
NBTV: Your Money, Your Data, Your Life
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Latest episodes

Jul 2, 2022 • 14min
How Your WiFi is Betraying You
Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.Main takeaways:Turn your WiFi OFF when you're not using itDon't automatically connect to WiFi networksForget networks after joining themKeep your OS and device updated00:00 Intro01:00 How WiFi connections work04:29 Hidden networks05:49 Why broadcasting SSIDs is a privacy nightmare: Tracking07:45 Why broadcasting SSIDs is a privacy nightmare: Exposes Private Info09:06 MOST IMPORTANT PART OF THE VIDEO: malicious connections11:03 How to protect yourself13:11 SummaryResearch paper from Johanna Ansohn McDougall:https://arxiv.org/pdf/2206.03745.pdfVideo from Modern Rogue:https://youtu.be/NkNgW3TwMy8Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 22, 2022 • 13min
PRIVATE Alternatives to Google Docs!
Billions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 15, 2022 • 10min
Phone Pair-Lock Tutorial: BLOCK Phone Searches!
When traveling, your device may be at risk of confiscation by authorities, and that means a lot of your sensitive data is at risk. In our previous video we discussed how to keep your data safe, and one tool we mentioned is called "phone pair-locking". This prevents a forensics machine from connecting to your device to analyze it, and also prevents anyone making a copy of your phone. In this video, we will take you step by step through the process of locking your phone to a trusted computer. WARNING: This process will permanently wipe all data from your phone, so proceed with caution!NOTE: This process is only available for iOS devices00:00 Intro00:33 What is Phone Pair Locking?01:41 What is Rooting?2:08 Warning2:32 Setup Supervised State3:06 Download Apple Configurator03:19 Main Tutorial Start04:24 Create a Profile06:07 Apply Profile to Phone07:05 Helpful Tips and Considerations08:33 ConclusionHuge thank you to Michael Perklin for his expertise!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Jun 8, 2022 • 11min
Privacy Travel Tips: How To Keep Your Data Private If Your Phone Is Seized
Traveling with digital devices can be risky -- sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds.For anyone who wants to maximize privacy, here are 6 tips for traveling with electronic devices.The final tip is “phone pair locking”, where, even if your phone is taken by security, it can't be connected to any forensics machines or copied.00:00 Intro01:49 How Phone Pairing Threatens Your Privacy03:56 How to Protect Your Data04:00 Power Off Devices05:32 Silo Data06:13 Don't Draw Attention To Yourself07:04 Protect Your 2FA Seeds07:25 Configure Your Pin Settings08:28 Phone Pair-LockingBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 31, 2022 • 12min
They're not SELLING your data. It's MUCH worse...
It says on the Big G's website:‘We do not sell your personal information to anyone’”The truth is, they ARE SHARING your personal and sensitive information, and being compensated handsomely in return. But what’s ACTUALLY going on in this exchange is far WORSE that you can possibly imagine.I chat with Bennett Cyphers from EFF, and Johnny Ryan from the Irish Council for Civil Liberties, about what is actually being done with your personal information and real-time location data.00:00 "We Don't Sell Your Data"00:36 How Do They Make Their Money?01:32 Real-Time Bidding03:22 How the Data is Collected04:10 What Data is Collected?05:27 Which Companies Get Your Data?06:38 WHAT Do These Companies Do?08:58 How Is All This Possible?10:06 Are They Selling Your Data?10:31 How Can We Protect Ourselves?Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 21, 2022 • 10min
These Tracking Links Reveal A LOT About You
Tracking links are a way for sites to track you across the web. They usually look like super long strings of random numbers attached to the end of normal URLs, and companies use them to build up dossiers on people based on their browsing habits. And they can reveal VERY sensitive information about you!Luckily there are many tools available to help you strip them out and protect your privacy. 00:00 What are Tracking Links?02:50 How to Spot a Tracking Link05:09 Sneaky ways sites track you05:59 How to Stop Tracking Links06:27 Debouncing07:22 Unlinkable Bouncing08:56 BEST Tip for Stopping Tracking LinksBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 20, 2022 • 33min
ISPs Share "Netflow" Data & Trace Traffic Through VPNs
VICE has a great article explaining how internet service providers quietly share detailed information about network traffic. It's called "netflow data" and they can even trace traffic through VPNs.But the scary part is how many people that data is then shared with.We dive into the details.00:00 Intro01:45 ISPs and Netflow Data05:47 What is netflow data?08:22 What is done with YOUR Data?15:29 "We don't give away all your data... we promise"20:49 Palo Alto Networks has access to 80% of Global Flows22:37 Not all ISPs are guilty26:32 Senator Wyden’s Pushback28:05 Snowden Revelations29:00 Stay Vigilant!31:08 OutroArticle from VICE: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymruBrought to you by NBTV members: Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 14, 2022 • 10min
Apple's Private Relay: better than a VPN?
Apple’s iCloud Private Relay was unveiled in the middle of last year, and it made a big splash in the tech community. It makes browsing using Safari, Apple’s web browser, more private and anyone who has a paid iCloud account can turn it on. For the average user, it seems to be a huge step forward for privacy. But does this mean you should add it to your security toolbox?We’ll dive into how private relay works, all the pros and cons, and how it compares to VPNs and Tor, so that you can decide whether it’s the right fit for you. 00:00 - Intro 00:47 - VPNs and TOR: What are they?02:58 - How Privacy Relay Works05:03 - Apple’s Second Servers05:36 - Private Relay’s Three-fold Outcome06:15 - Pushback06:54 - My Recommendation07:49 - Privacy Comparison08:40 - SummaryPrivate relay is a significant upgrade for the average user, but there are caveats that a privacy-conscious person should be aware of.Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 12, 2022 • 32min
EU's TERRIFYING Mass Surveillance Plan - w/ Matthew Green
A leaked document from the EU, proposing new regulation, describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR.The proposal is for a new mass surveillance system that will read private text messages, not to detect CSAM, but to detect “grooming”.It would mandate scanning of encrypted messages for CSAM material.Once you open up “machines reading your text messages” for any purpose, there are no limits.Matthew Green, renowned security expert and cryptography professor, says:"Let me be clear what that means: to detect 'grooming' is not simply searching for known CSAM. It isn’t using AI to detect new CSAM, which is also on the table.It’s running algorithms reading your actual text messages to figure out what you’re saying, at scale."Matthew and I dive into everything you need to know. 0:00 Pre-roll0:53 Intro2:00 The EU SILL SCAN Your Computers2:23 Matthew Green4:12 System will READ text messages between people to try to detect "grooming".7:52 "This is not voluntary."18:47 Targeting dissidents and election disinformation23:40 Apple's CSAM-scanning proposal27:38 Decentralization: "They can't win."30:55 Quiz Winner: Congratulations SpeedRacer111!32:40 Show Out and ThanksEU report:https://ec.europa.eu/home-affairs/system/files/2022-05/Proposal%20for%20a%20Regulation%20laying%20down%20rules%20to%20prevent%20and%20combat%20child%20sexual%20abuse_en_0.pdfBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

May 6, 2022 • 29min
These Mental Health Apps Are A Privacy Nightmare
Before downloading an app do you check the privacy policy and encryption practices it uses for your data? Luckily Mozilla checks for you. They just updated their "Privacy Not Included" guide that tells you everything you need to know about whether an app is trustworthy or not. And it turns out that a whole lot of meditation and prayer apps have... CONCERNING data practices. Find Mozilla's guide here:https://foundation.mozilla.org/en/privacynotincluded/Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show