The Positive Network Podcast
The Positive Network, standing against Negativity, reminds us of the good in the world - kindness, breakthroughs, and unity. Here, your journey to a SOVRN Life begins, not in isolation, but within a community that empowers education and learning in the critical topics of self sufficiency and critical thinking. This is where we collectively rise, embracing personal and communal sovereignty and take back our world.
The Positive Network Podcast
SOVRN DATA: Protecting Your Privacy in the Digital Age
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
How much of your personal information are you unknowingly giving away, and what can be done to protect it? Join us for an eye-opening discussion on the Positive Network podcast all about data protection and privacy. Learn about the hidden risks of sharing your information online and how companies like Google might be exploiting your data. We dive into actionable strategies for safeguarding your personal information, such as using end-to-end encryption, avoiding the reuse of passwords, and being mindful of your social media activities.
Discover why data has now surpassed oil as the world's most valuable resource and the implications this has for your privacy and autonomy. We explain what data truly encompasses—everything from your digital footprint to health metrics—and the dangers of companies controlling and selling this information without your consent. Hear about the notorious Cambridge Analytica scandal and how it underscores the necessity of maintaining ownership over your data to prevent manipulation. The conversation further explores the power of AI in leveraging data, raising significant privacy concerns.
Finally, gain insights into the importance of data sovereignty and personal security. Understand the risks of extensive data collection and how AI can manipulate this information. We'll provide you with practical tips on securing your data, such as using password managers like Bitwarden and opting for end-to-end encrypted services like ProtonMail and Signal. The episode also touches on the benefits of Network Attached Storage (NAS) for personal data storage, ensuring you have privacy and control. Equip yourself with the knowledge and tools needed to protect your data and maintain personal sovereignty in today's digital age.
Join Mike and Andrew in the Positive Network as they embark on a journey to shift the world from fear to positivity, encouraging each listener to become a proactive agent of change and positivity.
Join the Movement
www.positivenetwork.info
https://www.youtube.com/@The_Positive_Network
Protecting Your Data and Privacy
Speaker 1Everything you say in your Google email is definitely read by Google. The client can see it. It's not just you and the person you sent it to who reads it, it's the service as well. When it's end-to-end encrypted, it means only you and the person who you're sending the data to explicitly has access to it. The more people know about you, the more you're trusting them that they won't exploit what they know for any personal gain. And what do we know about human behavior? Well, people tend to do things for their own benefit. Yeah, like on average. So do you think a company is, you know, only looking out for your best interests? Of course not.
Speaker 2They're looking out for profit.
Speaker 1You'd have to be super naive to believe that yeah. So who's looking out for your best interest?
Speaker 2Them, no, you need to, you have to. It is so important for us to keep our data secure because none of us want to be manipulated and man like I used to be in that camp of like I don't care, I got nothing to hide. It's not about hiding anything. It's about not being controlled or not doing something against your will.
Speaker 1Ownership of your own data is super important because, again, if you give up ownership of all of your data, what happens Then? Tech companies have more leverage and can basically strong arm you more and more and more. Big thing you need to do is you don't want to be reusing the same login and password everywhere. That's too much of a vulnerability. And why that has to do with data is because if someone knows your data your email password combination, one of the sites then they can replicate and put those login credentials on other platforms where you've reused it and then now they have access to everything.
Speaker 2Stop posting your vacations. While you're on vacation, save those vanity clicks, check the ego, get a whole bunch of pictures and then, when you get home, slowly post them so you can feel cool about yourself or whatever the reason is, or if you want to share it with family, you know. For whatever, do not tell people you're not in your home. That's easy to mine.
Speaker 1If you know someone's weakness, it's up to you whether you're going to exploit that for their benefit or your benefit. The basic thing here is like okay, people, when they have information on you, when they have your data, they can use that to manipulate you into doing the things that they want you to do that you might not even have done yourself. So if you think of it this way, it's sort of like stealing your free will from you.
Speaker 2So, if you think of it this way, it's sort of like stealing your free will from you. Welcome to the Positive Network podcast, your lighthouse in the dark, where we talk about real world solutions for real world problems. I'm your host, mike Volz, and I'm your co-host, andrew. Welcome to the podcast, everybody. So today we're going to be talking about sovereign data. This is something that is very misunderstood. We hear about you know you got to protect your data. Your data is being mined, identity theft we hear these things all the time, but it doesn't quite make sense to everyone. So we're going to endeavor to talk through it today and make it make a little bit more sense and offer some sensible tips on protecting your data that are very important.
The Value and Privacy of Data
Speaker 1So I'm going to jump in and I'm going to start by explaining that data is. We've changed eras. So we used to live in the era where oil was the most valuable resource in the world that everyone fought over, and it still is very valuable. But several years ago, data actually surpassed the value of oil Wow, becoming the world's most valuable resource and people would be like well, why is like numbers, like, why would numbers be so valuable? You have to think about what data really is. So let's talk about framing what that actually is so you have a better understanding. So today we think of data as like a digital thing Right, but it's not. Today we think of data as like a digital thing, but it's not. It's actually any type of information about any, anything or someone or something, anything like that. So it's basically some sort of recording of anything.
Speaker 2Okay, so like how many steps I took today? That's data. Okay, what are some other examples?
Speaker 1Where you're, where you spend most of your time, like the geographic place you're in Right, because our phones are tracking every spot we go to Could be your financial data, like how many houses do you own. It could be what your heart rate is on average.
Speaker 2How much?
Speaker 1breathing you take. It could be how many kids do you have? It could be how many hours of sleep do you get? When do you get irritable? What's your purchasing behavior?
Speaker 2I saw something about if you had enough smart devices on you one or two they could have a bit of an idea of some medical conditions that you're dealing with.
Speaker 1Yeah, and don't get me wrong, there's definitely legitimate reasons that that would be useful to have for your own purposes. The danger becomes when that information becomes the property of another company and they're the ones that can control it, mine it, sell it, do whatever they want with it, because the data is supposed to be ours.
Speaker 2Yeah, our health, our finances, our physical activity, our travel, our pictures, that should be ours.
Speaker 1Yeah. So if you go back, even like 100 years ago, we weren't recording all this data. No, it didn't exist because it wasn't feasible to do so. We only recorded, like our tax information, for example, for our financials probably had some records of like what property you owned. You know like you might have a deed or title to your house. You would have some you know like a title to your vehicle. That was mostly about it. You'd have a birth certificate, maybe some healthcare number, social security number, so like some basic stuff, right. But now, instead of just having you know half a dozen or a dozen points, now you have maybe tens of thousands of points.
Speaker 2I'd read somewhere during the Cambridge Analytica trials that and this was back when Trump got elected they had something like a quarter million data points on half of the Americans in the US. A quarter million separate points of data.
Speaker 1Without their knowledge or consent. Yes, they had no idea it was even happening to them.
Speaker 2Yeah, and it boggles the mind of how you would have that many data points. Yeah, and it boggles the mind of how you would have that many data points, but if you think about all the recording devices in the world today and all the different things we're doing, that can add up quick.
Speaker 1And think about that. That was almost 10 years ago, so think of how much worse it's gotten since then.
Speaker 2But AI just came into my brain.
Speaker 1I'm like oh, yeah, when you have context lengths that are so massive that they could know everything you've ever read, right Like they have enough ability to.
Speaker 2Right, the books you buy, what shows you're watching.
Speaker 1that's a whole framework of who you are, as a person, actually remember every single character you've ever typed on social media, on email, everywhere, even your private messages to your friends and your family, and it knows all of your inner thoughts, of everything all in one.
Data Privacy and Manipulation Risks
Speaker 1You're freaking me out. I'm sure you're freaking the listeners out. The main point here is that we're recording many, many, many orders of magnitude more data than we have in the past. What is known about you is scary accurate. There was actually a thing, I think about 15, 20 years ago, where Target was able to predict whether people were pregnant before they even knew they were pregnant.
Speaker 2I heard something about that.
Speaker 1There's a famous story where there's, like this, teenage girl who gets a flyer about her new baby she didn't tell her parents that she was pregnant. Her dad gets really mad, goes over to Target, blah, blah, blah, and then finds out oh wait, my daughter actually is pregnant. Whoops.
Speaker 2And I hope that was a coincidence, because that's too terrifying.
Speaker 1No, it definitely was not a coincidence that this is them knowing stuff about you anyways. So the whole point was like oh, we got to get to these new moms before they even know their mom. So that way, all of their purchases are going to be at our store and we'll build that habit in. It's very valuable, so anyways. So the point is, is companies like this?
Speaker 1They make these complex models because once they have this information, they can exploit that information to use it for their own benefit generally sales, but it could be political stuff, like we saw with Cambridge Analytica, and it could be many other things down the line as well. There's really no limit, Like if you know someone's weakness, it's up to you whether you're going to exploit that for their benefit or your benefit. The basic thing here is like okay, people, when they have information on you, when they have your data, they can use that to manipulate you into doing the things that they want you to do that you might not even have done yourself. So if you think of it this way, it's sort of like stealing your free will from you.
Speaker 2Yeah, I can see that.
Speaker 1Another good example is like imagine you have a close friend, they know a lot about you, like, yeah, I can see that blah, blah, blah, blah, blah. So because they know so much about you, if they had nefarious like intentions, do you think that they could have a plan to do something to rob you or exploit you or manipulate you?
Speaker 2well, yeah, if they knew you weren't home, they could come into your home and they could take some of your stuff. If they knew something that was maybe deep and shameful to you and they shared that with someone else, someone else could manipulate you. But the point the data points were given without your consent. I mean, have you ever had someone betray you or tell a secret behind your back? You, you trusted someone with a secret, yeah, and they went and told someone else and it embarrassed you. Maybe it got out and there's no difference here. Like, these are your data points and you should have the choice of who to share them with, absolutely.
Speaker 1So the point here is okay. Well, the more someone knows about you, the more they can manipulate you for good or bad. Like they could also use those, those tools, to basically push you in a positive direction, right, right. Like they could blackmail you into going to the gym every day.
Speaker 2Well, if anyone's ready to blackmail me into that. I'm signing up anyway.
Speaker 1So the point is is like versus someone who doesn't know much about you. Let's say you're walking down the street and you bump into someone. They're working with much limited data on you, so they don't know how to exploit you. Yeah, so someone who's a really good manipulator, they'll ask probing questions to get a little bit of data. Then they, once they have that small amount of data, then they can influence you to do what they want and they can build upon that. So this is a very slippery slope. It seems mundane like oh, they just slip into a casual conversation where did you go to, uh, university? Oh, when were you born? When? When did this blah blah blah happen? Once they have those details, they can now extrapolate and they could pretend to be you. I went to this university, I went to do this, I know this about you, and so this can turn into something very bad very quickly with the wrong person.
Speaker 2Right, yeah, that makes a lot of sense.
Speaker 1So that's the risks, but then there's also the dependency risks.
Speaker 2So when you so just one second here, because this is I love the way you're framing this and I want to ask you know, for those of you listening to the podcast right now, when I used to think about data security, I'd be like who cares? Like I have nothing important, that I have nothing to hide. You're reframing this for me in a beautiful way that I have nothing to hide. You're reframing this for me in a beautiful way, like it. It is so important for us to keep our data secure because none of us want to be manipulated and man like I used to be in that camp of like I don't care, I got nothing to hide. It's not about hiding anything. It's about not being controlled or not doing something against your will Without even knowing a lot of the times.
Data Sovereignty and Personal Security
Speaker 2Yeah, the subconscious stuff, that'll be happening.
Speaker 1Yeah, so when you take into account all that data that people build up on people, and then you take into account, like AIs, who can basically convince you of things, it can get pretty scary, pretty quickly. Yeah, so this is a huge risk for not just me or you, but it's for every single breathing person on this planet. The more people know about you, the more you're trusting them that they won't exploit what they know for any personal gain. And what do we know about human behavior? Well, people tend to do things for their own benefit, like on average. So do you think a company is only looking out for your best interests? Of course not.
Speaker 2They're looking out for profit.
Speaker 1You'd have to be super naive to believe that. Yeah. So who's looking out for your best interest? Them no. You need to. You have to. So the only way to look out for your best interests is to have data sovereignty, meaning you have control and access and ownership of your own data and you know how it's being used. You can revoke access to it if you do grant access. This is extremely important stuff.
Speaker 2I just had this sinking feeling of this push to bring the last few billion people online and into the internet and get everybody connected. When these people come into this ecosystem, they're not coming into the ecosystem that we were born into. They're going to be coming into a uh, an extraction system and they're not going to know what's going on for a long time Like that's terrifying. That's why they're so excited about these new markets is because it's, let's say, virgin people getting online and they won't have the ability or the means to even enact what Andrew and I are going to talk about today as some of our suggestions. It's a terrifying thought.
Speaker 1It's funny enough. There's lots of easy steps you can take that will make you a much harder target, and obviously you can go to great lengths, but there is a sort of diminishing returns as you go. Much harder target, and obviously you can go to great lengths, but there is sort of diminishing returns as you go further and further. So data sovereignty is really about reducing your dependency on service providers, and the reason you want to do that is because, if you're dependent on them, they can dictate the terms of how you set data, like share data, to them. So if you're not self-sufficient, they can just dictate like oh, you're going to give us access to everything, we're going to know everything about you. Then we're going to sell that data to whoever we want and they're going to do whatever they want with that data to manipulate you.
Speaker 1So that's obviously not a good position to be in. So you want to have some negotiating power, and if everyone had more data sovereignty, big tech companies would have a lot less power. They wouldn't be able to be able to be so strong armed because people would have options. So this is a thing that you can do, not to the benefit of yourself, but also to the benefit of everyone. So it creates less of a data monopoly and we do have a data monopoly right now. It's just a few top people at the top with all of the data and the data centers controlling everything, and it's absolutely critical that we we don't have that happen. It needs to level the playing field.
Speaker 2So let's, let's talk a little bit about this extraction process. So, um, love it or hate it, I mean, the world is set up for us to go to work. You know we trade our time for, you know, dollars. We trade our labor so that labor creates something more valuable for whoever we gave our labor to, whoever we gave our time to, and that's been the way that the world has worked for, I mean, long before any of us were around, for for thousands of years. So that labor is an extraction and data is another layer of extraction of value from us. That is like I think it was 2016. It became data, became more valuable than oil. So now, now, data is that second layer of extraction. They're taking all of our labor. They're taking our time and compensating us with money little or some and now it's data.
Speaker 2And you know this is kind of in the way that this works in the world is. You know they're taking it, as Andrew had said, to convince you to buy something. So, once they know what you think, they know what ads to serve to you, to influence you. They know what stories will show up that are actually ads. They'll know what articles to put in front of you that aren't articles. They're really well-written ads to convince you to get something, and they can do this with 30 little drips over a period of three to four to six months to form an opinion for you or to make you feel like you're without something or needing something or your life's not good enough without something. And then you go buy something or maybe getting a little more gray, they're convincing you to lean a certain direction, to vote.
Speaker 2How many data points are hitting you about how bad things are and who's responsible, and then who's going to save you? Right, and that's a whole other conversation in governance. But data is used and it's been proven in court that it's been used to influence outcomes in elections in voting systems. Then you get over into like the nefarious shit and this is the stuff that's really important to the listener, if you're listening like it's the identity theft, right, it's blackmail. It's holding your accounts or your visa or your whatever your identity hostage while you have to pay money to a party you'll never meet. So it can be used in ways to stimulate the economy. It can be used in ways to steal and hurt people.
Speaker 1Yeah, and you can even go further down the nefarious route. I think we might see more of this in the future as criminals become more sophisticated, but it can also be a matter of who's a good target to rob their house or maybe kidnap their children and sell them? Yeah, so this can get pretty. Who?
Speaker 2has the psychological profile to not fight back right, that will be able to be mapped, yeah and so. So the sophistication of the crimes that will be able to be gotten away with will be able to be dialed in as these models get stronger and stronger.
Speaker 1So yeah, if I know that one house has, you know, like six german shepherd dogs, because the guy is a huge, phenomenal thing, works out all the time. He's like a black belt in jujitsu, uh, and he owns a lot of guns mentally strong he's gonna fight back. He's gonna, you know, like let's cross him off, it's not waste our time, or I can go over to this other house which has an elderly lady who has arthritis and two cats and lives alone and they're not very tough cats, yeah.
Speaker 1So which one are you going to pick? Yeah, that's data that a criminal can use to target what their goal is is to do a robbery, which was never available before, and then you could cross reference. So that's like the risk. But then there's the reward ratio. So then you could target people who are more wealthy, who might not be at home because of vacations they're on Um. You can put all of these factors into a matrix and then you could create a hit list of what is my best risk for reward ratio.
Speaker 2Imagine just seeing like a whole bunch of houses in suburbia on an overlay and then you have all these like green houses pop up and be like those are good places to go, Like that could be a future. Yeah, that's terrifying to me Right Like someone. Someone rolls in with a van like, hey, we've got five houses to hit, we've got an hour to do it. These are all. Everyone's in Jamaica, dominican. They're all, they're all out of here. There's no security systems or it's easy to take it down.
Speaker 1I mean, we're making some fantasy here, but that's not far from the truth. Well, if you were a criminal, which one would you choose? To go in blind or know what you're going into? Go for the easy one? Yeah, every time.
Speaker 2So I mean, the rule is like, hey, we should probably be all like deep faking our social media profiles and pretending to be like. So here's for the listeners here If something has happened to you in your sovereign data, have you had your identity stolen, or have you had your house broken into while you were on holidays, please comment below this video. Let us know if that's happened to you. It is so common and a lot of people don't talk about it because you know it's. It's either embarrassing or you know whatever the reasons are, but please comment below this is. It's going to get worse. So again, we're not on the negativity podcast here. This is a positive podcast. So let's switch some gears and talk about solutions.
Speaker 1One of the solutions you brought up before talking about the vacation thing. You're talking about not posting your pictures when you're on vacation.
Social Media Risks and Privacy
Speaker 2Yes, that's a rule for my family business trips, vacations, anything, whether it's just me going or if it's all of us going, I don't post anything until I'm home with my family, or if I, my whole family is home. If we went on a vacation now. Now here's why I post that I'm in Phoenix and someone thinks my whole family's in Phoenix and someone goes into my house to steal stuff and my family's home. Uh, stop posting your vacations while you're on vacation. Save those vanity clicks, check the ego, get a whole bunch of pictures and then, when you get home, slowly post them so you can feel cool about yourself or whatever the reason is, or if you want to share it with family. You know, for whatever, do not tell people you're not in your home. Yeah, that's easily easy to mine.
Speaker 1Yep, and now that you've said that there's data that tells you your strategy, so now we know that when things are posted, you're definitely home, right Right. And when you're not posting, you might not be home. Might not be home, but that's a much broader spectrum right it is. That's a better better. For sure it's a better one, yeah.
Speaker 2Or don't post at all, right, just send a text message to your family hey, these are the pictures from the holiday. So that that's a big one for me. Stop screaming from the rooftops. Everything that you're doing and everything you've done in social media. Limit the pictures that you put on there. Um, I know that my family is starting to really scale that back Now, the number of pictures that we put of our kids on there. Um, we'll just send them directly to family members.
Speaker 2Just make a habit of it, just be careful, and maybe, maybe we can talk about that dark side of putting pictures of your kids and your family online, because it is, you know, as people are starting to wake up in society to the, the trafficking of humans, which is just disgusting. And now people are like oh, is this? This has happened, this has been happening forever. It's just more people are becoming aware of it now. Well, where do you think people are getting? You are getting targets. If you're creating a smorgasbord of pictures and your profile page is public, you're creating an advertising platform for the most disgusting humans on the planet.
Speaker 1So it's like, let's say, they have a shopping list of the types of people they're looking to kidnap. Well, now they just have to go through all of the different posts. They could use AI to scrape that, potentially, and then whittle it down to okay, here's the geographic location, the social profile of the targets. Who's not going to fight back? Here's the children of the ages we're looking for. Okay, boom, now we have a narrowed down list of like 16 houses we're going to hit. Boom, boom, boom, boom, boom, done. Protect your kids.
Speaker 2Protect your kids at all costs. Yeah, so be very cautious of that. What other risks are on social media?
Speaker 1Group think is a huge one, okay, so where you get into echo chambers and you stop seeing a more balanced world. So in previous times before we had hyper social groups, and this actually, I think fits more into not the data but more like the relationships point we made in the previous video. Okay, but it's worth touching really quick here.
Social Media, Data Privacy and Manipulation
Speaker 2It's basically like you run the risk of your data pairs you with other people who think the same Right, but you could start to be distorted about what true reality actually is, because you're not bumping into any other people that are different, so you're getting a reinforcement of their cognitive bias and you're just it's reinforcing how you believe and what you think, and it's just pushing and pushing and pushing. The algorithm is delivering to you exactly what you want, because and that's not necessarily nefarious it's if you get what you you want, you come back and then more ads can be served to you yeah, and it.
Speaker 1It can be nefarious in the sense that it polarizes every direction so it separates people from each other of humanity because if, yes, exactly if you ever felt like, hey, my friends seem to be getting really into the thing that they're into and drifting further away from me and I'm getting really into the thing I'm into Now we don't really get along, I've lost that friend. Now I have less friends. So it's like this isolationist point, and then you get two opposing polarities and you fight, you put them against each other and now they're fighting each other rather than working together.
Speaker 1In the olden days, in the olden days, you know, you'd bump into people who had opposing viewpoints all the time and you, if you believe something that wasn't true, there's a pretty good chance you'd bump into someone who could refute your belief. Right, and you'd be like, oh actually, yeah, that was stupid. Why did I think that way? That wasn't true. Now we just bump into the people who think the same thing and instead of challenging our beliefs, we don't challenge each other's beliefs. So it's almost like we went from a society where we were all like MMA fighters, fighting each other for our ideals, to now everyone is just like in WALL-E they're just lying down and they've gotten fat and lazy and they don't fight their ideas anymore. Instead they just collect.
Speaker 2They just kind of bunch together around those ideas so your data can be used to put you into those groups through the algorithms, which then fundamentally changes how you think, how you behave, how you view the world one more thing I want to introduce to people on social media a concept that I don't think they realize is so prevalent is have you ever noticed that if you ever get into a post argument and you know it might be on some of these larger posts that are swaying public opinion, and there are so many something that might seem like it makes sense and how could this not make sense? But there's so many people who are posting against it and it can be downright rude, like horrid stuff, like I want people to think about something. There is an estimate that there could be up to 30% of the users on social media or more, are not real people.
Speaker 1I've heard lately that that's been boosted to 50% now that's very likely the new number with AI.
Speaker 2I haven't got an update since the last time I talked to a data expert in the intelligence community, which we'll have on as a as an expert guest in future episodes. You'll love this one. But remember, when someone's trying at an organization or a group is trying to sway opinion, they can hire firms that will mass post intelligent seeming posts but very, very like one-sided in an ideal or an or or a position and they spam. They spam posts to try to beat people down, to silence them, and a lot of people, just like most people, don't want to fight, especially online. What a waste of time. So anyone that is speaking up and you have all these people posting against you, always keep this in mind. It might not be real people.
Speaker 1Yeah, it's a really important point, mike you brought up, because if you're forming opinions based on comments, it's a really important point, mike you brought up, because if you're forming opinions based on comments, that's a really slippery slope because it's not real people anymore.
Speaker 1Yeah, you can't believe any comments are real. So what you pretty much can only do is, if you're trying to form opinions about how people see the world, only do that with either people you can see in the meat space of reality. Meat space, that's my favorite, yeah, because they're just bags of meat with blood and stuff, okay.
Speaker 2Okay, you're getting a little too, that's gross.
Speaker 1All right, I'll stop it there, but there's people you see in real, real life. And then the people that you know are real people, like your close friends and family, who you've met in real life um, no one that you have only ever seen online yeah, should always be people that. No one that you have only ever seen online should always be people that you know personally that you trust those as opinions that could shape how you think society is viewing the world. And that also goes for the news, because camera angles get turned in directions that aren't reality. I've seen this before. I think everyone or most people have seen that. You know, covering stuff on the news, there's a spin put on almost all the articles, so I wouldn't even trust those anyway. By the close, of this year.
Speaker 2With AI, image generation and language models and video generation video generation a news broadcaster won't be a real human being anymore, and you'll have a heck of a time trying to figure out if they are or are not. So just remember that data spreads to a lot of things. We're getting a little into the weeds, but this is such a fun topic, so let's leave social media at that for now. So just think about what you're posting. Think about the timing that you're posting and who it could be putting at risk either your assets or your family. Protect what you're putting on there and don't worry about the bullies on there. They probably aren't real. Don't get caught up in the quagmire of social media. It used to be a beautiful thing that was ours. It's just been lambasted in the last couple of years.
End-to-End Encryption Explained
Speaker 1Yeah, all right. So let's jump into some new topics of solutions that we can apply here. So what are some simple ways to increase your data sovereignty, protect yourself, basically just improve your life in general? There's so many easy solutions out there to implement, but a lot of people don't know the simple things to look for. So the first one is you need to be looking for end-to-end encrypted services. Yes, now, encryption. Oh my God, it's so scary. What is that? It's numbers and things and jargon. It's actually pretty simple, okay. So let me explain end-to-end encryption in the form of a letter. Okay, okay. So if I sent you a letter in the mail and it's sealed and it's addressed to you, and it shows up to your door and it hasn't been opened and there's no signs of tampering, and you open it, are you pretty confident that no one else saw what you wrote? Yes, yeah, what if you sent a postcard?
Speaker 2No, I would not. I would, someone would have read it.
Speaker 1Yes, yeah, so when you're not using intended encryption, encrypted services, you're sending postcards, so you're saying the envelope shielding the contents is the encryption.
Speaker 2Yeah, makes sense.
Speaker 1Yeah, so the encryption hides what's in there from anyone else who wants to look around. Now we could definitely get into the more specifics of like HTTPS and blah, blah, blah. We're not going to do that because it's going to overcomplicate it. The main thing is that if you're using end-to-end encrypted services, end-to-end means I'm one endpoint, you're the other. Okay, so it means only the endpoints can see it. You see it, I see it. Nobody in the middle. That means even the service provider. Like the mail, like the mail, like the US Postal Service or whatever. They don't get to read what's in your letter, right? They could potentially read a postcard if they find it interesting. Any employee who's handling it can look at. Oh, look at this, oh, wow, that sounds like a nice message.
Speaker 2Yeah, and that's fine.
Speaker 1Oh look, Sally's on vacation. You'd be kind of a moron to disclose personal information on a postcard, yes or hey? Here's my social insurance number on my postcard. Oh, this is my banking password, by the way. Well, guess what People are doing that all the time? Okay, tell us. Well, most messaging services aren't end-to-end encrypted. They offer it sometimes as an upgrade feature you can have and they call it like secret chats and stuff. So WhatsApp is supposed to be end-to-end encrypted? Oh, yeah, because I trust Zucky. Well, the thing is with that is, if the software itself isn't open sourced, they could make a claim that it's uh and then encrypted so what is, what is open source?
Speaker 1let's explain that quickly yeah, open source basically is like show us your code, show us how it's all built, show us the blueprint, how you're constructing this, because if you hide those details, you could claim one thing and do another.
Speaker 2Yes, so it's kind of like a trust me, bro, I'm definitely not looking at you bro I got this yeah, so it should be open source if possible, and then it should also be end-to-end encrypted so someone can go in, look at the code, verify that it's end-to-end encrypted because it's open source.
Speaker 1And that is the two check marks you want yeah, and you don't necessarily have to verify it yourself, because other people do that and there's still other caveats that get too technical. It's not worth your time. Like you can do checksums on the data and validate, blah, blah, blah. Don't worry about that. The main thing is use end-to-end encrypted services whenever possible. Always try to stay away from non-encrypted services, or sorry, end-to-end encrypted, because people say, hey look, my service is encrypted. It's only encrypted between you and the client, right, right. So let's say, you're using Gmail, right? It's not like Google can go in and read all of your messages and they do. Yeah, they feed it to AI and then they make recommendations.
Speaker 2Translator models. That's how you get ads.
Speaker 1That's well known by everyone. So when you do that, just realize like everything you say in your Google email is definitely read by Google, the client can see it. It's not just you and the person you sent it to who reads it, it's the service as well. When it's end to end encrypted, it means only you and the person who you're sending the data to explicitly has access to it.
Speaker 2So what are the main things people use to communicate? Probably texting, yeah.
Speaker 1Email, email and then sending pictures and video or video calls.
Speaker 2And then maybe where they store their videos, pictures files, all that sort of stuff.
Speaker 1There's more and more services today that are improving this, so one that is pretty well known is ProtonMail For email.
Speaker 2Yes.
Speaker 1So it's an end-to-end encrypted email service, which also includes VPNs and other docs. It has a drive that's encrypted as well, so all of this is really great stuff. It's not the only one out there, but it's a great. It's very easy to use. It's not any harder than Gmail. They also have free accounts, accounts. There's paid accounts that have more features, but it's it's end-end encrypted. Okay, as long as you trust the company, which I think generally, I do another one. So for messenger, that would probably the best contender.
Speaker 1There is signal so this is for texting texting, video calls, sending small files, images, so Signal is absolutely great. It's also open source, so that's, that's another positive there.
Speaker 2And we're talking about this for the average user, like Signal has. You know, there's there's a lot of comments out there that it is viewable by intelligence agencies. For most people, big deal like whatever as long as it's end-to-end encrypted by, you know, corporations, that sort of stuff.
Speaker 1I think that's probably the most important the goal here is not like a hundred percent. You know, data leak protection good point, because you'll never get there, you can't. You can't because every time you implement something, the attacking team is already probably thinking of two steps ahead on the next thing.
Speaker 2But if you take over Google chat and you're chatting with all your friends on Google chat, well, all that is data monetized to get you to do something, or sold to a third party. So what we're talking about is just taking out the sale or distribution of your data points and keeping them to yourselves. That's what we're reinforcing.
Speaker 1It's the 80-20 rule. It's like you couldn't stop someone from killing your whole family in your house if you wanted to. If they want to do it, there's always going to be someone more powerful that can do it. But what you can do is make your house decently secure, like have a front door.
Speaker 2That's probably a good idea.
Speaker 1You really went dark on me there with that example, sorry sorry, okay, I didn't mean to like talk about specifically, you just talking about in general. You're never going to be able to to stave off all risks, yeah, unless you're like superman. Yeah right, you just can't.
Speaker 1There's no sovereign time to get that done yeah, yeah, exactly, or money and all these things, but so? But there's easy things you can do, like hey, it's a good idea to have a lock on your front door. Yeah, great, you can do that. Right now people don't. A lot of people are running around with their doors wide open Right, or they're just sitting in the middle of a field, like there's literally no steps are taking.
Speaker 2Okay, Okay. So we got ProtonMail for email. We've got Signal for messaging pictures, videos, small files, video conferencing. Yeah.
Speaker 1And there's some other alternatives too. I'm going to make you guys aware, so it's not just one. So an alternative to ProtonMail is things like MailChain, which is email owned by you. And then there's Orion Messenger, a new startup as well that is similar to Signal. Its main difference is it has quantum proof. Now why that's important is because as soon as quantum computing comes out, you'll be able to crack all the encryption on non-quantum safe encryption. Meaning now all of that is wide open, okay.
Speaker 2But for now we're safe.
Speaker 1For now we're safe, but the thing is, all the stuff we've said now today could be cracked later, 10 years from now. So being on quantum safe stuff is actually a pretty good benefit now, even if you don't have quantum computers yet, because you can always go back in time. So Orion Messenger is a new startup. That one looks pretty cool. There's other services like Skiff, and it has encrypted docs so kind of like Google Docs. There's a bunch of services out there there, way more than I could list in this podcast.
Speaker 2We'll probably get into a larger topic another time for the listeners out there, maybe put in the comments below what you use for email and what you use for your messaging service and your your video call service. These are easy things to switch to um and they're not expensive. I know signal is free Um and it's proton charge anything?
Speaker 1Uh, it does If you get the paid features right.
Speaker 2So if you just use the free features, then you're good to go, so that that'll take care of most people. So comment below what you use and if you found this helpful, all right. So we've got email, we've got messenger. That's great. Now what about?
Speaker 1passwords, yeah, so big thing you need to do is you don't want to be reusing the same login and password everywhere.
Speaker 2Yeah.
Speaker 1That's too much of a vulnerability. And why that has to do with data is because if someone knows your data, your email password combination, one of the sites then they can replicate and put those login credentials on other platforms where you've reused it and then now they have access to everything. Yes, so let's say you sign up for I don't know some eBay account, right, or some other account in some other platform, anywhere it could be a small site that you've never seen before and account in some other platform, anywhere. It could be a small site that you've never seen before and you put in the same login email and password and let's say that just so happens to be the same password you use for your own email.
Speaker 2Yeah, that's how your email gets hacked, they break into that database and then they try that against all other places.
Speaker 1Then they can search your email for all other accounts that you know. Hey, you signed up for this account. Oh great, I just found another one, and I found another one, and that's how it unravels. That's how it unravels. So all you have to do one is keep all your passwords unique, so that way, if they do find out one, only that, one single account is compromised.
Password Management Made Simple
Speaker 2Okay, let me let me cut in here, because Andrew gave me so much shit over this about a year and a half ago, maybe two years ago, and I am one of those people comment below, if you're one of these people. I didn't want to have to come up with a unique password for the 40, 50, 60, and now in business, hundreds of sites that I have access to for various personal, professional, business things. It's like how? There's no way, I'm I'm just not going to do this, and so I was one of those people. Comment below, if you are. I had one of those people that had maybe three passwords, because I was trying to be fancy and they were all variations of the same thing, and I was that guy typing in is it this one? Is it this one? Is it this one, is it?
Speaker 1oh, the third or fourth one worked, and so that's what my poor monkey brain was doing until Andrew introduced me to the concept he's about to talk about. Yeah, so there's password managers, and I resisted password managers for a while. You did too. That makes me feel good. Yeah, okay, I actually used my own uh private, uh spreadsheet, uh encrypted on my computer's hard drive. Okay, I don't feel so good anymore. And then I would, but it was a pain in the butt to use because it was only locally available there, and then I'd have to decrypt it and then unmount it, blah, blah, blah, anyways. So I was using that because I didn't trust regular password managers, right, because they were closed source. So again, it was like trust me, bro, I'm not actually looking at your passwords, right, and to me that was too much of a risk. But then I found out about and this sounds like a freaking sponsorship, to be honest. But then I found out about Bitwarden.
Speaker 2And this is not sponsored. We don't get anything from Bitwarden, it's just something that we use.
Speaker 1Yeah, but Bitwarden, if you want to sponsor us.
Speaker 2I would support that.
Speaker 1Okay. So Bitwarden is a gem of a company, so they provide a password manager. They also give you those authenticator codes too, so you can actually have that as well. It's all open source, it's been tested to make sure that it's not penetratable and it's probably the best password manager you are going to find out there in the world. It's also probably the cheapest one too. I think it's like $ dollars a year for the premium version, but there's also a free version, but I love them so much I easily pay for it because it's amazing. So I absolutely love bitwarden.
Speaker 1Now, how is it hard to set it up? Because you're thinking, oh my goodness, um, my whole like system will fall apart if I do this. Just do it incrementally. Start by creating your one master password. That's got to be long. There's actually websites you can go to like how fast can you crack this password? The password I was using before some of them. I found out later I was like man. This can be cracked in 16 seconds. Stuff that you think is secure can be cracked extremely fast, sometimes in less than two or three seconds, by just a normal computing device.
Speaker 1So your passwords are probably not secure, and so what you want to do is use a password manager with a very long, hard-to-crack password to get in. This is your master password. It's the only password you ever remember from now on. Then, once you go in there now, every time you create a new account for something, all you have to do to change your workflow is, uh, you basically just create a new entry on your password manager for each one. So put in your email, put in the new password. It'll automatically generate you a new unique password of however many characters you want. So I usually recommend more than 25 characters if possible. Probably don't go beyond 40. It doesn't really make a difference. So 25 to 40 characters, with all the special character boxes checked, and then that will then be your new unique password for each new, each new unique service you have.
Speaker 2So your, your locks are locked in a lock box essentially, and how Andrew convinced me to do this was, like you said earlier, just start one at a time, get your Bitwarden set up. Then the next time you're logging into your email, do that one, and the next time you're logging into Spotify, do that one. Next time you're logging into your banking, do that one. Just do one or two a day or one a week, depending on how many passwords you have. I actually have a great story about that.
Speaker 1Okay, spotify spotify didn't have uh 2fa at the time and I had this two-factor authentication. Yeah, it's actually usually known now as multi-factor mfa, but I, old habits, die hard. Yeah, I'm an old dog at this point. Back in the day, I had two-factor authentication two canes uphill anyways, sorry old dogs. Yeah, sorry guys. Uh, we're getting there too, so we know the pain especially in the back.
Speaker 1So I kept getting my spotify hacked, like people kept cracking it and I would create more, and this is before password manager days, okay, and so I had this in my spreadsheet. That was like locked.
Speaker 2Was this back in your day of, like your half a million person YouTube channel teaching piano.
Speaker 1Uh, yeah, Okay yeah. So it kept getting hacked and they would listen to music and I would have all this like rap music or other things that I don't listen to and I'm like why is this happening? I'd be listening to a song and it would stop and another song would start because someone else would be like fighting me for control of my own account.
Speaker 1It was super frustrating. So I kept making new passwords longer and longer and then they get cracked. So once I got into um, you know, bitwarden, I cranked it to like 40 characters and then I threw everything at it and then I checked it. It was like I don't know 5 billion years to crack this password. I was like that's right. Once I did that, spotify was no longer a problem.
Speaker 2Sure disappointed some bad person, yeah, yeah.
Speaker 1So, anyways, that is just kind of of a an entry point. But password managers aren't as as scary and hard as you think they are, and what you invest in for time upfront you gain back by like a hundred X in productivity later, because now every site I go to I know exactly what I'm looking for.
Speaker 2Here's another um, another advanced user tip, or a advanced user tip. You can put your entire family set of passwords for all sorts of things under one umbrella. Now, if you are the person controlling the finances of the home or you control the documents of the home and you have one password, you can share that with your spouse no-transcript master password you can just give them access to to get it in the event you're not able to be there.
Speaker 2Great point. Uh, yeah, you heard that, right, bitwarden, yeah, we're, we're, yeah, pimpin yeah. Yeah, you heard that right, bitwarden, yeah, we're, we're, yeah, pimpin yeah. Another thing is if you have a business or if you have a group of people that you interact with and you need them to share passwords, you can set up little silos of certain passwords are available to certain users, all that sort of stuff. So there's a lot of flexibility in it. But end of the day, get your passwords onto a password manager. Don't be a mic. Don't have three passwords you rotate through. It's super insecure.
Speaker 2I mean, yeah, you're fooling yourself. I'm the guy where I put an old one of my passwords and Apple says you know, this password's been cracked right. It's on a list, like they literally splash a screen up and say don't do this stupid. It's like, oh OK, I was trying to be lazy. I'll go back to BitOrdin again. Yeah exactly All right. So maybe one more thing to touch on before we wrap would be where would we put our photos, videos, music? Where's a good place to store that other than Facebook on their servers?
Speaker 1Right. So this is going back to owning your own data rather than just trusting someone else to manage it for you, which is really convenient, but it comes at extremely great cost and it's not worth the cost. So one really easy way to do this is just get a NAS. So NAS stands for network attached storage. Basically it's just a hard drive that can plug into like an internet ethernet port. Yeah, so once it's plugged into the internet, now you can log into it from any device and it's your own personal cloud service. Yes, so once you have that running, now all your files are on your own device. They're not traced by anyone else. It's like you're not sending your secrets out by postcard to a bunch of people.
Speaker 2Yeah, and this might seem like an intimidating step for people, but this might be where you use your sovereign time principles and you hire someone who has the knowledge and the time to do it and have them come in and set one up for you.
Speaker 2You can get one off of um, off of Amazon, have it show up. You can have someone install it for you, make sure you're the person person putting the passwords into it, and what I love about mine is I can be down on a trip in the States and I can pull up my iPad or my iPhone and I can access my server from there. I have everything that I would normally have to, you know, lug around my laptop with, or I build my own computers, so I'm not going to be putting those into a suitcase, but I have all my files anywhere at any time. On top of that, we can record this podcast here, and I can give a link to our video editors and they can pull them just that one specific thing right off the NAS so that they can do that editing work. I don't have to send it out. It reduces my workflow. There's just so many benefits to it. The primary benefit for most people, though, is your files, your videos, your pictures are yours.
Speaker 1Yes, Ownership of your own data is super important because, again, if you give up ownership of all of your data, what happens Then? Tech companies have more leverage and can basically strong-arm you more and more and more.
Speaker 2There's this easy mindset that is, we shouldn't be doing this, that all my photos are on Facebook. I have all my albums organized on there. It's just wonderful and, yeah, it's just not the proper way to do it. So comment if that frustrates you what we just said, like I want to do it the easy way or if you're really starting to understand from this podcast how important it is for your data sovereignty. It's more important today than ever and in the next five years it's critical. We can't stress that enough.
Speaker 1Yeah, and I want to address a pushback people would have. Who know, who know about data. Right, they'll say, well, you know what, I don't want to only have all my data on one NAS. What if it fails? Well, guess what? There's amazing services. Backblaze is one where you can basically have your NAS backed up off, like off your offsite. So if something happens to your NAS like, uh, you know, your kid picks it up and throws it across the room and it dies, or, you know, god, god forbid, there's a fire or something happens to destroy it physically, you wouldn't be like totally up the creek because then everything's gone. You would be able to then restore onto a new NAS from the backup.
Speaker 2And so, with the backup, again, open source end-to-end encryption, tick off those boxes. That's important. Remember those two open source end-to-end encryption. Then you're dealing with something on the cloud that's safe for you and your family.
Speaker 1And there's one third one as well. So there's end-to-end encryption, but then whenever you're giving data to someone, what you want is data encrypted at rest. What at rest means is, once the data gets there, is it still encrypted or is it only encrypted in transit? Right, because it's like the difference is, let's say, you're sending backup letters to like some service like the post office be like here, store all my letters that I, in case this other one gets lost. But if it's not encrypted at rest, they could open that letter and read it. Right, and then sell that data to whoever they want, okay. So if it's encrypted at rest, it means the envelope remains sealed at all times.
Speaker 2Okay, and it still remains sealed when it's sent so that's an important third point when it comes to backup data services.
Speaker 1Yeah, exactly. There's obviously a ton that we could get into and it can seem really overwhelming, but honestly it's just like use end-to-end encrypted services. Use a password manager. Be very thoughtful about how you're posting on social media, because that's open public data. Make sure that you start looking at, because that's open public data. Make sure that you start looking at. It doesn't have to be overnight, but start looking at how you can own more of your own data, transitioning over to a NAS, which is definitely worth it, and then the last thing you can do is start thinking about what types of data are leaking out of the operating systems you have. So generally, the best ones are the ones that are open source, like linux, like. Those tend to be the most secure. But the downside is is the more secure you get and the more private it gets, the harder it is to use.
Speaker 2When you're talking about operating systems, you're talking about the windows windows, android, ios yeah, those types of things, the operating systems. So the more obscure you get, the more secure you get most of the time that's a good line yeah, keep that one. Yeah, and that's the thing is with the more obscure ones. They're not as familiar to use, um, they're, you know, they're not as handy or fast, and you made a good point about that the last time we spoke about this. If something is easy and convenient, it's usually more open and not safe.
Speaker 1Yeah, generally. So the way that you can sell something that's not really good for you is if it's convenient, right, which actually, if you think about it, it's just like fast food. It's easy to sell people fast food if it's convenient to get. Yeah, it's easy to sell people fast food if it's convenient to get. Imagine if you had to assemble your own fast food, bought from the grocery store, versus by regular high quality ingredients. No one would do it Two very different things, Exactly so.
Speaker 1This is very similar to that in the sense that quick, easy, convenient solutions are generally paired that way because their data processes, they can get away with more, because they can sell you the convenience. If they don't sell that convenience, you know they're not going to be able to push those aggressive things. Okay, so Windows not great. Yeah, so fundamentally, if you even just talk to security teams, right that Windows kernel itself is less secure than the Linux kernel, and Linux kernel is actually what runs Mac computers as well, I didn't know.
Speaker 2they had military ranks in Windows.
Speaker 1Kernel with a K. Okay, think of like popcorn kernels what I always think of. But the kernel is just basically how the software interacts with the hardware. Okay, thank you, but it's fundamentally, at the most concrete, lowest level, it's more secure to use a Linux kernel than a Windows kernel.
Speaker 2There's fundamental flaws baked in there, and you said somewhere in the middle, would be like Mac OS, would be like the middle ground.
Speaker 1Mac is a good middle ground because it provides more security and data ownership. That's part of their fundamental philosophy. If you look at the difference between how Google Pay and Apple Pay works, google knows every purchase you have. The purchases live on their servers. They know everything In Apple. Most of it's done and processed on device and they shield most of the information from themselves. So the philosophy of the design tends to be more privacy respecting on Apple. That doesn't mean all of your data is private on Apple, but in my view it's a step above Windows and that's a major selling point for an Apple device versus a Windows device. And if you think of it this way, the reason why, let's say, a Google phone can be cheaper than an Apple phone, it's because they're making up all that difference in the data they mine from you and then sell and monetize.
Speaker 2Remember, data is more valuable than oil. So a cheaper product is because there's a hidden profit center. For those who are mining the data. It's worth so much. Now we're not saying go take all your Android and your Windows devices, throw them in the garbage. Those are expensive decisions.
Speaker 1But as you go through your upgrade, these attacks automate the research of these things it's going to become more and more ubiquitous, so, and the data you're creating today can be used against you five years or 10 years from now, when things are more sophisticated. So it's important to be thinking about that. The best time to be upgrading is now, not later, because you're going to continue creating more data, all right.
Speaker 2So those are five wonderful points. So, as a listener, I would think about which one or two that would be the lowest hanging fruit for you to implement right away. And feel free to go back and listen to the second half of this podcast on the things we recommend to implement. Go back and listen to them and be like, okay, I'm going to immediately take action on getting a password manager. That's not going to be hard, that can be free. I'm going to switch over. You know, facebook messaging people to signal. I'm going to get all my crew on the signal. I'm going to encourage them to do it.
Speaker 2You know, start with something that makes sense to you and then add to it over time. So five things is a little overwhelming. There might be costs involved with some of them. Do what you can, but start now. That's right, and you will be working your way to becoming a data sovereign in no time. Sounds great, man. Love it All right. So thank you all for listening into the podcast today. Please go, follow us on all of our social media. Check us out on Facebook, instagram, tiktok, youtube all of that fun stuff. Subscribe, tune in for the next one. Love you all. Stay sovereign.