Rob Braxman Tech (Official) (@rob_braxman) 's Twitter Profile
Rob Braxman Tech (Official)

@rob_braxman

Alt-tech. Internet Privacy Guy, Public Interest Hacker and Technologist. Jazz Pianist and Sailor. New Account. Lost access to old acct due to 2FA morass on X

ID: 1740228666582536192

linkhttps://www.youtube.com/@robbraxmantech calendar_today28-12-2023 04:30:29

162 Tweet

1,1K Followers

50 Following

EFF (@eff) 's Twitter Profile Photo

End-to-end encryption just survived a major attack in France. This isn’t just a local victory–it’s a global message: Privacy and security are not negotiable. eff.org/deeplinks/2025…

Signal (@signalapp) 's Twitter Profile Photo

Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Which means there’s misinfo flying around that might drive people away from Signal and private communications. One piece of misinfo we need to address is the

Rob Braxman Tech (Official) (@rob_braxman) 's Twitter Profile Photo

As we manufacture BraX3 Phones, the ups and downs of the Trade wars is mind boggingly complex. New decisions are made hourly pretty much. We will discuss our plans and the effects of all this Tariff disruptions on a small company on Rumble tomorrow Thursday 8pm

Rob Braxman Tech (Official) (@rob_braxman) 's Twitter Profile Photo

Performing an Internet search isn't as simple as Googling, or even asking Siri. It's time to understand the privacy invasions possible in search engines and to create a safe solution. Searching is one of the most used ways of profiling users. This video will show alternatives

Rob Braxman Tech (Official) (@rob_braxman) 's Twitter Profile Photo

Open Source Phones :The Only Safe Smartphones, Very Little Sacrifices to Convenience Today Suitable now for both grandma and your teen...

Rob Braxman Tech (Official) (@rob_braxman) 's Twitter Profile Photo

Playing With Browsers to Find Google's Kryptonite Google tracking is relentless and more intense than people imagine. This video explains this tracking architecture. Once you understand how it collects this information about everyone, you can then strategize a way to defeat the