Channel Avatar

Rob Braxman Tech @UCYVU6rModlGxvJbszCclGGw@youtube.com

590K subscribers - no pronouns :c

Alt-Tech. The Internet Privacy Guy. Public interest hacker


21:46
Kill Privacy Forever! They Will Mandate an App to Watch You! Client Side Scanning
28:56
Can You Limit Your Mass Surveillance Footprint on the Telephone Network?
16:01
Are There Suspicious Communications Between iODE OS and Google? Isn't This a De-Googled OS?
24:36
BraX3 Setup Guide
26:36
Calyx Says Time Out! Musings About Android Custom ROMS
26:54
A Surveillance Bomb That Will Allow Someone to Watch Your Device
25:45
How Phones Can Be Attacked, But Why This Isn't a Source of Fear (Not About Privacy)
10:15
Finally! Unboxing the NEW BraX3 Phone!
25:05
How to Make Apps Safe (On De-Googled Phones)
28:52
Deep Dive Into Android: How GrapheneOS Is Locked Out
25:26
Let's Test a Mr Robot Attack on the New Thunderbird for Mobile
23:44
Playing With Browsers to Find Google's Kryptonite
25:38
Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today
24:00
Planning a Privacy Safe Search Strategy - Options in 2025
22:12
Is the AI Companion a Failed Concept? Or Wait for Other Shoe to Drop?
22:42
Deciphering the Mumbo Jumbo of New Laptop Technologies. We'll Simplify
21:08
AI Primarily Using Wikipedia Makes it the De-Facto Source of Online Intelligence. Is that Good?
13:55
Honest Explanation of the BraX3 Shipping Delay
21:43
Intelligence and Military Uses of Anonymous Phone Location Data
25:47
Private Surveillance Players that Sell Your Data - More Extensive than You Think
22:40
Mass Surveillance from a Corporate Source: ‘Fog Data Science’
23:45
A Pseudonym Will Not Protect You - Without a Plan. Privacy Masterclass Series #2
25:05
The Convoluted Story of Phone Manufacturing and the Effects of Tariffs
25:42
Can You Evade the KYC Layer? Privacy Masterclass Series #1
23:53
The Dead Drop: Design a Communications Method Like a Spy
23:27
What You Don't Know About TOR Might Cause a Privacy Mistake
19:20
The Side Channel Attack: One of the Hardest Cyber Threats to Defend Against
22:46
New Privacy Threat from Google? Full Analysis of the Tracking Infrastructure
19:59
Virtual Phone Solution - No KYC, Unregistered Phone Numbers with SMS
26:54
How Know-Your-Customer (KYC) is Used to Track Your Every Move
23:18
Client Side Scanning - See What You See - The Matrix is Complete!
22:35
Tiktok a Threat to National Security? Let's Follow the Science. "Data Science".
25:06
AI Assistants or Companions (Agents) are Bad! Well, Maybe Not All...
22:17
How to Evade Phone Surveillance in Emergencies
19:42
End-to-End Encryption Now a Historical Footnote. They Won.
27:26
Revealing the Hidden Spyware on Your Phone
28:06
Sailing into Fire in Pacific Palisades - Los Angeles
21:47
Your Vulnerability to the AI Creations of the Tech Elites
22:35
A New Control Tool to Disrupt Freedom and Free Speech
21:37
Here's a Practical Email Plan that has Nothing to Do With Email Encryption
22:02
The Next Scary AI Phase in Your New Windows and iPhone 16 is Here Now!
21:06
How to Detect a Psyop - Psyop Series Part 2
22:32
Are We the Target of a Psy Op? (Yes, it is active right now)
18:44
If You're Not Red-pilled, You Don't Need a Privacy Phone (We'll Keep it to Ourselves)
03:33
BraX3: The most privacy friendly smartphone
25:33
Institutionalized Mind Control, Run by the Idiots (Who Think They are Intellectuals)
25:27
Election Shock: Why the Pollsters Got It Wrong. Secret Revealed!
22:45
How to Be Cool Without Listening to Tim Cook
25:28
Your Data Will Leak from Online Sites If You Don't Understand THIS
26:29
How to Protect Yourself from AI by Understanding THIS
22:12
The New Surveillance Tool on Your Machine
25:14
Non-Caveman Alternatives to iPhones and Google Androids! Find Safe Phones that don't Track You
26:02
Which Device AI Spies on You the Most: Microsoft, Apple or Google? NOT Who You Think
23:59
Why the iPhone 16 Should Scare You Shitless!
26:18
A VPN is Useless Against These Kinds of Internet ID Threats
26:05
VPN INSIDER'S MYTH-BUSTING! Separating Fact from Fiction: How VPNs Really Work
27:25
Bring Your Linux Knowledge Up with Required Command Line Settings
21:44
SIP and VOIP. The Privacy Solution No One Knows About
25:14
Two Factor Authentication (2FA). The SCAM of the Century. Defensive Strategy.
24:15
We are Being Tracked on the Internet Via Our Phone Number! Zero Anonymity