

NBTV: Your Money, Your Data, Your Life
Naomi Brockwell
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Episodes
Mentioned books

Apr 19, 2024 • 12min
What Your Photos Reveal!
 Learn how every photo and video you post online reveals secrets about you, including your location. Explore the practice of Open Source Intelligence (OSINT) and how it can be used to track people's exact locations. Get tips on protecting yourself when posting online and avoiding oversharing personal information. Find out how to remove metadata from photos to enhance your privacy and security. 

Apr 5, 2024 • 21min
The TRUTH about Bank Privacy
 Financial privacy has practically vanished over the last 50 years, with extensive financial surveillance in place. The evolution of bank privacy laws, impact of the Patriot Act, and hidden surveillance expansions are discussed. The podcast highlights the significant increase in data collection without warrants and the implications for individual privacy rights in a surveillance society. 

Mar 24, 2024 • 55min
A World Without Privacy
 The podcast discusses the current state of privacy and pervasive surveillance, emphasizing the need to embrace technology and encryption tools to reclaim privacy. It explores the psychological impacts of surveillance, advocates for privacy as a human right, and addresses common misconceptions about privacy. The importance of defending privacy in a surveillance society, promoting privacy practices in tech industry, and navigating privacy in messaging apps is also highlighted. 

Mar 8, 2024 • 14min
Stop Your Programs Reporting Your Activity with Little Snitch
 https://youtu.be/_0EiqiPuR4Qhttps://open.lbry.com/@NaomiBrockwell:4/Little-Snitch:7Our computers constantly talk to servers across the internet without us realizing, sharing information about our activities. Most of us don't even realize how many programs are silently connecting to the internet and sharing data. It usually happens without our explicit consent. But we can block these connections. On Mac, you can use a program called Little Snitch.In this video we look at the data is silently transmitted from our computer through things like telemetry, and show you how to use Little Snitch to regain control over the data leaving your computer.00:00 Your Computer’s SECRET WHISPERS01:39 Data Leaving Your Computer04:02 Little Snitch Walkthrough10:13 Bazzell’s Settings10:35 A Note About Alerts and Rules11:48 ConclusionUsing a reverse firewall like Little Snitch can be very revealing about how much data is silently being transmitted from our computer. Simply becoming aware of this can help us make better decisions with the tech we use.Our suggestions come from privacy expert Michael Bazzell, and we highly recommend you check out his site: https://inteltechniques.com/blog/2021/08/18/macos-telemetry-updateLittle Snitch can be found here: obdev.atThere is a similar product that apparently doesn't have the same granular functionality but is free called Lulu. I haven't tested it though, so you're on your own there!Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show 

5 snips
Feb 24, 2024 • 16min
Most PRIVATE Photo Backups
 Discover the hidden risks of default photo backups on iPhone and Android. Learn about secure backup options like Proton Drive and self-hosting with NAS. Explore setting up Synology NAS for photo backups and NextCloud systems for private image storage. 

Feb 10, 2024 • 14min
Decentralized Storage
 The podcast explores the dangers of centralized cloud storage and the control that tech giants have over our data. It discusses the risks of data centralization, including lack of control and potential censorship. The podcast also highlights the importance of decentralized storage in achieving a user-centric web and preserving digital evidence. 

Jan 26, 2024 • 23min
No SIM? No Problem!
 Learn about the privacy downsides of having a SIM card in your phone and discover alternative ways to stay connected without one. Explore the benefits of separating your SIM card and using a hotspot for increased privacy. Find out about the advantages and drawbacks of using hotspots for unlimited data plans. Explore the use of hotspots as an alternative to cell numbers for privacy benefits. 

Jan 14, 2024 • 12min
THIS is why privacy is CRUCIAL
 Explore the historical losses of privacy, the ongoing erosion of privacy in the digital age, and the importance of safeguarding personal information. Learn about the potential consequences of personal data breaches and the risks of easily accessible online information. Discover the long-term risks of sacrificing privacy and the need to avoid normalizing surveillance for a free society. 

Dec 24, 2023 • 7min
He's Sees You When You're Sleeping...
 Discussion on the lack of transparency and accountability around Santa's data collection. Exploring the methods of data collection that Santa uses, including unintentional information sharing. Privacy concerns associated with AskSanta.com, including third-party cookies and ad trackers. Santa's special agreements with governments and integration of Santa tracking technology. Suggestions for protecting digital privacy during the festive season. 

Dec 15, 2023 • 15min
You're LEAKING Your LOCATION!
 Learn how to protect your privacy by understanding the limitations of airplane mode, removing the SIM card, and not connecting to Wi-Fi. Discover the key settings to focus on and how cell tower communication can still track your location. Explore methods of phone connectivity to cell towers without a SIM card and the privacy implications of GPS. Find out how smartphones leak location and get tips on protecting your privacy. 


