https://youtu.be/HYNZKQZEHoU https://open.lbry.com/@NaomiBrockwell#4/Getting-MULTIPLE-PRIVATE-Phone-Numbers#5 Our cell number is tied to everything we do. Most of us have had our cell phone numbers for many years, even decades, and we hand it out to everyone: to merchants, healthcare providers, social media accounts. That number can become associated to us like a social security number, and it allows all our interactions to be correlated. We need to ditch the idea that we have just one number our whole lives, that we give to everyone. In this video we’re going to give an example of a clean up strategy you can use to lock down your existing number, and create multiple VoIP numbers not associated to your real world identity, that don’t tie all your activities together. 00:00 Why Handing Your Cell Number Out Is Dangerous 02:36 VoIP vs Cell Number 05:16 New Phone Strategy Overview 05:47 Porting Existing Number to VoIP 06:17 Number Porting/SIM Swap Attacks 07:23 Google Voice Porting 08:24 VoIP Communications are NOT PRIVATE 10:10 New SIM 10:26 Creating Multiple VoIP Numbers 12:02 MySudo Note: The specific products mentioned are available in a few countries including America, but the overall ideas that you should never hand out your cell number, should lock down existing cell numbers by porting to voip, should get a new sim phone number you don't share with anyone, and should only use voip numbers going forward, are universal concepts. Hopefully this video will help you choose the right strategy for wherever you are based! Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.media Support the show
Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests. In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you. Main takeaways: Turn your WiFi OFF when you're not using it Don't automatically connect to WiFi networks Forget networks after joining them Keep your OS and device updated 00:00 Intro 01:00 How WiFi connections work 04:29 Hidden networks 05:49 Why broadcasting SSIDs is a privacy nightmare: Tracking 07:45 Why broadcasting SSIDs is a privacy nightmare: Exposes Private Info 09:06 MOST IMPORTANT PART OF THE VIDEO: malicious connections 11:03 How to protect yourself 13:11 Summary Research paper from Johanna Ansohn McDougall: https://arxiv.org/pdf/2206.03745.pdf Video from Modern Rogue: https://youtu.be/NkNgW3TwMy8 Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.media Support the show
Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience! Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad. 00:00: Intro 01:28: Why look for alternatives? 03:04: Cryptpad Deep Dive 06:34: Cryptpad TLDR 07:15: Skiff Deep Dive 10:50: Skiff TLDR 11:03: Summary Both platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend! https://cryptpad.fr/ https://skiff.com/pages Huge thank you to Andrew Milich for his time! Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.media Support the show
When traveling, your device may be at risk of confiscation by authorities, and that means a lot of your sensitive data is at risk. In our previous video we discussed how to keep your data safe, and one tool we mentioned is called "phone pair-locking". This prevents a forensics machine from connecting to your device to analyze it, and also prevents anyone making a copy of your phone. In this video, we will take you step by step through the process of locking your phone to a trusted computer. WARNING: This process will permanently wipe all data from your phone, so proceed with caution! NOTE: This process is only available for iOS devices 00:00 Intro 00:33 What is Phone Pair Locking? 01:41 What is Rooting? 2:08 Warning 2:32 Setup Supervised State 3:06 Download Apple Configurator 03:19 Main Tutorial Start 04:24 Create a Profile 06:07 Apply Profile to Phone 07:05 Helpful Tips and Considerations 08:33 Conclusion Huge thank you to Michael Perklin for his expertise! Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.media Support the show
Traveling with digital devices can be risky -- sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds. For anyone who wants to maximize privacy, here are 6 tips for traveling with electronic devices. The final tip is “phone pair locking”, where, even if your phone is taken by security, it can't be connected to any forensics machines or copied. 00:00 Intro 01:49 How Phone Pairing Threatens Your Privacy 03:56 How to Protect Your Data 04:00 Power Off Devices 05:32 Silo Data 06:13 Don't Draw Attention To Yourself 07:04 Protect Your 2FA Seeds 07:25 Configure Your Pin Settings 08:28 Phone Pair-Locking Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: htt...
It says on the Big G's website: ‘We do not sell your personal information to anyone’” The truth is, they ARE SHARING your personal and sensitive information, and being compensated handsomely in return. But what’s ACTUALLY going on in this exchange is far WORSE that you can possibly imagine. I chat with Bennett Cyphers from EFF, and Johnny Ryan from the Irish Council for Civil Liberties, about what is actually being done with your personal information and real-time location data. 00:00 "We Don't Sell Your Data" 00:36 How Do They Make Their Money? 01:32 Real-Time Bidding 03:22 How the Data is Collected 04:10 What Data is Collected? 05:27 Which Companies Get Your Data? 06:38 WHAT Do These Companies Do? 08:58 How Is All This Possible? 10:06 Are They Selling Your Data? 10:31 How Can We Protect Ourselves? Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.media Support the show
Tracking links are a way for sites to track you across the web. They usually look like super long strings of random numbers attached to the end of normal URLs, and companies use them to build up dossiers on people based on their browsing habits. And they can reveal VERY sensitive information about you! Luckily there are many tools available to help you strip them out and protect your privacy. 00:00 What are Tracking Links? 02:50 How to Spot a Tracking Link 05:09 Sneaky ways sites track you 05:59 How to Stop Tracking Links 06:27 Debouncing 07:22 Unlinkable Bouncing 08:56 BEST Tip for Stopping Tracking Links Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.mediaSupport the show
VICE has a great article explaining how internet service providers quietly share detailed information about network traffic. It's called "netflow data" and they can even trace traffic through VPNs. But the scary part is how many people that data is then shared with. We dive into the details. 00:00 Intro 01:45 ISPs and Netflow Data 05:47 What is netflow data? 08:22 What is done with YOUR Data? 15:29 "We don't give away all your data... we promise" 20:49 Palo Alto Networks has access to 80% of Global Flows 22:37 Not all ISPs are guilty 26:32 Senator Wyden’s Pushback 28:05 Snowden Revelations 29:00 Stay Vigilant! 31:08 Outro Article from VICE: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru Brought to you by NBTV members: Will Sandoval and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.mediaSupport the show
Apple’s iCloud Private Relay was unveiled in the middle of last year, and it made a big splash in the tech community. It makes browsing using Safari, Apple’s web browser, more private and anyone who has a paid iCloud account can turn it on. For the average user, it seems to be a huge step forward for privacy. But does this mean you should add it to your security toolbox? We’ll dive into how private relay works, all the pros and cons, and how it compares to VPNs and Tor, so that you can decide whether it’s the right fit for you. 00:00 - Intro 00:47 - VPNs and TOR: What are they? 02:58 - How Privacy Relay Works 05:03 - Apple’s Second Servers 05:36 - Private Relay’s Three-fold Outcome 06:15 - Pushback 06:54 - My Recommendation 07:49 - Privacy Comparison 08:40 - Summary Private relay is a significant upgrade for the average user, but there are caveats that a privacy-conscious person should be aware of. Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.mediaSupport the show
A leaked document from the EU, proposing new regulation, describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR. The proposal is for a new mass surveillance system that will read private text messages, not to detect CSAM, but to detect “grooming”. It would mandate scanning of encrypted messages for CSAM material. Once you open up “machines reading your text messages” for any purpose, there are no limits. Matthew Green, renowned security expert and cryptography professor, says: "Let me be clear what that means: to detect 'grooming' is not simply searching for known CSAM. It isn’t using AI to detect new CSAM, which is also on the table. It’s running algorithms reading your actual text messages to figure out what you’re saying, at scale." Matthew and I dive into everything you need to know. 0:00 Pre-roll 0:53 Intro 2:00 The EU SILL SCAN Your Computers 2:23 Matthew Green 4:12 System will READ text messages between people to try to detect "grooming". 7:52 "This is not voluntary." 18:47 Targeting dissidents and election disinformation 23:40 Apple's CSAM-scanning proposal 27:38 Decentralization: "They can't win." 30:55 Quiz Winner: Congratulations SpeedRacer111! 32:40 Show Out and Thanks EU report: https://ec.europa.eu/home-affairs/system/files/2022-05/Proposal%20for%20a%20Regulation%20laying%20down%20rules%20to%20prevent%20and%20combat%20child%20sexual%20abuse_en_0.pdf Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi Brockwell To support NBTV, visit https://www.nbtv.media/support (tax-deductible in the US) Sign up for the free CryptoBeat newsletter here: https://cryptobeat.substack.com/ Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice. Visit the NBTV website: https://nbtv.mediaSupport the show