Podcast Episodes

Back to Search
Can Phone Production Be in the USA? An Inside Look at the Phone Industry and the Effects of Tariffs

Can Phone Production Be in the USA? An Inside Look at the Phone Industry and the Effects of Tariffs



As an insider in Phone Manufacturing, let me tell you the complexity of the phone industry and how it really isn't as simplistic as saying that China has a stranglehold on phone manufacturing. We'll…


Published on 4 months, 1 week ago

Can You Evade the KYC Layer? Privacy Masterclass Series #1

Can You Evade the KYC Layer? Privacy Masterclass Series #1



You've heard people say "The Internet is forever" or "You are the Product" but this is much more nuanced than you think. The reality is that the data is forever because certain entities have decided …


Published on 4 months, 2 weeks ago

The Dead Drop: Design a Communications Method Like a Spy

The Dead Drop: Design a Communications Method Like a Spy



Learn a technique for communicating with your family in an emergency using a method used by spies during the Cold War. It's called the Dead Drop. While this is more of a fun exercise, it will actuall…


Published on 4 months, 3 weeks ago

What You Don't Know About TOR

What You Don't Know About TOR



TOR has been with us for awhile and it is an important tool for privacy. However many things about TOR are not understood by many. This video will attempt to fill in the gap.

-------------------------…


Published on 5 months ago

The Side Channel Attack: One of the Hardest Cyber Threats to Defend Against

The Side Channel Attack: One of the Hardest Cyber Threats to Defend Against



There is a cyber attack that is one of the hardest to defend against. I call it the side channel attack. It is extremely hard to protect against because it is an attack on people you know. The end ta…


Published on 5 months, 1 week ago

New Privacy Threat from Google?  Full Analysis of the Tracking Infrastructure

New Privacy Threat from Google? Full Analysis of the Tracking Infrastructure



In a recent announcement in February 2025, Google announced that Digital Fingerprinting is now back and of course this raised panic in the community. This is actually connected to prior projects by G…


Published on 5 months, 2 weeks ago

Virtual Phone Solution - No KYC, Unregistered Phone Numbers with SMS

Virtual Phone Solution - No KYC, Unregistered Phone Numbers with SMS



We will discuss and demonstrate applications of the Brax Virtual Phone service which allows for a wide range of uses. But relying first of all on have unregistered phone numbers for personal use (no …


Published on 5 months, 3 weeks ago

How Know-Your-Customer (KYC) Requirements are Used for Surveillance

How Know-Your-Customer (KYC) Requirements are Used for Surveillance



Do you want your ID checked everytime you use the Internet? While this sounds like a disgusting concept to freedom loving people, the reality is that if you do nothing and are not aware of the techni…


Published on 6 months ago

Client Side Scanning - The  Matrix is Complete!

Client Side Scanning - The Matrix is Complete!



Google recently released the Android System SafetyCore App which the claim is to be used for Sensitive Content Warnings. Together with cybersecurity shills, this is being touted as some tool for your…


Published on 6 months, 1 week ago

Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".

Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".



The politicians are claiming that Tiktok is a threat. Exactly what the threat is is not specifically stated so I will analyze in terms of a Doxxing threat, Cybersecurity Threat, Privacy Threat, Psyop…


Published on 6 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate