'll also talk about alternative ways that you can still have connectivity on the go without a SIM in your phone, and I'll dive into the downsides of not having a SIM in your phone.00:00 Your Phone is a Tracking Tool01:12 What is a SIM01:44 Location Tracking02:36 Covert Data Transmission06:35 Split Tunneling08:40 Internet-Only Phones10:52 Mobile Hotpots11:28 Benefits of Siloing SIM on a Separate Device14:28 Calyx Hotspots16:33 Downsides18:36 Support the Calyx Institute20:30 SummaryHaving a SIM card in your phone has a lot of privacy downsides. But not having a SIM in your phone definitely has tradeoffs. You'll have to assess whether this is something that's right for your life. Special Thanks to Nick Merrill and David Allan Burgess for lending their time and expertise!You can learn more about Calyx here:https://calyxinstitute.org/Previous video in this phone privacy series, explaining how phones without a SIM also talk to cell towers, but why it's not as extensive: https://youtu.be/A9DPDE0FZeQ?si=3h5nYyKvV_p-JngrThanks to the Mysk team for their important researchhttps://twitter.com/mysk_coBrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/eR7D6Fx0fTQhttps://odysee.com/@NaomiBrockwell:4/Privacy-in-the-Digital-Age:1Many of us don't fully grasp the importance of privacy for a free society.We allow total invasion of our privacy, making a bet that we and those in power will stay on good terms, so this data will never be used against us. But as Snowden said, regimes come and go, social norms change, but that data is forever.Privacy is not a tool for criminals, as many would have you believe. It's essential for regular people, to allow them to dissent, have independent thoughts, hold people accountable without fearing retribution.In this video, we explore the crucial link between privacy and a free society, and why we must immediately fight to reclaim the narrative around privacy and surveillance. 00:00 Intro00:33 Historical Losses of Privacy01:40 Privacy Loss Happening Right Now03:11 Why Protecting Privacy NOW is Essential05:46 People Become Targets Everyday06:51 Nefarious Truth About Data Collection08:40 The Current False Narrative on Privacy09:33 What's at Stake?10:12 What You Can Do Right Now10:41 ConclusionThe erosion of privacy is not inevitable. But we must start to care, and stop normalizing surveillance. This essay originally appeared in Dweb Digest:https://ffdweb.org/digest/why-we-need-to-fight-for-our-privacy/Learn more about the Filecoin Foundation's efforts to promote a more free internet here:https://ffdweb.org/Brought to you by NBTV team members: Lee Rennie, Sam Ettaro, Cube Boy, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/80gv6opFy3ohttps://open.lbry.com/@NaomiBrockwell:4/Santa:e9fThe holidays are upon us, and it's time to ask some SERIOUS questions:Why do we allow Santa to spy on us through the year to see if we're being good or bad?Why do we allow him to dictate the behavior of our children??In our final video of the year, we explore the history of Santa's inter-generational ploy to extend his unnatural life through the collection of our data.We also give you suggestions for how to protect your privacy this festive season!00:00 What do we really know about Santa?01:33 Santa's Sinister Surveillance02:56 Elf-Enabled Espionage Experts03:38 Jolly Judgment Jurisdiction04:20 Chimney Check Countermeasures05:17 Final Message for the Year05:46 A Special Holiday TreatOn behalf of the entire NBTV team, we would like to thank you for all of your support this year! And sorry we ruined Christmas
https://youtu.be/A9DPDE0FZeQhttps://open.lbry.com/@NaomiBrockwell:4/location-tracking:7Our phones are complex devices that leak our location in countless ways.We explain 3 essential settings for protecting your location data:- Airplane Mode- Location Services- WiFiWe dive into how they work and try to demystify location tracking, hopefully leaving you with a better understanding of how to use these tools in your privacy toolbox.00:00 Do you know how to stop location tracking?02:28 Airplane Mode07:58 Location Services09:54 WiFi12:10 Summary12:39 BLE and Faraday Bags13:10 Don't throw out your devicesOur phone can be both an ally and inadvertent foe in the modern digital landscape. There are many other settings you can toggle, depending on your apps and operating system, to help decrease how much location data you reveal, and we'll go through these in another video. This can all go a long way to helping you fortify your digital life.Brought to you by NBTV team members: GrapheneOS, Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/FDxv04k3Zg8https://open.lbry.com/@NaomiBrockwell:4/tech-innovation:6How technology can help us carve out more freedom in our daily lives NOW.00:00 Crypto as one of the most potent tools for freedom we've ever seen9:05 Can crypto and traditional finance coexist?15:35 Importance of Financial Privacy16:50 CBDCs and the dystopian future22:15 Importance of Privacy in a free society24:28 Have the tables of power already turned given all these decentralized technologies?30:27 How to we build a better future?37:48 Q&AHuge thank you to Atlas Network for hosting the panel, and Erik Voorhees, Jerry Brito, and Paul Brigner for their expertise. To support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/wg00QkcpOOMhttps://odysee.com/Graphene-Deep-dive:5818aefbaa107d89bc66e1dd196bbb8c8ccbcb73Your phone is your portal to the digital world, where all kinds of sensitive activity happens. It's important to make sure your phone isn't leaking all this information about you, and the operating system you use makes a huge difference. Android and iOS collect a huge amount of data from you, so in previous videos we've explained how to instal GrapheneOS instead.In this video we dive into detail about what makes Graphene great for privacy, explain how to get started and what you need to know before you even buy your phone, and walk you through how to optimize your settings to really get the most from your device.00:00 Intro01:19 Overview01:52 Purchasing the Phone02:10 Pixel Hardware Benefits04:33 Warning about Carrier Contracts06:32 Cell service07:09 Mobile Accessories07:46 Settings Tutorial16:26 Out of the Box Benefits18:03 Other NBTV Resources18:32 ConclusionHow to instal GrapheneOS:https://www.youtube.com/watch?v=rIFBN390clQPhone privacy playlist:https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=PdcEZLPdOs776AUUA great GrapheneOS "next steps" guide:https://github.com/Scrut1ny/GrapheneOS-GuideMichael Bazzel's phone privacy book:https://inteltechniques.com/book7a.htmlPhone privacy is important, and Graphene does a great job at helping you reclaim more control over your digital life.Brought to you by NBTV team members: Scrut1ny, Jonathan Tomek, GrapheneOS, Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/zH9LzC-djoshttps://open.lbry.com/@NaomiBrockwell:4/Twiter-e2ee:dX, the platform formerly known as Twitter, rolled out "encrypted messages" this year!We explain how to use it, who is eligible, but we also dive into the nitty gritty of how this encryption has been implements, and why we don't think you should trust it for anything sensitive. There are better E2EE messaging apps out there.00:00 X introduces Encrypted Messaging02:53 How to Send Encrypted Messages on X03:30 Who Can Use X's Encrypted Messages?03:57 Should You Use X's Encrypted Messaging?06:13 Deep Dive: How They've Implemented It09:54 Problems12:34 ConclusionX's introduction of encrypted messaging is long overdue, and a very welcome feature: It not only brings privacy to a lot more people, but it's also a signal to the entire tech industry that privacy is important. Just be careful not to place too much trust in their encrypted messenger: For anything sensitive, we recommend using a platform with more robust privacy features.Huge thanks for Matthew Garrett for writing this fantastic summary of the issues:https://mjg59.dreamwidth.org/66791.htmlhttps://twitter.com/mjg59Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/V2WrDZnk33ghttps://odysee.com/@NaomiBrockwell:4/Strava-v6-LBRY:bFitness apps help us keep track of our health, but they're also a privacy nightmare. If you're not careful with how you use it, it can even put you in danger.In this video we explore how they leak all kinds of information about us, how malicious actors scrape data from these apps to target people's locations, and we look at their hidden settings that you might not realize are turned on.00:00 Intro01:05 Overview01:34 Strava3:03 Jack Rhysider's home address EXPOSED5:03 DANGERS of STALKERS05:41 Military Bases EXPOSED07:35 Honey Pots for Scraping User Data08:51 CREEPIEST feature of all!10:34 Current State of Fitness Trackers13:03 What Can We Do16:19 ConclusionWe can still have cool things, without normalizing data collection. If companies are going to collect all of our data, it's time we start holding them accountable when they don't protect that data or are reckless with how they use it. We need to start telling companies that privacy is important, and maybe they'll start to listen.Check out Jack Rhysider's awesome podcast Darknet Diaries:https://www.youtube.com/@JackRhysiderDarknetdiaries.comBrought to you by NBTV members: Will Sandoval, Lee Rennie, Cube Boy, Reuben Yap, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/y4brX6x3mrMhttps://open.lbry.com/@NaomiBrockwell:4/Keyboard-privacy:1How private is your phone keyboard?Smartphones allow us to intimately communicate, do sensitive work, and access the world around us by tapping on a screen: The gateway to this world is the keyboard. It's where we type our searches, our credit card details, our passwords. You'd better hope the keyboard you're using is private, and not sending off your keystrokes somewhere else. In this video we dive into keyboard privacy, and dive into some of the most private and least private keyboard options. 00:00 Intro01:10 Virtual Keyboards Explained02:21 Third-Party Keyboards03:05 How to Tell if a Keyboard App is Safe06:26 These Keyboards Leak Your Data!08:12 Apple's iOS Keyboard11:04 Google's GBoard12:51 MORE PRIVATE OPTIONS13:02 Graphene OS14:22 AnySoftKeyboard14:50 OpenBoard15:18 FlorisBoard15:30 SimpleKeyboard16:00 Fleksy16:42 Stay Vigilant18:00 YES IT'S OK THAT I PRONOUNCE DATA THIS WAYA third-party keyboard app isn't just something you should add to your phone because it offers some cool features. It's a critical decision that can undermine the privacy of your entire device. Choose wisely.Special Thanks to for their wonderful contributions to this piece!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval Scrut1ny, Reuben Yap, Alex Baer, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.media#keyboards #phone #privacy #tech #surveillanceSupport the show
https://youtu.be/eIryvRwxp9Ahttps://open.lbry.com/@NaomiBrockwell:4/Car-Tracking:7It's worse than you realize. In this video we dive into all the types of data your car is collecting about you: from video footage, microphone recordings, location data, biometrics, all the way to files/contacts/photos ingested from your phone!00:00 Cars are NO place for a private conversation!02:11 What data is our car collecting?05:41 Video footage06:16 Microphones08:09 Location08:40 There's a SIM card in your phone, sending off all your data!10:01 Telematics10:56 Sensors: Capturing weight, emotions, etc11:10 DON'T CONNECT YOUR PHONE TO YOUR CAR!13:00 Who is getting access to our data?14:06 This is a huge problemThis is the first video in a series we're doing on car privacy. Later in the series we examine:- how easy it is to hack modern cars- trackers in cars that you had no idea existed- the perverse incentives that drive companies to collect as much data about us as possible- the history of when this all started- dangers of used cars: the previous owner of your car might still have access to all your car's remote features, tracking tools, and cameras! - how to wipe your own information and location history from your car before you sell it- how to opt out of this collection and better protect yourselfWe really need to get a conversation going around car privacy, and increase awareness. It's so important we push back against the normalization of these practices, starting now. Special Thanks to Andrea Amico, Dale Wooden, Sam Curry and Ghost Exodus for lending their expertise to this piece!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Ghost Exodus, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
https://youtu.be/HYAQYbE63wohttps://open.lbry.com/@NaomiBrockwell:4/Creating-a-better-internet:9The internet has fundamentally transformed the way we communicate and access information. But while it lifts us up, it has also become the most potent enabler of totalitarian surveillance that the world has ever seen.In this talk, I explore the privacy implications of our growing digital world, and the kind of future we are paving the way towards. I also dive into what we can do today to try to ensure a better future.00:00 The Internet's Double-Edged Sword03:33 Current State of Privacy07:46 Effects of Pervasive Surveillance18:22 The Normalization of Surveillance and its Psychological Effects25:00 Recap So Far25:34 What Can We Do TODAY for a Better Tomorrow33:54 ConclusionAs we celebrate the marvel that is the modern digital world, it's vital we recognize the internet's dual nature: it's as much a beacon of enlightenment as it is a potential tool for surveillance. History is riddled with instances where powerful entities have misused it to target the vulnerable and the voiceless. As we craft the web's future, let's not just innovate; let's protect.Every line of code, every infrastructure choice, every innovation can not only push the boundaries of what's technologically possible, but can also uphold the fundamental right to privacy for billions of people across the globe.Let's create a better internet!Brought to you by NBTV members: Will Sandoval, Cubeboy, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.media#technology #freedom #surveillance #privacy #internetSupport the show
https://youtu.be/OR8SmnVSLCghttps://open.lbry.com/@NaomiBrockwell:4/Youre-a-target:a"I'm not important, why would anyone target me?"The internet is a war zone filled with people actively trying to scrape all of your data and attack you with scams. But you're not being singled out: Scammers target everyone. They're indiscriminate, and you will inevitably fall into their wide net. In this video I explain how perceiving yourself as a low-value target actually makes you an ideal target for both scams and data collection. I also explain how you can better protect yourself.00:00 Intro00:37 Overview01:02 The Illusion of Digital Insignificance06:33 You Are Not As Careful As You Should Be08:34 How to Protect Yourself11:57 ConclusionBy underestimating our digital importance, we put both our privacy and security at greater risk.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show