Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
101 results
Microsoft made some recent changes to Windows 11 which abuses privacy in multiple ways. But remember that Microsoft is not ...
26,549 views
2 weeks ago
I will explain what differentiates a standard or what I call a Normie phone from these specialized phones called De-Googled ...
124,149 views
1 month ago
The last piece in the infrastructure that allows the operation of Skynet is now in place just announced a week ago. With this piece ...
247,767 views
2 months ago
The biggest threat that remains hard to resolve is the phone number threat. Each day it becomes even more important to protect ...
86,117 views
3 months ago
Once again, another group is fired up about "Child Safety" issues. This time related to doing age verification on porn sites.
15,438 views
Some people want to disappear mostly because of fear for their safety. But as you will find out, disappearing requires planning.
78,441 views
A rant. The most irritating thing for those of us who are privacy conscious are comments like "what are you hiding?" or "as long as ...
17,576 views
5 months ago
As much as I exposed the intense tracking that Google does, it is pretty easy to defeat if you understand the mechanics of how ...
44,162 views
4 months ago
2023 was another bad year for privacy. The events of the year are loaded with attempts by various governments to up the ante ...
12,354 views
The purpose of this video is to help you properly assess your threats. Many will make assumptions about hacks being the main ...
23,349 views
10 months ago
Something very basic that the average person does not care about even if they knew about it. Your every click on a website is ...
46,411 views
Neuralink, one of Elon Musk's pet projects has started human brain implants of its computer interface. Touted as a solution to ...
94,625 views
Many of you know the basics of EMP's where your electronic devices will be wiped out and you will be back in the 1800's.
117,764 views
Our basic expectation of private conversations using End-to-End Encryption is under attack. The UK just passed the Online Safety ...
381,621 views
8 months ago
Some may already know that there are cybersecurity benefits to using a virtual machine. But less known are the privacy benefits.
83,456 views
Because of perceived inconveniences, many believe that having a de-Googled phone is impractical and will completely shun the ...
94,823 views
9 months ago
In this video we outline the characteristics that are found in encrypted messaging apps that we need to care about. Then we apply ...
78,317 views
Around the world, regular tradeshows sell surveillance equipment to both corporate and government buyers. What are they selling ...
275,102 views
Apple is introducing a new feature once again called a Sensitive Content Warning. This feature seems pretty benign but it is ...
14,323 views
11 months ago
Some new phones like the iPhone comes only with an eSIM option. No physical SIM cards. Does this matter? Isn't it more ...
79,172 views