Colin Cantrell (Nexus Developer) provides an update on Nexus (NXS Currency, Nexus Blockchain), privacy and communication; cryptos, Anarchapulco, prepping, future predictions, etc...
When I talk about Messenger apps or email I will get the expect retorts from people about how it is better to use Signal, Tutanota, Protonmail and so on and always there's such a blindness to the ever important detail called META DATA.
The Session Private Messenger App is one of a select few platforms for hard core secure messaging that truly demonstrates real knowledge of privacy. This app knows that it's about data as well as meta-data, and understands the distinction between jus
This is a back to basics on understanding privacy protection techniques. I've seen some pretty screwed up advice from "privacy experts". I will tell you that a lot of this advice is WRONG because they don't even understand what their threat is. Disti
Data on Storj is by default end-to-end encrypted with keys only the data owner controls (with optional support for sharing features). Only the data owner can decide who to share the keys with and who can see the data. Put another way, Storj can't a
By request, I will answer questions about the BraX2 phone and its operating system BraxOS. I will explain why it is different from other de-Googled phones.
The normie phone is the biggest roadblock to privacy. There is likely no way it can be made safe. It's designed to strip away all your means to protect your data. Time to really rethink your long term mobile phone strategy. There are options.
A new finding from MIT Technology Review may make you second guess getting dressed in front of your Roomba vacuum.
Mike Swatek (Ozark Aircrete Domestead/Oklahoma Domes) on communications, privacy, surveillance, etc...
Technology continues to exceed our wildest speculations
Want to make your privacy bulletproof despite the internet and constant surveillance? Then you need to check out Michael Bazzell. You won't regret it.
Next time you're at airport security, get ready to look straight into a camera. The TSA wants to analyze your face.
Banks have been working on technology to "identify potential mass shooters" by tracking gun-related purchases and filing "Suspicious Activity Reports" with the Treasury Department's Financial Crimes Enforcement Network.
Jason Crowe (Qortal) on decentralized internet. QORTAL is a completely unique blockchain-based infrastructure platform capable of rebuilding the internet entirely, as well as establishing the framework for a worldwide economic system based on individ
-and 'programmed' by government bureaucrats
--to 'enable users to communicate without being concerned about their privacy', report claims
In the slipstream of "big" issues, there is a stubborn struggle in many countries to keep cash. Many governments want to gradually phase out cash and are aiming for purely digital currencies in the future.
Should the government be allowed to collect your DNA--and retain it indefinitely--if you're arrested for a low-level offense like shoplifting a tube of lipstick, driving without a valid license, or walking your dog off leash? We don't think so.
By far the safest computer OS for privacy is Linux. But can everyone use Linux? As someone using Linux as a daily driver, we can explore a little bit of my experience and discuss how different tech levels of people might respond to Linux.
...as "Persons, Houses, Papers and Possessions"
The State Department is giving law enforcement and intelligence agencies unrestricted access to the personal data of more than 145 million Americans, through information from passport applications that is shared without legal process or any apparent
In past videos I've discussed the possibility of Data only SIMs. Some US carriers will not give you a Data only SIM unless you have a data only device. So we'll discuss the possibilities and where this works as a solution and where it doesn't.
Cameras inside the device that track eye and face movements can make an avatar's expressions more realistic, but they raise new privacy questions.
Everything we do on the Internet is tied to our Google ID. I explain the true reach of Google in your life, after which we examine approaches to limit what Google can see. Without taking action, you may be risking the loss of your freedom, FOREVER.
I invented the technique of browser isolation many years ago. Let's get into the importance of this for privacy. It is something I practice religiously in all my devices. Someone said in a video that it is too much work and not worth it. We'll discu