Your Smart TV is spying on you. It’s taking snapshots of everything you watch -- sometimes hundreds per second -- and quietly sending that data to third parties.In this video, we reveal what’s really happening behind the glass:How smart TVs track your behaviorHow that data is used to profile and manipulate youAnd how you can protect yourself.Surveillance has crept into our living rooms. It’s time to draw the line.00:00 TV Is No Longer a Private Activity00:39 Understanding Smart TVs05:30 How Data Is Weaponized08:34 Opaque By Design13:13 What Can We Do16:09 Grants from Ludlow16:33 In SummaryWe never should’ve let faceless companies and governments into our living rooms and bedrooms. The damage is deep, but it’s not irreversible. It starts with awareness. It’s time to blow the lid off the surveillance quietly woven into our lives, and start taking back control.Special thanks to Yash Vekaria and his team for their awesome research. Read their whitepaper here:https://dl.acm.org/doi/10.1145/3646547.3689013Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
--------
18:47
--------
18:47
Think before you share
https://youtu.be/gGva7O3czg0https://odysee.com/@NaomiBrockwell:4/without-consent:5Your child already has a digital footprint—before they can even speak. But they didn’t create it. You did.Every photo you post, every milestone you share, helps train facial recognition systems and build psychological profiles your child will carry for life. These profiles are sold, scored, and used by companies and governments—long before your child is old enough to understand what privacy even means.In this video, we break down how seemingly harmless posts can fuel surveillance systems, shape algorithmic risk scores, and impact your child’s future—from school to jobs to border crossings.00:00 Kids Have No Choice01:08 Data Brokers Are Watching Your Kids01:35 How Children Are Profiled02:31 One Possible Future03:32 Child ID Theft03:50 The Dangers of Toys and Devices05:34 Baby Monitors06:19 Data Collection in Schools06:35 Risks of Hand-Me-Down Tech06:51 Parental Surveillance Apps10:02 Tips to Protect Kids in the Digital Age12:28 Give Your Kids a Fighting ChanceThis isn’t about guilt. It’s about awareness. And it’s about protecting their right to grow up without being boxed in by a digital past they never chose. Learn how to limit your child’s data exposure, push back against normalization of surveillance, and give your kids a clean slate.Deutsche Telekom's entire video: https://www.telekom.com/de/medien/medieninformationen/detail/nachricht-von-ella-without-consent-1048362Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
--------
14:16
--------
14:16
How To Make Your Mac PRIVATE
https://youtu.be/1g0RzOGxe40Step-by-Step Privacy Hardening:Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s privacy.In this video, we walk you through privacy expert Michael Bazzell’s recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.00:00 Apple promises only THEY will abuse your data02:20 Purchasing Your Mac03:14 Choose a Model03:41 Used Devices: Update, Reformat, Install OS08:28 Initial Setup11:32 WiFi and Bluetooth11:50 OS Firewall13:14 Notifications14:16 Airdrop, Siri, and Sharing15:33 Gatekeeper18:26 Analytics and Ads19:01 Time20:15 Filevault22:02 Dock, Wallpaper and Finder25:35 Application Firewall / 3rd Party Apps28:09 ConclusionApple does build decent privacy tools—but they definitely don’t make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here:https://inteltechniques.com/book7.htmlBrought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi BrockwellNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
--------
30:44
--------
30:44
DON'T Install That Extension!
https://youtu.be/11P6DdI8HOohttps://odysee.com/@NaomiBrockwell:4/Extensions:6You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.In this video, we expose the chilling truth about browser extensions.You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users.And we’ll break down why just checking permissions isn’t enough—because malicious extensions often ask for the same permissions as the good ones. It’s not about what they ask for. It’s how they use it.00:00 Extensions can do WHAT00:52 Overview01:34 The Problem with Browser Extensions09:18 How Do We Protect Ourselves10:52 Understand Permissions16:03 Grant Fewer Permissions16:18 Use Extensions Sparingly17:10 Use a Private Browser18:06 Least Privilege18:28 Use Code Review Tools19:07 In SummaryExtensions are more than just “add-ons.” They have access to everything you do online.Before you install another one, watch this video.Special thanks to John Tuckner, Matt Frisbee and Pete Snyder for sharing their expert first-hand knowledge with us!Brought to you by Lee Rennie, Cube Boy, Will Sandoval, Jack Rhysider, and Naomi Brockwell.NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
--------
20:58
--------
20:58
Why I NEVER Restore From Backup
https://youtu.be/tzTtF3vOiq0https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:fEvery time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.00:00 Resist Temptation00:41 App Bloat01:50 Attack Surface02:51 Switch Accounts03:49 ID Tracking04:17 Ghost Data05:27 Habit Traps06:17 Reclaiming Mental Bandwidth07:14 7 Tips10:02 My Thoughts on Restoring From BackupWhen people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Visit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".