NBTV: Your Money, Your Data, Your Life

Naomi Brockwell
undefined
Aug 19, 2022 • 12min

10 HACKING tools you MUST know about!

https://youtu.be/6F7EHO4niCwhttps://open.lbry.com/@NaomiBrockwell:4/hacking-tools:5You may find a phone charger lying around, and not realize that it's actually a nefarious computer itself.I just got back from DefCon where I explored all kinds of hacking tools that are disguised as everyday items you might regularly use.I go through 10 important hacking tools you NEED to know about, so that you can better protect yourself!The takeaways:Don't borrow cords from strangersTurn off WiFi when you're not using itDon't auto-join WiFi networks00:00 Intro01:35 1. Rubber Ducky02:08 2. OMG Cable02:39 3. LAN Turtle03:05 4. Bash Bunny04:12 5. Key Crock04:39 6. Screen Crab05:04 7. Shark Jack06:04 8. WiFi Pineapple07:55 9. WiFi Pineapple Enterprise08:18 10. WiFi Coconut09:55 How To Protect Yourself10:29 How To Tell If A Cable Is MaliciousThanks to Darren Kitchen from Hak5 for showing us his gear!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Aug 11, 2022 • 16min

You NEED to use a Password Manager!

https://youtu.be/T45FryDx6wYhttps://open.lbry.com/@NaomiBrockwell:4/password-managers:2Do you reuse passwords? Or tweak them slightly by changing just a couple of letters? You need to stop doing that immediately, and use a password manager instead. In this video we explain what a password manager is, why you need to use one, criteria to look for in a good one, and really important tips for password management.00:00 Intro00:28 Why are Password Managers Important03:07 People Can’t Type Randomly!04:05 Criteria for Choosing a Password Manager05:48 Online, 3rd-Party Services08:35 Online, Self-Managed Vault10:16 Offline, Self-Managed Vault11:18 Best practices: CHOOSING A MASTER PASSWORD12:22 Best practices: SECURITY QUESTIONS12:52 Best practices: Autofill14:16 Best practices: BACKUPSEFF word list, and Password Manager Deep-Divehttps://ssd.eff.org/en/module/creating-strong-passwordsBrought to you by NBTV members: Reuben Yap, Will Sandoval, Sam Ettaro, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Aug 1, 2022 • 15min

The Dangers of Browser Extensions

https://youtu.be/j0ieRrwae5whttps://open.lbry.com/@NaomiBrockwell#4/Browser-Extensions#6Browser extensions can be a lot more dangerous than people realize.They can monitor your activities, steal your data, or even log your keystrokes and passwords.In this video we explain how browser extensions work, what you be wary of, and how to use them safely. We also dive into the history of browser extensions and plugins.00:00: Intro00:48: What is a Browser Extension?01:27: Plug-ins vs Extensions03:38: Rise of Extensions05:54: Danger of Extensions07:20: Malicious Extensions08:29: Hackers08:51: Repurposed Extensions09:23: Uninformed Users09:52: Bad Code10:24: Good side of extensions12:40: How to Stay SafeThere are some awesome extensions out there that can make your browsing experience better and safer, just make sure you're not installing a trojan horse filled with trouble just waiting to get into your computer. Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jul 23, 2022 • 16min

DON'T Buy Email Hosting From Your Web Registrar!

https://youtu.be/K9SiOYRcTCchttps://open.lbry.com/@NaomiBrockwell:4/private-email-hosting:9Being able to use your business name for your email address is professional and also puts you more in control of your communications. Most email hosting options offered by your web registrar are NOT private though, so what do you do? You can host any domain email with Protonmail instead!Protonmail is renowned for their great privacy and encryption, but you don't have to use their @protonmail.com email address -- they allow you to use your own custom domain, while still enjoying all the encryption benefits they have to offer!In this video we will teach you how to move your custom email domain over to Protonmail, to keep all your communications private.00:00: Intro02:00: Protonmail Privacy04:53: Moving Custom Domains to Protonmail06:04: Adding Your Domain06:18: Verify Your Domain08:04: Configure DNS Records08:50: Create Addresses / Add Users09:23: Configure DNS Records - cont’d14:15: Why Custom Domains Are ImportantLet’s move towards email providers that don’t harvest the content of all our emails. This goes a long way to helping us reclaim our privacy in the digital age.Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jul 22, 2022 • 8min

The Most Important Case in Crypto

https://open.lbry.com/@NaomiBrockwell:4/The-Most-Important-Case-in-Crypto:5Is every single crypto transaction about to be ruled illegal?Yesterday one of the most important hearings in crypto took place, and most people had no idea.Basically, the SEC is suing LBRY Inc. for illegally selling securities -- They argue that LBRY credits, or LBC (the token that makes the entire decentralized LBRY ecosystem run), is a security.Yesterday was a hearing at the US District Court in New Hampshire to determine whether there would be a summary judgment or whether the case would move to trial. But the case is bigger than almost anyone realizes, and will set the precedent for how the ENTIRE INDUSTRY is regulated.Here is what the SEC argued in court:It doesn't matter if 75% of purchases are for utilityIt doesn't matter if the work isn't being done by sellerIt doesn't matter if the seller never uses investment languageAll that matters is where the token price is moves on the open market.This would mean that basically every cryptocurrency is a security.If the SEC wins, every person who works in the industry or has ever bought or sold crypto is guilty of trading illegal securities.Written by Joël Valenzuela and Naomi BrockwellInterview footage from Joël Valenzuela and John DeatonSee John Deaton's full interview with Jeremy Kauffman here:https://odysee.com/@CryptoLawTV:9/sec-v.-lbry-summary-judgement-arguments:9See Joël Valenzuela's response to the hearing for Digital Cash Network here:https://odysee.com/@DigitalCashNetwork:c/LBRYcaseYTS:eSupport the show
undefined
Jul 15, 2022 • 18min

Getting MULTIPLE PRIVATE Phone Numbers

https://youtu.be/HYNZKQZEHoUhttps://open.lbry.com/@NaomiBrockwell#4/Getting-MULTIPLE-PRIVATE-Phone-Numbers#5Our cell number is tied to everything we do. Most of us have had our cell phone numbers for many years, even decades, and we hand it out to everyone: to merchants, healthcare providers, social media accounts. That number can become associated to us like a social security number, and it allows all our interactions to be correlated.We need to ditch the idea that we have just one number our whole lives, that we give to everyone. In this video we’re going to give an example of a clean up strategy you can use to lock down your existing number, and create multiple VoIP numbers not associated to your real world identity, that don’t tie all your activities together.00:00 Why Handing Your Cell Number Out Is Dangerous02:36 VoIP vs Cell Number05:16 New Phone Strategy Overview05:47 Porting Existing Number to VoIP06:17 Number Porting/SIM Swap Attacks07:23 Google Voice Porting08:24 VoIP Communications are NOT PRIVATE10:10 New SIM10:26 Creating Multiple VoIP Numbers12:02 MySudoNote: The specific products mentioned are available in a few countries including America, but the overall ideas that you should never hand out your cell number, should lock down existing cell numbers by porting to voip, should get a new sim phone number you don't share with anyone, and should only use voip numbers going forward, are universal concepts. Hopefully this video will help you choose the right strategy for wherever you are based!Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jul 2, 2022 • 14min

How Your WiFi is Betraying You

Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.Main takeaways:Turn your WiFi OFF when you're not using itDon't automatically connect to WiFi networksForget networks after joining themKeep your OS and device updated00:00 Intro01:00 How WiFi connections work04:29 Hidden networks05:49 Why broadcasting SSIDs is a privacy nightmare: Tracking07:45 Why broadcasting SSIDs is a privacy nightmare: Exposes Private Info09:06 MOST IMPORTANT PART OF THE VIDEO: malicious connections11:03 How to protect yourself13:11 SummaryResearch paper from Johanna Ansohn McDougall:https://arxiv.org/pdf/2206.03745.pdfVideo from Modern Rogue:https://youtu.be/NkNgW3TwMy8Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jun 22, 2022 • 13min

PRIVATE Alternatives to Google Docs!

Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jun 15, 2022 • 10min

Phone Pair-Lock Tutorial: BLOCK Phone Searches!

When traveling, your device may be at risk of confiscation by authorities, and that means a lot of your sensitive data is at risk. In our previous video we discussed how to keep your data safe, and one tool we mentioned is called "phone pair-locking". This prevents a forensics machine from connecting to your device to analyze it, and also prevents anyone making a copy of your phone. In this video, we will take you step by step through the process of locking your phone to a trusted computer. WARNING: This process will permanently wipe all data from your phone, so proceed with caution!NOTE: This process is only available for iOS devices00:00 Intro00:33 What is Phone Pair Locking?01:41 What is Rooting?2:08 Warning2:32 Setup Supervised State3:06 Download Apple Configurator03:19 Main Tutorial Start04:24 Create a Profile06:07 Apply Profile to Phone07:05 Helpful Tips and Considerations08:33 ConclusionHuge thank you to Michael Perklin for his expertise!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
undefined
Jun 8, 2022 • 11min

Privacy Travel Tips: How To Keep Your Data Private If Your Phone Is Seized

Traveling with digital devices can be risky -- sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds.For anyone who wants to maximize privacy, here are 6 tips for traveling with electronic devices.The final tip is “phone pair locking”, where, even if your phone is taken by security, it can't be connected to any forensics machines or copied.00:00 Intro01:49 How Phone Pairing Threatens Your Privacy03:56 How to Protect Your Data04:00 Power Off Devices05:32 Silo Data06:13 Don't Draw Attention To Yourself07:04 Protect Your 2FA Seeds07:25 Configure Your Pin Settings08:28 Phone Pair-LockingBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app