Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
700 results
There are clues from Microsoft's latest moves on Windows 11 that reveal what Microsoft is really up to. Do you really believe ...
59,070 views
8 days ago
Anything you do to protect your privacy on the Internet will fail if your identity ends up on this list. So we will discuss 4 tips to ...
392,240 views
5 months ago
Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be ...
96,789 views
1 day ago
I found a way to evade the PSTN surveillance infrastructure when making a phone call. Just a little foresight and a little tech and a ...
68,333 views
3 months ago
Most people do not realize the privacy risks in browsers and spend their time thinking about which browser is better. It's time for ...
279,715 views
6 months ago
00:00 Intro 01:20 Structure of the PSTN 06:21 How it Works 10:59 Advantages of No-SIM Card 15:27 Options for Getting Internet ...
62,818 views
3 weeks ago
In order to be pseudo-anonymous on the Internet, we have to make sure that we are aware that we are being tracked. There are ...
92,781 views
We are being led to believe that Two-Factor Authentication is about making our accounts secure. Yet there is change underway.
224,175 views
2 years ago
We need an answer and this video will give you one. There are conflicting answers on the Interwebs about whether or not Apple is ...
16,659 views
4 weeks ago
You may think you're protecting a computer with a VPN, Location turned off and various privacy strategies, but without awareness ...
108,070 views
This is a primer on how you can layer a hidden network over the public networks and operate only in a completely encrypted ...
92,637 views
1 year ago
In the recent videos, I discussed the various ways the State and hackers can surveil you or implement mass surveillance. In this ...
232,813 views
How does the phone network work? Who can see your data? Who can listen to your calls or read your SMS? Who can examine ...
20,823 views
There's a new technology present in most new model phones and iPhones since iPhone X that presents a more complicated kind ...
25,923 views
1 month ago
Is Protonmail a safe email platform for security and privacy? This video explains the risks of emails in general and then discusses ...
262,491 views
4 years ago
Phone numbers are your new ID card. If are are haphazard with making your phone numbers known on Internet sites, and people ...
18,944 views
This is a primer on TOR and VPN. We will be answering these questions: What is a VPN/TOR for? What is a VPN? What is a TOR ...
74,598 views
3 years ago
We will test out various technologies that allow us to communicate on the phone without using a SIM card -- in other words, no cell ...
332,946 views
Think Tanks are now studying what AI can do and how it can be used to guide the world in the 21st century. Some of these ideas ...
11,475 views
4 months ago
Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences its privacy features.
73,351 views