<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Privacy Guides</title><description>This is our home for the latest video content from the Privacy Guides team. Privacy Guides is the most popular &amp; trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life.</description><link>https://www.privacyguides.org/videos/</link><atom:link href="https://www.privacyguides.org/videos/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/privacyguides/privacyguides.org</docs><language>en</language> <pubDate>Sun, 04 May 2025 14:57:39 -0000</pubDate> <lastBuildDate>Sun, 04 May 2025 14:57:39 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Privacy Guides</title><link>https://www.privacyguides.org/videos/</link> </image> <item> <title>Think Privacy Is Dead? You&#39;re Wrong.</title> <author>Jordan Warne</author> <description>&lt;p&gt;Privacy isn’t dead, in fact it’s growing. In this video, we explore common arguments against protecting your privacy and why they&#39;re not only wrong but dangerous.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.wired.com/story/google-app-gmail-chrome-data/&#34;&gt;https://www.wired.com/story/google-app-gmail-chrome-data/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/&#34;&gt;https://www.cloudflare.com/learning/privacy/what-is-the-gdpr/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/04/17/is-privacy-dead/</link> <pubDate>Mon, 21 Apr 2025 22:18:55 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/04/17/is-privacy-dead/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/04/17/is-privacy-dead.png" type="image/png" length="None" /> </item> <item> <title>Is Your Data Really Safe? Understanding Encryption</title> <author>Jordan Warne</author> <description>&lt;p&gt;Encryption is a cornerstone of security on the modern internet, in this video we dive deep into how it works and explain why it&#39;s so important. This is especially crucial as many governments around the world are pushing to ban encryption and breach our fundamental right to privacy.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.bbc.co.uk/news/articles/cgj54eq4vejo&#34;&gt;https://www.bbc.co.uk/news/articles/cgj54eq4vejo&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all&#34;&gt;https://www.eff.org/deeplinks/2025/02/uks-demands-apple-break-encryption-emergency-us-all&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2019/12/fancy-new-terms-same-old-backdoors-encryption-debate-2019&#34;&gt;https://www.eff.org/deeplinks/2019/12/fancy-new-terms-same-old-backdoors-encryption-debate-2019&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.amnesty.org/en/latest/news/2025/02/https-www-amnesty-org-en-latest-news-2025-02-uk-encryption-order-threatens-global-privacy-rights/&#34;&gt;https://www.amnesty.org/en/latest/news/2025/02/https-www-amnesty-org-en-latest-news-2025-02-uk-encryption-order-threatens-global-privacy-rights/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/04/03/is-your-data-really-safe-understanding-encryption/</link> <pubDate>Mon, 21 Apr 2025 16:21:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/04/03/is-your-data-really-safe-understanding-encryption/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/04/03/is-your-data-really-safe-understanding-encryption.png" type="image/png" length="None" /> </item> <item> <title>5 Easy Steps to Protect Yourself Online</title> <author>Jordan Warne</author> <description>&lt;p&gt;Worried about hackers and data breaches? You&#39;re not alone. In this video we outline 5 simple yet crucial steps you can take today to dramatically improve your online security and protect your personal information.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;The biggest data breaches in 2024: &lt;a href=&#34;https://techcrunch.com/2024/10/14/2024-in-data-breaches-1-billion-stolen-records-and-rising/&#34;&gt;https://techcrunch.com/2024/10/14/2024-in-data-breaches-1-billion-stolen-records-and-rising/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Bitwarden Password Strength Tester: &lt;a href=&#34;https://bitwarden.com/password-strength/&#34;&gt;https://bitwarden.com/password-strength/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Proton Pass Showcase video: &lt;a href=&#34;https://www.youtube.com/watch?v=4YLxjvxHMYo&#34;&gt;https://www.youtube.com/watch?v=4YLxjvxHMYo&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Bitwarden Showcase video: &lt;a href=&#34;https://www.youtube.com/watch?v=3w0sJlgKfWQ&#34;&gt;https://www.youtube.com/watch?v=3w0sJlgKfWQ&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Google Incognito Lawsuit: &lt;a href=&#34;https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d&#34;&gt;https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Google ad for GIMP was malicious: &lt;a href=&#34;https://www.bleepingcomputer.com/news/security/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site/&#34;&gt;https://www.bleepingcomputer.com/news/security/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Cops were allowed to force a suspect to use thumbprint to unlock phone, says court: &lt;a href=&#34;https://9to5mac.com/2024/04/19/thumbprint-to-unlock-phone-kaw/&#34;&gt;https://9to5mac.com/2024/04/19/thumbprint-to-unlock-phone-kaw/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/</link> <pubDate>Fri, 14 Mar 2025 01:59:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/02/14/5-easy-steps-to-protect-yourself-online/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/02/14/5-easy-steps-to-protect-yourself-online.png" type="image/png" length="None" /> </item> <item> <title>Do you need a VPN?</title> <author>Jordan Warne</author> <description>&lt;p&gt;Commercial Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. This can have substantial privacy benefits, but not all VPNs are created equal. More information about VPNs can be found on our website: &lt;a href=&#34;https://www.privacyguides.org/en/basics/vpn-overview/&#34;&gt;https://www.privacyguides.org/en/basics/vpn-overview/&lt;/a&gt;&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; Sponsorship Study: &lt;a href=&#34;https://www.cs.umd.edu/~dml/papers/vpn-ads-oakland22.pdf&#34;&gt;https://www.cs.umd.edu/~dml/papers/vpn-ads-oakland22.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;VPNs Questionable Security Practices: &lt;a href=&#34;https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-VPN-complaint-8-7-17.pdf&#34;&gt;https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;-complaint-8-7-17.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; Relationship Map: &lt;a href=&#34;https://kumu.io/Windscribe/vpn-relationships&#34;&gt;https://kumu.io/Windscribe/vpn-relationships&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/</link> <pubDate>Fri, 14 Mar 2025 01:59:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2024/12/12/do-you-need-a-vpn.png" type="image/png" length="None" /> </item> <item> <title>It&#39;s time to stop using SMS, here&#39;s why!</title> <author>Jordan Warne</author> <description>&lt;p&gt;Text messaging has been a staple of communication for decades, but it&#39;s time to move on. In this video, we&#39;ll explore why &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; is an outdated and insecure technology and discuss better alternatives.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.ivpn.net/blog/collection-of-user-data-by-isps-and-telecom-providers-and-sharing-with-third-parties&#34;&gt;https://www.ivpn.net/blog/collection-of-user-data-by-isps-and-telecom-providers-and-sharing-with-third-parties&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.t-mobile.com/privacy-center/education/analytics-reporting&#34;&gt;https://www.t-mobile.com/privacy-center/education/analytics-reporting&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://arstechnica.com/tech-policy/2021/03/t-mobile-will-tell-advertisers-how-you-use-the-web-starting-next-month/&#34;&gt;https://arstechnica.com/tech-policy/2021/03/t-mobile-will-tell-advertisers-how-you-use-the-web-starting-next-month/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf&#34;&gt;https://docs.fcc.gov/public/attachments/DOC-402213A1.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.abc.net.au/news/2024-12-05/united-states-allege-china-behind-salt-typhoon-telecoms-hack/104687712&#34;&gt;https://www.abc.net.au/news/2024-12-05/united-states-allege-china-behind-salt-typhoon-telecoms-hack/104687712&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://mashable.com/article/salt-typhoon-telcom-hack-explainer-us-china&#34;&gt;https://mashable.com/article/salt-typhoon-telcom-hack-explainer-us-china&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://docs.fcc.gov/public/attachments/DOC-408013A1.pdf&#34;&gt;https://docs.fcc.gov/public/attachments/DOC-408013A1.pdf&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/&#34;&gt;https://www.bleepingcomputer.com/news/security/reddit-announces-security-breach-after-hackers-bypassed-staffs-2fa/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-for-development/wp-content/uploads/2019/02/ProofofIdentity2019_WebSpreads.pdf&#34;&gt;https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-for-development/wp-content/uploads/2019/02/ProofofIdentity2019_WebSpreads.pdf&lt;/a&gt; (Page 12)&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.gsma.com/solutions-and-impact/technologies/networks/rcs/&#34;&gt;https://www.gsma.com/solutions-and-impact/technologies/networks/rcs/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.gsma.com/newsroom/article/rcs-nowin-ios-a-new-chapter-for-mobile-messaging/&#34;&gt;https://www.gsma.com/newsroom/article/rcs-nowin-ios-a-new-chapter-for-mobile-messaging/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/</link> <pubDate>Fri, 14 Mar 2025 01:59:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/01/24/its-time-to-stop-using-sms-heres-why.png" type="image/png" length="None" /> </item> <item> <title>Stop Confusing Privacy, Anonymity, and Security</title> <author>Jordan Warne</author> <description>&lt;p&gt;Are you mixing up privacy, security, and anonymity? Don&#39;t worry, it&#39;s more common than you might think! In this week&#39;s video we break down each term, so you can make educated decisions on what &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;privacy tools&lt;/a&gt; are best for you.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d&#34;&gt;https://apnews.com/article/google-incognito-mode-tracking-lawsuit-settlement-8b30c9397f678bc4c546ab84191f7a9d&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://cloud.google.com/blog/products/chrome-enterprise/chromeos-the-platform-designed-for-zero-trust-security&#34;&gt;https://cloud.google.com/blog/products/chrome-enterprise/chromeos-the-platform-designed-for-zero-trust-security&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/</link> <pubDate>Fri, 14 Mar 2025 01:59:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/03/14/stop-confusing-privacy-anonymity-and-security.png" type="image/png" length="None" /> </item> <item> <title>Anonymity for Everyone: Why You Need Tor</title> <author>Jordan Warne</author> <description>&lt;p&gt;Tor is an invaluable tool for bypassing censorship and browsing privately, in this week&#39;s video we dive into the details and explain how it works. Plus we cover some things you should avoid when using Tor to make sure you maintain your anonymity.&lt;/p&gt;&lt;h2 id=&#34;sources&#34;&gt;Sources&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Tor support documentation: &lt;a href=&#34;https://support.torproject.org/&#34;&gt;https://support.torproject.org/&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/</link> <pubDate>Fri, 14 Mar 2025 01:59:46 +0000</pubDate><source url="https://www.privacyguides.org/videos/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/videos/2025/03/02/why-you-need-tor/</guid> <enclosure url="https://www.privacyguides.org/videos/assets/images/social/2025/03/02/why-you-need-tor.png" type="image/png" length="None" /> </item> </channel></rss>