
Surveillance Coins Are Coming
In this video Naomi Brockwell: NBTV chat with Marta Belcher, President of the Filecoin Foundation, about how CBDCs work and are different from the digital money we currently use, why CBDCs are dangerous for a free society, and what you can do to protect yourself as we usher in this new era of digital finance. Scary […]
Read More
Essential Privacy: Cell Numbers and Email Aliases
This video is from Naomi Brockwell: NBTV. If you want to take your digital privacy to the next level, you need to look at VoIP numbers, Email Aliases, and DNS. In this presentation we look at how to reign in the digital exhaust you’re leaving behind you in your daily life.
Read More
Why You Should Use an Email Alias!
This video is from Naomi Brockwell: NBTV. We use our personal email for everything we do: for purchases, for newsletter sign ups, at the doctor’s office, for government websites, and more. This one unique identifier links all our activities together, and is a huge privacy concern. You should use a UNIQUE email address for everyone […]
Read More
Dump Google Drive and iCloud! Easy Private Cloud Solution!
This video is from Rob Braxman Tech explains why private cloud is back in style. Why expose your data to third parties? You can access your data at home and over the Internet with an easy to set up solution that requires no networking skills and limitless drive space. And with no subscription to a […]
Read More
Sony’s Impact on Internet Censorship
Naomi Brockwell: NBTV explains Sony is attacking critical infrastructure of the internet, why this is terrifying for the future of free online expression and access to information, and what you can do to help.
Read More
What are ChatGPT’s Plans for World Domination. Just ask!
Rob Braxman Tech has some predictions about AI. You’re not going to like them, It is my prediction that AI will be used deeply for mass surveillance and it is already embedded in iPhones and being considered as a law in the UK. But let’s find out what ChatGPT thinks. Let’s get the details of […]
Read More
Linux Always Finds a Way
Today Switched to Linux talks about some changes in Linux and why we do not need to worry about the changes on a regular basis.
Read More
2FA Isn’t Secure – Here’s What You Need Instead!
- Frank
- March 5, 2023
- 2 factor authentication security key
- 2fa
- 2fa authenticator
- 2fa key
- 2fa key setup
- 2fa security
- 2fa setup
- 2fa solution
- google authenticator app
- how to set up a 2fa key
- how to set up yubikey
- how to use yubikey
- online security
- online security tips
- Privacy
- security key
- setting up a 2fa key
- two factor authentication
- what is two factor authentication
- yubi key setup
- yubikey 5 nfc
- yubikey 5ci
- yubikey authenticator
- yubikey review
Shannon Morse explains why two factor authentication is no longer good enough. References: https://fidoalliance.org/specs/u2f-specs-1.0-bt-nfc-id-amendment/fido-u2f-implementation-considerations.html#token-counters https://www.pcmag.com/news/hacking-fingerprints-is-actually-pretty-easy-and-cheap https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/ https://www.protocol.com/bulletins/uber-breach-hacker-twilio-mfa https://blog.cloudflare.com/2022-07-sms-phishing-attacks/ https://techcrunch.com/2022/10/28/twilio-june-data-breach/ https://www.zdnet.com/article/should-you-worry-about-hackers-cloning-your-2fa-hardware-security-keys/ https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter
Read More
RFID Tracking Isn’t Actually THAT Scary…
.Did you know there might be trackers in your clothing? RFID (Radio Frequency Identification) tags can be found everywhere. Their main use is to track inventory and prevent shoplifting, but there are lots of conspiracy theories about RFID and its ability to track people. In this video Naomi Brockwell will explain how RFID works, why […]
Read More
What is the Most PRIVATE Cloud Storage?
- Frank
- February 15, 2023
- Bitcoin
- Bitcoingirl.org
- Blockchain
- brockwell
- btc
- Cloud
- Cloud storage
- crypto
- CryptoCurrency
- currency
- drive
- e2ee
- Encryption
- End to End Encryption
- Fiat
- Girl
- mega
- monetary
- naomi
- Naomi Brockwell
- naomi privacy tips
- nbtv
- nbtv.media
- pcloud
- policy
- Privacy
- proton drive
- surveillance
- sync
- Tech
Naomi Brockwell compares some popular cloud storage providers, to see which ones are the most private.
Read More