Privacy

Cryptocurrency Privacy

Surveillance Coins Are Coming

In this video Naomi Brockwell: NBTV chat with Marta Belcher, President of the Filecoin Foundation, about how CBDCs work and are different from the digital money we currently use, why CBDCs are dangerous for a free society, and what you can do to protect yourself as we usher in this new era of digital finance. Scary […]

Read More
Privacy

Essential Privacy: Cell Numbers and Email Aliases

This video is from Naomi Brockwell: NBTV. If you want to take your digital privacy to the next level, you need to look at VoIP numbers, Email Aliases, and DNS. In this presentation we look at how to reign in the digital exhaust you’re leaving behind you in your daily life.

Read More
Hardware Privacy

Dump Google Drive and iCloud! Easy Private Cloud Solution!

This video is from Rob Braxman Tech explains why private cloud is back in style. Why expose your data to third parties? You can access your data at home and over the Internet with an easy to set up solution that requires no networking skills and limitless drive space. And with no subscription to a […]

Read More
Current Events Interesting Security

Sony’s Impact on Internet Censorship

Naomi Brockwell: NBTV explains Sony is attacking critical infrastructure of the internet, why this is terrifying for the future of free online expression and access to information, and what you can do to help.

Read More
AI Privacy

What are ChatGPT’s Plans for World Domination. Just ask!

Rob Braxman Tech has some predictions about AI. You’re not going to like them, It is my prediction that AI will be used deeply for mass surveillance and it is already embedded in iPhones and being considered as a law in the UK. But let’s find out what ChatGPT thinks. Let’s get the details of […]

Read More
Linux

Linux Always Finds a Way

Today Switched to Linux talks about some changes in Linux and why we do not need to worry about the changes on a regular basis.

Read More
Security

2FA Isn’t Secure – Here’s What You Need Instead!

Shannon Morse explains why two factor authentication is no longer good enough. References: https://fidoalliance.org/specs/u2f-specs-1.0-bt-nfc-id-amendment/fido-u2f-implementation-considerations.html#token-counters https://www.pcmag.com/news/hacking-fingerprints-is-actually-pretty-easy-and-cheap https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/ https://www.protocol.com/bulletins/uber-breach-hacker-twilio-mfa https://blog.cloudflare.com/2022-07-sms-phishing-attacks/ https://techcrunch.com/2022/10/28/twilio-june-data-breach/ https://www.zdnet.com/article/should-you-worry-about-hackers-cloning-your-2fa-hardware-security-keys/ https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter

Read More
Privacy

RFID Tracking Isn’t Actually THAT Scary…

.Did you know there might be trackers in your clothing? RFID (Radio Frequency Identification) tags can be found everywhere. Their main use is to track inventory and prevent shoplifting, but there are lots of conspiracy theories about RFID and its ability to track people. In this video Naomi Brockwell will explain how RFID works, why […]

Read More