Podcast Episodes

Back to Search
Playing With Browsers to Find Google's Kryptonite

Playing With Browsers to Find Google's Kryptonite



Google tracking is relentless and more intense than people imagine. This video explains this tracking architecture. Once you understand the pieces that enable Google to collect this information about…


Published on 2 months ago

Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today

Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today



The solution to a safe phone is to avoid production phones like the iPhones, Samsungs, and Google Pixels. Instead what you need is to change to Open Source Operating systems. These phones have no AI …


Published on 2 months, 1 week ago

Choosing a Privacy Safe Search Strategy - Options in 2025

Choosing a Privacy Safe Search Strategy - Options in 2025



Performing an Internet search isn't as simple as Googling, or even asking Siri. It's time to understand the privacy invasions possible in search engines and to create a safe solution. Searching is on…


Published on 2 months, 2 weeks ago

Is the AI Companion a Failed Concept? Or Wait for Other Shoe to Drop?

Is the AI Companion a Failed Concept? Or Wait for Other Shoe to Drop?



The tech world is abuzz with all the supposed AI technologies that we never hear the end of. Apple Intelligence. Windows Copilot. Google Gemini. And you're even being told to buy AI enabled devices l…


Published on 2 months, 3 weeks ago

Deciphering the Mumbo Jumbo of New Laptop Technologies. We'll Simplify

Deciphering the Mumbo Jumbo of New Laptop Technologies. We'll Simplify



2025 is like a fork in the road for Computer Technology. This year so the introduction of super powered M4 Macbooks, Windows with ARM Snapdragon Elite, newly designed chips like Intel Lunar Lake and …


Published on 2 months, 4 weeks ago

Can You Trust Wikipedia? The Now De-Facto Source of Online Intelligence

Can You Trust Wikipedia? The Now De-Facto Source of Online Intelligence



Search Engines, Voice Assistants like SIRI, AI Models now have gravitated to having Wikipedia be their primary source of knowledge. This makes Wikipedia dangerously overly significant and is thus sub…


Published on 3 months ago

Intelligence and Military Uses of Anonymous Phone Location Data

Intelligence and Military Uses of Anonymous Phone Location Data



I will show you a company called Anomaly 6 that actually proved that they can identify spies just from phone location data. Phone data that most of you understand to be anonymous. This shows how seem…


Published on 3 months, 1 week ago

Corporate Surveillance Players That Sell Your Data to Police and Private Parties

Corporate Surveillance Players That Sell Your Data to Police and Private Parties



If you're one of those with nothing to hide and would never complain about the surveillance economy, then it is guaranteed that you're part of this gigantic surveillance dataset that circulates aroun…


Published on 3 months, 2 weeks ago

Mass Surveillance Using ‘Fog Data Science’

Mass Surveillance Using ‘Fog Data Science’



Here's an example of a mass surveillance tool that is used by many police and sheriff departments. It uses your phone location history to figure out your location patterns. So if you're found in a pa…


Published on 3 months, 4 weeks ago

A Pseudonym Will Not Protect You - Without a Plan.  Privacy Masterclass Series #2

A Pseudonym Will Not Protect You - Without a Plan. Privacy Masterclass Series #2



One of the primary tools we use to protect our privacy on the Internet is to use a Pseudonym. But if you don't understand what this has to be used with then you will likely make a terrible mistake an…


Published on 4 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate