with Naomi Brockwell
The third-party doctrine is an outdated legal rule, created in an era before smartphones, before the internet, before our private lives became data. The fallout has been catastrophic. This decades-old principle erased the protections meant to shield us from arbitrary government intrusion and opened the door to a future of unchecked surveillance and control. In this video, we'll break down what the third-party doctrine actually is, how it works in a digital world, and why it has to go.
00:00 Yes, The Government CAN Do That
01:22 4th Amendment Review
02:50 3rd Party Doctrine Explained
10:22 The Reasonable Expectation of Privacy Test
14:09 How We Solve This
16:40 Bailment: The Most Important Term You've Never Heard Of
19:52 Congress Needs to Step In
The lie at the heart of the third-party doctrine is that it tells us that participating in modern life means surrendering the protections we were supposed to have against government searches. Let's remind people that in the constitution it says that searches require warrants.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://odysee.com/@NaomiBrockwell:4/warrants:8
Warrants are one of the most powerful checks on government power ever invented. But in an age where your data is bought from brokers, your movements are tracked by private contractors, and your financial records are collected in bulk… the protections warrants were designed to provide have been quietly gutted.
In this video, we break down how warrants actually work, why the founders were obsessed with getting them right, and what's changed in the digital era that should concern everyone.
There's a part of every warrant that almost no one talks about — and it's the part that matters most. Once you understand this machinery inside a warrant, you'll never dismiss them as "just paperwork" again.
00:00 The Most Important Thing You've Never Thought About
01:19 What Is A Warrant?
03:40 Footage Of My Ancestor, Judge Naomira Brockwulf
09:07 Why Is A Search Dangerous?
14:02 The Forgotten Amendment
16:01 Actual Footage of the FBI Redefining The Term "Search"
16:19 The FBI Is Buying Your Data
20:19 The Surveillance Accountability Act
Special thanks to Rob Frommer and Jim Harper for all their work on 4th Amendment Protections.
Here is a link to the legislation Jim Harper is currently working on: https://gc.nh.gov/bill_status/billinfo.aspx?id=1667&inflect=2
Stay tuned for a link to the "Surveillance Accountability Act" which will be announced this week!
Brought to you by NBTV team members: Lee, Derek, Will, and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/KvYaXBiyUQc
https://odysee.com/@NaomiBrockwell:4/Encrypted-USBs:e
Storing sensitive files on a normal USB drive is like writing your diary on a sticky note and leaving it in a taxi. If someone gets the drive, they get the files with no hacking required. But luckily you can use encryption to protect what's on your USB thumbdrive.
In this video I compare some great tools that make the data on your USB private from anyone who doesn't have the password.
00:00 Thumbdrives Are Like Diaries
01:32 Apricorn Aegis Secure Key 3NXC
02:24 Kingston IronKey VP50C
03:11 Veracrypt
04:25 Choose Your Threat Model
05:29 Tutorial: Apricorn Aegis Secure Key 3.0
07:16 Tutorial: Kingston IronKey
09:36 Privacy Is About Control
Privacy isn’t about hiding. It’s about control. And encrypted storage is one of the simplest ways to take some of that control back when it comes to who can access your data. Just choose the tool that best fits your threat model.
NBTV Veracrypt Tutorial: https://www.youtube.com/watch?v=xILGdtI9NPo
Kingston YouTube Page: https://www.youtube.com/@kingston
Apricorn YouTube Page: https://www.youtube.com/@apricorn3942
Veracrypt Download Page: https://veracrypt.io/en/Downloads.html
Great writeup from NBTV community member Incognito Cat: https://incognitocat.me/keeping-your-data-safe-on-the-go/
Brought to you by NBTV team members: Lee, Derek, Will and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/-kpAFTj-x7g
https://odysee.com/@NaomiBrockwell:4/Limits-of-Privacy:1
'Privacy is impractical.'
'Concessions are necessary.'
'Be realistic.'
These views about becoming mainstream. And they're wrong. Here's why limits on privacy are never a price worth paying for adoption, no matter how reasonable the argument sounds.
00:00 The Privacy Salon
01:40 Shifting Baseline Syndrome Over Time
04:30 The Machine We Built
08:24 No More Compromises
09:40 The Debate
10:54 Privacy Enables Freedom
11:20 Shifting Baselines
11:54 False Company Claims
12:37 Security Risks
13:39 In Closing
This debate is not about whether limiting privacy can accelerate growth. It is about whether trading long-term freedom for short-term scale is a price we should be willing to pay, and the answer is no. Because what's at stake is security, freedom, and human dignity, and the cost of losing that in society for future generations is too high.
Learn More On Shifting Baselines in our previous NBTV video:
https://www.youtube.com/watch?v=aXhXkXcMXyM
Brought to you by NBTV team members: Lee, Derek, Will, and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/J8WjPA_Fc7k
https://odysee.com/@NaomiBrockwell:4/Cell-vs-voip:9
I just recently went to a website to set up a new account, and it wouldn't let me proceed without giving them a cell number. Not a VoIP number, it demanded a real cell number, associated with a SIM. I actually don't have one, because I don't have a SIM in my phone. On top of that, there are many reasons why someone might not want to hand out their cell number to everyone.
What should someone do in a situation like this? In this video I'll explain what you can do if someone asks for your cell number, and you don't want to give it to them. We'll talk about VoIP alternatives, and different methods for keeping your data protected.
00:00 Actually, I do not have a cell number
01:14 Activity Linking
02:26 Location Tracking
03:37 No Working Number Tactic
04:45 VoIP Tactic
06:12 Cell Number Rental Tactic
07:39 Pre-Paid SIM Tactic
08:16 Why Providers Block VoIP
10:57 The Cell to VoIP Trick
12:58 Dispense with the Formalities
Stop handing out your real cell number by default. Use the alternatives when you can. Make minimal disclosure the norm. Small changes like this reduce your exposure, and they remind companies that access to you isn’t a right. It’s something you get to choose.
How to Port Your Existing Number to VoIP Tutorial: https://www.youtube.com/watch?v=HYNZKQZEHoU
Why I Don’t Have a SIM in my Phone: https://www.youtube.com/watch?v=RyirQOCUUK8
Brought to you by NBTV team members: Lee, Derek, Will, and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/SIRde_NYoCw
https://odysee.com/@NaomiBrockwell:4/Desktop-vs-computer:f
Modern smartphones are some of the most locked down consumer devices that have ever existed. Computers are less secure, and you downgrade your security when you link a privacy focused app, like Signal, to a less secure environment. You are effectively taking a very well protected environment, your phone, and extending trust to a much weaker one. For some people it will be worth it, but it's important to understand the tradeoffs.
00:00 I Do Not Use Signal desktop
00:28 How Phones Sandbox Apps
01:20 Desktop Security Explained
02:05 Not a Signal Issue
02:26 Desktops Widen Attack Surface
04:13 Hardware Backed Security Explained
05:13 The Risk Explained
06:14 Keep Your Phone Lean
06:50 We Want to Hear From YOU!
Security always collapses to the weakest link. That does not mean that Signal desktop is bad. It simply means desktops are inherently riskier environments. So the next time you link a high security tool to a less secure environment, be sure to understand the tradeoffs.
Mac Privacy Playlist: https://youtube.com/playlist?list=PLt3zZ-N423gWaLKM-D51mDphG5NHfsTpt&si=0Ee8Ta_n-dNKufOI
Brought to you by NBTV team members: Lee, Derek, Will and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/70azaXOhjpI
https://odysee.com/@NaomiBrockwell:4/PGP:4
Email is closer to a digital postcard than a sealed letter, and mainstream providers like Gmail read and analyze everything that's inside. Unfortunately, email isn’t going anywhere in our society because it’s baked into how the digital world communicates; but luckily there are ways to make your emails more private. One tool that you can use is called PGP. In this video, I'll explain what PGP is, and show you how providers like Protonmail make it super easy to encrypt the contents of every email you send.
00:00 Email Was Never Built for Privacy
00:50 What is PGP
02:17 How PGP Works
06:43 Proton Tutorial
07:03 In-Network Emails
07:42 Out-of-Network Password Protected Emails
09:00 Out-of-Network PGP Protected Emails
10:37 Importing PGP Keys
11:49 Exporting and Sharing PGP Keys
12:35 How to Share Your Public Key
14:56 Phil Zimmerman and The Ludlow Institute
Phil Zimmerman said in his original PGP user guide text “Why I Wrote PGP” in 1991 that: “PGP empowers people to take their privacy into their own hands. There has been a growing social need for it". That statement remains even more resounding today. The builders of privacy tools risk a lot in order to create the tools that protect us all. It's up to us to use them.
Phil Zimmerman Text “Why I Wrote PGP”: https://philzimmermann.com/EN/essays/WhyIWrotePGP.html
My Interview with Phil Zimmerman:
https://www.youtube.com/watch?v=NciVkd6ddPo
Special Thanks to Phil Zimmerman for his mentorship and advisory role at the Ludlow Institute
Brought to you by NBTV team members: Lee, Derek, Will and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/PgIxxWDRpbA
https://odysee.com/@NaomiBrockwell:4/3-privacy-fixes:4
It's a new year, and a perfect time for fresh starts, especially when it comes to privacy. If you made your way to our channel because you care about privacy, but you're not sure where to begin, this video is for you.
00:00 A New Year, A New Start
00:33 Email
02:19 Messaging
04:23 Browser
06:18 Disclaimer
06:56 Privacy Does Not Have to be Extreme
If you're just starting your privacy journey, there's no need to feel overwhelmed, or think that you have to do everything at once. Just choose something from this list: email, messaging, or browser, and take your first step today!
Privacy Explainers Playlist: https://www.youtube.com/playlist?list=PLt3zZ-N423gVst3WSgHXHRQYzgpmUkBUN
Some of the platforms mentioned in this video:
https://proton.me/mail
https://signal.org/download/
https://brave.com/
Brought to you by NBTV team members: Lee, Derek, Will and Naomi.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
https://youtu.be/Fshsk8MCAf4
https://odysee.com/@NaomiBrockwell:4/Samourai:e
WARNING: This video contains flashing lights and visual effects that may trigger seizures for people with photosensitive epilepsy. Viewer discretion is advised.
You might think privacy is optional. Something you can worry about later. But right now there is a major war against privacy being waged. If governments can arrest the people who build privacy tools, then when the day finally comes where you might need them, those tools will not exist anymore.
I had the pleasure and heartache of interviewing Keonne Rodriguez, co-founder of Samourai Wallet, an open-source, non-custodial privacy wallet, who goes to prison this week because of the privacy tool he created.
The whole case against him was based on the idea that privacy itself is criminal. This is his story.
00:00 A Chilling Conversation
00:35 The War on Privacy
01:35 The Privacy Developer
14:45 The Privacy Wallet
20:08 The Arrest
24:12 The Charges
38:24 The Judge
40:43 The Deal
47:12 The Final Knife Twist
51:28 The War on Privacy Developers
56:04 How We Win the War
If you care about a future where privacy is still possible, you need to start paying attention now, because Keonne isn't the only privacy developer being targeted. This is happening all over the world, and we need to stand up for the people building the tools that protect us all.
Extra special thanks to Keonne Rodriguez for spending precious moments of his remaining freedom to give this interview.
If you want to help, go to https://billandkeonne.org/
Brought to you by NBTV team members: Lee, Derek Porter, Will Sandoval and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Want to buy online without handing over all your personal details? This sketch shows how to use privacy tools so you do not share unnecessary details with every merchant you interact with. Think email aliases, VOIP numbers, PMBs, and masked cards.
What you’ll learn, through this dramatic reenactment of an experience submitted by an NBTV community member:
• How PMBs, aliases, VOIP numbers, and masked cards work together
• Why many checkout forms demand more data than a transaction requires
00:00 A Doozy of a Story
00:21 A Dramatic Reenactment
05:29 The Moral of the Story
Let’s stop treating a shopping cart like a background check and make minimal disclosure the standard.
Link to our privacy explainer series playlist: https://www.youtube.com/playlist?list=PLt3zZ-N423gVst3WSgHXHRQYzgpmUkBUN
Links to privacy tools:
Masked Credit Card: https://www.privacy.com/
SimpleLogin: https://simplelogin.io/
VoIP Phone Numbers: https://www.cloaked.com/
Alternative VoIP Phone Numbers: https://anonyome.com/individuals/mysudo/
Brought to you by NBTV team members: Lee, Derek Porter, Will Sandoval and Naomi Brockwell, written by Jack Rhysider
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit:
https://LudlowInstitute.org/donate
(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop!
https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Want to buy online without handing over all your personal details? This sketch shows how to use privacy tools so you do not share unnecessary details with every merchant you interact with. Think email aliases, VOIP numbers, PMBs, and masked cards.
What you’ll learn, through this dramatic reenactment of an experience submitted by an NBTV community member:
• How PMBs, aliases, VOIP numbers, and masked cards work together
• Why many checkout forms demand more data than a transaction requires
00:00 A Doozy of a Story
00:21 A Dramatic Reenactment
05:29 The Moral of the Story
Let’s stop treating a shopping cart like a background check and make minimal disclosure the standard.
Link to our privacy explainer series playlist: https://www.youtube.com/playlist...
Links to privacy tools:
Masked Credit Card: https://www.privacy.com/
SimpleLogin: https://simplelogin.io/
VoIP Phone Numbers: https://www.cloaked.com/
Alternative VoIP Phone Numbers: https://anonyome.com/individuals/mysudo/
Brought to you by NBTV team members: Lee, Derek Porter, Will Sandoval and Naomi Brockwell, written by Jack Rhysider
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit: