

NBTV: Your Money, Your Data, Your Life
Naomi Brockwell
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Episodes
Mentioned books

Jul 22, 2022 • 8min
The Most Important Case in Crypto
https://open.lbry.com/@NaomiBrockwell:4/The-Most-Important-Case-in-Crypto:5Is every single crypto transaction about to be ruled illegal?Yesterday one of the most important hearings in crypto took place, and most people had no idea.Basically, the SEC is suing LBRY Inc. for illegally selling securities -- They argue that LBRY credits, or LBC (the token that makes the entire decentralized LBRY ecosystem run), is a security.Yesterday was a hearing at the US District Court in New Hampshire to determine whether there would be a summary judgment or whether the case would move to trial. But the case is bigger than almost anyone realizes, and will set the precedent for how the ENTIRE INDUSTRY is regulated.Here is what the SEC argued in court:It doesn't matter if 75% of purchases are for utilityIt doesn't matter if the work isn't being done by sellerIt doesn't matter if the seller never uses investment languageAll that matters is where the token price is moves on the open market.This would mean that basically every cryptocurrency is a security.If the SEC wins, every person who works in the industry or has ever bought or sold crypto is guilty of trading illegal securities.Written by Joël Valenzuela and Naomi BrockwellInterview footage from Joël Valenzuela and John DeatonSee John Deaton's full interview with Jeremy Kauffman here:https://odysee.com/@CryptoLawTV:9/sec-v.-lbry-summary-judgement-arguments:9See Joël Valenzuela's response to the hearing for Digital Cash Network here:https://odysee.com/@DigitalCashNetwork:c/LBRYcaseYTS:eSupport the show

Jul 15, 2022 • 18min
Getting MULTIPLE PRIVATE Phone Numbers
https://youtu.be/HYNZKQZEHoUhttps://open.lbry.com/@NaomiBrockwell#4/Getting-MULTIPLE-PRIVATE-Phone-Numbers#5Our cell number is tied to everything we do. Most of us have had our cell phone numbers for many years, even decades, and we hand it out to everyone: to merchants, healthcare providers, social media accounts. That number can become associated to us like a social security number, and it allows all our interactions to be correlated.We need to ditch the idea that we have just one number our whole lives, that we give to everyone. In this video we’re going to give an example of a clean up strategy you can use to lock down your existing number, and create multiple VoIP numbers not associated to your real world identity, that don’t tie all your activities together.00:00 Why Handing Your Cell Number Out Is Dangerous02:36 VoIP vs Cell Number05:16 New Phone Strategy Overview05:47 Porting Existing Number to VoIP06:17 Number Porting/SIM Swap Attacks07:23 Google Voice Porting08:24 VoIP Communications are NOT PRIVATE10:10 New SIM10:26 Creating Multiple VoIP Numbers12:02 MySudoNote: The specific products mentioned are available in a few countries including America, but the overall ideas that you should never hand out your cell number, should lock down existing cell numbers by porting to voip, should get a new sim phone number you don't share with anyone, and should only use voip numbers going forward, are universal concepts. Hopefully this video will help you choose the right strategy for wherever you are based!Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jul 2, 2022 • 14min
How Your WiFi is Betraying You
Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.Main takeaways:Turn your WiFi OFF when you're not using itDon't automatically connect to WiFi networksForget networks after joining themKeep your OS and device updated00:00 Intro01:00 How WiFi connections work04:29 Hidden networks05:49 Why broadcasting SSIDs is a privacy nightmare: Tracking07:45 Why broadcasting SSIDs is a privacy nightmare: Exposes Private Info09:06 MOST IMPORTANT PART OF THE VIDEO: malicious connections11:03 How to protect yourself13:11 SummaryResearch paper from Johanna Ansohn McDougall:https://arxiv.org/pdf/2206.03745.pdfVideo from Modern Rogue:https://youtu.be/NkNgW3TwMy8Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 22, 2022 • 13min
PRIVATE Alternatives to Google Docs!
Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 15, 2022 • 10min
Phone Pair-Lock Tutorial: BLOCK Phone Searches!
When traveling, your device may be at risk of confiscation by authorities, and that means a lot of your sensitive data is at risk. In our previous video we discussed how to keep your data safe, and one tool we mentioned is called "phone pair-locking". This prevents a forensics machine from connecting to your device to analyze it, and also prevents anyone making a copy of your phone. In this video, we will take you step by step through the process of locking your phone to a trusted computer. WARNING: This process will permanently wipe all data from your phone, so proceed with caution!NOTE: This process is only available for iOS devices00:00 Intro00:33 What is Phone Pair Locking?01:41 What is Rooting?2:08 Warning2:32 Setup Supervised State3:06 Download Apple Configurator03:19 Main Tutorial Start04:24 Create a Profile06:07 Apply Profile to Phone07:05 Helpful Tips and Considerations08:33 ConclusionHuge thank you to Michael Perklin for his expertise!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 8, 2022 • 11min
Privacy Travel Tips: How To Keep Your Data Private If Your Phone Is Seized
Traveling with digital devices can be risky -- sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds.For anyone who wants to maximize privacy, here are 6 tips for traveling with electronic devices.The final tip is “phone pair locking”, where, even if your phone is taken by security, it can't be connected to any forensics machines or copied.00:00 Intro01:49 How Phone Pairing Threatens Your Privacy03:56 How to Protect Your Data04:00 Power Off Devices05:32 Silo Data06:13 Don't Draw Attention To Yourself07:04 Protect Your 2FA Seeds07:25 Configure Your Pin Settings08:28 Phone Pair-LockingBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 31, 2022 • 12min
They're not SELLING your data. It's MUCH worse...
It says on the Big G's website:‘We do not sell your personal information to anyone’”The truth is, they ARE SHARING your personal and sensitive information, and being compensated handsomely in return. But what’s ACTUALLY going on in this exchange is far WORSE that you can possibly imagine.I chat with Bennett Cyphers from EFF, and Johnny Ryan from the Irish Council for Civil Liberties, about what is actually being done with your personal information and real-time location data.00:00 "We Don't Sell Your Data"00:36 How Do They Make Their Money?01:32 Real-Time Bidding03:22 How the Data is Collected04:10 What Data is Collected?05:27 Which Companies Get Your Data?06:38 WHAT Do These Companies Do?08:58 How Is All This Possible?10:06 Are They Selling Your Data?10:31 How Can We Protect Ourselves?Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 21, 2022 • 10min
These Tracking Links Reveal A LOT About You
Tracking links are a way for sites to track you across the web. They usually look like super long strings of random numbers attached to the end of normal URLs, and companies use them to build up dossiers on people based on their browsing habits. And they can reveal VERY sensitive information about you!Luckily there are many tools available to help you strip them out and protect your privacy. 00:00 What are Tracking Links?02:50 How to Spot a Tracking Link05:09 Sneaky ways sites track you05:59 How to Stop Tracking Links06:27 Debouncing07:22 Unlinkable Bouncing08:56 BEST Tip for Stopping Tracking LinksBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 20, 2022 • 33min
ISPs Share "Netflow" Data & Trace Traffic Through VPNs
VICE has a great article explaining how internet service providers quietly share detailed information about network traffic. It's called "netflow data" and they can even trace traffic through VPNs.But the scary part is how many people that data is then shared with.We dive into the details.00:00 Intro01:45 ISPs and Netflow Data05:47 What is netflow data?08:22 What is done with YOUR Data?15:29 "We don't give away all your data... we promise"20:49 Palo Alto Networks has access to 80% of Global Flows22:37 Not all ISPs are guilty26:32 Senator Wyden’s Pushback28:05 Snowden Revelations29:00 Stay Vigilant!31:08 OutroArticle from VICE: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymruBrought to you by NBTV members: Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 14, 2022 • 10min
Apple's Private Relay: better than a VPN?
Apple’s iCloud Private Relay was unveiled in the middle of last year, and it made a big splash in the tech community. It makes browsing using Safari, Apple’s web browser, more private and anyone who has a paid iCloud account can turn it on. For the average user, it seems to be a huge step forward for privacy. But does this mean you should add it to your security toolbox?We’ll dive into how private relay works, all the pros and cons, and how it compares to VPNs and Tor, so that you can decide whether it’s the right fit for you. 00:00 - Intro 00:47 - VPNs and TOR: What are they?02:58 - How Privacy Relay Works05:03 - Apple’s Second Servers05:36 - Private Relay’s Three-fold Outcome06:15 - Pushback06:54 - My Recommendation07:49 - Privacy Comparison08:40 - SummaryPrivate relay is a significant upgrade for the average user, but there are caveats that a privacy-conscious person should be aware of.Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show