Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,200 results
There are clues from Microsoft's latest moves on Windows 11 that reveal what Microsoft is really up to. Do you really believe ...
59,311 views
8 days ago
Microsoft made some recent changes to Windows 11 which abuses privacy in multiple ways. But remember that Microsoft is not ...
25,889 views
2 weeks ago
Anything you do to protect your privacy on the Internet will fail if your identity ends up on this list. So we will discuss 4 tips to ...
393,086 views
5 months ago
I will explain what differentiates a standard or what I call a Normie phone from these specialized phones called De-Googled ...
113,990 views
1 month ago
The last piece in the infrastructure that allows the operation of Skynet is now in place just announced a week ago. With this piece ...
247,260 views
2 months ago
Many of you know the basics of EMP's where your electronic devices will be wiped out and you will be back in the 1800's.
117,135 views
Using End-to-End encryption will no longer be a guaranteed safe method of communication. A new method will have to be ...
105,108 views
1 day ago
00:00 Intro 01:20 Structure of the PSTN 06:21 How it Works 10:59 Advantages of No-SIM Card 15:27 Options for Getting Internet ...
62,995 views
3 weeks ago
In order to be pseudo-anonymous on the Internet, we have to make sure that we are aware that we are being tracked. There are ...
92,856 views
3 months ago
Some people want to disappear mostly because of fear for their safety. But as you will find out, disappearing requires planning.
77,675 views
The biggest threat that remains hard to resolve is the phone number threat. Each day it becomes even more important to protect ...
84,922 views
We need an answer and this video will give you one. There are conflicting answers on the Interwebs about whether or not Apple is ...
16,678 views
4 weeks ago
We are being led to believe that Two-Factor Authentication is about making our accounts secure. Yet there is change underway.
224,184 views
2 years ago
I found a way to evade the PSTN surveillance infrastructure when making a phone call. Just a little foresight and a little tech and a ...
68,355 views
Once again, another group is fired up about "Child Safety" issues. This time related to doing age verification on porn sites.
15,293 views
Neuralink, one of Elon Musk's pet projects has started human brain implants of its computer interface. Touted as a solution to ...
94,310 views
4 months ago
As much as I exposed the intense tracking that Google does, it is pretty easy to defeat if you understand the mechanics of how ...
44,076 views
Some are quick to promote apps as being safe for your use just because they are encrypted. I will talk about how many of the ...
581,854 views
3 years ago
A rant. The most irritating thing for those of us who are privacy conscious are comments like "what are you hiding?" or "as long as ...
17,544 views
The purpose of this video is to help you properly assess your threats. Many will make assumptions about hacks being the main ...
23,127 views
10 months ago