Bitcoin, Blockchain, And The Technologies Of Our Future

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Duración: 190:55:58
  • Mas informaciones

Informações:

Sinopsis

Bitcoin, Blockchain & Technologies of Our FutureNaomi Brockwell is the host of the YouTube show "Naomi Brockwell TV" which explores bitcoin, blockchain, and the technologies of our future all over the world.

Episodios

  • How To Host AI Locally

    01/11/2024 Duración: 18min

    https://youtu.be/CVeZfM0pVyUhttps://odysee.com/@NaomiBrockwell:4/Local-LLM:dAI chatbots are taking over the world. But if you want to guarantee your privacy when using them, running an LLM locally is going to be your best bet. In this video I collaborate with The Hated One to show you how, and to explain some AI terminology so that you understand what's going on.00:00 Your Data is Used to Train Chatbots01:11 Understanding AI Models01:28 LLM02:23 Parameters03:34 Size04:51 AI Engine and UX07:15 Tutorial, courtesy of The Hated One08:07 Ollama12:40 Open Web UI installation13:23 Docker15:30 Setting up Open Web UI16:38 Choose to Take Control of Your DataThe biggest advantage of open source models is that you can fine tune them using your own instructions while keeping all data private and confidential. Why trust your data to someone else when you don’t have to?A huge thank you to The Hated One for his tutorial.You can find his playlist for staying anonymous here:https://www.youtube.com/watch?v=G_QsQp7DyjE&

  • The Internet Has Changed. Privacy Was Left Behind.

    25/10/2024 Duración: 42min

    https://youtu.be/sb6u-TpV-JAhttps://odysee.com/@NaomiBrockwell:4/BRENDAN-EICH:9As we rushed into the Web 2 era, privacy was left behind. There was a naive view that users could consent to something that was impossible to understand. The result was tracking and monitoring of every activity.I chatted to Brendan Eich, the creator of JavaScript, Co-Founder of Brave, and the Co-founder of Mozilla. We talk about how the privacy landscape evolved on the internet, and the future of our technology-driven world.00:00 The Serfs Have to Band Together!00:51 Why Privacy Matters04:30 Privacy Nihilism06:29 The Rise of Extensions11:48 Brave and Ads15:06 Privacy is Now Marketable16:31 Bridging the Divide Between Users19:58 They Are Profiling You21:50 Incentive for Government Control23:30 Tech Optimism24:48 Users Matter Most28:57 Companies Can Make a Big Difference31:47 UBlock Origin and Google33:23 There is No End to Security36:14 Braves Large Movement of Users37:37 Decentralization Pays Off38:00 Users Can Tilt Markets38:55 Wh

  • Criminalizing Privacy (Al Jazeera Interview)

    24/10/2024 Duración: 07min

    https://youtu.be/wcKtnnzsQGkhttps://odysee.com/@NaomiBrockwell:4/content-moderation:9In this interview from Al Jazeera on October 16th, 2024; I discuss the current state of global privacy legislation, ways that we can encourage free speech without censorship, and strategies for the future of privacy around the world.00:00 We Are Getting to a Real Scary Place00:30 Setting Scary Precedents Against Privacy03:17 Striking a Balance05:54 The Future of Privacy is Up the UsersIn an era where the web has converged on just a handful major companies that wield immense control over speech, we are seeing many independent voices drowned out. Instead of suppressing ideas, we can actually call out bad ideas for what they are and we can provide counterpoints. The best way to conquer bad ideas is with better ideas, not by suppressing ideas.Link to full interview: https://www.youtube.com/watch?v=sa1c16uTJVQBrought to you by NBTV team members: Lee Rennie, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.m

  • The Spyware Governments Use to Silence Dissent

    23/10/2024 Duración: 52min

    https://youtu.be/07-IsfTMujohttps://odysee.com/@NaomiBrockwell:4/Pegasus:d7Journalists, activists, and human rights defenders are being targeted and silenced daily by authoritarian governments that fear losing power. One of the deadliest tools used against them is Pegasus—a powerful cyber-surveillance weapon that puts lives at risk.In this interview, I sit down with Laurent Richard, founder of Forbidden Stories and co-author of Pegasus. His team broke the story on Pegasus spyware and built a global network to safeguard journalists working on dangerous stories. Learn how Pegasus operates, the fight to protect freedom of the press, and how we can combat digital surveillance before it’s too late.00:00 CyberSurveillance is a Military Weapon01:19 Forbidden Stories04:28 Global Spyware Threat05:17 How Forbidden Stories Broke The Pegasus Story15:40 The Danger of Intelligence Spyware22:59 Privacy is Essential for Democracy26:09 How to Begin Change29:55 CyberSurveillance Needs Regulation32:39 This is Where We Are34:47

  • It's Time To Uncover Who They Are

    22/10/2024 Duración: 51min

    https://youtu.be/0PbL1GeClQIhttps://odysee.com/@NaomiBrockwell:4/Surveillance-watch:2The surveillance industry operates by design in a shrouded, opaque manner. It's intentionally difficult for the public to understand the vast and intricate network of companies, subsidiaries,partnerships, affiliations, and even the financial backers of data brokers and surveillance-as-a-service companies. I chat with the creator of Surveillance Watch, an activist from Bahrain whose website is a mammoth effort to lift the veil on this industry, revealing the names and connections of clandestine entities, how they are funded, and which countries are using their services.00:00 Data is Being Weaponized Against Absolutely Everyone02:46 Why Surveillance Watch was Created03:58 The Shroud of Secrecy09:26  Overview of the Surveillance Capitalism Industry14:31  Why People Should be Concerned21:06 Long Term Considerations23:03 Testimonial24:09 It Is Not Too Late to Change Online Habits27:24 A Society of Orwellian Double-Speak29:35

  • Can Democracy Survive Without Privacy?

    21/10/2024 Duración: 26min

    https://youtu.be/NciVkd6ddPohttps://odysee.com/@NaomiBrockwell:4/Zimmermann:fIn the early 90s, Phil Zimmermann, the godfather of privacy, released a groundbreaking encryption program called Pretty Good Privacy, or PGP. This software allowed people to protect their email communications with robust encryption. The government then investigated Phil for 3 years, claiming that by spreading PGP around the world as free encryption software, he was engaging in munitions trafficking and jeopardizing U.S. national security.The battle goes down in history as the first Crypto Wars, against encryption, and it was waged by people all over the world who believed that privacy was a fundamental right.PGP became the most widely used email encryption software in the world. And thanks to his effort to make sure encryption tools remain available to the public, we now have the ability to protect our privacy.But once again we find ourselves in another crypto war, with governments around the globe once again trying to undermine priv

  • How To Use AI PRIVATELY

    18/10/2024 Duración: 23min

    https://youtu.be/rriStH1eTH0https://odysee.com/@NaomiBrockwell:4/Private-AI:fAI is already deeply integrated into our daily digital activities, whether we realize it or not, but it's a double-edged sword: On the one hand it can skyrocket our productivity and skillset. On the other, there are often serious privacy concerns to using it. Do you want to be able to use AI tools, without worrying that companies are collecting everything you're doing? In this video, I talk to two experts working on the privacy side of AI. We discuss the privacy risks of using AI, and how to protect ourselves -- exploring some of the most private platforms and looking at best practices.00:00 AI is Changing the World01:29 Privacy Risks06:09 Solutions07:36 Brave Leo13:00 Venice.ai18:22 Risks and Best Practices22:10 Are you a priv/acc?Especially in an age of AI, we need to be more mindful than ever of the consequences of leaking all of our data in online interactions. Luckily there are plenty of ways we can better protect our

  • Why I Use Disappearing Messages

    04/10/2024 Duración: 16min

    https://youtu.be/T32XfRSaC0whttps://odysee.com/@NaomiBrockwell:4/disappearing-messages:5In today’s digital world, nothing is truly secure. Imagine waking up to find that a hacker had posted every conversation you’ve ever had online. We don't need to keep a permanent trail of all of our digital conversations, that could be hacked at any time, and there are deep psychological effects when we do so. In this video, I make a case for using disappearing messages.00:00 Imagine THIS Nightmare01:48 Your Messages Are At Risk03:14 Damage of Exposure06:39 Psychological Impact08:28 How to Set Up Disappearing Messages09:04 Signal09:30 Whatsapp09:45 Facebook Messenger09:58 Telegram11:08 Session11:42 Protonmail12:44 Tips and Best Practices14:53 ConclusionWhether we’re safeguarding sensitive information, limiting our exposure, or simply reducing the clutter of our digital lives, turning on disappearing messages is a small change with significant impact. Disappearing messages are a great tool in your privacy toolbox for t

  • You Have No Medical Privacy

    20/09/2024 Duración: 24min

    https://youtu.be/4sfIBRTcRpUhttps://odysee.com/@NaomiBrockwell:4/HIPAA:7Most people think that HIPAA means that their medical records are kept private. But what if I told you that HIPAA doesn’t protect your privacy at all?This is our first video in a series about medical privacy, specifically looking at legislation that stripped individuals of the right to consent to medical data sharing. We focus on what HIPAA actually is, how it came to allow our data to be shared without us even knowing, how we’ve been tricked into thinking we have privacy, and steps we can take to reclaim control of our medical data.00:00 The State of Medical Privacy is a Mess02:29 What is HIPAA07:39 How Your Data is Shared12:10 The Illusion of Privacy14:48 What Can We Do22:16 We Deserve Medical PrivacyWe deserve privacy in our medical system. Our health information is sensitive, and we should be allowed to protect it. Even while we fight for better medical privacy, please always prioritize your health. Special Thanks to: Twila Brase, Rob

  • Surveillance: The New Normal

    06/09/2024 Duración: 11min

    https://youtu.be/aXhXkXcMXyMhttps://odysee.com/@NaomiBrockwell:4/Fish:e28What do Fish and Privacy have in common? This video will explain. Our expectations of privacy have shifted dramatically in the past few decades. What was once considered outrageous overreach has become normal, and we've lost sight of what a healthy amount of privacy even looks like. It's called shifting-baseline syndrome, first coined in relation to fish populations. This video is based on a fantastic essay by Bruce Schneier and Barath Raghavan: We take stock of how privacy expectations have changed, and think about whether this is really the future we want to be moving towards.00:00 Privacy is Like Fish - Huh?00:38 Our Perception of Privacy04:35 Fish???05:55 Shifting Baselines08:37 Is This the Future We Want?10:43 Privacy is Like My PlantA huge thank you to Bruce Schneier and Barath Raghavan for letting us reproduce their ideas in video form. Original essay: https://spectrum.ieee.org/online-privacyBrought to you by NBTV team m

  • Ditch SMS! How to convince your friends

    23/08/2024 Duración: 10min

    https://youtu.be/s9Ux8DFgMSMhttps://odysee.com/@NaomiBrockwell:4/ditch-sms:1Most of our conversations are digital, and our privacy hinges on our ability to convince others to use a private messaging platform. Getting friends and family to switch isn't easy though!Here are some strategies you can try, ranging from educational methods, to downright sneakiness!00:00 We have all decided to never answer our phone again02:12 Its Easy02:47 Privacy Leaks04:29 Response Delay05:45 Missed Connection06:37 Daily Reward08:35 App-Switching Fatigue09:10 It’s Worth the EffortConvincing people to switch to a more private messaging app can be tough, but it’s definitely not something you should give up on. Persistence and patience are key. By encouraging better habits you really are making a more private world, starting in your own backyard.We got all our suggestions from Michael Bazzell's book, "Extreme Privacy": https://amzn.to/3BLZ1gqDigital version: https://inteltechniques.com/book7.html (non affiliate li

  • Should You Use Fingerprint Unlock?

    09/08/2024 Duración: 17min

    https://youtu.be/c0ZAPaRddfohttps://odysee.com/@NaomiBrockwell:4/Fingerprint-unlock:eShould you use fingerprint unlock on your device? The answer is not going to be the same for everyone. In this video, I look at the benefits and tradeoffs of using fingerprint readers, and try to compare the security of fingerprint unlock vs a pin or password. A major factor to consider is actually what kind of device you have. 00:00 You Asked, I Delivered!00:56 What is Fingerprint Unlock02:13 Should You Use Fingerprint Unlock03:15 Convenience Consideration04:18 Shoulder Surfing Protections04:49 Biometrics are Forever06:30 Brute Forcing12:07 Coercion14:40 SummaryFingerprints are more like usernames than passwords. They’re unique, static and identifiable as belonging to you. But Fingerprint security is also very convenient, and for many people shouldn’t be ruled out as an option. We are constantly unlocking our phones all through the day. So choose something that will be sustainable for you and is justified by your threat mode

  • Secure Your Files with Encrypted Containers!

    26/07/2024 Duración: 15min

    https://youtu.be/xILGdtI9NPohttps://odysee.com/@NaomiBrockwell:4/Veracrypt:9Our devices contain a treasure trove of private information. We have sensitive work documents, cherished family photos, archives of private communications. You can keep these digital files safe by using encrypted containers, which are secure digital vaults that will help keep your data private. In this video, we explain how use the free, open source encryption program VeraCrypt.00:00 Our Digital Files Are Precious03:29 VeraCrypt04:43 Mounting and Directories Explained06:11 Tutorial13:27 Benefits of VeraCryptOur personal data is the currency of the modern surveillance world. Locking away our personal files behind an encrypted barrier is not just a luxury - it’s a necessity.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Reuben Yap, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit:https://www.nbtv.media/support(tax-deductible in the US)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's In

  • Your Phone Contacts AREN'T Private

    14/07/2024 Duración: 11min

    https://youtu.be/FloGxOlMSyIhttps://odysee.com/@NaomiBrockwell:4/Phone-Contacts:9The humble Contact List in our phone is a goldmine of data. Each contact is filled with the personal information like names, numbers, email addresses, home addresses, birthdays, work details and social media information. It’s the kind of information that data brokers salivate over because it allows unprecedented insight into consumer behavior, political leanings, and even potential vulnerabilities that could be exploited. The worst thing is, it's not even your information that's being taken -- When we don't protect our contacts list, it's the information that OTHERS have entrusted to us that we're sharing. In this video I talk about Contact Lists, why you might not want to store them in your phone or share them with other apps on your device, and finally I’ll talk about more private ways to store them.00:00 Your Phone Compromises Your Contacts00:28 Overview00:39 Why Contacts Lists Are Important01:51 Who S

  • They lied to you about car surveillance

    29/06/2024 Duración: 20min

    https://youtu.be/pA0zYTmi5ckhttps://odysee.com/@NaomiBrockwell:4/car-privacy-part-3:1We now know that the data collection in modern cars is out of control -- The question is, how does that data even leave your car? And what, if anything, can you do to stop it?That's what we cover in this video, Part 3 of our car privacy series: SIM cards, WiFi, and OBD ports. We also talk about how companies trick us into handing over our data, things that we can do to push back against this insane overreach that we’ve somehow normalized, and the giant legal loophole for cars that makes it super easy for law enforcement to collect your data without a warrant. 00:00 Your Car Saw What You Did in the Backseat!02:57 Don't plug in ANYTHING04:41 Satellite and Bluetooth05:47 WiFi06:29 SIM Cards08:22 Find out what's going on!11:10 Shady Tactics14:38 Challenging Data Overreach16:35 Car Warrant Loophole18:00 There is HopeThere currently are no easy fixes to the problem of car surveillance. Car manufacturers currently onl

  • My FAVORITE Privacy Tool

    15/06/2024 Duración: 09min

    https://youtu.be/x6jxxcv-d4Qhttps://open.lbry.com/@NaomiBrockwell:4/privacy-screen:cA privacy screen is an ESSENTIAL privacy tool for every tool box.In this video I explain what a privacy screen is, how the technology works, how to apply one to your devices, and go over important tips -- especially if you have a fingerprint reader on your phone screen.00:00 A SPY’s favorite tool01:15 What is a Privacy Screen?03:11 How it Works04:31 Tutorial06:03 IMPORTANT TIPS: Fingerprint readers07:54 ConclusionA privacy screen is a simple, affordable way to better protect ourselves from shoulder surfers and would-be thieves. You never know who might be looking over your shoulder, so use a privacy screen to protect your sensitive and private information.Watch all of the tutorials in our Phone Privacy Playlist HERE:https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NYBrought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbt

  • Stop Your Apps Secretly Talking To Each Other!

    01/06/2024 Duración: 15min

    Did you know that apps on your phone can see which other apps you have installed? And that apps can talk to each other and share information, without you realizing? In this video we show you how to stop apps communicating with each other, and look at the scoped storage and sandboxing of apps in GrapheneOS, and what it does and doesn't protect against. 00:00 Apps Can Talk to Each Other02:18 Sandboxing and Using Scored Storage on GrapheneOS04:58 Secondary Profiles10:24 Google Play Services: How To Stop Their Tentacles12:10 Setting Up 2nd Profile Tutorial13:40 ConclusionSecondary profiles are a great privacy tool to add to your toolbox. It's super opaque what the apps on our phones are doing, and using something like GrapheneOS really helps you reclaim your privacy by default.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi BrockwellWatch all of the tutorials in our Phone Privacy Playlist HERE:https://www.youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0

  • Do THIS Before Selling Your Car!

    17/05/2024 Duración: 15min

    https://youtu.be/Ff9pmaSdZV8https://odysee.com/@NaomiBrockwell:4/selling-your-car:6Cars are no longer dumb machines -- They're smart devices with hundreds of computers bolted on top that collect information about our activities. Some car companies have even explicitly said in their privacy policies that they collect information about your sexual activity!Given that so much information is stored in our car, what happens when we sell it? Do we just hand this sensitive information off to the next owner? And given the remote capabilities of modern cars, how do we make sure the previous owner can't still access our data when we buy a used car?Here are steps you MUST take when you buy or sell a used car.00:00  Cars Collect Info on Your Sex Life!02:25  Selling Your Car05:18 Renting a Car07:32 Deleting Data from the Head Unit09:11 Buying a Used Car11:59 Asserting Data Rights12:39 Recap13:51 ConclusionNow that we’re starting to get a glimpse of what’s going on under the hood of car data collection, we can st

  • Turn THIS on if you use iCloud!

    04/05/2024 Duración: 08min

    https://youtu.be/-1khYr697jMhttps://open.lbry.com/@NaomiBrockwell:4/Adv-Data-Protection:eThanks to powerful marketing, privacy is something we’ve come to immediately associate with Apple. But your iCloud is probably NOT as private as you think. Last year, Apple added E2EE for iCloud backups, with a tool called "Advanced Data Protection”. This setting means that your documents, photos, and other personal information in iCloud are kept private and out of the reach of even Apple itself. BUT, this setting is NOT turned on by default. Unless you have specifically turned on the setting, and set backup users or codes, everything in your iCloud can be read by Apple. And regardless of whether Advanced Data Protection is enabled, some things in the Apple ecosystem are never E2EE, and it's important to know what they are.In this video we explain exactly what is being protected with Advanced Data Protection, how to turn it on, its limitations, and other options that you might use for your backups instead.00:00

  • What Your Photos Reveal!

    19/04/2024 Duración: 12min

    https://youtu.be/VaUsJvUMUgEhttps://open.lbry.com/@NaomiBrockwell:4/OSINT-photos:8Every picture and video you post spills secrets about you, maybe even revealing where you live. The process of connecting all these dots of our online activities is a practice known as Open Source Intelligence, or OSINT. It's the practice of using all the information available online such as public records, reviews we write, email addresses, usernames, location check ins, and social media, to link together the breadcrumbs of someone's digital life. Jose Monkey has 1.7 million TikTok followers, and shows us how he finds people's exact location just by using OSINT on their videos. We teach you best practices for posting photos and videos online, and how to make sure that you're not giving away more information than you intend.00:00 Every Pic You Post Spills Secrets01:11 OSINT: Breadcrumbs of your digital life02:22 Finding people's EXACT location from videos02:54 Tools to track people05:45 Tips to Protect Y

página 2 de 23