Bitcoin, Blockchain, And The Technologies Of Our Future

  • Autor: Vários
  • Narrador: Vários
  • Editora: Podcast
  • Duração: 195:12:31
  • Mais informações

Informações:

Sinopse

Bitcoin, Blockchain & Technologies of Our FutureNaomi Brockwell is the host of the YouTube show "Naomi Brockwell TV" which explores bitcoin, blockchain, and the technologies of our future all over the world.

Episódios

  • The Surveillance Accountability Act Fixes This

    25/04/2026 Duração: 21min

    https://youtu.be/60IKOar3kY8https://odysee.com/@NaomiBrockwell:4/surveillance-accountability-act:5The federal government is spying on you, and they're doing it without a warrant.Ludlow Institute helped create a bill to fix this. And on April 23, 2026, Rep. Thomas Massie (R-KY) and Rep. Lauren Boebert (R-CO) introduced this bill to the House. We gave a press conference at the Capitol to introduce H.R. 8470 — the Surveillance Accountability Act, a landmark bill designed to restore the Fourth Amendment in the digital age.00:00 - We need to stop warrantless surveillance02:04 - TOP SECRET SPYING he can't tell you about04:47 - Naomi and Ludlow's work on this bill06:09 - Modern day abuse of power08:27 - SAA puts an end to unconstitutional spying09:17 - WHAT THE FLOCK?10:01 - Fed are BUYING your data12:08 - The FISA debate misses ALL THIS SPYING13:03 - We're about to lose our country14:24 - We're running out of time before we reach panopticonThe Surveillance Accountability Act closes the loop

  • Spoiler: It's Not You

    13/04/2026 Duração: 22min

    The third-party doctrine is an outdated legal rule, created in an era before smartphones, before the internet, before our private lives became data. The fallout has been catastrophic. This decades-old principle erased the protections meant to shield us from arbitrary government intrusion and opened the door to a future of unchecked surveillance and control. In this video, we'll break down what the third-party doctrine actually is, how it works in a digital world, and why it has to go.00:00 Yes, The Government CAN Do That01:22 4th Amendment Review02:50 3rd Party Doctrine Explained10:22 The Reasonable Expectation of Privacy Test14:09 How We Solve This16:40 Bailment: The Most Important Term You've Never Heard Of19:52 Congress Needs to Step InThe lie at the heart of the third-party doctrine is that it tells us that participating in modern life means surrendering the protections we were supposed to have against government searches. Let's remind people that in the constitution it says that searches r

  • These Searches Used To Be Illegal...

    30/03/2026 Duração: 23min

    https://youtu.be/hPALUKCaARshttps://odysee.com/@NaomiBrockwell:4/warrants:8Warrants are one of the most powerful checks on government power ever invented. But in an age where your data is bought from brokers, your movements are tracked by private contractors, and your financial records are collected in bulk… the protections warrants were designed to provide have been quietly gutted.In this video, we break down how warrants actually work, why the founders were obsessed with getting them right, and what's changed in the digital era that should concern everyone.There's a part of every warrant that almost no one talks about — and it's the part that matters most. Once you understand this machinery inside a warrant, you'll never dismiss them as "just paperwork" again.00:00 The Most Important Thing You've Never Thought About01:19 What Is A Warrant?03:40 Footage Of My Ancestor, Judge Naomira Brockwulf 09:07 Why Is A Search Dangerous?14:02 The Forgotten Amendment16:01 Actual Footage

  • Stop Using Non-Private USBs

    13/03/2026 Duração: 11min

    https://youtu.be/KvYaXBiyUQchttps://odysee.com/@NaomiBrockwell:4/Encrypted-USBs:eStoring sensitive files on a normal USB drive is like writing your diary on a sticky note and leaving it in a taxi. If someone gets the drive, they get the files with no hacking required. But luckily you can use encryption to protect what's on your USB thumbdrive. In this video I compare some great tools that make the data on your USB private from anyone who doesn't have the password. 00:00 Thumbdrives Are Like Diaries01:32 Apricorn Aegis Secure Key 3NXC02:24 Kingston IronKey VP50C03:11 Veracrypt04:25 Choose Your Threat Model05:29 Tutorial: Apricorn Aegis Secure Key 3.007:16 Tutorial: Kingston IronKey09:36 Privacy Is About ControlPrivacy isn’t about hiding. It’s about control. And encrypted storage is one of the simplest ways to take some of that control back when it comes to who can access your data. Just choose the tool that best fits your threat model.NBTV Veracrypt Tutorial: https://www.youtube.com/watch?v=xILGdtI9N

  • The Argument Against Privacy That Sounds Smart But Isn't

    27/02/2026 Duração: 15min

    https://youtu.be/-kpAFTj-x7ghttps://odysee.com/@NaomiBrockwell:4/Limits-of-Privacy:1'Privacy is impractical.' 'Concessions are necessary.' 'Be realistic.' These views about becoming mainstream. And they're wrong. Here's why limits on privacy are never a price worth paying for adoption, no matter how reasonable the argument sounds.00:00 The Privacy Salon01:40 Shifting Baseline Syndrome Over Time04:30 The Machine We Built08:24 No More Compromises09:40 The Debate10:54 Privacy Enables Freedom11:20 Shifting Baselines11:54 False Company Claims12:37 Security Risks13:39 In ClosingThis debate is not about whether limiting privacy can accelerate growth. It is about whether trading long-term freedom for short-term scale is a price we should be willing to pay, and the answer is no. Because what's at stake is security, freedom, and human dignity, and the cost of losing that in society for future generations is too high.Learn More On Shifting Baselines in our previous NBTV video

  • Stop Giving Out Your Cell Number. Here's Why.

    14/02/2026 Duração: 14min

    https://youtu.be/J8WjPA_Fc7khttps://odysee.com/@NaomiBrockwell:4/Cell-vs-voip:9I just recently went to a website to set up a new account, and it wouldn't let me proceed without giving them a cell number. Not a VoIP number, it demanded a real cell number, associated with a SIM. I actually don't have one, because I don't have a SIM in my phone. On top of that, there are many reasons why someone might not want to hand out their cell number to everyone. What should someone do in a situation like this? In this video I'll explain what you can do if someone asks for your cell number, and you don't want to give it to them. We'll talk about VoIP alternatives, and different methods for keeping your data protected.00:00 Actually, I do not have a cell number01:14 Activity Linking02:26 Location Tracking03:37 No Working Number Tactic04:45 VoIP Tactic06:12 Cell Number Rental Tactic07:39 Pre-Paid SIM Tactic08:16 Why Providers Block VoIP10:57 The Cell to VoIP Trick12:58 Dispense with the Formalit

  • Why I Don't Link Signal To My Computer

    30/01/2026 Duração: 08min

    https://youtu.be/SIRde_NYoCwhttps://odysee.com/@NaomiBrockwell:4/Desktop-vs-computer:fModern smartphones are some of the most locked down consumer devices that have ever existed. Computers are less secure, and you downgrade your security when you link a privacy focused app, like Signal, to a less secure environment. You are effectively taking a very well protected environment, your phone, and extending trust to a much weaker one. For some people it will be worth it, but it's important to understand the tradeoffs.00:00 I Do Not Use Signal desktop00:28 How Phones Sandbox Apps01:20 Desktop Security Explained02:05 Not a Signal Issue02:26 Desktops Widen Attack Surface04:13 Hardware Backed Security Explained05:13 The Risk Explained06:14 Keep Your Phone Lean06:50 We Want to Hear From YOU!Security always collapses to the weakest link. That does not mean that Signal desktop is bad. It simply means desktops are inherently riskier environments. So the next time you link a high security tool to a less secure environ

  • Using PGP With Proton

    16/01/2026 Duração: 17min

    https://youtu.be/70azaXOhjpIhttps://odysee.com/@NaomiBrockwell:4/PGP:4Email is closer to a digital postcard than a sealed letter, and mainstream providers like Gmail read and analyze everything that's inside. Unfortunately, email isn’t going anywhere in our society because it’s baked into how the digital world communicates; but luckily there are ways to make your emails more private. One tool that you can use is called PGP. In this video, I'll explain what PGP is, and show you how providers like Protonmail make it super easy to encrypt the contents of every email you send.00:00 Email Was Never Built for Privacy00:50 What is PGP02:17 How PGP Works06:43 Proton Tutorial07:03 In-Network Emails07:42 Out-of-Network Password Protected Emails09:00 Out-of-Network PGP Protected Emails10:37 Importing PGP Keys11:49 Exporting and Sharing PGP Keys12:35 How to Share Your Public Key14:56 Phil Zimmerman and The Ludlow InstitutePhil Zimmerman said in his original PGP user guide text “Why I Wrote PGP” in 1991 that: “P

  • 3 Privacy Fixes Most People Never Make

    01/01/2026 Duração: 08min

    https://youtu.be/PgIxxWDRpbAhttps://odysee.com/@NaomiBrockwell:4/3-privacy-fixes:4It's a new year, and a perfect time for fresh starts, especially when it comes to privacy. If you made your way to our channel because you care about privacy, but you're not sure where to begin, this video is for you.00:00 A New Year, A New Start00:33 Email02:19 Messaging04:23 Browser06:18 Disclaimer06:56 Privacy Does Not Have to be ExtremeIf you're just starting your privacy journey, there's no need to feel overwhelmed, or think that you have to do everything at once. Just choose something from this list: email, messaging, or browser, and take your first step today!Privacy Explainers Playlist: https://www.youtube.com/playlist?list=PLt3zZ-N423gVst3WSgHXHRQYzgpmUkBUNSome of the platforms mentioned in this video:https://proton.me/mailhttps://signal.org/download/https://brave.com/Brought to you by NBTV team members: Lee, Derek, Will and Naomi.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mi

  • He Built a Privacy Tool. Now He’s Going to Prison.

    19/12/2025 Duração: 01h18s

    https://youtu.be/Fshsk8MCAf4https://odysee.com/@NaomiBrockwell:4/Samourai:eWARNING: This video contains flashing lights and visual effects that may trigger seizures for people with photosensitive epilepsy. Viewer discretion is advised.You might think privacy is optional. Something you can worry about later. But right now there is a major war against privacy being waged. If governments can arrest the people who build privacy tools, then when the day finally comes where you might need them, those tools will not exist anymore.I had the pleasure and heartache of interviewing Keonne Rodriguez, co-founder of Samourai Wallet, an open-source, non-custodial privacy wallet, who goes to prison this week because of the privacy tool he created. The whole case against him was based on the idea that privacy itself is criminal. This is his story.00:00 A Chilling Conversation00:35 The War on Privacy01:35 The Privacy Developer14:45 The Privacy Wallet20:08 The Arrest24:12 The Charges38:24 The Judge40:43 The Deal47:12 The Final

  • They Asked For My Name. I Said No.

    05/12/2025 Duração: 07min

    Want to buy online without handing over all your personal details? This sketch shows how to use privacy tools so you do not share unnecessary details with every merchant you interact with. Think email aliases, VOIP numbers, PMBs, and masked cards.What you’ll learn, through this dramatic reenactment of an experience submitted by an NBTV community member:• How PMBs, aliases, VOIP numbers, and masked cards work together• Why many checkout forms demand more data than a transaction requires00:00 A Doozy of a Story00:21 A Dramatic Reenactment05:29 The Moral of the StoryLet’s stop treating a shopping cart like a background check and make minimal disclosure the standard.Link to our privacy explainer series playlist: https://www.youtube.com/playlist?list=PLt3zZ-N423gVst3WSgHXHRQYzgpmUkBUNLinks to privacy tools:Masked Credit Card: https://www.privacy.com/SimpleLogin: https://simplelogin.io/VoIP Phone Numbers: https://www.cloaked.com/Alternative VoIP Phone Numbers: https://anonyome.com/individuals/mysudo/Brought to you

  • They Asked For My Name. I Said No.

    05/12/2025 Duração: 06min

    Want to buy online without handing over all your personal details? This sketch shows how to use privacy tools so you do not share unnecessary details with every merchant you interact with. Think email aliases, VOIP numbers, PMBs, and masked cards.What you’ll learn, through this dramatic reenactment of an experience submitted by an NBTV community member:• How PMBs, aliases, VOIP numbers, and masked cards work together• Why many checkout forms demand more data than a transaction requires00:00 A Doozy of a Story00:21 A Dramatic Reenactment05:29 The Moral of the StoryLet’s stop treating a shopping cart like a background check and make minimal disclosure the standard.Link to our privacy explainer series playlist: https://www.youtube.com/playlist...Links to privacy tools:Masked Credit Card: https://www.privacy.com/SimpleLogin: https://simplelogin.io/VoIP Phone Numbers: https://www.cloaked.com/Alternative VoIP Phone Numbers: https://anonyome.com/individuals/mysudo/Brought to you by NBTV team members: Lee, Derek Port

  • Reboot Your Device!

    14/11/2025 Duração: 13min

    https://youtu.be/qcd1ZCmFkiEhttps://odysee.com/@NaomiBrockwell:4/Reboot-Your-Device:eHow long has it been since you rebooted your devices? Many people don't actually think to do this, because as long as everything is working, why spend the hassle turning everything off and on again? But if you care about security, privacy, and a device that behaves, you should reboot more often. This is a short guide on why regular reboots are worth it, and how often to do them.00:00 “Its been 84 years…”00:32 Disrupt Malware01:46 Clear Background Junk02:21 Security Updates05:38 Strongest Protection07:36 Privacy09:18 How Often to Reboot11:20 Not a Silver BulletRebooting won't remove persistent threats or root-level implants; however, regularly rebooting your devices IS helpful for improving your security, privacy, and device stability -- and it's incredibly easy!Link to our phone privacy series playlist: https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=uKWWzmkq2ZrqgFv9Brought to you by

  • The Creepy Cameras On Every Corner

    25/10/2025 Duração: 25min

    https://youtu.be/IOa9tjoxsQ8https://odysee.com/@NaomiBrockwell:4/Flock:3They’re on street corners, utility poles, even garbage trucks... and they’re tracking everywhere you go.Welcome to the world of Automatic license plate readers. These aren't just cameras. They're part of a cloud-based surveillance network logging your movements in real time, and creating a warrantless database for law enforcement.In this video, I explain:- How ALPRs work- Why this system almost surely violates the Fourth Amendment- How we allowed this dragnet surveillance grid to take root- And what we can do to push back00:00 A Growing Network of Surveillance02:30  What are ALPRs07:39 Dangers11:39 How Did This Happen16:01 What Can We Do21:38 Benefits vs Costs23:28 SECRET Origin Story Time!This isn’t just about your car.It’s about whether privacy and freedom can still exist outside your front door.Freedom of movement isn’t really free if you’re being tracked every step of the way.I’m not ready to give that up. Are you?NBTV is a

  • How Surveillance Turns You Into a Puppet of the Internet

    03/10/2025 Duração: 14min

    https://youtu.be/Xr9l6xSrM28Platforms have one overriding goal: to keep us online as long as possible. And they’ve learned that nothing hooks us like outrage. But here's something many people don't realize: privacy and surveillance have everything to do with it. In this video I want to explore how surveillance is the key to polarization and how, ultimately, it's the engine that makes platform-driven polarization work.00:00 We’re More Polarized Than Ever00:27 Outrage02:08 Manipulation08:47 Targeting vs Filter Bubbles10:05 What We Should DoPrivacy is our ally in this fight. The less companies and governments know about us, the harder it is for them to manipulate us. Privacy protects our autonomy in the digital age. We don't need to be led by the mob around us and be a tool in their propaganda war. It's time to reclaim our autonomy.Brought to you by NBTV team members: Lee, Derek Porter, Will Sandoval and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose

  • Why I Don't Use the Mac App Store (and What I Use Instead)

    12/09/2025 Duração: 14min

    https://youtu.be/uaexH72AOBohttps://odysee.com/@NaomiBrockwell:4/Homebrew:5Are you using the App Store to manage apps on your Mac?You may want to reconsider.Using Apple’s App Store might feel convenient, but it comes with hidden privacy costs. Every app you download is tied to your Apple ID, creating a detailed profile of your habits, interests, and behavior.In this video, I expose the risks of using the App Store on your Mac, and teach you how to use Homebrew, a powerful, privacy-respecting alternative. Set it up with no tracking. No Apple ID. Just full control over what you install.00:00 The Privacy Cost of Using The Apple App Store01:09 Apple ID / App Store03:32 What is Homebrew04:27 Benefits06:36 Installation Tutorial09:52 Using Homebrew12:11 More ResourcesPrivacy doesn’t have to be overwhelming. With Homebrew you’ll reclaim the convenience of an App Store without all the surveillance, and without building a permanent record.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to

  • This is the moment the internet changed forever

    23/08/2025 Duração: 20min

    https://youtu.be/1DwOQwRn8_Yhttps://odysee.com/@NaomiBrockwell:4/KYC:9A huge portion of the digital world now requires mandatory ID checks.New surveillance laws such as the UK’s Online Safety Act, the EU’s Chat Control proposal, and a wave of US state-level KYC mandates have transformed the internet from an open network into a system of checkpoints and control.In this video, we expose the coordinated attack on privacy happening around the world. We trace how we got here, how platforms were pressured into compliance, and why this wave of regulation is unlike anything we have seen before.00:00 SHOW YOUR PAPERS01:43 UK’s Online Safety Act03:06 A Global Pattern06:11 How Did We Get Here?07:49 What Now?14:05 The SolutionThis landslide of lost freedoms has happened in mere weeks. It will become permanent if we don’t resist.The way forward is to rebuild the internet into what it was meant to be: a free and open network, not a system of checkpoints and control.Brought to you by NBTV team members: Lee Rennie, Derek Por

  • How Your ‘Anonymous’ Account Leaks Data

    01/08/2025 Duração: 22min

    https://youtu.be/dgd5_2pfEd0https://odysee.com/@NaomiBrockwell:4/Pseudonymous-social-media:6You don’t need to disappear off the grid to stay private online. But you do need a strategy.In this video, we break down how to use social media without revealing your real identity. We’ll walk through how to understand your threat model, avoid common mistakes, and build a pseudonymous identity that actually protects you.Whether you're just trying to keep your boss out of your business or avoid serious profiling, we’ll help you match your privacy tactics to your risk level, step by step.00:00 Anonymity Should be BANNED00:41 Storytime with Naomi03:29 Overview04:01 Understand Your Threat Model05:25 Platform06:24 Level 1 Basic Protections08:51 Level 2 Advanced Protections18:36 Level 3 Extreme Protections19:23 The Good NewsAchieving basic pseudonymity online is much easier than it sounds, and you absolutely have the power to reclaim it. Start from wherever you are. Every step you take makes a difference.Links to helpf

  • She Said "Don’t Write That Down." The Doctor Did Anyway.

    11/07/2025 Duração: 08min

    https://youtu.be/1PeAfNBNARIhttps://odysee.com/@NaomiBrockwell:4/Doctor-privacy:4Why doesn’t your doctor’s office feel like a safe place anymore?Most people assume their medical conversations are private. But in the U.S., the moment your doctor enters something into your Electronic Health Record (EHR), it can be legally shared with over 2.2 million entities—often without your knowledge or consent.Did you know there are financial incentives for providers to collect as much data as possible? That’s why they often document details that have nothing to do with your care that day. And if you ask your doctor not to include something in your record? You’ll likely be treated as the difficult one—for simply wanting privacy.Because privacy is no longer the default. The default is feeding your most sensitive information into an opaque system designed to share it with a vast, invisible network of third parties.In this short video, I share a real story from one of our NBTV members who tried to protect her privacy—and was

  • Your TV Is Spying On You and Taking Screenshots

    20/06/2025 Duração: 18min

    Your Smart TV is spying on you. It’s taking snapshots of everything you watch -- sometimes hundreds per second -- and quietly sending that data to third parties.In this video, we reveal what’s really happening behind the glass:How smart TVs track your behaviorHow that data is used to profile and manipulate youAnd how you can protect yourself.Surveillance has crept into our living rooms. It’s time to draw the line.00:00 TV Is No Longer a Private Activity00:39 Understanding Smart TVs05:30 How Data Is Weaponized08:34 Opaque By Design13:13 What Can We Do16:09 Grants from Ludlow16:33 In SummaryWe never should’ve let faceless companies and governments into our living rooms and bedrooms. The damage is deep, but it’s not irreversible. It starts with awareness. It’s time to blow the lid off the surveillance quietly woven into our lives, and start taking back control.Special thanks to Yash Vekaria and his team for their awesome research. Read their whitepaper here:https://dl.acm.org/doi/10.1145/3646547.3689013Brought t

página 1 de 24