Essential Privacy: Cell Numbers and Email Aliases

preview_player
Показать описание
If you want to take your digital privacy to the next level, you need to look at VoIP numbers, Email Aliases, and DNS. In this presentation we look at how to reign in the digital exhaust you’re leaving behind you in your daily life.

00:00 Intro
03:16 Overview
05:39 Cell Numbers
06:56 Prepaid SIM Cards
12:55 VoIP
23:50 Email
28:07 Custom Domains
34:45 Email Aliases
37:16 DNS
39:50 Conclusion

If the steps outlined in this video seem beyond you right now, start with something easier. Our previous presentation outlines the first 5 basic things you should start with in your privacy journey:

Ignore those who would disempower and tell you privacy online is not possible -- It's entirely possible, and you owe it to yourself to reclaim your digital life.

Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Sam Ettaro, Will Sandoval, Ogar, and Naomi Brockwell

To support NBTV, visit:
(tax-deductible in the US)

Visit our shop!

Our eBook "Beginner's Introduction To Privacy:

Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.

Visit the NBTV website:

Watch this video on LBRY!

________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!

Recommended Books:

Beginner's Introduction To Privacy - Naomi Brockwell

Permanent Record - Edward Snowden

What has the government done to our money - Rothbard

Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald

Some of my favorite products to help protect your privacy!

Faraday bag (signal stopping, to protect your fob, credit card, computer, and phone)

Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)

Camera tape (electrical tape is the best tape for covering phone and computer cameras)

USB-C to ethernet adapter:

Privacy Screens (use your phone and computer in public? Keep your information safe!)

Computer: (Search for the size right for your computer)

Phone: (Search for the size for your phone, decide whether you want glass or plastic!)
Рекомендации по теме
Комментарии
Автор

Of course its a responsive crowd Naomi, you are the absolute greatest.

natemarx
Автор

It was very pleasant to hear a such great, informative, useful and impassioned conference presentation!
You ARE really professional Naomi! I loved to hear every minutes!👌

csaladjenei
Автор

Your lecturing style is ALSO superlative! Hopefully, we'll see more of these...if you're so inclined...in future.

jimcabezola
Автор

I love people who talk clearly, concisely and FAST! Slow talkers annoy me. So much awesome information delivered! I just need to put these into action and find a VoIP provider.

Hunty
Автор

Nailed it.
When service X doesn't know what address you gave service Y, not only can they not correlate your activity with each other easily, but it's really hard for an attacker to impersonate Y without the address you used there. So as a nice bonus, it can reduce the likelyhood of phishing.

capability-snob
Автор

These people were so lucky to have you as a guest ❤
Very informative and entertaining as always!
Have a great week Naomi 🔥🚀

blackmennewstyle
Автор

A De-Googled phone with Graphene OS is my #1 recommendation

pinoygal
Автор

Wow, your so terrific & your ability to explain these truths about you pH is unequaled

rgisSavedbyG
Автор

ATT: whoever books Naomi for a talk.

Please book her for double time. Want to hear her ramble on and nerd out, so informative when she does.

HelicopterShark
Автор

Amazing work Naomi, ...thank you for that COURAGE & DEDICATION !!!👍👍👍

norberttucholla
Автор

“…Information is the most valuable commodity that I know of (Michael Douglas - Wallstreet quote) 😊 And your knowledge & expertise shows us how to minimise this 👍🏾 Keep up the good fight N, your doing a brilliant job. Love your content, and as always, I hope that you & the family are all well & blessed 🙏🏾

CheckTesting
Автор

That's tremendous. I greatly appreciate all your help and your skill as a presenter.

jozsefizsak
Автор

This is a GREAT talk.

Re: companies don't like VOIP numbers
People at these companies also like privacy, but the issue is spammers and hackers who make it impossible to properly ban them because there is no way to prevent their new email, IP, and etc. from signing up. The only way to stop them enough to let automated systems deal with them is to impose costs for getting banned. E.g. you need new numbers, new IP addresses, and etc.

I really want to +1 the idea of using a prepaid to do the sign ups and then transferring to a VOIP. That's a really cool trick.

neutral
Автор

On the cell tower tracking, in one of my classes years ago how each hands you off from tower to tower typically you are in contact with 3 towers all the time, one is primary and the other 2 are determined based on the direction/speed you are going. As you are starting the move through the range of the cell the tower will be in communication with the next towers it predicts you will need to be needed to hand off to. Lets say you are subscriber XX on Tower 1. The tower will predict you are heading NW at 72 mph and by a certain time will see that your signal strength will be getting weaker and you'll be handed off to Tower 2. But you will also be given 2 or more towers that you will also be monitored by. There are some differences, some the mobile device will determine the towers to hand off to (IIRC GSM based) and the tower will make the direction to the new towers (CDMA based). Now with LTE and 5G NR this likely has changed some.

Something to note, when you turn off a device the device sends a message to the network saying "Hey I'm powering off here, remember I was here", and the tower EXPECTS you to come back up to the same tower. I can't remember the name of the message there. I have some digging to do.

And another note, if the device has no SIM, E911 services are STILL ALIVE. The device still could have an attachment to a LTE/5G NR tower. When you dial 911 it connects immediately, it can't do that without being attached to a cell tower.

A great contact on learning how the towers and mobile devices communicate is Dr. Ernest Simo. He used to teach this is great detail.

FFWrench
Автор

SimpleLogin with reverse aliases is awesome.

ixiwixi
Автор

Wow I could dig listening to you all day...

fromagperspective
Автор

Love this lady, she absolutely awesome.

mt.zion
Автор

I love your presentations but very new to your platform. I'm very shocked that you did this in my state. That's something that I never would've expected being so rural. I'm just digging into pfSense and firewall protection since I want to keep Amazon and the rest from tracking me as well as running an ad blocker all incorporated with a VPN and VLAN. I hope you find great success while sharing your wealth of knowledge with the rest of us. Thank you so very much for all you do.

MakeitZUPER
Автор

Naomi and TheHatedOne are the best! Thank you for your effort trying to wake people up!

PrivacyisFreedom
Автор

Brilliant presentation, Naomi. We need to make this common knowledge. Thank you for your great work.

dreadwicked