NaomiBrockwellTV

2FA is essential for securing your accounts, and one popular method is using an authenticator app. But some of the most well known authenticator apps are collecting more data about your activities than you may realize.

We dive into what kind of information they’re collecting, how to give these apps less information when you use them, and more private alternatives

00:00 Intro
00:38 How 2FA Apps Work
03:19 Authy
05:44 Microsoft Authenticator
08:23 Google Authenticator
10:14 FreeOTP
10:57 Aegis Authenticator
12:04 2FAS
13:28 Tips for 2FA Privacy
15:53 Summary

You should have 2FA on your accounts wherever you can; and you can choose an option that doesn’t collect data about you.

By knowing which tech in our lives is tracking us and collecting our data, we can make more informed decisions about which products and services we decide to use.

Special thanks to the Mysk team for their awesome research!
https://twitter.com/mysk_co

Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Sam Ettaro, Will Sandoval and Naomi Brockwell

Our other videos on 2FA:
2FA malware apps: https://youtu.be/cP1LVbLAcSU
How to use Security Keys: https://youtu.be/UhANsAtvLN0

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

NBTV's new eBook out now!
Beginner's Introduction To Privacy - https://amzn.to/3WDSfku

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on LBRY!
https://open.lbry.com/@NaomiBrockwell:4/most-private-2FA:5

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Ro..

It’s super important to have a 2nd method of verification on your accounts. One popular option is an Authenticator app, otherwise known as a TOTP app.

But it turns out an overwhelming number of authenticator apps in the app store are actually scams.

In this video we’re going to show you how some of these fake apps actually steal your information; and explore the dark patterns they use to trick you into doing certain things. We’ll also show you how to stay safe when downloading 2FA apps so you can protect your data and your accounts.

00:00 Intro
01:52 2FA apps STEALING your seeds!
03:44 Dark Patterns Exposed
05:50 Analytic Events
06:46 Paywalls
07:17 Dark Patterns
09:54 Copycat apps
10:51 More Shady Tactics
12:32 Advice for Staying Safe
15:07 Conclusion

There are some well-regarded, open-source options out there. But it's SUPER important you make sure you're downloading the real version! Stay safe 🙏

Special thanks to the Mysk Team for their awesome research! Follow them here:
https://twitter.com/mysk_co

Brought to you by NBTV members: Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

NBTV's new eBook out now!
Beginner's Introduction To Privacy - https://amzn.to/3WDSfku

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on LBRY/Odysee!
https://open.lbry.com/@NaomiBrockwell:4/DARK-SIDE-of-2FA-Apps:c

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extr..

Did you know there might be trackers in your clothing? RFID (Radio Frequency Identification) tags can be found everywhere. Their main use is to track inventory and prevent shoplifting, but there are lots of conspiracy theories about RFID and its ability to track people.

In this video we’ll explain how RFID works, why people are concerned about it, and the limitations of the tech that make it far less scary than you might think.

00:00 Intro
01:24 History of RFID
02:28 How RFID Works
05:59 Should you be scared?
07:04 Passive vs Active RFID
09:08 Tin Foil Hat Time
12:36 Conclusion

We do live in the big data world, so it's important to be aware of tracking threats and data collection around us. It's also important to know your own threat model and where each technology sits on the threat spectrum for your life, so that you can know how to best direct your energy.

Special thanks to Jonathan Tomek for his expertise!
https://twitter.com/Sakebomb

Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

NBTV's new eBook out now!
Beginner's Introduction To Privacy - https://amzn.to/3WDSfku

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveil..

We probably all use cloud storage -- it’s a convenient, cost-effective way to store files and share them with others. But when you use the most popular cloud storage providers, you’re handing off your photos, videos, documents, and all kinds of other files to someone else, so that they can look after them for you. What are the privacy implications of this?

We compare some popular cloud storage providers, to see which ones are the most private.

00:00 Intro
01:00 Privacy Concerns
09:22 Dropbox
13:00 Microsoft One Drive
14:32 Skiff
16:25 iCloud
19:14 MEGA
22:11 pCloud
24:48 Proton Drive
26:21 Sync.com
28:00 Tresorit
29:14 Cryptomator and Boxcryptor
29:38 Conclusion

The convenience of being able to access our files from anywhere is important, but we don’t have to sacrifice our privacy when we do this.

Brought to you by NBTV members: Reuben Yap, Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

NBTV's new eBook out now!
Beginner's Introduction To Privacy - https://amzn.to/3WDSfku

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on LBRY!
https://open.lbry.com/@NaomiBrockwell:4/most-private-cloud-storage:3

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

..

Your home internet has a privacy problem! DNS, or Domain Name System, is the lookup system responsible for converting human-readable domain names like google.com into IP addresses, which is the format that computers need to communicate with each other. But in this process, a LOT of data is leaked about your internet activities, and collected by all kinds of entities like ISPs and government organizations.

In this video, we’ll explain how DNS works, and how to set up your DNS to make your internet browsing far more private.

00:00 Intro
00:37 What is DNS?
01:09 How Does DNS Work?
07:02 Privacy Concerns
09:07 How to Protect DNS Queries
10:14 Quad9
13:50 How to Switch to Quad9
15:33 Conclusion

DNS privacy is a critical part of your home network security. Take 5 minutes to create more private DNS settings.

Special thanks to John Todd, Brent Cowing, and Kieran Mesquita for their help with this video!

Video 1 in our home networking series: https://www.youtube.com/watch?v=QPCbri1EJ8U

Video 2 in our home networking series: https://www.youtube.com/watch?v=yKyjbeObQXg

Brought to you by NBTV members: Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

NBTV's new eBook out now!
Beginner's Introduction To Privacy - https://amzn.to/3WDSfku

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/DNS-v6-ODYSEE:1
________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent Record - Edward Snowden
https://amzn.to/305negc

What has the government done to our money - Rothbar..

Using a password manager is actually one of the most IMPORTANT things you can do to safeguard your digital life. Password managers are software for generating and storing your passwords for you.

While keeping all passwords in a single vault may seem like a scary prospect for some people, we explain why computer security experts almost unanimously recommend using them.

We also dive into which password managers are best, and how to keep your password vault secure.

00:00 Intro
01:08 Creating better passwords
04:58 Securing your Password Manager
06:44 Choosing a Password Manager
08:55 LastPass
11:21 Bitwarden
12:47 Dashlane
14:48 1Password
16:19 KeepassXC
19:03 Saving passwords in browsers
21:13 Summary

The biggest risk to the average person is reusing passwords across websites, so a password manager is essential in order to both create strong passwords and to help you remember them. They can dramatically help you improve the security of your online accounts and make it easier to manage your login information.

XKDC Comic on Passwords: https://xkcd.com/936/

EFF Password List: https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt

Brought to you by NBTV members: Reuben Yap, Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/Most-Private-Password-Managers:9

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell
https://amzn.to/3WDSfku

Permanent R..

Microsoft's 365 Office Suite was recently banned in Germany over privacy concerns. Should you be using a more private office suite instead?

Microsoft Office is one of the most used suites of programs worldwide. They have become so common that their programs have worked their way into our daily vocabulary, and they set the standards for document formats.

It turns out that they collect a lot of data from their users, both when used online via their collaborative tooling, and "offline" with their downloaded software. Microsoft is also very closed lipped about the details of their data collection.

We dive into a report that recently came out of Germany looking at the privacy of Microsoft. We also look at a privacy-focused office suite alternative, LibreOffice, and how it compares.

00:00 Intro
00:33 Overview
00:42 What is Microsoft’s Office Suite?
01:01 Sketch #1
01:37 Online vs Offline Products
03:08 Connected Experiences
03:50 Sketch #2
04:27 Microsoft’s Data Collection Practices
07:20 Telemetry and Diagnostic Events Explained
08:52 Types of Diagnostic Data Microsoft Collects
10:05 Aria
11:22 LibreOffice
13:48 Other recommendations
14:00 Conclusion

Remember, your privacy is largely in your hands, and you can choose not to use products and services that collect all your data. If you have alternative products that you like and think we should check out, let us know!

If you're looking for online, collaborative alternatives to Google Docs and Microsoft 365, watch:
https://youtu.be/-4MpHf4XOMw

Brought to you by NBTV members: Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!

____________..

What are the biggest privacy risks you need to be aware of in 2023?
Marta Belcher, special council to EFF and President of the Filecoin Foundation, joins me live to look at the year ahead and make sure that you're all prepared.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser! https://brave.com/nao076

USB-C to ethernet adapter:
https://amzn.to/2lOVBoy

Faraday bag (signal stopping, to protect your fob, credit card, computer, and phone)
https://amzn.to/3DjIvCP

Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
https://amzn.to/2SVh0J2

Computer privacy screen (use your computer in public? Keep your information safe! Choose the size right for your computer)
https://amzn.to/3F816Sn

Phone privacy screen (don't let people in public see your private data, choose the size for your phone)
https://amzn.to/3wNtYwb

Camera cover (for computers and phones, so no one can access your camera without you knowing)
https://amzn.to/2Mt7Hic

Privacy Tip: Turn off your wifi and bluetooth when y..

Is privacy dead? We certainly see and hear this sentiment echoed everywhere we go, along with claims that “online tracking is harmless”, and that “if you’ve got nothing to hide, you shouldn’t care”.

In this video, we chat with Vivaldi Technology CEO Jon von Tetzchner to debunk 4 myths about privacy.

00:00 Intro
00:51 Myth 1 - Privacy is Dead
04:45 Myth 2 - Online Tracking is Harmless
08:00 Myth 3 - It’s Not Personal Information
10:13 Myth 4 - Surveillance is Normal
12:35 What’s at Stake
13:07 Conclusion

Stop believing these people who tell us that we shouldn't bother protecting our privacy. The only way to preserve privacy in our lives is to value it and fight for it. We are empowered human beings, who can make better choices about the tech that we use, and we can opt for more privacy-preserving options.

Surveillance is not inevitable, let's stop normalizing it!

Brought to you by NBTV members: Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave..

Apple markets itself as a privacy company. But what does that really mean?

They just made some big announcements that will improve the privacy of the average person dramatically, but does that mean that YOU should use their products?

In this video, we’re going to dive into the details of their latest announcement about scrapping phone scanning and enabling iCloud backups, analyze Apple’s privacy track record, and explore whether their products are right for a privacy-conscious person.

00:00 Intro
01:25 Apple Privacy- The Good
03:46 Apple Privacy- The Bad
05:45 Apple’s Announcement
08:22 What is Advanced Data Protection?
09:58 FBI Response
10:50 Should You Use Apple Products?
11:51 Outro

Brought to you by NBTV members: Lee Rennie, Sam Ettaro, Will Sandoval, Reuben Yap, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/Apple-Encrypt-v4-Odysee:e

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Extreme Privacy - Michael Bazzel
https://amzn.to/3BLZ1gq
(for a very privacy-conscious person)

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser..

Your firewalls are a crucial part of your privacy and security setup. You can think of them like a bouncer at a building, deciding who is allowed to enter and who is not. In this video we show you how to create a separate network for your insecure devices like IoT devices. We then show you how to create firewall rules to silo these devices on the separate network, so that they can't access any of your important devices on other networks.

00:00 Intro
00:38 What is a Basic Firewall?
02:13 What is a Next Gen Firewall?
03:38 Network Segmenting
04:00 Video Overview
04:45 Enabling OPT1 and OPT2 Interfaces
05:39 Creating our OPT1 and OPT2 Networks
08:02 DHCP
09:38 DNS
11:23 Firewalls
13:14 Testing Our Networks
13:42 Firewalls: Siloing Networks
21:18 Conclusion

Your home network is key to the privacy and security of your online activity, so it’s really worth taking the time to learn about how to make it more robust.

This is the 2nd video in our series about home networks. In the first we explained how your router is actually really insecure, how there’s better software and firmware you should be using, and we taught you how to install these better systems.

1st video in this series, Installing pfSense and Setting up your LAN network:
https://youtu.be/QPCbri1EJ8U
https://open.lbry.com/@NaomiBrockwell:4/pfsense-protectli-tutorial:7

Brought to you by Lee Rennie, Alex Wied, Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Protectli: https://protectli.com/
pfSense: https://www.pfsense.org/

Watch this video on Odysee!

________________________________________________________________________
Here are a bunch of products I..

We use our personal email for everything we do: for purchases, for newsletter sign ups, at the doctor’s office, for government websites, and more. This one unique identifier links all our activities together, and is a huge privacy concern.

You should use a UNIQUE email address for everyone you interact with, and you can do it all within a single account, and without having to set up any of these addresses in advance!

In this video we show you how, using catch-all email addresses, and SimpleLogin email aliases

00:00 Intro
01:55 Overview
02:11 Using Multiple Emails
04:29 Subaddressing
05:33 Custom Domain Email
06:34 Setting up Catch All Email
09:07 SimpleLogin
12:54 Self-Hosting Option
13:05 Conclusion

Both creating a catchall email address for a domain you own, and using SimpleLogin aliases, are great ways to use unique email addresses for everyone you interact with. These can be your new secret weapons when it comes to email hygiene and digital privacy!

Brought to you by NBTV members: Lee Rennie, Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: ..

For most people, a weak password is all that’s standing between your digital life and a hacker, and if that password is ever cracked, or leaked, you’re in big trouble.

Security keys are one of the best ways to protect your accounts. They’re incredibly convenient, easy to use, and provide the best kind of multi-factor authentication. In this video we’re going to explain how security keys work, and show you how to choose one that’s right for you.
We dive specifically into Yubico "Yubikeys" and other products in this video, and will look at open source alternatives in future videos!

00:00 Intro
00:33 2FA and Multifactor Authentication
03:13 TOTP and Authenticator Apps
05:38 What is a Security Key
09:03 How To Use a Security Key
10:18 Understanding Security Key 2FA
12:04 Security Key Models
15:18 Important Tips
17:04 If Security Keys Are Not Accepted
18:10 Outro

More and more websites support security key 2fa. If you want the best chance of fighting off phishing attacks, you absolutely need one of these protecting your accounts.

Brought to you by NBTV members: Lee Rennie, Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best pr..

It turns out that an overwhelming number of VPNs are actively harvesting and selling your data, capturing passwords / credentials / movements from your web activities, and doing all sorts of awful things.

VPNs can be super useful: to help you watch the Netflix catalogue of another country, avoid government surveillance and censorship under oppressive regimes, hide your IP address from websites, stay safe on public wifi, and stop your ISP from spying on your internet activities.

But it REALLY depends on which VPN you’re using.

In this video we’re going to explore which VPN companies own which review sites, which VPN permissions demand far too much access to your machine, which code has appalling security, and the giant red flags in a lot of this code that scream data collection.

00:00 Private Private Super Secret Secure VPN!
00:42 Intro
02:33 What VPNs Do
04:17 The Risk of Free VPN Services
05:30 1clickVPN
07:15 FreeVPN
08:44 ZenMate
10:03 AZA VPN and HULA VPN
11:29 NordVPN and ExpressVPN
14:01 Kape Technologies
15:23 Ziff Davis and White Labeling
16:42 Chinese Data Collection
18:04 Affiliate Sponsorships
18:57 Final Tips
19:21 Support NBTV/Outro

When you’re choosing a VPN or other tools for your privacy arsenal, it’s a good idea to do your own research and see what the security experts are saying. There’s some great information out there, but you do need to learn how to look for it.

Special Thanks to Jonathan Tomek for sharing his awesome research with us for this video!

More details in Consumer Reports:
https://digital-lab-wp.consumerreports.org/wp-content/uploads/2021/12/VPN-White-Paper.pdf

Brought to you by NBTV members: Lee Rennie, Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice..

Your router is the gateway between your devices and the internet at large. If it’s compromised, it’s like leaving the front door to your home network wide open, allowing malicious actors to enter. Unfortunately the routers most of us use are VERY insecure, with all kinds of known vulnerabilities.

In this video we go over how to give your hardware and software a major overhaul, including a step-by-step tutorial for how to use pfSense on a Protectli firewall vault.

00:00 Intro
01:07 What’s in a “Router”?
03:30 Security Dangers
06:06 Upgrading with Protectli
06:43 Protectli Components Explained
07:50 Installation Tutorial
09:39 Configuring pfSense Settings
13:45 Power Cycling Tip
14:12 How Protectli Fits into Your Network Setup
15:57 Add WiFi Capabilities
16:36 How to Enable AP Mode
18:34 Setup Diagram
20:07 Conclusion

With pfSense and the Protectli vault, you can tweak your settings to incredibly granular levels. That's what we'll cover in future videos: how to configuring firewalls to block malicious traffic coming in AND telemetry going out, and how to set up a whole network VPN.

Brought to you by NBTV members: Lee Rennie, Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.

This video was not sponsored by anyone, but products can be purchases here:
https://protectli.com/

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Gre..

Adding a security system to your home might not be a bad idea. But what kind of security system? And are there any that are truly secure and privacy-preserving?

We dive into a bunch of popular home security cameras, and how they they compare in terms of privacy.

00:00 Intro
00:54 Terms to Know
02:27 ADT
04:23 Ring
05:28 Nest
05:59 Eufy
09:18 Reolink
10:30 Amcrest
10:56 Others
11:21 Synology
13:52 Apple HomeKit
14:45 Eufy (revisited)
15:46 Homebridge and OpenHAB
16:07 Trade-Offs
18:06 Outro

Spoiler alert, privacy doesn’t seem to be a focus of home security companies. It's also surprisingly difficult to find information about how private and secure each system is. But hopefully there are some solutions here that fit your threat model, and if not, we'll dive into a more complicated but private setup in an upcoming video!

Take a look at our previous deep-dive into Ring cameras:
https://www.youtube.com/watch?v=fnMDb75vmks
https://odysee.com/@NaomiBrockwell:4/Ring-Cameras:f

Brought to you by NBTV members: Lee Rennie, Chris Karabats, Faith Braverman, Will Sandoval, Sam Ettaro, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!

_____________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book..

Last week Paypal, announced (and later backtracked) that it would impose a morality tax on its users, fining them for misinformation.

The financial industry has a long history of trying to curtail speech:

In 2010, Visa, Mastercard, and Paypal infamously suspended payments to Wikileaks after the non profit began to expose war crimes and government corruption.

In 2021 Only Fans announced it would start banning sexually explicit content, which is the whole point of the platform, citing pressure from “banking partners and payout providers.”

There have been free speech organizations cut off from payment services,
independent media outlets blocked, privacy advocates banned.

Entire industries like medical marijuana have been targeted by and cut off from the financial system as part of Operation Chokepoint, which was a secretive initiative that intended to “choke off” businesses from financial services so that they couldn't survive.

Just this week Kanye West was told he and his business could no longer use Chase bank.

Unfortunately we live in a world where organizations that defend freedoms, challenge mainstream narratives, or hold governments accountable for corruption are cut off from the payment rails of society. Our money has been weaponized.

So how do we reclaim freedom of speech and choice?

00:00 PayPal
02:08 History of Finance Controlling Speech
04:00 Operation Choke Point
04:48 Financial Freedom

Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro, and Naomi Brockwell

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

P..

Privacy is under attack.
Our digital lives are increasingly surveilled and censored. This means that freedom of expression and financial freedom are being stamped out.

NBTV’s mission is to educate as many people as possible how to carve out a free space in the digital world. We provide practical advice on becoming a sovereign individual, and teach people how to reclaim control of their money, their data, and their life.

Our channel doesn’t accept sponsorships. We avoid commercial influence so that we can make sure we’re being as honest in our recommendations as possible. We are funded entirely by community support. If you like our content, consider helping us keep producing this content.

We’re a 501(c)(3), which means that in the USA your contributions are tax deductible. But you can support us no matter where you are.

Paypal:
https://www.paypal.com/donate/?hosted_button_id=8RX24W7GPAW6Y

Crypto:
https://cointr.ee/nbtv
(If you’d prefer to donate in a currency not listed, please let us know and we’ll add it to the page!)

https://nbtvmedia.com

Free2z campaign:
https://free2z.com/nbtv

Flipstarter campaign launching in 2 weeks!

Thank you for making our channels possible, we couldn’t do this without your support.

We hope to teach as many people as possible that we are more empowered than we realize and that we CAN take back control of our money and our data.

https://NBTV.media/support

______________________________________________________
Beware of scammers, we will never give you a phone number or reach out to you with investment advice. we do not give investment advice.

Many of us are finally waking up to how important privacy is, and yet we don't think twice when we swipe our credit card.

Each time we opt to pay with plastic, our data is shared by our banks, the card network, the store, the point of sale system, the retailer's bank, our financial apps. And then all those entities share it with thousands more.

In this video we dive into financial privacy, and give you a glimpse of how much information gets shared about you through your financial choices.

We also look at why it's risky to use traditional financial tools when making donations to causes you care about, and dive into 2 groups that are innovating in the donation world.

00:00 Intro
00:56 6 Businesses That Share Your Data
03:37 China
04:44 Cash
04:53 Masked Credit Cards
05:01 Donation Risks
06:10 Benefits of Permissionless Payment Methods
06:59 Pitfalls of Traditional Fundraising Platforms
07:21 Why Use Crypto to Donate?
08:27 Free2Z
10:38 Flipstarter
13:40 Outro

When it comes to supporting causes that you believe in, crypto can be a powerful tool. It can make your contribution more private, make sure the money actually reaches its destination. and it's accessible to anyone in the world. The more we dive into this world, the more we fight against financial surveillance.

Platforms mentioned:
https://free2z.com/
https://flipstarter.me

Check out our crypto fundraising campaigns!
https://free2z.com/nbtv

Be sure to check out Geoffrey A. Fowler's full article here: https://www.denverpost.com/2019/08/31/credit-card-privacy-concerns/

Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Here are a bun..

The internet is often controlled and censored in times of civil unrest. Governments can block certain services, like access to websites or apps, or they can even shut off the internet entirely.

That’s exactly what’s going on in Iran at the moment. The government has partially shut down the internet as a result of protests, and they have also blocked access to the secure and private messaging app, Signal.

There are ways we can help: Set up a proxy signal server that Iranians can connect to, allowing them to communicate privately and securely during a hostile situation.

00:00: Introduction
00:57 What is a Proxy Server?
02:17 Rent a Cloud Server, and set up SSH Keys
05:26 Setting up the Signal Proxy Server
06:23 Pointing Your Domain to Your Cloud Server's IP Address
07:22 Running the Signal Proxy Server
07:50 How to Connect Your Signal App to A Proxy Server

Signal's Instructions:
https://signal.org/blog/run-a-proxy/

Digital Ocean:
https://www.digitalocean.com/

Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi Brockwell

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/Signal-Proxy-Server:e

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: so..

Linux has countless different versions, known as distros, and knowing which one to use can be overwhelming for a beginner.
In our last video we covered the history and basics of linux, looking at different distros and their use cases. If you're just starting out, Ubuntu is a great way to get your feet wet. In this video we do an Ubuntu deep-dive, and teach you how to install it.

00:00 Intro
00:36 Distro Recap
01:44 Why Use Linux Recap
02:50 Ubuntu Overview
06:52 System Requirements
07:03 Warnings (Before You Install)
07:50 Ubuntu Tutorial
11:31 Outro

Taking control of your machine via a Linux distro is liberating, but also intimidating. Ubuntu aims to make it all a bit easier for you.

If you’re using Ubuntu, let us know how you like it -- or tell us which distro is your favorite! At the end of the day, you have to pick an OS that works for you!

Brought to you by NBTV members: Lee Rennie, Reuben Yap, Will Sandoval, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee:
https://open.lbry.com/@NaomiBrockwell:4/Linux-for-Beginners-Ubuntu:a

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser! https://brave..

Ring, owned by Amazon, is one of the most popular home surveillance companies in the world. They offer smart doorbells, indoor cameras, outdoor cameras, motion sensors, carbon monoxide detectors, and everything else you can imagine. These are consumer-grade surveillance tools that can record activities in and around your property — but should you put them in your home?

We dive into how secure Ring devices are and how much privacy you're giving up when you use them, so that you can make an informed decision for your home!

00:00 Intro
01:25 Hacked Cameras
01:59 3rd Party Analytics
03:16 Police Partnerships
07:12 Non-Private Defaults
08:38 Tips for securing RING devices
09:34 Outro

If you’re going to have a camera recording every person coming and going from your house, monitoring you inside your home, or even recording audio of you whether you’re in frame or not, you’re going to want to know that this footage is private and secure.

In an upcoming video we’re going to dive into some other home camera alternatives, but SPOILER ALERT: privacy and security doesn’t seem to be at the forefront for most companies.

Brought to you by NBTV members: Chris Karabats, Lee Rennie, Will Sandoval, Faith Braverman, and Naomi Brockwell.

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!!

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzm..

Linux is an open source, highly customizable OS, and it has been called the backbone of the internet. It is the number 1 choice of operating system for servers around the world, the linux kernel is used in Android for over 2 billion devices, many modern cars rely on linux, as do smart devices, and even the International Space Station.

But is it the right OS for you?
There are many different versions of Linux, called Distros, and in this video we will go over 5 popular OSs and their use cases.

00:00: Intro
01:19: What is Linux?
02:16: Free, Open and Permissive
04:04: Privacy
04:27: Stability
06:04: Ubuntu
07:18: Debian
08:19: Qubes OS
10:13: Pop!_OS
12:06: Linux Mint
13:06: Gaming Considerations
14:02: Is Linux Right For You?

Masses of people are moving away from mainstream operating systems that capture heaps of data about you, and towards more private systems like many of those based on Linux. If you’re getting your feet wet for the first time, be sure to check out our upcoming Ubuntu tutorial!

Brought to you by NBTV members: Reuben Yap, Lee Rennie, Will Sandoval, and Naomi Brockwell

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/Is-Linux-Right-For-You:9

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever r..

I chatted with Charles Payne today about individuals taking responsibility for their own financial choices. We also dive into Tornado Cash, and why financial privacy is important in cryptocurrency.

Original video here:
https://video.foxbusiness.com/v/6311267937112

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee:
https://open.lbry.com/@NaomiBrockwell:4/Financial-Privacy-and-tornado-cash:f

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser! https://brave.com/nao076

USB-C to ethernet adapter:
https://amzn.to/2lOVBoy

Faraday bag (signal stopping, to protect your fob, credit card, computer, and phone)
https://amzn.to/3DjIvCP

Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
https://amzn.to/2SVh0J2

Computer privacy screen (use your computer in public? Keep your information safe! Choose the size right for your computer)
https://amzn.to/3F816Sn

Phone privacy screen (don't let people in public see your private data, choose the size for your phone)
https://amzn.to/3wNtYwb

Camera cover (for computers and phones, so no one can access your camera without you knowing)
https..

You may find a phone charger lying around, and not realize that it's actually a nefarious computer itself.
I just got back from DefCon where I explored all kinds of hacking tools that are disguised as everyday items you might regularly use.
I go through 10 important hacking tools you NEED to know about, so that you can better protect yourself!

The takeaways:
Don't borrow cords from strangers
Turn off WiFi when you're not using it
Don't auto-join WiFi networks

00:00 Intro
01:35 1. Rubber Ducky
02:08 2. OMG Cable
02:39 3. LAN Turtle
03:05 4. Bash Bunny
04:12 5. Key Crock
04:39 6. Screen Crab
05:04 7. Shark Jack
06:04 8. WiFi Pineapple
07:55 9. WiFi Pineapple Enterprise
08:18 10. WiFi Coconut
09:55 How To Protect Yourself
10:29 How To Tell If A Cable Is Malicious

Thanks to Darren Kitchen from Hak5 for showing us his gear!

Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi Brockwell

To support NBTV, visit https://www.nbtv.media/support
(tax-deductible in the US)

Sign up for the free CryptoBeat newsletter here:
https://cryptobeat.substack.com/

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:
https://nbtv.media

Watch this video on Odysee!
https://open.lbry.com/@NaomiBrockwell:4/hacking-tools:5

Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Permanent Record - Edward Snowden
https://amzn.to/305negc

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
https://amzn.to/2UQmJ4m

What has the government done to our money - Rothbard
https://amzn.to/2KMzmcu

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
https://amzn.to/3BLZ1gq

Naomi's Privacy Bag: some of my favorite products to help protect your privacy!

Use the Brave browser! https://brave.com/nao076

USB-C to ethernet adapter:
https://amzn.to..

SHOW MORE

Created 5 years ago.

577 videos

Category Science & Technology

I have been making videos about bitcoin since 2013. I mainly vlog about bitcoin, blockchain, tech, and cool things. I also make cheesy music videos.

I'm a producer for John Stossel, and the CEO and founder of Rainsworth Productions.
I've produced feature films ("The End of Money As We Know It" won Special Jury Prize at Amsterdam Film Festival, "Subconscious" distributed by Lionsgate) and formerly produced for Fox.

I'm a fmr Policy Associate at NY Bitcoin Center and MC conferences (Consensus, d10e, SFL, Freedom Fest, Atlas Society, Blockchain Unbound...)

Please subscribe to my channel and talk to me on twitter! @skycorridors
Thank you!!!!

www.facebook.com/BTCGirl
BitcoinGirl.org
naomibrockwell.com
Youtube.com/NaomiBrockwellTV