NBTV: Your Money, Your Data, Your Life cover image

NBTV: Your Money, Your Data, Your Life

Latest episodes

undefined
12 snips
Jun 20, 2025 • 19min

Your TV Is Spying On You and Taking Screenshots

Smart TVs are not just entertainment devices; they are spying on viewers, capturing their every move and sending data to third parties. The technology behind this surveillance, Automatic Content Recognition, raises significant privacy concerns as it tracks user behavior without consent. Listeners learn how pervasive these practices are and the legal challenges surrounding them. The discussion emphasizes the need for awareness and offers practical tips for protecting personal information, advocating for a more transparent tech landscape.
undefined
May 30, 2025 • 14min

Think before you share

Children are building a digital footprint before they even speak, largely influenced by their parents' social media posts. This data fuels surveillance systems and shapes their future in ways they can't control. The podcast delves into the chilling implications of sharing children's lives online, from potential risks of identity theft to the impact of data collection in schools. Practical tips are provided for parents to safeguard their children's digital identities, pushing back against normalization of surveillance to give kids a chance at a clean slate.
undefined
May 9, 2025 • 31min

How To Make Your Mac PRIVATE

https://youtu.be/1g0RzOGxe40Step-by-Step Privacy Hardening:Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s privacy.In this video, we walk you through privacy expert Michael Bazzell’s recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.00:00 Apple promises only THEY will abuse your data02:20 Purchasing Your Mac03:14 Choose a Model03:41 Used Devices: Update, Reformat, Install OS08:28 Initial Setup11:32 WiFi and Bluetooth11:50 OS Firewall13:14 Notifications14:16 Airdrop, Siri, and Sharing15:33 Gatekeeper18:26 Analytics and Ads19:01 Time20:15 Filevault22:02 Dock, Wallpaper and Finder25:35 Application Firewall / 3rd Party Apps28:09 ConclusionApple does build decent privacy tools—but they definitely don’t make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here:https://inteltechniques.com/book7.htmlBrought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Apr 18, 2025 • 21min

DON'T Install That Extension!

https://youtu.be/11P6DdI8HOohttps://odysee.com/@NaomiBrockwell:4/Extensions:6You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.In this video, we expose the chilling truth about browser extensions.You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users.And we’ll break down why just checking permissions isn’t enough—because malicious extensions often ask for the same permissions as the good ones. It’s not about what they ask for. It’s how they use it.00:00 Extensions can do WHAT00:52 Overview01:34 The Problem with Browser Extensions09:18 How Do We Protect Ourselves10:52 Understand Permissions16:03 Grant Fewer Permissions16:18 Use Extensions Sparingly17:10 Use a Private Browser18:06 Least Privilege18:28 Use Code Review Tools19:07 In SummaryExtensions are more than just “add-ons.” They have access to everything you do online.Before you install another one, watch this video.Special thanks to John Tuckner, Matt Frisbee and Pete Snyder for sharing their expert first-hand knowledge with us!Brought to you by Lee Rennie, Cube Boy, Will Sandoval, Jack Rhysider, and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Apr 4, 2025 • 12min

Why I NEVER Restore From Backup

https://youtu.be/tzTtF3vOiq0https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:fEvery time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.00:00 Resist Temptation00:41 App Bloat01:50 Attack Surface02:51 Switch Accounts03:49 ID Tracking04:17 Ghost Data05:27 Habit Traps06:17 Reclaiming Mental Bandwidth07:14 7 Tips10:02 My Thoughts on Restoring From BackupWhen people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Mar 21, 2025 • 26min

How To DE-GOOGLE Your Phone! (2025)

https://youtu.be/Zo9qHqTDcgMhttps://odysee.com/@NaomiBrockwell:4/Graphene-Install:eYour phone is a tracking device. But it doesn’t have to be.One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we’ll show you how to use it in a more privacy-preserving way.I’ll walk you through how I set up my GrapheneOS device so you can see what’s possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!00:00 Spyware is all over our smartphones01:47 Hardware03:03 Purchase05:13 Installation10:24 Setup13:33 App Stores19:32 Secondary Profiles23:46 Your Phone, Your RulesAs difficult as it may seem, it’s actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn’t about going off grid; it’s about making informed choices; and with GrapheneOS, you’re taking control of your device, your data, and your digital freedom.Our full phone privacy series:https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=VZbMAB50C2-NAOAMNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellVisit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Mar 7, 2025 • 12min

The UK Govt Just Killed Your iCloud Privacy – Here's What to Do

https://youtu.be/AuqOzn9GWTUhttps://odysee.com/@NaomiBrockwell:4/UK-Vs-Apple:aIn an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disabled ADP entirely for UK users. By doing this, Apple alerted the world to the secret order—but it also left UK users vulnerable. Their backups, photos, notes, and more are now accessible to the government.In this video, you'll learn exactly what Apple data is no longer private, and discover privacy-focused alternatives for your files, photos, emails, notes, and more. The UK government is fishing for your personal information—now’s the time to ramp up your protections and take control of your digital life.00:00 An Unprecedented Attack03:24 What Kind of Data is Affected03:57 Safari Bookmarks Alternatives04:34 iCloud Drive Alternatives05:38 Notes Alternatives06:06 Reminder Alternatives06:35 Voice Memo Alternatives07:08 Email Alternatives07:37 Contacts Alternatives08:10 Calendar Alternatives08:38 Important Note About ADP09:55 The Privacy Battle AheadApple’s removal of Advanced Data Protection in response to the UK's demands is unprecedented among major democracies. If privacy matters to you, it’s time to move your sensitive data away from iCloud—and potentially other major providers targeted by similar government demands—to privacy-first alternatives. Protect your information before it's too late.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Feb 21, 2025 • 10min

Enable THIS Setting If You Use Signal!

https://youtu.be/NXuRlvJI2N8https://odysee.com/@NaomiBrockwell:4/signal-usernames:7Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don’t realize how they work—some mistake them for their profile name, and figuring out how to share or search for usernames can be confusing. Here’s what you need to know: how usernames work, how to set yours up, how to find others, and the privacy benefits (and limitations) of this new feature.00:00 Signal’s Game-Changing Privacy Upgrade00:51 What Are Signal Usernames? (and Why You Should Use One)01:34 Step-by-Step: Setting Up Your Signal Username02:14 How to Find People on Signal Without a Phone Number03:13 The Pros & Cons of Signal’s Username System05:14 Should You Let Signal Access Your Contacts?05:44 How Signal Protects Your Contact List (Explained)06:35 How to Change Your Signal Username Anytime07:42 Hide Your Phone Number on Signal – Here’s How08:27 Final Thoughts – Why This Feature MattersSignal’s username feature is a big step forward for privacy, helping us move away from phone numbers and take control over the information we share. If you haven’t set up your username yet, now’s the perfect time. And the best part? You can change it anytime, as often as you like.Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Feb 7, 2025 • 50min

Yes, your car can be hacked

https://youtu.be/rKnoP30Q6Ighttps://odysee.com/@NaomiBrockwell:4/Car-hacking:dSecurity researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think.00:00 Car Hacking Doesn’t Seem Real01:13 How Sam Got Into Car Hacking04:55 Why Connected Cars Are Not Secure12:11 Types of Attacks Researched14:36 The Subaru Experiment16:53 Kia Connect Research18:11 Tesla Bug Bounty Program23:01 VPN Security23:37 Little Regard for Security of Consumers26:23 Jasper32:52 Tether Hacking34:10 The Problem with ISP Backdoors38:35 Self-Driving Cars39:43 Hacking Driver Accounts43:20 What People Can Do44:34 We Take Our Privacy For Granted Until It Is Summoned47:45 Where We Are Now and Where We Are GoingCars aren’t just vehicles anymore—they’re data goldmines, storing your messages, photos, and location history. We need to rethink how much personal info we’re handing over and who has access to it.Special Thanks to Sam Curry! Check out his blog for his complete research report: https://samcurry.net/hacking-subaruBrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
undefined
Jan 24, 2025 • 15min

Privacy 101

https://youtu.be/UgXjxQsyk4whttps://odysee.com/@NaomiBrockwell:4/privacy-101:3In today’s hyper-connected world, our personal information is being collected, shared, and sold—often without our knowledge or consent. But here’s the good news: you can fight back. More people than ever are waking up to the importance of digital privacy and taking action to protect themselves.The big challenge? Many people don’t know where to begin. That’s where this video comes in.This Privacy 101 guide is designed for anyone just starting their privacy journey. I’ll show you six of the easiest, most impactful steps you can take right now to safeguard your digital life—starting with the basics and building your confidence along the way.We’ll cover:🖥️ Privacy-focused browsers🔎 Alternative search engines📱 Secure messaging apps📧 Private email options📅 Better calendar tools🌐 VPNs for secure browsingTimestamps:00:00 Privacy isn’t about hiding02:01 Browser05:21 Search Engine07:43 Messaging Apps09:57 Email11:12 Calendar12:00 VPN12:55 Your Right to ChooseReclaiming your privacy isn’t just about protecting yourself—it’s about reclaiming your right to choose who gets to see your information and how it’s used. You don’t have to give away your data to thousands of companies or governments anymore.This video is packed with actionable advice and powerful tools to help you get started today. Take back control of your digital life—your privacy is worth it.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app