Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
665 results
There are clues from Microsoft's latest moves on Windows 11 that reveal what Microsoft is really up to. Do you really believe ...
59,315 views
8 days ago
Anything you do to protect your privacy on the Internet will fail if your identity ends up on this list. So we will discuss 4 tips to ...
393,092 views
5 months ago
Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be ...
105,176 views
1 day ago
00:00 Intro 01:20 Structure of the PSTN 06:21 How it Works 10:59 Advantages of No-SIM Card 15:27 Options for Getting Internet ...
62,995 views
3 weeks ago
In order to be pseudo-anonymous on the Internet, we have to make sure that we are aware that we are being tracked. There are ...
92,847 views
3 months ago
We are being led to believe that Two-Factor Authentication is about making our accounts secure. Yet there is change underway.
224,183 views
2 years ago
I found a way to evade the PSTN surveillance infrastructure when making a phone call. Just a little foresight and a little tech and a ...
68,366 views
You may think you're protecting a computer with a VPN, Location turned off and various privacy strategies, but without awareness ...
108,075 views
We need an answer and this video will give you one. There are conflicting answers on the Interwebs about whether or not Apple is ...
16,676 views
4 weeks ago
In the recent videos, I discussed the various ways the State and hackers can surveil you or implement mass surveillance. In this ...
232,823 views
We will test out various technologies that allow us to communicate on the phone without using a SIM card -- in other words, no cell ...
332,998 views
How does the phone network work? Who can see your data? Who can listen to your calls or read your SMS? Who can examine ...
20,833 views
There's a new technology present in most new model phones and iPhones since iPhone X that presents a more complicated kind ...
25,928 views
1 month ago
Most people do not realize the privacy risks in browsers and spend their time thinking about which browser is better. It's time for ...
279,805 views
6 months ago
Phone numbers are your new ID card. If are are haphazard with making your phone numbers known on Internet sites, and people ...
18,955 views
This is a primer on TOR and VPN. We will be answering these questions: What is a VPN/TOR for? What is a VPN? What is a TOR ...
74,604 views
3 years ago
Think Tanks are now studying what AI can do and how it can be used to guide the world in the 21st century. Some of these ideas ...
11,477 views
4 months ago
Is Protonmail a safe email platform for security and privacy? This video explains the risks of emails in general and then discusses ...
262,508 views
4 years ago
Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences its privacy features.
73,364 views
Email is unsafe. But unfortunately a necessity in our cyber life. We will discuss how you can limit the privacy impact of email on ...
60,540 views