I’m Building Something Bigger Than This Channel
Security Researcher
I’m Building Something Bigger Than This Channel
4:50
RC Predator-Style Drone Test | Proof-of-Concept ALCM Payload Demonstration
Security Researcher
RC Predator-Style Drone Test | Proof-of-Concept ALCM Payload Demonstration
0:23
Landing Craft Beach Assault Drill | Amphibious Training Exercise
Security Researcher
Landing Craft Beach Assault Drill | Amphibious Training Exercise
1:01
Stop Using QR Codes - Plain English, in 2 minutes
Security Researcher
Stop Using QR Codes - Plain English, in 2 minutes
2:05
Palantir Maven: A Glimpse Inside the AI Intelligence Platform
Security Researcher
Palantir Maven: A Glimpse Inside the AI Intelligence Platform
1:52
The World You Live In Was Designed Decades Ago
Security Researcher
The World You Live In Was Designed Decades Ago
10:25
GrapheneOS and De-googling Won’t Make You Invisible
Security Researcher
GrapheneOS and De-googling Won’t Make You Invisible
11:45
M134 Takes Down Russian Long-Range UAV
Security Researcher
M134 Takes Down Russian Long-Range UAV
0:19
Dropping Drones
Security Researcher
Dropping Drones
2:19
Your Phone Is NEVER OFF! Hidden Tech You Didn't Know
Security Researcher
Your Phone Is NEVER OFF! Hidden Tech You Didn't Know
2:38
Think Your Selfie Cam Is Harmless? Think Again  #digitalprivacy
Security Researcher
Think Your Selfie Cam Is Harmless? Think Again #digitalprivacy
2:59
Going live with Modern Men Lost Again
Security Researcher
Going live with Modern Men Lost Again
1:19:47
Privacy Myth: De-Googled Phone ≠ Invisible
Security Researcher
Privacy Myth: De-Googled Phone ≠ Invisible
1:58
It's So Much Worse Than You Think.
Security Researcher
It's So Much Worse Than You Think.
18:22
Drone vs Drone: Real-Life Aerial Takedowns #militarytech
Security Researcher
Drone vs Drone: Real-Life Aerial Takedowns #militarytech
1:24
Transforming Drone Technology #drones  #surveillancetech
Security Researcher
Transforming Drone Technology #drones #surveillancetech
0:18
NPD Data Breach - They Have Your SSN
Security Researcher
NPD Data Breach - They Have Your SSN
8:45
Understanding Insider Threat
Security Researcher
Understanding Insider Threat
22:59
Ai Voice Cloning: Don’t Be the Next Victim
Security Researcher
Ai Voice Cloning: Don’t Be the Next Victim
11:04
Deepfake Scams
Security Researcher
Deepfake Scams
8:44
These Apps Can Spy on You Without You Knowing
Security Researcher
These Apps Can Spy on You Without You Knowing
15:11
Recognizing DeepFakes And Voice Cloning.
Security Researcher
Recognizing DeepFakes And Voice Cloning.
29:03
Where Did Ai Come From?
Security Researcher
Where Did Ai Come From?
16:01
AI, Quantum, Robotics Will Merge... Then What?
Security Researcher
AI, Quantum, Robotics Will Merge... Then What?
18:48
The Internet Was Built for War - Not for You
Security Researcher
The Internet Was Built for War - Not for You
18:32
They’re Not Listening. It’s Worse.
Security Researcher
They’re Not Listening. It’s Worse.
12:24
Stop Using QR Codes - Plain English, in 2 minutes.
Security Researcher
Stop Using QR Codes - Plain English, in 2 minutes.
2:05
Working From Home? - How to Protect Your Data
Security Researcher
Working From Home? - How to Protect Your Data
3:42
Technology Law Expert - Robert Kost
Security Researcher
Technology Law Expert - Robert Kost
42:34
'#Hacked2' with Cyber Security Expert and Author Albert Whale.
Security Researcher
'#Hacked2' with Cyber Security Expert and Author Albert Whale.
20:12
Silent SMS & OTA - Tracking Your Phone Without You Knowing
Security Researcher
Silent SMS & OTA - Tracking Your Phone Without You Knowing
13:51
Juice Jacking: How Public Charging Ports Can Hack Your Phone & The Simple Solution
Security Researcher
Juice Jacking: How Public Charging Ports Can Hack Your Phone & The Simple Solution
5:45
Threat Modeling for Normal People
Security Researcher
Threat Modeling for Normal People
8:07
Why Keyless Cars Are Easy to Steal - Key Fob Relay Attack Explained
Security Researcher
Why Keyless Cars Are Easy to Steal - Key Fob Relay Attack Explained
6:49
Unlock Any Phone with the UFED Tool by Cellebrite – Apple and Android Devices
Security Researcher
Unlock Any Phone with the UFED Tool by Cellebrite – Apple and Android Devices
2:25
Cellphone Surveillance Explained - Stingray/IMSI Catchers
Security Researcher
Cellphone Surveillance Explained - Stingray/IMSI Catchers
26:09
How Cell Networks Track Your Location with GPS-Like Accuracy 📱
Security Researcher
How Cell Networks Track Your Location with GPS-Like Accuracy 📱
7:22
Biometric Fingerprint Locks: What You Should Know About Privacy and Security
Security Researcher
Biometric Fingerprint Locks: What You Should Know About Privacy and Security
2:33
The Safest Way to Store Your Passwords: Why a Physical "Little Black Book" Is Still Secure
Security Researcher
The Safest Way to Store Your Passwords: Why a Physical "Little Black Book" Is Still Secure
2:13
Top 3 Questions Answered: Top 3 Questions About Cell Phone Surveillance, Spying, Hacking & Tracking
Security Researcher
Top 3 Questions Answered: Top 3 Questions About Cell Phone Surveillance, Spying, Hacking & Tracking
4:31
Are You at Risk of Juice Jacking? How to Stay Safe at Public Charging Stations
Security Researcher
Are You at Risk of Juice Jacking? How to Stay Safe at Public Charging Stations
3:58
How Home Cell Signal Boosters (Femtocells) Can Be Hacked: Protect Your Data
Security Researcher
How Home Cell Signal Boosters (Femtocells) Can Be Hacked: Protect Your Data
6:53
How to Protect Your Cell Phone from Tracking, Spying, Stalking, Hacking, and Eavesdropping
Security Researcher
How to Protect Your Cell Phone from Tracking, Spying, Stalking, Hacking, and Eavesdropping
7:09