A VPN is a Virtual Private Network.
VPN Apps. MullVad VPN, and Proton VPN.
Learn more about VPNs at Brockwell's YouTube channel.
GET NUTRITION FROM FARM-DIRECT, CHEMICAL-FREE, UNPROCESSED ANIMAL PROTEIN. SUPPLEMENT WITH VITAMINS. TAKE EXTRA WHEN NECESSARY
A VPN is a Virtual Private Network.
VPN Apps. MullVad VPN, and Proton VPN.
Learn more about VPNs at Brockwell's YouTube channel.
To connect to a WiFi hotspot, devices send out a probe request to available network access points (APs) in their surroundings. An available network sends a probe response, initiating the connection. While this process is standard, these requests “also serve as a means to track, trilaterate [locate], and identify devices for attackers who passively sniff network traffic,” the paper said.
So probe requests reveal your physical address to hackers by way of triangulation. Wow, it's not enough to condemn these fuckers or label them as perverts, but you've got to protect yourself beyond the standard tools that come built in on your device.
17:56. So if you have your phone on for example if I go in my Wi-Fi settings on my phone first it lists all the Wi-Fi spots that are available nearby also on your phone you know how when you go and visit your parents house it just automatically connects to the Wi-Fi why does it do that because your phone stores a list of every Wi-Fi network you've ever connected to if you're using an iPhone you can't even access that list there's no way to actually find a list and delete things from it and I know Android there are different ways to do it on a computer.
18:30. On my Mac I've seen you can you can say forget this network.
18:35. On your Mac, you can; yeah, on your computer but not on your phone. You know how it's so seamlessly connects when you go to someone's house you where you've connected before it just automatically happens. Why does that happen? Because every few seconds your phone emits this probe request that says, "Hey every single Network that I've been connected to, are you available right now?" That's a unique identifier that says that you're the only person in the world that has all of those Wi-Fi addresses that setting up for probe requests at any given time. Because you're the only person who's been to my house and then to your best friend's house and your parents house and your work and so it's a unique identifier.
19:27. Now how is this exploited this is a huge security threat but what we know is that these things are publicly available what other people are collecting this information we know the Google and apple have treasure troves of information that they're collecting at all times you know those driverless cars that drive around the waymo cars they are also sending out probe requests to be picked up Wi-Fi Wi-Fi probes picking Wi-Fi networks they're accessing all those information and creating these databases so wiggle.net is a site that tries to cut a log of a lot of information but they don't have nearly as much information if you're terrified by the information you can search for on their site you should be doubly terrified of what Apple and Google have because what this means is that a database exists, a database exist that has all this information and if it exists it can be exploited. What kind of oversight is being given to these? What kind of security measures to protect them? What kind of leverage do governments who are trying to extradite people have to access this information? They probably have a huge amount of leverage.
20:35. So what's something that you can do? Turn off your Wi-Fi when you're not using it. Don't just keep it probing something you can keep in mind with iPhones is when you go in your settings if you have at the control center and you turn it off that doesn't turn it off that just says forget this until tomorrow you know like don't try to access until tomorrow so your Bluetooth and Wi-Fi are going to be on until you go into the settings and turn them off
Brian Krebs has a site, Krebs on Security. He put out a report titled, "Hackers Gaining Power of Subpoena Via Fake 'Emergency Data Requests'," Brain Krebs, Krebs on Security, March 29, 2022.
Like all privacy reports, you're thankful for the news and terrified by the results. There's a terrifying and highly effective method [that Krebs] says that criminal hackers are now using to harvest sensitive customer data. They're getting this from all kinds of companies, from internet service providers and phone companies and social media firms, and basically any tech company that you can think of.
They are doing this by compromising email accounts and websites that are tied to police departments and government agencies so what happens is that they will hack someone's email account or hack someone's website and then get access or create a shell account at the back end and create more email accounts for them and then they will send unauthorized demands for subscriber data. So they'll be like, "Hey Twitter, you need to send me this data on this user." Now usually when companies are asked for this information, along with it comes a court order; there's a subpoena; there's official documentation. What Brian Krebs has pointed out is what hackers are doing is they're saying, you know, send us this information, Twitter, and the information being requested can't wait for a court order, because it relates to an urgent matter of life and death. This is a specific thing that law enforcement can do, called an Emergency Data Request.
But in certain circumstances — such as a case involving imminent harm or death — an investigating authority may make what’s known as an Emergency Data Request (EDR), which largely bypasses any official review and does not require the requestor to supply any court-approved documents.
It is now clear that some hackers have figured out there is no quick and easy way for a company that receives one of these EDRs to know whether it is legitimate. Using their illicit access to police email systems, the hackers will send a fake EDR along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.
In this scenario, the receiving company finds itself caught between two unsavory outcomes: Failing to immediately comply with an EDR — and potentially having someone’s blood on their hands — or possibly leaking a customer record to the wrong person.
“We have a legal process to compel production of documents, and we have a streamlined legal process for police to get information from ISPs and other providers,” said Mark Rasch, a former prosecutor with the U.S. Department of Justice.
As we go about doing our business online we tend to give away our credit card information to so many different companies and that really spreads our risk across a lot of different places instead of just our bank. --Josh Summers
It makes me a little and easy whenever I am handing out my information to all these different places. --Summers
"How could someone get a hold of your credit card number?" -- Joey Tribbiani from Friends
2:31. We've become so inoculated to using our credit card that now we almost trust anybody with it.
2:36. But if this number falls into the wrong hands,
2:39. . . . they will take you for everything you have without any compassion whatsoever.
You're basically saying when you have this number you have the ability to pull money from my account and yet we freely hand that number out to almost anyone. Virtual credit cards allow you to put all kinds of parameters in place that stop those people from pulling money from your account without your permission.
2:58. I can say that this is a one-time use card. I can pause or cancel those cards at any time once I use that card once with a merchant it gets locked to that merchant. -- Summers
3:09. For example you might create a virtual card to pay your Netflix subscription.
3:13. That card is locked to my Netflix account and it cannot be used anywhere else. Not only that, but my liability is limited to $9 per month because that's what I've set it at. Netflix cannot charge any more than that. Or perhaps, it's just a one-off payment. I had some yard work done on a house of mine the contractor basically asked me, "Can you please just email us your credit card information?" and when I sent my information I made it a single-use credit card and for a specific amount for the invoice. So once they hit the card for that amount, the card was closed 2 minutes later. Add after they charged that $800, anything else that they want to charge on top of that will also get declined.
3:52. Even if someone gets access to the email and the card number it will be useless to them but it's not just sending credit card numbers over insecure methods like email that should concern us it's how the company stores that information once they have it.
4:06. We are giving all this information to companies that we may or may not be really confident about their security measures . . . Summers
4:14. the small businesses your local pizza chain or your dentist that are also collecting your payment data you know they don't have necessarily these big it departments to make sure that their infrastructure is secure. -- Julie Conroy, Research Director, Aite Group's Fraud AML Practice
4:26. Instead of spreading our risk across a lot of different companies getting our credit card information all those were kind of trusting one company
4:33. Privacy.com, for example, takes great pains to store your data safely using things like password hashes, split key encryption for sensitive information, and isolating data. Most of these companies have similar practices, but again make sure you read the fine print before you sign up. A third reason why you might want to use a virtual credit card is that it's the best way I've found to eliminate auto-renewals for stuff you don't want anymore or forget about. A lot of these services depend on you just forgetting that you have a subscription somewhere until you find it on your bill and you're like, "Oh, I better cancel that," by which time you've already paid for another month that you're not going to use.
5:11. Subscription services are notoriously hard to cancel they do this on purpose.
"I want to quit the gym," Chandler Bing.
STAFF: "You do realize you won't have access to our full service Swedish Spa."
I WANT TO QUIT THE GYM, Chandler.
I pressed the cancel button, and a little pop-up said, "We're sorry that you are interested in canceling. You'll have to email this email address in order to continue," and I'm like that is not a cancel. So what I did is that I went in and I canceled their card, so when they run that charge and find out that it's declined they will stop their services quicker than it would take me to actually do the cancel service.
5:45. Some caveats about these virtual cards: let's go back first let's go back to the VPN analogy the same way that a VPN hides your IP from websites you visit but the VPN company has access to everything you visit a virtual credit card hides your sensitive information from Merchants but the company sees everything you do keeping mind that this is not an anonymous service now just because the virtual credit card company knows what you're doing it doesn't mean your bank needs to some virtual credit cards let you choose from a selection of fake Merchant names and how you want your charge to show up on your on your bank statement.
6:22. And they've got a list of like four or five, it's like H&H Hardware, like some random names that you can put on so you can hide it from your bank.
A couple more caveats that I'll mention. A lot of people like credit cards because they get cash back rewards. You miss out on those rewards if you're using a virtual credit card. But some would argue that it's a small price to pay to save you from the inevitable headache of credit card fraud.
6:49. The other caveat is that I personally think crypto provides better protection in privacy and you get the added bonus of saving money on each purchase if you're using services like Dash Direct or Bitrefill or Purse.io. but recurring payments still I think the crypto doesn't do well at all so virtual credit cards are actually a great interim solution that give you back some more control over your finances. All in all, the less data you give to the least amount of places online, the smaller your digital footprint and the more control you have over your privacy. Virtual credit cards are really cool product that I recommend people check out.
7:25 Being able to mask my information kind of add in that anonymous or pseudonymous layer between my actual information and who I'm giving it to me it just gives me a little more confidence as I move forward with my number, my address, and my credit card, whatever.
Find Josh Summers' YouTube channel here.
Thank you to Naomi Brockwell.
Andrea Amico, Privacy4Cars.
Modern cars are spying on us, but to what extent?
Dale Wooden, aka, Woody, is a digital tracking expert and former instructor for a vehicle forensic company.
Sam Curry, a famous car hacker who researches car vulnerabilities.
"Car Hacking: The New Frontier of Cybersecurity," Conner Ivens, Tanium, October 3, 2022.
TOPICS COVERED IN THIS SERIES
* How easy it is to hack modern cars?
* And how strangers can get real-time access to your car cameras.
* Explores trackers in cars that you had no idea existed like the radio signals beaconed out by your tires that can be used to track you even if you're doing 70 miles an hour down the freeway.
* We dive into the perverse incentives that drive companies to collect as much data about you as possible and look at the history of when this all started.
"Toyota Japan Exposed Millions of Vehicles' Location Data for a Decade," Zach Whittaker, Tech Crunch, May 12, 2023.
Spoiler alert: it's been going on far longer than you ever imagined. And don't even get me started on used cars. We look at how the previous owner of your car might still have access to all your car's remote features, tracking tools, and cameras. And we explain how to wipe your own information and location history from your car before you sell it. These are the kinds of things we investigate as we dive under the hood of car privacy in the series.
WHAT DATA IS YOUR CAR COLLECTING?
What data is siphoned from your car every time you hit the road?
John McElroy,
"Your car knows where you're going it knows your kind of driving habits."
In short the modern car has become a privacy nightmare.
Andrea
Cars collect a lot of data and I don't know that consumers really understand how much data is being collected by vehicles the new trend in automotive is to talk about the software defined vehicles
"All about Software Defined Vehicle," Renault Group, April 24, 2023.
Which essentially means turning cars into smartphones.
In what ways are cars like smartphones? Well first, they both act as tracking devices, emitting all kinds of radio signals that can be used to pinpoint your location.
Woody,
Your car is a cell phone. Your car is a wireless hotspot. Your car is a Wi-Fi receiver, and your car is a Bluetooth transmitter and receiver.
But there are other important similarities too. Just as we often think of our phones as singular entities that send off data to Google and Apple, we regard cars the same way, sending off our data to Mazda or Toyota. But with our phones, data sharing doesn't stop with the device manufacturer because we then go ahead and install a hundred different apps on it and each of these apps also sends our data to countless companies. It turns out that car is actually working a similar way cars are platforms where a lot of other services are bolted on top most consumers don't realize that when they're driving you know there's a hundred s of companies literally that are collecting data from that vehicle and profiling you.
Lauren Smith,
Some information might be going to the manufacturer. Some may be staying locally on the car. Some may be going to your insurance company. Some may be going to a technology that you've opted in to use.
So exactly what information is being collected and where it's going is pretty hard to figure out. Varying by the make and model of the car, however, one thing we know for sure about basically all modern cars is: data is being harvested by the trunk load.
Sam Curry:
The easiest way to figure out what exactly your car is tracking and has access to is to just open the app.
Sam Curry has spent a lot of time examining these car apps where you do things like check the engine status and check your vehicle's cameras.
If you ever wanted to see where your car is at, or like start your car, or unlock your car, you can now do that with your phone.
The actual data that gets logged by the car includes video feeds, microphone feeds. The actual GPS location like overtime is 100% being logged. Your car has the systems built in that'll actually log every interaction with the vehicle so whether or not you unlock the car, turn the engine on, the air conditioner on, starting an engine, or finding a vehicle's location.
These are generally marketed as really convenient features for consumers.
Being able to control and locate your vehicle via like your phone is like a really cool thing.
But it's also important to remember this fundamental principle:
Woody:
If the app is free you are the product.
Sam Curry:
By just like using the apps, you're kind of just giving that data to that company. They'll probably . . . hold it in perpetuity.
And often we're not just handing our data to those companies . We are granting carte blanche to share our sensitive information with countless third parties.
"If you're not doing anything wrong, you have nothing to hide." That's not what privacy is about.
you may not be doing anything wrong today, but regimes come and go. And social norms change. You don't know who'll be in power tomorrow, and that data is forever. It is not going anywhere. It is in silos that is permanently stored in permanent bases all over the world that is just being maintained by people who love collecting data. So I would be really careful thinking that just because you're safe today that you're going to be safe tomorrow.
Find Tom's show notes for "Episode 2342: Naomi Brockwell on Protecting Your Privacy."
If you're not doing anything wrong, you have nothing to hide." That's not what privacy is about.
As someone who believes in a free society, we should not be normalizing surveillance. If you look at any dystopian sci-fi film, it always centers around the government having access to all of your activities. In every historical authority, in every authoritarian government that we can point to throughout history, they've always had surveillance as a main tool for control. So you do not want to normalize a society where the government knows every single that's going on. The other thing is that we're all feeding this permanent treasure trove of information about us and that data is forever.
Now, you may not be doing anything wrong today, but regimes come and go. And social norms change. You don't know who'll be in power tomorrow, and that data is forever. It is not going anywhere. It is in silos that is permanently stored in permanent bases all over the world that is just being maintained by people who love collecting data. So I would be really careful thinking that just because you're safe today that you're going to be safe tomorrow. And I would also say about that argument that I'm not doing anything wrong kind of flies in the face of what half the people in the world are facing. Not everyone is lucky enough to live in a semi-free country. Some people around the world are literally fighting for their lives, and privacy is the only tool that is keeping them safe. If they cannot have private communications with people, if they cannot find a way to mask their transactions, they are going to be persecuted. And that happens in so many countries, countries where the black market doesn't just reverse it, drugs or whatever else is on there; maybe it applies to medicine maybe it applies to clothing, maybe you've had too much of your food quota and you're trying to feed your family so we have to realize that norms across the world vary so dramatically and so this idea, when people are snarky about privacy "Ugh, you know, it's just something for bad people. Why do you want to hide your conversations? Why do you want tm hide your money? Encryption is just a tool for drug dealers or money launderers," or whatever else, it really is a very privileged position that they're talking from, right, because this is a tool for freedom for so many people across the globe. CryptoChat is a tool for freedom. Tor is a tool for freedom. Private money is a tool for freedom that is keeping people alive. And even if it weren't, I think it's the individual's right to keep their lives private. That's what the 4th Amendment was made for: it was to stop unreasonable searches and seizures. And for some reason that 4th Amendment never carried over into our digital lives. For some reason the government is like "Well, we're not allowed to look through your belongings without a warrant, and all of that, if it's physical, but your digital life, yeah, let's just take all of that, let's collect all of that, and rifle through it whenever we want. And if you want it protected, we'll try and get a backdoor into it." Like it's a complete perversion of the balance power we're meant to have, and I think it's so sad when people have this knee jerk response of "If I'm not doing anything wrong." Well that's not really what privacy is about. It's not about doing something wrong. It's about the right to selectively reveal to the world what you want to reveal and I think that we all should have the right to make that choice, which data we want to release, what information we want known about us. And if the government wants more than that, they can get a warrant.
7:45. Search engines. Google is synonymous with lack of privacy.. They're actively sharing your data to the CIA.
9:15. We're in the age of machine learning, data points like how long you hovered over a search result before scrolling past it actually get collected. Your mouse movement, you know, whether you're about to click things. Did you know that if you type into the Google search bar and you don't even press enter . . . let's say like, ah, I want to type in Tom Woods, and I type in "Tom Woods . . . and I say, nah," those key strokes were already captured and sent to Google, so it doesn't matter that you didn't send it. They already have that information. And I think that people don't realize how good Google is about taking all of these abstract data points and putting them together in a way that humans can't really find patterns in these things but computers absolutely can because they have way more computational power. So Google is taking all these data points and is painting an incredible picture of who we all are. And I think it was the Irish Civil Liberties Association . . . they put out a report where they got hold of . . . basically, the database of all the identifiers that Google uses. So, that we all know that Google is a search engine, it's a browser, but really it's an advertising company. It's the largest advertising company in the world. And what they're doing everytime you load a page, there's a couple of seconds where there's some empty boxes or maybe it's milliseconds and suddenly they're filled with things that are trying to capture your attention--articles, or things to purchase, or whatever. And what's happening behind the scenes is that Google has said, "Okay, everyone Naomi has just opened her browser and gone to this page, we have these boxes to fill. These are all of the things we know about her. Who wants to buy it?" And so what they're essentially doing is taking everything they know about me and just blasting it to the thousands of approved buyers in their real-time bidding system. And you can think, who are these people collecting this data? They don't even have to bid on the ad space to collect it. They can just be sitting there passively collecting this data. And those companies are not just ad companies, they're data brokers. They're government agencies. And those people are collecting that data that are passing it into thousands more. Sowe have no control over whose hands this data falls into, and that's a pretty scary prospect. So I would just be really mindful of all of the ways that we're leaving digital exhaust. You know you mentioned Google as a search engine but there are more private alternatives. If you even wanted Google search results, you could use something like StartPage, which is a more private front end for the Google search engine. So basically, you can look at proxy sites. You don't have to look at the real websites, your IP address isn't collected, all of these things can really add up and really dramatically decrease the amount of data that companies like Google are collecting about you. And it's not just Google. I mean there are people who think that the private and the public are so distinct, and "Why do I care if Google has my information, do they just want to sell me a pair of shoes?" Actually, it's a lot more insidious than that. I think a lot of people are thinking about this in a pre-Internet world. And what's that world look like? Well, that was a world where private companies had very limited insight into our lives, very limited amount if data that they collected. And governments had very limited ability to collect that data, too, from private companies. What is the situation now? Private companies are collecting every single thing about us and the government has a free-for-all. There is no 4th Amendment protecting any of this data due to things like the 3rd party doctrine that basically says that if you hand your data over you use the infrastructure of the internet which relies on 3rd parties for everything. YOU HAVE NO REASONABLE EXPECTATION OF PRIVACY. So they can basically get every single thing about you. So I don't think there's this straight forward private public divide because at the end of the day Google is collecting all this information and all these companies are collecting all this information and they're basically amassing it into giant treasure troves of data that governments can subpoena, that they can break into it, they can get back doors into it, and as we learned through the Snowden revelations that there are programs like Prism programs where they're just getting direct access to the servers of a lot of these companies. So I think we need to step away from this divide and just realize how bad the situation has gotten in the digital age that things are so blurry that you do as a conscientious citizen who wants the right to privacy, who wants the right to freedom in their life that we should really be mindful to how much data we're giving to everyone knowing that that data is not protected at all. And there are so many ways that we can start to protect our data. Like I said, StartPage is one. Brave Search is another.
14:18. A story in her book about Tank Man from that famous photograph of a man standing in front of a tank on Tiananmen Square in 1989. And one day he disappeared from major search engines. Can you explain what happened there and what the significance of that is?
On Tiananmen Square Massacre, this came up.
TIANANMEN 1989: WHAT REALLY HAPPENED
— Thomas Hon Wing Polin (@thonwingp) June 3, 2023
1/8 This is a post that needs to be repeated every year — until the biggest of the West’s Big Lies against China is properly buried. pic.twitter.com/G1fL5htaPD
14:42. Search engines we often think of as just a privacy violation, but search engines are our portal into the internet at large. They're in charge of indexing all if the pages, getting these little spiders that crawl all over the internet that collect all of the URLs and basically put them into this index that is searchable. That also means they have control over what they can show us and it's been shown that there is a lot of censorship of this information. And people should really be mindful of the things that they're being shown are the things that these companies WANT to show them. It's like Google, Microsoft, for example, I think it was two years ago now on the anniversary of the Tiananmen Square massacre. And Tank Man, that famous image that we all know, the day after the massacre there are ranks rolling down the street, and this anonymous man, I don't think we ever learn his identity, just decides to stand in front of them holding grocery bags. And it's this amazing image of revolution and fighting against authoritarian control. Of course, it's banned in China. They don't want anyone to know about Tiananmen Square. They don't want anyone to know about this image. But what was very suspicious was in the United States, in the Western world, on the anniversary of the Tiananmen Square Massacre, suddenly, if you were to look up in a search engine, such as Google, Bing, and Yahoo, I think there were, I can't off the top if my head which search engines they'd applied to but there were a bunch of them but Bing immediately comes to mind. But you wouldn't fund any result about Tank Man. Now this is an incredibly famous, famous picture. You type that in your search engine and you would get zero results. What's going on there? What other things are we not being shown? And how do we get around that? And I think it was Bing who came out soon after and said "Oh, this is a big mistake. It was just a bug. It was fixed now." So it did come back online. So it wasn't like China completely infiltrated the Western world and was able to censor. Obvious from this was that they were able to force these companies to censor these things and were successful. And it makes you think what other things are they censoring? What are some of the things that the U.S. government is censoring? The EU, what do they not want us to see? Tweak the algorithms. Brave search allows you to search for what kind of materials would you like to be shown. Left-wing or right-wing? Would you like to be getting better sources from PBS? Only sources from PBS? You can set parameters where you affect the algorithm. All we're getting with MSM searches is complete opaqueness when it comes to the results. They all say no, we're neutral and we just build some information but generally, we're showing you all the things on the internet. Just not true. We don't know what they're showing us is just completely opaque there's no way to verify that that we're actually being shown the correct things there are so many things that go on it's not just censorship it's also what is being shown first and how is this influencing people's conception of the world. They did some experiments with autofill and it was influencing people in certain directions.
18:32. So if you look up Naomi Brockwell, all you get is "Naomi Brockwell is . . . a terrible person . . . is lazy . . . is ugly . . . is really bad," you'd start to get an impression of who Naomi Brockwell is. If you looked up Naomi Brockwell and the autofill reads "Naomi Brockwell is intelligent . . . is the best . . . is amazing . . . conquering the world of privacy . . . helping people," completely different picture. They did experiments in the last election where they looked