Sinopsis
Bitcoin, Blockchain & Technologies of Our FutureNaomi Brockwell is the host of the YouTube show "Naomi Brockwell TV" which explores bitcoin, blockchain, and the technologies of our future all over the world.
Episodios
-
The Dangers of Browser Extensions
01/08/2022 Duración: 14minhttps://youtu.be/j0ieRrwae5whttps://open.lbry.com/@NaomiBrockwell#4/Browser-Extensions#6Browser extensions can be a lot more dangerous than people realize.They can monitor your activities, steal your data, or even log your keystrokes and passwords.In this video we explain how browser extensions work, what you be wary of, and how to use them safely. We also dive into the history of browser extensions and plugins.00:00: Intro00:48: What is a Browser Extension?01:27: Plug-ins vs Extensions03:38: Rise of Extensions05:54: Danger of Extensions07:20: Malicious Extensions08:29: Hackers08:51: Repurposed Extensions09:23: Uninformed Users09:52: Bad Code10:24: Good side of extensions12:40: How to Stay SafeThere are some awesome extensions out there that can make your browsing experience better and safer, just make sure you're not installing a trojan horse filled with trouble just waiting to get into your computer. Brought to you by NBTV members: Lee Rennie, Will Sandoval, Sam Ettaro and Naomi BrockwellTo support NBT
-
DON'T Buy Email Hosting From Your Web Registrar!
23/07/2022 Duración: 15minhttps://youtu.be/K9SiOYRcTCchttps://open.lbry.com/@NaomiBrockwell:4/private-email-hosting:9Being able to use your business name for your email address is professional and also puts you more in control of your communications. Most email hosting options offered by your web registrar are NOT private though, so what do you do? You can host any domain email with Protonmail instead!Protonmail is renowned for their great privacy and encryption, but you don't have to use their @protonmail.com email address -- they allow you to use your own custom domain, while still enjoying all the encryption benefits they have to offer!In this video we will teach you how to move your custom email domain over to Protonmail, to keep all your communications private.00:00: Intro02:00: Protonmail Privacy04:53: Moving Custom Domains to Protonmail06:04: Adding Your Domain06:18: Verify Your Domain08:04: Configure DNS Records08:50: Create Addresses / Add Users09:23: Configure DNS Records - cont’d14:15: Why Custom Domains Are ImportantL
-
The Most Important Case in Crypto
22/07/2022 Duración: 08minhttps://open.lbry.com/@NaomiBrockwell:4/The-Most-Important-Case-in-Crypto:5Is every single crypto transaction about to be ruled illegal?Yesterday one of the most important hearings in crypto took place, and most people had no idea.Basically, the SEC is suing LBRY Inc. for illegally selling securities -- They argue that LBRY credits, or LBC (the token that makes the entire decentralized LBRY ecosystem run), is a security.Yesterday was a hearing at the US District Court in New Hampshire to determine whether there would be a summary judgment or whether the case would move to trial. But the case is bigger than almost anyone realizes, and will set the precedent for how the ENTIRE INDUSTRY is regulated.Here is what the SEC argued in court:It doesn't matter if 75% of purchases are for utilityIt doesn't matter if the work isn't being done by sellerIt doesn't matter if the seller never uses investment languageAll that matters is where the token price is moves on the open market.This would mean that
-
Getting MULTIPLE PRIVATE Phone Numbers
15/07/2022 Duración: 18minhttps://youtu.be/HYNZKQZEHoUhttps://open.lbry.com/@NaomiBrockwell#4/Getting-MULTIPLE-PRIVATE-Phone-Numbers#5Our cell number is tied to everything we do. Most of us have had our cell phone numbers for many years, even decades, and we hand it out to everyone: to merchants, healthcare providers, social media accounts. That number can become associated to us like a social security number, and it allows all our interactions to be correlated.We need to ditch the idea that we have just one number our whole lives, that we give to everyone. In this video we’re going to give an example of a clean up strategy you can use to lock down your existing number, and create multiple VoIP numbers not associated to your real world identity, that don’t tie all your activities together.00:00 Why Handing Your Cell Number Out Is Dangerous02:36 VoIP vs Cell Number05:16 New Phone Strategy Overview05:47 Porting Existing Number to VoIP06:17 Number Porting/SIM Swap Attacks07:23 Google Voice Porting08:24 VoIP Communications are NOT PRIVATE
-
How Your WiFi is Betraying You
02/07/2022 Duración: 14minAssange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.Main takeaways:Turn your WiFi OFF when you're not using itDon't automatically connect to WiFi networksForget networks after joining themKeep your OS and device updated00:00 Intro01:00 How WiFi connections work04:29 Hidden networks05:49 Why broadcasting SSIDs is a privacy nightmare: Tracking07:45 Why broadcasting SSIDs is a privacy nightmare: Exposes Private Info09:06 MOST IMPORTANT PART OF THE VIDEO: malicious connections11:03 How to protect yourself13:11 SummaryResearch
-
PRIVATE Alternatives to Google Docs!
22/06/2022 Duración: 12minBillions of people use Google products for their personal and professional needs -- their products are high quality after all! For example, Google Docs Editors Suite allows you to collaborate in real time with anyone in the world in a seamless experience!Unfortunately, it's not at all private -- Google gets access to ALL your personal information. In this video we look at two alternatives to Google docs that are private: Skiff and Cryptpad.00:00: Intro01:28: Why look for alternatives?03:04: Cryptpad Deep Dive06:34: Cryptpad TLDR07:15: Skiff Deep Dive10:50: Skiff TLDR 11:03: SummaryBoth platforms are free, and are secured with end-to-end encryption, so not even Skiff or Cryptpad can see what you're writing. Try them out, and let us know if you have other e2ee google-docs-alternatives that you recommend!https://cryptpad.fr/https://skiff.com/pagesHuge thank you to Andrew Milich for his time!Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.
-
Phone Pair-Lock Tutorial: BLOCK Phone Searches!
15/06/2022 Duración: 09minWhen traveling, your device may be at risk of confiscation by authorities, and that means a lot of your sensitive data is at risk. In our previous video we discussed how to keep your data safe, and one tool we mentioned is called "phone pair-locking". This prevents a forensics machine from connecting to your device to analyze it, and also prevents anyone making a copy of your phone. In this video, we will take you step by step through the process of locking your phone to a trusted computer. WARNING: This process will permanently wipe all data from your phone, so proceed with caution!NOTE: This process is only available for iOS devices00:00 Intro00:33 What is Phone Pair Locking?01:41 What is Rooting?2:08 Warning2:32 Setup Supervised State3:06 Download Apple Configurator03:19 Main Tutorial Start04:24 Create a Profile06:07 Apply Profile to Phone07:05 Helpful Tips and Considerations08:33 ConclusionHuge thank you to Michael Perklin for his expertise!Brought to you by NBTV members: Lee Rennie, Will Sandov
-
Privacy Travel Tips: How To Keep Your Data Private If Your Phone Is Seized
08/06/2022 Duración: 11minTraveling with digital devices can be risky -- sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds.For anyone who wants to maximize privacy, here are 6 tips for traveling with electronic devices.The final tip is “phone pair locking”, where, even if your phone is taken by security, it can't be connected to any forensics machines or copied.00:00 Intro01:49 How Phone Pairing Threatens Your Privacy03:56 How to Protect Your Data04:00 Power Off Devices05:32 Silo Data06:13 Don't Draw Attention To Yourself07:04 Protect Your 2FA Seeds07:25 Configure Your Pin Settings08:28 Phone Pair-LockingBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware
-
They're not SELLING your data. It's MUCH worse...
31/05/2022 Duración: 12minIt says on the Big G's website:‘We do not sell your personal information to anyone’”The truth is, they ARE SHARING your personal and sensitive information, and being compensated handsomely in return. But what’s ACTUALLY going on in this exchange is far WORSE that you can possibly imagine.I chat with Bennett Cyphers from EFF, and Johnny Ryan from the Irish Council for Civil Liberties, about what is actually being done with your personal information and real-time location data.00:00 "We Don't Sell Your Data"00:36 How Do They Make Their Money?01:32 Real-Time Bidding03:22 How the Data is Collected04:10 What Data is Collected?05:27 Which Companies Get Your Data?06:38 WHAT Do These Companies Do?08:58 How Is All This Possible?10:06 Are They Selling Your Data?10:31 How Can We Protect Ourselves?Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:ht
-
These Tracking Links Reveal A LOT About You
21/05/2022 Duración: 09minTracking links are a way for sites to track you across the web. They usually look like super long strings of random numbers attached to the end of normal URLs, and companies use them to build up dossiers on people based on their browsing habits. And they can reveal VERY sensitive information about you!Luckily there are many tools available to help you strip them out and protect your privacy. 00:00 What are Tracking Links?02:50 How to Spot a Tracking Link05:09 Sneaky ways sites track you05:59 How to Stop Tracking Links06:27 Debouncing07:22 Unlinkable Bouncing08:56 BEST Tip for Stopping Tracking LinksBrought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport
-
ISPs Share "Netflow" Data & Trace Traffic Through VPNs
20/05/2022 Duración: 33minVICE has a great article explaining how internet service providers quietly share detailed information about network traffic. It's called "netflow data" and they can even trace traffic through VPNs.But the scary part is how many people that data is then shared with.We dive into the details.00:00 Intro01:45 ISPs and Netflow Data05:47 What is netflow data?08:22 What is done with YOUR Data?15:29 "We don't give away all your data... we promise"20:49 Palo Alto Networks has access to 80% of Global Flows22:37 Not all ISPs are guilty26:32 Senator Wyden’s Pushback28:05 Snowden Revelations29:00 Stay Vigilant!31:08 OutroArticle from VICE: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymruBrought to you by NBTV members: Will Sandoval and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or
-
Apple's Private Relay: better than a VPN?
14/05/2022 Duración: 09minApple’s iCloud Private Relay was unveiled in the middle of last year, and it made a big splash in the tech community. It makes browsing using Safari, Apple’s web browser, more private and anyone who has a paid iCloud account can turn it on. For the average user, it seems to be a huge step forward for privacy. But does this mean you should add it to your security toolbox?We’ll dive into how private relay works, all the pros and cons, and how it compares to VPNs and Tor, so that you can decide whether it’s the right fit for you. 00:00 - Intro 00:47 - VPNs and TOR: What are they?02:58 - How Privacy Relay Works05:03 - Apple’s Second Servers05:36 - Private Relay’s Three-fold Outcome06:15 - Pushback06:54 - My Recommendation07:49 - Privacy Comparison08:40 - SummaryPrivate relay is a significant upgrade for the average user, but there are caveats that a privacy-conscious person should be aware of.Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.medi
-
EU's TERRIFYING Mass Surveillance Plan - w/ Matthew Green
12/05/2022 Duración: 32minA leaked document from the EU, proposing new regulation, describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR.The proposal is for a new mass surveillance system that will read private text messages, not to detect CSAM, but to detect “grooming”.It would mandate scanning of encrypted messages for CSAM material.Once you open up “machines reading your text messages” for any purpose, there are no limits.Matthew Green, renowned security expert and cryptography professor, says:"Let me be clear what that means: to detect 'grooming' is not simply searching for known CSAM. It isn’t using AI to detect new CSAM, which is also on the table.It’s running algorithms reading your actual text messages to figure out what you’re saying, at scale."Matthew and I dive into everything you need to know. 0:00 Pre-roll0:53 Intro2:00 The EU SILL SCAN Your Computers2:23 Matthew Green4:12 System will READ text messages between people to try to detect "grooming&qu
-
These Mental Health Apps Are A Privacy Nightmare
06/05/2022 Duración: 28minBefore downloading an app do you check the privacy policy and encryption practices it uses for your data? Luckily Mozilla checks for you. They just updated their "Privacy Not Included" guide that tells you everything you need to know about whether an app is trustworthy or not. And it turns out that a whole lot of meditation and prayer apps have... CONCERNING data practices. Find Mozilla's guide here:https://foundation.mozilla.org/en/privacynotincluded/Brought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
-
Is your phone number on Google? How to remove it
29/04/2022 Duración: 37minSnowden Played Key Role in Zcash Creation -- Interview with Nate Wilcox, Zcash co-creatorGoogle Now Accepts Requests for Sensitive Data RemovalElon Musk Wants to Make Twitter DMs Encrypted0:00 Pre-roll0:52 Show Intro2:00 Edward Snowden Played Key Role in Creation of Zcash, w/ Nathan Wilcox4:10 Nathan Wilcox explains "The Ceremony"6:33 NCC Group's involvement11:35 Wilcox: "We are building an infrastructure for everyone"17:00 Zcash myths exposed!20:20 Private protocol isn't enough, wallets can expose your data! 23:00 Wilcox: "Wallets are more important than protocols"24:42 Is Your Phone Number on Google?28:55 Elon Musk Wants to Make Twitter DMs Encrypted33:29 Quiz, Congrats YT Viewer OldSkool!37:13 Show Out and ThanksBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I
-
Snowden participated in the creation of Zcash!
28/04/2022 Duración: 08minIt was revealed today that Edward Snowden, famed whistleblower and privacy advocate, was one of the 6 participants in the Zcash "ceremony" of 2016! In a video just released by Zcash media, he said that he was happy to be involved because it was an interesting project being worked on by trusted cryptographers. He had used a pseudonym "John Dobbertin" during his participant, and Dobbertin's real identity had remained a mystery until today.Brought to you by NBTV members: Lee Rennie, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Watch the original Zcash media video here: https://youtu.be/8qSA29vWWdsSign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
-
US Sanctions Crypto Miner in UNPRECEDENTED Move!
22/04/2022 Duración: 22min1. Russian Crypto Miner sanctioned by the U.S.2. "Tribalism hurts the whole industry" says Ripple CEO0:00 Pre-roll0:47 Intro and Overview2:19 Russian Crypto Miner SANCTIONED9:01 "Tribalism huts the whole industry" says Ripple CEO13:17 LBRY lawsuit19:36 Quiz: Congrats YT Viewer Zach Duncan!22:09 Show Out and ThanksBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
-
Apple's nudity detection, EU's SHOCKING Surveillance tactics, & Assange's fight for freedom!
21/04/2022 Duración: 33minAssange Moves 1 Step Closer to ExtraditionEU Governments Use Pegasus Spyware on DissidentsApple rolls out client-side nudity detection 0:00 Pre-roll1:08 Intro2:10 U.K. Judge Approves Assange's Extradition to U.S.3:25 History of the Assange case7:17 Assange's wife Stella speaks11:40 E.U. Governments Use Pegasus Spyware on Dissidents17:53 Greek Journalist TARGETED by Predator Spyware22:05 Apple Rolls Out Nudity Detection23:00 The isn't as crazy as it sounds!30:37 Quiz Questions Review and Winner!32:00 Congrats YT Viewer Jeff Gust!33:31 Show Out and ThanksBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show
-
Inflation is worse than you think, & Axie Infinity Hackers REVEALED!
15/04/2022 Duración: 29minBreaking: North Korean Hacker group "Lazarus" tied to $625M crypto theft on the Axie Infinity "Ronin" blockchainInflation: It’s WORSE than you thinkThe Fed’s SECRET Repo LoansVirgil Griffith in prison for 5 years for Teaching People About Crypto00:00 - Intro01:00 - Welcome01:51 - BREAKING: N. Korean Hackers tied to Massive Axie Infinity Crypto Theft02:42 - INFLATION: 40 Year High03:28 - Is the situation with Russia REALLY driving inflation?11:09 - The Fed's SECRET Repo Loans17:28 - JAILED for Teaching People About Crypto21:25 - Is Griffith's sentencing really justice?24:27 - Audience Reaction 24:44 - Quiz Answers and WINNER "dbwoodcraft"!29:15 - OutroBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and Naomi BrockwellTo support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)Sign up for the free CryptoBeat newsletter here:https://cryptobeat.substack.com/Beware of scammers, I will never give you a phone number or reach out to you with invest
-
Apple Users' Privacy & Security Under Threat!
14/04/2022 Duración: 33minApple CEO, Tim Cook, spoke at a conference this week about how Apple privacy may be under threat. Cook says Cook that potential legislation in both the USA and EU would loosen Apple's grip over their walled garden, and create a security risk to users. One of the potential threats he discussed was sideloading, another was backdoors in encryption.We discuss some of the legislation being discussed, what sideloading is, and why this and encryption backdoors could affect the privacy and security of Apple users.0:00 Pre-roll0:58 Show Intro and Overview2:10 Apple Pushes Back Against Anti-Trust Regulations2:36 US' "Open App Markets Act" & EU's "Digital Markets Act"5:28 Apple CEO Tim Cook's speech10:14 The problem with Anti-Trust14:45 The Epic Games lawsuit21:11 Disastrous DMA bill in the EU that would KILL E2EE26:56 Audience response30:31 Quiz Results: Congratulations YT Viewer OldSkool!33:46 Show Out and ThanksBrought to you by NBTV members: Sam Ettaro, Will Sandoval, and