<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[NBTV Newsletter]]></title><description><![CDATA[We teach you how to reclaim your digital life]]></description><link>https://nbtv.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!P0Xl!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7acdf6ff-65f3-43ca-9a81-8ff4d615d792_1280x1280.png</url><title>NBTV Newsletter</title><link>https://nbtv.substack.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 14 May 2026 22:09:49 GMT</lastBuildDate><atom:link href="https://nbtv.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ludlow Institute]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[newsletter@nbtv.media]]></webMaster><itunes:owner><itunes:email><![CDATA[newsletter@nbtv.media]]></itunes:email><itunes:name><![CDATA[NBTV Media]]></itunes:name></itunes:owner><itunes:author><![CDATA[NBTV Media]]></itunes:author><googleplay:owner><![CDATA[newsletter@nbtv.media]]></googleplay:owner><googleplay:email><![CDATA[newsletter@nbtv.media]]></googleplay:email><googleplay:author><![CDATA[NBTV Media]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Never Plug In Raw Again]]></title><description><![CDATA[Use THIS when you plug in.]]></description><link>https://nbtv.substack.com/p/never-plug-in-raw-again</link><guid isPermaLink="false">https://nbtv.substack.com/p/never-plug-in-raw-again</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Wed, 13 May 2026 05:26:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WssN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We plug our phones into everything. Airport kiosks. Hotel lamps. Printers. Rental cars. Conference booths. Airplane USB ports. Strangers&#8217; laptops. Smart desks.</p><p>USB charging has become completely normalized. And sometimes we don&#8217;t realize that what we&#8217;re plugging into is another computer.</p><p>USB connections are often doing two jobs at once: delivering power and opening a channel for data. And if you don&#8217;t control what you&#8217;re plugging into, that data connection might be used to steal information or load malware onto your device.</p><p>One thing that can help is a USB data blocker. It&#8217;s a cheap piece of hardware that is criminally overlooked.</p><p>In this newsletter I&#8217;ll talk about why you shouldn&#8217;t plug your phone into random USB ports, and I&#8217;ll explain how USB data blockers help and how they work.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WssN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WssN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!WssN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!WssN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!WssN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WssN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png" width="336" height="189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:336,&quot;bytes&quot;:2729460,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/197450948?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WssN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!WssN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!WssN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!WssN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f2ae772-ea0a-4a98-bf40-df544bd24de9_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong><a href="https://www.youtube.com/watch?v=nJP_iHaoRfQ">Use THIS When You Plug In</a></strong></figcaption></figure></div><h2>Why You Shouldn&#8217;t Plug Into Unknown Ports</h2><p>Let&#8217;s start by understanding the dangers of plugging your device into unknown USB ports.</p><ol><li><p>Juice Jacking</p></li></ol><p>First there&#8217;s juice jacking from malicious USB ports. A scammer puts malware or monitoring software into a public USB port that gives them the ability to steal data, passwords, addresses, and banking information off a phone when it plugs in.</p><ol start="2"><li><p>Malicious Cables</p></li></ol><p>Then there's the risk that the cable itself might be malicious. We've talked about things like the OMG cable on the show before: it looks identical to a normal cable, but it has a tiny computer and wifi access point hidden inside. An attacker can connect to it from anywhere in the world and run payloads on whatever it's plugged into. </p><p>So you should never plug in any charging cable that you find lying around.</p><ol start="3"><li><p>Privacy</p></li></ol><p>And finally, there&#8217;s the privacy side of plugging your phone into things. What you&#8217;re plugging into might not be malicious, but you could be unintentionally sharing data without realizing.</p><p>Cars are a great example of this. When you connect your phone to your car, oftentimes the car essentially downloads a mini clone of your phone.</p><p>Many people think that this doesn&#8217;t matter, because they assume their own car is private and neutral, and that any USB connection to it is safe because it is &#8220;their&#8221; vehicle. </p><p>But cars are packed with connected services and third-party integrations. This data isn&#8217;t staying in your car. It&#8217;s shared with countless entities. There&#8217;s an entire explosion of data collection in cars. And the worst part of it is that we have no idea who will get access to this data. Car companies, ad companies, hackers through data breaches, and of course massive data brokers that collect data from all sorts of manufacturers and they sell it.</p><p>Sometimes you might just want to charge your phone in your car without sharing your phone data with countless 3rd parties.</p><h2>Risk of Unintended Data Transfer</h2><p>Now how likely is it to fall victim to one of these dangers mentioned?</p><p>A malicious USB port does not usually get instant access just because you plugged in. A few things are required, and there are some protections built into your phone.</p><p>First, Android has something called &#8220;USB protection&#8221; which can block USB data while locked. And by default, iPhones and iPads enter a protective state called USB Restricted Mode: if the device has been locked for more than an hour, it won&#8217;t communicate with an accessory or computer until you unlock it, though it will still charge normally from a USB power adapter.</p><p>But you don&#8217;t always keep your phone locked when it&#8217;s charging, so these charge-only modes won&#8217;t necessarily protect you.</p><p>Next, on Android and GrapheneOS you can change your security settings so that you only ever allow charging through the USB port and not data. But this setting will have to be shifted back if you ever want to connect the device to your computer or speaker etcetera.</p><p>Then there are trust prompt protections. For example, often, to enable data transfer you have to approve some kind of popup. Some of these might auto-appear in a way that&#8217;s easy to tap accidentally, or approve while you are half awake in an airport, for example.</p><p>But sometimes consent can actually get bypassed. There are cases where your phone might automatically say yes without you even having to tap anything. For example, if you&#8217;ve previously trusted a computer, your phone might remember and not ask again. So a malicious device can potentially impersonate a trusted device and auto-connect.</p><p>Finally, if your phone is running outdated software, the chances of being successfully attacked by a malicious USB port goes up significantly.</p><p>These risks end up being non-trivial, but luckily there is an easy way to protect against all of them at the hardware level, before the phone even has a chance to negotiate a data connection.</p><p>You just need a USB data blocker.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ftDx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ftDx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 424w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 848w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 1272w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ftDx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png" width="234" height="234.50924918389555" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:921,&quot;width&quot;:919,&quot;resizeWidth&quot;:234,&quot;bytes&quot;:761429,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/197450948?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcce01b22-83d1-4602-9bb1-0de017bdfd1f_2465x1731.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ftDx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 424w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 848w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 1272w, https://substackcdn.com/image/fetch/$s_!ftDx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcd0430ff-5143-4b8d-9a15-d7fccac00324_919x921.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>What Is A USB Data Blocker?</h2><p>It has many names, like a &#8220;charge-only&#8221; adapter, or juice-jack defender. Or more risqu&#233; names like USB condom.</p><p>It&#8217;s a small adapter that sits between your device and whatever you&#8217;re plugging it into. If you want to charge your device, you could plug the blocker into your device, then plug your charging cable into the blocker.</p><p>What is the point of this? Using a USB blocker blocks the flow of any data and allows only electrical power through.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>How Does It Work?</h2><p>It&#8217;s all done through the physical pins inside the USB port itself.</p><p>Let&#8217;s start with a USB-A, which is the square-shaped USB that always seems to go in the wrong way the first 2 tries.</p><p>If you cut open a USB-A cable and peel back the outer plastic jacket, you&#8217;d find that it isn&#8217;t just one solid wire inside. It&#8217;s actually four thin wires bundled together, each wrapped in its own colored insulation. Each of those four wires has a specific job, and they fall into two categories: two of them carry electricity, and two of them carry data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ocFi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ocFi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 424w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 848w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 1272w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ocFi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png" width="286" height="290.51785714285717" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1479,&quot;width&quot;:1456,&quot;resizeWidth&quot;:286,&quot;bytes&quot;:1797743,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/197450948?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ocFi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 424w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 848w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 1272w, https://substackcdn.com/image/fetch/$s_!ocFi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb1ec6027-2a5e-49f4-a1e6-2093c9683064_1540x1564.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>One wire is called voltage positive and one wire is called ground. Electricity needs a complete loop to flow, so the V positive wire delivers the electricity, and the ground wire gives that electricity a path to return. Together, these two wires make charging possible.</p><p>The other two wires are the data wires, &#8220;D plus&#8221; and &#8220;D minus.&#8221; These don&#8217;t carry power, they carry information. When your phone sends a photo to your computer through a USB-A cable, that photo is actually being chopped up into millions of tiny electrical pulses, and those pulses travel along the D+ and D- wires from the phone to the computer.</p><p>And if you look inside a USB-A port, you&#8217;ll see four metal pins &#8212; one for each of the four wires inside the cable.</p><p>If you look inside a USB-A data blocker, you&#8217;ll see only 2 pins, because it&#8217;s physically severing the connection of the two data pins, while keeping the power pins intact. This means that electricity flows freely, but no data flows.</p><p>Now this is just for USB-A. USB-C cables are much more complex internally &#8212; they have many more wires inside the cable, and 24 pins in the connector, to support things like faster charging, video output, and reversible plug orientation. But the basic principle of separating power pathways from data pathways still applies.</p><p>Unfortunately, unlike with USB-A, you can&#8217;t visually verify what&#8217;s being cut off with a USB-C data blocker, because the internal wiring isn&#8217;t inspectable by eye and the pin count makes it non-obvious what&#8217;s connected to what. So with USB-C you largely have to trust the manufacturer&#8217;s claims.</p><p>This is a good reason to buy USB-C blockers from reputable brands with clear technical documentation, rather than no-name products (I personally use PortaPow).</p><p>It&#8217;s also worth noting that cheaper USB-C data blockers may not support fast charging protocols and may limit you to standard 5-volt charging speeds.</p><h2>The Bottom Line</h2><p>Remember, you&#8217;ll only want to use a data blocker when you just want to charge your device. Using one means giving up legitimate USB functions like photo transfers, Android Auto, tethering etc. A blocker will interfere with all of that data communication. But that&#8217;s the point.</p><p>But when you just want to charge, a blocker gives you a simple assurance that only power is crossing the connection.</p><p>For a fully updated, locked phone, plugging into a malicious USB port is fairly low-risk. You&#8217;d likely need to actively grant trust, or the attacker would need a real vulnerability. And compared to threats like phishing, it&#8217;s less to worry about. </p><p><strong>But why worry at all?</strong></p><p>Relying on being perfectly patched and attentive at all times is a bad strategy. Especially when you can instead just block the data path and move on. And especially when it costs less than a cup of coffee, and does the job so well.</p><p>Yours In Privacy, <br>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yeBp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" width="310" height="221.42857142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:2100,&quot;resizeWidth&quot;:310,&quot;bytes&quot;:6347352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c6065ec-cd73-4583-90cd-2bfc68be5e03_2100x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Shop.NBTV.media</figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[The Surveillance Accountability Act Fixes This]]></title><description><![CDATA[It's time to close the databroker loophole]]></description><link>https://nbtv.substack.com/p/the-government-already-has-a-warrant</link><guid isPermaLink="false">https://nbtv.substack.com/p/the-government-already-has-a-warrant</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Sat, 02 May 2026 19:48:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N_UE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There&#8217;s a new bill in the House that Ludlow Institute helped work on called the <a href="https://surveillanceaccountability.com">Surveillance Accountability Act</a>. It does something that sounds almost absurdly simple:</p><p><strong>It says that if the government wants to search your life, it needs a warrant. And if it doesn&#8217;t get one, you can hold it accountable.</strong></p><p>That&#8217;s it. That&#8217;s the bill.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N_UE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N_UE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N_UE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png" width="385" height="216.5625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:385,&quot;bytes&quot;:2697087,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/196175673?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N_UE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!N_UE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa3ce308b-9202-4a20-a456-f3a6491ca2b5_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong><a href="https://www.youtube.com/watch?v=60IKOar3kY8">The Surveillance Accountability Act Fixes This</a></strong></figcaption></figure></div><p>You might be wondering why we need a law for something that&#8217;s already in the Constitution. After all, the Fourth Amendment already requires warrants for searches. But the reality is that decades of outdated legal doctrines have hollowed out that protection so completely that the government can now access your medical records, your financial transactions, your location history, your browsing data, your contacts, and your communications, all without a warrant. It can buy this data outright from brokers. It can demand it from the companies that hold it. It can query massive databases about you with no judge involved and no probable cause.</p><p>The Fourth Amendment already says what this bill says. But if this bill were put to a vote, it would likely fail, which tells you everything you need to know about how broken things have gotten.</p><h3>How did we get here?</h3><p>Right now, the legal framework courts use to decide whether the Fourth Amendment protects you is called the &#8220;reasonable expectation of privacy&#8221; test. If a court decides you had a reasonable expectation of privacy in something, the government needs a warrant to access it. If not, it can do what it wants.</p><p>Operating inside that framework is something called the third-party doctrine. It provides a specific answer to that question: if you&#8217;ve shared information with any third party, the courts say you don&#8217;t have a reasonable expectation of privacy in it. The courts have essentially equated giving your bank your financial records to sharing a secret with a friend, saying that once you&#8217;ve told someone, you can&#8217;t expect it to stay private.</p><p>But how does this framework still exist in a world where contracts exist? If I have a contract with a company where they promise to keep my information private, surely I have a reasonable expectation of privacy. The government says no, I don&#8217;t, simply because the data passed through a third party. They consider these contracts irrelevant. We literally have privacy policies spelling out what companies can and can&#8217;t do with our data, and we&#8217;re told that none of it matters when it comes to Fourth Amendment protections.</p><p>Meanwhile, our whole lives have migrated to the internet, and the entire internet runs on third parties. Your email provider stores your messages. Your phone company has your location. Your cloud account holds your files. Your apps know where you go, what you search, what you buy, who you talk to, and what patterns your life follows. Our lives moved online, but no constitutional protections followed.</p><p>On top of this, most people do not even know they are sharing information with third parties. That sharing happens invisibly, as a byproduct of the infrastructure of the digital age. Your phone pings cell towers. Your browser searches leave digital exhaust across countless servers. Your apps transmit data in the background. How can courts argue that we voluntarily shared information most people didn&#8217;t even know existed, with companies most of us didn&#8217;t even know had access to it? None of these legal frameworks make sense in a world of modern technology, yet they continue to determine whether individuals have Fourth Amendment protections.</p><p>And law enforcement knows it. As FBI Director Kash Patel acknowledged when pressed on whether the FBI buys Americans&#8217; location data: &#8220;The FBI uses all tools... to do our mission. We do purchase commercially available information.&#8221; The government is searching your life. It&#8217;s just found ways to do it without getting a warrant.</p><h3>What the bill does</h3><p>The Surveillance Accountability Act fixes this in three key ways.</p><p>First, it establishes a presumption of privacy for data held by third parties. The government may not access data, metadata, or personal information held by financial services providers, telecoms, ISPs, cloud storage companies, or data brokers without a valid warrant, regardless of whether the company cooperates. It also makes clear that your contracts with companies should be respected, and the government can&#8217;t override them to get access to your data. And if a company wants to reserve the right to hand your data to the government, it can&#8217;t bury that in legalese. It has to be stated explicitly and clearly, and the user has to knowingly agree to it first. This directly neutralizes the third-party doctrine. The government can no longer treat your data as fair game simply because a company holds it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Second, the bill defines &#8220;search&#8221; the way the word has always been understood: as any purposeful investigative act directed at a specific person, including surveillance, monitoring, and the collection of personal data through digital or automated means. This closes the loophole that agencies have been exploiting for years: the argument that buying a dataset and then querying it somehow isn&#8217;t a &#8220;search&#8221; under the Fourth Amendment. It is. It always was. This bill makes that explicit.</p><p>Third &#8212; and this may be the most important part &#8212; the bill creates a private right of action. If a government official violates your Fourth Amendment rights, you can sue. Right now, the legal avenues for holding the government accountable for warrantless searches are extremely limited. This bill changes that. It says that if the government searches your life without a warrant, there are consequences.</p><p>The bill also draws careful lines around what doesn&#8217;t require a warrant: plain-view observations, ID checks during traffic stops, genuinely public information, consensual searches, and exigent circumstances. These are the same common-sense exceptions that have always existed in Fourth Amendment law. The bill doesn&#8217;t eliminate them, it just makes sure they can&#8217;t be stretched to cover mass surveillance or data purchases.</p><p>Critically, the bill also makes clear that just because you step outside your front door doesn&#8217;t mean the government can scan your face, track your car, or log your movements without a warrant. None of the warrantless exceptions in the bill can be used to justify the collection of facial recognition data, gait analysis, voice recognition, or automated license plate tracking. These are exactly the kinds of tools being deployed right now with no judicial oversight, and this bill draws a hard line against them.</p><h3>Why it matters</h3><p>The core promise of the Fourth Amendment was never complicated. The founders understood that information is power, and that the government&#8217;s access to information about your life needed limits. This is because the investigative process has a natural bias. Investigators are trying to solve cases and find culprits. That is their job. But it means they are not neutral arbiters of how far they should be allowed to pry into someone&#8217;s life. Left unchecked, that bias turns into abuse. It always has, even with the best intentions.</p><p>That&#8217;s why the founders required a judge in the middle. The idea isn&#8217;t to stop investigators, but instead to make sure the government justifies itself before it searches your life, not after. While today much of law enforcement sees warrant requirements as simply bureaucratic paperwork, the warrant requirement is actually a deliberate check on the natural bias of the investigative process.</p><p>But today, that check has been bypassed. Investigators are buying giant datasets from brokers and searching them at will. They have unfettered access to troves of personal data with no magistrate involved. And the data they have access to gets bigger and bigger over time. The dirty secret is that the vast majority of the time, if the government went and applied for a warrant, they&#8217;d probably get it. But they don&#8217;t see warrants as a critical check on power, and instead see them as busywork.</p><p>The courts know the current framework is broken. But as Rob Frommer of the Fourth Amendment Project at the Institute for Justice has put it, the problem is the courts don&#8217;t know how to get out of it, so they keep creating one-off exceptions rather than really grappling with the rule itself. We can&#8217;t wait for the Supreme Court to slowly judge every new piece of technology, one by one.</p><p>The Surveillance Accountability Act is the legislature stepping in to do what the courts have been unable to do: reestablish the principle that the government needs a warrant to search your life. It was introduced to the House on April 23 by Rep. Thomas Massie and Rep. Lauren Boebert, and deserves serious attention, because the problem it&#8217;s trying to solve affects every single one of us.</p><p>Those with power do not get to open up your life for inspection just because they want to see what they can find. They have to name the person. State the reason. Limit the search. Face a judge. And justify themselves first.</p><p>That&#8217;s all this bill asks. And the fact that we have to ask for it at all should alarm everyone.</p><p><em>Yours In Privacy,<br>Naomi</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yeBp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" width="310" height="221.42857142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:2100,&quot;resizeWidth&quot;:310,&quot;bytes&quot;:6347352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c6065ec-cd73-4583-90cd-2bfc68be5e03_2100x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Shop.NBTV.media</figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[How to Actually Spend Crypto in Real Life]]></title><description><![CDATA[From Zcash to Chipotle: How to opt out of the financial panopticon &#8212; legally]]></description><link>https://nbtv.substack.com/p/how-to-actually-spend-crypto-in-real</link><guid isPermaLink="false">https://nbtv.substack.com/p/how-to-actually-spend-crypto-in-real</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Mon, 20 Apr 2026 00:36:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2oly!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Note from the editor: A lot of people ask me about private payment options. The existing financial system is a surveillancescape. If you want privacy, you can&#8217;t really use traditional payment rails. Masked credit cards will let you hide your identity from merchants, but the card issuer is still required under the Bank Secrecy Act Regime to KYC you, retain your transaction history, and make it accessible to more than 25,000 federal, state, and local government users through the FinCEN Query Program &#8212; all without a warrant. Basically every casual transaction between ordinary Americans is accessible to the federal government. Traditional payment rails constitute one of the largest warrantless financial surveillance apparatus in the country, and it sweeps in every American who uses a bank or an app. This surveillance is a global phenomenon, not isolated to the USA.</em></p><p><em>To avoid this, your other options are cash, gift cards, or cryptocurrency. A lot of people avoid cryptocurrency because they don&#8217;t see it as useful &#8212; it doesn&#8217;t seem like there&#8217;s anywhere to spend it. The guest post below was written by Violet Rollergirl. She helps people in vulnerable communities adopt privacy tools, including private payment methods. Hopefully this article will be helpful if you want to know how you can actually use crypto in daily life, and reclaim financial privacy.</em></p><p><em>To be clear: there's nothing illegal about using cryptocurrency or opting out of traditional financial surveillance. Choosing private payment rails is a normal exercise of financial liberty &#8212; the same one every cash transaction has represented for centuries.</em></p><p><em>Yours in Privacy,<br>Naomi</em></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2oly!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2oly!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!2oly!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!2oly!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!2oly!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2oly!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png" width="374" height="209.6043956043956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:374,&quot;bytes&quot;:6719157,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/194725550?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2oly!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!2oly!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!2oly!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!2oly!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0302964-6fd8-4bf8-93eb-3f4e7b26b91f_2912x1632.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Off-ramping: where and how to spend your cryptocurrency</h2><p><em>By Violet Rollergirl</em></p><p>At the end of the day, cryptocurrency is just currency. Sooner or later, you&#8217;re going to have to spend it on something.</p><p>The cryptocurrency world calls this &#8220;off-ramping,&#8221; and it means turning your cryptocurrency assets into something else, whether digital or physical.</p><p>In the traditional financial system, spending money comes with a privacy trade-off: your bank, credit card company, and payment processor know what you&#8217;re up to. Transparent (non-private) cryptocurrency systems suffer from the same problem, but worse, because everyone in the entire world can watch what you buy. This is one of the main safety benefits to using privacy coins: no one but you and the vendor you&#8217;re buying from knows what you&#8217;re up to.</p><h3>Paying directly in cryptocurrency</h3><p>The easiest way to off-ramp or spend your cryptocurrency is to just pay for the thing in the same privacy coin you already have. Of course, this requires the vendor to accept payments in that privacy coin, and that&#8217;s still rare. [If someone in your community] is willing to accept payment for a service in Zcash, I&#8217;ve got my perfect off-ramp right there!</p><p>So if you&#8217;re a gig worker with skills, share that fact with friends you trust. Build a local economy, and stay surveillance-free by using something like Zcash to sustain it! The true revolutionary potential of this truly cannot be overstated.</p><p>One way to think about this is: <a href="https://zodl.com/">Zodling</a> Zcash is to money what using <a href="https://signal.org/">Signal</a> is to speech. Vive la r&#233;volution!</p><h3>Paying in Bitcoin when you only have Zcash</h3><p>Although Zcash is a superior private currency, most of the crypto world still relies on other surveillable systems, like Bitcoin. Thankfully, cryptocurrencies can be easily converted from one to another so it&#8217;s easy to pay in a vendor&#8217;s cryptocurrency of choice even if you only keep a balance in Zcash. There are lots of ways to do this, but many are clunky and require you to be quite careful about exchange rates, conversion fees, and payment processing times.</p><p>By far the easiest method is Zodl&#8217;s &#8220;Crosspay&#8221; feature, so named because it can make &#8220;cross-chain payments&#8221; simple and safe. Let&#8217;s work through a common use case I have one step at a time and show Crosspay at work.</p><p>As a person who travels frequently, one very common need I have is to pay for my travel bookings. Some newer travel sites will accept payment in Bitcoin, Ethereum, or other cryptocurrencies, but I&#8217;m aware of none who accept Zcash. (Obviously, if you know of one, please contact me to tell me about it!) This is where Zodl&#8217;s Crosspay feature shines and where Travala comes in clutch.</p><p>It works like you&#8217;d expect any other flight and hotel booking platform to work, but you can pay directly in cryptocurrency. They also have a loyalty program, so you can earn extra rewards, and help me do the same if you sign up via my <a href="https://www.travala.com/ref/OBEINW">referral link</a>.</p><p><a href="https://www.travala.com/payment-options">Travala&#8217;s payment options</a> include direct cryptocurrency transfer with dozens upon dozens of different supported cryptocurrencies, including the popular ones. While Travala doesn&#8217;t support Zcash directly, Zodl lets you swap your ZEC out for a number of cryptocurrencies that Travala does support at the same time as you send a payment.</p><p>To pay for a hotel booking or flight ticket with cryptocurrency:</p><ol><li><p>Start at Travala and find the hotel or flight you want to book just like any other travel website.</p></li><li><p>Once on its checkout screen, choose a cryptocurrency to pay in and begin the checkout process. Travala will present a checkout screen to you that looks something like this:<br></p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-wHc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-wHc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 424w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 848w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 1272w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-wHc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png" width="416" height="353.3150684931507" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:992,&quot;width&quot;:1168,&quot;resizeWidth&quot;:416,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-wHc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 424w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 848w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 1272w, https://substackcdn.com/image/fetch/$s_!-wHc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fffdca8f8-124e-4ad5-9c8e-9f0beaa3e616_1168x992.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol><li><p>When you&#8217;re ready to pay, proceed to the payment screen itself, which will give you a QR code or address to copy.</p></li><li><p>Copy the address presented to you.</p></li><li><p>Open your Zodl wallet app.</p></li><li><p>Click on Zodl&#8217;s &#8220;Pay&#8221; button to open the Crosspay screen.</p></li><li><p>Next, in the &#8220;Send to&#8221; section, enter the payee&#8217;s (Travala&#8217;s) information:</p></li><li><p>You&#8217;ll see a cryptocurrency selection drop-down menu for choosing the currency the payee wants to receive from us. Find Bitcoin (BTC) from the list of options; it will have a small Bitcoin logo on top of a larger, second, identical Bitcoin logo. This means we&#8217;re using our shielded ZEC, but paying in Bitcoin.</p></li><li><p>In the Address field, paste the Bitcoin payment address you copied from Travala earlier.</p></li><li><p>Now choose how much to pay by entering an amount in Bitcoin units.</p></li><li><p>Click &#8220;Review&#8221; at the bottom of the Zodl Crosspay screen. Zodl&#8217;s &#8220;Pay Now&#8221; drawer will open.</p></li><li><p>Review your payment and ensure that the amount will cover your order.</p></li><li><p>Click &#8220;Confirm&#8221; when you are ready to make your payment and send the transaction.</p></li></ol><p>In my experience, it takes about 5 to 10 minutes for the transaction to complete, so make sure you also have at least that much time on the checkout payment timer before you confirm your transaction, or you may not be able to get your account credited before your purchase order expires. If that does happen, you&#8217;ll have to speak with a support representative about crediting your account.</p><p>There&#8217;s a lot of sparkle-emoji technology sparkle-emoji happening here, but what&#8217;s extra cool about this is that at no point do you ever need a Bitcoin wallet! Moreover, no remnant of digital cruft exists anywhere in the various blockchains that can be meaningfully linked back to you.</p><p>Practically, this enables you to safely keep your cryptocurrency assets in the Zcash shielded pool, where they stay completely private, and still be able to pay any vendor who accepts any supported cryptocurrency equally privately. If you do this, no one can know how rich (or poor) you really are. In contrast, if you keep your holdings in a transparent ledger system like Bitcoin, the whole world can tally your real net worth and track your transactions without ever asking you questions.</p><p>This is not a hypothetical example. This is in fact how I pay for the VoIP phone number I use, and other services. </p><h3>Piggyback on the gift card economy</h3><p>Among the most common ways to spend your hard-earned cryptocurrency today is by piggybacking on the massive gift card economy for making various kinds of retail purchases. Since gift cards and store credit systems are already a certain kind of alternative digital local currency, cryptocurrency is a natural fit. As a result, an entire <em>crypto gift card marketplace</em> industry has emerged to support this particular kind of off-ramp. While different crypto-to-gift-card vendors support different currencies, Zodl&#8217;s built-in decentralized exchange solves that problem, so the main considerations for those of us who want to use this method to spend our cryptocurrency funds are:</p><ul><li><p>finding a crypto to gift card exchange provider that partners with a brand we want to buy from, and</p></li><li><p>ensuring that the exchange provider&#8217;s terms of use and their &#8220;Know Your Customer&#8221; rules doesn&#8217;t risk our privacy more than we are comfortable with.</p></li></ul><p>If you&#8217;re just starting from scratch, here are my favorite vendors &#8212; two of them conveniently, are built into the same self-custody wallets I&#8217;ve already recommended.</p><h3>Pay for stuff via Flexa in Zodl</h3><p>The gift card vendor directly integrated with the Zcash wallet app I use is called<a href="https://flexa.co/"> Flexa</a>, which is basically a multi-store gift card manager mini-app inside the Zodl wallet app itself. If you&#8217;ve installed the mainstream version of Zodl (i.e., from the Google Play Store, the Apple App Store, or the Aurora store) you&#8217;ll have the option to spend your shielded ZEC at partnered Flexa brands from within your Zodl wallet. If you downloaded your Zodl wallet from the<a href="https://f-droid.org/en/packages/co.electriccoin.zcash.foss/"> F-Droid strictly free software app repository</a>, Flexa will not work in your app.</p><p>As of this writing, some Flexa partners include<a href="https://www.ulta.com/"> Ulta Beauty</a> and<a href="https://www.kiehls.com/"> Kiehl&#8217;s</a> (cosmetic and skincare product brands), <a href="https://www.sheetz.com/">Sheetz</a> (a convenience store and gas station chain), and<a href="https://www.chipotle.com/"> Chipotle</a>.</p><p>First, set up Zodl to work with Flexa as privately as possible by<a href="https://electriccoin.co/blog/zashi-2-1-enhanced-privacy-with-tor-beta/"> enabling Zodl&#8217;s built-in Tor network privacy features</a>. Once that&#8217;s set up <strong>do this to use Flexa from within Zodl:</strong></p><ol><li><p>Open your Zodl wallet app. Make sure you have some ZEC in it, enough to cover the cost of the thing you&#8217;re about to buy in the local fiat currency where you&#8217;re buying it (such as in US Dollars if you&#8217;re in the United States).</p></li><li><p>Tap the &#8220;More&#8230;&#8221; button in the Zodl main screen.</p></li><li><p>Tap the &#8220;Pay with Flexa&#8221; item in the resulting list.</p></li><li><p>If this is the first time you&#8217;ve used Flexa, you&#8217;ll be asked to complete a brief registration process where you are asked for your name and email address. At this point, there are a few things you should know:</p><ol><li><p>While Flexa will have this information, none of it will end up on the Zcash blockchain network nor with the ultimate merchant from which you are buying something.</p></li><li><p>Flexa doesn't require government ID verification, and as a result caps spending at $750 per week.</p></li><li><p>If you want to use an alias email address, there are many providers you can use (like Firefox Relay, SimpleLogin, and DuckDuckGo).</p></li></ol></li><li><p>Once you have a Flexa account, you&#8217;ll be given a &#8220;Flexa QR code&#8221; that is basically just a barcode that participating brands can scan as a native payment. It&#8217;s that easy. But you&#8217;ll also see a &#8220;More instant payments&#8221; box at the bottom of your screen. These are &#8220;legacy Flexa brands,&#8221; which are the stores at which you need to tell the cashier that you want to pay using a &#8220;gift card&#8221; or &#8220;store credit.&#8221; To use these:</p><ol><li><p>Tap the logo icon for the brand you want to pay for. This will let you create a one-time use virtual gift card and load it up using your Zcash funds.</p></li><li><p>Enter the amount you owe at the register. If the cashier tells you that your total is $20 USD, enter that amount under the brand&#8217;s logo.</p></li><li><p>Press or tap the <em>Confirm</em> button. A new brand-specific virtual gift card QR code will appear.</p></li><li><p>Tell the cashier you have your gift card ready. They will ask you to scan it. Do so, and you&#8217;ll have paid!</p></li></ol></li></ol><p>I have successfully used Flexa this way and, while it&#8217;s currently limited to supported business partners, it is by far the easiest way to spend my ZEC on real, physical stuff.</p><p>If you need something from a store that doesn&#8217;t have a Flexa partnership, you can still maybe find it from another cryptocurrency to gift card vendor.</p><h3>Other cryptocurrency to gift card off-ramps</h3><p>The cryptocurrency to gift card vendor I know most about is<a href="https://www.bitrefill.com/invite/857x8154"> Bitrefill (referral link)</a>, because they&#8217;re one of the largest. Another popular one I use is<a href="https://piggy.cards/?tracking=6KRM"> Piggy.Cards (referral link)</a>. Another is DashPay.</p><p>They sell gift cards to a plethora of well-known brands by accepting cryptocurrency as payment for them. You can buy these even more privately by browsing the sites via<a href="https://torproject.org/"> Tor Browser</a>. If or when you hit purchase limits, you can create a &#8220;basic account&#8221; with Bitrefill to get<a href="https://help.bitrefill.com/hc/en-us/articles/360019385360-Is-there-a-purchasing-top-up-limit"> decently large spending limits ($10,000 USD per month)</a>.</p><p>These sites allow you to spend your crypto at hundreds of places, like Amazon, AirBnB, Uber, DoorDash, Apple, Walmart, hotels, airlines&#8230; the list goes on. </p><h3>Use crypto-native service providers</h3><p>Instead of gift cards, which is really just a roundabout way to help fiat economy vendors accept cryptocurrency without actually accepting cryptocurrency payments, there are also a class of business-to-consumer (B2C) middlemen that will accept payments in cryptocurrency and either interface with vendors on your behalf or provide services paid for in crypto themselves.</p><h3>Booking hotel stays and air travel with cryptocurrency</h3><p>We&#8217;ve already looked at one such off-ramp: Travala! But it deserves a mention in this section as a reminder, as well.</p><h3>Buying VoIP and Cell service with cryptocurrency</h3><p>There are some VoIP providers that will accept payment directly in crypto. Here&#8217;s a short list:</p><ul><li><p><a href="https://jmp.chat">JMP.chat</a> - This VoIP provider is really a hosted Jabber/XMPP (instant messaging) service with a paid VoIP gateway. You give them Bitcoin, they give you a phone number. You can even sign up and use the service over Tor for more privacy. JMP.chat deserves its own exposition, but for now, just know it&#8217;s an option if you are comfortable getting through an unusual sign-up process.</p></li><li><p><a href="https://SMSpool.net">SMSpool.net</a> - You can rent cell numbers and pay with crypto.</p></li></ul><p>(Please contact me to let me know if you found any more quality VoIP and cell providers that accept crypto payments!)</p><h3>Buying VPN services with cryptocurrency</h3><p>Another common service many of us have need for is a reliable VPN. I have a lot of thoughts on the topic of private network technologies, which can mostly be summed up by preference for using<a href="https://torproject.org/"> Tor</a> over a VPN but with that said, if you&#8217;re going to use a VPN, you should probably stick to a reputable one that you can pay for in cryptocurrency. Here are my favorite options for that:</p><ul><li><p><a href="https://mullvad.net/">MullvadVPN</a> - Uses WireGuard and OpenVPN as its VPN protocols. Mullvad also accepts payments in Bitcoin.</p></li><li><p><a href="https://nym.com/">NymVPN</a> - Nym is a decentralized VPN and mixnet that requires a subscription to use, and you can<a href="https://support.nym.com/hc/articles/38626320242833-Paying-for-NymVPN-with-ZEC-Zcash"> pay for Nym with shielded Zcash</a>.</p></li><li><p><a href="https://protonvpn.com/support/vpn-bitcoin-payments">ProtonVPN</a> - Many providers know this company for their ProtonMail service, but Proton also accepts Bitcoin for their VPN product, which supports WireGuard, OpenVPN, and a Stealth protocol (WireGuard over TLS) for bypassing VPN blockers.</p></li></ul><h3>Fund a traditional payment card using cryptocurrency</h3><p>A less private option to consider is a refillable, cryptocurrency-backed, payment card with a major traditional card issuer.</p><p>Since these are the equivalent of physical credit cards, you will have to upload your legal identity documents during the application process. Still, its convenience may be useful for those who simply need an off-ramp to spend their more private cryptocurrency earnings.</p><p>The biggest advantage of these cards is:</p><ul><li><p>they can be used for anything a normal credit card can be used for, like rent and utilities payments, which are situations in which even prepaid Visa gift cards may not always work.</p></li><li><p>they don&#8217;t require a bank account to pay off, making this option especially attractive for those who have suffered banking discrimination and are having trouble using or opening a traditional checking or savings account.</p></li></ul><h3></h3><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Apply for a Payy Card, a crypto-backed Visa payment card</h3><p><a href="https://payy.link/invite/CMS4JU">Payy (referral link)</a> is a self-custodial, privacy-centered cryptocurrency wallet <em>and</em> payment gateway able to interface with Visa&#8217;s payment processing network. This makes Payy two things at the same time:</p><ul><li><p>a digital payment app, much like a cryptocurrency version of CashApp, Venmo, or PayPal, which makes it easy to do the kinds of things you might currently be using those apps for in your civilian life (pay back friends for dinner, for example).</p></li><li><p>a Visa payment card paid for with cryptocurrency, but usable anywhere traditional Visa credit cards are accepted.</p></li></ul><p>What&#8217;s appealing about Payy is that you can fund your Payy Card&#8217;s balance using either fiat currencies, such as from traditional bank accounts, or cryptocurrency sources, such as other crypto wallets or exchanges, by converting whatever cryptocurrency you have into USDC on Polygon, for example. This makes it feasible for de-banked individuals to buy things the way most of the banked population does, without needing to get a bank account, which is no small feat.</p><p>It&#8217;s important to remember that payments you make using a Payy Card <em>are</em> associated with your legal identity. From that perspective, it&#8217;s not more private than a regular credit card. However, it is a lot more private than just using Bitcoin, Ethereum, or other transparent-ledger cryptocurrency systems directly, because your payments aren&#8217;t published publicly for the entire Internet to see.</p><p>Payy itself communicates what data is public and what data stays private when you sign up for a Payy Card. </p><p>I would not recommend using your Payy Card or the Payy network for any need you have that requires more privacy; do your best to stick with Zcash and Monero for that. However, if your friends are unwilling to adopt the stronger privacy protections offered by Zcash in Zodl, are scared of the volatility of actual privacy coins, or have otherwise succumbed to the propaganda that stablecoins are somehow superior (even though we know they&#8217;re not), Payy can be a convincing half-step to at least get them using cryptocurrency with <em>you</em>.</p><p>Your Payy Card can make you look more like a &#8220;normal&#8221; civilian in your personal life. And you can still keep your wealth private by having it in and moving it through the Zcash shielded pool (via Zodl) at every opportunity.</p><h3>Opolis: a crypto-native independent employment platform</h3><p><em><a href="https://partner.opolis.co/VioletRollergirl">Opolis</a></em><a href="https://partner.opolis.co/VioletRollergirl"> (referral link)</a> is a novel digital employment cooperative you may be able to join (if you meet minimum income or eligibility requirements based on your needs, see below) that can offer a way to legitimize your income, including any earnings from cryptocurrency transactions. With Opolis, rather than work &#8220;under the table,&#8221; you set things up like a traditional business, funnel your earnings through that business, and then pay yourself back as a salaried employee.</p><p>In plain language, the whole setup works like this.</p><ol><li><p><a href="https://opolis.co/explore/entity/">Register a legal business entity, such as an S-Corp</a> that offers whatever services you provide. </p></li><li><p>You then hire yourself as an employee of that business, so you can<a href="https://opolis.co/explore/payroll/"> pay yourself a salary out of the business&#8217;s future revenue</a>.</p></li><li><p>Your business entity then partners (joins) with the Opolis business cooperative, which<a href="https://opolis.co/explore/benefits/"> collectively negotiates employee benefits like health insurance plans</a>.</p></li><li><p>Finally, your business in turn offers those employment benefits to you, the &#8220;human resource&#8221; (employee).</p></li></ol><p>Yes, this tactic introduces complexity to your work. It means you have to go through the process of registering a business, like picking a name and<a href="https://opolis.co/entity/the-best-states-for-llc-formation-where-to-plant-your-roots/"> choosing which State is best for you to register your business in</a>. But the rubber meets the road when on-ramping the same as it did before, if not even better.</p><ul><li><p><a href="http://localhost:4000/resources/for-providers/using-cryptocurrency/on-ramping/#getting-paid-directly-in-crypto">Getting paid directly in crypto</a> is no different, just show a client your QR code from a cryptocurrency wallet.</p></li><li><p>You can use your registered business as a further shield to protect your individual privacy for accepting fiat payments like deposits when using your corporate bank account linked to fiat payment apps, notably<a href="https://www.zelle.com/"> Zelle</a>. Just make sure you&#8217;ve registered your business in a privacy-friendly state like Delaware, Nevada, or Wyoming, and via a third-party registered agent so that you don&#8217;t have to list your legal identity as a publicly disclosed member of the corporation.</p></li></ul><p>Now that you&#8217;re earning revenue on behalf of your business, you&#8217;ll need to record those funds in some accounting software. (I prefer to use<a href="https://www.gnucash.org/"> GnuCash</a> for this, but I&#8217;ve also heard good things about<a href="https://rotki.com/"> Rotki</a>.) This way, you can treat it as your business&#8217;s <em>taxable income</em> for reporting when your business pays member dues in the cryptocurrencies Opolis supports.</p><p>A few other points to know about this off-ramp:</p><ul><li><p>You don&#8217;t need to be earning <em>all</em> of your income from one aspect of your work to join. What matters is how much you&#8217;re making in total so that you (as a business) can afford to run payroll while covering operating expenses, employee compensation (salary and benefits), and paying taxes or other applicable fees.</p></li><li><p>Opolis can currently, subject to change, process payments in: DAI, ETH, BTC, USDC and USDT.</p></li></ul><p>I&#8217;d love to hear about your experience if you try something like this so please don&#8217;t hesitate to reach out to me if you do!</p><p>Hopefully this guide gives you an idea of how you can use crypto to enhance your financial privacy. It may not be accepted natively everywhere yet, but that doesn&#8217;t mean that you can&#8217;t use it day-to-day anyway. In coming months we&#8217;ll talk about using wallets, and on-boarding into crypto as well.</p><p><em>Yours In Privacy,<br>Violet</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Is the Government Running a Dragnet on VPN Users?]]></title><description><![CDATA[This senator is read into classified surveillance programs. When he says "look here," we should look.]]></description><link>https://nbtv.substack.com/p/is-the-government-running-a-dragnet</link><guid isPermaLink="false">https://nbtv.substack.com/p/is-the-government-running-a-dragnet</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 07 Apr 2026 11:03:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7RBi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In March 2013, something interesting happened that almost nobody noticed at the time, but became enormous news three months later.</p><p>Senator Ron Wyden was questioning James Clapper, the Director of National Intelligence, in an open hearing of the Senate Intelligence Committee. Wyden asked him a simple question: &#8220;Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?&#8221;</p><p>To understand why this question mattered, you have to understand what the NSA is supposed to be. The National Security Agency is a <em>foreign</em> intelligence agency. Its job is to spy on <em>foreign</em> governments, <em>foreign</em> militaries, and <em>foreign</em> nationals abroad. This kind of work would be flatly unconstitutional if pointed inward. Domestic investigations are supposed to belong to the FBI, which has to play by Fourth Amendment rules and requires warrants, probable cause, and judicial oversight.</p><p>The wall between the NSA and FBI exists for a reason: we have built all kinds of powerful tools for foreign surveillance, like bulk collection, warrantless interception, and dragnet monitoring. But the Constitution was written to expressly prohibit the government from turning this machinery of war and broad surveillance powers against its own citizens.</p><p>So when Wyden asked whether the NSA was collecting data on millions of Americans, he was asking whether the wall between foreign and domestic surveillance, one of the foundational lines in how the American security state is allowed to operate, had quietly been taken down.</p><p>Clapper said, &#8220;No, sir.&#8221;</p><p>Wyden pressed. Clapper added: &#8220;Not wittingly.&#8221;</p><p>Three months later, Edward Snowden&#8217;s leaks revealed that the NSA was, in fact, collecting phone metadata on essentially every call placed in the United States. Clapper had lied to Congress under oath. He later apologized for what he called his &#8220;clearly erroneous&#8221; testimony, claiming he&#8217;d given the &#8220;least untruthful&#8221; answer he could think of. He was never charged; the statute of limitations expired in 2018.</p><p>But let&#8217;s focus on the most relevant part of this story: Why did Wyden ask the question in the first place?</p><h2>Wyden already knew the answer</h2><p>Wyden sits on the Senate Intelligence Committee. It&#8217;s one of two committees (the other is in the House) whose members get read in to classified intelligence programs. It&#8217;s their job to make sure the intelligence community is operating above board. These committees are small, and the rest of Congress and the public stay in the dark, on a need-to-know basis.</p><p>So when Wyden asked Clapper whether the NSA was collecting data on millions of Americans, Wyden already knew the answer was yes. He&#8217;d been briefed. And when Clapper said &#8220;no,&#8221; Wyden knew, in real time, that the Director of National Intelligence was lying to Congress.</p><p>But Wyden couldn&#8217;t just stand up and tell the country what he knew. He was bound by classification rules. Asking the question in open session, with the answer pre-submitted to Clapper&#8217;s office a day in advance, was one of the only tools he had to let Congress know that he believed the intelligence community was running an illegal program.</p><p>He turned out to be right. In 2015, the Second Circuit ruled in <em>ACLU v. Clapper</em> that the NSA&#8217;s bulk phone records program exceeded what Congress had authorized under the Patriot Act. In 2020, the Ninth Circuit went further, holding that the program had violated federal surveillance law and was likely unconstitutional as well.</p><p>In fact, the 2015 court was pointed about why this mattered. </p><p>Congress, the judges wrote, &#8220;cannot reasonably be said to have ratified a program of which many members of Congress &#8212; and all members of the public &#8212; were not aware.&#8221; </p><p>Only a small circle of lawmakers on the intelligence committees knew. The rest of Congress, voting to reauthorize the Patriot Act, did not. Neither did the public. You cannot meaningfully consent to a program whose existence has been deliberately hidden from you.</p><p>But back to Wyden&#8217;s question: It&#8217;s a pattern worth remembering.</p><p>When Senator Wyden goes out of his way to ask a pointed question about a surveillance program, it&#8217;s usually because he already knows something he can&#8217;t say out loud.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7RBi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7RBi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 424w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 848w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 1272w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7RBi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png" width="446" height="185.93543956043956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:607,&quot;width&quot;:1456,&quot;resizeWidth&quot;:446,&quot;bytes&quot;:216441,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/193432067?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!7RBi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 424w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 848w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 1272w, https://substackcdn.com/image/fetch/$s_!7RBi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcb8ae1f-e6ab-4ed9-9fd5-5493fdfd73c9_1858x774.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>Wyden: &#8220;Pay Attention To VPNs&#8221;</h2><p>Which brings us to <a href="https://www.wyden.senate.gov/news/press-releases/wyden-padilla-markey-warren-jacobs-and-jayapal-ask-dni-gabbard-to-warn-americans-that-using-vpns-may-cause-them-to-forfeit-their-rights-against-warrantless-surveillance">last week</a>.</p><p>On March 26, 2026, Wyden (along with a handful of other Senators) sent a letter to the current Director of National Intelligence, Tulsi Gabbard. The letter asks Gabbard to publicly warn Americans that using a VPN may cause them to forfeit their Fourth Amendment rights against warrantless surveillance.</p><p>The mechanism is explained in Wyden&#8217;s press release: Under Section 702 of FISA and Executive Order 12333, when the U.S. government can&#8217;t tell what country a person is in, <em>it&#8217;s allowed to assume that person is a foreigner</em>. Foreigners outside the United States have no Fourth Amendment rights, and a VPN hides where you are.</p><p>So while these tools are used as a privacy protection, the intelligence community might be quietly stripping you of constitutional protections against your own government.</p><p>We don&#8217;t know exactly what Wyden has been briefed on. But the pattern from 2013 is clear: when he asks a pointed question in public, it&#8217;s usually because of something he can&#8217;t say out loud.</p><h2>And then there&#8217;s the third-party doctrine</h2><p>This Section 702 loophole is bad enough on its own. But there&#8217;s a second legal mechanism worth raising.</p><p>Under the third-party doctrine, U.S. law enforcement currently takes the position that it doesn&#8217;t need a warrant to obtain information you&#8217;ve voluntarily handed to a third party, such as your bank, your phone company, and your ISP. The doctrine traces back to the Katz &#8220;reasonable expectation of privacy&#8221; test: the Fourth Amendment kicks in only where you have a reasonable expectation of privacy, and the government&#8217;s argument is that once you&#8217;ve given data to someone else, that expectation disappears.</p><p>Now apply that to a VPN. A VPN routes 100% of your internet traffic through a third party. Under the government&#8217;s theory, that traffic is fair game without a warrant.</p><p>Which produces a genuinely absurd result: the legal system says you have no reasonable expectation of privacy in data you handed to a service <em>whose entire purpose is privacy.</em> The tool you bought specifically to assert a privacy interest is recharacterized as the act of waiving it.</p><p>In Carpenter v. United States (2018), the Supreme Court carved an exception into the third-party doctrine, holding that the government <em>does</em> need a warrant to obtain historical cell-site location data, on the theory that some kinds of third-party data are too revealing to fall under the old rule. VPN traffic seems like an even stronger candidate. It might be time for someone who uses a VPN to sue the government.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What Now?</h2><p>So should we, or should we not, be using a VPN? The honest answer is that there&#8217;s no clean solution, because the problem isn&#8217;t really VPNs. The problem is that the entire modern internet is built on handing your data to third parties, such as your ISP, your DNS resolver, your email provider, the ad networks embedded in every website you visit, and so on. And the third-party doctrine turns every one of those interactions into a warrantless surveillance opportunity. A VPN just shifts which third party holds your traffic, it doesn&#8217;t change the underlying legal theory that says the government can help itself to it without a warrant.</p><p>That said, I still use a VPN, and I&#8217;m going to keep using one. I don&#8217;t want my IP address handed to every website I interact with, and the protection a VPN offers against that is real, even if it&#8217;s narrower than the marketing suggests. But it&#8217;s really important to be careful about which one. As I covered in a <a href="https://youtu.be/8MHBMdTBlok">previous video</a>, an overwhelming number of VPN providers are just data-collection shells, and some are outright malware. &#8220;Use a VPN&#8221; isn&#8217;t the advice. &#8220;Use a VPN you&#8217;ve actually vetted&#8221; is closer.</p><p>Longer term, it&#8217;s time to explore the tools that can&#8217;t aggregate your data in the first place. <strong>I&#8217;ve been digging into decentralized VPNs and mixnets lately, and if you&#8217;ve used any, I&#8217;d love to hear about your experience.</strong></p><p>But the deeper fix is actually legal: The third-party doctrine is a relic of a world where &#8220;data you gave to someone else&#8221; meant a very narrow scope of information. It does not belong in a digital age that turns everything we do into data held by someone else.</p><p>As long as the third-party doctrine stands, we lose one of the most important protections we have against the government&#8217;s ability to surveil its own citizens: the warrant requirement. It&#8217;s a loophole the size of the entire internet. Closing that loophole is how we get the Fourth Amendment back.</p><p><em>Yours In Privacy,<br>Naomi</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yeBp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" width="310" height="221.42857142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:2100,&quot;resizeWidth&quot;:310,&quot;bytes&quot;:6347352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c6065ec-cd73-4583-90cd-2bfc68be5e03_2100x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Shop.NBTV.media</figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Warrants: One Of The Best Privacy Protections]]></title><description><![CDATA[These general searches used to be illegal. Now they&#8217;re routine.]]></description><link>https://nbtv.substack.com/p/are-warrants-optional-now</link><guid isPermaLink="false">https://nbtv.substack.com/p/are-warrants-optional-now</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Wed, 01 Apr 2026 04:38:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!P-Dd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s that time of the year again. When we vote to extend the warrantless mass surveillance of FISA Section 702, and collectively pretend that this temporary power is, again, only going to be temporary.</p><p>So it&#8217;s a great time to discuss the importance of warrants.</p><p>I understand the argument for eliminating warrants &#8212; when a threat seems so big, you don&#8217;t want any friction like warrants slowing you down.</p><p>But what about when there are even bigger threats that no one talks about, and warrants are one of the most critical safeguards that protects us against these threats?</p><p>Most people have never spent even five seconds thinking about warrants, and this is a big mistake, because if we allow the dodging of warrants to become normalized, as it has been under Section 702, we&#8217;re in big trouble.</p><p>In this article, we&#8217;ll explore what warrants are, why the founders cared so much about them, and why they matter more now than ever, in an age where governments are buying all your data from brokers, contracting with private companies to track your movements, and bulk collecting all your financial records.</p><p>It&#8217;s a new digital era, and the protections warrants were meant to provide have been all but eradicated. So stick with me. Because once you understand the machinery inside a warrant, you will never dismiss the importance of them again.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P-Dd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P-Dd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P-Dd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png" width="276" height="155.25" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/edf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:276,&quot;bytes&quot;:2746173,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!P-Dd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!P-Dd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedf6eeef-3861-4f9d-9af1-8229de3f3d10_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong><a href="https://www.youtube.com/watch?v=hPALUKCaARs">These Searches Used To Be Illegal...</a></strong></figcaption></figure></div><h3><strong>What Is A Warrant?</strong></h3><p>Let&#8217;s start by understanding what a warrant actually is.</p><p>They sound legal. Procedural. People think warrants are just about paperwork. But they&#8217;re not.</p><p>Warrants are one of the most important checks on power ever invented. And there&#8217;s a certain part of the warrant that almost no one ever talks about, even though it&#8217;s the part that matters most. We&#8217;ll get to that.</p><p>For now, understand that warrants have existed in legal systems around the world for a long time. They&#8217;re basically a permission slip for the government to search your stuff, seize property, or arrest someone. They vary enormously from country to country in how broad they are. In America, for example, they&#8217;re meant to be particularly limited, and these strict limits were actually explicitly written into the Constitution itself.</p><p>This is because, at the time that the Constitution was written, Britain and colonial America had been badly abusing warrants. Officials were using two types of broad search powers in the early colonial days called General Warrants and Writs of Assistance, which enabled officers to rummage through a person&#8217;s home and things with very little constraint.</p><p>As Rob Frommer, senior attorney and co-director of the 4th Amendment Project at the Institute for Justice, explained to me,</p><p>&#8220;There were these pieces of paper that officials would basically write to themselves, and they would just carry that in their pocket. That would give them power to just enter people&#8217;s homes, enter people&#8217;s property, invade them whenever they wanted. It let those petty officers be a law unto themselves where they could break in anywhere they wanted to at any time, without any real justification.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ikjZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ikjZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 424w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 848w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ikjZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png" width="294" height="509.8265895953757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:865,&quot;resizeWidth&quot;:294,&quot;bytes&quot;:1436399,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ikjZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 424w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 848w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!ikjZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b470762-36e5-46b5-a4b3-f3bb6003838f_865x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This broad search power became a powerful tool for harassment and abuse. In England, for example, these were used to suppress dissent. People who would criticize the crown and officials in the British government were targeted. Officials would use their general warrant powers to break into homes, to try to find seditious materials. This is one of the big reasons America had a revolution.</p><p>So when the founders were writing America&#8217;s Constitution, to stop this kind of abuse from happening again, they decided that warrants had to be tightly limited in scope. So they drafted the Fourth Amendment:<br><br>&#8220;The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&#8221;</p><p>This was added to the Constitution in the Bill of Rights to protect against general warrants. The lesson was clear: the power to conduct broad searches of the populations leads to abuse.</p><p><strong>Warrant Requirements Under The Fourth Amendment:</strong></p><ul><li><p><strong>A specific place</strong></p></li><li><p><strong>Specific people or things</strong></p></li><li><p><strong>Probable cause</strong></p></li><li><p><strong>Sworn facts</strong></p></li><li><p><strong>Judicial approval</strong></p></li></ul><p>That narrowness mattered, because it meant that those in power could no longer go on fishing expeditions, searching your things until they found something they could use against you.</p><p>It also created accountability, because it left a record. Abuse is much harder to challenge when there is no paper trail and no one ever had to justify themselves in the first place.</p><h3><strong>The Most Under-Appreciated Part Of The Warrant</strong></h3><p>Let&#8217;s zoom in on one of the most overlooked parts of the warrant requirement, and one of the most important:</p><p>An investigator has to make their case in front of a judge, and prove that they had probable cause before a search is allowed to happen.</p><p>The reason the framers required the involvement of a second branch of government, the judiciary, is because law enforcement has been trusted with the immense and unique power to use force against citizens, so checks on this power are necessary. You want an independent, neutral branch looking at search, seizure, and arrest decisions before they happen, to decide whether there are enough facts to actually justify it.</p><p>We&#8217;re so used to treating law enforcement as the highest authority for keeping law and order that we forget that the Constitution treated it as just one power center among others, and one that needed limits. Those who wrote the Constitution understood that law enforcement has its own mission, its own incentives, its own momentum. It is trying to solve cases and find culprits.</p><p>This doesn&#8217;t make investigators evil, but it does mean they are not neutral.</p><p>Once you realize this, the warrant requirement no longer seems like bureaucratic paperwork. It becomes clear that it&#8217;s a very deliberate safeguard against the natural bias of the investigative process.</p><p>In fact, in 1948, The Supreme Court put it bluntly when they <a href="https://constitution.congress.gov/browse/essay/amdt4-5-2/ALDE_00000786/">said</a>:</p><p><em>&#8220;Its protection consists in requiring that those inferences be drawn by a <strong>neutral and detached magistrate</strong> instead of being judged by the <strong>officer engaged in the often competitive enterprise of ferreting out crime</strong>.&#8221;</em></p><p><em>- Johnson v. United States, 333 U.S. 10 (1948)</em></p><p>As Frommer articulated:</p><p>&#8220;They&#8217;re really eager, because if they make a big bust, that&#8217;s great for their career. So they&#8217;re gung-ho. And we want somebody in the middle, saying, &#8216;Wait a second, show me that you actually have a good reason to do this and not just because you&#8217;re seeing promotions and awards in your eyes.&#8221;</p><p>The people who wrote the Constitution didn&#8217;t assume that the same people trying to solve the case should also be trusted to decide, on their own, how far they should get to pry into someone&#8217;s life. They assumed the opposite -- that the drive to solve a case could itself become dangerous if no outside check stood in the way.</p><p>When executive officials get to make these decisions with no independent checks, abuses mount. This is why a neutral magistrate authorizing searches in advance is essential. And when this safeguard is ignored, abuses tend to happen more and more.</p><p>This is the forgotten danger that not enough people are talking about in the current Section 702 debate.</p><h3><strong>Where did these checks on power go?</strong></h3><p>That is why the executive and judicial branches have different jobs.</p><p>The executive branch is in the business of investigating crime. The judicial branch is meant to stand back from the momentum of investigation and make sure the government does not get to decide the limits of its own power. That separation is intentional.</p><p>The judiciary is supposed to be there as the bulwark of our rights. But today, the judiciary is conspicuously absent from signing off on a huge number of searches that are going on. Investigators are buying giant data sets from brokers, and searching this data at will. They have unfettered access to troves of personal data about our lives, with no magistrate involved. And the data they have access to gets bigger and bigger over time.</p><h3><strong>Why Is A Search Dangerous?</strong></h3><p>Let&#8217;s answer the obvious question: So what?</p><p>What is so dangerous about these searches that we built constitutional limits around them in the first place?</p><p>The real issue is not the search itself. It is the power that comes from this kind of access.</p><p>Information is power, and the Fourth Amendment was designed to limit the government&#8217;s access to information about you -- to limit the amount of power it had over you, and to make sure that power did not turn into abuse.</p><p>If a government can look through your life in enough detail, it can always find something that can be made to look suspicious, something that can be distorted, or something it can use as leverage.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RfxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RfxQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RfxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png" width="412" height="230.0521978021978" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:412,&quot;bytes&quot;:5323127,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RfxQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 424w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 848w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!RfxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3fc9c34-a5c8-485b-81a4-3f7317c62ad3_2752x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Once the government gets enough access to the fragments of your life, those fragments become easy to rearrange into a narrative. You can easily cobble together a story that makes someone look dangerous, suspicious, or worthy of investigation.</p><p>You were near the wrong place.<br>You searched for the wrong thing.<br>You texted the wrong joke.<br>You donated to the wrong cause.<br>Maybe you used encryption.<br>Turned your phone off.<br>Showed up in someone&#8217;s contact list.</p><p>None of that has to mean guilt. But modern life produces so much data that innocence alone can <a href="https://youtu.be/hPALUKCaARs?si=3eSGS80DO3jKWbVL&amp;t=628">no longer protect you.</a></p><p>If officials decide in advance whom they want to target, and they have access to a giant trove of someone&#8217;s life, they can often easily find scraps of evidence to fit the narrative.</p><p>Again, this does not require evil motives. It can happen simply because investigators are doing what investigators do: trying to connect dots. But once someone is looking for a culprit, the temptation is to treat scattered clues as if they all point in one direction. Out-of-context fragments of your life start to look suspicious because they are being viewed through the lens of suspicion by someone trained to do just that.</p><p>And now we are increasingly outsourcing that process to AI, again with no magistrate involved. When we let masses of data generate their own &#8220;story,&#8221; <a href="https://youtu.be/hPALUKCaARs?si=-cD01ZpyW5i4xSfI&amp;t=696">innocent people</a> get swept up in the dragnet. Data is not benign. It can always be sorted, weighted, and interpreted in ways that make ordinary life look incriminating.</p><p>Frommer explained how the investigative process has its own bias:</p><p>&#8220;We often see officers get an idea in their head, &#8220;This is what happened.&#8221; And then instead of trying to do a neutral investigation in order to determine what objectively happened, they start backfilling, and contorting facts to fit their preexisting narrative. That&#8217;s exactly why you want to have that neutral judge in the middle, for an independent check.&#8221;</p><p>So far, we&#8217;ve been talking about how this power can become dangerous even in the hands of people who think they&#8217;re doing the right thing. But what about people with worse motives? Once the machinery exists, it doesn&#8217;t stay confined to good-faith mistakes.</p><p>And the elephant in the room is that the more data someone has access to, the more power they have. Feed these systems enough data, and they gain a greater ability to sort people, rank people, and decide who gets more scrutiny.</p><p>This is how discretionary targeting begins. It can identify whistleblowers. It can chill journalists. It can map protest networks before they become effective. It can scare ordinary people away from joining, donating, speaking, meeting, or pushing back against the people in charge.</p><p>Once this infrastructure exists, using this power is a huge temptation, even for the most well-meaning people. You&#8217;re basically hoping that no one ever gets into office who might abuse this power. And if they do, they now have a ready-made system for intimidating dissidents, finding leverage over political opponents, and entrenching their own power.</p><p>Jim Harper, a constitutional law scholar at AEI who specializes in the Fourth Amendment and how it applies in the digital age, explained that the reason we have these checks is to protect our democratic institutions. If we fail to do this:</p><p>&#8220;Having a government where the wheels come off of and our protections fall away -- we&#8217;re going to really need our privacy then.&#8221;</p><h3><strong>The Government Is Buying Your Data</strong></h3><p>Unfortunately today, it&#8217;s almost like we&#8217;ve forgotten about the Fourth Amendment. Perhaps because the Constitution seems old and outdated to some people. But not only are these protections still relevant, they&#8217;re more important than ever. Because today&#8217;s government can access a staggering flood of information compared with anything the founders could have imagined.<br><br>Every part of our life is digitally archived in data logs, telemetry, search history, prompt archives, location records, and maps of your social graph. Your data has already been collected, by myriad companies archiving every aspect of your life. <br><br>Your bank has your transactions.<br>Your phone company has your location.<br>Your email provider stores your messages.<br>Your cloud account holds your files.<br>Your apps know where you go, what you search, what you buy, who you talk to, and what patterns your life follows.</p><p>We have multi-billion-dollar industries that have emerged to surveil us.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>And apparently this data is completely up for grabs, with no judge getting in the way. There&#8217;s a huge amount of investigative activity that should require a warrant that doesn&#8217;t get it. Many agencies act as if a warrant is just the key that forces someone to hand over data. And if they don&#8217;t need the key and can just buy the data instead, why bother with the warrant?</p><p>This misses the deeper point. The Fourth Amendment says no unreasonable searches. We can&#8217;t just allow law enforcement to redefine the term &#8220;search&#8221; to exclude wide swaths of activity they&#8217;re engaging in, such as purchasing datasets that they then search, because they want to avoid warrant requirements.</p><p>This week a major bombshell dropped (which wasn&#8217;t even the bombshell it should have been because everyone knew this was going on) that the <a href="https://youtu.be/hPALUKCaARs?si=ho90ZPSJcYDJdLHa&amp;t=979">FBI is buying your data</a>. </p><p><em>Wyden: &#8220;Can you commit this morning to not buying Americans location data?&#8221;<br>Patel: &#8220;The FBI uses all tools &#8230; to do our mission. We do purchase commercially available information that&#8217;s consistent with the Constitution and the laws under the electronic communications privacy act.&#8221;</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LP_e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LP_e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 424w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 848w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LP_e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png" width="334" height="263.80494505494505" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1150,&quot;width&quot;:1456,&quot;resizeWidth&quot;:334,&quot;bytes&quot;:3225735,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!LP_e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 424w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 848w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 1272w, https://substackcdn.com/image/fetch/$s_!LP_e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe7886c85-c604-4350-b292-fd3e4c16559f_2430x1920.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As Harper notes:</p><p>&#8220;They&#8217;re rummaging your things. They just happen to be digital things that are held remotely for you.&#8221;</p><p>And so often with these searches and warrantless subpoenas, the obvious question is:</p><p>&#8220;Why couldn&#8217;t you have gone to a judge? If you have such a case against this person, why can&#8217;t you go and get a warrant?&#8221;</p><p>The dirty secret is that the vast majority of times, if the government went and applied for a warrant, they&#8217;d probably get it. But they don&#8217;t see warrants as a critical check on power, they see it as busywork.</p><p>As Harper explains:</p><p>&#8220;Warrant applications involve some work. Maybe it&#8217;s an hour. If you&#8217;re good at it, it&#8217;s half an hour. But it requires law enforcement to think carefully about and articulate their cases. Unfortunately there&#8217;s an ongoing tension, and law enforcement is constantly pushing to lower the warrant requirement. They really do want to catch criminals, but I think they want to make it so easy, that it&#8217;s subject to abuse. And obviously, with the huge swelling of information that&#8217;s online and in third-party hands, our privacy is undermined deeply by this resistance to using warrants to get information, when they properly should.&#8221;</p><p>Frommer added:</p><p>&#8220;The idea that my location information -- all the routes I&#8217;ve driven, all the places I&#8217;ve gone -- is sitting in a government database that any officer can look up whenever they want&#8230; that undermines my security.&#8221;</p><p>The whole point of the warrant requirement is to slow investigators down, force them to justify themselves, and put a judge in the middle before the search happens. Do we really want to regress to that era of abuse by pretending that there is a whole category of activities, like database queries, that somehow falls outside the definition of a search?</p><p>As Frommer explained,</p><p>&#8220;There&#8217;s nothing special about the word search. It just means any purposeful investigative act. And more importantly, it meant the exact same thing back in 1789 when they were enacting the Fourth Amendment. The government buying your data so they can look at it is a purposeful investigative act.&#8221;</p><p>If the government wants to do a search on someone, whether it&#8217;s in their own data base or someone else&#8217;s, they should need to get a warrant to access that information.</p><p>There is currently legislation being introduced called the &#8220;Surveillance Accountability Act&#8221; that is trying to codify this. It asserts that if the government wants to do a search, it needs a warrant. This would essentially eliminate the Third-Party Doctrine, which is currently used to undermine the Fourth Amendment, and get access to people&#8217;s lives without a warrant. The bill also gives people the right of action, so that if government agents skirt warrant requirements, they should be held accountable.</p><p>It might be time for the legislature to step in, because this is getting out of control. We need to reestablish protections in the digital age.</p><p>If nothing else, we need to have a serious conversation as a society about whether we are willing to accept this new normal, and whether we want every future regime that comes to power to be able to search giant databases about all of us at will.</p><p>All I hear from law enforcement is that we need to &#8220;balance&#8221; their thirst for data with our rights. But the Fourth Amendment is the balance. It was designed to ensure that there are certain things the government can&#8217;t do without judicial approval.</p><p>We already know what the balance of our rights is, we just have to go back to enforcing it.</p><p>A warrant isn&#8217;t boring paperwork. Or something that just makes life harder for law enforcement. It is one of the most important protections we have. It is the rule that says those with the most power do not get to open up your life for inspection just because they want to see what they can find. They have to name the person. State the reason. Limit the search. Face a judge. And justify themselves first.</p><p>This is how a free society functions. Once you lose that principle, you do not just lose privacy. You lose one of the most important checks on power ever created.</p><p><em>Yours In Privacy,<br>Naomi</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yeBp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png" width="310" height="221.42857142857142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:2100,&quot;resizeWidth&quot;:310,&quot;bytes&quot;:6347352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/192808747?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c6065ec-cd73-4583-90cd-2bfc68be5e03_2100x1500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yeBp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 424w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 848w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1272w, https://substackcdn.com/image/fetch/$s_!yeBp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F102d9f30-d4cf-4ef3-ac14-90b930c481f8_2100x1500.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Shop.NBTV.media</figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[The Culture Shift That Broke Tech ]]></title><description><![CDATA[&#8220;Don&#8217;t Be Evil&#8221; did not just disappear from Google. It disappeared from the moral framework of the tech industry.]]></description><link>https://nbtv.substack.com/p/the-culture-shift-that-broke-tech</link><guid isPermaLink="false">https://nbtv.substack.com/p/the-culture-shift-that-broke-tech</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Mon, 16 Mar 2026 03:11:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MrRc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This weekend I gave a presentation at the &#8220;Don&#8217;t Be Evil&#8221; conference in Austin, Texas. It was hosted at the FUTO headquarters, where their tagline is &#8220;engineering solutions to big tech problems.&#8221; The conference was about exploring how to steer the world of technology toward products and services that serve the user, instead of working against the user.</p><p>As we likely all know, &#8216;don&#8217;t be evil&#8217; was most widely known as Google&#8217;s old slogan. But quite a while ago, Google quietly removed it. That removal is a fitting metonym for the broader culture shift we&#8217;ve seen across tech.</p><p>Once upon a time, if a company secretly followed you across your digital life, it would have sounded like a dystopian thriller. But now it&#8217;s basically a product requirement.</p><p>In this newsletter, I want to talk about how tech culture has radically shifted, how that shift has changed the relationship between companies and users, and why so much of the public still does not see what is happening. In particular, I want to show you some egregious examples of this culture in action. Once you see how dangerous and adversarial this approach is, it becomes much clearer why we need to push back.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MrRc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MrRc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MrRc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png" width="338" height="190.125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:338,&quot;bytes&quot;:42097,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/191087725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MrRc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!MrRc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffecc81ea-01f9-479c-9f65-6c5e91dba5dd_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h3>Spying Used to Be Creepy</h3><p>The early internet, or even the internet of a decade ago, wasn&#8217;t perfect. But there were at least some broadly understood norms. First, that spying is creepy.</p><p>Bruce Schneier and Barath Raghavan wrote a <a href="https://www.schneier.com/essays/archives/2024/06/how-online-privacy-is-like-fishing.html">great essay</a> about shifting baseline syndrome in the privacy space. They were responding to news that Microsoft was spying on its users, and they observed that many people defended this behavior, even claiming it was &#8216;unfair&#8217; to call it spying because it was simply &#8216;part of how cloud services work.&#8217;</p><p>The purpose of the essay was to step back and understand how this shift had happened. Because to be clear, Microsoft WAS spying on its users. What the authors found striking was that many people no longer saw this as creepy or scandalous, but as ordinary and expected. It was a vivid example of how dramatically our standards for tech companies had changed.</p><p>&#8216;Spying is creepy&#8217; is just one example of the culture shift.<br>Deception was once disreputable.<br>Violating user expectations was a scandal.<br>Consent mattered.<br>If a company or government was caught circumventing privacy protections, they were shamed.</p><p>That broader moral baseline was captured by the phrase &#8216;don&#8217;t be evil.&#8217; It reflected a general culture in which engineers were expected to ask not just whether they could do something, but whether they should. The phrase implied restraint and moral consideration.</p><h3>The New Normal</h3><p>So what is the NEW normal? A culture where much of the brainpower in the tech sector, both public and private, is being directed toward things that hurt users instead of help them.</p><p>User resistance, platform safeguards, and legal boundaries are treated as engineering puzzles to route around.</p><p>Engineering culture is rewarded for solving constraints. But there&#8217;s often no regard for why those constraints might have been put there in the first place.</p><p>At some point over the past decade, constraint-solving became untethered from morals, and the act of bypassing a safeguard became treated as cleverness rather than misconduct.</p><p>The problem with that mindset is that safeguards are often there to protect the user and respect their privacy. So when the highest status goes to the people who find ways around them, the technology we rely on stops being designed to serve the user and starts being designed to extract more from them than they knowingly agreed to give.<br>Users are now seen as terrain to be mined.</p><p>Things like browser blocks, OS permissions, cookie rules, consent flows, and sandboxing should function as warning signs that say, &#8216;keep out.&#8217; But instead of respecting that, much of the tech sector treats these barriers as prompts for ingenuity.<br>Then these workarounds are whitewashed in the terms of service and privacy policies. They&#8217;re buried in vague legalese intended to hide the details from users. And this language also affects the people building this technology: it abstracts away the meaning of what they are doing, making it feel cleaner and more palatable.</p><p>&#8220;Telemetry.&#8221;<br>&#8220;Signal.&#8221;<br>&#8220;Optimization.&#8221;<br>&#8220;Friction reduction.&#8221;<br>&#8220;Identity resolution.&#8221;<br>&#8220;Measurement.&#8221;</p><p>These terms make invasive acts sound neutral. Once you rename spying as measurement, you can quiet your conscience. We have baked the normalization of civil rights violations into the architecture of everyday technology, and then convinced ourselves that it&#8217;s nothing to be alarmed about.</p><h3>Meta: A Case Study</h3><p>Let&#8217;s look at a case study of this kind of culture shift. <a href="https://localmess.github.io/">Researchers</a> found that Meta was using WebRTC on Android to spy on people&#8217;s web browsing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gLhH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gLhH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 424w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 848w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 1272w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gLhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png" width="532" height="306.1923076923077" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:838,&quot;width&quot;:1456,&quot;resizeWidth&quot;:532,&quot;bytes&quot;:440649,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/191087725?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gLhH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 424w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 848w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 1272w, https://substackcdn.com/image/fetch/$s_!gLhH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12d4b604-0cb3-4cdc-bbb4-2ce2af6d07db_1964x1130.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What does this mean?</p><p>Normally, WebRTC is a technology intended for live, direct communication. So let&#8217;s say you have a browser-based video call. When you click &#8220;Join meeting,&#8221; WebRTC helps your browser do things like access your camera and microphone, send your audio and video in real time, and receive the other person&#8217;s audio and video.</p><p>But Meta perverted this intention and instead used this technology to deanonymize people&#8217;s browsing.</p><p>How?</p><p>Well, Meta uses tracking pixels across a large swath of the web. They&#8217;re estimated to be embedded in over 5.8 million websites. When someone visits a website with one of these pixels, the browser receives a cookie identifier. In theory, this cookie shouldn&#8217;t automatically tell Meta who that person is when visiting that website.</p><p>But the Meta Pixel also used WebRTC to send that cookie to the phone&#8217;s localhost ports on Android. The Facebook and Instagram apps were listening on those ports, and if the user was logged in to one of those apps, the cookie value was now linked to that logged-in account.</p><p>So Meta was able to tell that this signed-in user was the same person browsing that website.</p><p>This is a prime example of engineers using incredibly clever tools to achieve their objectives, but also being egregiously unethical. What they were doing clearly bypassed ordinary privacy expectations, such as those that come with app sandboxing, where phones are specifically designed so that one app isn&#8217;t meant to be able to spy on the activities of another app.</p><p>This is really adversarial to the user, because it treats the user&#8217;s attempt to create boundaries as a challenge to defeat. And this is an all-too-common pattern in tech culture today.</p><h3>The Gap</h3><p>All of this happens without the user being aware, which means there is a huge gap between what users expect and how the technology they use actually behaves. The gap points to a culture that too often treats user understanding as a threat rather than a goal.</p><p>People today still think they are getting something like siloed data collection that only operates within carefully scoped permissions and guardrails. The average person believes things like incognito mode gives them privacy, app permissions are robust safeguards, clearing cookies resets your identity, if they didn&#8217;t click yes then data probably wasn&#8217;t collected, and my favorite: that if there were actual egregious privacy violations going on, regulators or journalists would have stopped them.</p><p>But the reality is that a new culture has emerged without users realizing it, where companies are using opaque, cross-context, technically ingenious methods to identify, infer, and manipulate.</p><p>Identifiers are stitched together across contexts, with all kinds of different actors contributing to the surveillance supply chain: apps, pixels, SDKs, APIs, ad networks, analytics firms, and data brokers. These things are all tied together by entities that make a tremendous amount of money from aggregating data sets, and some of the largest clients of this data are governments.</p><p>And as far as Chrome&#8217;s incognito mode is concerned, <a href="https://www.searchenginejournal.com/google-to-face-5b-lawsuit-over-tracking-users-in-incognito-mode/399113/">we all know how that ends</a>.</p><p>Then there are app permissions: people tend to think these are a complete privacy control, when really they are only one layer, and companies usually find ways to learn far more than users think those permission screens allow.</p><p>Most of the surveillance going on in our day-to-day lives operates completely outside the average person&#8217;s comprehension.</p><p>The gap between perception and reality is part of the scandal. Companies would not work so hard to hide how this surveillance works if they thought users would be comfortable with it.</p><p>And the fact that they do it anyway is deeply unethical.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Why This Is So Dangerous</h3><p>Now why does all of this matter?</p><p>Most people think this is about ads. Phrases like &#8220;surveillance capitalism&#8221; make people think this is just about companies trying to sell us a better pair of shoes.<br>That data can absolutely be used to sell us a better pair of shoes. But the same data can be used to infer our thoughts, habits, and political persuasion.</p><p>The same infrastructure of surveillance that identifies consumers can identify potential dissidents who might become part of a protest movement or opposition party, and stop that political opposition before it even forms.</p><p>The same real-time bidding systems that vie for our attention can be used to influence us not just in consumer choices, but in our political beliefs. It can shape our reality. It can get us to hate certain groups of people because we&#8217;re made to believe that they hate us.</p><p>When companies normalize invasive surveillance, they also normalize the infrastructure that governments, litigants, bad insiders, and future authoritarian actors can exploit.</p><p>Privacy versus surveillance is actually a battle between:</p><ul><li><p>Freedom of thought and manipulation.</p></li><li><p>Freedom of association and censorship.</p></li><li><p>Human dignity and reputational vulnerability.</p></li><li><p>Liberty and the chilling effects that happen when populations start to realize that everything they say or do is monitored.</p></li></ul><p>The erosion of privacy is about the quiet erosion of civil rights.</p><div class="pullquote"><p>The most dangerous trick surveillance ever pulled was not hiding itself.<br>It was teaching us to call it normal.</p></div><h3>How We Got Here</h3><p>All of this happened through many different mechanisms.</p><p>First of all, this surveillance happened gradually.</p><p>When we all first signed up to get a free Gmail account, none of us were told that this would be used to mine our most personal communications to learn about us, and that this data would eventually end up in the hands of countless third parties as it passed from one company to another through a vast ecosystem of data brokers.</p><p>At worst, we might have assumed Google was just selling keyword ads in its search engine. What crept in instead, largely without users noticing, was one of the most sophisticated surveillance systems ever built. And it wasn&#8217;t confined to just Google. It spread into the very infrastructure of the internet and became embedded in nearly every tool we use.</p><p>No one was told that when they bought an Android or iPhone and had their Wi-Fi on, they were essentially wardriving for Google and Apple, helping build a robust database of every SSID in existence that could be used to monitor people&#8217;s exact locations as they moved around.</p><p>The harms of these systems were distributed and often invisible, and that&#8217;s why no one really looked too closely or pushed back too much.</p><p>Because at the individual level, people asked &#8220;what do I have to hide?&#8221;</p><p>But at a societal level, this is a comprehensive infrastructure of surveillance that governments have basically total access to, that can be fine-tuned to target anyone, and that has become one of the most potent mechanisms for control we&#8217;ve ever seen.</p><p>On top of this, the gap between user understanding and the technical reality of these systems was so great that privacy advocates were caricatured as paranoid. &#8220;Things couldn&#8217;t possibly be as bad as they say. Surely we&#8217;d know about it.&#8221;</p><p>And inside some of the worst offenders, every new violation reset the internal baseline of what was acceptable. Over time, people kept asking &#8220;can we&#8221; but stopped asking &#8220;should we.&#8221; Surveillance stopped being a scandal and became a business model. A norm.</p><p>This baseline of acceptable surveillance has shifted entirely to a level that would have been unacceptable ten or twenty years ago. Those who evolved alongside it became frogs in boiling water, and the younger generations who simply inherited these degraded standards were told that &#8220;this is just how tech works.&#8221;</p><p>Today, surveillance has exploded because users are conditioned, language is sanitized behind vague legalese, and harms are hidden behind technical abstraction.</p><h3>The &#8220;Don&#8217;t Be Evil&#8221; Test</h3><p>So what now? Is it possible to reclaim this ground that&#8217;s been lost?</p><p>I think we can. But we have to be strong enough to demand higher standards.</p><p>I propose the &#8220;don&#8217;t be evil&#8221; test.</p><p>What does this test look like?</p><ul><li><p>If a system relies on deception, it fails the test.</p></li><li><p>If a user would be shocked to learn what is happening in the tools they use, it fails the test.</p></li><li><p>If a company is circumventing privacy safeguards, it fails the test.</p></li><li><p>If meaningful consent requires a PhD to understand it, it fails the test.</p></li><li><p>If data from one context is silently merged with another without users understanding what is going on, it fails the test.</p></li><li><p>If engineers are rewarded for bypassing protections, the company or government agency fails the test.</p></li></ul><h3>We Can Raise the Standard Again</h3><p>Tech has this incredible, almost utopian promise.</p><p>But that future doesn&#8217;t happen by autopilot. We have to build it.</p><p>Tech itself is neutral and can be used for good or bad. So much tech today has been hijacked for surveillance and control, but it doesn&#8217;t have to be.</p><p>But we have to feed a future where tech works for the user instead of against them, and helps people instead of quietly herding them into systems of control that are easy to abuse.</p><p>We must build technology and participate in ecosystems that help build robust protections for individual freedom, human agency, autonomy, and flourishing.<br>We need to start enforcing higher standards, and stop excusing the toxic culture that has overtaken so much of the tech world.</p><p>We must stop building a world where technical ingenuity is praised even when it is used against the people it claims to serve. Where the smartest people in the room are rewarded for finding ever more clever ways to violate us.</p><p>We can build a better world.<br>We can raise the standard again.<br>We can make spying creepy again.<br>We can make &#8220;don&#8217;t be evil&#8221; mean something again.&#8221;</p><p><em>Yours In Privacy,<br>Naomi</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[The Privacy Card I Carry Everywhere]]></title><description><![CDATA[How much of your life does a driver's license scan really reveal? You'll want a passport card the moment you find out.]]></description><link>https://nbtv.substack.com/p/the-privacy-card-i-carry-everywhere</link><guid isPermaLink="false">https://nbtv.substack.com/p/the-privacy-card-i-carry-everywhere</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 03 Mar 2026 21:50:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JyfM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Guest post by <a href="https://kryptosis.xyz/">Kryptosis.xyz</a></strong></p><p>There&#8217;s a scene in almost every spy thriller you&#8217;ve ever seen. Some suave operative approaches a restricted entrance. Security guards step forward, hands raised. &#8220;You can&#8217;t go in there.&#8221;</p><p>The agent coolly removes his sunglasses, flips open a badge, says &#8220;FBI,&#8221; and walks right in. All without breaking their stride.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JyfM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JyfM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 424w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 848w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 1272w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JyfM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif" width="360" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ca42011-409e-4805-b189-4894c57f5654_360x394.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:360,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:349611,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/189768341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JyfM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 424w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 848w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 1272w, https://substackcdn.com/image/fetch/$s_!JyfM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ca42011-409e-4805-b189-4894c57f5654_360x394.gif 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I always loved that move. The idea of carrying a single credential that instantly resets the power dynamic. I wanted something like that &#8212; but for privacy.</p><p>Turns out, it exists. And it fits in your wallet.</p><h3>The Problem with Scanning Your ID</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fML8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fML8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 424w, https://substackcdn.com/image/fetch/$s_!fML8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 848w, https://substackcdn.com/image/fetch/$s_!fML8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 1272w, https://substackcdn.com/image/fetch/$s_!fML8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fML8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png" width="390" height="390" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:716,&quot;width&quot;:716,&quot;resizeWidth&quot;:390,&quot;bytes&quot;:1248586,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/189768341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fML8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 424w, https://substackcdn.com/image/fetch/$s_!fML8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 848w, https://substackcdn.com/image/fetch/$s_!fML8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 1272w, https://substackcdn.com/image/fetch/$s_!fML8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F696f61d8-f966-43f4-94df-69ca21a8a092_716x716.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On a recent trip to my local grocery store I tried picking up some craft beer. The moment I scanned it at self-checkout, a red light fired signaling the store clerk to come over.</p><p>&#8220;Can I see your ID?&#8221;</p><p>I opened my wallet and showed him. &#8220;Oh, I need you to take it out &#8212; I have to scan it.&#8221;</p><p>I pushed back. &#8220;I&#8217;d rather you didn&#8217;t. Can you just type in my birthdate manually?&#8221;</p><p>He wouldn&#8217;t budge. &#8220;We have to scan it.&#8221;</p><p>I tried explaining my concern. Scanning a driver&#8217;s license doesn&#8217;t just confirm your age &#8212; it gives the system a complete text file containing everything on your license: full name, home address, date of birth, height, weight, eye color, organ donor status, endorsements, and so on. I&#8217;d like to believe the store&#8217;s system parses your birthdate, confirms you&#8217;re over 21, and discards the rest. But I have no way of knowing that. What if that data is stored? What if their system gets breached?</p><p>Nothing worked. The clerk didn&#8217;t budge, and I left without any beer.</p><h3>The Solution: A Passport Card</h3><p>Here&#8217;s where the FBI moment comes in.</p><p>If you&#8217;ve ever traveled internationally, you were required to have a passport book &#8212; that familiar large booklet of official government identification. What most people don&#8217;t know is that the U.S. State Department also issues passport cards: government ID the same size as a driver&#8217;s license, valid for travel within North America, and surprisingly useful for everyday privacy.</p><p>Put a passport card next to a driver&#8217;s license and the differences are immediately obvious. Where a driver&#8217;s license is loaded with personal data, a passport card has almost none of it. No address. No physical descriptors. Just a few pieces of identifying information like your name, photo, and date of birth.</p><p>That alone is a win. But my key concern was stores scanning and storing my information &#8212; and passport cards DO have barcodes. So was all of this for nothing?</p><p>Amazingly, no.</p><p>Driver&#8217;s licenses use a barcode format called PDF417, which retail scanners everywhere are capable of reading. Curious what a clerk actually pulls up when they scan yours? You can find out for yourself. The Secure Camera app, built into GrapheneOS and available for stock Android on the Google Play Store, reads many barcode formats including PDF417. Just point it at your own license and you&#8217;ll get a plain text readout of everything on it: name, address, date of birth, height, weight, eye color, organ donor status &#8212; all of it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!utqZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!utqZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!utqZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg" width="415" height="379.5139513951395" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1016,&quot;width&quot;:1111,&quot;resizeWidth&quot;:415,&quot;bytes&quot;:49427,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/189768341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!utqZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 424w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 848w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!utqZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9ad4a36-86d4-4910-9a78-5559c92f42df_1111x1016.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Passport cards use a completely different format called Code 39, which most retail scanners don&#8217;t even recognize. And on the off chance one does? All the scan returns is the card number. If you have a passport card, you can verify this for yourself with the same app to see the difference firsthand.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8VA-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8VA-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8VA-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg" width="490" height="195.4431818181818" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:351,&quot;width&quot;:880,&quot;resizeWidth&quot;:490,&quot;bytes&quot;:12413,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/189768341?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8VA-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8VA-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48298acf-b47d-46ff-b1af-f2290f626c23_880x351.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>When I got my passport card, I quickly went back to that grocery store looking to test my new tool (and maybe hoping to cause some confusion). I grabbed the same six-pack and headed to the self-checkout. And almost as if scripted &#8212; the same clerk was there.</p><p>&#8220;Hi, I just need your ID.&#8221;</p><p>I handed him the passport card. He turned it over, puzzled, then said, &#8220;This is cool.&#8221; He typed my birthdate manually into the system, handed it back, and walked away. The same person who had insisted he was required to scan my ID.</p><h3>How to Get One</h3><p>Getting a passport card isn&#8217;t difficult, but it does take some time. Full instructions can be found on the State Department&#8217;s <a href="https://travel.state.gov/content/travel/en/passports/need-passport/card.html">website</a>.</p><p>If you don&#8217;t already have a passport book, it&#8217;s worth applying for both at the same time &#8212; it saves money and paperwork.</p><p>If you already have a passport book like I did, the process is a simple renewal by mail. You&#8217;ll fill out a <a href="https://eforms.state.gov/Forms/ds82_pdf.PDF">DS-82</a> form, attach a compliant headshot, and mail it in along with your current passport book and a check. A few weeks later, both come back in the mail.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Conclusion</h3><p>Every bartender and grocery clerk shouldn&#8217;t have the automatic privilege of knowing where you live just because you&#8217;re trying to buy a beer &#8212; or the ability to store a complete personal profile of you in their store&#8217;s system.</p><p>The passport card is one of the simplest, most underrated privacy tools out there. It costs $30, fits in your wallet, and requires zero technical knowledge to use.</p><p>If you found this helpful, share it with your friends and family. The more people who take these steps, the more we send a message: Privacy isn&#8217;t suspicious. It&#8217;s not for people with something to hide.</p><p>It&#8217;s a human right.</p><p>And it&#8217;s something we all deserve.</p><p>Yours In Privacy,</p><p>Kryptosis</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Mass Surveillance. Autonomous Weapons. The Pentagon Wants Both. This AI Company Says No.]]></title><description><![CDATA[The US government just gave Anthropic until Friday to hand over its ethics... or else.]]></description><link>https://nbtv.substack.com/p/mass-surveillance-autonomous-weapons</link><guid isPermaLink="false">https://nbtv.substack.com/p/mass-surveillance-autonomous-weapons</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Wed, 25 Feb 2026 03:07:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!piFl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I know I only just sent out a newsletter, but this is important.</p><p>I&#8217;m not sure if you&#8217;ve all been following this, but something huge is happening right now: the U.S. government just gave an AI company until end of day Friday to hand over its ethics, or else.</p><h3>The short version:</h3><p>Anthropic, the company behind the AI chatbot Claude, is in a full-blown standoff with the U.S. Department of Defense (now rebranded the &#8220;Department of War&#8221;). As of today, they have until end of day Friday to back down or face serious retaliation.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!piFl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!piFl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!piFl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!piFl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!piFl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!piFl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg" width="408" height="229.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:408,&quot;bytes&quot;:238088,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/189094736?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!piFl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!piFl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!piFl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!piFl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02a238cd-4b61-4e61-9aa7-850ff3d9ab4c_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h3>Here&#8217;s the backstory.</h3><p>Last summer, the Pentagon awarded contracts up to $200 million to four AI labs: Anthropic, OpenAI, Google, and Elon Musk&#8217;s xAI. The plan is to develop AI capabilities for military use. Already terrifying, but let&#8217;s be honest, inevitable.</p><p>Anthropic was the first AI company approved for the Pentagon&#8217;s classified networks, and until recently it was the only frontier AI provider with that kind of classified access.</p><p>But in negotiating contracts, Anthropic has now drawn two hard lines:</p><ol><li><p>No using Anthropic&#8217;s tools as an engine for mass surveillance, ie processing and analyzing data on Americans at scale</p></li><li><p>No fully autonomous weapons where AI makes final targeting decisions without a human in the loop, ie no operations where AI chooses and executes lethal targets without human oversight.</p></li></ol><p>These seem pretty reasonable. No letting AI autonomously decide to kill people. No building a digital panopticon to surveil your own citizens. Constitutional stuff, arguably.</p><h3>The Pentagon&#8217;s response: absolutely not.</h3><p>Defense Secretary Pete Hegseth has pushed back, saying all AI vendors must allow their systems to be used for &#8220;all lawful purposes,&#8221; including warfare, intelligence, and potentially surveillance. Anthropic&#8217;s safety restrictions have been labeled &#8220;woke AI&#8221; by Hegseth and other Trump administration officials.</p><p>Meanwhile, OpenAI removed its explicit ban on military applications in January 2024. Google, which had promised after the Project Maven backlash not to build AI for weapons or mass surveillance, dropped that pledge from its AI Principles in February 2025. xAI has moved quickly to expand its Pentagon footprint, landing a major DoD contract and pushing Grok into the department&#8217;s internal AI rollout.</p><p>That leaves Anthropic, and we&#8217;re yet to see what they&#8217;ll do.</p><p>Today, Hegseth met with Anthropic CEO Dario Amodei directly and delivered an ultimatum: lift the restrictions or face consequences. Anthropic has until Friday.</p><p>If they don&#8217;t comply, there are three possible outcomes:</p><ol><li><p><strong>Cancel Anthropic&#8217;s existing and pending contracts</strong>, worth up to $200 million.</p></li><li><p><strong>Label Anthropic a &#8220;supply chain risk&#8221;,</strong> a designation typically reserved for adversarial foreign suppliers. This could effectively bar all Pentagon contractors and vendors from using Claude, turning the entire defense industrial base into an enforcement mechanism.</p></li><li><p><strong>Invoke the Defense Production Act, which is</strong> a Cold War-era law that would amount to using emergency wartime powers to conscript Anthropic&#8217;s AI into military service against the company&#8217;s will, forcing them to hand over access to their models whether they consent or not.</p></li></ol><p>Like, wow.</p><p>That middle one, according to Dean Ball, a former White House AI policy advisor, &#8220;would basically be the government saying, &#8216;If you disagree with us politically, we&#8217;re going to try to put you out of business.&#8217;&#8221;</p><p>The way the military is spinning this is to say it&#8217;s &#8220;not democratic&#8221; to let a single company impose rules above what Congress and existing law already allow.</p><p>Sorry Anthropic, how undemocratic of you to refuse to let your product be used for mass surveillance of Americans or for killing people without human oversight.</p><p>As of today&#8217;s meeting, Anthropic has no plans to budge.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Why this matters:</h3><p>First of all, let&#8217;s be clear: the government already has access to your personal chats in the LLMs. Basically all of the major platforms automatically flag content and feed it to law enforcement. So the fact that AI chatbots are insanely personal (we treat them like our doctor, lawyer, nutritionist, therapist, life coach) and the government is already getting access to these intimate conversations is not what&#8217;s being debated here. We already lost that battle.</p><p>This is about whether these AI tools are allowed to be deployed to help process the enormous amounts of data being vacuumed up by governments right now. The military is saying they want this tool deployed with no restrictions on surveillance or autonomous lethal force. That&#8217;s what &#8220;all lawful purposes&#8221; actually means in practice.</p><p>The resolution of this standoff will likely set precedents for the entire industry. If Anthropic holds the line, other AI companies might demand similar protections. If the Pentagon walks away and gives the contracts to companies that already said yes, the message to every AI lab going forward is simple: having ethics will cost you.</p><h3>The key takeaway:</h3><p>This is a fight over who gets to decide what the most powerful AI tools in the world are allowed to do. Right now, one company is drawing a line and paying a real price for it. That&#8217;s not to say Anthropic is perfect -- they&#8217;re absolutely not, and have also been responsible for some terrible lobbying around AI. But I do give them credit for wanting the DoD to clarify what they plan to use AI for, and establishing boundaries around that, as it has really helped paint a picture for all of us. That the government&#8217;s response is threats, ultimatums, and invoking emergency wartime powers against a private tech company tells you everything about how seriously they want those boundaries erased.</p><p>So yeah, if I have to use one of these major platforms and I get to choose between one that is enabling an ai-powered killing machine with dystopian panopticon capabilities, or one that is mildly pushing back, I&#8217;m probably going to vote with my money for the world I want to see.</p><p>In fact, even better, I can take my money to the ai tools that are also trying to protect my privacy, like <a href="https://brave.com/leo/">Brave&#8217;s Leo</a>, <a href="https://venice.ai">Venice.ai</a>. <a href="https://Confer.to">Confer.to</a>, and many others, not those involved in DoD contracts at all.</p><p>Yours In Privacy,</p><p>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Enough Is Enough]]></title><description><![CDATA[Every privacy concession in history has been permanent. So why are we still making them?]]></description><link>https://nbtv.substack.com/p/enough-is-enough</link><guid isPermaLink="false">https://nbtv.substack.com/p/enough-is-enough</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 24 Feb 2026 12:02:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oxav!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>No More Compromise</h1><p>I just returned from ETH Boulder and ETH Denver, two back-to-back conferences in Colorado where I gave five presentations on the importance of privacy. Both conferences were fantastic, and the conversation around privacy was more front-and-center than I&#8217;ve ever seen it. It was great to see so much mental bandwidth given to the topic from the builders there.</p><p>But here&#8217;s the thing: discussions from half the people were great. However, discussions from the other half were disquieting. They argued that privacy was &#8220;impractical&#8221;, &#8220;not pragmatic&#8221;, &#8220;a holdover from a bygone era of idealistic cypherpunks.&#8221; They explained that &#8220;we now live in the real world, and the only realistic path forward is to make concessions on privacy.&#8221;</p><p>What does that mean?</p><p>Add backdoors.<br>Expose viewing keys.<br>Build in compliance hooks.<br>Implement selective disclosure to regulators.<br>Create &#8220;privacy lite&#8221;: just enough to feel good, not enough to upset anyone in power.</p><p>The logic sounds reasonable on the surface: We can&#8217;t let perfect be the enemy of good. Let&#8217;s compromise now, ship something that&#8217;s palatable, and at least get people a little privacy.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oxav!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oxav!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!oxav!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!oxav!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!oxav!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oxav!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png" width="336" height="189" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:336,&quot;bytes&quot;:2206984,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/188935392?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oxav!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!oxav!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!oxav!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!oxav!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8b90cfa2-e660-46d4-970c-cd458acb9da1_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>A Flawed Argument</h2><p>This is a fundamentally flawed argument. And the reason it&#8217;s flawed is that the people making it are evaluating the tradeoff in a vacuum, looking only at this present moment, without accounting for where we&#8217;ve come from.</p><p>These people are ceding ground to the forces that have been eroding privacy for decades. And those forces have never once returned what they&#8217;ve taken. Let me explain.</p><h2>The Shifting Baseline</h2><p>There&#8217;s a concept called &#8220;shifting baseline syndrome&#8221;. Each generation of people measures the current situation against what they personally remember, not against what existed before them. So what looks &#8220;normal&#8221; to a new generation is actually a deeply degraded version of what once was. The baseline keeps shifting downward, and nobody notices because each generation only sees their own slice.</p><p>This is exactly how the erosion of privacy works. You can&#8217;t evaluate whether a privacy tradeoff is worth making by looking only at the present moment. You have to look at the trajectory. You have to see the full arc of what&#8217;s been lost.</p><p>And when you do, the picture is staggering. Privacy has been all but eradicated, and it gets worse year after year.</p><p>The Bank Secrecy Act of 1970 and the regime it ushered in afterwards introduced mass financial surveillance as a social norm.</p><p>Executive Order 12333 in the eighties gave intelligence agencies sweeping authority to collect communications data abroad, which, in practice, meant millions of Americans&#8217; calls, emails, and messages have been vacuumed up right along with it.</p><p>The Patriot Act of 2001 allowed warrantless wiretapping, National Security Letters that came with gag orders, and bulk data collection of millions of Americans who were suspected of nothing.</p><p>FISA Section 702, which keeps getting renewed again and again, allows the NSA to vacuum up communications from U.S. tech platforms and search through that data for American citizens, all without a warrant.</p><p>And the Third-Party Doctrine basically eliminates any kind of privacy in the digital age. It came from Supreme Court cases in the 1970s, and holds that any information you hand to a third party has no reasonable expectation of privacy. In the internet era, basically everything involves a third party, so this doctrine essentially argues that modern life forfeits your right to privacy by default. Which is an insane precedent.</p><p>These are just things going on in America, but the entire globe has followed suit. Each individual measure is presented as reasonable, and a small price to pay for security, compliance, and order. But each one has ratcheted the baseline lower.</p><p>And at no point along that trajectory have governments or institutions said, &#8220;that&#8217;s enough. We have all the surveillance we need.&#8221; They keep asking for more.</p><h2>The Machine We Built</h2><p>We now live under the largest data-collection regime in human history. We have built, and continue to feed, an infrastructure of surveillance unlike anything the world has ever seen.</p><p>Every day, a trillion-dollar industry harvests information about where you go, whom you talk to, what you read, what you buy, how long you linger on a screen, what scares you, and what persuades you. This data is packaged, analyzed, inferred, and sold, not just to advertisers, but to data brokers, and basically anyone willing to pay. In fact, some of the largest clients are governments all over the world who use this information to target their own populations.</p><p>This invasion of privacy, and overreaching data collection, isn&#8217;t just used by companies profiling us to sell us a better pair of shoes. Or social media companies learning about us for the algorithm. In many places, like authoritarian regimes, the machine is used to control dissent before it happens, by flagging potentially problematic people as more likely to join a protest movement, and then targeting those people.</p><p>Sometimes the machine is used to shape public sentiment, influence opinions, sway elections, or get entire populations to hate certain groups of people by convincing them that those groups hate them.</p><p>There are countries that publicly broadcast information about citizens whose social credit scores have dropped, and then use those scores to restrict their travel, limit their employment, block their children from certain schools, or cut them off from opportunity entirely.</p><p>And with the AI revolution, the machine stops being a record of your life and becomes an entire prediction engine. The data that we make concessions on and allow to be collected is dangerously easy to abuse.</p><h2>A Fatal Flaw: It Can&#8217;t Be Secured</h2><p>This surveillance infrastructure has another fatal flaw: it can&#8217;t be secured.</p><p>Every year, the number of data breaches hits a new all-time high. Billions of records are exposed, with information we never should have tolerated being collected in the first place, like location histories, medical records, financial data, private messages, biometric identifiers, and Social Security numbers.</p><p>This information gets dumped into the wild. It ends up on the dark web, bought and weaponized by organized cartels, criminal syndicates, and nation-state hacking operations. Centralized databases are constant targets, and breaches are not a question of if but when. As John Chambers, the former CEO of Cisco, once said: &#8220;There are only two types of companies: those that have been hacked, and those that don&#8217;t yet know they&#8217;ve been hacked.&#8221;</p><p>And yet people want to weaken privacy and security further still. Demanding even more KYC data to be collected, even though it&#8217;s been proven repeatedly that no one can keep it safe. Or clamoring for backdoors into encrypted communications, while knowing full well they cannot protect those backdoors from exploitation.</p><p>Salt Typhoon, for example, is a Chinese nation-state hacking group that infiltrated the core wiretapping infrastructure of major U.S. telecommunications providers. The very systems built to enable lawful government surveillance became the attack surface. The backdoor we accepted as a compromise to privacy, by allowing lawful access laws like CALEA to take hold, became the front door for foreign adversaries, who have been intercepting Americans&#8217; calls and messages at scale.</p><p>And still, the calls for more backdoors continue. Just one more compromise, to keep us safe.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>No More Compromise</h2><p>I say, no more compromise. Those who tell us that we need limits on privacy to achieve mainstream adoption, that we need viewing keys for regulators, compliance hooks for institutions, even more backdoors for governments &#8212; they need to stop looking at this current moment in a vacuum, and see how far we&#8217;ve already fallen, and how low our shifting baseline of privacy has already sunk.</p><p>Look at the privacy that we used to enjoy, and now look at the kind of surveillance that has since become normalized. More and more privacy disappears every year through just &#8220;one more concession.&#8221; Powers that were granted were never relinquished. So-called &#8220;temporary measures&#8221; are now permanent fixtures. We are surrendering the last remaining vestiges of private life, and calling it pragmatism.</p><p>It&#8217;s time to draw a hard line in the sand. Enough is enough. We have to stop giving ground to a force that never stops asking for more. Privacy is essential for a free society, and we simply can&#8217;t afford to let people take it from us.</p><h2>The Debate</h2><p>Anyway, at the conferences I just came from, I had the chance to put this conviction to the test. I participated in a mock debate on a proposition that cuts to the core of the modern privacy movement: the proposition was that &#8220;Limits on privacy are a price worth paying for mainstream adoption of cryptographic privacy.&#8221;</p><p>In the <a href="https://nbtv.substack.com/p/privacy-is-not-a-price-you-pay-for">previous email</a> I published my opening statement from the debate &#8212; and for those interested, Matt Green and I ended up winning, by the way!</p><p>A mock debate is one thing. Now we actually have to win this battle in the real world. And I hope that enough people want to draw a line in the sand alongside us.</p><p>I&#8217;d also love your opinions in the comments: Who do you side with in this debate? These aren&#8217;t questions we can leave to policymakers and technologists to answer behind closed doors. If privacy is going to survive the digital age, we need more people like you in this conversation.</p><p>Yours In Privacy,</p><p>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Privacy Is Not a Price You Pay for Growth]]></title><description><![CDATA[At a Denver debate, we argued whether weakening privacy is necessary for mass adoption. It isn&#8217;t.]]></description><link>https://nbtv.substack.com/p/privacy-is-not-a-price-you-pay-for</link><guid isPermaLink="false">https://nbtv.substack.com/p/privacy-is-not-a-price-you-pay-for</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Wed, 18 Feb 2026 04:40:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S5WL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Privacy Salon Debate in Denver</h2><p>Today I participated in a Privacy Salon in Denver where we debated a proposition that cuts to the core of the modern privacy movement:</p><p><em>&#8220;Limits on privacy are a price worth paying for mainstream adoption of cryptographic privacy.&#8221;</em></p><p>I was on the &#8220;no&#8221; side alongside Matt Green, with Evin McMullen and Wei Dai arguing &#8220;yes.&#8221;</p><p>It was a lively, thoughtful exchange that forced us to confront a deeper question: is weakening privacy simply the cost of scale?</p><p>Below is my opening statement from the debate.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S5WL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S5WL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 424w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 848w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 1272w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S5WL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png" width="390" height="218.57142857142858" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:390,&quot;bytes&quot;:1512799,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/188343211?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S5WL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 424w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 848w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 1272w, https://substackcdn.com/image/fetch/$s_!S5WL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c46e21c-597a-424f-bdf7-091eb1a993f3_1456x816.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><h2>Opening Statement</h2><p>The proposition assumes something dangerous: that privacy is negotiable. That it is a dial we can turn down in exchange for popularity.<br>But privacy is not a marketing feature. It is the condition that makes freedom possible.</p><p>Here are 4 big reasons why limits on privacy are absolutely not a price worth paying for mainstream adoption.</p><h2>1. Privacy Is Foundational to Freedom</h2><p>First, privacy is the condition that makes free thought, dissent, experimentation, and innovation possible.<br>Without it, we lose the ability to protest, express ourselves, have whistleblowers and dissidents and all kinds of self-correcting mechanisms in society, without fear of persecution.</p><p>Privacy is something that shouldn&#8217;t be compromised because it&#8217;s the foundation of a free society.</p><h2>2. Lowering Privacy Lowers the Baseline</h2><p>Second, when we weaken privacy in the name of mainstream adoption, we lower the baseline of what we&#8217;re willing to accept.</p><p>&#8220;Temporary&#8221; trade-offs become norms. Surveillance that creeps in rarely gets rolled back.</p><p>Every time we accept a small expansion of surveillance in the name of convenience or scale, that weakened baseline becomes the new normal. Privacy has been decimated over the past decades due to continual compromises in the name of things like mass adoption.</p><h2>3. Misdiagnosing the Problem</h2><p>Third, when companies claim that privacy limits are necessary for adoption, what they often mean is that their revenue model depends on collecting more data, or that redesigning their platform would be inconvenient.</p><p>The barrier to adoption is not privacy. It is lazy product design and surveillance-based monetization.</p><p>Usability vs. Privacy is a false dichotomy.</p><p>We don&#8217;t say: &#8220;Seatbelts are complicated, so we removed them for mass adoption.&#8221;<br>or &#8220;Fraud protection slows down transactions, so we eliminated it.&#8221;</p><p>Safety and usability are engineering problems.<br>Privacy is also an engineering problem.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>4. Security Risks</h2><p>Finally, there are security risks of compromising on privacy. Systems that collect, profile, share, and embed personal data into their core architecture expand the attack surface for the users of these systems.</p><p>These data troves are high-value targets for hackers, foreign adversaries, criminal networks, and insider abuse. History is filled with massive breaches where millions of people had their information exposed because the system was designed to hoard data.<br>In cybersecurity, one of the most basic and powerful principles is data minimization.</p><div class="pullquote"><p>The proposition frames this debate as privacy versus adoption.<br>The real trade-off is privacy versus concentrated systemic risk.</p></div><p>Weak privacy increases breach risk, insider abuse, state leverage, geopolitical vulnerability. And in an AI-driven world, it increases the scale and automation of exploitation.</p><h2>In Closing</h2><p>Privacy isn&#8217;t negotiable. It&#8217;s the boundary that prevents mainstream adoption from becoming mainstream control.</p><p>Mass adoption without privacy produces centralized power, behavioral manipulation, and democratic fragility.</p><p>This debate is not about whether limiting privacy can accelerate growth. It is about whether trading long-term freedom for short-term scale is a price we should be willing to pay. And the answer is no.</p><p>Because what&#8217;s at stake is security, freedom, and human dignity, and the cost of losing that in society for future generations is too high.</p><p>Yours In Privacy,</p><p>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Lawsuit Claims WhatsApp Encryption Is A Lie]]></title><description><![CDATA[Here's what a leading cryptography expert thinks.]]></description><link>https://nbtv.substack.com/p/lawsuit-claims-whatsapp-encryption</link><guid isPermaLink="false">https://nbtv.substack.com/p/lawsuit-claims-whatsapp-encryption</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 10 Feb 2026 16:02:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wSEU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcc76c72b-336f-4c75-a4f9-994e61c32ac9_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Guest post by Matthew Green, leading cryptographer and Associate Professor at the Johns Hopkins University Information Security Institute.</em></p><p><em>Originally published in <a href="https://blog.cryptographyengineering.com/2026/02/02/whatsapp-encryption-a-lawsuit-and-a-lot-of-noise/">A Few Thoughts on Cryptographic Engineering</a> on Feb 2, 2026.</em></p><h2>WhatsApp Encryption, a Lawsuit, and a Lot of Noise</h2><p>It&#8217;s not every day that we see mainstream media get excited about encryption apps! For that reason, the past several days have been fascinating, since we&#8217;ve been given not one but several unusual stories about the encryption used in WhatsApp. Or more accurately, if you read the story, a <a href="https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-that-meta-can-read-encrypted-whatsapp-messages">pretty wild allegation that the widely-used app </a><em><a href="https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-that-meta-can-read-encrypted-whatsapp-messages">lacks</a></em><a href="https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-that-meta-can-read-encrypted-whatsapp-messages"> encryption</a>.</p><p>This is a nice departure from our ordinary encryption-app fare on this blog, which mainly deals with people (governments, usually) claiming that WhatsApp is <em>too </em>encrypted. Since there have now been several stories on the topic, and even folks like Elon Musk have gotten into the action, I figured it might be good to write a bit of an explainer about it.</p><p>Our story begins with a new <a href="https://images.assettype.com/barandbench/2026-01-27/5ol8a72t/Meta__WhatsApp_complaint_.pdf">class action lawsuit</a> filed by the esteemed law firm Quinn Emanuel on behalf of several plaintiffs. The lawsuit notes that WhatsApp claims to use end-to-end encryption to protect its users, but alleges that all WhatsApp users&#8217; private data is secretly available through a special terminal on Mark Zuckerberg&#8217;s desk. Ok, the lawsuit does not say <em>precisely</em> <em>that</em> &#8212; but it comes pretty darn close:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!d06t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!d06t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 424w, https://substackcdn.com/image/fetch/$s_!d06t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 848w, https://substackcdn.com/image/fetch/$s_!d06t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 1272w, https://substackcdn.com/image/fetch/$s_!d06t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!d06t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp" width="1023" height="352" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:352,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:79682,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/187407939?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!d06t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 424w, https://substackcdn.com/image/fetch/$s_!d06t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 848w, https://substackcdn.com/image/fetch/$s_!d06t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 1272w, https://substackcdn.com/image/fetch/$s_!d06t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78d4e5f1-6f67-49c3-8132-80697a5272ba_1023x352.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The complaint isn&#8217;t very satisfying, nor does it offer any solid evidence for any of these claims. Nonetheless, the claims have been heavily amplified online by various predictable figures, such as <a href="https://x.com/elonmusk/status/2015955129975947615">Elon Musk</a> and <a href="https://x.com/elonmusk/status/2016134260378202284">Pavel Durov</a>, both of whom (coincidentally) operate <a href="https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/">competing</a> <a href="https://blog.cryptographyengineering.com/2025/06/09/a-bit-more-on-twitter-xs-new-encrypted-messaging/">messaging</a> apps. Making things a bit more exciting, Bloomberg <a href="https://www.bloomberg.com/news/articles/2026-01-29/us-has-investigated-claims-that-whatsapp-chats-aren-t-private">reports</a> that US authorities are <a href="https://www.theguardian.com/technology/2026/jan/31/us-authorities-reportedly-investigate-claims-that-meta-can-read-encrypted-whatsapp-messages">now investigating Meta</a>, the owner of WhatsApp, based on these same allegations. (How much weight you assign to this really depends on what you think of the current Justice Department.)</p><p>If you&#8217;re really looking to understand what&#8217;s being claimed here, the best way to do it is to read the complaint yourself: you can find it <a href="https://images.assettype.com/barandbench/2026-01-27/5ol8a72t/Meta__WhatsApp_complaint_.pdf">here (PDF).</a> Alternatively, you can save yourself a lot of time and read the next five sentences, which contain pretty much the same amount of factual information:</p><ol><li><p>The plaintiffs (users of WhatsApp) have all used WhatsApp for years.</p></li><li><p>Through this entire period, WhatsApp has advertised that it uses end-to-end encryption to protect message content, specifically, through the use of the Signal encryption protocol.</p></li><li><p>According to unspecified &#8220;whistleblowers&#8221;, since April 2016, WhatsApp (owned by Meta) has been able to read the messages of every single user on its platform, except for some celebrities.</p></li></ol><p>Here&#8217;s the nut of it:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!01Fe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!01Fe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 424w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 848w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 1272w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!01Fe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png" width="956" height="712" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:712,&quot;width&quot;:956,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:192475,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/187407939?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!01Fe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 424w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 848w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 1272w, https://substackcdn.com/image/fetch/$s_!01Fe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd85bd82-337d-44ce-8a5d-89e2d436c8d0_956x712.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Internet has mostly divided itself into people who already know these allegations are true, because they don&#8217;t trust Meta and <em>of course Meta can read your messages</em> &#8212; and a second set of people who <em>also</em> don&#8217;t trust Meta but mostly think this is unsupported nonsense. Since I&#8217;ve worked on end-to-end encryption for the last 15+ years, and I&#8217;ve specifically focused on the kinds of systems that drive apps like WhatsApp, iMessage and Signal, I tend to fall into the latter group. But that doesn&#8217;t mean there&#8217;s nothing to pay attention to here.</p><p>Hence: in this post I&#8217;m going to talk a little bit about the specifics of WhatsApp encryption; what an allegation like this would imply (technically); we can verify that things like this are true (or not verify, as the case may be). More generally I&#8217;ll try to add some signal to the noise.</p><p><strong>Full disclosure: </strong>back in 2016 I consulted for Facebook (now Meta) for about two weeks, helping them with the rollout of encryption in Facebook Messenger. From time to time I also talk to WhatsApp engineers about new features they&#8217;re considering rolling out. I don&#8217;t get paid for doing this; they once asked me if I&#8217;d consider signing an NDA and I told them I&#8217;d rather not.</p><h2>Background: what&#8217;s end-to-end encryption, and how does WhatsApp claim to do it?</h2><p>Instant messaging apps are pretty ancient technology. Modern IM dates from the 1990s, but the basic ideas go back to the <a href="https://www.facebook.com/groups/dartmouthxyz/posts/10159828079344461/">days of time sharing</a>. Only two major things have really changed in messaging apps since the days of AOL Instant Messenger: the scale, and also the security of these systems.</p><p>In terms of scale, modern messaging apps are unbelievably huge. At the start of the period in the lawsuit, WhatsApp already had more than <a href="https://www.nbcnews.com/tech/mobile/messaging-service-whatsapp-tops-1-billion-monthly-users-n509071">one billion monthly active users</a>. Today that number sits closer to <a href="https://techcrunch.com/2025/05/01/whatsapp-now-has-more-than-3-billion-users/">three billion</a>. This is almost half the planet. In many countries, WhatsApp is more popular than phone calls.</p><p>The downside of vast scale is that apps like this can also collect data at similarly large scale. Every time you send a message through an app like WhatsApp, you&#8217;re sending that data first to a server run by WhatsApp&#8217;s parent company, Meta. That server then stores it and eventually delivers it to your intended recipients. Without great care, this can result in enormous amounts of real-time message collection and long-term storage. The risks here are obvious. Even if you trust your provider, that data can potentially be accessed by hackers, state-sponsored attackers, governments, and anyone who can compel or gain access to Meta&#8217;s platforms.</p><p>To combat this, WhatsApp&#8217;s founders Jan Koum and Brian Acton took a very opinionated approach to the design of their app. Beginning in 2014 (around the time they were acquired by Facebook), the app began rolling out end-to-end (E2E) encryption <a href="https://signal.org/blog/whatsapp-complete/">based on the Signal protocol</a>. This design ensures that all messages sent through Meta/WhatsApp infrastructure are encrypted, both in transit and on Meta&#8217;s servers. By design, the keys required to decrypt messages exist only on a users&#8217; device (the &#8220;end&#8221; in E2E), ensuring that even a malicious platform provider (or hacker of Meta&#8217;s servers) should never be able to read the content of your messages.</p><p>Due to WhatsApp&#8217;s huge scale, the <a href="https://www.whatsapp.com/privacyquestions">adoption of end-to-end encryption</a> on the platform was a <em>very big deal.</em></p><p>Not only does WhatsApp&#8217;s encryption prevent Meta from mining your chat content for advertising or AI training, the deployment of this feature made many governments frantic with worry. The main reason was that even law enforcement can&#8217;t access encrypted messages sent through WhatsApp (at least, not through Meta itself.). To the surprise at many, Koum and Acton made a convert of Facebook&#8217;s CEO, Mark Zuckerberg, who decided to lean into new encryption features across many of the company&#8217;s products, including Facebook Messenger and (optionally) Instagram DMs.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!f4bk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!f4bk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 424w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 848w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 1272w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!f4bk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp" width="364" height="195.5078125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:550,&quot;width&quot;:1024,&quot;resizeWidth&quot;:364,&quot;bytes&quot;:89944,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/187407939?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!f4bk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 424w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 848w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 1272w, https://substackcdn.com/image/fetch/$s_!f4bk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a4ee3ae-4a2f-408a-ade3-ca7d9ddde354_1024x550.webp 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>The state of encryption on major messaging apps in early 2026. Notice that three of these platforms are operated by Meta.</em></p><p>This decision is controversial, and making it has not been cost-free for Meta/Facebook. The deployment of encryption in Meta&#8217;s products has created enormous political friction with the governments of the US, UK, Australia, India and the EU. Each government is concerned about the possibility that Meta will maintain large numbers of messages they cannot access, even with a warrant. For example, in 2019 a <a href="https://www.justice.gov/d9/press-releases/attachments/2019/10/03/open_letter_to_mark_zuckerberg.final_0.pdf">multi-government &#8220;open letter&#8221;</a> signed by US AG William Barr urged Facebook not to expand end-to-end encryption without the addition of &#8220;lawful access&#8221; mechanisms:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lSOz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lSOz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 424w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 848w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 1272w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lSOz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp" width="422" height="283.943359375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:689,&quot;width&quot;:1024,&quot;resizeWidth&quot;:422,&quot;bytes&quot;:123358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/187407939?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lSOz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 424w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 848w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 1272w, https://substackcdn.com/image/fetch/$s_!lSOz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3b7d751-4372-41b1-b624-15998ef73bb1_1024x689.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So that&#8217;s the background. Today WhatsApp describes itself as serving on the order of three billion users worldwide, and <a href="https://www.whatsapp.com/privacyquestions">end-to-end encryption is on by default for personal messaging</a>. They haven&#8217;t once been ambiguous about what they claim to offer. That means that if the allegations in the lawsuit proved to be true, this would be one of the largest <a href="https://www.epa.gov/enforcement/ei-dupont-de-nemours-and-company-and-chemours-company-pfoa-settlements">corporate coverups since Dupont</a>.</p><h2>Are we sure WhatsApp is actually encrypted? Could there be a backdoor?</h2><p>The best thing about end-to-end encryption &#8212; when it works correctly &#8212; is that the encryption is performed in an app <em>on your own phone</em>. In principle, this means that only you and your communication partner have the keys, and all of those keys are under your control. While this sounds perfect, there&#8217;s an obvious caveat: while the app runs on your phone, it&#8217;s a piece of software. And the problem with most software is that you probably didn&#8217;t write it.</p><p>In the case of WhatsApp, the application software is written by a team inside of Meta. This wouldn&#8217;t necessarily be a bad thing if the code was open source, and outside experts could review the implementation. Unfortunately WhatsApp is closed-source, which means that you cannot easily download the source code to see if encryption performed correctly, or performed at all. Nor can you compile your own copy of the WhatsApp app and compare it to the version you download from the Play or App Store. (This is not a crazy thing to hope for: you actually <em>can</em> do those things with <a href="https://github.com/signalapp/Signal-Android/blob/main/reproducible-builds/README.md">open-source apps like Signal.</a>)</p><p>While the company claims to share its code with outside security reviewers, they don&#8217;t publish routine security reviews. None of this is really unusual &#8212; in fact, it&#8217;s extremely normal for most commercial apps! But it means that as a user, you are to some extent <em>trusting</em> that WhatsApp is not running a long-con on its three billion users. If you&#8217;re a distrustful, paranoid person (or if you&#8217;re a security engineer) you&#8217;d probably find this need for trust deeply unappealing.</p><p>Given the closed-source nature of WhatsApp, how do we know that WhatsApp is actually encrypting its data? The company is <a href="https://faq.whatsapp.com/820124435853543/?helpref=hc_fnav">very clear in its claims that it does encrypt</a>. But if we accept the possibility that they&#8217;re lying: is it at least <em>possible</em> that WhatsApp contains a secret &#8220;backdoor&#8221; that causes it to secretly exfiltrate a second copy of each message (or perhaps just the encryption keys) to a special server at Meta?</p><p>I cannot definitively tell you that this is not the case. I can, however, tell, you that if WhatsApp did this, they (1) would get caught, (2) the evidence would almost certainly be visible in WhatsApp&#8217;s application code, and (3) it would expose WhatsApp and Meta to exciting new forms of ruin.</p><p>The most important thing to keep in mind here is that Meta&#8217;s encryption happens on the client application, the one you run on your phone. If the claims in this lawsuit are true, then Meta would have to alter the WhatsApp application so that plaintext (unencrypted) data would be uploaded from your app&#8217;s message database to some infrastructure at Meta, or else the keys would. And<em> </em>this should not be some rare, occasional glitch<em>. </em>The allegations in the lawsuit state that this applied to nearly all users, and for <em>every message ever sent</em> by those users since they signed up.</p><p>Those constraints would tend to make this a very detectable problem. Even if WhatsApp&#8217;s app <em>source code</em> is not public, many historical versions of the compiled <a href="https://www.apkmirror.com/apk/whatsapp-inc/">app are available for download.</a> You can pull one down right now and decompile it using various tools, to see if your data or keys are being exfiltrated. I freely acknowledge that this is a big project that requires specialized expertise &#8212; you will not finish it by yourself in a weekend (as commenters on HN have politely pointed out to me.) Still, reverse-engineering WhatsApp&#8217;s client code is entirely possible and various parts of the app have indeed been <a href="https://www.arxiv.org/pdf/2411.09228">reversed</a> <a href="https://raw.githubusercontent.com/maddiestone/ConPresentations/master/Jailbreak2019.WhatsUpWithWhatsApp.pdf">several</a> <a href="https://www.group-ib.com/blog/whatsapp-forensic-artifacts/?utm_source=chatgpt.com">times</a> by various security researchers. The answer really is knowable, and if there is a crime, then the evidence is almost certainly* right there in the code that we&#8217;re all running on our phones.</p><p>If you&#8217;re going to (metaphorically) commit a crime, doing it in a forensically-detectable manner is very stupid.</p><h2>But WhatsApp is known to leak metadata / backup data / business communications&#8230;!</h2><p>Several online commenters have pointed out that there are loopholes in WhatsApp&#8217;s end-to-end encryption guarantees. These include certain types of data that are explicitly shared with WhatsApp, such as business communications (when you WhatsApp chat with a company, for example.) In fairness, both WhatsApp and the lawsuit are very clear about these exceptions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LHqv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LHqv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 424w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 848w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 1272w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LHqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp" width="1023" height="300" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:300,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:49306,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/187407939?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LHqv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 424w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 848w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 1272w, https://substackcdn.com/image/fetch/$s_!LHqv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb42f23d0-8b56-412b-904c-deaa212e871f_1023x300.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These exceptions are real and important. WhatsApp&#8217;s encryption protects the content of your messages, it does not necessarily protect information about who you&#8217;re talking to, when messages were sent, and how your social graph is structured. WhatsApp&#8217;s own privacy materials talk about how <a href="https://www.whatsapp.com/privacyquestions">personal message content is protected</a> <a href="https://www.whatsapp.com/legal/privacy-policy">while other categories of data exist.</a></p><p>Another big question for any E2E encrypted messaging app is what happens <em>after</em> the encrypted message arrives at your phone and is decrypted. For example, if you choose to back up your phone to a cloud service, this often involves sending plaintext copies of your message to a server that is not under your control. Users really like this, since it means they can re-download their chat history if they lose a phone. But it also presents a security vulnerability, since those cloud backups are not always encrypted.</p><p>Unfortunately, WhatsApp&#8217;s backup situation is complex. Truthfully, it&#8217;s more of a Choose Your Own Adventure novel:</p><ol><li><p><strong>If you use native device backup on iOS or Android devices</strong> (for example, iCloud device backup or the standard Android/Google backup), your WhatsApp message database <em>may be included in a device backup sent to Apple or Google</em>. Whether that backup is end-to-end encrypted depends on what your provider supports and what you&#8217;ve enabled. On Apple platforms, for example, iCloud backups can be end-to-end encrypted if you enable <a href="https://support.apple.com/en-us/108756">Apple&#8217;s Advanced Data Protection</a> feature, but won&#8217;t be otherwise. Note that in both cases, the backup data ends up with Apple or Google and not with Meta as the lawsuit alleges. But this still sucks.</p></li><li><p><strong>WhatsApp has its own backup feature (actually, it has more than one way to do it.) </strong>WhatsApp supports end-to-end encrypted backups that can be protected with a password, a 64-digit key, and (more recently) passkeys. WhatsApp&#8217;s public docs <a href="https://faq.whatsapp.com/490592613091019/?cms_platform=android">are here</a> and WhatsApp&#8217;s engineering writeup of the key-vault design is <a href="https://engineering.fb.com/2021/09/10/security/whatsapp-e2ee-backups/">here</a>. Conceptually, this is an interesting compromise: it reduces what cloud providers can read, but it introduces new key-management and recovery assumptions (and, depending on configuration, new places to attack). Importantly, even if you think backups are a mess &#8212; and they often are &#8212; this is still a far cry from the effortless, universal access alleged in this lawsuit.</p></li></ol><p>Finally, WhatsApp has recently been adding AI features. If you opt into certain AI tools (like message summaries or writing help), some content may be send off-device for processing a system WhatsApp calls &#8220;<a href="https://faq.whatsapp.com/2089630958184255">Private Processing</a>,&#8221; which is built around Trusted Execution Environments (TEEs). WhatsApp&#8217;s user-facing overview is <a href="https://faq.whatsapp.com/2089630958184255">here</a>, Meta&#8217;s technical whitepaper is <a href="https://ai.meta.com/static-resource/private-processing-technical-whitepaper">here</a>, and Meta&#8217;s engineering post is <a href="https://engineering.fb.com/2025/04/29/security/whatsapp-private-processing-ai-tools/">here</a>. This capability should not reveal plaintext data to Meta, either: more importantly, it&#8217;s brand new and much more recent than the allegations int he lawsuit.</p><p>As a technologist, I love to write about the weaknesses and limitations of end-to-end encryption in practice. But it&#8217;s important to be clear: <em>none of these loopholes stuff can account for what&#8217;s being alleged in this lawsuit</em>. This lawsuit is claiming something much more deliberate and ugly.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Trusting trust</h2><p>When I&#8217;m speaking to laypeople, I like to keep things simple. I tell them that cryptography allows us to trust our machines. But this isn&#8217;t really an accurate statement of what cryptography does for us. At the end of the day, all cryptography can really do is <em>extend</em> trust. Encryption protocols like Signal allow us to take some anchor-point we trust &#8212; a machine, a moment in time, a network, a piece of software &#8212; and then spread that trust across time and space. Done well, cryptography allows us to treat hostile networks as safe places; to be confident that our data is secure when we lose our phones; or even to communicate privately in the presence of the most data-hungry corporation on the planet.</p><p>But for this vision of cryptography to make sense, there has to be trust in the first place.</p><p>It&#8217;s been more than forty years since Ken Thompson delivered his famous talk, &#8220;<a href="https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf">Reflections on Trusting Trust</a>&#8220;, which pointed out how <em>there is no avoiding some level of trust</em>. Hence the question here is not: <em>should we trust someone.</em> That decision is already taken. It&#8217;s: should we trust that WhatsApp is not running the biggest fraud in technology history. The decision to trust WhatsApp on this point seems perfectly reasonable to me, in the absence of any concrete evidence to the contrary. In return for making that assumption, you get to communicate with the three billion people who use WhatsApp.</p><p>But this is not the only choice you can make! If you don&#8217;t trust WhatsApp (and there are reasonable non-conspiratorial arguments not to), then the correct answer is to move to another application; I recommend <a href="https://signal.org/">Signal</a>.</p><p><em>Notes:</em></p><p>* Without leaving evidence in the code, WhatsApp could try to compromise the crypto purely on the server side, <em>e.g.,</em> by running <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle attacks</a> against users&#8217; key exchanges. This has even been proposed by <a href="https://blog.cryptographyengineering.com/2018/12/17/on-ghost-users-and-messaging-backdoors/">various government agencies,</a> as a way to attack targeted messaging app users. The main problem with this approach is the need to &#8220;target&#8221;. Performing mass-scale MITM against WhatsApp users in a manner described by this complaint would require (1) disabling the security code system within the app, and (2) hoping that nobody ever notices that WhatsApp servers are distributing the wrong keys. This seems very unlikely to me.</p><p>Yours In Privacy,</p><p>Matthew</p><p><em>Matthew D. Green is a leading cryptographer and Associate Professor at the Johns Hopkins University Information Security Institute, renowned for his pioneering work in privacy-enhancing technologies. He is a co-creator of the Zerocoin and Zerocash protocols, the latter enabling fully anonymous transactions in cryptocurrencies like Zcash through advanced zero-knowledge proofs (zk-SNARKs).</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Putting Signal on Your Computer Makes It Less Secure]]></title><description><![CDATA[Not because of Signal, but because desktops aren&#8217;t built to isolate apps the way phones are.]]></description><link>https://nbtv.substack.com/p/why-i-dont-put-signal-on-my-computer</link><guid isPermaLink="false">https://nbtv.substack.com/p/why-i-dont-put-signal-on-my-computer</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 03 Feb 2026 12:03:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BVuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In my NBTV members&#8217; chat, someone asked me why I don&#8217;t have Signal installed on my computer.</p><p>The answer is because computers are often easier to compromise than phones, and I would be downgrading the awesome privacy and security that Signal gives me by extending my attack surface to my computer. Let me explain.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BVuz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BVuz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BVuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg" width="389" height="218.8125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:389,&quot;bytes&quot;:185488,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/186632402?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BVuz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BVuz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fc37d6b-534f-4330-8493-0978a52f4a37_1280x720.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><a href="https://youtu.be/SIRde_NYoCw">Why I Don&#8217;t Link Signal To My Computer</a></figcaption></figure></div><h2>Phones Are Locked Down by Design</h2><p>Modern smartphones are some of the most locked down consumer devices that have ever existed.</p><p>They do a great job at sandboxing apps.</p><p>Some phone operating systems do a much better job than others (eg GrapheneOS does a <em><strong>great</strong></em> job at this), but in general, phones enforce app sandboxing much more strictly by default than most desktops.</p><p>What this essentially means is that on your phone, every app lives in its own isolated box. It has its own storage, its own permissions, and its own processes. The intention is that one app can&#8217;t just reach over and read another app&#8217;s data, or spy on its memory. If an app wants to access your microphone, your camera, your files, or your contacts, the operating system generally has to explicitly allow it. And you usually see that happen.</p><p>Even if a malicious app gets installed on your phone, the damage it can do to other apps and the OS is usually limited, unless you&#8217;ve granted the app powerful permissions, or unless the attacker breaks out of that sandbox. And that usually requires additional exploits.</p><h2>How Desktops Are Different</h2><p>Now compare that to a desktop computer.</p><p>They don&#8217;t have the same default, enforced sandboxing model as phones.</p><p>On a desktop, most apps run under the same user account. They share access to large parts of the file system. They can often observe or interfere with each other in ways that mobile operating systems simply don&#8217;t allow.</p><p>If malware runs as you on your computer, it often has access to a huge amount of what you do: Your files, clipboard, keyboard input, screen, your apps running.</p><p>Mobile operating systems are built around the assumption that every app is hostile, and try hard to silo them. Desktops are, by default, designed to be cooperative environments for apps.</p><h2>This Isn&#8217;t a Signal Issue</h2><p>This brings us back to Signal. This isn&#8217;t a Signal issue.</p><p>Signal is an extremely well designed, end-to-end encrypted messaging app. On your phone, it benefits from all of the security properties I just described: Strong sandboxing. Hardware-backed key storage. Restricted access to other apps. Limited background surveillance capabilities.</p><p>When you install Signal on your computer, you widen your attack surface from one hardened device to two completely different environments.</p><p>Your computer becomes another place where keys and message data can be targeted. And computers are much easier to target.</p><h2>Why Computers Are Easier to Attack</h2><p>There&#8217;s a reason why zero days on phones are much more valuable. On desktops, attackers often don&#8217;t even need advanced exploits to attack your system. They can use phishing attacks, malicious browser extensions, compromised software updates, and they can install malware disguised as legitimate apps. Once that malware runs, it can often do things like capture your screen, log your keystrokes, or read data from other applications.</p><p>Phishing still exists on phones, but a phishing message does not automatically lead to arbitrary code execution. A malicious app installed from an app store is still trapped inside its sandbox. A fake update prompt cannot actually replace system software. A malicious app pretending to be legitimate does not suddenly gain visibility into your other apps.</p><p>On desktops, however, these same attack paths often are sufficient to compromise the system meaningfully. On phones, they&#8217;re usually not, unless the attacker also has a separate sandbox escape or OS-level exploit.</p><p>So if I&#8217;m using a powerful private communication tool like Signal, I want it to be as private and secure as possible.</p><p>I don&#8217;t need to weaken my protections by installing it on a less trusted system.</p><p>Signal itself is a strong app on either system, but it&#8217;s the computer itself that isn&#8217;t as strong.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Hardware-Backed Security Matters</h2><p>Phones also have another major advantage: Phones often make hardware-backed key storage the default assumption, while desktops vary more.</p><p>Most modern phones have secure enclaves, or trusted execution environments. These isolate cryptographic keys from the rest of the operating system, so that even if parts of the OS are compromised, those keys are much harder to extract.</p><p>On desktops, once you&#8217;re logged in, malware running as your user can often access more secrets and more app data, because more of it is accessible under that same user account.</p><p>Modern computers do have hardware security modules, like TPMs or the Secure Enclave on newer Macs. On desktops, these are heavily used for boot integrity and disk encryption, and some platforms also use them for credentials and key operations during runtime, but it&#8217;s less uniform.</p><p>On phones, secure enclaves are deeply integrated and continue protecting cryptographic keys against extraction even while the device is in active use.</p><p>In essence: Desktops often lean on hardware security heavily for boot and disk encryption, and phones tend to lean on it continuously for app key operations.</p><h2>Security Always Collapses to the Weakest Link</h2><p>So, to circle back, when you link Signal to your computer, you are effectively taking a very well protected environment, your phone, and extending trust to a much weaker one.</p><p>Security always collapses to the weakest link.</p><p>That does not mean that Signal Desktop is bad. It means desktops are inherently riskier environments.</p><p>For many people, that tradeoff is totally reasonable. Convenience matters. Typing on a keyboard is easier. Multitasking is easier.</p><p>But if your threat model includes targeted surveillance, and you rely on sensitive communications, then keeping Signal confined to your phone meaningfully reduces risk.</p><h2>BIG Caveat</h2><p>That being said, I don&#8217;t want people to assume they should do everything on their phone either, or that phones are ALWAYS more secure.</p><p>First, phones are intensely personal devices, and most of us do far too much on them. We carry social media apps and countless third-party apps everywhere we go, and we routinely grant them access to our location, contacts, microphones, and cameras. These devices follow us through our day and capture huge amounts of context about our lives.</p><p>Every app we install also broadens our attack surface. We are trusting countless third parties to write secure code, ship updates, and respond quickly when vulnerabilities are discovered. </p><p>And the phone itself matters too: If your device isn&#8217;t getting regular security patches, all of these protections degrade over time.</p><p>Keep your phone lean, only install what you absolutely need, and absolutely keep it updated.</p><p>One tip that can help you meaningfully reduce risk on your phone is by using a privacy-focused browser instead of downloading a native app for everything. If something works just as well in the browser, do it there, because app permissions tend to be invasive.</p><p>These are some of the ways to keep your phone locked down and as private and secure as possible.</p><h2>TLDR</h2><p>This isn&#8217;t about Signal being unsafe, or about desktops being off limits. It&#8217;s about understanding where different tools are strongest and weakest. Phones are designed to aggressively isolate apps and protect secrets, while desktops are built for flexibility and convenience. When you&#8217;re using a high-stakes private communication tool, it makes sense to keep it inside the most hardened environment you have, while also being disciplined about what you install on that device. If your threat model is lower, I think you can comfortable use these tools in ways that make them easier and sustainable for you. The more we understand how different devices are designed to protect us, the easier it is to place sensitive tools where they&#8217;re actually safest.</p><p>If you have any short questions that you&#8217;d like answered, feel free to add them to the comments section! Maybe we&#8217;ll be able to answer your question in a future article. </p><p>Yours In Privacy,</p><p>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[ChatGPT Basically Told Me "Privacy Is For Criminals."]]></title><description><![CDATA[I asked AI to spell check my article. Instead it censored me.]]></description><link>https://nbtv.substack.com/p/chatgpt-basically-told-me-privacy</link><guid isPermaLink="false">https://nbtv.substack.com/p/chatgpt-basically-told-me-privacy</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 27 Jan 2026 13:15:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zy7H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week, I wrote a <a href="https://nbtv.substack.com/p/they-asked-for-my-cell-number-i-dont">newsletter</a> about what to do when a website demands a phone number and you do not want to give one.</p><p>I personally do not have a cell number. I don&#8217;t have a SIM in my phone -- I rely entirely on VoIP.</p><p>But even if you do have a cell number, there are many reasons not to hand it over. In my newsletter I mentioned how a phone number is a powerful unique identifier. We are trained to give it to almost everyone, which makes it trivial for data brokers and breach harvesters to link together our accounts, movements, and behavior across the internet.</p><p><strong>Today&#8217;s newsletter is about an alarming thing happened in the process of writing that last one.</strong></p><p>As part of my usual workflow, I ran the draft through an AI tool to check for typos, grammar, and phrasing. I often use AI for this, in this case ChatGPT. It is far more capable than a basic spell checker. It can tell the difference between diffuse and defuse, affect and effect, foment and ferment, and then automatically formats it for me with the right sized headings etc. </p><p>But instead of a check for typos, the AI censored me.</p><p>I had included a list of companies I personally use and recommend. The AI deleted the names and replaced them with a refusal, saying it could not list specific services.</p><p>I mentioned that some of these services accept cryptocurrency, which can be a more private way to pay. The reference to crypto was removed entirely.</p><p>I asked why I had been censored, and the AI said that privacy tools can be used for wrongdoing, and therefore it should not help write a how-to guide about achieving privacy. Even after acknowledging that my newsletter was aimed at everyday people doing nothing illegal, it maintained that helping people learn privacy techniques could be misused, so it should not exist.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zy7H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zy7H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zy7H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png" width="724" height="521.1208791208791" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5929210-013a-4955-838a-97cf59512bbc_1456x1048.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:724,&quot;bytes&quot;:353482,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/185891160?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zy7H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 424w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 848w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 1272w, https://substackcdn.com/image/fetch/$s_!zy7H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5929210-013a-4955-838a-97cf59512bbc_1456x1048.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There it was. The familiar smear that privacy is for criminals, so normalized that even an AI now repeats it without question.</p><p>First off, apologies for any typos that made their way into my last email, obviously I went with my original and not the censored version.</p><p>Now, I have three main takeaways from this experience that I want to talk about in this newsletter. The first is obvious, but the others are super important ones that I think many may miss. </p><h2>1. Censorship and the shaping of thought</h2><p>The most immediate lesson is the danger of AI censorship.</p><p>If we centralize knowledge into single system, that knowledge becomes easier to control. Right now there are a handful of major models out there that have immense power when it comes to quietly filtering, reshaping, and rewriting what we think to be true. What people are allowed to ask, learn, or express becomes mediated through these models and the values embedded in them.</p><p>This is why decentralization and competition amongst models matters. If society converges on a single or a handful of AI authorities, we also converge on the definition of acceptable truth.</p><p>What worries me even more is how deeply these systems are being integrated into everyday tools. Word processors. Email clients. Messaging apps. Website interfaces.</p><p>Are we heading towards a world where software scans your words before you send them, and quietly rewrites them to a more acceptable format first? Client-side filtering of wrongthink before a message ever leaves your device is not that farfetched. </p><p>There are two other, more nuanced takeaways I want to talk about. </p><h2>2. These are not the AI&#8217;s views. They are ours.</h2><p>It is tempting to blame the AI company only.</p><p>&#8220;They censored me!&#8221;</p><p>Yes, ChatGPT fine-tunes its models and adds safeguards around certain categories of information, including what it will and will not help with. There may be rules along the lines of &#8220;don&#8217;t help people bypass verification systems.&#8221;</p><p>Is that what happened here? Possibly. </p><p>But I would be far more convinced this was deliberate, privacy-specific censorship if I were not already so aware that much of society holds the same view. </p><p>Large language models are trained on us. What the AI told me was a reflection of a widely accepted cultural assumption about privacy itself.</p><p>Specifically, AI models are trained on enormous datasets. They ingest vast amounts of writing, ideas, and information, then learn the patterns within that data in order to generate language that sounds coherent and meaningful. They absorb patterns from the internet.</p><p>And increasingly for a generation, society has been repeating over and over that privacy is for criminals.</p><p>&#8220;If you have nothing to hide, you have nothing to fear.&#8221;</p><p>&#8220;If you want privacy, you must be doing something wrong.&#8221;</p><p>Privacy has been reframed as deviant and shameful behavior. Law-abiding people are expected to be ok with being transparent, even as their data is leaked, sold, breached, and abused.</p><p>An AI trained on data expressing this worldview will reproduce it.</p><p>AI is reflecting our views. It implied that normal people do not need privacy, and that helping people protect themselves is inherently suspect.</p><p>If we want a different future, we cannot just fight models. We have to fight the cultural assumptions being fed into them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>3. We must contribute to the knowledge base now</h2><p>This leads to the most important point I want to make.</p><p>Right now, AI systems are being trained at an enormous scale. They are ingesting the internet as it exists today.</p><p>What gets written now will shape what future models believe is normal.</p><p>If the only articles it is ingesting about privacy frame it as criminal, extremist, or unnecessary, then that becomes the default assumption encoded into future LLMs.</p><div class="pullquote"><p>We need to contribute to the knowledge base around privacy, and create more content that treats privacy as normal, and as foundational to a free society. We need guides that explain privacy tools without apology. Essays that explain why consent matters. Stories that show privacy as something ordinary people use in ordinary lives.</p></div><p>We need to write this content now. In fact, we need to create as much content as we can. </p><p>Not only to shift culture and spread the case for privacy now, but so that tomorrow&#8217;s AI models are trained on OUR perspective, not on the narratives pushed by anti-privacy propagandists. AI isn&#8217;t going anywhere, and these models will go on to influence future generations. So we have to make sure they represent our worldview by contributing to the knowledge base.</p><p>Hundreds of thousands of people watch our videos and read our work. Imagine if even a fraction of them wrote a blog post, recorded a video, or shared a clear explanation of why privacy matters.</p><p>We have an incredibly powerful grassroots movement growing around privacy. But we all need to contribute if we want to win. Because this window of opportunity where privacy is still allowed won&#8217;t be open forever. So get active. Get creating. See if you can find a way today to post something in favor of privacy, and shift the training data back in our favor.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xfNV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xfNV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xfNV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png" width="370" height="207.36263736263737" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:370,&quot;bytes&quot;:6072687,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/185891160?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xfNV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!xfNV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3431c5db-f2d2-4cf5-8667-c6248948da20_2912x1632.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>By the way, I ran my final newsletter through <a href="https://confer.to">Confer.to</a> this time, a new private, end-to-end encrypted LLM created by Moxie Marlinspike, the founder of Signal. Another way we can build a better future is to support those tools that are trying to protect us. A good lesson for all of us, including me.</em></p><p>Yours In Privacy,</p><p>Naomi</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[They Asked for My Cell Number. I Don’t Have One.]]></title><description><![CDATA[What to do if you're asked for your cell number, and you don't want to hand it over.]]></description><link>https://nbtv.substack.com/p/they-asked-for-my-cell-number-i-dont</link><guid isPermaLink="false">https://nbtv.substack.com/p/they-asked-for-my-cell-number-i-dont</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Sun, 18 Jan 2026 00:17:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jYZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I just tried to set up a new account, and it asked for my phone number.<br>Not a VoIP number. It demanded a real SIM-based cell number.</p><p>The problem is that I don&#8217;t have a SIM in my phone. Which means that I actually don&#8217;t have a cell number, the number associated with a SIM.</p><p>What should someone do in a situation like this?</p><p>Now I know I&#8217;m an anomaly here. Most people DO have a cell number.<br>But there are plenty of reasons someone might decide not to hand out their cell number every time a company asks. Here are two:</p><ol><li><p>One big reason is that we end up giving out the same cell number to everyone. Thousands of merchants, restaurants, our doctor, school, the government, work colleagues. It becomes a unique identifier tying all our activities together. Almost every service you use shares data about you, and that data makes its way to data brokers. With the same cell number linking every account that you use, data brokers can now see everything you&#8217;re doing. So can criminals on the dark web: all of this data ends up in dark web breaches too. Anyone digging through those data dumps can tie your scattered accounts together and piece together an intimate picture of your life.</p></li><li><p>Cell numbers are tied to the telecom network in a way that creates an additional privacy risk. Cellular networks keep track of where your phone is so they can route calls and texts. That is part of how the system works. Cell numbers record your location in what&#8217;s known as a Home Location Registry, and this becomes a map of everywhere you&#8217;ve been. Telecom providers are notorious for selling your location data. Unlike cell numbers, VoIP numbers don&#8217;t actually get logged in the HLR, so it&#8217;s much safer to give someone a VoIP number than a cell number.</p></li></ol><p>In this newsletter, I&#8217;ll walk through a few scenarios where you might be asked for your number, and how to avoid giving up your SIM-based identity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jYZQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jYZQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jYZQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png" width="1456" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6589949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/184913850?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jYZQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!jYZQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3415f8a2-5e3a-4272-917d-23cc4f2d34aa_2912x1632.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>1. In Person: my default line</h2><p>If someone in person asks for my number, and I know it&#8217;s not actually necessary, I tell them:<br>&#8220;I don&#8217;t currently have a working number.&#8221;<br>Here&#8217;s what I&#8217;ve learned after doing this for years.<br>If you say &#8220;I don&#8217;t have a phone&#8221; or &#8220;I don&#8217;t have a number,&#8221; people often don&#8217;t believe you, or they get hostile. You get the &#8220;well you need one to enter in our system&#8221; pushback.<br>But &#8220;I don&#8217;t <strong>CURRENTLY</strong> have a <strong>working</strong> number&#8221; sounds like your phone broke or you are between plans. It gives them a socially acceptable reason to move on. If you are polite and even a little apologetic, they often waive the requirement.</p><h2>2. Online: VoIP is the best default</h2><p>If you are dealing with businesses online, they often force you to enter a number.<br>For important accounts, you can get up to 9 VoIP numbers using <a href="https://anonyome.com/individuals/mysudo/">MySudo</a>, where you can receive SMS and calls just like cell numbers (GrapheneOS users will have trouble getting calls in real time, but can receive voice mail fine). You can keep those numbers as long as you keep paying for your plan.</p><p>For important numbers, I have different numbers I use for different purposes: Work, friends, shopping, medical, etc.</p><p>If you want to generate a new number for every service you use, you can get hundreds of VoIP numbers using <a href="https://www.cloaked.com/">Cloaked.com</a>.</p><p>I do this for all burner accounts, restaurant reservations, one-time purchases, etc.</p><p>VoIP numbers will almost always work. But there are some entities that don&#8217;t accept them. Let&#8217;s go over what to do in those situations.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>3. If VoIP is rejected and the account is not important</h2><p>If VoIP is rejected and you need a SIM-based number for a low importance account, some people use temporary number rental services.<br><a href="https://www.smspool.net/">Smspool.net</a> is one option you can use: You deposit money in your account, and can rent a number cheaply just to receive a one-time code. You can also pay in cryptocurrency, including many privacy coins, which is super convenient.</p><p>Some platforms require a number when you first register your account, but afterwards you can go into your settings and change the number to anything, including VoIP. If that&#8217;s the case, you can rent a temporary number just for sign up, and then go into your new account and switch the number out.</p><p>There are other services that demand SMS verification every time you sign in, and if you lose access to this number you will lose access to your account. If this is the case, you don&#8217;t want to put a temporary number.</p><p>One tip is to rent a number for at least an hour: This gives you a little more time to see if this account is going to require this number for ongoing identification each time you use the account, and whether you&#8217;ll be blocked from your account if you lose access to your number. If you do require ongoing use of a number, you can rent a number long term, but that can get pricey. I recommend a more permanent solution, so let&#8217;s talk other options.</p><h2>4. If you need a number long term: keep a dedicated SIM you control</h2><p>If you need to provide a SIM-based number on an ongoing basis, you can buy a prepaid SIM. Just make sure that you maintain access to it. That means keeping it active so you do not lose the number, and being sure to top it up when needed. You can also use services like <a href="https://www.bitrefill.com/us/en/">Bitrefill</a> to top up your prepaid SIM.<br>Then whenever a company insists on a &#8220;real&#8221; cell number, you have one. But it is not the same number you give to everyone.</p><h2>Why some providers block VoIP:</h2><p>As mentioned, sometimes services reject VoIP numbers, and ask for a &#8220;real&#8221; cell number. This usually happens for one of two reasons:</p><h4>1. The sender blocks VoIP numbers for KYC reasons.</h4><p>This isn&#8217;t a usually a technical limitation, they do this because SIM-based numbers are generally better to KYC someone. Some banks and websites check whether your number is classified as a cell-based number or a VoIP number, and they simply block you if the number is classified as VoIP. They just don&#8217;t like VoIP.</p><h4>2. The sender blocks VoIP numbers for fear of compatibility issues.</h4><p>Some VoIP providers don&#8217;t support short code delivery. Short codes, like 5 digit verification codes, actually aren&#8217;t like normal SMS:</p><p>Think of your phone number like a mailbox, and texting like mail delivery. Most texts are &#8220;regular mail&#8221; that almost any mailbox can receive. But short code texts are more like a special kind of delivery service that uses different routes and rules than regular SMS. Behind the scenes, phone service is not one single thing. Providers turn on different capabilities depending on how a number is set up. Short codes are one of these capabilities you can switch on or off. </p><p>With VoIP numbers, the provider that issued the number (and the upstream carrier they route messages through) may simply not support short code routing for that number type. So even if your VoIP number can receive standard texts, it might not be provisioned with the right carrier connectivity to accept short code messages.</p><p>Because there&#8217;s a chance some VoIP numbers might not work with a company&#8217;s messaging system, they might decide to simply block all VoIP numbers.</p><h2>The Cell to VoIP Trick (with caveats)</h2><p>Sometimes a company checks your number at registration to confirm it is a cell number, but after that, they never check again. In those cases, one approach is to use a SIM based number initially, then later port that number to a VoIP provider (like MySudo). You will continue to get access to that number, but now it&#8217;s cheaper to maintain, and the VoIP number isn&#8217;t being logged in any HLR.</p><p>But there is a caveat: as mentioned, some VoIP numbers can&#8217;t receive short codes. So after a number becomes VoIP, you may stop receiving some verification codes. This is something you have to test. You do not want to be stuck unable to receive SMS codes when you need to log in.</p><p>In my experience, most codes reach VoIP numbers.</p><p>Maybe 5% of the time, I can&#8217;t get codes, but they give me a call option instead, which works just as well.</p><p>But occasionally, a specific short code just will not deliver to a particular VoIP setup. If that happens, you may need to try a different VoIP provider, or keep a SIM based number for that specific account.</p><h2>The bigger point</h2><p>Data collection today is normalized and invasive. Everyone wants your home address, your phone number, your social accounts, and every identifier that makes it easier to map your life and sell it.</p><p>You do not have to make it easy for them.</p><p>In the digital era, &#8220;just type your number&#8221; is treated like a harmless formality.</p><p>But it&#8217;s not harmless. Every extra identifier makes it easier to map your life.</p><p>So let&#8217;s stop volunteering this information, and let&#8217;s instead make it normal to push back. Where we can, let&#8217;s opt to give companies what they need to provide the service, and nothing more.</p><p>Yours In Privacy,</p><p>Naomi</p><p>**As always, this newsletter was not sponsored. These are just tools that I personally use and like. If you have tools that you recommend people try out, let them know in the comments!</p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[How One Person Replaced Big Tech Without Going Off the Grid]]></title><description><![CDATA[Privacy Tools You Can Start Using Today.]]></description><link>https://nbtv.substack.com/p/how-one-person-replaced-big-tech</link><guid isPermaLink="false">https://nbtv.substack.com/p/how-one-person-replaced-big-tech</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Sat, 10 Jan 2026 21:33:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wJv6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Many people want to improve their privacy, but they don&#8217;t know what tools to use.</strong></p><p><strong>What&#8217;s the best email provider?<br>What&#8217;s the best note-taking app?<br>What&#8217;s the best phone?</strong></p><p><strong>The annoying answer is: it depends.</strong></p><p><strong>It depends on your threat model (what you&#8217;re protecting yourself from), your convenience threshold (how much friction you&#8217;ll actually tolerate), and what tradeoffs you&#8217;re willing to live with (how much you want to trust a company, how well a tool fits into your life, whether it works smoothly with the people you communicate with, etc.).</strong></p><p><strong>Sometimes I share specific tools that I use, in case it gives people ideas or a place to start. But the truth is, there isn&#8217;t one perfect stack. Different people have different setups, and that&#8217;s a good thing.</strong></p><p><strong>So today, I want to share a list of favorite tools from one of our community members, <a href="https://incognitocat.me/">Incognito Cat</a>. It&#8217;s a great overview of privacy-respecting alternatives you can swap into your life without feeling like you have to go off the grid. I&#8217;ve also added a few editor notes throughout with some other options I like, depending on what you&#8217;re optimizing for.</strong></p><p><strong>And if you have tools you love, drop them in the comments. The goal is simple: give people a bigger menu of tech that respects you as a user, so you&#8217;re not stuck in ecosystems that treat you like a data source.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wJv6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wJv6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 424w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 848w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 1272w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wJv6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png" width="324" height="181.8" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:404,&quot;width&quot;:720,&quot;resizeWidth&quot;:324,&quot;bytes&quot;:373352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/184152600?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wJv6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 424w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 848w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 1272w, https://substackcdn.com/image/fetch/$s_!wJv6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62919a1e-77f7-4b40-88ee-f1d8f4fddcea_720x404.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><em><strong>Guest post by Incognito Cat:</strong></em></p><h3>Privacy Toolbox</h3><p>Just starting your privacy journey or curious what others are using for theirs? This list was first developed in 2024 to get the conversation started and reflects our current Privacy Toolbox.</p><p>Is this a comprehensive list of all tool available in each category?<br>Not even close!</p><p>This toolbox represents a solution for the particulars of our use cases, as outlined in the Guiding Principles. And if you&#8217;re unfamiliar with what is available to replace the apps that shipped with your desktop or mobile device, this is a great place to start.</p><p>We only discuss tools and solutions that we have personal experience with and use on a regular basis. Since privacy is a journey and not a destination, this list has and will continue to evolve with time. The links for each website will be listed next to the tool, where applicable. If a &#8220;Privacy Tool Spotlight&#8221; is available, going into greater detail about the tool, the link is next to it.</p><h3>Guiding Principles</h3><ul><li><p>Privacy Forward Alternatives: Solutions that preserve privacy by blocking trackers, data mining, and/or using end-to-end, zero-knowledge encryption.</p></li><li><p>Daily Use: I only recommend solutions that I personally use every day.</p></li><li><p>Support: If I&#8217;m not paying for it, I&#8217;m donating to its cause. I&#8217;m neither an employee, spokesman, or in any affiliate programs.</p></li><li><p>Usability: It should be as easy to use as any mainstream software it&#8217;s replacing, encouraging adoption by all. Even my in-laws.</p></li><li><p>Cross-Platform: It must run across Windows, MacOS, Linux, iOS, and Android/GrapheneOS where applicable.</p></li><li><p>Bonus points: Free and open-source software (FOSS), available on <a href="https://f-droid.org/">F-Droid</a>, and able to run without Google Play Services.</p></li></ul><h3>Keep in mind that...</h3><p>The best privacy and security results rely on multiple tools working together.</p><p>Now to my ever-evolving toolbox:</p><ul><li><p><strong>Browser:</strong></p><ul><li><p><a href="https://brave.com/">Brave Browser</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-brave-browser/">&#128270; Tool Spotlight</a>)</p></li><li><p><a href="https://mullvad.net/en/browser">Mullvad Browser</a></p></li></ul></li></ul><p><em>(Editor note: Mullvad is only available on desktop. For a good comparison of browser privacy visit <a href="https://privacytests.org">Privacy Tests</a>)</em></p><ul><li><p><strong>Anonymous Browser</strong>:</p><ul><li><p><a href="https://www.torproject.org/">Tor Browser</a></p></li></ul></li><li><p><strong>Search:</strong></p><ul><li><p><a href="https://search.brave.com/">Brave Search</a> </p></li></ul><ul><li><p><a href="https://www.startpage.com/">Startpage</a> (<a href="https://incognitocat.me/your-search-history-tells-a-story-keep-it-private/">&#128270; Tool Spotlight</a>)</p></li></ul></li><li><p><strong>Desktop Browser Extensions:</strong></p><ul><li><p><a href="https://1password.com/">1Password</a></p></li><li><p><a href="https://privacybadger.org/">PrivacyBadger</a></p></li><li><p><a href="https://ublockorigin.com/">uBlock Origin</a></p></li></ul></li></ul><p><em>(Editor note: having multiple browser extensions installed increases your attack surface, also makes you more easily fingerprintable. I recommend that the only browser extension you install be your password manager)</em></p><ul><li><p><strong>Password Manager</strong>:</p><ul><li><p><a href="https://1password.com/">1Password</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-1password/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: some other good options include Dashlane, Bitwarden, or if you want to store your passwords locally only, KeepassXC &#8212; but just be sure to have backups)</em></p><ul><li><p><strong>2FA Authenticator</strong>:</p></li><li><p><a href="https://ente.io/auth/">Enteio Auth</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-ente-auth/">&#128270; Tool Spotlight</a>)</p></li></ul><p><em>(Editor note: For Android and GrapheneOS, Aegis is also a good option)</em></p><ul><li><p><strong>Hardware 2FA</strong>:</p><ul><li><p><a href="https://www.yubico.com/">Yubico YubiKey</a> (Be sure to have two! <a href="https://incognitocat.me/privacy-tool-spotlight-yubikey/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: the Yubico &#8220;YubiKey&#8221; is a specific model that supports multiple different protocols. The Yubico &#8220;Security Key&#8221; model is the cheapest option and sufficient for U2F)</em></p><ul><li><p><strong>Messenger</strong>:</p><ul><li><p><a href="https://signal.org/">Signal Messenger</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-signal-messenger/">&#128270; Tool Spotlight</a>) </p></li><li><p><a href="https://molly.im/">Molly</a> (A Signal fork)</p></li><li><p><a href="https://simplex.chat/">SimpleX Chat</a> (A decentralized instant messenger that doesn&#8217;t depend on any unique identifiers. An effective tool against censorship)</p></li></ul></li></ul><p><em>(Editor note: SimpleX is a great decentralized tool, and we have an <a href="https://ludlowinstitute.org/community">NBTV community chat </a>on there, but keep in mind that it doesn&#8217;t have the same polish as Signal)</em></p><ul><li><p><strong>Privacy Ecosystem:</strong></p><ul><li><p><strong><a href="https://proton.me/">Proton</a>:</strong> Family Plan that includes the following:</p><ul><li><p>VPN:</p><p><a href="https://protonvpn.com/">ProtonVPN</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-proton-vpn/">&#128270; Tool Spotlight</a>)</p></li><li><p>Email:</p><p><a href="https://proton.me/mail">ProtonMail</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-proton-mail/">&#128270; Tool Spotlight</a>)</p></li><li><p>Alias Email Addresses:</p><p><a href="https://proton.me/pass">Proton Pass</a> with <a href="https://simplelogin.io/">SimpleLogin</a></p></li><li><p>Calendar: </p><p><a href="https://proton.me/calendar">Proton Calendar</a></p></li><li><p>Cloud Storage:</p><p><a href="https://proton.me/drive">Proton Drive</a></p></li></ul><p><strong>Note: </strong>Proton does offer a useful free tier available to test each service out</p></li></ul></li></ul><p><em>(Editor note: I use the collaborative docs and sheets in the Proton ecosystem also. They don&#8217;t have quite the same functionality as Google docs and sheets, but they have improved dramatically over the past year and are sufficient for my organization&#8217;s needs)</em></p><ul><li><p><strong>Alternative Email</strong>:</p><ul><li><p><a href="https://tuta.com/">Tuta</a> (Free tier available for testing | primary &amp; backup email should be on secure &amp; private services)</p></li></ul></li></ul><p><em>(Editor note: <a href="https://www.startmail.com/">Startmail</a> is another E2EE email that you can try)</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Ludlow Institute&#8217;s NBTV Newsletter is funded by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>Notes</strong>:</p><ul><li><p><a href="https://notesnook.com/">Notesnook</a> (Free tier available for testing | <a href="https://incognitocat.me/privacy-tool-spotlight-notesnook/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: Obsidian is also a useful note-taking app that you can sync privately across devices)</em></p><ul><li><p><strong>Photo Storage</strong>:</p><ul><li><p><a href="https://ente.io/">Enteio Photos</a> (Free tier available for testing |<a href="https://incognitocat.me/privacy-tool-spotlight-ente-photos/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor&#8217;s note: I automatically back up my photos to Proton drive with their automated backup feature, and find it simple and easy. My understanding that Ente is also simple, with added functionality for family album sharing.)</em></p><ul><li><p><strong>Maps</strong>:</p><ul><li><p><a href="https://www.openstreetmap.org/">OpenStreetMap</a> (for desktop)</p></li><li><p><a href="https://organicmaps.app/">Organic Maps</a> (for mobile | <a href="https://incognitocat.me/privacy-tool-spotlight-organic-maps/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: Google Maps is a difficult tool to replace. I like the tools above, but sometime there can be inaccuracies. You can always keep Google maps on a siloed profile on your GrapheneOS device for emergencies)</em></p><ul><li><p><strong>Virtual Payments</strong>:</p><ul><li><p><a href="https://www.privacy.com/">Privacy.com</a> (Free tier available for testing |<a href="https://incognitocat.me/privacy-tool-spotlight-privacycom/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: This is an example of a masked credit card. You need to KYC yourself to privacy.com, but using this service allows you to hide your real name, billing address, and real credit/debit card number from merchants, and it can also help shield where you shop from your bank.)</em></p><ul><li><p><strong>VoIP Phone Numbers</strong>:</p><ul><li><p><a href="https://www.cloaked.com/">Cloaked</a></p></li></ul></li></ul><p><em>(Editor note: I also use <a href="https://anonyome.com/individuals/mysudo/">MySudo</a> for VoIP numbers)</em></p><ul><li><p><strong>Personal Data Removal</strong>:</p><ul><li><p><a href="https://www.optery.com/">Optery</a> (Free tier available for testing | <a href="https://incognitocat.me/privacy-tool-spotlight-optery/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: In many cases you have to provide ID to removal services in order to use them. I recommend <a href="https://inteltechniques.com/workbook.html">Michael Bazzel&#8217;s free workbook</a>, that shows you how to remove your information yourself)</em></p><ul><li><p><strong>Videos</strong>:</p><ul><li><p><a href="https://odysee.com/">Odysee</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-odysee/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p><em>(Editor note: I encourage people to branch out and use alternatives to YouTube, such as Odysee, to create a network effect elsewhere. If there are videos you can only find on YouTube, you can at least use a more privacy-preserving front-end for YouTube. Invidious is one example of a open-source front-end, and <a href="https://Yewtu.be">Yewtu.be</a> is one specific Invidious instance. Just keep in mind that you are trusting the instance operator with your searches.)</em></p><h3>For my devices:</h3><ul><li><p><strong>Desktop OS</strong>:</p><ul><li><p><a href="https://ubuntu.com/desktop">Ubuntu Linux</a></p></li></ul></li><li><p><strong>Smartphone OS</strong>:</p><ul><li><p><a href="https://grapheneos.org/">GrapheneOS</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-grapheneos/">&#128270; Tool Spotlight</a>)</p></li></ul></li><li><p><strong>Privacy Keyboard: </strong></p><ul><li><p><a href="https://keyboard.futo.org/">Futo Keyboard</a> (Free tier available for testing)</p></li></ul></li></ul><ul><li><p><strong>App Store:</strong></p><ul><li><p><a href="https://f-droid.org/">F-Droid</a> (F-Droid is a free and open-source app store and software repository for Android, but with a focus on free and open-source software [FOSS])</p></li><li><p><a href="https://auroraoss.com/aurora-store">Aurora Store</a> (Aurora Store is a privacy-focused alternative to the official Google Play Store application)</p></li></ul></li></ul><ul><li><p><strong>Office Suite</strong>:</p><ul><li><p><a href="https://www.libreoffice.org/">LibreOffice</a></p></li></ul></li><li><p><strong>Desktop Privacy Utility</strong>: </p><ul><li><p><a href="https://privacy.sexy/">Privacy.sexy</a> (A tool to maximize privacy and security settings on Windows, macOS, and Linux. And nothing else. | <a href="https://incognitocat.me/scripted-privacy-privacysexy/">&#128270; Tool Spotlight</a>)</p></li></ul></li><li><p><strong>Encrypted Portable Storage</strong>: </p><ul><li><p><a href="https://apricorn.com/flash-keys/">Aegis Secure Key</a> (<a href="https://incognitocat.me/keeping-your-data-safe-on-the-go/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><ul><li><p><strong>Faraday Phone Sleeve</strong>:</p><ul><li><p><a href="https://mosequipment.com/products/mission-darkness-dry-shield-faraday-phone-sleeve">Mission Darkness Dry Shield Faraday Phone Sleeve</a>. (Make your phone invisible to trackers and hackers | <a href="https://incognitocat.me/going-dark-why-you-need-a-faraday-bag/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><ul><li><p><strong>Privacy Screen Protector</strong>:</p><ul><li><p>Various. As mobile screens get bigger and brighter, the easier they are for others to read at a distance. (<a href="https://incognitocat.me/dont-be-a-digital-lighthouse-why-you-need-a-privacy-screen/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><ul><li><p><strong>USB Data Blocker</strong>: </p><ul><li><p>JSAUX USB Data Blocker &amp; USB C Data Blocker. Goes between your device and any unknown cable and/or power source to prevent direct USB attacks, like the O.M.G cable. (<a href="https://incognitocat.me/charge-smart-the-risks-of-unknown-cables-and-public-usb-ports/">&#128270; Tool Spotlight</a>)</p></li></ul></li><li><p><strong>Smart Home Automation:</strong></p><ul><li><p><a href="https://www.home-assistant.io/">Home Assistant</a> (<a href="https://incognitocat.me/ditch-the-spies-building-a-private-smart-home-with-home-assistant/">&#128270; Tool Spotlight</a>)</p></li><li><p>Voice Controller: <a href="https://www.home-assistant.io/voice-pe/">Home Assistant Voice Preview Edition</a></p></li></ul></li><li><p><strong>AI:</strong></p><ul><li><p><a href="https://ollama.com/">Ollama</a> (<a href="https://incognitocat.me/privacy-tool-spotlight-ollama/">&#128270; Tool Spotlight</a>)</p></li></ul></li><li><p><strong>Wikipedia Online Alternative:</strong> </p><ul><li><p><a href="https://kiwix.org/">Kiwix Offline</a> (<a href="https://incognitocat.me/host-wikipedia-offline-with-kiwix/">&#128270; Tool Spotlight</a>)</p></li></ul></li></ul><p></p><p>Remember, we may not have anything to hide, but we have everything to protect.</p><p>- Incognito Cat</p><p></p><p><em>Final editor note: we don&#8217;t do show sponsors or have article sponsors. These are simply examples of privacy tools that Incognito Cat or I personally use. If you have suggestions for tools you love, please let everyone know in the comments!</em></p><p><em>Yours In Privacy,</em></p><p><em>Naomi</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[3 Things You Need To Fix This Year]]></title><description><![CDATA[The simplest way to dramatically improve your privacy in 2026]]></description><link>https://nbtv.substack.com/p/3-things-you-need-to-fix-this-year</link><guid isPermaLink="false">https://nbtv.substack.com/p/3-things-you-need-to-fix-this-year</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Sat, 03 Jan 2026 04:06:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vlQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It&#8217;s a new year, and a perfect time for fresh starts. Especially when it comes to privacy.</p><p>You&#8217;re probably reading this newsletter because you care about privacy. But caring about privacy doesn&#8217;t always mean knowing where to begin. In fact, many people feel overwhelmed when they first start thinking about how to protect themselves.</p><p>This newsletter is for you. And for anyone in your life who knows privacy matters, but has been putting off that first step.</p><p>We will go over three small things you can change right now that will have a huge impact on your privacy in 2026.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vlQ5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vlQ5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vlQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg" width="338" height="190.125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:338,&quot;bytes&quot;:1321110,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/183312335?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vlQ5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vlQ5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc604ddd0-df79-46de-9f79-05bbe9aa971d_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><strong><a href="https://www.youtube.com/watch?v=PgIxxWDRpbA">3 Privacy Fixes Most People Never Make</a></strong></figcaption></figure></div><h3>Email</h3><p>Let&#8217;s start with email, because it&#8217;s an essential tool in most people&#8217;s lives, and is a really easy one to make more private.</p><p>Switching email might sound like a massive and intimidating step. But stick with me. The first step to better email privacy is smaller than you think. It is just about getting started.</p><p>Statistically speaking, almost everyone reading this probably uses a non-private email provider, like Gmail.</p><p>You probably got set up a long time ago, and now you&#8217;re just using it out of habit.</p><p>What&#8217;s wrong with using a non-private provider? Well, let&#8217;s look at Gmail in particular. It is absolutely horrible for privacy.</p><p>Gmail is scanning and analyzing the contents of every private message. That includes personal conversations, work correspondence, health-related messages, financial information, and everything else that passes through your inbox.</p><p>Advertising is, after all, Google&#8217;s core business model. In fact, advertising makes up roughly 78 percent of Google&#8217;s revenue.</p><p>So email is one of the first things I recommend changing, because the impact it has on your privacy is huge.</p><p>There are many private email services you could use instead, like <a href="https://tuta.com/">Tuta</a>, <a href="https://www.startmail.com/">Startmail</a>, and <a href="https://proton.me/mail">Proton</a>.</p><p>I personally use Proton. One of the reasons Proton is such an easy place to start is that they have a button that allows you to automatically import your entire history of emails into Proton from your existing Gmail account or other major provider.</p><p>If you&#8217;ve had your old email for decades, you don&#8217;t need to immediately abandon it. Just take the first small step: Create a new email address on Proton, at first for free if you&#8217;d like, and just get it set up for now.</p><p>Your new email account will be waiting for you whenever you&#8217;re ready to start using it. And when that time comes, you can slowly transition people over to it. Start responding to emails from your new address and let people know you have a new one.</p><p>But the important part is this: take that first step and get the account set up, ready to go.</p><h3>Messaging</h3><p>The next thing that is easy to tackle right away this new year is messaging.</p><p>Most people still rely heavily on SMS or social media DMs to talk to family, friends, and coworkers. And it&#8217;s largely because it&#8217;s what everyone else is using.</p><p>The problem is that SMS wasn&#8217;t designed to be private. In fact, it was specifically designed to be non-private. It runs through telecom infrastructure that&#8217;s built for monitoring and interception. Basically every country in the world has <a href="https://iclg.com/practice-areas/telecoms-media-and-internet-laws-and-regulations/us">lawful intercept regulations.</a> And most social media messaging platforms are tied to advertising business models. They log and analyze every communication to serve better ads, and potentially to sell that data to others.</p><p>It&#8217;s much better to use a messaging platform that is end-to-end encrypted, which means that the messaging platform itself can&#8217;t even read your messages, and that collects as little metadata about users as possible. One option is <a href="https://signal.org/">Signal</a>.</p><p>It takes about 30 seconds to set up. Seriously. You download the app, confirm the number you want attached, and you&#8217;re good to go.</p><p>What surprises most people when they install Signal is how many of their contacts are already there. Estimates put Signal at around 70 to 100 million users, so it&#8217;s much more likely than people expect that they&#8217;ll already know people on the platform.</p><p>Everyone I&#8217;ve helped sign up already had a long list of people using it.</p><p>To find these people, click &#8220;compose,&#8221; and Signal will show you all your contacts who are already on the platform.</p><p>Once again, you don&#8217;t need to entirely switch to Signal overnight, or even convince all your friends to move there. But you can immediately start talking with all your contacts who are already there. If you simply choose Signal whenever it&#8217;s an option, you&#8217;re already taking a huge step to improve your privacy.</p><p>But your impact goes even further than just protecting your own privacy. Think about it: those contacts of yours who are already on Signal are probably there because they care about privacy too. So every time you opt to talk with them via Signal instead of another platform, you&#8217;re also helping them protect their own privacy.</p><p>You&#8217;re protecting both of you.</p><p>And each message you send or receive is data that you&#8217;re not feeding to telecom companies, advertising systems, and governments.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">NBTV is funded entirely by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Browser</h3><p>The third easy place to start this new year is your browser.</p><p>And this might be the easiest step of all.</p><p>Your browser is the main gateway between you and the internet. It sees where you go, what you search for, and how you interact with websites. It reveals your innermost preferences, interests, and opinions. So the choice of browser matters a lot more than people realize.</p><p>About 70 percent of the world uses Google Chrome, which is horrendous for privacy.</p><p>Chrome gives Google deep visibility into your online activity. Chrome also still allows third-party cookies by default, while every other mainstream option has blocked them for years. Google spent years promising the world they&#8217;d eventually block third-party cookies in Chrome. Then they kept delaying, and eventually reversed the decision completely, because third-party cookies are central to their advertising business.</p><p>Switching browsers is a really simple shift. You just download a new browser and start using it.</p><p>I personally like to use <a href="https://brave.com/">Brave</a>, because out of the box it has really strong privacy defaults.</p><p>If you want to compare privacy on some of the most popular browser options to choose one you&#8217;d prefer, <a href="https://privacytests.org/">privacytests.org</a> provides a great comparison.</p><p>It&#8217;s also super easy to import your bookmarks, if you&#8217;re worried about leaving those behind. In Chrome, you click &#8220;export bookmarks&#8221; in your bookmark manager, and in Brave you click &#8220;import bookmarks&#8221; in your bookmark manager.</p><p>You can even import your saved passwords if you want, by going to password settings and selecting the password file to import. Although I recommend you use a dedicated password manager instead of saving passwords in your browser anyway.</p><p>Brave blocks trackers by default, protects against bounce tracking, reduces fingerprinting, and warns you before you load a lot of known malicious sites, without you having to install a bunch of extensions.</p><p>It&#8217;s a really solid choice that will immediately beef your privacy this new year.</p><h3>2026 Is the Year of Privacy</h3><p>There are many reasons why you might have decided to improve your privacy this new year.</p><p>Maybe it was because of a data breach. Or a headline about governments buying all your data, including location data. Or perhaps it was just the slow realization that almost everything digital now comes with constant monitoring baked in, and you have no control over who will eventually get access to that data.</p><p>When people start thinking about privacy, they often assume the solution is extreme. But luckily, this isn&#8217;t true.</p><p>The three steps we&#8217;ve talked about are really easy ways to get started in the new year. And even if these are the only things you change for the whole year, the impact on your day-to-day privacy will be huge.</p><p>If you&#8217;re just starting your privacy journey, there&#8217;s no need to feel overwhelmed or think that you have to do everything at once. Just choose something from this list, email, messaging, or browser, and make a change today.</p><div class="pullquote"><p>It&#8217;s only with your participation, supporting tools that protect people instead of fueling surveillance ecosystems, that we have the hope of writing a better future.</p></div><p>Happy New Year everyone!<br>This is the year we get serious about the fight for privacy.</p><p>Naomi</p><p><em>Reminder: we don&#8217;t do show sponsors or have article sponsors. These are simply examples of privacy tools that I personally use. If you have suggestions for tools you love, please let everyone know in the comments!</em></p><p><em><strong>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Jailed For Protecting Privacy]]></title><description><![CDATA[He Built a Privacy Tool. Now He's In Prison.]]></description><link>https://nbtv.substack.com/p/jailed-for-protecting-privacy</link><guid isPermaLink="false">https://nbtv.substack.com/p/jailed-for-protecting-privacy</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Sun, 21 Dec 2025 23:43:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CTjN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>The War On Privacy</h3><p>This week, Keonne Rodriguez went to prison.<br>I&#8217;m still processing the reality of what that means.<br>Because he didn&#8217;t go to prison for stealing money. Or hacking a bank. Or running a cartel.</p><p>He went to prison because he built a privacy tool.</p><p>Maybe you feel like you&#8217;re just a normal person who doesn&#8217;t need privacy right now, because, &#8220;what have you got to hide?&#8221; And if you ever need privacy in the future, like if a bad government or powerful group starts targeting people like you, then you can just start protecting your privacy then. When you actually need it.</p><p>...Right?</p><p>Actually, no.<br>In the future, privacy might not be possible anymore.</p><p>Because right now, people all over the world who are building the very privacy tools you might one day depend on are being arrested and thrown in jail. Governments are smearing the very right to privacy, arguing that innocent people don&#8217;t need it. That privacy is only for criminals.</p><p>There is a war on privacy currently going on. And if you don&#8217;t want your children to grow up in a world where privacy has disappeared, you need to start paying attention. Now. Before it&#8217;s too late.</p><p>I interviewed Keonne right before he went to jail, to hear his story. And now I want as many people as possible to hear his story too.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CTjN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CTjN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CTjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg" width="290" height="163.125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:290,&quot;bytes&quot;:1622025,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/182272479?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CTjN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CTjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3188ff81-5d0c-48d2-9738-79e61c4f8288_1920x1080.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption"><strong>Video Interview: <a href="https://youtu.be/Fshsk8MCAf4">He Built a Privacy Tool. Now He&#8217;s Going to Prison.</a></strong></figcaption></figure></div><h3>The Privacy Developer</h3><p><em>&#8220;My name is Keonne Rodriguez, and I developed and co-founded Samourai Wallet.&#8221;</em></p><p>Keonne&#8217;s story goes all the way back to when he got his first computer, <em>&#8220;when I was probably 10 or 11 years old. I was hooked on creating websites for things I was passionate about. So I&#8217;ve always loved computers, and loved the web.&#8221;</em></p><p>He dropped out of high school at 16 and pursued a career with computers. He was good at it. Keonne&#8217;s bread and butter was user-facing websites. That&#8217;s how he paid his bills. At one point I asked him what kinds of websites he was building as a kid.<br>He laughed.</p><p><em>&#8220;It&#8217;s a little embarrassing&#8230; I had recently gone on a trip to the Italian Alps. In the Italian Alps, they&#8217;re really into gnomes, little fantasy gnomes. I thought they were really cool. And I decided to build a website. The first website I built was a website about all the different subspecies of gnomes.&#8221;</em></p><p>And then he started building real projects. He built the website for the Miami Beach chapter of the United States Lifesaving Association. He built the web presence for a Thai artist who was huge in Thailand and trying to break it in the US. Computers weren&#8217;t just a skill for him. A big reason that he loved computers was the social aspect:</p><p><em>&#8220;I didn&#8217;t have a lot of friends in person at school&#8230; but I had a lot of people online in chat rooms who were my friends.&#8221;</em></p><p>Computers became his biggest passion.<br>Until one day, he got a new passion.</p><h3>Bitcoin: Censorship-Resistant Money</h3><p><em>&#8220;I had been hearing about Bitcoin off and on from probably around 2010. But I didn&#8217;t quite get it yet.&#8221;</em></p><p>At the time, a currency on the internet sounded absurd.</p><p><em>&#8220;It&#8217;s such a foreign concept that you can have a type of currency or money on the internet. This intangible currency, like, I can&#8217;t hold it. How&#8217;s that gonna work? There&#8217;s just a bunch of uncertainty there.&#8221;</em></p><p>But at the time, there was also a LOT of uncertainty about the TRADITIONAL financial system.</p><p>By this time, Keonne says he knew <em>&#8220;there was something wrong with our financial system. I wasn&#8217;t an Occupy Wall Street person, but I knew they were onto something too.&#8221;</em></p><p>He watched the Great Recession hit. He watched bailouts. He watched regular people get crushed while the biggest players got rescued. And he thought:</p><p><em>&#8220;There has to be an alternative to what is known as the fiat system, right? Fiat means by decree, so the government decrees this currency into existence. Surely there has to be something better.&#8221;</em></p><p>That&#8217;s how he got into gold and silver, and it&#8217;s in those circles that he first heard Bitcoin being discussed.</p><p><em>&#8220;But I still didn&#8217;t quite get it. I didn&#8217;t understand.&#8221;</em></p><p>But between 2010 and 2013 came 2 major moments that made him understand the value proposition of Bitcoin.</p><p>It was around the time that the Greek economy exploded, and the run-on effects for neighboring Cyprus were severe.</p><p><em>&#8220;Authorities started dipping into people&#8217;s bank accounts and, and confiscating their savings. That was pretty shocking. At first I thought &#8216;you can&#8217;t do that with gold&#8217;. And then I realized they did exactly that with gold.&#8221;</em></p><p>In 1933, during the Depression, the US government made private ownership of monetary gold effectively illegal and forced conversion into dollars, seizing these gold assets to make it easier for them to devalue the dollar and print money.</p><p>Keonne wanted to see a money that couldn&#8217;t be seized. That way if a reckless government went bankrupt, they couldn&#8217;t destroy the lives of everyday citizens by stealing their money.</p><p><em>&#8220;I started to think, okay, maybe there is something to this Bitcoin thing.&#8221;</em></p><p>The other major catalyst event for Keonne was WikiLeaks.</p><p>Around the world, governments pressured payment providers to block payments to WikiLeaks.</p><p><em>&#8220;The government didn&#8217;t overtly say, oh, you can&#8217;t donate to WikiLeaks. Right? Because that would be unconstitutional. But they didn&#8217;t, they didn&#8217;t need to. The corporations did it for them. And that to me was unbelievable. Those are two massive corporations telling you what you can spend your, your money on.&#8221;</em></p><p>Whether you like WikiLeaks or not, allowing governments to decide which political causes, or media publications, or charities you are and aren&#8217;t allowed to donate to is dangerous. And it almost destroyed WikiLeaks.</p><p>So WikiLeaks started to accept donations in Bitcoin.</p><p><em>&#8220;That sealed the deal for me. I needed a way to be able to donate to the causes I wanted to donate to electronically without anyone in between saying I couldn&#8217;t. And when I figured that part of the equation out, I realized &#8216;Oh, that&#8217;s what it&#8217;s for. It&#8217;s for making those types of payments.&#8217;&#8221;</em></p><p>They call it uncensorable money, because it&#8217;s decentralized. The protocol lives on thousands of computers all over the world. You could ban it, but in order to enforce the ban you&#8217;d need to stop every single one of these thousands of computers from running it. Otherwise, the network will just keep going.</p><p><em>&#8220;No one can stop me from sending a transaction. That&#8217;s powerful. That&#8217;s tantamount to free speech. How you transact is speech. At that point, I got it. And I was hooked. I realized that I wanted to go all in on Bitcoin.&#8221;</em></p><p>He got a job working full time in Bitcoin and being paid in Bitcoin, at Blockchain.info, the largest Bitcoin wallet in the world at that time. He was employee number eight. That&#8217;s where he met William Lonergan Hill.</p><p>Bill and Keonne both agreed that this technology could really enhance human freedom, and they wanted to do everything they could to build that out.</p><p>But if you wanted Bitcoin to actually protect people, it was missing a key component:<br>Privacy.</p><h3>Bitcoin Isn&#8217;t Anonymous</h3><p><em>&#8220;Bitcoin is a pseudonym system. It&#8217;s not an anonymous system.&#8221;</em></p><p>While censorship-resistant tech is powerful, if you can&#8217;t use it privately, the state can still just target you and shut you down. If we want decentralized systems to stay censorship resistant in the real world, we need the ability to use them privately. Keonne realized almost immediately that in order for decentralized technology to be effective, it needs privacy.</p><p><em>&#8220;Everything that happens on Bitcoin is public. If I make a transaction, it&#8217;s publicly recorded to what&#8217;s called the blockchain.&#8221;</em></p><p>The amount is public. The &#8220;from&#8221; and &#8220;to&#8221; are public.<br>It does not show your name, but it does show your Bitcoin address.<br>And once your identity gets linked to that address, the entire history becomes traceable. Your entire net worth becomes visible. What you spend your money on can be tracked.</p><p>In traditional finance, this lack of privacy would be unthinkable.</p><p><em>&#8220;If I went to Starbucks and bought a latte and handed the barista my card, and when I paid, she was able to see all my past transactions and will be able to see all future transactions and know my net worth&#8230; we would say that&#8217;s insane.&#8221;</em></p><p>It&#8217;s not just insane. It&#8217;s dangerous.</p><p>In 2025, what&#8217;s known as &#8220;wrench attacks&#8221; surged by 90%. This is where criminal gangs and organized cartels visit the homes of crypto users to steal their crypto. How do they know who uses Bitcoin? Because websites, including exchanges, get hacked all the time, and these breaches expose the personal details of everyone using the platform.</p><p><em>&#8220;All of the attacker needs is to look on the public blockchain, see the Bitcoin addresses that were exposed, and figure out which name is a worthwhile target. There&#8217;s very little that anyone can do to stop it. So privacy is essential. Remember we had been accepting Bitcoin for our salary for three years now, right? We had a legitimate need for financial privacy at this point.</em></p><p><em>The internet had the potential to be this bastion of freedom&#8230; and it turned out to be a pretty big panopticon. And it&#8217;s the same thing with Bitcoin. If we&#8217;re not vigilant and careful, this technology that could be a bastion of freedom can turn into a surveillance hellscape.&#8221;</em></p><p>By 2015, Bill and Keonne saw that this was a major problem, and that&#8217;s why they decided to build Samourai Wallet, to give people the essential privacy that Bitcoin was lacking.</p><h3>Samourai: The Privacy Wallet</h3><p>The goal of Samourai was to <em>&#8220;introduce so much uncertainty and doubt into a Bitcoin transaction that an observer who&#8217;s looking at it publicly really can&#8217;t make heads or tails of it.&#8221;</em></p><p>But it didn&#8217;t work like old-school &#8220;mixers&#8221; where you hand your money to a service and hope it comes back. Instead, Samourai was a noncustodial wallet, meaning the user always retained custody of their own funds.</p><p><em>&#8220;I can&#8217;t steal your Bitcoin.&#8221;</em></p><p>It used collaborative transactions, where multiple people participate in a joint transaction so the output is hard to untangle, and the history of the coins becomes all jumbled up.</p><p><em>&#8220;It starts at an address they control, and it ends at an address they control. It really wasn&#8217;t super technical. You didn&#8217;t have to be in the weeds on Bitcoin to use it. You just pressed a few buttons. It automatically routed through Tor. It automatically did best practices.</em></p><p><em>First and foremost we built Samourai Wallet for us, for Bill and myself. We needed it. And no one else was building it. And it just so happens that what we needed, a lot of other people needed as well.&#8221;</em></p><p>This tool was used by people all over the world, including people who needed privacy to survive. He told me about an active user in Iran, who became one of Samourai&#8217;s biggest ambassadors:</p><p><em>&#8220;A legitimate user in a theocratic authoritarian regime who made use of the privacy software that we created. I know that it helped people in repressive regimes. I know that it helped people who would be considered dissidents by their governments. And I&#8217;m proud of that.</em></p><p><em>It was a pretty effective tool. And quite frankly, I&#8217;m really proud that we were able to release that technology and open source it, and that it still exists today.&#8221;</em></p><p>This was the highest point of Keonne&#8217;s life. He was building super important software. Contributing to a cause that&#8217;s deeply important to him. People are using this tool, and it&#8217;s saving lives.</p><p><em>&#8220;I couldn&#8217;t think of anything else I would rather be doing.&#8221;</em></p><p>Then on April 24th, 2024 at 5:00 AM, everything changed.</p><h3>The Arrest</h3><p>Keonne woke up because his dog was barking.</p><p><em>&#8220;There were 40, 50, maybe more... armed FBI agents surrounding my house.&#8221;</em></p><p>His voice cracks, and it becomes hard for him to continue.</p><p><em>&#8220;They got on the megaphone, said, &#8216;Keonne Rodriguez, come out with your hands up, you&#8217;re under arrest.&#8217;&#8221;</em></p><p>Armored vehicles. Drones. Firearms.</p><p><em>&#8220;In the face of such an overwhelming force, you have to comply.&#8221;</em></p><p>He walked out, hands up.<br>His wife walked out, hands up.<br>He was arrested. Put in the back of a squad car.</p><p><em>&#8220;And from that point, information was scarce. They don&#8217;t talk to you.&#8221;</em></p><p>He sat there for hours while they searched his home. All he could think was: <em>&#8220;Are they arresting my wife? She didn&#8217;t do anything. Is my dog OK? My cat is going to get out because they left the door open. I hope she can get back in.&#8221;</em></p><p>He didn&#8217;t know why they were there.</p><p><em>&#8220;It could only be related to Samourai Wallet because I didn&#8217;t do anything else. I didn&#8217;t run a drug empire. I didn&#8217;t really ever go out much. All I did was work on Samourai Wallet.&#8221;</em></p><p>He doesn&#8217;t know how much time passed, but eventually he was taken to the FBI field office. Fingerprints. DNA. Then jail at the courthouse to wait for a judge.<br>And finally, a public defender showed him the indictment.<br>That&#8217;s when he heard the charges for the first time.</p><h3>The Charges</h3><p><em>&#8220;Conspiracy to commit money laundering.&#8221;<br>&#8220;Conspiracy to operate an unlicensed money service business.&#8221;</em></p><p>Keonne was stunned.</p><p><em>&#8220;How could I launder someone&#8217;s money? I never had access to anyone&#8217;s money.&#8221;</em></p><p>His defender explained to him that it&#8217;s a conspiracy charge, and they really didn&#8217;t need much to charge him with this on a conspiracy charge.</p><p><em>&#8220;If I would&#8217;ve been charged with money laundering proper, they would&#8217;ve needed to provide the person I laundered money for. And prove that I had an agreement to launder money, show the amount that was laundered, and show what the criminal did with it. But that person doesn&#8217;t exist.&#8221;</em></p><p>He never conspired with anyone to launder money. So instead of proving he laundered money for someone, the government argued that he created software money launderers could use, and that the only reason he created it was to launder money.</p><p><em>&#8220;That&#8217;s how they truly saw it, that there was no legitimate reason for this software.&#8221;</em></p><p>I asked in disbelief: <em>&#8220;No legitimate reason for privacy?&#8221;</em></p><p><em>&#8220;Yes,&#8221;</em> he responded. <em>&#8220;It&#8217;s absolutely shocking how hostile to basic privacy the United States Attorney&#8217;s Office is. Prosecutors see privacy as a stumbling block to their mission.&#8221;</em></p><p>And when it came time to &#8220;prove&#8221; his intent?</p><p><em>&#8220;All of the government&#8217;s evidence against me&#8230; comes down to tweets. Lots of jokes, lots of stuff that they took outta context.&#8221;</em></p><p>Any time a government did something that Keonne viewed as authoritarian, he&#8217;d tweet about it and welcome users to Samourai. For example, when the Federal Reserve banned its users from trading Bitcoin: &#8220;Welcome new Federal Reserve employee Samourai Wallet users.&#8221; When Kuwait did something similar: &#8220;Welcome new Kuwaiti Samourai Wallet users.&#8221; And when Russia was sanctioned: &#8220;Welcome new Russians, Samourai Wallet, Russian oligarch users...&#8221;</p><p><em>&#8220;And boy did the US Attorney&#8217;s Office go crazy about that one. They saw that and said &#8216;he&#8217;s advertising to Russian oligarchs. That&#8217;s his intent. That&#8217;s criminal intent. We got him.&#8217;&#8221;</em></p><p>Keonne says it was obviously a joke:<br>If he were really advertising to oligarchs, would he be doing it publicly on Twitter in English?<br>But that didn&#8217;t matter. They used it anyway.</p><p>Keonne thought that he was safe tweeting jokes. He thought he would be protected by settled law. Because courts have repeatedly held that you need more than generalized knowledge that criminals might use a tool. Criminals might use ANY tool. To be guilty under a conspiracy charge, you have to be part of the crime.</p><p>There&#8217;s case law going back to 1940, <a href="https://tile.loc.gov/storage-services/service/ll/usrep/usrep311/usrep311205/usrep311205.pdf">US v Falcone</a>.</p><p><em>&#8220;A sugar distributor was charged with a conspiracy charge because he sold his sugar to a bootlegger who was making illegal alcohol during Prohibition. The judges threw it out and said, there needs to be more than just knowledge of a criminal act. He has to be part of the, the crime.&#8221;</em></p><p>There was another case in the 90s where a grow light manufacturer was arrested and charged with a conspiracy charge because he sold to a marijuana dealer.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X3Ay!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X3Ay!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 424w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 848w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 1272w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X3Ay!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp" width="206" height="206" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:206,&quot;bytes&quot;:123664,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/182272479?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X3Ay!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 424w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 848w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 1272w, https://substackcdn.com/image/fetch/$s_!X3Ay!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F751e9af6-027a-4d24-b0d7-c48a77a9cdc0_1000x1000.webp 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><em>&#8220;They even took out an advertisement in High Times Magazine, which is a marijuana enthusiast magazine. And God forbid they made a joke! They said &#8216;I don&#8217;t even want to know what you&#8217;re gonna use this light for!&#8217; That conviction got overturned on appeal because of the same concept. You have to have more than just a vague knowledge of the crime. You need to be part of the crime.</em></p><p><em>There was a congressman out of Ohio, Warren Davidson, who had a great analogy about this case. He said, &#8216;it&#8217;s like prosecuting Microsoft because drug dealers make use of Excel&#8217;.&#8221;</em></p><p>So case law and a Supreme Court precedent was on their side. Just knowing that what they built COULD be used by some people for crimes isn&#8217;t a crime itself.</p><p><em>&#8220;So I was pretty confident. I mean, a Supreme Court precedent, the highest court in the land, that&#8217;s pretty strong.&#8221;</em></p><p>But it was the second charge where things got even crazier.</p><h3>FinCEN Said It Wasn&#8217;t Illegal</h3><p><em>&#8220;There&#8217;s something called the Brady Rule in US Criminal Procedure. And that rule says that the government has to turn over any evidence that is exculpatory, meaning if they have evidence that says maybe you didn&#8217;t commit this crime, they have to give that to you.&#8221;</em></p><p>In Keonne&#8217;s case, they hid exculpatory evidence from him for over a year, and only turned it over when Keonne&#8217;s team asked specifically if this evidence existed.</p><p><em>&#8220;A year before the prosecution, they reached out to FinCEN, the Financial Crime Enforcement Network, the regulator in charge of money transmission and preventing money laundering. And they ask the regulator, is Samourai Wallet a financial institution? And FINCEN says, &#8216;Under our rules, they would not be considered a financial institution or a money transmitter because they don&#8217;t take custody of anyone&#8217;s funds.&#8217;&#8221;</em></p><p>FinCEN had rules in 2013 and 2019 where they reiterated this.</p><p><em>&#8220;The Southern District of New York hid that information from us, and indicted us anyway on unlicensed money transmission.&#8221;</em></p><p>They said that a North Korean hacking group, called Lazarus, used Samourai to launder funds.</p><p><em>&#8220;And to further that they claim that we had a duty to perform KYC and AML to prevent that from happening.&#8221;</em></p><p>KYC and AML stand for know your customer and anti money laundering, and they&#8217;re laws that were formalized under the Patriot Act, saying that financial institutions and money transmitters have to get identity documents from customers, and prove their identity.</p><p><em>&#8220;We had no obligation to do that because we&#8217;re non-custodial piece of software. We&#8217;re not a bank, we&#8217;re not a financial institution. We don&#8217;t have those same obligations that a financial institution has. And that&#8217;s why I took the really, the whole industry by surprise, that a non-custodial piece of software was being targeted this way and, and prosecuted this way.&#8221;</em></p><p>So the Southern District of New York that prosecuted Keonne argued Samourai had obligations to do things that money transmitters do, even though the regulator in charge of regulating money transmitters said Samourai wasn&#8217;t a money transmitter, and didn&#8217;t have those obligations.</p><p>And the Southern District argued that Samourai, as part of a conspiracy charge, were liable for what people who used their tool did, even though case law and Supreme Court precedents say otherwise.</p><p>Keonne explained that once the government decides it wants you, the system becomes its own weapon.</p><p><em>&#8220;Getting an indictment is so easy. The deck is so stacked against a criminal defendant. The whole process has been so absolutely eye-opening to me. I knew that we had a messed up justice system. Everyone kind of knows that, but you don&#8217;t really know it until you&#8217;re face-to-face with the Department of Justice. Then you read the indictment and you&#8217;re like, &#8216;Hey, this is a bald face lie. They produce this chat log, but they cut off the first part and the last part where there&#8217;s all the context, and they&#8217;re spinning it another way when they know what it actually says. Why would they lie?&#8217;</em></p><p><em>It&#8217;s not like the truth will come out in front of the jury, and the jury will make the right decision based on all of the evidence. That&#8217;s not how it goes.&#8221;</em></p><h3>The Judge</h3><p>Keonne and his team prepared a motion to dismiss. Based on the FinCEN guidance and the court precedents, they had a really strong case, and the judge was someone that they thought might give a reasonable opinion on this.</p><p><em>&#8220;Then, suddenly out of nowhere, we get a new judge for no reason. And the new judge was a pretty bad pick for us.&#8221;</em></p><p>So along comes the day when they&#8217;re meant to appear in court and present their arguments. His lawyer was meant to get up and make his arguments. And the government was meant to then get up and say why they disagreed. But that&#8217;s not what happened.</p><p><em>&#8220;When that day came, she didn&#8217;t let us argue. She just said, no. She just denied the motion. And didn&#8217;t give any reasoning, didn&#8217;t write an opinion, didn&#8217;t verbally state an opinion. Just denied it on its face. And at that point, I think I realized, &#8216;oh, this is not going to be fair.&#8217;&#8221;</em></p><p>And he explained why that matters.</p><p><em>&#8220;It&#8217;s really up to the judge what the jury gets to hear. So the jury&#8217;s gonna hear all of the things I said on Twitter about welcoming Russian oligarchs. But they&#8217;re not gonna be able to hear any of the 10 years worth of podcasts and interviews that I&#8217;ve done where I talk about why I built Samourai Wallet. They&#8217;re only gonna get to hear certain things. This is like walking into a fight with both hands tied behind our back. And if we lose, we&#8217;re getting 25 years, we&#8217;re going away for the majority of my life. And Bill is 67 years old. It is not gonna be good for him in there.</em></p><p><em>So they offered us a deal.&#8221;</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">NBTV is funded entirely by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>The Deal</h3><p>They would drop money laundering (the 20-year charge) if he pled to unlicensed money transmission. Which, Keonne says, they knew FinCEN did not think applied.<br>But <em>&#8220;no one cares. That&#8217;s what the deal&#8217;s gonna be.&#8221;</em></p><p>Keonne and Bill faced two paths.</p><ol><li><p>Plea deal, for 5 years in prison.</p></li><li><p>Go to trial and fight.</p></li></ol><p>5 years is a crazy amount of time to spend in jail, especially when you&#8217;re confident you didn&#8217;t do anything wrong.</p><p>But the trial was a huge risk. Even with the FinCEN guidance in their favor, they would face 25 years in prison if they lost. But on top of that, the Southern District of New York escalated the pressure, layering on additional threats and consequences if they chose to fight.</p><p><em>&#8220;They threatened us a number of ways to take the deal.&#8221;</em></p><p>They would add a $237 million money judgment against them along with the 25 years in prison. So when he got out in 25 years, he&#8217;d spend the rest of his life paying off that debt.</p><p><em>&#8220;And until you pay that, you&#8217;re basically on house arrest. You can&#8217;t travel, you can&#8217;t leave the country. You have to check in all the time. That earns interest until it&#8217;s paid off. So they&#8217;re basically saying, &#8216;you&#8217;re gonna be in prison for life if you don&#8217;t take this deal.&#8217;&#8221;</em></p><p>By then, the process had already destroyed them financially. They already paid 6.4 million. They were now 2.5 million in debt, and unable to pay their lawyers. It would have cost another 4 million just to get to trial. They simply didn&#8217;t have the money.</p><p><em>&#8220;You&#8217;re going against something that just has unlimited resources, unlimited man hours, and can throw everything they have at you. You don&#8217;t have that capability.&#8221;</em></p><p>So they took the deal.</p><p><em>&#8220;This judge was ready to put me away for a lot longer than five years. If she was able to, she would have, without question.&#8221;</em></p><p>And then there was an additional $250,000 that the judge added as a fine at his sentencing.</p><p><em>&#8220;She didn&#8217;t need to throw an additional $250,000 fine on top of the 6.4 million we had already forfeited. She knew full well that I didn&#8217;t have that money. But she did.&#8221;</em></p><p>It&#8217;s been just one turn of the screw after another.</p><h3>The Final Knife Twist</h3><p>So when did Keonne go away? This was another messed up situation.</p><p><em>&#8220;So after the sentencing, my lawyer stood up and said &#8216;We would like Keonne to be able to self-surrender, and the government agrees.&#8217; Then the government got up and said, yes, your Honor, we agree.&#8221;</em></p><p>What self-surrender usually means is that you&#8217;ll go home with your family, and wait for a Bureau of Prisons designation letter. This can take four to eight weeks. But once the letter arrives, you don&#8217;t go to prison right away. The date on the letter might be months in the future. So in those intervening months, Keonne was meant to have been sent home to his family.</p><p>Instead, the judge set a hard deadline to self-surrender:<br>December 19th.<br>No final Christmas with his family.<br>So on December 19th, Keonne was locked up in the Metropolitan Detention Center in Brooklyn, where he&#8217;ll likely wait months to be assigned to a prison.</p><p>The MDC has notoriously bad conditions.</p><p><em>&#8220;There are certain judges in the Southern District of New York who refuse to send people to that jail because of how bad it is. My judge is not one of them. She was quite happy to send me there.&#8221;</em></p><p>Keonne added:<em> &#8220;It seemed very personal to her. I&#8217;ve never really seen a sentencing like that where she was so hostile&#8230; she really had it in for me.&#8221;</em></p><p>Keonne was able to spend Thanksgiving with his family before being locked up.</p><p><em>&#8220;At least we had one final holiday together.&#8221;</em></p><h3>The War On Privacy Developers</h3><p>There&#8217;s a concept in criminal justice, where the process itself is the punishment. Long before a verdict, the system can drain your money, your time, your health, and your reputation.</p><p>Scholars like Malcolm M. Feeley have written about it, and Kafka also explored how procedure, uncertainty, and institutional power can become the punishment itself.</p><p>That matters for privacy. Because privacy is not a crime. But if governments want to crush privacy anyway, they don&#8217;t have to ban it or even win at trial. They can target the builders of privacy tools and let the machinery do the damage.</p><p>This is the case with <a href="https://darknetdiaries.com/episode/163/">Ola Bini</a>, a well-known privacy rights activist living in Ecuador.<br>The government didn&#8217;t need to prove a real crime to ruin his life. They arrested him and kept him trapped inside an endless legal process. For years he has been unable to leave the country, forced to check in with prosecutors, cut off from normal banking, and living under constant surveillance. His crime? They couldn&#8217;t find any crime, so they focused on his use of privacy tools such as encrypting his devices and using Tor as evidence that he must have been attempting to hack things. The way they saw it, if you protect people from surveillance, you must be dangerous.</p><p>There&#8217;s an entire war being waged against all kinds of privacy developers right now, with a wave of arrests. Roman Storm, Roman Seminov, Roman Sterlingoff, Keonne and Bill, Ola, so many more. Not enough people even know this is going on.</p><p>This is how the war on privacy works in practice. You don&#8217;t outlaw privacy outright. You target the people who build it, and the message becomes clear: build tools that help ordinary people protect their privacy, and you may spend years fighting for your life in court, regardless of how the case ends. It creates a chilling effect, and the intent is that eventually people become too scared to build privacy tools.</p><p><em>&#8220;If you do anything that they perceive as undermining their power, they will come after you with an iron fist and put a stop to it.&#8221;</em></p><p>So in that future scenario, when you feel you&#8217;ll eventually need privacy, and you&#8217;ll just start using privacy tools then? Those tools might no longer exist, because no one is building them anymore.</p><p>We&#8217;re seeing a wave of criminalizing people in the privacy space. Not for crimes that people have actually committed. Instead, because of a fundamental disagreement over whether or not privacy is a legitimate right for ordinary people.</p><p><em>&#8220;The next person who has the audacity to create a tool that is useful and gives individuals the privacy they actually have a right to, they&#8217;ll go after hard. </em></p><div class="pullquote"><p><em>The most shocking thing is how much the government and these US attorneys detest privacy and do not see it as anything other than clearly criminal.&#8221;</em></p></div><p>It&#8217;s possible we may lose the ability to have privacy forever. Governments are centralizing control over our digital lives, surveilling every single thing, having more access to deep personal insights about every innocent person on the planet than ever before. This is terrifying, because without privacy, we can&#8217;t have human dignity.</p><h3>How We Win The War</h3><p>Keonne said it comes down to <em>&#8220;small acts of resistance.&#8221;</em><br>Small enclaves of people who understand what&#8217;s at stake. Who continue to use privacy tools, even when it&#8217;s dangerous to do so. Who continue to build privacy tools, especially when it&#8217;s dangerous to do so. Because that&#8217;s when people need them the most.</p><p>And right now, those people do exist.</p><p><em>&#8220;All of our code was open source and freely available for anyone to take and do what they wanted to with.&#8221;</em></p><p>Within a month of their arrest, Keonne says a group took their code and redeployed Whirlpool again.</p><p><em>&#8220;It&#8217;s called Ashigaru.&#8221;</em></p><p>And the only difference is that it only runs over Tor, and the people running it are not advertising it. They are not on social media. They are not on Telegram.</p><p><em>&#8220;You just have to kind of learn about it and get it. That&#8217;s wonderful. And I salute and applaud those people.&#8221;</em></p><p>But we need to protect these builders of privacy tools, and support them. Because we need them.</p><p>Let&#8217;s not feel overwhelmed and think that small acts can&#8217;t make a difference. Small acts can change the course of history. As long as there are small acts of defiance we can take to maintain the normalcy of privacy, such as using any privacy tools that we can, we have a chance of writing a future where our children still have the option of privacy and freedom.</p><p>These small acts can actually make a huge difference. And may mean the difference between us hurtling towards a surveillance dystopia, and us actually writing a future where we still have the option of privacy and freedom.</p><p><em>&#8220;It&#8217;s like guerrilla warfare against a severely overpowered opponent. If you have enough of those small acts, you can win against an opponent who is completely and utterly stronger than you.&#8221;</em></p><p>I told Keonne that I was so sorry this happened. And that I think we should all be outraged. When you can twist the law in such a way that you can make anyone a criminal by taking things out of context, it makes us realize that none of us are safe. </p><p>I also told Keonne as we parted that I hope his story unsettles people enough that they really start to think differently about the importance of privacy and what&#8217;s currently at stake, and that they better understand the war against privacy that&#8217;s currently going on.</p><div class="pullquote"><p>&#8220;And it is a war on privacy,&#8221; he concluded. &#8220;People do need to understand that.&#8221;</p></div><h3>Help Keonne and Bill</h3><p>If you&#8217;d like to sign a petition to have Keonne and Bill pardoned, or to donate to help them, visit billandkeonne.org.</p><p>As 2025 comes to a close, consider doing something that stands up for privacy.<br>Your help may make the difference between whether we keep privacy alive for future generations.</p><p>Yours In Privacy,<br>Naomi </p><p><em>Big thank you to <a href="https://x.com/WatchmanPrivacy">Gabriel Custodiet</a> for introducing me to Keonne and encouraging me to set up the interview. </em></p><p><em>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://Ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://Ludlowinstitute.org/donate"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[We Accidentally Slipped Into a 1984-Style Dystopia. It’s Time to Pull Ourselves Out.]]></title><description><![CDATA[A world of quiet and constant surveillance has quietly arrived.]]></description><link>https://nbtv.substack.com/p/we-accidentally-slipped-into-a-1984</link><guid isPermaLink="false">https://nbtv.substack.com/p/we-accidentally-slipped-into-a-1984</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Thu, 11 Dec 2025 23:01:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Gt2p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Guest post from <a href="https://x.com/the_judii">Justin Giudici</a>, <a href="https://x.com/HelloTelos">Telos</a></em></p><p>Somewhere between the rise of online banking, social media, streaming apps, and the explosion of AI, we quietly sleep-walked into a world that looks uncomfortably close to 1984.</p><p>Not because of a single authoritarian regime, but because we built, piece by piece, a surveillance ecosystem so comprehensive that no dystopian novelist could have designed it better.</p><p>And the wild part?</p><p>We did it unintentionally. We even agreed to it, one signup form at a time.</p><p>We&#8217;re now living in what I&#8217;d call the KYC Era: the Know Your Customer era. Or, more honestly, the <strong>Surveillance Era</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Gt2p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Gt2p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Gt2p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg" width="1456" height="582" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:582,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:202856,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/181376665?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Gt2p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Gt2p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39bf5d1c-4444-4c5f-b6f3-d32d438677a1_1536x614.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The KYC Era: How We Got Here Without Noticing</h3><p>Today, every business, platform, and digital service demands a staggering amount of personal information.</p><p>It starts when you sign up, and it accelerates with cookies, pixels, device fingerprints, and a shadow economy of cross-site tracking.</p><p>Most of us have accounts on hundreds of services.</p><p>Together, they know:</p><ul><li><p>Your name, date of birth, home address</p></li><li><p>Your SSN</p></li><li><p>Everything you buy</p></li><li><p>Where you physically go</p></li><li><p>What you search, read, like, and think</p></li><li><p>And by linking your Reddit, X, Instagram, and browsing patterns&#8230; even who you are</p></li></ul><p>This isn&#8217;t paranoia. This is the business model of the modern internet.</p><p>And then come the hacks - massive ones, constant ones.</p><p>Your credit card numbers, passwords, home address, and identity data have likely been leaked many times over. Not hypothetically - mathematically almost certain.</p><p>We&#8217;ve built a world where your sensitive information is both <a href="https://www.securityweek.com/extortion-group-leaks-millions-of-records-from-salesforce-hacks/">everywhere and nowhere secure</a>.</p><p>So the real questions are:</p><p><strong>Why do these companies need all this information in the first place?</strong></p><p>Why does Apple need my date of birth, phone number, home address, and credit card info just so I can watch a movie?</p><p>Why does a random new AI model need me to create an account and subscribe to a monthly plan just to run a single prompt?</p><p><strong>Why do we trust them to store it securely?</strong></p><p>They&#8217;ve proven over and over that they can&#8217;t.</p><p><strong>Why can&#8217;t we just interact with a service&#8212;pay, access, use&#8212;without a signup wall?</strong></p><p>Imagine how much faster innovation would move if &#8220;Try now&#8221; didn&#8217;t always mean &#8220;hand over your identity.&#8221;</p><p>Even solutions like X402 address payments, but they intensify traceability. The surveillance problem remains intact - sometimes amplified.</p><h3><strong>AI Is About to Make This Much Worse</strong></h3><p>All this scattered, duplicated personal data used to be difficult to assemble.</p><p>Not anymore.</p><p>AI collapses the cost of correlation.</p><p>Anyone - from a marketer to a state actor to a criminal who gets access to your data from the dark web - can query:</p><ul><li><p>&#8220;Where does person x shop most often?&#8221;</p></li><li><p>&#8220;What sites does he/she log into daily?&#8221;</p></li><li><p>&#8220;Where does he spend time on weekdays?&#8221;</p></li><li><p>&#8220;Where does person x live?&#8221;</p></li></ul><p>This is no longer a sci-fi threat model.</p><p>And ironically, Web3 as it exists today can make this problem even worse - public ledgers create a behavioral and financial breadcrumb trail that AI can plug into with ease.</p><p>We have accidentally built an extreme surveillance system.</p><p><strong>A KYC-first, privacy-last digital society.</strong></p><p>And unless we deliberately change course, the next decade will look exponentially more invasive than the last.</p><h3><strong>Introducing the DKYC Era: Don&#8217;t Know Your Customer</strong></h3><p>If the KYC Era was about collecting everything,</p><p>the <strong>DKYC Era</strong> is about collecting <strong>only what is absolutely necessary</strong>&#8212;nothing more.</p><p>In a DKYC digital world:</p><ul><li><p>You can pay for a service without handing over your identity.</p></li><li><p>You can access an app without signing up for a massive data suck.</p></li><li><p>You can prove your age (&#8220;I am over 21&#8221;) without revealing your date of birth.</p></li><li><p>You can prove you live in the right region without exposing your full address.</p></li></ul><p>Zero-knowledge proofs are already capable of this. They let you prove facts without surrendering personal information.</p><p>If I buy a service, it should not require:</p><ul><li><p>My address (unless shipping something)</p></li><li><p>My SSN</p></li><li><p>My bank balance</p></li><li><p>My full purchase history</p></li><li><p>My behavioral data</p></li></ul><p>The DKYC philosophy is simple:</p><p><strong>Reveal only what is necessary for the transaction. Nothing more.</strong></p><p>This isn&#8217;t anti-regulation.</p><p>It&#8217;s pro-safety, pro-innovation, and pro-human dignity.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">NBTV is funded entirely by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>What Happens If We Don&#8217;t Fix This?</strong></h3><p>If we stay in the KYC Era, the consequences are obvious and accelerating:</p><ul><li><p><strong>Bad actors, corporations, and governments</strong> will possess absurd amounts of AI-queryable personal data.</p></li><li><p><strong>Hacks will grow</strong>, because the honeypots of stored data will grow.</p></li><li><p><strong>Targeted scams, identity theft, and physical-world safety risks</strong> will continue to worsen dramatically using AI.</p></li><li><p><strong>Banks and financial systems</strong> will lock people out more aggressively as AI risk models tighten.</p></li><li><p><strong>Innovation will stagnate</strong>, because the friction of signing up for new apps chokes experimentation.</p></li></ul><p>We are already in a society where using any new service puts more and more information out there and feels cumbersome.</p><p>That&#8217;s how you kill creativity, exploration, and economic velocity.</p><p>But&#8230;</p><h3><strong>If We Shift to DKYC, We Unlock the Next Era of the Internet</strong></h3><p>Imagine:</p><ul><li><p>Fast, private payments/micropayments</p></li><li><p>Freedom to use hundreds or thousands of single use services (no monthly lock in)</p></li><li><p>No sign-up walls</p></li><li><p>No massive data trails</p></li><li><p>No duplicated identity records vulnerable to hacks</p></li><li><p>No universal tracking footprint for AI to harvest</p></li></ul><p>A world where humans can interact digitally without sacrificing their personal safety or identity every few minutes.</p><p>That&#8217;s the transition we need:</p><p><strong>from the KYC / Surveillance / 1984 Era &#8594; to the DKYC Era.</strong></p><p>An internet where we get all the benefits of digital convenience <strong>without handing over our entire lives every time we click &#8220;Sign up.&#8221;</strong></p><p>Yours in privacy,<br>Justin Giudici</p><p>You can follow Justin <a href="https://x.com/the_judii">here</a>.</p><p><em>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://nbtv.media/support&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://nbtv.media/support"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[Your Company Is Leaking Data From The Inside]]></title><description><![CDATA[The biggest threat isn&#8217;t hackers breaking in. It&#8217;s your own tools leaking data out.]]></description><link>https://nbtv.substack.com/p/your-company-is-leaking-data-from</link><guid isPermaLink="false">https://nbtv.substack.com/p/your-company-is-leaking-data-from</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 02 Dec 2025 21:03:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DE_Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Breaches and ransomware are at an all-time high. A big reason that companies care about security is because they want to secure a perimeter around their organization to stop bad people getting in and accessing their data.</p><p>But they forget about all the employees inside the company, actively sending data out to third parties through their browser, emails, text messages, and AI chatbots.</p><p><em><strong>Before we go any further, a quick note: today is Giving Tuesday. If this newsletter helps you protect your privacy, please consider supporting the free educational work we do with a donation to our non-profit. Ludlow Institute is community-funded, and your support directly pays for investigations, tutorials, and resources like this one. Many employers will match your contribution, which doubles your impact. Thank you so much for helping us keep independent, privacy-focused education available to everyone, and for spreading the word.</strong></em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://ludlowinstitute.org/donate&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://ludlowinstitute.org/donate"><span>Donate</span></a></p><p>The landscape has shifted. We need to think just as much about what the company is voluntarily sharing with others as what might be involuntarily leaked in a hack. And we have to remember that every piece of data we hand to a third party is now sitting in someone else&#8217;s system, subject to their security bugs, their subpoenas, and their insider threats.</p><p>The new defensive mindset is simple:<br>Protect yourself by being more selective about what you share in the first place.</p><p>At your company, you can no longer operate on a &#8220;good faith&#8221; assumption that you can pour sensitive company data into every third-party tool and they will protect it. Instead, you need to protect yourself with more selective and judicious disclosures: share less, choose privacy-focused companies wherever possible, encrypt what remains. That is how you shrink the blast radius when defenses fail or access is compelled. And they basically all fail, eventually.</p><p>The mindset shift the modern company needs to adopt is one where it becomes second nature for employees to notice unneeded data sitting in centralized clouds; chat logs that never expire and can be taken out of context; microphone permissions no one reviewed that trigger embarrassment and retaliation; browser extensions with god-mode privileges leaking protected IP; or staff piping sensitive queries into an AI service that is later subpoenaed, turning those prompts into part of the public record.</p><p>The data your employees are sending out to countless entities is a huge liability, and it puts the security of your entire organization at risk. It&#8217;s up to you to get them to &#8220;think different.&#8221;</p><p>In this newsletter I am going to walk through a handful of company privacy best practices that focus on a neglected side of risk: data leaking out from the inside. Keep in mind that the examples of specific tools I have provided are just some of the things that I use at my company. If you have tools that you like and would recommend to others, please let everyone know in the comments.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DE_Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DE_Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DE_Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png" width="372" height="208.4835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:372,&quot;bytes&quot;:6474956,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/180541119?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DE_Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!DE_Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F677b0bd4-3e9e-41e3-b8da-f78cae39df64_2912x1632.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h3><strong>1. Browsing</strong></h3><p>Let&#8217;s start with the lowest-hanging fruit.<br>The browser and search engine that your employees use can leak a huge amount of sensitive company data, quietly stored on third-party servers. Luckily, these are the easiest to switch out.</p><p><strong>Lock down the browser</strong></p><ul><li><p>Use a privacy-respecting browser that locks down your settings by default.</p></li><li><p>Set a default search engine that minimizes logging and profiling.</p></li><li><p>Audit extensions regularly. Browser extensions are a huge attack vector and should never be installed unless approved by your company&#8217;s security team. Installing an unvetted browser extension is the equivalent of clicking on random links or downloading random software onto your machine. In my opinion, the only extension most users should have is a password manager from a trusted provider (details in a later section).</p></li></ul><p><strong>Some private, usable options:</strong></p><p><strong>Browser</strong><br>I personally like the <a href="https://brave.com">Brave</a> browser. By default it blocks third-party ads, trackers, fingerprinting, and other data collection through its Shields feature.<br>If you would like to compare Brave&#8217;s privacy protections to other browsers, I recommend <a href="https://privacytests.org">PrivacyTests.org</a>.</p><p><strong>Search engine</strong><br>The search engine built into Brave is Brave Search, which is designed not to collect personal information about you, your device, or your searches, and not to use your queries to build behavioral profiles.</p><p>Other search engines you could consider include:</p><ul><li><p><a href="https://startpage.com">Startpage</a>, which acts as a privacy-preserving front end to Google&#8217;s search results.</p></li><li><p><a href="https://duckduckgo.com">DuckDuckGo</a>, which has better privacy protections than Google and a strict no-profile policy.</p></li></ul><p>I recommend setting a hardened, privacy-respecting browser and search engine such as Brave as your company default in your policies, then enforcing that choice through your device management.</p><h3><strong>2. AI </strong></h3><p>This is the big new leak that almost no one is prepared for. Employees are pasting contracts, product roadmaps, unreleased code, HR issues, financials, and customer data into AI chatbots because it helps them work faster. For the individual, this feels productive. For the company, it can be catastrophic.</p><p>Your company can absolutely still use AI. The key is to mitigate leaks by choosing more privacy-focused options and setting clear rules.</p><p>Treat the major AI platforms like a sensitive database. Assume every query can be stored indefinitely in a permanent log that can later be accessed through legal process, insider abuse, or a breach.</p><p><strong>Advice:</strong></p><p><strong>a. Set a no-go policy</strong><br>Write a short, clear policy that spells out what must never go into any external AI. Make this explicit and simple.</p><p>Example &#8220;never&#8221; list for public cloud AIs:</p><ul><li><p>Real names</p></li><li><p>PII such as email addresses, home addresses, phone numbers</p></li><li><p>Company financials and donor information</p></li><li><p>Customer data, support tickets, internal HR issues</p></li><li><p>Credentials, API keys, or passwords (these should never go into any tool)</p></li></ul><p><strong>b. Provide employees with access to more private options</strong></p><p>Employees want to use AI. If you do not give them safe options, they will use unsafe ones. Provide access to more private alternatives and be clear about what information can go where. A simple tiered list helps.</p><p><strong>Least private:</strong><br>Cloud-hosted, account-based platforms<br>Examples: ChatGPT, Claude, Perplexity, Gemini, etc.</p><ul><li><p>Do not:</p><ul><li><p>Put real names, home addresses, email addresses, phone numbers</p></li><li><p>Add company financials, donor information, or customer data</p></li><li><p>Paste SSNs, passwords, API keys, or other secrets</p></li></ul></li><li><p>Do:</p><ul><li><p>Use these tools only for things you would be comfortable posting publicly on social media</p></li><li><p>Assume the content could be accessed without your knowledge and might one day be part of a legal process or a breach</p></li><li><p>Ask yourself: &#8220;Would this embarrass me or the company, or put clients, donors, or staff at risk if it were released out of context?&#8221; If yes, do not paste it here</p></li></ul></li></ul><p><strong>Middle ground:</strong><br>Privacy-focused cloud AI<br>Examples: <a href="https://brave.com/leo/">Brave&#8217;s Leo</a>, <a href="https://venice.ai">Venice.ai</a>, <a href="https://nano-gpt.com/">NanoGPT</a>.</p><p>These are cloud-hosted, but with stronger privacy protections and better logging policies than mainstream players. Some vendors claim no logging or short retention windows, and avoid using your prompts to train models.</p><ul><li><p>Use these tools for sensitive internal work after removing direct identifiers:</p><ul><li><p>Strip real names and convert to roles (e.g. &#8220;Client A,&#8221; &#8220;Vendor B,&#8221; &#8220;Engineer 1&#8221;)</p></li><li><p>Remove addresses, phone numbers, and unique IDs</p></li></ul></li><li><p>Keep the mindset that it is still a cloud service. They still see your traffic. Their policies can change. Review them regularly.</p></li></ul><p><strong>Most private:</strong><br>Self-hosted AI</p><p>If your company is large enough, you might consider setting up infrastructure and self-hosting large models that employees can use internally. Inside your own environment, behind your own access controls, staff can be much freer to paste sensitive PII or financials, because the data never leaves your infrastructure.</p><p>This option will not make sense for smaller organizations, because maintaining these systems is costly and complex. For larger organizations, they can be a very strong choice.</p><ul><li><p>Models run on your own hardware or in your own tightly controlled cloud environment</p></li><li><p>Prompts and outputs stay inside your infrastructure</p></li><li><p>You can integrate the model with internal data sources without exposing that data to an external provider</p></li></ul><p>It is also possible for individual employees to run AI locally on their machines, but the models capable of running on a standard laptop are not as strong as the best cloud tools, and it can be complicated for employees to maintain. If you want to learn how to get started with local models anyway, see our tutorial here: </p><div id="youtube2-CVeZfM0pVyU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;CVeZfM0pVyU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/CVeZfM0pVyU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>c. Ban Agentic AI Browsers</strong></p><p>Include in your policy that staff must not use &#8220;agentic AI browsers&#8221; that automatically roam the web and click on things for them, such as Comet or Atlas. These tools are currently a <a href="https://brave.com/blog/unseeable-prompt-injections/">major security concern</a> because of unseeable prompt injections and uncontrolled web actions. You do not want an AI agent browsing the internet and acting on your behalf without tight controls. Perhaps they get more secure in the future, but they&#8217;re not there yet.<br></p><p><strong>Takeaway</strong><br>AI is set to be the biggest security and privacy hole in your organization unless you train your employees how to use it responsibly. </p><p>You do not have to sit out the AI wave. You can absolutely use powerful tools that increase your company&#8217;s productivity. You just need to:</p><ul><li><p>Teach employees clear, simple rules about what never goes into external AI</p></li><li><p>Give them more private alternatives</p></li></ul><h3><strong>3. Communications</strong></h3><p>Internal chat is where most of the real work happens. It is also where people are the most relaxed and least careful.</p><p><strong>What to do:</strong></p><ul><li><p>Choose end-to-end encrypted messengers for internal chats and sensitive coordination.</p></li><li><p>Treat disappearing messages as the default for casual conversation. Most internal back and forth does not need to live forever.</p></li><li><p>If your industry requires retention, keep it narrow. Use specific archival channels for conversations that must be kept, instead of hoarding every random thread.</p></li><li><p>Make it obvious which spaces are ephemeral and which are permanent so staff do not assume everything is &#8220;just chat.&#8221;</p></li></ul><p><strong>Some private, usable options</strong></p><ul><li><p>For DMs and casual group chats: <a href="https://signal.org/">Signal</a> is a great end-to-end encrypted messenger.</p></li><li><p>For collaborative document discussions: <a href="https://proton.me/">Proton Docs</a> is more private than Google Docs, and you can still collaborate in real time.</p></li></ul><p>You may think saving everything by default is prudence, but it&#8217;s actually more of a liability than you realize.</p><h3><strong>4. Email</strong></h3><p>It&#8217;s the cockroach of the internet. Email never dies. It&#8217;s an inherently insecure tool. And it lives on backup servers you forgot existed.</p><p><strong>Best practices</strong></p><ul><li><p>Use end-to-end encryption where possible for sensitive content, or at least password-protected attachments that are shared out of band.</p></li><li><p>For external parties, prefer portals or secure file transfer when the data is truly sensitive.</p></li><li><p>Set clear rules on what must not go into email at all, and offer better alternatives so people are not forced to choose between &#8220;get work done&#8221; and &#8220;follow policy.&#8221;</p></li><li><p>Train staff that as you tighten email hygiene, they become the front line against phishing and malware. Short, frequent, specific training works better than once-a-year compliance theater.</p></li><li><p>Keep personal and work mail completely separate to prevent cross contamination between consumer services and corporate accounts.</p></li></ul><p><strong>Some private, usable options</strong></p><p>My personal preference is <a href="https://proton.me/">Proton</a>, because they provide an entire ecosystem, with calendar, docs, VPN, and other tools as well as email. Inside Proton, messages between Proton users are end-to-end encrypted by default, and for anyone outside you can use either password-protected emails or PGP.</p><p>Other strong options are <a href="https://tuta.com/">Tuta</a> and <a href="https://www.startmail.com/">StartMail</a>. Tuta encrypts everything in your mailbox and lets you send end-to-end encrypted messages both inside their network and to external recipients using a shared password. StartMail builds on PGP and also offers password-protected messages when the other side has no encryption tools.</p><p>Treat email as a hostile environment that you occasionally have to use, not the default home for all company knowledge.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">NBTV is funded entirely by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3><strong>5. Passwords</strong></h3><p>Most password practices are terrible. People reuse passwords, or create passwords that are easily brute-forced. Everyone should generate random, unique passwords for every site, and store them in a password manager that is protected with 2FA.</p><ul><li><p>Require a real password manager and enforce unique, long credentials for every system. Some options of password managers: <a href="https://1password.com/">1Password</a>, <a href="https://www.dashlane.com/">Dashlane</a>, <a href="https://bitwarden.com/">Bitwarden</a>, <a href="https://proton.me/pass/download">Proton Pass</a>, or if you want to go local only, <a href="https://keepassxc.org/">KeePassXC</a></p></li><li><p>Ban password reuse outright.</p></li><li><p>Ban the inclusion of real words in passwords. They make passwords too easy to brute-force (yes, even if they add 123! to the end).</p></li><li><p>Turn on hardware-backed 2FA (security keys) on every website that supports it.</p></li></ul><p>Use authenticator-app 2FA everywhere else.<br>Avoid SMS 2FA wherever possible; these are insecure.</p><p><strong>Takeaway:</strong> Password practices inside organizations need to be dramatically upgraded.</p><h3><strong>6. Hot Mics, Cameras, And Voice Assistants</strong></h3><p>Anything with a microphone or camera should be treated as a potential recording device, not a harmless gadget. That includes laptops, phones, smart speakers, and &#8220;helpful&#8221; AI assistants. The goal is not just to stop spying. It is to prevent chilling effects and accidental leaks.</p><p><strong>House rules</strong></p><ul><li><p>No always-listening assistants in rooms where sensitive conversations happen. That includes board meetings, HR, strategy, legal, and product planning.</p></li><li><p>For home offices, give staff a simple rule: if company-confidential topics are being discussed, devices that can wake on &#8220;Hey X&#8221; do not belong in the room.</p></li><li><p>Do not connect voice assistants to corporate messaging, calendars, or file storage. Convenience is not worth turning them into a side channel into your systems.</p></li></ul><p><strong>Practical controls</strong></p><ul><li><p>Post a clear device policy in conference rooms. Spell out when recording is allowed, and by whom.</p></li><li><p>For truly sensitive meetings, require phones and laptops to be left outside, or shut down completely.</p></li><li><p>On corporate devices, revoke microphone and camera permissions by default, and grant them only to tools that genuinely need them.</p></li><li><p>Encourage physical camera covers on laptops and external webcams, and make them the default on issued devices.</p></li></ul><p><strong>Takeaway:</strong> People follow norms more than they follow policy PDFs. Make the norm clear. Voice assistants don&#8217;t belong in strategy sessions, and every mic and camera should be treated like it can record at any time. Some companies are absolutely at risk of having employee devices turned into hot mics via mercenary spyware tools.</p><h3><strong>Summary</strong></h3><p>We can no longer think about security as a wall that keeps outsiders from getting in. In the modern workplace, a huge amount of the risk comes from what insiders are unintentionally sending out. Browsers, email, chat tools, cloud AIs, extensions, microphones, and countless background services leak sensitive information every day, long before an attacker ever touches your network.</p><p>The only real defense is culture. A culture where privacy is the norm. Where people default to safer tools, share less by design, and understand that every third party you trust with data becomes part of your threat surface. Employees should feel comfortable navigating what should never be pasted into an AI chatbot, what should never be sent through email, and what should never be stored in a tool that logs everything forever.</p><p>The routine habits of every employee can substantially reduce your attack surface, and it also helps you build trust with your customers and clients. Train people well, shorten retention, standardize your tools, ban unnecessary devices in sensitive rooms, and make privacy part of daily operations instead of a compliance checkbox.</p><p>By teaching privacy hygiene to employees and enforcing clear internal privacy policies, you can dramatically increase your organization&#8217;s security. Build that culture, and your company gets stronger.</p><p>Yours in privacy,<br>Naomi</p><p><em>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://nbtv.media/support&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://nbtv.media/support"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[The Most Important Email I’ll Send This Year]]></title><description><![CDATA[A message to the people who refuse to accept the status quo.]]></description><link>https://nbtv.substack.com/p/the-most-important-email-ill-send</link><guid isPermaLink="false">https://nbtv.substack.com/p/the-most-important-email-ill-send</guid><dc:creator><![CDATA[NBTV Media]]></dc:creator><pubDate>Tue, 25 Nov 2025 16:59:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3D0f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone,</p><p>No matter where you are in the world, I wanted to take a moment to tell you how grateful I am that you&#8217;re here.</p><p>Thank you.</p><p>Our work at Ludlow Institute and NBTV is community supported. We only exist because people like you believe that privacy matters and that a better digital future is worth fighting for. You help us fight for that future every day.</p><p>This week&#8217;s newsletter is just to let you know much I appreciate you, and to remind you that you caring genuinely shapes what we are able to do.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3D0f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3D0f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3D0f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png" width="514" height="288.0659340659341" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:514,&quot;bytes&quot;:4457558,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://nbtv.substack.com/i/179882274?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3D0f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!3D0f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F72baef79-9879-4e90-8230-b0a1ad368433_2912x1632.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>First, Thank You to everyone who supports us.</h4><p>Everything we build, every tutorial we release, every investigation we publish is possible because you show up for us. You share our work. You support our nonprofit. You give your time, your attention, and your trust.<br>You make this mission possible. Truly.</p><h4>Thank You to the Builders</h4><p>I&#8217;m grateful for the engineers, researchers, hackers, and creators who spend long nights building the tools that keep us safe. Encrypted platforms, secure messengers, hardened operating systems, privacy-preserving protocols. Most people never think about the work that goes into maintaining and building these projects, yet the future of freedom relies on them. Thank you for building these tools for us. <br>You are creating the infrastructure of digital freedom.</p><h4>Thank You to the People Who Use These Tools</h4><p>Privacy tools only matter when people actually use them. Thank you to everyone who has switched messengers, de-Googled their phone, experimented with aliases, spun up a local AI model, tested new tools, filed bug reports, and helped strengthen these ecosystems through real use.</p><p>Unless we participate in the privacy landscape, these tools disappear.</p><p>You are the adoption curve that keeps them alive. You create the network effect that leads others to adopt them too. </p><p>Thank you for being the trailblazers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://nbtv.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">NBTV is funded entirely by community support. Consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Thank You to the People Who Spread the Word</h4><p>In a world where everyone is fighting to steal your attention, you choose to put your attention toward something that matters: Privacy. </p><p>You talk about it with your friends. You share videos. You teach, and you help. Cultural change happens because ordinary people decide the status quo is not acceptable and then do something about it.</p><p>Your willingness to stay focused in a distracting world is rare. We need more people willing to use their power the way you are. Thank you for having such a profound impact on the future we are able to write.</p><h4>Thank You to Everyone Who Cares</h4><p>I&#8217;m grateful for every person who refuses to accept a world where everything we do is surveilled.</p><p>Privacy only survives if people insist on it. And right now, thousands of you are insisting. You are the reason this movement is growing. You are the reason we can push for a better future. You are the reason we will win.</p><h4>If You&#8217;re Just Getting Started</h4><p>If you&#8217;re new here and just beginning your journey into privacy, welcome. This community cares about your well-being, cares about your future freedom, and wants to help you succeed. Ask your questions. There will always be people ready to chime in and point you in the right direction.<br>Here is our Privacy 101 video to get you started:</p><div id="youtube2-UgXjxQsyk4w" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;UgXjxQsyk4w&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/UgXjxQsyk4w?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Thank you to all of you, for helping us build a world where privacy is normal again.</p><p>Yours in privacy,<br>Naomi</p><p><em>Consider supporting our nonprofit so that we can fund more research into the surveillance baked into our everyday tech. We want to educate as many people as possible about what&#8217;s going on, and help write a better future. Visit <a href="https://www.ludlowinstitute.org/donate">LudlowInstitute.org/donate</a> to set up a monthly, tax-deductible donation.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://nbtv.media/support&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://nbtv.media/support"><span>Donate</span></a></p><p><strong><a href="https://Privacc.org">NBTV. Because Privacy Matters.</a></strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OZt7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg" width="162" height="242.77747252747253" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2182,&quot;width&quot;:1456,&quot;resizeWidth&quot;:162,&quot;bytes&quot;:7806069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OZt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!OZt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1065d49e-deba-4b72-af94-cb3496a1b0f3_3448x5168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Support NBTV and look awesome at the same time! Visit our merch store at <a href="http://shop.nbtv.media">Shop.NBTV.media</a></figcaption></figure></div>]]></content:encoded></item></channel></rss>