30s Ad: $17 - $20
60s Ad: $20 - $24
CPM Category: Technology
Different podcast categories command different CPM (cost per mille) rates based on advertiser demand and audience value.
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
Producers, Hosts, and Production Team
Searching
Searching for producer information... This may take a moment.
No producer information available yet. Click "Find producers" to search for the production team.
Emails, Phones, and Addresses
Contact Page Emails
Emails listed specifically on the website's official contact page.
Emails
Tanya Evans (CHIEF OF STAFF, ADMINISTRATIVE HEAD):
Ev***@NBTV.media
Michael Bazzell is a privacy expert and author known for his work in digital privacy and security. He has developed various resources and tools aimed at helping individuals protect their personal information online. Bazzell is recognized for his comprehensive approach to privacy, including his recommended setups for various operating systems, and he has authored books on the subject, including 'Hiding from the Internet'. His expertise is often sought after in discussions about technology and privacy.
Michael Bazzell is a privacy expert and author known for his work in digital privacy and security. He has developed various resources and tools aimed at helping individuals protect their personal information online. Bazzell is recognized for his comprehensive approach to privacy, including his recommended setups for various operating systems, and he has authored books on the subject, including 'Hiding from the Internet'. His expertise is often sought after in discussions about technology and privacy.
John Tuckner is an expert in cybersecurity and data privacy, known for his insights into the risks associated with digital tools and online behavior. He has contributed to various discussions on how technology impacts personal security and privacy.
John Tuckner is an expert in cybersecurity and data privacy, known for his insights into the risks associated with digital tools and online behavior. He has contributed to various discussions on how technology impacts personal security and privacy.
Matt Frisbee is a technology consultant specializing in browser security and user privacy. He has extensive experience in evaluating software for vulnerabilities and educating users on safe online practices.
Matt Frisbee is a technology consultant specializing in browser security and user privacy. He has extensive experience in evaluating software for vulnerabilities and educating users on safe online practices.
Pete Snyder is a digital privacy advocate and expert in the field of online security. He has worked on projects aimed at raising awareness about the dangers of malicious software and the importance of protecting personal data.
Pete Snyder is a digital privacy advocate and expert in the field of online security. He has worked on projects aimed at raising awareness about the dangers of malicious software and the importance of protecting personal data.
Topics Discussed
Click on the topic tags to start a search query for that topic
NBTV is a project of the Ludlow Institute, a research and media institute dedicated to helping you reclaim control of your digital life. Created and hosted by Naomi Brockwell.
Our channel is funded entirely by community support.
You can help by visiting ludlowinstitute.org/donate
Ludlow Institute is a 501(c)(3) non-profit, and donations are tax-deductible in the USA to the extent allowed by law.
Our eBook:
Beginner's Introduction To Privacy
https://amzn.to/3JPeHU3
Your Smart TV is spying on you. It’s taking snapshots of everything you watch -- sometimes hundreds per second -- and quietly sending that data to third parties. In this video, we reveal what’s really happening behind the glass: How smart TVs track your behavior How that data is used to profile and manipulate you And how you can protect yourself. Surveillance has crept into our living rooms. It’s time to draw the line.
00:00 TV Is No Longer a Private Activity 00:39 Understanding Smart TVs 05:30 How Data Is Weaponized 08:34 Opaque By Design 13:13 What Can We Do 16:09 Grants from Ludlow 16:33 In Summary
We never should’ve let faceless companies and governments into our living rooms and bedrooms. The damage is deep, but it’s not irreversible. It starts with awareness. It’s time to blow the lid off the surveillance quietly woven into our lives, and start taking back control.
Special thanks to Yash Vekaria and his team for their awesome research. Read their whitepaper here: https://dl.acm.org/doi/10.1145/3646547.3689013
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop! https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy: https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Your Smart TV is spying on you. It’s taking snapshots of everything you watch -- sometimes hundreds per second -- and quietly sending that data to third parties. In this video, we reveal what’s really happening behind the glass: How smart TVs track your behavior How that data is used to profile and manipulate you And how you can protect yourself. Surveillance has crept into our living rooms. It’s time to draw the line.
00:00 TV Is No Longer a Private Activity 00:39 Understanding Smart TVs 05:30 How Data Is Weaponized 08:34 Opaque By Design 13:13 What Can We Do 16:09 Grants from Ludlow 16:33 In Summary
We never should’ve let faceless companies and governments into our living rooms and bedrooms. The damage is deep, but it’s not irreversible. It starts with awareness. It’s time to blow the lid off the surveillance quietly woven into our lives, and start taking back control.
Special thanks to Yash Vekaria and his team for their awesome research. Read their whitepaper here: https://dl.acm.org/doi/10.1145/3646547.3689013
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Visit our shop! https://Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy: https://amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Digital PrivacyFacial RecognitionChild Data ProfilingSurveillance SystemsAlgorithmic Risk ScoresChild ID TheftBaby MonitorsData Collection in SchoolsParental Surveillance AppsDigital Footprint
Your child already has a digital footprint—before they can even speak. But they didn’t create it. You did.
Every photo you post, every milestone you share, helps train facial recognition systems and build psychological profiles your child will carry for life. These profiles are sold, scored, and used by companies and governments—long before your child is old enough to understand what privacy even means.
In this video, we break down how seemingly harmless posts can fuel surveillance systems, shape algorithmic risk scores, and impact your child’s future—from school to jobs to border crossings.
00:00 Kids Have No Choice 01:08 Data Brokers Are Watching Your Kids 01:35 How Children Are Profiled 02:31 One Possible Future 03:32 Child ID Theft 03:50 The Dangers of Toys and Devices 05:34 Baby Monitors 06:19 Data Collection in Schools 06:35 Risks of Hand-Me-Down Tech 06:51 Parental Surveillance Apps 10:02 Tips to Protect Kids in the Digital Age 12:28 Give Your Kids a Fighting Chance
This isn’t about guilt. It’s about awareness. And it’s about protecting their right to grow up without being boxed in by a digital past they never chose. Learn how to limit your child’s data exposure, push back against normalization of surveillance, and give your kids a clean slate.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Your child already has a digital footprint—before they can even speak. But they didn’t create it. You did.
Every photo you post, every milestone you share, helps train facial recognition systems and build psychological profiles your child will carry for life. These profiles are sold, scored, and used by companies and governments—long before your child is old enough to understand what privacy even means.
In this video, we break down how seemingly harmless posts can fuel surveillance systems, shape algorithmic risk scores, and impact your child’s future—from school to jobs to border crossings.
00:00 Kids Have No Choice 01:08 Data Brokers Are Watching Your Kids 01:35 How Children Are Profiled 02:31 One Possible Future 03:32 Child ID Theft 03:50 The Dangers of Toys and Devices 05:34 Baby Monitors 06:19 Data Collection in Schools 06:35 Risks of Hand-Me-Down Tech 06:51 Parental Surveillance Apps 10:02 Tips to Protect Kids in the Digital Age 12:28 Give Your Kids a Fighting Chance
This isn’t about guilt. It’s about awareness. And it’s about protecting their right to grow up without being boxed in by a digital past they never chose. Learn how to limit your child’s data exposure, push back against normalization of surveillance, and give your kids a clean slate.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Step-by-Step Privacy Hardening: Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s privacy.
In this video, we walk you through privacy expert Michael Bazzell’s recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.
00:00 Apple promises only THEY will abuse your data 02:20 Purchasing Your Mac 03:14 Choose a Model 03:41 Used Devices: Update, Reformat, Install OS 08:28 Initial Setup 11:32 WiFi and Bluetooth 11:50 OS Firewall 13:14 Notifications 14:16 Airdrop, Siri, and Sharing 15:33 Gatekeeper 18:26 Analytics and Ads 19:01 Time 20:15 Filevault 22:02 Dock, Wallpaper and Finder 25:35 Application Firewall / 3rd Party Apps 28:09 Conclusion
Apple does build decent privacy tools—but they definitely don’t make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.
Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here: https://inteltechniques.com/book7.html
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Step-by-Step Privacy Hardening: Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s privacy.
In this video, we walk you through privacy expert Michael Bazzell’s recommended macOS setup—from purchasing a device (without linking it to your identity), to reformatting, disabling invasive features, and installing the right tools.
00:00 Apple promises only THEY will abuse your data 02:20 Purchasing Your Mac 03:14 Choose a Model 03:41 Used Devices: Update, Reformat, Install OS 08:28 Initial Setup 11:32 WiFi and Bluetooth 11:50 OS Firewall 13:14 Notifications 14:16 Airdrop, Siri, and Sharing 15:33 Gatekeeper 18:26 Analytics and Ads 19:01 Time 20:15 Filevault 22:02 Dock, Wallpaper and Finder 25:35 Application Firewall / 3rd Party Apps 28:09 Conclusion
Apple does build decent privacy tools—but they definitely don’t make it easy to opt out of their own surveillance. With the right tools and configurations, though, you can take back control of your digital environment. Whether you're doing sensitive work or simply believe in the right to privacy, these steps put you in charge.
Special Thanks to Michael Bazzell for leading the way in tech privacy and research! You can purchase his book here: https://inteltechniques.com/book7.html
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Derek Porter, Will Sandoval, and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.
They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.
In this video, we expose the chilling truth about browser extensions. You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users. And we’ll break down why just checking permissions isn’t enough—because malicious extensions often ask for the same permissions as the good ones. It’s not about what they ask for. It’s how they use it.
00:00 Extensions can do WHAT 00:52 Overview 01:34 The Problem with Browser Extensions 09:18 How Do We Protect Ourselves 10:52 Understand Permissions 16:03 Grant Fewer Permissions 16:18 Use Extensions Sparingly 17:10 Use a Private Browser 18:06 Least Privilege 18:28 Use Code Review Tools 19:07 In Summary
Extensions are more than just “add-ons.” They have access to everything you do online. Before you install another one, watch this video.
Special thanks to John Tuckner, Matt Frisbee and Pete Snyder for sharing their expert first-hand knowledge with us!
Brought to you by Lee Rennie, Cube Boy, Will Sandoval, Jack Rhysider, and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords.
They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or draining your crypto wallets.
In this video, we expose the chilling truth about browser extensions. You'll see real-world cases of extensions that were hacked, sold, or designed from the start to exploit users. And we’ll break down why just checking permissions isn’t enough—because malicious extensions often ask for the same permissions as the good ones. It’s not about what they ask for. It’s how they use it.
00:00 Extensions can do WHAT 00:52 Overview 01:34 The Problem with Browser Extensions 09:18 How Do We Protect Ourselves 10:52 Understand Permissions 16:03 Grant Fewer Permissions 16:18 Use Extensions Sparingly 17:10 Use a Private Browser 18:06 Least Privilege 18:28 Use Code Review Tools 19:07 In Summary
Extensions are more than just “add-ons.” They have access to everything you do online. Before you install another one, watch this video.
Special thanks to John Tuckner, Matt Frisbee and Pete Snyder for sharing their expert first-hand knowledge with us!
Brought to you by Lee Rennie, Cube Boy, Will Sandoval, Jack Rhysider, and Naomi Brockwell.
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.
00:00 Resist Temptation 00:41 App Bloat 01:50 Attack Surface 02:51 Switch Accounts 03:49 ID Tracking 04:17 Ghost Data 05:27 Habit Traps 06:17 Reclaiming Mental Bandwidth 07:14 7 Tips 10:02 My Thoughts on Restoring From Backup
When people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)
Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy risks. In this video, I’ll show you why starting from scratch is smarter for both your security and sanity and share some essential tips for setting up a new device. My goal is to help you enjoy a less cluttered, more private, and more intentional digital life.
00:00 Resist Temptation 00:41 App Bloat 01:50 Attack Surface 02:51 Switch Accounts 03:49 ID Tracking 04:17 Ghost Data 05:27 Habit Traps 06:17 Reclaiming Mental Bandwidth 07:14 7 Tips 10:02 My Thoughts on Restoring From Backup
When people ask me questions like, how to restore from a backup, my answer is usually: don’t. Yes, there are costs to starting fresh; but there are also costs from restoring from a backup. By investing a bit of extra effort up front, you’ll enjoy a cleaner, more private, and ultimately more efficient digital environment—one you truly control.
Brought to you by NBTV team members: Lee Rennie, Cube Boy, Will Sandoval and Naomi Brockwell
NBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology. To support NBTV, visit: https://LudlowInstitute.org/donate (As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)