Tech (Regulation, Analysis, Freedom, and AI) (YouTube)
A directory of independent YouTube channels covering digital privacy, open-source software, right to repair, cybersecurity, and technology regulation.
Digital Privacy and Security
-
The Hated One (Digital Privacy, Anti-surveillance) [link] - Reports on the 2026 expiration of EU “Chat Control 1.0” and subsequent “2.0” negotiations, identifying client-side scanning as a violation of fundamental rights.
-
Naomi Brockwell TV (Privacy Tech, Financial Liberty) [link] - Analyzes the strategic impact of the EU’s MiCA (Markets in Crypto-Assets) on decentralized finance, viewing peer-to-peer tech as the only check on CBDCs.
-
Rob Braxman Tech (Cybersecurity, De-googling) [link] - Advocates for custom hardware and ecosystems to bypass the surveillance models inherent in Big Tech business structures.
-
TechLore (Privacy Education, Digital Autonomy) [link] - Provides accessible, tactical guides for non-technical users to reclaim digital autonomy.
-
Side of Burritos (Mobile Security, GrapheneOS) [link] - Offers technical execution guides for GrapheneOS to prevent mobile devices from serving as state surveillance vectors.
-
Sun Knudsen (Security Research, Self-hosting) [link] - Argues that security without privacy is merely a form of controlled access for state actors.
-
Privacy Guides (Security Standards, Digital Rights) [link] - Serves as a vetted repository for consensus-based privacy tools and digital rights standards.
Right to Repair and Open Hardware
-
Louis Rossmann (Right to Repair, Consumer Rights) [link] - Documents how the US DMCA is being scrutinized by legislators as a tool for corporate gatekeeping, arguing that repair restrictions nullify property rights.
-
Jeff Geerling (Open Hardware, Decentralization) [link] - Promotes open hardware standards and self-hosting as the “bottom-up” tactical defense against monopolies.
Linux and Software Freedom
-
Mental Outlaw (Linux, Digital Sovereignty) [link] - Views proprietary software as “digital servitude” and speculates that decentralized protocols like Nostr will supersede mainstream social media by 2028.
-
The Linux Experiment (Open Source, EU Tech Policy) [link] - Explains how the EU Digital Markets Act (DMA) affects tech “Gatekeepers,” providing insights into the friction between interoperability and corporate control.
-
Brodie Robertson (Software Freedom, Licensing) [link] - Forecasts a strategic shift toward a “resurgence of Copyleft (GPL)” to protect community code from being used to train closed AI models.
-
DistroTube (Free Software, Anti-proprietary) [link] - Mirrors libertarian property rights defense through the framework of the Free Software Foundation (FSF).
-
The Lunduke Journal (Independent Tech Journalism) [link] - Tracks the “enshittification” of tech and predicts the Linux kernel may face a major fork by 2030 due to corporate alignment.
-
ExplainingComputers (Tech Trends, Open Hardware) [link] - Analyzes the risks that AI and “Cloud-only” models pose to data sovereignty from an academic perspective.
-
Lawrence Systems (Network Sovereignty, Encryption) [link] - Empowers individuals to build private clouds to bypass ISP-level surveillance.
-
Switched to Linux (Privacy Law, Software Freedom) [link] - Critiques US and EU regulatory shifts that weaponize operating systems as telemetry extraction tools.
-
Chris Titus Tech (System Hardening, Telemetry Removal) [link] - Provides practical utilities to strip surveillance features from mainstream operating systems.
Corporate Accountability and Deep Technical Analysis
-
Upper Echelon (Corporate Accountability, ESG) [link] - Investigates how ESG metrics and public-private partnerships implement surveillance that the state cannot legally execute directly.
-
Luke Smith (Minimalist Tech, Self-hosting) [link] - Advocates for minimalist “suckless” software to avoid the tracking inherent in modern technological bloat.
-
Low Level Learning (Reverse Engineering, DRM) [link] - Provides the “offensive” reverse-engineering knowledge needed to understand how surveillance is implemented at the code level.