Bitcoin, Blockchain, And The Technologies Of Our Future

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 190:55:58
  • Mas informaciones

Informações:

Sinopsis

Bitcoin, Blockchain & Technologies of Our FutureNaomi Brockwell is the host of the YouTube show "Naomi Brockwell TV" which explores bitcoin, blockchain, and the technologies of our future all over the world.

Episodios

  • How Surveillance Turns You Into a Puppet of the Internet

    03/10/2025 Duración: 14min

    https://youtu.be/Xr9l6xSrM28Platforms have one overriding goal: to keep us online as long as possible. And they’ve learned that nothing hooks us like outrage. But here's something many people don't realize: privacy and surveillance have everything to do with it. In this video I want to explore how surveillance is the key to polarization and how, ultimately, it's the engine that makes platform-driven polarization work.00:00 We’re More Polarized Than Ever00:27 Outrage02:08 Manipulation08:47 Targeting vs Filter Bubbles10:05 What We Should DoPrivacy is our ally in this fight. The less companies and governments know about us, the harder it is for them to manipulate us. Privacy protects our autonomy in the digital age. We don't need to be led by the mob around us and be a tool in their propaganda war. It's time to reclaim our autonomy.Brought to you by NBTV team members: Lee, Derek Porter, Will Sandoval and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose

  • Why I Don't Use the Mac App Store (and What I Use Instead)

    12/09/2025 Duración: 14min

    https://youtu.be/uaexH72AOBohttps://odysee.com/@NaomiBrockwell:4/Homebrew:5Are you using the App Store to manage apps on your Mac?You may want to reconsider.Using Apple’s App Store might feel convenient, but it comes with hidden privacy costs. Every app you download is tied to your Apple ID, creating a detailed profile of your habits, interests, and behavior.In this video, I expose the risks of using the App Store on your Mac, and teach you how to use Homebrew, a powerful, privacy-respecting alternative. Set it up with no tracking. No Apple ID. Just full control over what you install.00:00 The Privacy Cost of Using The Apple App Store01:09 Apple ID / App Store03:32 What is Homebrew04:27 Benefits06:36 Installation Tutorial09:52 Using Homebrew12:11 More ResourcesPrivacy doesn’t have to be overwhelming. With Homebrew you’ll reclaim the convenience of an App Store without all the surveillance, and without building a permanent record.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to

  • This is the moment the internet changed forever

    23/08/2025 Duración: 20min

    https://youtu.be/1DwOQwRn8_Yhttps://odysee.com/@NaomiBrockwell:4/KYC:9A huge portion of the digital world now requires mandatory ID checks.New surveillance laws such as the UK’s Online Safety Act, the EU’s Chat Control proposal, and a wave of US state-level KYC mandates have transformed the internet from an open network into a system of checkpoints and control.In this video, we expose the coordinated attack on privacy happening around the world. We trace how we got here, how platforms were pressured into compliance, and why this wave of regulation is unlike anything we have seen before.00:00 SHOW YOUR PAPERS01:43 UK’s Online Safety Act03:06 A Global Pattern06:11 How Did We Get Here?07:49 What Now?14:05 The SolutionThis landslide of lost freedoms has happened in mere weeks. It will become permanent if we don’t resist.The way forward is to rebuild the internet into what it was meant to be: a free and open network, not a system of checkpoints and control.Brought to you by NBTV team members: Lee Rennie, Derek Por

  • How Your ‘Anonymous’ Account Leaks Data

    01/08/2025 Duración: 22min

    https://youtu.be/dgd5_2pfEd0https://odysee.com/@NaomiBrockwell:4/Pseudonymous-social-media:6You don’t need to disappear off the grid to stay private online. But you do need a strategy.In this video, we break down how to use social media without revealing your real identity. We’ll walk through how to understand your threat model, avoid common mistakes, and build a pseudonymous identity that actually protects you.Whether you're just trying to keep your boss out of your business or avoid serious profiling, we’ll help you match your privacy tactics to your risk level, step by step.00:00 Anonymity Should be BANNED00:41 Storytime with Naomi03:29 Overview04:01 Understand Your Threat Model05:25 Platform06:24 Level 1 Basic Protections08:51 Level 2 Advanced Protections18:36 Level 3 Extreme Protections19:23 The Good NewsAchieving basic pseudonymity online is much easier than it sounds, and you absolutely have the power to reclaim it. Start from wherever you are. Every step you take makes a difference.Links to helpf

  • She Said "Don’t Write That Down." The Doctor Did Anyway.

    11/07/2025 Duración: 08min

    https://youtu.be/1PeAfNBNARIhttps://odysee.com/@NaomiBrockwell:4/Doctor-privacy:4Why doesn’t your doctor’s office feel like a safe place anymore?Most people assume their medical conversations are private. But in the U.S., the moment your doctor enters something into your Electronic Health Record (EHR), it can be legally shared with over 2.2 million entities—often without your knowledge or consent.Did you know there are financial incentives for providers to collect as much data as possible? That’s why they often document details that have nothing to do with your care that day. And if you ask your doctor not to include something in your record? You’ll likely be treated as the difficult one—for simply wanting privacy.Because privacy is no longer the default. The default is feeding your most sensitive information into an opaque system designed to share it with a vast, invisible network of third parties.In this short video, I share a real story from one of our NBTV members who tried to protect her privacy—and was

  • Your TV Is Spying On You and Taking Screenshots

    20/06/2025 Duración: 18min

    Your Smart TV is spying on you. It’s taking snapshots of everything you watch -- sometimes hundreds per second -- and quietly sending that data to third parties.In this video, we reveal what’s really happening behind the glass:How smart TVs track your behaviorHow that data is used to profile and manipulate youAnd how you can protect yourself.Surveillance has crept into our living rooms. It’s time to draw the line.00:00 TV Is No Longer a Private Activity00:39 Understanding Smart TVs05:30 How Data Is Weaponized08:34 Opaque By Design13:13 What Can We Do16:09 Grants from Ludlow16:33 In SummaryWe never should’ve let faceless companies and governments into our living rooms and bedrooms. The damage is deep, but it’s not irreversible. It starts with awareness. It’s time to blow the lid off the surveillance quietly woven into our lives, and start taking back control.Special thanks to Yash Vekaria and his team for their awesome research. Read their whitepaper here:https://dl.acm.org/doi/10.1145/3646547.3689013Brought t

  • Think before you share

    30/05/2025 Duración: 14min

    https://youtu.be/gGva7O3czg0https://odysee.com/@NaomiBrockwell:4/without-consent:5Your child already has a digital footprint—before they can even speak. But they didn’t create it. You did.Every photo you post, every milestone you share, helps train facial recognition systems and build psychological profiles your child will carry for life. These profiles are sold, scored, and used by companies and governments—long before your child is old enough to understand what privacy even means.In this video, we break down how seemingly harmless posts can fuel surveillance systems, shape algorithmic risk scores, and impact your child’s future—from school to jobs to border crossings.00:00 Kids Have No Choice01:08 Data Brokers Are Watching Your Kids01:35 How Children Are Profiled02:31 One Possible Future03:32 Child ID Theft03:50 The Dangers of Toys and Devices05:34 Baby Monitors06:19 Data Collection in Schools06:35 Risks of Hand-Me-Down Tech06:51 Parental Surveillance Apps10:02 Tips to Protect Kids in the Digital Age12:28 G

  • How To Make Your Mac PRIVATE

    09/05/2025 Duración: 30min

    https://youtu.be/1g0RzOGxe40Step-by-Step Privacy Hardening:Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s privacy.In this video, we walk you through privacy expert Michael Bazzell’s recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.00:00 Apple promises only THEY will abuse your data02:20 Purchasing Your Mac03:14 Choose a Model03:41 Used Devices: Update, Reformat, Install OS08:28 Initial Setup11:32 WiFi and Bluetooth11:50 OS Firewall13:14 Notifications14:16 Airdrop, Siri, and Sharing15:33 Gatekeeper18:26 Analytics and Ads19:01 Time20:15 Filevault22:02 Dock, Wallpaper and Finder25:35 Application Firewall / 3rd Party Apps28:09 ConclusionApple does build decen

  • DON'T Install That Extension!

    18/04/2025 Duración: 20min

    https://youtu.be/11P6DdI8HOohttps://odysee.com/@NaomiBrockwell:4/Extensions:6You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.In this video, we expose the chilling truth about browser extensions.You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users.And we’ll break down why just checking permissions isn’t enough—because malicious extensions often ask for the same permissions as the good ones. It’s not about what they ask for. It’s how they use it.00:00 Extensions can do WHAT00:52 Overview01:34 The Problem with Browser Extensions09:18 How Do We Protect Ourselves10:52 Understand Permissions16:03 Grant Fewer Permissions16:18 Use Extensions Sparingly17:10 Use a Private Browser18:06 Least Privilege18:28 Use Code

  • Why I NEVER Restore From Backup

    04/04/2025 Duración: 12min

    https://youtu.be/tzTtF3vOiq0https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:fEvery time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.00:00 Resist Temptation00:41 App Bloat01:50 Attack Surface02:51 Switch Accounts03:49 ID Tracking04:17 Ghost Data05:27 Habit Traps06:17 Reclaiming Mental Bandwidth07:14 7 Tips10:02 My Thoughts on Restoring From BackupWhen people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing

  • How To DE-GOOGLE Your Phone! (2025)

    21/03/2025 Duración: 25min

    https://youtu.be/Zo9qHqTDcgMhttps://odysee.com/@NaomiBrockwell:4/Graphene-Install:eYour phone is a tracking device. But it doesn’t have to be.One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we’ll show you how to use it in a more privacy-preserving way.I’ll walk you through how I set up my GrapheneOS device so you can see what’s possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!00:00 Spyware is all over our smartphones01:47 Hardware03:03 Purchase05:13 Installation10:24 Setup13:33 App Stores19:32 Secondary Profiles23:46 Your Phone, Your RulesAs difficult as it may se

  • The UK Govt Just Killed Your iCloud Privacy – Here's What to Do

    07/03/2025 Duración: 12min

    https://youtu.be/AuqOzn9GWTUhttps://odysee.com/@NaomiBrockwell:4/UK-Vs-Apple:aIn an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disabled ADP entirely for UK users. By doing this, Apple alerted the world to the secret order—but it also left UK users vulnerable. Their backups, photos, notes, and more are now accessible to the government.In this video, you'll learn exactly what Apple data is no longer private, and discover privacy-focused alternatives for your files, photos, emails, notes, and more. The UK government is fishing for your personal information—now’s the time to ramp up your protections and take control of your digital life.00:00 An Unprecedented Attack03:24 What Kind of Data is Affected03:57 Safari Bookmarks Alternatives04:34 iCloud Drive Alternatives05:38 Notes Alternatives06:06 R

  • Enable THIS Setting If You Use Signal!

    21/02/2025 Duración: 10min

    https://youtu.be/NXuRlvJI2N8https://odysee.com/@NaomiBrockwell:4/signal-usernames:7Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don’t realize how they work—some mistake them for their profile name, and figuring out how to share or search for usernames can be confusing. Here’s what you need to know: how usernames work, how to set yours up, how to find others, and the privacy benefits (and limitations) of this new feature.00:00 Signal’s Game-Changing Privacy Upgrade00:51 What Are Signal Usernames? (and Why You Should Use One)01:34 Step-by-Step: Setting Up Your Signal Username02:14 How to Find People on Signal Without a Phone Number03:13 The Pros & Cons of Signal’s Username System05:14 Should You Let Signal Access Your Contacts?05:44 How Signal Protects Your Contact List (Explained)06:35 How to Change Your Signal Username Anytime07:42 Hide Your Phone Number on Signal – Here’s How08:27 Final Thoughts – Why This

  • Yes, your car can be hacked

    07/02/2025 Duración: 50min

    https://youtu.be/rKnoP30Q6Ighttps://odysee.com/@NaomiBrockwell:4/Car-hacking:dSecurity researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think.00:00 Car Hacking Doesn’t Seem Real01:13 How Sam Got Into Car Hacking04:55 Why Connected Cars Are Not Secure12:11 Types of Attacks Researched14:36 The Subaru Experiment16:53 Kia Connect Research18:11 Tesla Bug Bounty Program23:01 VPN Security23:37 Little Regard for Security of Consumers26:23 Jasper32:52 Tether Hacking34:10 The Problem with ISP Backdoors38:35 Self-Driving Cars39:43 Hacking Driver Accounts43:20 What People Can Do44:34 We Take Our Privacy For Granted Until It Is Summoned47:45 Where We Are Now and Where We Are GoingCars aren’t just vehicles anymore—they’re data goldmines, storing your messages, photos, and location history. We need to rethink how much personal info we’re handing over and who has access to it.Special Thanks to Sam Curry! Check out his blo

  • Privacy 101

    24/01/2025 Duración: 14min

    https://youtu.be/UgXjxQsyk4whttps://odysee.com/@NaomiBrockwell:4/privacy-101:3In today’s hyper-connected world, our personal information is being collected, shared, and sold—often without our knowledge or consent. But here’s the good news: you can fight back. More people than ever are waking up to the importance of digital privacy and taking action to protect themselves.The big challenge? Many people don’t know where to begin. That’s where this video comes in.This Privacy 101 guide is designed for anyone just starting their privacy journey. I’ll show you six of the easiest, most impactful steps you can take right now to safeguard your digital life—starting with the basics and building your confidence along the way.We’ll cover:

  • Have we lost internet freedom forever?

    10/01/2025 Duración: 07min

    https://youtu.be/E9iPKu1v7oshttps://odysee.com/@NaomiBrockwell:4/year-in-censorship:fOn Dec 31st, 2024 I was invited on to Al Jazeera to discuss internet censorship, the new Australian ban on children under 16 from accessing social media, and whether banning TikTok will help prevent the spreading of misinformation.00:00 Everyone Is Trying to Hijack Our Attention00:38 Introduction to The Stream00:54 Censorship is a Government-Led Effort02:51 The Curious Case of TikTok Bans05:03 It is Never About The ChildrenGovernments, data brokers, and social media companies have a vested interest in filling their giant databases with our information and we know that they can’t protect it. There are data breaches every single day. Former president of Cisco John Chambers once said, “there are two types of companies in the world, those that have been hacked and those that don’t yet realize they have been hacked”. We need to start taking back the narrative that these entities know what is best for our data, and our lives, or el

  • Why I’m A Techno-Optimist

    27/12/2024 Duración: 18min

    https://youtu.be/MtHKGaDA30ghttps://odysee.com/@NaomiBrockwell:4/Techno-optimism:bIt’s easy to feel pessimistic, even hopeless, about the future of privacy in a world so deeply intertwined with technology. This is because we’ve been tricked into thinking that powerful technology can only be wielded by powerful entities who want to spy on us.But I’m very much a techno-optimist. In this video I’ll explain why I believe that we have all the tools at our disposal to write a better future. I’ll also go over some groundbreaking innovations currently in development coming to our near future.In this new digital world of mass surveillance, we’re far from powerless – we have every reason to feel energized and excited. For the first time, we have both the technology and the cultural momentum to take back our privacy. But we’ll only win it if we stop demonizing technology, and understand that it’s only by harnessing the powerful privacy tech at our disposal, building more of it, and incorporating it into our daily lives

  • “I Have Nothing to Hide” – The Dangerous Myth About Privacy

    13/12/2024 Duración: 18min

    https://youtu.be/Hcqh0ZSza50https://odysee.com/@NaomiBrockwell:4/nothing-to-Hide-v7-ODYSEE-20241213-001:a“I have nothing to hide”.It’s become a default response from many to overreaching surveillance.When did privacy start being about having something to hide? It used to simply be about having the right to decide for ourselves who gets access to our data. But over the past decade we’ve lost that choice, and so much of our personal and sensitive information is shared without our knowledge or explicit consent. In this video I want to give you a list of arguments you can use in response to anyone who dismisses the importance of privacy because they “have nothing to hide”.00:00 “I Have Nothing To Hide”01:33 Privacy is About Consent02:35 Nothing to Hide, Everything to Protect04:34 Privacy is NOT Dead05:18 Your Data Is Forever06:03 It’s Not About You08:14 Uncertain Future10:10 Surveillance Stifles Creativity and Dissent11:30 Surveillance Isn’t About Criminals12:29 Your Data Puts Others at Risk14:25 You Send A Signa

  • Block Phone Tracking

    29/11/2024 Duración: 15min

    https://youtu.be/PPnFJ8PeSsYhttps://odysee.com/@NaomiBrockwell:4/faraday-bags:0Our phones and laptops are like personal tracking devices, constantly emitting signals that map our every move. But what if you could take back control of your privacy without ditching your tech? Enter Faraday bags—a simple yet powerful tool to block unwanted tracking. In this video, I’ll show you how Faraday bags work, the privacy threats they protect against, how to pick the right one, and how to test it. Plus, I’ll share best practices and what Faraday bags can’t do, so you can make the most of this privacy tool.00:00 We Are Wardriving for Google and Apple04:06 How Faraday Bags Work07:07 How Blocking EM Waves Protects Privacy09:26 Choosing a Faraday Bag10:53 Where to Buy a Faraday Bag11:23 Testing a Faraday Bag12:54 Shortcomings13:30 SummaryWith identity theft, unauthorized tracking, and the constant harvesting of your digital activities on the rise, safeguarding your information is simply smart, not extreme. Take control of you

  • They hide secret code in your apps

    16/11/2024 Duración: 01h02min

    https://youtu.be/vUQLkHK7eNIhttps://odysee.com/@NaomiBrockwell:4/Byron-Tau:1Your favorite apps might be secretly selling your location and personal data. Governments and shady corporations are buying data from brokers to track your every move—no warrants required. In this interview, I sit down with Byron Tau, author of Means of Control, to uncover the hidden world of secret code in your apps, shady shell companies, and the surveillance economy we've unknowingly accepted. This is a wake-up call for anyone who values their privacy. Watch now to learn how modern tech is being weaponized—and what you can do about it.00:00 We Must Change Social Norms on Privacy05:33 Why the US Purchases Data07:13 Third Party Doctrine09:44 Evolution of Data Collection14:12 The Impact of Mass Data Collection16:10 Insidious Uses for Data19:43 History of Private vs Government Entities24:14 How We Can Push Back27:47 Data Brokers’ Devilish Tactics30:14 The Data Broker Industry is MASSIVE32:09 Ways Data Brokers Hide35:24 Real-Time B

página 1 de 23