All Things Secured | Online Privacy & Security on Odysee

PODCAST · technology

All Things Secured | Online Privacy & Security on Odysee

All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more.Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that.With the Internet of Things creeping into our daily lives, you can't put it off any longer. Learn the vital skills you need to keep your personal life private and understand best practices as relates to your home network, email, using your mobile phone, etc.Check Your Password Strength: https://www.allthingssecured.com/password-checker/Best VPNs for 2026: https://www.allthingssecured.com/best-vpn/Best Password Managers for 2026: https://www.allthingssecured.com/reviews/password-managers/best-password-manage

  1. 50

    STOP Trusting Edge (or Chrome) with your passwords

    If you still use your internet browser to store passwords, you need to watch this. Last week a security researcher uncovered a security flaw in the Microsoft Edge browser and not only did Microsoft acknowledge the vulnerability...they said it was "by design". This highlights an important security principle that most people ignore.My password manager suggestions: ▶ Proton Pass (recommended): https://proton.me/pass/allthingssecured ▶ 1Password: https://www.allthingssecured.com/yt/1password ▶ Bitwarden: https://www.allthingssecured.com/yt/bitwarden*the links here may be affiliate links, which means that I may receive compensation if you choose to use one of the services listed.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ I Switched from 1Password to Proton Pass. Here's why: https://www.youtube.com/watch?v=CBdDYurOMyg ✅ I Tested 7 Password Managers. Here's the Best: https://www.youtube.com/watch?v=BsVkVa0n0T0 ✅ 7 Tips & Hacks for Using a Password Manager: https://www.youtube.com/watch?v=71Fpkro1mzs&t=3s&pp=0gcJCQQLAYcqIYzv 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-ytLast week, a security researcher in Norway uncovered a vulnerability in the Edge browser that made all of the passwords stored in the browser visible as a plaintext file in the memory. While not an imminent threat, it does highlight the need for 2FA and how important it is to use dedicated privacy and security products like a password manager.#edgebrowser #passwordsecurity #cybersecuritynews

  2. 49

    iPhone Security Tips NOBODY Tells You (but are super EASY)

    These are the secret iPhone security settings most people don't know about. From resetting biometrics to special PIN codes, here are 11 iPhone hacks that will make your mobile device more secure. Be sure to also secure your network connection with ProtonVPN (70% off): https://protonvpn.com/vpn/allthingssecuredSpecific iPhone Security Tutorials: ▶ Turn on Advanced Data Protection: https://www.youtube.com/watch?v=Ef-MZ1eqULg ▶ Add Security Keys to your Apple ID: https://www.youtube.com/watch?v=rcmNVu7IJqk ▶ Turn on Contact Key Verification: https://www.youtube.com/watch?v=a4G8sEGJyBcIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ 12 ESSENTIAL Security Tools I Use Daily: https://www.youtube.com/watch?v=XNOAOQktG6U ✅ iPhone Mistakes that RUIN Your Privacy: https://www.youtube.com/watch?v=NwtEs1TGcLI ✅ 7 Cybersecurity Tips NOBODY Tells You (but are EASY to do): https://www.youtube.com/watch?v=Uy60wy20ADE 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://protonvpn.com/vpn/allthingssecured*********************Video Timestamps*********************0:00 - Introduction to iPhone Security0:25 - iPhone Biometric Reset1:45 - Stolen Device Protection2:29 - Screen Time Security Hack4:15 - Apple Hide Features4:34 - How to Hide Photos on iPhone5:14 - How to Lock Notes on iPhone5:44 - How to Hide Apps on iPhone6:26 - How to Hide a Home Screen on iPhone7:00 - Importance of Securing your Network Connection7:53 - Erase Data After Failed Logins8:44 - Auto Security Updates on iPhone10:00 - Apple Advanced Data Protection11:13 - 2FA Keys for iCloud********************* Yes, you need to have a secure PIN code and a strong password for your iCloud account, but when it comes to your iPhone security, there are other hacks and features that most people don't know about. Here are 11 of them to try for yourself.#iphonesecurity #iphonefeatures #iossecurity

  3. 48

    The “Unhackable” Phone Apple Doesn’t Want You To Know About

    Are the claims that the UP Phone is more private and secure than an Apple or Samsung phone true? Let's take a skeptical look at this phone from Unplugged and see which features are actually worthwhile. ▶ Learn more about the UP Phone here: https://www.unplugged.com*this is not an affiliate link so I will receive no compensation if you decide to use the Up Phone.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ Change these 7 Facebook Privacy Settings NOW! https://www.youtube.com/watch?v=KBdFF2Bm5jg&list=PLaqdQkNDSk04eyZ_s6TH5tHIbJBE28H9W&index=4 ✅ STOP Using VPNs! (here's why): https://www.youtube.com/watch?v=8x1BJCKwqpI&list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb ✅ Are spy apps safe? https://www.youtube.com/watch?v=UtwKMBNrl58&list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb&index=4 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to the UP Phone0:54 - Unplugged Hardware Security Features2:29 - Unplugged LibertyOS Operating System4:17 - General Impressions4:58 - Feature 1: System Firewall6:09 - Feature 2: Emergency Reset7:11 - Feature 3: Scheduled Reboots7:57 - Feature 4: Mic/Camera Controls8:49 - Feature 5: Integrated Antivirus & VPN9:39 - Up Phone Pros vs Cons11:02 - Who is Up Phone for?********************* In this Up Phone review, Josh uncovers the important privacy and security features that the mobile phone offers and how it's different than the average iPhone or Samsung device. Is the Unplugged privacy phone worth it?#mobileprivacy #privacyphone #iphonealternative

  4. 47

    Exposing How the Government Legally Spies on You

    There is a secret war on your privacy that is happening all over the world that affects you more directly than any other global conflict. In the US, the Fourth Amendment is at risk and the policies of foreign governments is often to blame.Steps You Can Take: ▶ Learn about the Surveillance Accountability Act: https://surveillanceaccountability.com ▶ Follow Naomi on YouTube: @NaomiBrockwellTV ▶ Erase data off data brokers with DeleteMe: https://joindeleteme.com/allthingssecuredIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ Watch another interview with Naomi Brockwell: https://www.youtube.com/watch?v=D0WjIWBQEBM ✅ Is your PHONE Listening to Everything you Say? https://www.youtube.com/watch?v=Lc2DivuhnHg ✅ How to "De-Google" your digital life: https://www.youtube.com/watch?v=CS50qvGi7is 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - the Global War on Privacy introduction0:49 - How Global Internet policies affect your privacy2:08 - Privacy rights of a US citizen (4th amendment)3:16 - Third-Party Doctrine explained4:48 - How Flock Cameras Invade Privacy5:27 - Age Verification Laws6:39 - Solutions: litigation and legislation********************* With wars raging in Iran, Syria, Ukraine, Myanmar and other places around the world, it's easy to gloss over the secret war that is happening in the digital realm. Our personal data is at risk and the consequences are more dramatic than most people realize. In this video, Naomi Brockwell introduces the new Surveillance Accountability Act that is meant to push the US to uphold the Fourth Amendment for our digital lives.#internetprivacy #onlineprivacy #digitalrights #fourthamendment

  5. 46

    I tried 100s of VPNs. Here's what you NEED.

    This isn't a VPN tier list or a "top 5" ranking. It's a practical look at the three main reasons you might use a VPN and the proper tool that fits that need. At the end of the day, it's not about the number of servers, features or even pricing, it's about ONE thing that's more important than everything else.Links to the VPNs: ▶ ProtonVPN: https://www.allthingssecured.com/yt/protonvpn ▶ Mysterium (dVPN): https://www.allthingssecured.com/yt/mysterium ▶ iVPN: https://www.allthingssecured.com/yt/ivpn ▶ NordVPN: https://www.allthingssecured.com/yt/nordvpn ▶ Surfshark VPN: http://allthingssecured.com/yt/surfshark ▶ Mullvad: https://www.allthingssecured.com/yt/mullvad*no company paid to be included in this video. Some, but not all of the links above are affiliate links, which means that I may be compensated if you choose to use one of these services.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ DON'T Use a VPN (here's why): https://www.youtube.com/watch?v=8x1BJCKwqpI ✅ TOR vs VPN explained: https://www.youtube.com/watch?v=Z5G2I18BUCg ✅ 4 VPN Alternatives that are Safer and FREE: https://www.youtube.com/watch?v=WIAf3g8Us58 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - This is NOT a VPN Ranking video0:37 - What is a VPN?2:11 - VPNs to Defeat Government Censorship3:40 - VPNs to Stream Content4:35 - VPNs for Privacy & Anonymity5:44 - A Caution for VPN usage6:09 - What is the Best VPN?********************* There are plenty of "best VPN" or "Top 5 VPN" videos out there, but most of them are from people who only care about making an affiliate commission or they don't understand the reality of how VPNs are used. Because when it comes to a virtual private network, your reason for using it plays a bigger role in your decision than pricing or even features.#vpn #bestvpn #onlinesecurity

  6. 45

    Passkeys Explained (so even a child could understand)

    We're always getting asked to create a passkey on websites now, but it's not clear why this is better than a password. Using the flight ticket analogy, Josh explains how passkeys work, compares passkeys vs passwords and gives advice on how to carefully use them. Want to learn more? Get the security & privacy checklist: https://www.allthingssecured.com/checklistI recommend creating passkeys using: ▶ A good password manager: https://www.allthingssecured.com/yt/proton-pass ▶ A good 2FA security key: https://www.allthingssecured.com/yt/yubikey*not sponsored; these are affiliate linksLearn the technical side of passkeys with this video by @Computerphile : https://www.youtube.com/watch?v=xYfiOnufBSk🔹What to Watch Next🔹 If you want to learn more about passkeys and secure online logins, watch one of these videos next: ✅ How to Create a Passkey for Amazon accounts: https://www.youtube.com/watch?v=ksBuEniFZSY ✅ Are Passkeys actually BAD? https://www.youtube.com/watch?v=_tQbWop1P7o ✅ Why I switched from 1Password to Proton Pass: https://www.youtube.com/watch?v=CBdDYurOMyg ✅ I Tested 7 Password Managers. This is the Best: https://www.youtube.com/watch?v=BsVkVa0n0T0 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Passkeys0:57 - What is a Passkey (airport analogy)3:41 - Downsides of Passkeys4:35 - New Credential Exchange Protocol5:15 - Advice for Using Passkeys********************* For decades we've all used passwords to secure all of our online accounts, but that's all changing. The new industry standard, known as "passkeys", may be stronger, but that doesn't make them less confusing. Here's a simple explanation using a flight ticket as an example.#passkey #passkeys #onlinesecurity #cybersecurity

  7. 44

    SECURE Messaging isn't what you think

    The prevailing privacy wisdom says you should only use Signal for your communications. But is that good advice? Sometimes hiding everything makes you look more suspicious, so in this video Josh explains a concept called "Compartmentalized Communication" as an alternative. Learn more with the free 7-part Security & Privacy email course: https://www.allthingssecured.com/emailcourseIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ 19 Macbook Security Changes to Make in 2026: https://www.youtube.com/watch?v=tZ_PdMtCdJI ✅ Best Brave Browser Settings (to copy): https://www.youtube.com/watch?v=dOIQY02q7yA ✅ How to De-Google Your Digital Life: https://www.youtube.com/watch?v=CS50qvGi7is 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Compartmentalized Communication1:10 - Splitting Hardware devices1:56 - Splitting Software apps for communication3:36 - My Communication Triage Strategy12:07 - Secure Communication Strategy********************* Ditching every communication app except Signal might sound like good privacy advice, but it actually does more harm than good. In this video, Josh explains how you can strategically separate your communication so that you still remain privacy while also meeting people in the apps they already use.#privacymatters #signalap #securecommunication

  8. 43

    STOP using Credit Cards (do this instead)

    Credit cards are ancient technology that offer little security and no control. Most people don't know that there are better alternatives that not only prevent fraud, they also give you power over your financial transactions. Get actionable security & privacy tips to your inbox: https://www.allthingssecured.com/emailcourseTry one of these alternatives (not sponsored): ▶ Try Privacy Cards (get a $5 credit with this link): https://app.privacy.com/join/NMDMT ▶ Try Klutch Cards: https://app.klutchcard.com/r/SECURED ▶ Apply for the Apple Card: https://www.apple.com/apple-card/If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ What is a Virtual Credit Card? https://www.youtube.com/watch?v=pJ-ZsfONByw ✅ The Secret Privacy Tool You've Never Heard of: https://www.youtube.com/watch?v=qyB-ePiE_j4 ✅ 12 Essential Security Tools I Use Daily: https://www.youtube.com/watch?v=XNOAOQktG6U 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Credit Cards are Outdated1:10 - The Future of Payments1:58 - Option 1: Tap to Pay Secure Payment3:26 - Option 2: Virtual Card Numbers4:30 - Option 3: True Virtual Cards for Security6:12 - Next Steps for Secure Payments7:42 - Closing Thoughts********************* Credit cards are not a secure form of payment, and yet their design hasn't changed in over 6 decades. There are more secure payment methods, but banks don't want you to use them because there's a chance you'll spend less money if you do. This week Josh breaks down three options that might have you cutting up your physical credit card.#privacymatters #securepayments #creditcards

  9. 42

    AI Privacy Guide: 4 Tools + 8 Rules

    AI is here to stay, but HOW you use it will determine whether you maintain or lose your privacy. Josh tests different types of private AI and provides a simple framework for how to future-proof your AI usage. Be sure to control your personal privacy online with DeleteMe. Get 20% off here: https://joindeleteme.com/allthingssecuredHere are the AI tools mentioned in this video (*not affiliate): ▶ Duck.ai - the "man in the middle" kind of AI ▶ Lumo.proton.me - a privacy-first alternative to ChatGPT ▶ Pansophy.co - local AI downloaded to your computer ▶ Minstral.ai - privacy options as well as locally hostedIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ How to De-Google your Digital Life: https://www.youtube.com/watch?v=CS50qvGi7is ✅ iPhone User Switches to Open Source Phone: https://www.youtube.com/watch?v=KsTxYhsiQvY ✅ How to Verify iPhone contacts: https://www.youtube.com/watch?v=a4G8sEGJyBc&t=1s&pp=0gcJCYcKAYcqIYzv 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to AI Privacy0:57 - What is "Private AI"?1:39 - AI Privacy Testing Rules2:16 - Duck.ai - Middleman AI3:47 - Minstral.ai - Privacy modes possible5:25 - Pansophy AI - locally hosted AI option7:53 - Personal Privacy Online with DeleteMe8:43 - Proton Lumo AI - privacy first models10:26 - AI Privacy Framework (8 rules)13:43 - Conclusion of AI Privacy********************* Is it possible to use AI while maintaining personal data privacy? Whether you consider AI privacy modes, locally hosted models or other privacy-first approaches, there are a number of tools and rules you should consider. Here's what you should know.#aiprivacy #privateai #privacymatters

  10. 41

    and other EASY security alternatives

    The best privacy and security advice is pointless if you don't actually USE it! Here are 7 simple alternatives to traditional cybersecurity advice that makes things so simple, you barely have to think about it. Get $5 off your YubiKey here: https://www.allthingssecured.com/yubikey5offOther resources mentioned: ▶ Mobile Phone Privacy Case: https://geni.us/privacy-phone-case ▶ NanoBloc Camera Covers: https://geni.us/nanobloc ▶ How to Freeze Your Credit: https://www.youtube.com/watch?v=AV70YFXIQa8 ▶ NanoBloc Camera Covers: https://geni.us/nanobloc*some of the links above are affiliate links, which means that we may be compensated if you choose to make a purchase.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ 19 Macbook Security Settings to Change: https://www.youtube.com/watch?v=tZ_PdMtCdJI ✅ Best Brave Browser Setup: https://www.youtube.com/watch?v=dOIQY02q7yA ✅ How to De-Google Your Life: https://www.youtube.com/watch?v=CS50qvGi7is&pp=2AYB 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction0:23 - Phone Camera Privacy alternative1:20 - Credit Fraud Prevention alternative2:10 - Easier 2FA Account Security3:40 - Better Password Input4:17 - Scam & Impersonation Prevention5:09 - Better Internet Browser5:44 - Easier Email Aliases6:26 - BONUS: auto updates********************* The best security processes and products are the ones you'll actually use day-in and day-out. Unfortunately, so much of security is inconvenient and hard. Watch as Josh explores 7 simple alternatives that make cybersecurity a no-brainer.#cybersecurity #onlinesecurity #onlineprivacy

  11. 40

    How to Verify Contacts on iPhone (Contact Key Verification Tutorial)

    Contact Key Verification is a little-known security feature that allows iPhone users to verify their iMessage contacts. Here's a quick summary of what it is as well as the two methods to set it up. Learn this and many more security tips by joining our weekly newsletter: https://www.allthingssecured.com/newsletterNext, be sure to turn on Advanced Data Protection: ▶ Tutorial: https://www.youtube.com/watch?v=Ef-MZ1eqULg&pp=2AYJIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next: ✅ Why I DON'T use Apple Passwords app: https://www.youtube.com/watch?v=4VMhGm3x3oI&pp=2AYK ✅ iPhone Mistakes that RUIN your Privacy: https://www.youtube.com/watch?v=NwtEs1TGcLI&pp=2AYN ✅ Is your Phone always listening? https://www.youtube.com/watch?v=Lc2DivuhnHg 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Contact Key Verification1:29 - How it works (CKV)3:02 - Should You Use Contact Key Verification?4:28 - How to Set Up Contact Key Verification5:30 - Set Up CKV In-Person6:03 - Set Up CKV Asynchronously7:09 - Concluding Thoughts********************* Contact Key Verification, or CKV for short, is a security feature on Apple devices that allows you to verify the identity of other Apple users to protect from SIM swaps, compromised Apple IDs, assumed identities and other impersonation attacks. But should you use it?#applesecurity #iphonesecurity #contactkeyverification

  12. 39

    19 MacBook Security Settings to Change (<15 minutes)

    Whether you have a new MacBook or one that you&#039;ve used for years, here are the simple but important security settings every user should change. Thanks to Proton for their support this year! Get their amazing password manager here: https://www.allthingssecured.com/try/proton-macbook ▶ Download the PDF Tutorial: https://www.allthingssecured.com/macbookHere are some of the other video tutorials mentioned: ▶ Advanced Data Protection video: https://odysee.com/@AllThingsSecured:9/everything-you-need-to-know-about:69 ▶ Apple 2FA Key Tutorial: https://odysee.com/@AllThingsSecured:9/new-to-iphone-security-feature-(only:0 ▶ Lockdown Mode Tutorial: https://odysee.com/@AllThingsSecured:9/apple&#039;s-new-lockdown-mode-(here&#039;s-what:1If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase the security of your Apple products, here&#039;s what&#039;s next: ✅ Best iOS Security Features? https://odysee.com/@AllThingsSecured:9/11-iphone-mistakes-that-will-ruin-your:8 ✅ Should You Use Apple Passwords? https://odysee.com/@AllThingsSecured:9/i&#039;m-not-using-apple&#039;s-new-passwords-app:2 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to MacBook Security********************* Lock down your MacBook computer with these 19 simple security settings! Each change is easy to make and rated based on their importance to your overall security. Be sure to download our free PDF tutorial here: https://www.allthingssecured.com/macbook#macbook #applesecurity #cybersecuritytutorial

  13. 38

    STOP your Phone from Listening! (Privacy 101)

    It&#039;s easy to cover the cameras on a phone, but what about the microphones? And are they really listening and sending data off to big tech? Here&#039;s the no-nonsense truth along with 4 levels of protection. Be sure to check out DeleteMe to learn how to protect your personal data online: https://www.joindeleteme.com/allthingssecuredHere are links to some of the solutions mentioned: ▶ Project Guardian: https://www.allthingssecured.com/try/guardian ▶ Check out Purism Phones: https://www.allthingssecured.com/try/purism ▶ SLNT Faraday Bags: https://www.allthingssecured.com/try/slnt*some of the links above may be affiliate links, which means that at no extra charge to you, we may receive a commission off of any sales from those links.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Does DeleteMe even work? https://www.youtube.com/watch?v=PpcZ6VIEVVs&amp;pp=2AaAAg%3D%3D ✅ Switching to a Privacy Phone: https://www.youtube.com/watch?v=KsTxYhsiQvY&amp;pp=2AYC ✅ How to De-Google Your Life: https://www.youtube.com/watch?v=CS50qvGi7is&amp;pp=2AYB 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Mobile Privacy: Camera vs Microphone1:08 - The Reason for an Active Mobile Microphone1:52 - Mic Privacy Myths: Truth vs Fiction4:18 - Level 1 Mobile Mic Protection5:32 - Level 2 Mobile Mic Protection6:46 - How to Use DeleteMe to Remove Personal Info Online7:18 - Level 3 Mobile Mic Protection7:56 - Level 4 - Guardian Ultrasonic Mic Protection8:55 - Final Takeaway********************* Your mobile phone microphone is always active...but is it always recording or listening? In this video, Josh clearly explains the actual risks and what you can do whether you&#039;re worried about privacy or you&#039;re just a regular individual.#privacymatters #mobileprivacy #onlineprivacy

  14. 37

    6 Devices Secretly Tracking You Everywhere Odysee

    Your car has more sensors than the old Saturn V rocket that went to the moon. Your &quot;smart&quot; devices such as your TV, vacuum and electricity meter know more about you than you realize. These are the six most alarming devices that are tracking your data every day. Download the free security checklist here: https://www.allthingssecured.com/checklistHere&#039;s how online companies are tracking you and how to opt out: ▶ How Facebook Tracks your Data: https://odysee.com/@AllThingsSecured:9/i-printed-my-facebook-data-file-%F0%9F%A4%AF:6 ▶ How Amazon Tracks your Data: https://odysee.com/@AllThingsSecured:9/here&#039;s-how-amazon-tracks-you-(and-how-to:5If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Why I DON&#039;T recommend ExpressVPN anymore: https://odysee.com/@AllThingsSecured:9/The-Rise-and-Fall-of-ExpressVPN:0 ✅ the BEST Brave Browser Security &amp; Privacy Settings: https://odysee.com/@AllThingsSecured:9/My-Brave-Browser-Security-Settings-(desktop---mobile):4 ✅ How to De-Google Your Digital Life: https://odysee.com/@AllThingsSecured:9/EASY-way-to-de-Google-your-Email---Passwords-(Tutorial):7 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Tracking Devices0:57 - Your Car is Tracking You2:46 - How Smart Meters are Tracking You5:07 - RFID Tags in Clothes for Tracking6:16 - Your Hotel Keycard is Tracking You7:12 - Smart TV Tracking9:18 - Robot Vacuum Data Tracking11:04 - Prepare for Better Privacy********************* In this video, Josh explains how your vehicle, the RFID tags in clothes, smart electricity meters, hotel key cards, Smart TVs and even your robot vacuum are a privacy nightmare. Learn how they collect personal data and what you can do to stop it or opt out.#privacymatters #infosec #cybersecurity

  15. 36

    The Rise and Fall of ExpressVPN

    Once the king of VPNs, ExpressVPN has seen a dramatic fall of grace that started in 2021. This is the story of the rise and fall of one of the most well-known privacy and security apps. Start protecting your own online identity with our free email course: https://www.allthingssecured.com/email-course/Recommended alternatives to ExpressVPN (affiliate): ▶ ProtonVPN: https://www.allthingssecured.com/yt/protonvpn ▶ NordVPN: https://www.allthingssecured.com/yt/nordvpn ▶ iVPN: https://www.allthingssecured.com/yt/ivpnIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to learn more about VPNs or online security in general, here&#039;s what to watch next: ✅ STOP Using a VPN for Security: https://odysee.com/@AllThingsSecured:9/don&#039;t-use-a-vpn...it&#039;s-not-the-ultimate:0 ✅ VPN vs TOR Explained: https://odysee.com/@AllThingsSecured:9/tor-vs-vpn-what&#039;s-the-difference-(and:a ✅ How to Setup a 2FA Key for Security: https://odysee.com/@AllThingsSecured:9/how-to-setup-a-2fa-key-for-maximum:4 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - The Rise and Fall of ExpressVPN0:30 - &quot;Biggest Change&quot; in ExpressVPN History0:59 - The Early Days of ExpressVPN2:08 - The Growth of VPNs3:31 - ExpressVPN is Acquired by Kape4:23 - The Downfall of ExpressVPN7:15 - Security &amp; Trust Based on Transparency8:35 - Key to Privacy is Control********************* This is the story of the rise and fall of ExpressVPN, a virtual private network that was once the top in the industry. In 2021 they were sold to Kape Technologies and thus began the chaotic unravelling of a company that no longer looks like it once did.#expressvpn #riseandfall #vpns

  16. 35

    Why I DON'T Use Privacy Cloaking Apps (like MySudo)

    You&#039;ve heard of password managers, private messengers and VPNs, but what about pseudonym management services? We&#039;re exploring the benefits of these privacy tools, how they work, and whether or not they&#039;re even worth using. Want to build more privacy? Join our free, 7-day email course: https://www.allthingssecured.com/email-course/Learn more about the 3 services mentioned: ▶ MySudo: https://www.mysudo.com ▶ Cloaked: https://www.cloaked.com/ats ▶ Ironvest: https://www.allthingssecured.com/try/ironvest*some of the links above may be affiliate links, which means that I may receive compensation if you decide to sign up for one of the services. None of these companies paid to be promoted here.If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ 5 Ways to Use Email Aliases: https://odysee.com/@AllThingsSecured:9/how-i-create-and-manage-email-aliases:8 ✅ 12 Essential Security Tools I Use Everyday: https://odysee.com/@AllThingsSecured:9/12-privacy-security-tools-i-use-every:1 ✅ How to Create Pseudonyms: https://odysee.com/@AllThingsSecured:9/how-to-build-internet-privacy-with:c 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-ytPseudonym Management Services are privacy tools that help you create email aliases, secondary phone numbers, and even virtual credit cards. In this video, Josh compares three such services - MySudo, Cloaked and Ironvest - explaining both the benefits of each...and why he doesn&#039;t use any of them.#privacytools #privacymatters #onlinesecurity

  17. 34

    EU War Against Privacy Explained (Chat Control)

    For the past few months, the EU has been on a mission to break privacy and end-to-end encryption in the name of child safety. Here&#039;s what this means for you, even if you&#039;re not an EU citizen. Learn how to build better personal privacy and security online with our free 7-day email course: https://www.allthingssecured.com/email-course/ ▶ Special thanks to Hanna from Tuta. Learn more about Tuta email here: https://tuta.com/?t-src=ats🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ How to De-Google Your Life: https://odysee.com/@AllThingsSecured:9/EASY-way-to-de-Google-your-Email---Passwords-(Tutorial):7 ✅ How Secure is your email? https://odysee.com/@AllThingsSecured:9/Email-is-NOT-as-Private-as-you-Think:4 ✅ The BEST Brave Browser Privacy Settings: https://odysee.com/@AllThingsSecured:9/My-Brave-Browser-Security-Settings-(desktop---mobile):4 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************This past month, a bill known as &quot;Chat Control&quot; almost broke encryption in the EU by forcing tech companies to create a backdoor into their software that would allow authorities to scan all messages before they get sent. Thankfully, German shot this down, but here&#039;s why it&#039;s important to you and why it probably won&#039;t go away soon.

  18. 33

    Lifelong iPhone User Switches to Open Source OS (Secure?)

    I put Graphene OS to the test by ditching my iPhone to see how easy it is to switch. If you value mobile privacy, here&#039;s what you need to know before you make a similar switch. Take the first step toward better online privacy with a free Proton account: https://www.proton.me/allthingssecuredLearn more about Graphene OS: ▶ What&#039;s the difference between Android vs Graphene: https://www.allthingssecured.com/identity-protection/android-vs-grapheneos-compared/ ▶ Best Graphene OS security settings: https://www.youtube.com/watch?v=XkKxYI4osOsWant to improve your online privacy and security? Take our free 7-day email course that walks step-by-step through different layers of practical advice: ✅ Join the Free Security Course: https://www.allthingssecured.com/email-course🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ How to De-Google Your Digital Life: https://www.youtube.com/watch?v=CS50qvGi7is&amp;pp=2AYB ✅ iPhone Mistakes that RUIN Your Privacy: https://www.youtube.com/watch?v=NwtEs1TGcLI&amp;pp=2AYN ✅ 12 ESSENTIAL Security Tools I Use Daily: https://www.youtube.com/watch?v=XNOAOQktG6U&amp;pp=2AYC0gcJCcYJAYcqIYzv 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Ditch the Apple iPhone1:11 - Using Graphene OS2:14 - Comparing the Initial Setup4:05 - Using Proton Privacy apps5:05 - Pros of Open Source OS7:36 - Cons of Open Source OS9:12 - The Biggest Challenge10:06 - The Verdict: GrapheneOS or iOS?11:08 - Closing Thoughts********************* Graphene OS offers maximum independence and transparency for security-conscious users, while iOS delivers convenience, reliability, and strong—but Apple-controlled—security.

  19. 32

    My Brave Browser Security Settings (desktop & mobile)

    Look over my shoulder as I share the security and privacy settings I&#039;ve set for my Brave browser. Although Brave is already one of the best browsers out-of-the-box, there are still settings worth changing. Get this an other actionable advice in our new &quot;1 Week to Better Privacy&quot; email course: https://www.allthingssecured.com/email-course ▶ Not using Brave yet? Download it free here: https://www.brave.comIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Change these 7 Facebook Privacy Settings NOW! https://www.youtube.com/watch?v=KBdFF2Bm5jg&amp;list=PLaqdQkNDSk04eyZ_s6TH5tHIbJBE28H9W&amp;index=4 ✅ STOP Using VPNs! (here&#039;s why): https://www.youtube.com/watch?v=8x1BJCKwqpI&amp;list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb ✅ Are spy apps safe? https://www.youtube.com/watch?v=UtwKMBNrl58&amp;list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb&amp;index=4 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Brave Browser0:27 - 1 Week to Better Privacy Email Course0:54 - Brave Browser Desktop Settings13:33 - Brave Browser Mobile Settings19:24 - Closing Thoughts********************* The Brave browser is one of the best ways to protect your privacy and security while accessing the internet. In this tutorial, Josh walks through all of the major settings that you can and should change on your desktop and mobile devices.#bravebrowser #cybersecurity #onlineprivacy

  20. 31

    China Accused me of Being a Spy (true story)

    This is the true story of how China followed my every move and eventually detained and interrogated me for weeks. This is the origin story of All Things Secured that has never been told before, and it&#039;s a peek into the future of surveillance and privacy. Get 20% off DeleteMe: https://joindeleteme.com/allthingssecuredLearn how to lock down your online privacy by downloading this free checklist: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ How to DeGoogle your Life (step-by-step tutorial): https://odysee.com/@AllThingsSecured:9/EASY-way-to-de-Google-your-Email---Passwords-(Tutorial):7 ✅ 7 Cybersecurity Tips NOBODY Tells You: https://odysee.com/@AllThingsSecured:9/7-cybersecurity-tips-nobody-tells-you:8 ✅ 12 Essential Security Tools I Use Every Day: https://odysee.com/@AllThingsSecured:9/12-privacy-security-tools-i-use-every:1 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to China&#039;s Surveillance1:35 - Government Surveillance &amp; Censorship2:54 - Tracking Digital Money &amp; Transactions4:25 - Shrinking Personal Privacy6:37 - Erasing Personal Data Online (DeleteMe)7:41 - Police Tracking in Public Spaces9:56 - Monitoring Personal Devices11:26 - Interrogated by Chinese Police13:02 - What You Can Do Next********************* In April of 2018, Josh was detained and interrogated by Chinese security officers for 17 days. After years of being constantly monitored and surveilled everywhere he went, he finally came face to face with all of the data they had collected on him. This is the story of how that happened and why All Things Secured was started.#china #cybersecurity #surveillance

  21. 30

    7 Security Habits to Teach Your Kids NOW

    As a parent, there are not only steps you need to take to protect your child online, it is also your responsibility to teach them cyber safety habits they will need. Download the Child Safety Checklist here: https://www.allthingssecured.com/child-safety-checklist/Get the info to freeze your child&#039;s credit with each bureau: ▶ Experian: https://www.experian.com/blogs/ask-experian/requesting-a-security-freeze-for-a-minor-childs-credit-report/ ▶ TransUnion: https://www.transunion.com/fraud-victim-resources/child-identity-theft ▶ Equifax: https://www.equifax.com/personal/education/identity-theft/articles/-/learn/freezing-your-childs-credit-report-faq/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ How to use the Proton Pass Password Manager: https://www.youtube.com/watch?v=CBdDYurOMyg ✅ I Tested 5 Secure Email Providers: https://www.youtube.com/watch?v=72eG84gGR0s&amp;t=82s&amp;pp=0gcJCa0JAYcqIYzv ✅ How to Set Up a Credit Freeze: https://www.youtube.com/watch?v=AV70YFXIQa8 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction0:43 - Freeze your Child&#039;s Credit1:44 - Teach Kids to Use Password Managers3:01 - Email Account Separation3:58 - Lock Down Kids Devices5:24 - Teach Kids to Use Social Media6:03 - Teach Kids to Spot Scams &amp; AI7:06 - Teach Kids to use 2FA7:53 - Final Thoughts &amp; Download*********************#cybersecurity #parentalcontrols #screentime

  22. 29

    EASY way to de-Google your Email & Passwords (Tutorial)

    The first step to &quot;de-Google&quot; your digital life is to move both your email and password storage. It may seem daunting, but it&#039;s actually easier than it sounds. I recommend starting with a free Proton account: https://www.proton.me/allthingssecuredWant to improve your privacy &amp; security online? Download this free security checklist: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ How Email Encryption REALLY works: https://www.youtube.com/watch?v=sCNSwVmeLaE ✅ Why I Switched to Proton Pass: https://www.youtube.com/watch?v=CBdDYurOMyg ✅ Simple Guide to Passkeys: https://www.youtube.com/watch?v=_tQbWop1P7o 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Google owns your Online Life0:45 - Exporting your Chrome Passwords1:44 - Importing Passwords into Proton Pass3:00 - How to Delete Google Chrome Passwords3:30 - Migrate Email from Gmail to Proton Mail4:18 - Step 1: Set up Email Forwarding4:48 - Step 2: Import Email using Easy Switch6:04 - Download the Proton Apps********************* If you&#039;ve ever considered moving away from Gmail, Google Calendar or from storing all your sensitive passwords in Google Passwords, this step-by-step tutorial is going to help you understand how to switch to a more private alternative like @ProtonPrivacy in less than 10 minutes.#gmail #secureemail #emailprivacy

  23. 28

    11 EASY Privacy Tips ANYONE Can Do

    You don&#039;t have to live off-grid or delete Facebook in order to gain better privacy online. Here are 11 easy steps that anyone can take - including your parents - to help them regain control of their personal info. Get $5 off a Yubikey for you and your loved ones here: https://www.allthingssecured.com/yubikey5off ✅ Download our free Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Change these 7 Facebook Privacy Settings NOW! https://www.youtube.com/watch?v=KBdFF2Bm5jg&amp;list=PLaqdQkNDSk04eyZ_s6TH5tHIbJBE28H9W&amp;index=4 ✅ STOP Using VPNs! (here&#039;s why): https://www.youtube.com/watch?v=8x1BJCKwqpI&amp;list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb ✅ Are spy apps safe? https://www.youtube.com/watch?v=UtwKMBNrl58&amp;list=PLaqdQkNDSk045WN0t6hkJBPgkstq78gtb&amp;index=4 🔹Support All Things Secured (Recommended)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Most Privacy Tips are Overkill0:58 - Switch Your Internet Browser1:31 - Share Files Privately2:15 - Set Socials to Private3:14 - Encrypt your Hard Drive3:43 - Lock Down Mobile Devices4:21 - Start Using a 2FA Key5:13 - Get Camera Blockers &amp; Privacy Screens5:50 - Segregate Your Files6:25 - Consider App Privacy Alternatives6:55 - Mask Your Personal Data7:29 - Do an Annual Mobile Phone Audit********************* There&#039;s a lot of wild privacy tips out there from people who use Tor, don&#039;t use Apple devices, live completely off-grid or hate all big tech. However, most of that is a bit overkill for people. So what are the EASY steps that anyone can take to improve their privacy online?#privacymatters #privacyfirst #onlinesafety

  24. 27

    Email is NOT as Private as you Think

    You&#039;d be surprised at how much data leaks from our email. We&#039;ve come a long way in how we secure email, but it&#039;s still not as private as you think it is. Here&#039;s how email works, including encryption and protection against other threats. Get 20% off DeleteMe here: https://www.joindeleteme.com/allthingssecuredAdditional resources mentioned: ▶ Watch the full interview with Brandon: https://odysee.com/@AllThingsSecured:9/email-encryption-explained-(pgp,:b ▶ Find the best Secure Email providers: https://odysee.com/@AllThingsSecured:9/i-tested-5-secure-email-providers-(this:d ▶ How to choose your 2FA key: https://odysee.com/@AllThingsSecured:9/which-yubikey-2fa-key-is-actually-what:6If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - History of Email Communications0:51 - How Email is Sent1:58 - How Email is Secured with TLS Encryption4:02 - How DeleteMe Erases your info Online4:58 - How End-to-End Encryption for Email works7:38 - The Threat of Quantum Computers9:23 - How to Protect Your Email********************* Email isn&#039;t as private as you might think. Here&#039;s a look at how an email is sent, how it is protected while in transit, and what email providers like Gmail, Outlook and Yahoo can see. Understand how to protect your email with end-to-end encryption.#emailprivacy #emailsecurity #emailencryption

  25. 26

    7 Privacy Myths People STILL Believe (do you?)

    You turned off GPS and you think you can&#039;t be tracked? Perhaps you deleted a file on your computer and you think it&#039;s actually gone. These are two of many popular myths about privacy that are complete B.S. Here&#039;s what you need to know to protect yourself. Join the newsletter! https://www.allthingssecured.com/newsletter ▶ Here are 7 Cybersecurity tips NOBODY tells you: https://odysee.com/@AllThingsSecured:9/7-cybersecurity-tips-nobody-tells-you:8If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ I switched from 1Password to Proton Pass...here&#039;s why: https://odysee.com/@AllThingsSecured:9/i-switched-password-managers-(finally):9 ✅ What are passkeys? (and how to use them): https://odysee.com/@AllThingsSecured:9/what-the-!-!-are-passkeys-(-should-you:e ✅ The BEST Secure Email providers: https://odysee.com/@AllThingsSecured:9/i-tested-5-secure-email-providers-(this:d🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00​ - Privacy Myths Intro0:28 - Facebook Tracking Myth0:46 - Private Social Media Myth2:18 - File Deletion Myth3:32 - VPN Privacy Myth4:47 - &quot;Strong&quot; Passwords Myth6:01 - Stop GPS Tracking Myth6:57 - The &quot;Nothing to Hide&quot; Myth8:05 - Be the Gatekeeper *********************Many people still believe simple privacy myths that put their personal information at risk online.For example “I have nothing to hide,” but everyone has personal data worth protecting, like financial or health information, Another one is relying only on strong passwords without using two-factor authentication, GPS tracking, or assuming public Wi-Fi is safe are all risky assumptions. Understanding these myths helps people make safer choices online.#cybersecurity #privacyfirst #privacymatters

  26. 25

    the TRUTH behind how Data Brokers operate

    Learn the secrets behind how data brokers work in this deep dive conversation between Josh and DeleteMe CEO Rob Shavell. Your data is being collected and sold without your consent and often without your knowledge. How is this possible and what can you do about it? Get 20% off DeleteMe: https://www.joindeleteme.com/allthingssecured ▶ My Experience Using DeleteMe (Video Review): https://odysee.com/@AllThingsSecured:9/1-year-later...did-deleteme-really-erase:5 ▶ How Data Removal Works: https://odysee.com/@AllThingsSecured:9/Data-Brokers-Video:6If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹What to Watch Next🔹If you&#039;re concerned about your personal data privacy, here are some additional videos that are worth watching and learning from: ✅ How to Blur your Home on Google Street View: https://odysee.com/@AllThingsSecured:9/how-to-blur-your-home-on-google-street:c ✅ 12 ESSENTIAL Security Tools I Use Daily: https://odysee.com/@AllThingsSecured:9/12-privacy-security-tools-i-use-every:1 ✅ How to Use Email Aliases (correctly): https://odysee.com/@AllThingsSecured:9/how-to-build-internet-privacy-with:c 🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00​ - Data broker&#039;s a thing?2:49 - How it works?5:57 - Risks on data broker business9:04 - Join DeleteMe 9:32 - About data removal companies12:31 - What is one thing to change16:08 - Data being a byproduct? 19:30 - using AI on data broker industry26:00 - How AI impacts data collection33:52 - What&#039;s next for DeleteMe?37:33 - Risk of Bluetooth in Modern Cars39:48 - Is Microsoft a Data Broker?42:00 - Should we own our data?43:42 - Join DeleteMe *********************DeleteMe CEO Rob Shavell joins Josh Summers to explain the inner workings of data brokers, why credit bureaus are the unavoidable enemy and how connecting your mobile phone to your car can be a huge privacy risk.#dataprivacy #privacymatters #cybersecurity

  27. 24

    How to Choose a Security Camera that Respects PRIVACY

    With so many security camera systems on the market, how can we know which is best? The S.C.O.P.E. framework will help you evaluate and confidently make a decision based on your specific needs. Stay up-to-date on the latest privacy and security news: https://www.allthingssecured.com/newsletter ▶ Learn more about the Safemo camera system (affiliate, not sponsored): https://geni.us/safemo-cameraIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹If you&#039;re concerned about your home privacy and security, here are some additional videos that are worth watching and learning from: ✅ How to Blur your Home on Google Street View: https://www.youtube.com/watch?v=86tYLE0Q6hg ✅ 12 ESSENTIAL Security Tools I Use Daily: https://www.youtube.com/watch?v=XNOAOQktG6U ✅ How to Use Email Aliases (correctly): https://www.youtube.com/watch?v=J7uGUD9kprs 🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to Security Cameras1:11 - Storage - How does the camera store video files?2:40 - Connectivity - WiFi vs Wired systems3:38 - Origin - Manufacturing and Data Flow4:22 - Pricing - Subscription vs One-Time Purchase5:07 - Encryption - How are video files being encrypted?6:09 - Testing a Security Camera System against S.C.O.P.E.9:52 - Security Tips for all Camera Systems********************* When evaluating the security and privacy of any home camera system, it&#039;s good to follow the S.C.O.P.E. framework which considers: Storage of files, Connectivity of the camera, Origin of manufacture and data, Pricing model and Encryption. Watch as Josh explains the framework and shares tips for using any security camera system properly.#securitycameras #homesecurity #privacymatters

  28. 23

    STOP writing your REAL address! (do THIS for privacy instead)

    Your home address is very personal information, yet we tend to share it with anyone who asks for it. When it comes to privacy most people don&#039;t realize that alternatives exist. Here a look at virtual addresses for privacy: how they work and the features you need to consider. Be sure to check out our sponsor ProtonVPN to hide your internet activity: https://www.allthingssecured.com/protonvpn 🔹Links to Virtual Mailbox Services (affiliate)🔹 ✅ PostScan Mail: https://www.allthingssecured.com/yt/postscanmail ✅ Traveling Mailbox: https://www.allthingssecured.com/yt/travelingmailbox ✅ VirtualPostMail: https://www.allthingssecured.com/yt/virtualpostmail ✅ iPostal1: https://www.allthingssecured.com/yt/ipostal1 ✅ Anytime Mailbox: https://www.allthingssecured.com/yt/anytimemailboxIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹Learn More about Virtual Mailboxes🔹🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to learn more about how to use virtual addresses to increase your privacy and security, check out these videos next: ✅ Are Virtual Mailboxes SAFE? https://www.youtube.com/watch?v=PHFSGI3BaLI ✅ 3 Steps to Hide Your Home Address: https://www.youtube.com/watch?v=nAY8qOFEv0E ✅ How to BLUR your home on Google Street View: https://www.youtube.com/watch?v=86tYLE0Q6hg 🔹Recommended Security &amp; Privacy Tools🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/protonpass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/protonvpn*********************Video Timestamps*********************0:00 - Introduction to Virtual Mailboxes0:50 - What is a Virtual Mailbox?2:06 - Understanding Virtual Address Locations 4:20 - Hiding Your Internet Activity (ProtonVPN)5:27 - Mail Forwarding with Virtual Addresses6:28 - Feature Comparison for Virtual Mailbox Services7:47 - Which Virtual Mailbox is the BEST?9:22 - Conclusion********************* When it comes to personal privacy online and in person, hiding your home address is something most people miss. In this video, Josh breaks down the different features you need to consider with a virtual mailbox provider and why it&#039;s worth getting a virtual address whether you&#039;re privacy focused, a traveler, or a small business owner.#privacytools #privacymatters #virtualmailbox

  29. 22

    STOP Using iMessage for Secure Communication?

    How do we keep our private messages actually private? Listen as Session technical co-founder Kee Jeffreys answers questions about the risks of current messaging apps, the challenges of decentralized communication and the future of private messages. Sponsored by DeleteMe. Get 20% off: https://joindeleteme.com/allthingssecuredLearn more about Session here: https://getsession.org/

  30. 21

    the WRONG Way to Delete Personal Info Online

    Removing your personal data online can ironically DAMAGE your privacy. Here&#039;s what you need to know about data brokers, data removal services and the methods they each use. Get 20% off the recommended DeleteMe service here: https://www.joindeleteme.com/allthingssecuredWant to learn more about removing your personal information off the internet? ▶ How to Remove Facebook data: https://odysee.com/@AllThingsSecured:9/i-printed-my-facebook-data-file-%F0%9F%A4%AF:6 ▶ The Data Amazon Tracks: https://odysee.com/@AllThingsSecured:9/here&#039;s-how-amazon-tracks-you-(and-how-to:5If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel. If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Change these 7 Facebook Privacy Settings NOW! https://odysee.com/@AllThingsSecured:9/how-to-change-your-facebook-privacy:5 ✅ 7 Cybersecurity Tips NOBODY Tells You: https://odysee.com/@AllThingsSecured:9/7-cybersecurity-tips-nobody-tells-you:8 ✅ 5 Secure Email Providers Worth Trying: https://odysee.com/@AllThingsSecured:9/i-tested-5-secure-email-providers-(this:d 🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/protonpass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Different Ways to Remove Personal Data Online0:32 - Example 1: Machine Automated Data Deletion Requests1:26 - Example 2: Marketing List Removal Feature2:48 - Data Removal Methods are Important3:50 - Removing Private Data is Almost Impossible4:44 - Data Privacy Laws can be Helpful5:14 - Data you should give a Data Removal Service6:49 - DeleteMe Dashboard Walkthrough8:20 - DeleteMe Privacy Report Walkthrough9:45 - Custom Removal Request for DeleteMe********************* Over the years, I&#039;ve experienced the wrong way to have personal data removed online, both as a consumer and as a publisher. Data brokers are constantly scraping our data, but the way that we make requests to remove this data can be either privacy or public. Here&#039;s what you need to know.#deleteme #dataprivacy #onlineprivacy

  31. 20

    The UK wants to spy on your Photos & iCloud backup

    In order to spy on its citizens, the UK government has forced Apple to remove their Advanced Data Protection that allowed users to protect their iCloud data with end-to-end encryption. Even if you&#039;re not a UK citizen, there are important things you need to know because of this. Stay up to date on important privacy news here: https://www.allthingssecured.com/newsletterLearn how to turn on Advanced Data Protection: https://www.youtube.com/watch?v=Ef-MZ1eqULgLinks to all news sources: ▶ Washington Post Article: https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/ ▶ BBC article on original demand: https://www.bbc.com/news/articles/c20g288yldko ▶ BBC article on ADP pull: https://www.bbc.com/news/articles/cgj54eq4vejo ▶ List of Apple services &amp; encryption: https://support.apple.com/en-us/102651If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹Watch Next🔹🔹 If you care about your privacy, here are a few additional videos that you might find interesting: ✅ Why I Switched to Proton Pass from 1Password: https://www.youtube.com/watch?v=CBdDYurOMyg ✅ 7 Cybersecurity Tips NOBODY Tells You: https://www.youtube.com/watch?v=Uy60wy20ADE ✅ Are Proton &amp; Signal STILL Secure? https://www.youtube.com/watch?v=9ZLMDMk5rzk 🔹🔹Support All Things Secured (Recommendations)🔹🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Introduction to the UK Ban on Encryption1:30 - What is Advanced Data Protection (ADP)?2:31 - UK Forces Apple to remove ADP3:16 - Takeaway 1: Apple users should use ADP3:49 - Takeaway 2: This will likely happen elsewhere4:23 - Takeaway 3: User Data Encryption Divided5:30 - Counter-argument: Do Governments Have this Right?6:19 - What YOU should do next for privacy********************* In February 2025, news leaked that the UK government had forced Apple to turn off end-to-end encryption for its citizens. Now that iPhones in Britain can&#039;t turn on Advanced Data Protection, which country is going to be next? And what can we do to protect our digital privacy?#cybersecurity #appleiphone #privacymatters

  32. 19

    How to Live WITHOUT Apple or Google (ft. Above Phone CEO)

    Join Josh Summers and Above Phone CEO Hakeem Anwar as they discuss ways to live outside of the Apple and Google ecosystem. Is it even possible and if so…how?Sponsored by DeleteMe. Get 20% off using this link: https://www.joindeleteme.com/allthingssecuredLearn more about Above Phones: https://www.abovephone.com/ats

  33. 18

    NEW Beside Privacy Routine I'm Loving (so EASY!)

    This one simple change has improved not only my privacy and security, but also my mental and physical health. The good news is that it&#039;s so easy that anybody can do it...starting right now. ▶ Check out my favorite alarm clock: https://geni.us/lexon-alarm-clock ▶ Try a Faraday Sleeve: https://geni.us/faraday-bagWatch the full video from @DoctorMike here: https://www.youtube.com/watch?v=7l6L5wFfsLUIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ 7 Cybersecurity Tips NOBODY Tells You: https://odysee.com/@AllThingsSecured:9/7-cybersecurity-tips-nobody-tells-you:8 ✅ iPhone Mistakes that RUIN Your Privacy: https://odysee.com/@AllThingsSecured:9/11-iphone-mistakes-that-will-ruin-your:8 ✅ How to Use Pseudonyms for Privacy: https://odysee.com/@AllThingsSecured:9/how-to-build-internet-privacy-with:c🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - New Bedside Routine0:43 - Mobile Phone Health Concerns1:18 - Simple Security Tips for Mobile Phones1:54 - Changes to my Bedside Routine2:50 - Benefits of a Faraday Bag4:11 - Mental &amp; Physical Health Benefits4:55 - Security and Privacy Benefits********************* Most people nowadays tend to keep their phone powered on 24 hours a day. But is this a good thing? Could this one change in your bedside routine really benefit not just your mental and physical health, but also your personal privacy and security?#mobileprivacy #mobilesecurity #cybersecurity

  34. 17

    Your Morning Coffee is KILLING your Privacy

    That Starbucks coffee and Krispy Kreme donut might not be as innocent as you think. Recent hacks reveals just how vulnerable these kinds of companies are...but there are steps you can take to protect yourself. Start using alias with Proton Pass here: https://www.allthingssecured.com/yt/proton-pass ✅ Stay up to date on the security/privacy news that&#039;s relevant to you: https://www.allthingssecured.com/newsletterWant to dive deeper into the new items mentioned here? ✅ Starbucks ransomeware attack: https://edition.cnn.com/2024/11/25/tech/starbucks-ransomware-attack/index.html ✅ Krispy Kreme attack: https://cybersecuritynews.com/krispy-kreme-hacked/ ✅ CISA announcement: https://cybersecuritynews.com/cisa-end-to-end-encrypted-messaging-services/🔹🔹What to Watch Next🔹🔹We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ 7 Cybersecurity Tips NOBODY Tells You: https://odysee.com/@AllThingsSecured:9/7-cybersecurity-tips-nobody-tells-you:8 ✅ Should you Stop Using Proton and Signal? https://odysee.com/@AllThingsSecured:9/stop-using-proton-signal-here%E2%80%99s-the:0 ✅ 12 Essential Security Tools I Use and Recommend: https://odysee.com/@AllThingsSecured:9/12-privacy-security-tools-i-use-every:1 🔹 Support All Things Secured (Recommendations)🔹If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Recent Data Breaches1:04 - Starbucks Data Breach Explained2:08 - Krispy Kreme Ransomeware Attack Explained3:27 - Result of these kinds of breaches4:07 - How using Email Aliases can help5:04 - New CISA Cybersecurity Best Practices announcement6:15 - Cyber Security takeaways********************* In December 2024, both Starbucks and Krispy Kreme suffered data breaches that affected both customers and employees. So what are we supposed to do about this and how can we protect ourselves?#starbucks #krispykreme #databreach

  35. 16

    New update to Apple passwords

    #iphonesecurity #cybersecurity #privacytips...https://www.youtube.com/watch?v=10p_4I5_Vbw

  36. 15

    STOP clicking "Agree" until you watch this!

    Every day we’re asked to agree to a privacy policy, terms of service, or use of cookies online. But should you? Here’s what you REALLY need to know from a professional lawyer who can explain it all.Sponsored by Yubico. Secure your online accounts easily and get $5 off: https://www.allthingssecured.com/yubico5off...https://www.youtube.com/watch?v=ZxWf2rWnvWU

  37. 14

    Do you have the updated 2FA keys?

    A guide to check the version of your Yubikeys.#yubikey #passcode #privacytips...https://www.youtube.com/watch?v=kZAFnHK9fY0

  38. 13

    How to make your photos PRIVATE

    #privacyfirst #privacytips #smartphone...https://www.youtube.com/watch?v=kMfP6QmeAVc

  39. 12

    Don’t put all your security eggs…

    #cybersecurity #privacytips...https://www.youtube.com/watch?v=z5XLRAWeKN0

  40. 11

    Genius camera privacy solution #privacyfirst #privacy

    How to build better privacy habits when you take photos on your phone? Have one app that captures all the GPS data, EXIF data, etc. and a separate app for &quot;private&quot; photos....https://www.youtube.com/watch?v=-s_5oca8qDc

  41. 10

    Black Friday 2024 | Best Cybersecurity Deals ALREADY LIVE!

    If you care about your online privacy or security, now is the best time of the year to add the right cybersecurity tools to your kit. Check out what I recommend in this video or you can see my entire list here: https://www.allthingssecured.com/blackfriday*this video has not been sponsored by any of the companies listed*Security/Privacy Tools mentions (some affiliate): ▶ Get 25% off YubiKeys: https://www.yubico.com/store/2024/black-friday-sale/ ▶ Get 50% off Proton Mail: https://go.getproton.me/aff_c?offer_id=7&amp;aff_id=1329 ▶ Get 25% off DeleteMe: https://www.joindeleteme.com/allthingssecured ▶ Up to 50% off Pacsafe Bags: https://www.allthingssecured.com/try/pacsafe ▶ Up to 50% off SLNT Faraday bags: https://www.allthingssecured.com/try/slnt ▶ Get 40% off Certo Mobile Antispy software: https://www.certosoftware.com/coupon/blackfriday24/If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹 We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ 5 Ways to Create Email Aliases: https://www.youtube.com/watch?v=buJHg7HRHPc ✅ 12 Privacy &amp; Security Tools I Use EVERY DAY: https://www.youtube.com/watch?v=XNOAOQktG6U ✅ 7 Cybersecurity Tips NOBODY Tells you: https://www.youtube.com/watch?v=Uy60wy20ADE*********************Video Timestamps*********************0:00 - Privacy Tips for Black Friday Shopping0:46 - Use Email Aliases for Black Friday privacy1:43 - Use Virtual Cards for Black Friday purchases2:58 - Yubico 2FA Key3:29 - Proton Privacy deals3:57 - DeleteMe Black Friday promotion4:08 - Pacsafe secure backpacks4:42 - SLNT Faraday bags5:07 - Certo Mobile anti-spy software********************* Black Friday and Cyber Monday present the best opportunities to save money on your favorite new privacy and cybersecurity deals. Here are the ones that I recommend.#cybersecurity #securitytools #bfcm...https://www.youtube.com/watch?v=YE7i1Eay8pM

  42. 9

    Why I have 3 YubiKeys (for security) #cybersecurity

    Get $5 off your next YubiKey purchase: https://www.allthingssecured.com/yubikey5off#2fa #mfa #2factorauthentication...https://www.youtube.com/watch?v=qC0vL1rfMFo

  43. 8

    You’ve been secretly training AI for YEARS! #privacyfirst

    We&#039;ve all been training AI for years without knowing it. #privacymatters...https://www.youtube.com/watch?v=dSVR8XAGJ3g

  44. 7

    TRUE Online Privacy is Impossible. What’s the Point?

    I&#039;m fed up. As a privacy advocate who uses an iPhone and software that isn&#039;t open source, I realize that I don&#039;t fit the extreme standard of privacy and security. Here&#039;s what I have to say about that. Be sure to make the important change of securing your accounts with a security key. Get $5 off here: https://www.allthingssecured.com/yubikey5offDive deeper into my views of privacy and security? ▶ Copy my account security strategy: https://www.youtube.com/watch?v=XOvapxmgPjc ▶ 12 Privacy &amp; Security tools I use EVERY DAY: https://www.youtube.com/watch?v=XNOAOQktG6U ▶ 7 Cybersecurity tips NOBODY tells you: https://www.youtube.com/watch?v=Uy60wy20ADEIf you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹We&#039;ve got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we&#039;re a bit biased). If you&#039;re wanting to increase your online cybersecurity, here&#039;s what&#039;s next: ✅ Best Secure Email Providers TESTED: https://www.youtube.com/watch?v=72eG84gGR0s ✅ Best Password Managers TESTED: https://www.youtube.com/watch?v=BsVkVa0n0T0 ✅ How to use Pseudonyms for better privacy: https://www.youtube.com/watch?v=eWeXGPI7XOY🔹Support All Things Secured (Recommendations)🔹 If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - Privacy is pointless1:06 - Privacy and the book of Ecclesiastes1:43 - The Dangerous Privacy Fallacy2:48 - Privacy Reality Check3:28 - Change your Definition of Online Privacy4:07 - Step 1: Use Better Privacy Tools5:11 - Step 2: Improve your Privacy Habits6:18 - Step 3: Understand your Privacy Priorities7:43 - Progress over Perfection********************* Every day, privacy extremists leave comments and messages on All Things Secured videos explaining how stupid I am. Perhaps they&#039;re right. Or perhaps the ideal &quot;privacy&quot; is impossible? Here&#039;s my simplified approach to privacy and security that flies in the face of most tech gurus you&#039;ll see online.#cybersecurity #privacyfirst #privacymatters...https://www.youtube.com/watch?v=T-y3qs2Jh8g

  45. 6

    AI: Security Threat or Powerful Tool? (ft. Reanna Shultz)

    What are the AI cybersecurity trends that you CANNOT ignore? Learn from cybersecurity specialist Reanna Schultz about what she&#039;s seeing and what we as consumers can do to build awareness and protection for ourselves. Livestream sponsored by @Yubico Get $5 off your security key here: https://www.allthingssecured.com/yubikey5off#cybersecurity #aisecurity #cybersecurityexperts...https://www.youtube.com/watch?v=sjC8-vgRfG4

  46. 5

    the truth about government data requests #privacy

    why the data they actually have matters#endtoendencryption #dataprivacy...https://www.youtube.com/watch?v=ZuzGVKm9HEI

  47. 4

    is your text messaging SECURE? #privacytips

    #messagingapps #privacytips...https://www.youtube.com/watch?v=IuSFM8T32p8

  48. 3

    How to make your Proton account MORE PRIVATE

    #opsec #privacytips...https://www.youtube.com/watch?v=rU7qnfSNvlU

  49. 2

    I Switched Password Managers (finally)

    After 7 years of using the same password manager, I&#039;m making a switch. Here&#039;s why this is such a big deal for me and why I&#039;ve chosen the new software that I have. ▶ Try Proton Pass: https://www.allthingssecured.com/yt/proton-pass ▶ Compare with 1Password: https://www.allthingssecured.com/yt/1passwordYou can also see how these two password managers compare to 7 of the top password managers in this comparison video where I break down all the features: https://www.youtube.com/watch?v=BsVkVa0n0T0If you care about your personal security and privacy online, download my free security checklist here: ✅ Security Checklist: https://www.allthingssecured.com/security-checklist-pdf/🔹🔹What to Watch Next🔹🔹When it comes to online security, passwords are just the tip of the iceberg. Learn more about how you can take your security game to the next level: ✅ 7 Cybersecurity Tips NOBODY Tells You: https://www.youtube.com/watch?v=Uy60wy20ADE ✅ Will passkeys replace passwords? https://www.youtube.com/watch?v=_tQbWop1P7o ✅ Why not use Apple&#039;s new Passwords App? https://www.youtube.com/watch?v=4VMhGm3x3oI 🔹Support All Things Secured (Recommendations)🔹If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support! ✅ Recommended Password Manager: https://www.allthingssecured.com/yt/proton-pass ✅ Recommended Identity Monitoring: https://www.allthingssecured.com/try/identity-guard-yt ✅ Recommended 2FA Security Key: https://www.allthingssecured.com/yt/yubikey ✅ Recommended Secure Email: https://www.allthingssecured.com/try/protonmail-yt ✅ Recommended VPN: https://www.allthingssecured.com/try/nordvpn-yt*********************Video Timestamps*********************0:00 - I&#039;m Switching Password Managers0:30 - Was 1Password Compromised?0:48 - Why I Switched to Proton Pass1:44 - 2 Key Features of Proton Pass3:28 - Proton Pass Vault Share &amp; Secure Link4:22 - Extra Password Feature w/ Proton Pass6:58 - 3 Missing Features of Proton Pass9:41 - 1Password vs Proton Pass********************* After years of using 1Password as my preferred password manager for online security, I&#039;ve made the switch to Proton Pass, the manager established by the makers of Proton Mail. Why did I make the switch and what are the differences? Watch as Josh explains.#1password #passwordmanager #cybersecurity...https://www.youtube.com/watch?v=CBdDYurOMyg

  50. 1

    GENIUS financial privacy tip

    @NaomiBrockwellTV confirms this essential step#onlineprivacy...https://www.youtube.com/watch?v=yk-B_3mosS0

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more.Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that.With the Internet of Things creeping into our daily lives, you can't put it off any longer. Learn the vital skills you need to keep your personal life private and understand best practices as relates to your home network, email, using your mobile phone, etc.Check Your Password Strength: https://www.allthingssecured.com/password-checker/Best VPNs for 2026: https://www.allthingssecured.com/best-vpn/Best Password Managers for 2026: https://www.allthingssecured.com/reviews/password-managers/best-password-manage

HOSTED BY

All Things Secured | Online Privacy & Security

CATEGORIES

URL copied to clipboard!