Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
2,231 results
734K subscribers
FISA 702 powers the surveillance of the United States government against its own citizens, in spite of the law being targeted ...
10,221 views
23 hours ago
The go to solution for remote access has been Sonic Wall appliances. Or if you don't want to spend the money, you go for the ...
37,245 views
7 days ago
Fresh new news. Just a few days ago in early April 2026, Anthropic made us aware of the new model called Mythos Preview ...
98,132 views
12 days ago
New laws like Age Verification are being legislated but the average person isn't understanding the true effect of these laws using ...
88,032 views
2 weeks ago
New changes in technology like the fast pace of AI adoption and AI agents are triggering us to think of buying a new computer.
322,257 views
3 weeks ago
Many of you are populating the mass surveillance databases seemingly on purpose. If you understand how the Palantir systems ...
173,018 views
4 weeks ago
OpenClaw can start doing bad stuff: delete your files, overwrite your code, send garbage emails, and ignore your instructions all ...
40,968 views
1 month ago
Windows users sitting in the sidelines are not understanding the source of the Windows hate. But that's because the messages ...
516,620 views
00:00 - Introduction: The Reality of Age Verification in 2026 01:39 - Chapter 1: Two Types of Age Verification Mandates Explained ...
147,760 views
There are AI Agents and there are AI Agents. And the one that you've heard for years now is Microsoft's Copilot or Windows 11 the ...
29,757 views
The biggest threat that remains hard to resolve is the phone number threat. Each day it becomes even more important to protect ...
143,367 views
2 years ago
SIP and VOIP are connected technologies that are actually well known in business use. But no one really understand how this can ...
189,282 views
1 year ago
You give your mobile phone number to any Internet platform that asks for it. They claim it is for your security as a Two-Factor ...
154,542 views
We need an answer and this video will give you one. There are conflicting answers on the Interwebs about whether or not Apple is ...
26,919 views
The typical strategy of many interested in privacy is to jump to products like protonmail or tutanota. But without actually ...
92,079 views
In order to be pseudo-anonymous on the Internet, we have to make sure that we are aware that we are being tracked. There are ...
197,993 views
More and more computer user are flocking to Linux. But what's surprising is that a large number migrated to Zorin. Apparently it ...
282,529 views
2 months ago
Sometimes we do not have a choice but to use Windows 11. I will tame Windows 11 so all the privacy invading features are turned ...
365,968 views
4 months ago
Key point: In this AI Epi 3 video, pay attention to how Context is used by the AI when I explain how it works. How does an LLM AI ...
29,553 views
00:00 Panic for de-Zoogled phones. 01:17 The Original Zoogle Safety Net Explained. 02:53 The New Zoogle Policing Model ...
60,312 views
5 months ago
In this video, I did a unsponsored review of BytzVPN, a review made by Youtuber Rob Braxman. Rob Braxman also has a website ...
27,535 views
5 years ago
I've tried to explain the Google tracking system to you all for so many years but this time, instead of theoretical talk, we will show ...
59,003 views
Which company is the premiere surveillance Big tech company that really seeks to know you well for their AI? The answer to this ...
233,746 views
TOR has been with us for awhile and it is an important tool for privacy. However many things about TOR are not understood by ...
74,660 views
Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques are not discussed ...
268,583 views
6 years ago