
NBTV: Your Money, Your Data, Your Life
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Latest episodes

Oct 21, 2024 • 27min
Can Democracy Survive Without Privacy?
https://youtu.be/NciVkd6ddPohttps://odysee.com/@NaomiBrockwell:4/Zimmermann:fIn the early 90s, Phil Zimmermann, the godfather of privacy, released a groundbreaking encryption program called Pretty Good Privacy, or PGP. This software allowed people to protect their email communications with robust encryption. The government then investigated Phil for 3 years, claiming that by spreading PGP around the world as free encryption software, he was engaging in munitions trafficking and jeopardizing U.S. national security.The battle goes down in history as the first Crypto Wars, against encryption, and it was waged by people all over the world who believed that privacy was a fundamental right.PGP became the most widely used email encryption software in the world. And thanks to his effort to make sure encryption tools remain available to the public, we now have the ability to protect our privacy.But once again we find ourselves in another crypto war, with governments around the globe once again trying to undermine privacy.I chat with Phil about why he created PGP, the current state of global surveillance, and why we must fight for the future of privacy.00:00 Governments Live in a Golden Age of Surveillance00:58 Phil Zimmerman Introduction02:34 Phil’s Motivation for Creating PGP05:19 What’s at Stake if Government Abolishes Privacy10:50 The Risk of Not Standing Our Ground14:04 Surviving in a World Where Government Policy is Anti-Privacy15:15 How to Create a Groundswell Movement16:14 Highlighting Shifting Baselines18:40 We Need to Obtain and Use Privacy Tools NOW19:43 Governments are Pressuring Companies20:18 Phil’s Parting Words of Advice22:08 Policy vs ActionEverything that we do is surveilled and it’s not clear that democracy can survive governments having this level of omniscience. However, hope is not lost. By obtaining and using privacy tools now, we can preserve our right to privacy, and make a stand before it’s too late.Special thanks to Phil Zimmerman, a true hero of the privacy space!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Oct 18, 2024 • 24min
How To Use AI PRIVATELY
Brian Bondy, co-founder and CTO of Brave, and Eric Voorhees, tech entrepreneur and founder of Venice.ai, delve into the double-edged sword of AI. They highlight the transformative potential of AI in daily life while sounding alarms about significant privacy risks, including data collection and government surveillance. The duo discusses innovative solutions like Brave Leo and Venice, emphasizing how users can enjoy AI benefits without sacrificing privacy. Their insights advocate for transparent choices and proactive engagement with digital privacy.

Oct 4, 2024 • 16min
Why I Use Disappearing Messages
https://youtu.be/T32XfRSaC0whttps://odysee.com/@NaomiBrockwell:4/disappearing-messages:5In today’s digital world, nothing is truly secure. Imagine waking up to find that a hacker had posted every conversation you’ve ever had online. We don't need to keep a permanent trail of all of our digital conversations, that could be hacked at any time, and there are deep psychological effects when we do so. In this video, I make a case for using disappearing messages.00:00 Imagine THIS Nightmare01:48 Your Messages Are At Risk03:14 Damage of Exposure06:39 Psychological Impact08:28 How to Set Up Disappearing Messages09:04 Signal09:30 Whatsapp09:45 Facebook Messenger09:58 Telegram11:08 Session11:42 Protonmail12:44 Tips and Best Practices14:53 ConclusionWhether we’re safeguarding sensitive information, limiting our exposure, or simply reducing the clutter of our digital lives, turning on disappearing messages is a small change with significant impact. Disappearing messages are a great tool in your privacy toolbox for this increasingly permanent digital age.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Sep 20, 2024 • 25min
You Have No Medical Privacy
https://youtu.be/4sfIBRTcRpUhttps://odysee.com/@NaomiBrockwell:4/HIPAA:7Most people think that HIPAA means that their medical records are kept private. But what if I told you that HIPAA doesn’t protect your privacy at all?This is our first video in a series about medical privacy, specifically looking at legislation that stripped individuals of the right to consent to medical data sharing. We focus on what HIPAA actually is, how it came to allow our data to be shared without us even knowing, how we’ve been tricked into thinking we have privacy, and steps we can take to reclaim control of our medical data.00:00 The State of Medical Privacy is a Mess02:29 What is HIPAA07:39 How Your Data is Shared12:10 The Illusion of Privacy14:48 What Can We Do22:16 We Deserve Medical PrivacyWe deserve privacy in our medical system. Our health information is sensitive, and we should be allowed to protect it. Even while we fight for better medical privacy, please always prioritize your health. Special Thanks to: Twila Brase, Rob Frommer, and Keith Smith for chatting to us!List of doctors who have opted out of the surveillance system:https://jointhewedge.com/Twila's website: https://www.cchfreedom.org/patient-toolbox/Do you want to fight the system and lead a suit against medical data collection? Contact the Institute for Justice: https://ij.org/Keith Smith's Surgery Center:https://surgerycenterok.com/Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Sep 6, 2024 • 11min
Surveillance: The New Normal
https://youtu.be/aXhXkXcMXyMhttps://odysee.com/@NaomiBrockwell:4/Fish:e28What do Fish and Privacy have in common? This video will explain. Our expectations of privacy have shifted dramatically in the past few decades. What was once considered outrageous overreach has become normal, and we've lost sight of what a healthy amount of privacy even looks like. It's called shifting-baseline syndrome, first coined in relation to fish populations. This video is based on a fantastic essay by Bruce Schneier and Barath Raghavan: We take stock of how privacy expectations have changed, and think about whether this is really the future we want to be moving towards.00:00 Privacy is Like Fish - Huh?00:38 Our Perception of Privacy04:35 Fish???05:55 Shifting Baselines08:37 Is This the Future We Want?10:43 Privacy is Like My PlantA huge thank you to Bruce Schneier and Barath Raghavan for letting us reproduce their ideas in video form. Original essay: https://spectrum.ieee.org/online-privacyBrought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Aug 23, 2024 • 11min
Ditch SMS! How to convince your friends
Digital conversations dominate our lives, but privacy is at risk with traditional messaging. Discover clever strategies to encourage friends to switch to private messaging apps with top-notch security. From educational approaches to subtle persuasion, persistence is crucial in promoting better privacy habits. Unpack the challenges of getting loved ones onboard, while emphasizing the importance of patience and support for digital rights. Transform your communication and foster a more secure digital world, starting with your inner circle!

Aug 9, 2024 • 17min
Should You Use Fingerprint Unlock?
https://youtu.be/c0ZAPaRddfohttps://odysee.com/@NaomiBrockwell:4/Fingerprint-unlock:eShould you use fingerprint unlock on your device? The answer is not going to be the same for everyone. In this video, I look at the benefits and tradeoffs of using fingerprint readers, and try to compare the security of fingerprint unlock vs a pin or password. A major factor to consider is actually what kind of device you have. 00:00 You Asked, I Delivered!00:56 What is Fingerprint Unlock02:13 Should You Use Fingerprint Unlock03:15 Convenience Consideration04:18 Shoulder Surfing Protections04:49 Biometrics are Forever06:30 Brute Forcing12:07 Coercion14:40 SummaryFingerprints are more like usernames than passwords. They’re unique, static and identifiable as belonging to you. But Fingerprint security is also very convenient, and for many people shouldn’t be ruled out as an option. We are constantly unlocking our phones all through the day. So choose something that will be sustainable for you and is justified by your threat model, otherwise you might drive yourself insane. There is no perfect answer when it comes to phone security, so make a decision based on your unique context.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi Brockwell.Thanks to the GrapheneOS team for always being super helpful!To support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Jul 26, 2024 • 15min
Secure Your Files with Encrypted Containers!
https://youtu.be/xILGdtI9NPohttps://odysee.com/@NaomiBrockwell:4/Veracrypt:9Our devices contain a treasure trove of private information. We have sensitive work documents, cherished family photos, archives of private communications. You can keep these digital files safe by using encrypted containers, which are secure digital vaults that will help keep your data private. In this video, we explain how use the free, open source encryption program VeraCrypt.00:00 Our Digital Files Are Precious03:29 VeraCrypt04:43 Mounting and Directories Explained06:11 Tutorial13:27 Benefits of VeraCryptOur personal data is the currency of the modern surveillance world. Locking away our personal files behind an encrypted barrier is not just a luxury - it’s a necessity.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Jul 14, 2024 • 12min
Your Phone Contacts AREN'T Private
https://youtu.be/FloGxOlMSyIhttps://odysee.com/@NaomiBrockwell:4/Phone-Contacts:9The humble Contact List in our phone is a goldmine of data. Each contact is filled with the personal information like names, numbers, email addresses, home addresses, birthdays, work details and social media information. It’s the kind of information that data brokers salivate over because it allows unprecedented insight into consumer behavior, political leanings, and even potential vulnerabilities that could be exploited. The worst thing is, it's not even your information that's being taken -- When we don't protect our contacts list, it's the information that OTHERS have entrusted to us that we're sharing. In this video I talk about Contact Lists, why you might not want to store them in your phone or share them with other apps on your device, and finally I’ll talk about more private ways to store them.00:00 Your Phone Compromises Your Contacts00:28 Overview00:39 Why Contacts Lists Are Important01:51 Who Sees Our Contact List05:37 Private Ways To Store Contacts06:23 Reviewing App Permissions06:57 Third Party Contact Apps07:53 Encrypted Contact Storage08:43 Graphene: The Ultimate Solution09:57 It’s Time to Take Back Control!By disabling automatic cloud syncing, regularly reviewing and managing our apps’ contact permissions, and using privacy-focused apps and services, we can reduce the indiscriminate harvesting of our social graph. Our contacts deserve to be treated with the utmost care and respect.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Kieran Mesquita, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellWatch all of the tutorials in our Phone Privacy Playlist HERE: https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NYTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show

Jun 29, 2024 • 20min
They lied to you about car surveillance
Discover the alarming extent of data collection in modern cars and how it's shared via SIM cards, WiFi, and OBD ports. Learn about shady tactics used to obtain data and the legal loophole for law enforcement to collect without a warrant. Explore the challenges of car surveillance and the need to push back against data overreach.