30s Ad: $17 - $20
60s Ad: $20 - $24
CPM Category: Technology
Different podcast categories command different CPM (cost per mille) rates based on advertiser demand and audience value.
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Producers, Hosts, and Production Team
Searching
Searching for producer information... This may take a moment.
Producers, Hosts, and Production Team
No producer information available yet. Click "Find producers" to search for the production team.
Emails, Phones, and Addresses
Contact Page Emails
Emails listed specifically on the website's official contact page.
Emails
Tanya Evans (CHIEF OF STAFF, ADMINISTRATIVE HEAD):
Ev***@NBTV.media
Emails found on general website pages (e.g., about, info), not the main contact page.
No website emails found.
Externally Sourced Emails
Emails discovered using automated web scraping across the internet.
No external emails found.
RSS Emails
Email addresses extracted directly from the website's or podcast's RSS feed(s).
No RSS emails found.
Recent Hosts, Guests & Topics
Here's a quick summary of the last 5 episodes on NBTV: Your Money, Your Data, Your Life.
Hosts
Naomi Brockwell
Previous Guests
Sam Curry
Sam Curry is a security researcher known for his work in the field of cybersecurity, particularly focusing on vulnerabilities in internet-connected devices, including vehicles. He has conducted extensive research on car hacking, exposing significant security flaws in various car models and advocating for better privacy and security measures in the automotive industry. His insights and findings have contributed to raising awareness about the risks associated with connected cars.
Sam Curry is a security researcher known for his work in the field of cybersecurity, particularly focusing on vulnerabilities in internet-connected devices, including vehicles. He has conducted extensive research on car hacking, exposing significant security flaws in various car models and advocating for better privacy and security measures in the automotive industry. His insights and findings have contributed to raising awareness about the risks associated with connected cars.
Topics Discussed
digital privacy
data migration
device upgrade
app bloat
security
privacy risks
digital clutter
intentional digital life
privacy
GrapheneOS
smartphones
Google Play Services
digital freedom
UK government
iCloud privacy
Apple
Advanced Data Protection
data protection
privacy-focused alternatives
Signal
usernames
phone number
contact list
car hacking
internet-connected vehicles
security flaws
data security
connected cars
Tesla Bug Bounty Program
self-driving cars
NBTV is a research and media institute dedicated to helping you reclaim your digital rights. We empower you to protect your data, money, and free expression online.
www.nbtv.media
Created and hosted by Naomi Brockwell
Our channel is funded by community support.
You can help by visiting https://www.nbtv.media/support
(We are run by a 501(c)(3) non-profit, and donations are tax deductible in the US)
Our eBook:
Beginner's Introduction To Privacy
https://amzn.to/3JPeHU3
Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.
00:00 Resist Temptation 00:41 App Bloat 01:50 Attack Surface 02:51 Switch Accounts 03:49 ID Tracking 04:17 Ghost Data 05:27 Habit Traps 06:17 Reclaiming Mental Bandwidth 07:14 7 Tips 10:02 My Thoughts on Restoring From Backup
When people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.
00:00 Resist Temptation 00:41 App Bloat 01:50 Attack Surface 02:51 Switch Accounts 03:49 ID Tracking 04:17 Ghost Data 05:27 Habit Traps 06:17 Reclaiming Mental Bandwidth 07:14 7 Tips 10:02 My Thoughts on Restoring From Backup
When people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Your phone is a tracking device. But it doesn’t have to be. One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.
This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we’ll show you how to use it in a more privacy-preserving way.
I’ll walk you through how I set up my GrapheneOS device so you can see what’s possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!
00:00 Spyware is all over our smartphones 01:47 Hardware 03:03 Purchase 05:13 Installation 10:24 Setup 13:33 App Stores 19:32 Secondary Profiles 23:46 Your Phone, Your Rules
As difficult as it may seem, it’s actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn’t about going off grid; it’s about making informed choices; and with GrapheneOS, you’re taking control of your device, your data, and your digital freedom.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
Your phone is a tracking device. But it doesn’t have to be. One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.
This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we’ll show you how to use it in a more privacy-preserving way.
I’ll walk you through how I set up my GrapheneOS device so you can see what’s possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!
00:00 Spyware is all over our smartphones 01:47 Hardware 03:03 Purchase 05:13 Installation 10:24 Setup 13:33 App Stores 19:32 Secondary Profiles 23:46 Your Phone, Your Rules
As difficult as it may seem, it’s actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn’t about going off grid; it’s about making informed choices; and with GrapheneOS, you’re taking control of your device, your data, and your digital freedom.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
In an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disabled ADP entirely for UK users. By doing this, Apple alerted the world to the secret order—but it also left UK users vulnerable. Their backups, photos, notes, and more are now accessible to the government.
In this video, you'll learn exactly what Apple data is no longer private, and discover privacy-focused alternatives for your files, photos, emails, notes, and more. The UK government is fishing for your personal information—now’s the time to ramp up your protections and take control of your digital life.
00:00 An Unprecedented Attack 03:24 What Kind of Data is Affected 03:57 Safari Bookmarks Alternatives 04:34 iCloud Drive Alternatives 05:38 Notes Alternatives 06:06 Reminder Alternatives 06:35 Voice Memo Alternatives 07:08 Email Alternatives 07:37 Contacts Alternatives 08:10 Calendar Alternatives 08:38 Important Note About ADP 09:55 The Privacy Battle Ahead
Apple’s removal of Advanced Data Protection in response to the UK's demands is unprecedented among major democracies. If privacy matters to you, it’s time to move your sensitive data away from iCloud—and potentially other major providers targeted by similar government demands—to privacy-first alternatives. Protect your information before it's too late.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
In an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disabled ADP entirely for UK users. By doing this, Apple alerted the world to the secret order—but it also left UK users vulnerable. Their backups, photos, notes, and more are now accessible to the government.
In this video, you'll learn exactly what Apple data is no longer private, and discover privacy-focused alternatives for your files, photos, emails, notes, and more. The UK government is fishing for your personal information—now’s the time to ramp up your protections and take control of your digital life.
00:00 An Unprecedented Attack 03:24 What Kind of Data is Affected 03:57 Safari Bookmarks Alternatives 04:34 iCloud Drive Alternatives 05:38 Notes Alternatives 06:06 Reminder Alternatives 06:35 Voice Memo Alternatives 07:08 Email Alternatives 07:37 Contacts Alternatives 08:10 Calendar Alternatives 08:38 Important Note About ADP 09:55 The Privacy Battle Ahead
Apple’s removal of Advanced Data Protection in response to the UK's demands is unprecedented among major democracies. If privacy matters to you, it’s time to move your sensitive data away from iCloud—and potentially other major providers targeted by similar government demands—to privacy-first alternatives. Protect your information before it's too late.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don’t realize how they work—some mistake them for their profile name, and figuring out how to share or search for usernames can be confusing. Here’s what you need to know: how usernames work, how to set yours up, how to find others, and the privacy benefits (and limitations) of this new feature.
00:00 Signal’s Game-Changing Privacy Upgrade 00:51 What Are Signal Usernames? (and Why You Should Use One) 01:34 Step-by-Step: Setting Up Your Signal Username 02:14 How to Find People on Signal Without a Phone Number 03:13 The Pros & Cons of Signal’s Username System 05:14 Should You Let Signal Access Your Contacts? 05:44 How Signal Protects Your Contact List (Explained) 06:35 How to Change Your Signal Username Anytime 07:42 Hide Your Phone Number on Signal – Here’s How 08:27 Final Thoughts – Why This Feature Matters
Signal’s username feature is a big step forward for privacy, helping us move away from phone numbers and take control over the information we share. If you haven’t set up your username yet, now’s the perfect time. And the best part? You can change it anytime, as often as you like.
Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don’t realize how they work—some mistake them for their profile name, and figuring out how to share or search for usernames can be confusing. Here’s what you need to know: how usernames work, how to set yours up, how to find others, and the privacy benefits (and limitations) of this new feature.
00:00 Signal’s Game-Changing Privacy Upgrade 00:51 What Are Signal Usernames? (and Why You Should Use One) 01:34 Step-by-Step: Setting Up Your Signal Username 02:14 How to Find People on Signal Without a Phone Number 03:13 The Pros & Cons of Signal’s Username System 05:14 Should You Let Signal Access Your Contacts? 05:44 How Signal Protects Your Contact List (Explained) 06:35 How to Change Your Signal Username Anytime 07:42 Hide Your Phone Number on Signal – Here’s How 08:27 Final Thoughts – Why This Feature Matters
Signal’s username feature is a big step forward for privacy, helping us move away from phone numbers and take control over the information we share. If you haven’t set up your username yet, now’s the perfect time. And the best part? You can change it anytime, as often as you like.
Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.
To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Security researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think.
00:00 Car Hacking Doesn’t Seem Real 01:13 How Sam Got Into Car Hacking 04:55 Why Connected Cars Are Not Secure 12:11 Types of Attacks Researched 14:36 The Subaru Experiment 16:53 Kia Connect Research 18:11 Tesla Bug Bounty Program 23:01 VPN Security 23:37 Little Regard for Security of Consumers 26:23 Jasper 32:52 Tether Hacking 34:10 The Problem with ISP Backdoors 38:35 Self-Driving Cars 39:43 Hacking Driver Accounts 43:20 What People Can Do 44:34 We Take Our Privacy For Granted Until It Is Summoned 47:45 Where We Are Now and Where We Are Going
Cars aren’t just vehicles anymore—they’re data goldmines, storing your messages, photos, and location history. We need to rethink how much personal info we’re handing over and who has access to it.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Security researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think.
00:00 Car Hacking Doesn’t Seem Real 01:13 How Sam Got Into Car Hacking 04:55 Why Connected Cars Are Not Secure 12:11 Types of Attacks Researched 14:36 The Subaru Experiment 16:53 Kia Connect Research 18:11 Tesla Bug Bounty Program 23:01 VPN Security 23:37 Little Regard for Security of Consumers 26:23 Jasper 32:52 Tether Hacking 34:10 The Problem with ISP Backdoors 38:35 Self-Driving Cars 39:43 Hacking Driver Accounts 43:20 What People Can Do 44:34 We Take Our Privacy For Granted Until It Is Summoned 47:45 Where We Are Now and Where We Are Going
Cars aren’t just vehicles anymore—they’re data goldmines, storing your messages, photos, and location history. We need to rethink how much personal info we’re handing over and who has access to it.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Sam Ettaro, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)