Bigger Insights Privacy & Security Podcast - Cover Art

Welcome to Bigger Insights Privacy & Security

Intro

Welcome to the Bigger Insights Privacy & Security podcast, where we’ll help you live a more private and secure life by exposing the latest threats to your privacy and security and teaching you how to mitigate them. The goal of this podcast is to give you the education and insights you need to protect yourself, your family, your business, and your assets from all kinds of threats, whether those be corporate surveillance, device and browser fingerprinting, creepy and malicious advertisements, data breaches, account takeovers, etc.

Bigger Insights, LLC is an Ohio limited liability company founded in 2020. In addition to producing blog and podcast content, we provide one-on-one consulting services for our clients on the topics of Finance, Privacy & Security, and Technology.

Podcast

1
00:00:00,000 –> 00:00:14,120
Welcome to the Bigger Insights Privacy & Security podcast, where we’ll help you live

2
00:00:14,120 –> 00:00:19,400
a more private and secure life by exposing the latest threats to your privacy and security

3
00:00:19,400 –> 00:00:22,080
and teaching you how to mitigate them.

4
00:00:22,080 –> 00:00:27,360
Now that last bit is an important point because there is no such thing as 100% private or

5
00:00:27,360 –> 00:00:34,280
secure because the threat landscape is constantly evolving, which makes it basically like a

6
00:00:34,280 –> 00:00:37,160
never ending cat and mouse game.

7
00:00:37,160 –> 00:00:43,080
The goal of this podcast is to protect yourself, your family, and your business from all kinds

8
00:00:43,080 –> 00:00:48,880
of threats, whether that be corporate surveillance, device and browser fingerprinting, creepy

9
00:00:48,880 –> 00:00:55,640
malicious advertisements, data breaches, account takeovers, stalking, etc.

10
00:00:55,640 –> 00:00:59,760
And we’re going to be doing some separate episodes on why these things matter and why

11
00:00:59,760 –> 00:01:00,760
you should care about them.

12
00:01:00,760 –> 00:01:05,040
But in the meantime, if you’re one of these people who think that these things don’t apply

13
00:01:05,040 –> 00:01:09,680
to you or that you just don’t care about your privacy and security, you should still pay

14
00:01:09,680 –> 00:01:13,160
attention because we’re going to be going over a lot of things that you might not be

15
00:01:13,160 –> 00:01:14,160
aware of.

16
00:01:14,160 –> 00:01:19,120
And there are a lot of positive side effects that come along with protecting your privacy

17
00:01:19,120 –> 00:01:24,600
and security, like improving your ability to focus, eliminating advertisements, which

18
00:01:24,600 –> 00:01:27,600
you know, annoy pretty much everybody.

19
00:01:27,600 –> 00:01:32,720
And from our experience, our clients report greater levels of happiness and fulfillment

20
00:01:32,720 –> 00:01:37,920
as they simplify their lives by eliminating risky and invasive apps and services.

21
00:01:37,920 –> 00:01:41,720
It’s also a lot easier to sleep better at night when you make it very difficult for

22
00:01:41,720 –> 00:01:44,680
bad actors to take advantage of you.

23
00:01:44,680 –> 00:01:47,000
And that literally is the case.

24
00:01:47,000 –> 00:01:52,760
You might have heard about this, but recently Linus Tech Tips, the big technology channel

25
00:01:52,760 –> 00:01:59,280
on YouTube got hacked and they posted a video of Linus getting out of bed at like three

26
00:01:59,280 –> 00:02:04,080
in the morning to go down to his office and try to recover his account because someone

27
00:02:04,080 –> 00:02:07,640
messaged him in the middle of the night saying that someone took over their accounts and

28
00:02:07,640 –> 00:02:12,160
started putting up like crypto scams and started deleting their videos.

29
00:02:12,160 –> 00:02:13,160
It’s pretty wild.

30
00:02:13,160 –> 00:02:14,800
You might want to check that out.

31
00:02:14,800 –> 00:02:19,920
So to help you navigate these issues, we’re going to be talking in this podcast about

32
00:02:19,920 –> 00:02:26,960
a lot of security tools like password managers, security keys, multi-factor authentication,

33
00:02:26,960 –> 00:02:31,760
various forms of encryption, like if you want to encrypt your drives, encrypt your text

34
00:02:31,760 –> 00:02:38,440
messages or emails with PGP, encrypting your documents, your DNS queries and so on.

35
00:02:38,440 –> 00:02:43,960
We’re also going to be discussing a lot of privacy tools like VPNs, Tor, browsers and

36
00:02:43,960 –> 00:02:50,040
browser extensions, email alias services, virtual payments, metadata removal and so

37
00:02:50,040 –> 00:02:51,040
on.

38
00:02:51,040 –> 00:02:55,440
And we’re going to try our best to give you the information that you need to implement

39
00:02:55,440 –> 00:02:59,320
these apps, services and devices into your workflow.

40
00:02:59,320 –> 00:03:05,440
However, in not knowing who you are, where you live, what your situation is and so on,

41
00:03:05,440 –> 00:03:11,120
we can only do so much on that front, which is why we offer consulting services, but we’ll

42
00:03:11,120 –> 00:03:14,640
go over that in more detail later in this episode.

43
00:03:14,640 –> 00:03:19,940
We started Bigger Insights because privacy and security have become such enormous issues

44
00:03:19,940 –> 00:03:21,440
in recent years.

45
00:03:21,440 –> 00:03:27,840
And unfortunately, even the most fundamental concepts aren’t taught in most homes or schools.

46
00:03:27,840 –> 00:03:31,520
Even for those who take the initiative to seek this information online are faced with

47
00:03:31,520 –> 00:03:34,640
very few, mostly poor choices.

48
00:03:34,640 –> 00:03:39,240
The internet is absolutely flooded with shallow clickbait.

49
00:03:39,240 –> 00:03:45,400
Most channels in this space are just advertisements for sketchy services like NordVPN and LastPass,

50
00:03:45,400 –> 00:03:48,000
which we’ll discuss in future episodes.

51
00:03:48,000 –> 00:03:52,760
We’re trying to break this trend by giving you access to accurate and actionable information

52
00:03:52,760 –> 00:03:58,360
that you need without selling you out to advertisers and scammy companies.

53
00:03:58,360 –> 00:04:03,240
From my personal experience, I’m ashamed to admit that it took me several years to see

54
00:04:03,240 –> 00:04:08,400
the issues that we’re facing because virtually no one talks about them, especially not in

55
00:04:08,400 –> 00:04:10,200
the mainstream media.

56
00:04:10,200 –> 00:04:16,440
When I grew up, the internet wasn’t the creepy mass surveillance engine that it is today.

57
00:04:16,440 –> 00:04:21,400
And like most other people, I grew up believing that privacy existed unless you willingly

58
00:04:21,400 –> 00:04:26,640
gave it up, and our communications and internet browsing were private and secure.

59
00:04:26,640 –> 00:04:28,280
Because why would they not be?

60
00:04:28,280 –> 00:04:32,760
I mean, it was just something that I never even stopped to question.

61
00:04:32,760 –> 00:04:39,640
So I grew up using Windows, which meant that I was using Internet Explorer for many years.

62
00:04:39,640 –> 00:04:46,960
And one day I was in a programming class, and the teacher recommended that we use Firefox.

63
00:04:46,960 –> 00:04:49,480
So I used it for a while, it was okay.

64
00:04:49,480 –> 00:04:54,680
I ended up switching back to Internet Explorer because I didn’t have any conviction for using

65
00:04:54,680 –> 00:04:55,680
Firefox.

66
00:04:55,680 –> 00:05:01,200
I didn’t understand the privacy and security implications of using Internet Explorer.

67
00:05:01,200 –> 00:05:05,720
But when I was using Firefox, you know, way back in the day, it used to have this really

68
00:05:05,720 –> 00:05:12,920
obnoxious update mechanism on Windows where it would basically pop up and bug you to update

69
00:05:12,920 –> 00:05:17,320
the browser almost every day, and it just really drove me nuts.

70
00:05:17,320 –> 00:05:21,240
And then at one of the jobs that I worked at, everybody used Google Chrome.

71
00:05:21,240 –> 00:05:24,560
So I used that at work and started using it at home.

72
00:05:24,560 –> 00:05:30,680
But one of the things that first struck me was, and I have no idea what compelled me

73
00:05:30,680 –> 00:05:37,720
to do this, but one day I did a web search for “most private and secure web browsers”.

74
00:05:37,720 –> 00:05:41,800
I guess I was just curious, you know, what all was out there and whether I should be

75
00:05:41,800 –> 00:05:45,440
using Chrome or going back to Firefox or something like that.

76
00:05:45,440 –> 00:05:52,720
But it came across this article, and it gave Google Chrome very high marks for security,

77
00:05:52,720 –> 00:05:54,120
which is true.

78
00:05:54,120 –> 00:06:02,120
But it labeled Chrome as a high privacy threat, and in knowing nothing about Google and how

79
00:06:02,120 –> 00:06:07,800
they make money, I was really confused and kind of uncomfortable about this, because

80
00:06:07,800 –> 00:06:13,840
I was using Chrome, everyone else I knew was using Chrome, my employer was using Chrome.

81
00:06:13,840 –> 00:06:18,640
It was the norm at the time, and I guess, I guess it kind of still is.

82
00:06:18,640 –> 00:06:23,200
So that just made it very difficult for me to take this article seriously.

83
00:06:23,200 –> 00:06:25,680
But it’s something that always stuck with me.

84
00:06:25,680 –> 00:06:32,080
Then over time, I would see other articles here and there, like I saw one about Jeff

85
00:06:32,080 –> 00:06:37,960
Bezos’ phone getting hacked, and they were talking about how his messages would have

86
00:06:37,960 –> 00:06:43,560
been secured from the malware that was implanted on his device, if he had been using something

87
00:06:43,560 –> 00:06:46,960
like Signal instead of SMS.

88
00:06:46,960 –> 00:06:49,760
And this was the same issue for me here.

89
00:06:49,760 –> 00:06:53,360
I was in, you know, kind of disbelief about this.

90
00:06:53,360 –> 00:06:57,320
Like why would anybody be able to see your SMS messages?

91
00:06:57,320 –> 00:06:58,720
Why would they not be secured?

92
00:06:58,720 –> 00:07:00,000
Why would they not be encrypted?

93
00:07:00,000 –> 00:07:01,760
This doesn’t make any sense to me.

94
00:07:01,760 –> 00:07:07,760
I mean, encryption has been around for millennia, and everybody uses SMS.

95
00:07:07,760 –> 00:07:10,520
So why would this be the case?

96
00:07:10,520 –> 00:07:16,360
Then I started finding out more disturbing things, like not only is SMS insecure, but

97
00:07:16,360 –> 00:07:22,480
so are phone calls, emails, faxes, pretty much all of the communications that we use

98
00:07:22,480 –> 00:07:23,480
today.

99
00:07:23,480 –> 00:07:25,440
This really piqued my interest.

100
00:07:25,440 –> 00:07:30,600
So I started investigating security a little bit more, and privacy as well.

101
00:07:30,600 –> 00:07:37,320
I started reading about Google and Fecesbook and data brokers, and how these companies

102
00:07:37,320 –> 00:07:43,880
harvest and monetize, you know, extremely sensitive data, like your messages, your emails,

103
00:07:43,880 –> 00:07:46,640
your location history, your purchase history.

104
00:07:46,640 –> 00:07:51,960
I found this all very disturbing, and I went down this rabbit hole for years.

105
00:07:51,960 –> 00:07:56,560
It became kind of an obsession of mine to figure out where the bottom is, how deep

106
00:07:56,560 –> 00:07:58,040
does this go?

107
00:07:58,040 –> 00:08:02,760
And unfortunately, the answer to that is very, very, very deep.

108
00:08:02,760 –> 00:08:08,320
That was a very stressful and painful experience for me, but I’m glad that I did it.

109
00:08:08,320 –> 00:08:13,240
And I’m glad that now I’m in a position to help other people make sense of what’s going

110
00:08:13,240 –> 00:08:19,680
on so that they can protect themselves from this never-ending assault on our privacy and

111
00:08:19,680 –> 00:08:20,680
security.

112
00:08:20,680 –> 00:08:26,040
So before we get too deep into this episode, we want to go over a few caveats to help anchor

113
00:08:26,040 –> 00:08:27,840
this discussion.

114
00:08:27,840 –> 00:08:33,200
First of all, note that some of the content in this episode is subject to change as our

115
00:08:33,200 –> 00:08:35,280
business evolves.

116
00:08:35,280 –> 00:08:40,080
If some of those changes are big enough, we might actually revise this episode and republish

117
00:08:40,080 –> 00:08:44,920
it. For more minor changes, we might just update the description.

118
00:08:44,920 –> 00:08:50,040
We’d also like to emphasize that we’re going to try to keep things in this podcast as civil

119
00:08:50,040 –> 00:08:56,920
and friendly as possible with regard to politics and language and things like that.

120
00:08:56,920 –> 00:09:01,960
But just be aware that some of the issues that we discuss might be a little bit uncomfortable

121
00:09:01,960 –> 00:09:04,040
for a younger audience.

122
00:09:04,040 –> 00:09:09,280
It’s just an inconvenient reality that if we’re going to talk about privacy and security,

123
00:09:09,280 –> 00:09:13,280
we’re going to have to talk about some things like criminal activity, which some people

124
00:09:13,280 –> 00:09:15,120
might not want to hear.

125
00:09:15,120 –> 00:09:20,280
But we’re going to avoid foul language, and we’re going to try our best to obfuscate

126
00:09:20,280 –> 00:09:25,800
some of the things that we talk about so that adults can read between the lines without

127
00:09:25,800 –> 00:09:28,920
traumatizing our younger audience members.

128
00:09:28,920 –> 00:09:33,880
It’s important to note that anyone who’s on the internet should be made aware of the

129
00:09:33,880 –> 00:09:38,720
things that we’re going to be discussing, because we don’t call the internet the online

130
00:09:38,720 –> 00:09:40,720
jungle for no reason.

131
00:09:40,720 –> 00:09:44,600
Letting children on the internet is the digital equivalent of letting them walk the streets

132
00:09:44,600 –> 00:09:45,600
alone at night.

133
00:09:45,600 –> 00:09:51,600
They’re going to be exposed to adult themes and probably going to be contacted by adults

134
00:09:51,600 –> 00:09:56,680
with malicious intent no matter what you or online platforms do.

135
00:09:56,680 –> 00:10:02,320
We’ve literally discovered children being harassed and groomed in online games like

136
00:10:02,320 –> 00:10:07,080
Roblox, so everyone needs to take this seriously.

137
00:10:07,080 –> 00:10:12,440
And the final caveat to keep in mind is that some of the items that we discuss might not

138
00:10:12,440 –> 00:10:19,400
be applicable to your situation, your jurisdiction, or might actually change by the time we publish

139
00:10:19,400 –> 00:10:22,160
an episode and you actually hear it.

140
00:10:22,160 –> 00:10:24,200
The laws change all the time.

141
00:10:24,200 –> 00:10:30,120
We might be talking about something like buying a SIM card with cash anonymously so that your

142
00:10:30,120 –> 00:10:35,400
mobile service provider doesn’t know who you are, and some of you might be thinking that

143
00:10:35,400 –> 00:10:40,360
we don’t know what we’re talking about because in your city or your country you have to show

144
00:10:40,360 –> 00:10:43,480
an ID to buy a SIM card, so just keep this in mind.

145
00:10:43,480 –> 00:10:49,080
All right, so now let’s switch gears and talk about Bigger Insights the company.

146
00:10:49,080 –> 00:10:54,080
Bigger Insights is an Ohio limited liability company founded in 2020.

147
00:10:54,080 –> 00:10:59,480
That makes us perhaps the only good thing to have come out of 2020 because 2020 was an

148
00:10:59,480 –> 00:11:01,440
absolute dumpster fire.

149
00:11:01,440 –> 00:11:07,760
Technically, we’re located in Cincinnati, but we can serve clients located almost anywhere

150
00:11:07,760 –> 00:11:12,160
because the vast majority of the work that we do is remote.

151
00:11:12,160 –> 00:11:17,320
We serve our clients in one-on-one sessions using end-to-end encrypted messaging and teleconferencing

152
00:11:17,320 –> 00:11:23,520
services like Signal or Jitsi, but we may be willing to do onsite visits if you’re in

153
00:11:23,520 –> 00:11:27,080
the Cincinnati area and the situation calls for it.

154
00:11:27,080 –> 00:11:33,400
We have a website, biggerinsights.com. It contains blog posts, podcast episodes, which

155
00:11:33,400 –> 00:11:38,480
you might want to check out by the way, because our podcast episodes on our website might

156
00:11:38,480 –> 00:11:44,200
contain things like video content and transcriptions, which you might not see in the platform that

157
00:11:44,200 –> 00:11:46,200
you’re listening to this on.

158
00:11:46,200 –> 00:11:52,120
It also has all of our contact information, some FAQs, and we’re considering adding some

159
00:11:52,120 –> 00:11:55,520
helpful resources, so go ahead and check that out.

160
00:11:55,520 –> 00:12:02,000
This particular podcast is focused on privacy and security, but be aware that we offer services

161
00:12:02,000 –> 00:12:05,440
in finance and technology as well.

162
00:12:05,440 –> 00:12:12,320
That includes not only our one-on-one consulting services, but also blog posts and podcasts,

163
00:12:12,320 –> 00:12:18,000
so take a look for our Bigger Insights Finance and Bigger Insights Technology podcasts.

164
00:12:18,000 –> 00:12:23,800
If you’re on Apple, we have an Apple channel called Bigger Insights, which lists these

165
00:12:23,800 –> 00:12:29,120
three podcasts, and we’re considering adding more in the future, so go ahead and check

166
00:12:29,120 –> 00:12:30,120
that out.

167
00:12:30,120 –> 00:12:33,880
If you do that, I’m pretty sure you still need to subscribe to them individually.

168
00:12:33,880 –> 00:12:37,800
I don’t think you can subscribe to the channel itself.

169
00:12:37,800 –> 00:12:43,480
For some of you, this might sound a little bit strange, like, what do finance and privacy

170
00:12:43,480 –> 00:12:49,280
and security and technology have to do with each other and why not just focus on one thing?

171
00:12:49,280 –> 00:12:56,040
The reason for that is because Bigger Insights is about sovereignty and resilience.

172
00:12:56,040 –> 00:12:58,440
We encourage you to do this sometime.

173
00:12:58,440 –> 00:13:06,360
Sit down and think about what skills a person needs today and into the future if they want

174
00:13:06,360 –> 00:13:09,480
to be self-sovereign and resilient.

175
00:13:09,480 –> 00:13:14,920
When we think about this, at least in the context of a developed economy that’s not on the

176
00:13:14,920 –> 00:13:20,400
brink of collapse, we think that the answer to that is finance, privacy, security, and

177
00:13:20,400 –> 00:13:21,560
technology.

178
00:13:21,560 –> 00:13:27,120
These skills and disciplines work together hand in hand. So think about it this way.

179
00:13:27,120 –> 00:13:32,960
With technology, you can be more productive, you can make more money, and ideally, not

180
00:13:32,960 –> 00:13:36,600
be replaced by AI like ChatGPT.

181
00:13:36,600 –> 00:13:43,520
I have a quote that we like here by Christian Lous Lange, I’m sorry if I mispronounced his

182
00:13:43,520 –> 00:13:50,240
name, but he says, “Technology is a useful servant but a dangerous master”.

183
00:13:50,240 –> 00:13:55,520
We’re concerned for people who don’t master technology because we’re concerned that technology

184
00:13:55,520 –> 00:13:57,760
is going to master them.

185
00:13:57,760 –> 00:14:02,640
We believe this will apply to everybody in their personal lives, but might bleed over

186
00:14:02,640 –> 00:14:05,200
into their professional lives as well.

187
00:14:05,200 –> 00:14:11,600
You know, whether you’re a teacher or an architect or a roofer or something like that, you’re

188
00:14:11,600 –> 00:14:16,440
going to have a difficult time competing with your competitors if you don’t understand

189
00:14:16,440 –> 00:14:21,600
technology and implement it as effectively as your competition does.

190
00:14:21,600 –> 00:14:26,120
So you use technology to be more productive and make more money.

191
00:14:26,120 –> 00:14:32,280
And then with your financial skills, you can manage, grow, and protect those assets.

192
00:14:32,280 –> 00:14:38,520
One of the reasons why I personally started getting involved in finance was I saw the

193
00:14:38,520 –> 00:14:45,320
sheer terror that ensued during the 2008 Global Financial Crisis (GFC).

194
00:14:45,320 –> 00:14:51,040
And when I saw white collar workers fearing for their lives and some of them were quite

195
00:14:51,040 –> 00:14:57,880
literally jumping off skyscrapers, this taught me that no matter what you do, even if you’re

196
00:14:57,880 –> 00:15:03,520
not in a financial field, if you care about your finances, you care about your wealth

197
00:15:03,520 –> 00:15:08,000
and you care about your future and security, you need to learn finance.

198
00:15:08,000 –> 00:15:10,680
That’s just the way that it is, whether you like it or not.

199
00:15:10,680 –> 00:15:17,520
A perfect example of that is the dumpster fire that is underfunded pension obligations

200
00:15:17,520 –> 00:15:19,720
all around the developed world.

201
00:15:19,720 –> 00:15:24,880
If you’re planning on relying on a government pension for your retirement or you’re a teacher

202
00:15:24,880 –> 00:15:30,760
or some other public sector worker who’s relying on benefits, you need to be aware that those

203
00:15:30,760 –> 00:15:32,800
are at very high risk.

204
00:15:32,800 –> 00:15:39,960
A lot of these systems are critically underfunded and that was the case before the market started

205
00:15:39,960 –> 00:15:42,440
to melt down in 2022.

206
00:15:42,440 –> 00:15:47,200
And now that the banks are falling apart, one has to wonder how secure your benefits

207
00:15:47,200 –> 00:15:48,840
actually are.

208
00:15:48,840 –> 00:15:53,800
So again, it doesn’t matter who you are and what you do, it behooves you to get up to

209
00:15:53,800 –> 00:15:57,920
speed on finance so that you can protect your assets.

210
00:15:57,920 –> 00:16:03,760
One of our favorite quotes about money is from Malcolm Forbes, he said, “Money isn’t

211
00:16:03,760 –> 00:16:07,360
everything as long as you have enough”.

212
00:16:07,360 –> 00:16:12,480
Now what’s interesting about that quote is I think most people are going to focus on

213
00:16:12,480 –> 00:16:18,640
the first three words, “money isn’t everything”, but the last half is important, “as long as

214
00:16:18,640 –> 00:16:20,360
you have enough”.

215
00:16:20,360 –> 00:16:25,240
If you don’t have enough, money really does become everything, I hate to say it, but just

216
00:16:25,240 –> 00:16:27,200
think about it for a second.

217
00:16:27,200 –> 00:16:32,440
What major thing in your life isn’t significantly affected by your finances?

218
00:16:32,440 –> 00:16:38,640
I think the one thing that most people would say in that regard is love, because love is

219
00:16:38,640 –> 00:16:39,640
free.

220
00:16:39,640 –> 00:16:42,520
However, even that is questionable.

221
00:16:42,520 –> 00:16:47,920
Money issues are the number one or number two leading cause of divorce.

222
00:16:47,920 –> 00:16:52,200
And as far as privacy and security are concerned, you need to get up to speed on this as well

223
00:16:52,200 –> 00:16:57,800
because you’re going to need these skills to protect your life, the lives of your family,

224
00:16:57,800 –> 00:17:02,360
protect your business, protect your assets, and just protect your future.

225
00:17:02,360 –> 00:17:07,360
You know, we want to all believe that these things just don’t matter until we become victims,

226
00:17:07,360 –> 00:17:12,040
or we might think that, you know, these things don’t apply to us because we’re not Elon

227
00:17:12,040 –> 00:17:18,240
Musk or Jeff Bezos, but this is a matter that really does concern everybody.

228
00:17:18,240 –> 00:17:19,520
Nobody is safe.

229
00:17:19,520 –> 00:17:21,080
That’s reality.

230
00:17:21,080 –> 00:17:26,040
Just the other day, I was getting my hair cut and I was talking to the hairstylist and

231
00:17:26,040 –> 00:17:30,640
she said that somebody hacked into her bank account and emptied it.

232
00:17:30,640 –> 00:17:35,760
Now, luckily, she was able to work with the bank and get the money back, but she was very,

233
00:17:35,760 –> 00:17:39,280
very close to not being able to make rent.

234
00:17:39,280 –> 00:17:44,280
But the story is probably not going to end there because whoever did that probably has

235
00:17:44,280 –> 00:17:48,400
a tremendous amount of information about her, and they’re probably going to go after her

236
00:17:48,400 –> 00:17:49,800
again for something else.

237
00:17:49,800 –> 00:17:55,240
So just keep that in mind because, you know, obviously, she’s not Elon Musk, but that didn’t

238
00:17:55,240 –> 00:17:59,960
protect her from someone raiding her bank account, and we don’t want to see anybody

239
00:17:59,960 –> 00:18:00,960
else go through that.

240
00:18:00,960 –> 00:18:03,200
So that’s one of the reasons why we exist.

241
00:18:03,200 –> 00:18:06,600
We want to help people avoid these kinds of issues.

242
00:18:06,600 –> 00:18:11,720
I want to read a quote to you from Tim Cook, very interesting.

243
00:18:11,720 –> 00:18:17,480
He says, quote, “This is the golden age of surveillance that we live in.

244
00:18:17,480 –> 00:18:20,640
There is more information about all of us.

245
00:18:20,640 –> 00:18:25,840
So much more than 10 years ago or five years ago, it’s everywhere.

246
00:18:25,840 –> 00:18:29,280
You are leaving digital footprints everywhere.”

247
00:18:29,280 –> 00:18:30,920
So don’t just take our word for it.

248
00:18:30,920 –> 00:18:33,560
I mean, he should obviously know.

249
00:18:33,560 –> 00:18:36,200
And just keep in mind that we’re here to help you with this.

250
00:18:36,200 –> 00:18:41,760
We’re here to help make sure that you’re not leaving your digital footprints everywhere.

251
00:18:41,760 –> 00:18:47,040
But regarding these specific topics, there’s some other things that you should know.

252
00:18:47,040 –> 00:18:52,080
You might be thinking to yourself, well, you know, I have an accountant or I have a guy

253
00:18:52,080 –> 00:18:57,120
who manages my investments, so I don’t need to worry about any of this stuff.

254
00:18:57,120 –> 00:18:58,760
And that’s great.

255
00:18:58,760 –> 00:19:04,440
But still, the question is, if you’re not educated on these topics, how are you going

256
00:19:04,440 –> 00:19:06,280
to know who to hire?

257
00:19:06,280 –> 00:19:08,680
How are you going to know who’s good at their job?

258
00:19:08,680 –> 00:19:11,560
How are you going to know whether they’re giving you a good value or that they have

259
00:19:11,560 –> 00:19:13,480
any idea what they’re doing?

260
00:19:13,480 –> 00:19:15,000
This is a real issue.

261
00:19:15,000 –> 00:19:19,720
So even though, you know, personally, I’m very knowledgeable about taxes, I’ll still

262
00:19:19,720 –> 00:19:21,080
use an accountant.

263
00:19:21,080 –> 00:19:26,920
But before I hire one, I’ll, you know, kind of low-key interview them about certain things

264
00:19:26,920 –> 00:19:29,520
and make sure that they know what they’re talking about.

265
00:19:29,520 –> 00:19:32,640
But how can you do that if you don’t know anything about taxes?

266
00:19:32,640 –> 00:19:37,200
You’re just, you’re really just flying blind and hoping that, you know, they do everything

267
00:19:37,200 –> 00:19:40,520
correctly and that they’re looking out for your best interests.

268
00:19:40,520 –> 00:19:45,480
This reminds me of something that Robert Kiyosaki talks about a lot in his books.

269
00:19:45,480 –> 00:19:52,120
He says, something to the effect of the poor want to know a lot about a little, but the

270
00:19:52,120 –> 00:19:55,320
rich want to know a little about a lot.

271
00:19:55,320 –> 00:19:57,680
It can be difficult to do.

272
00:19:57,680 –> 00:20:03,000
But if you do know a little about a lot, that really helps you see the forest through the

273
00:20:03,000 –> 00:20:07,920
trees and make connections that a lot of other people just can’t make.

274
00:20:07,920 –> 00:20:15,360
For example, you know, I follow a lot of people in the financial space and the ones that are

275
00:20:15,360 –> 00:20:20,600
interested in cryptocurrency only talk about one thing and that’s Bitcoin.

276
00:20:20,600 –> 00:20:26,560
And that’s because they just don’t understand how much of a disaster the privacy implications

277
00:20:26,560 –> 00:20:29,120
are for people who invest in Bitcoin.

278
00:20:29,120 –> 00:20:33,160
If they did, they wouldn’t want to touch it with a 10 foot pole, they would be talking

279
00:20:33,160 –> 00:20:38,560
about something like Monero, which is private by default. But you know, that’s the risk

280
00:20:38,560 –> 00:20:46,640
that you run when you work with somebody who focuses on one narrow discipline like finance.

281
00:20:46,640 –> 00:20:51,440
And when you hire most professionals, you also need to be wondering how they manage

282
00:20:51,440 –> 00:20:52,440
your data.

283
00:20:52,440 –> 00:20:53,440
Where do they store it?

284
00:20:53,440 –> 00:20:58,760
You know, a lot of them use Yahoo and Google products and things like that that you would

285
00:20:58,760 –> 00:21:02,200
not want your information being stored in.

286
00:21:02,200 –> 00:21:04,280
So we’ve talked about who we are.

287
00:21:04,280 –> 00:21:06,840
Now let’s talk about who we are not.

288
00:21:06,840 –> 00:21:15,640
We are not CPAs, CFAs, CFPs, RIAs, attorneys, fiduciaries, etc.

289
00:21:15,640 –> 00:21:20,800
Even if we were, we wouldn’t be able to give you advice in this podcast.

290
00:21:20,800 –> 00:21:27,240
However, we do consult with these experts on our own time and our own dime.

291
00:21:27,240 –> 00:21:32,680
But one of the differences is we don’t charge you $400 an hour.

292
00:21:32,680 –> 00:21:37,560
You know, one of the things that I’ll do is I’ll queue up, you know, pages and pages

293
00:21:37,560 –> 00:21:43,320
of questions and I’ll visit attorneys and accountants and things like that and get answers

294
00:21:43,320 –> 00:21:48,120
to some of these really difficult questions that you just can’t find on the internet.

295
00:21:48,120 –> 00:21:51,800
I get the impression that they think that I’m kind of strange for doing that, but you

296
00:21:51,800 –> 00:21:55,640
know, that’s just, unfortunately, that’s just what I have to do to get up to speed on some

297
00:21:55,640 –> 00:21:57,400
of these topics.

298
00:21:57,400 –> 00:22:03,880
And I’d also like to emphasize that even though we are not those things, having those certifications

299
00:22:03,880 –> 00:22:06,600
is not a guarantee of anything.

300
00:22:06,600 –> 00:22:12,920
It’s absolutely terrifying how often we speak to experts like attorneys and accountants

301
00:22:12,920 –> 00:22:17,080
who don’t understand some of the things that we’re going to be talking about.

302
00:22:17,080 –> 00:22:24,040
For example, I went to talk to an attorney who claims on his website to be an expert

303
00:22:24,040 –> 00:22:28,280
in real estate. The guy didn’t know what a land trust was.

304
00:22:28,280 –> 00:22:33,480
The attorney that I talked to after that didn’t know what an LLC was.

305
00:22:33,480 –> 00:22:38,840
I mean, first of all, he thought that it stood for Limited Liability Corporation, which

306
00:22:38,840 –> 00:22:39,840
is wrong.

307
00:22:39,840 –> 00:22:40,840
It’s a limited liability company.

308
00:22:40,840 –> 00:22:42,840
It is not a corporation.

309
00:22:42,840 –> 00:22:44,800
They’re very different things.

310
00:22:44,800 –> 00:22:52,760
And I quizzed him on Ohio’s Limited Liability Company statute by asking him if a charging

311
00:22:52,760 –> 00:22:59,800
order is the sole and exclusive remedy for a judgment against an Ohio LLC, which is the

312
00:22:59,800 –> 00:23:00,800
case.

313
00:23:00,800 –> 00:23:04,120
And he said, no, no, that can just take your interest.

314
00:23:04,120 –> 00:23:08,640
Now maybe he just failed to expand on that like he should have, like, you know, was he

315
00:23:08,640 –> 00:23:11,400
talking about piercing the corporate veil or what?

316
00:23:11,400 –> 00:23:16,440
But at the end of the day, it says right there, you can read on the website, Ohio’s revised

317
00:23:16,440 –> 00:23:22,280
code website, that a charging order is the sole and exclusive remedy for a judgment against

318
00:23:22,280 –> 00:23:24,280
an Ohio LLC.

319
00:23:24,280 –> 00:23:28,480
That’s one of the reasons why we are an LLC, not a corporation.

320
00:23:28,480 –> 00:23:34,760
You know, we’ll also ask accountants, certain tax questions that they probably should know.

321
00:23:34,760 –> 00:23:36,200
And they just, they just don’t know.

322
00:23:36,200 –> 00:23:40,280
They’ll say like, Oh, I don’t know, I’ll just have to, you know, research it and charge

323
00:23:40,280 –> 00:23:41,280
you for that.

324
00:23:41,280 –> 00:23:43,640
And it’s, it’s really disappointing.

325
00:23:43,640 –> 00:23:48,600
And another thing to keep in mind with a lot of these professionals is they really won’t

326
00:23:48,600 –> 00:23:51,080
want to give you the time of day

327
00:23:51,080 –> 00:23:55,480
if you don’t have a lot of assets for them to manage, or if they just think that you’re

328
00:23:55,480 –> 00:24:00,480
not a very sophisticated person. And that’s very unfortunate. You know, a lot of financial

329
00:24:00,480 –> 00:24:06,120
planners won’t do anything for you if you don’t give them at least a hundred thousand

330
00:24:06,120 –> 00:24:08,480
dollars worth of assets to manage.

331
00:24:08,480 –> 00:24:11,760
So if that’s you, what are you supposed to do?

332
00:24:11,760 –> 00:24:14,480
Like what really are your options?

333
00:24:14,480 –> 00:24:19,280
And that’s where we come in, we’ll help you, we’ll charge you a fair hourly rate.

334
00:24:19,280 –> 00:24:23,680
We won’t take a percentage of your assets or anything like that.

335
00:24:23,680 –> 00:24:26,440
So now let’s talk a little bit about what we do.

336
00:24:26,440 –> 00:24:32,840
In addition to making the best podcast and blog content out there, we serve clients like

337
00:24:32,840 –> 00:24:35,480
you in one-on-one sessions.

338
00:24:35,480 –> 00:24:40,440
Like I said earlier, we charge an hourly rate, which at the time of this recording, we don’t

339
00:24:40,440 –> 00:24:42,960
disclose for many reasons.

340
00:24:42,960 –> 00:24:47,400
Like first of all, it’s subject to change, especially with, you know, the way that the

341
00:24:47,400 –> 00:24:51,920
dollar is going, who knows what it’s actually going to be worth a year from now.

342
00:24:51,920 –> 00:24:55,800
And hourly rates can be very misleading.

343
00:24:55,800 –> 00:25:01,720
So in our particular case, we do quite a bit of pro bono work.

344
00:25:01,720 –> 00:25:05,080
We’ll text our clients oftentimes for free.

345
00:25:05,080 –> 00:25:09,880
We can’t guarantee that for everybody, it just depends on the circumstances and what

346
00:25:09,880 –> 00:25:12,200
exactly you’re asking for.

347
00:25:12,200 –> 00:25:16,680
You know, like if you were to ask us, you know, what password manager we recommend, we’ll

348
00:25:16,680 –> 00:25:20,880
give you a couple of options and some very basic reasons why.

349
00:25:20,880 –> 00:25:26,200
But if you were to follow up and say, okay, can you help me get it set up properly and

350
00:25:26,200 –> 00:25:31,320
help, you know, migrate my existing data over into it and things like that, you know, that’s

351
00:25:31,320 –> 00:25:35,420
something that we would set up, you know, a paid session for.

352
00:25:35,420 –> 00:25:42,560
So just as an example, a few nights ago at like 11 or 12 at night, I was texting one of

353
00:25:42,560 –> 00:25:49,680
our clients through Signal for free, helping explain to her what our options are for executing

354
00:25:49,680 –> 00:25:54,920
and passing contracts back and forth with someone in a more private secure manner than

355
00:25:54,920 –> 00:25:57,440
using something like DocuSign.

356
00:25:57,440 –> 00:26:02,200
You know, good luck finding somebody else who’s willing to do something like that for

357
00:26:02,200 –> 00:26:03,200
you.

358
00:26:03,200 –> 00:26:09,660
And finally, regarding our hourly rates, we like to discuss what we offer in more detail

359
00:26:09,660 –> 00:26:16,120
with prospective clients, and we can also talk about how others mislead what their billing

360
00:26:16,120 –> 00:26:18,480
rates actually are.

361
00:26:18,480 –> 00:26:24,360
You know, Warren Buffett famously says, “Price is what you pay, value is what you get”.

362
00:26:24,360 –> 00:26:30,280
So if you can find somebody else who offers the services that we offer, which, you know,

363
00:26:30,280 –> 00:26:34,560
off the top of my head, I’m not even sure who that would be, but if you can find somebody

364
00:26:34,560 –> 00:26:39,080
else who would do it, and for a cheaper rate than we will, you have to ask yourself some

365
00:26:39,080 –> 00:26:40,080
other questions.

366
00:26:40,080 –> 00:26:42,520
Like, how are they securing your data?

367
00:26:42,520 –> 00:26:47,600
You know, are they willing to help you out quickly over text for free?

368
00:26:47,600 –> 00:26:53,200
You know, like all hours of the day, sometimes I’ll help people at three in the morning.

369
00:26:53,200 –> 00:26:58,560
You know, we’re also willing to help people out on holidays and weekends as well.

370
00:26:58,560 –> 00:27:03,440
And you know, again, good luck trying to find other people who will do that for you.

371
00:27:03,440 –> 00:27:08,360
So there’s a lot more to consider than just the hourly rate, but that gets kind of lost when

372
00:27:08,360 –> 00:27:13,000
people, you know, see that on the screen without all of the other context that goes

373
00:27:13,000 –> 00:27:14,640
on behind it.

374
00:27:14,640 –> 00:27:19,720
So right about now, you might be wondering, under what circumstances would you request

375
00:27:19,720 –> 00:27:21,360
a meeting with us?

376
00:27:21,360 –> 00:27:23,480
Or what do they look like?

377
00:27:23,480 –> 00:27:28,120
Our requests from clients generally fall under one of three categories.

378
00:27:28,120 –> 00:27:33,240
The first being acute issues. That might be something like you need help dealing with

379
00:27:33,240 –> 00:27:37,960
a scam, or maybe you’ve been hacked, or you think that you might have been hacked.

380
00:27:37,960 –> 00:27:40,240
We can help you with something like that.

381
00:27:40,240 –> 00:27:42,360
The second would be education.

382
00:27:42,360 –> 00:27:46,800
You might just be curious about something you might want to learn more about device and

383
00:27:46,800 –> 00:27:51,600
browser fingerprinting and how you can protect yourself from that.

384
00:27:51,600 –> 00:27:57,600
Sometimes we’ll get requests like, “Hey, can you sit down and explain to our daughter why

385
00:27:57,600 –> 00:28:03,240
she shouldn’t be documenting her entire life story on Fecesbook?”

386
00:28:03,240 –> 00:28:06,080
And the third is just ongoing maintenance.

387
00:28:06,080 –> 00:28:12,400
So internally, we do regular maintenance for things like updating our passwords or reviewing

388
00:28:12,400 –> 00:28:18,000
our devices and apps and services to make sure that they’re the best ones for the job

389
00:28:18,000 –> 00:28:20,480
and that we still need them.

390
00:28:20,480 –> 00:28:26,120
So we recommend that our clients do the same, and we can sit down with you and talk about,

391
00:28:26,120 –> 00:28:30,640
you know, what’s going on in your life or in your business or with your career, talk

392
00:28:30,640 –> 00:28:35,960
about what your needs are, what kind of devices and apps and services you’re using, and not

393
00:28:35,960 –> 00:28:41,040
only help make sure that those tools are right for you, but that you’re using them in a private

394
00:28:41,040 –> 00:28:42,720
and secure manner.

395
00:28:42,720 –> 00:28:47,920
So once you decide that you want to request a meeting, you can reach out to us and we’ll

396
00:28:47,920 –> 00:28:53,200
follow up and schedule a time to talk to you through one of our secure channels.

397
00:28:53,200 –> 00:28:59,240
You can go to the contact section of our website at biggerinsights.com to see all the different

398
00:28:59,240 –> 00:29:01,720
ways that you can reach out to us.

399
00:29:01,720 –> 00:29:07,560
But at the time of this recording, you can talk to us through Signal, Session, Briar,

400
00:29:07,560 –> 00:29:12,000
Matrix, Email, SMS, Mastodon, and Twitter.

401
00:29:12,000 –> 00:29:17,800
However, not only is that subject to change, but as of now, we prefer that you reach out

402
00:29:17,800 –> 00:29:20,560
to us using Signal or Session.

403
00:29:20,560 –> 00:29:25,880
And if you do that, you’ll probably get the best and quickest response out of us.

404
00:29:25,880 –> 00:29:29,800
Now let’s go over a few things that we do not do just to make sure that we’re all on

405
00:29:29,800 –> 00:29:31,320
the same page.

406
00:29:31,320 –> 00:29:38,080
We don’t give financial, tax, legal, health, or other professional advice in this podcast

407
00:29:38,080 –> 00:29:43,280
or our website for many reasons, one of which is we just don’t know who you are and what

408
00:29:43,280 –> 00:29:45,960
your circumstances are.

409
00:29:45,960 –> 00:29:51,800
Another thing that we definitely do not do is sell our customers data or sell sketchy

410
00:29:51,800 –> 00:29:52,800
products.

411
00:29:52,800 –> 00:30:00,120
It is possible that we might recommend certain products or services that either we use ourselves

412
00:30:00,120 –> 00:30:05,560
or that we strongly believe in, but you’re not going to hear us peddling sketchy products

413
00:30:05,560 –> 00:30:11,520
like LastPass or NordVPN or something like that, like a lot of other content creators

414
00:30:11,520 –> 00:30:13,200
do out there.

415
00:30:13,200 –> 00:30:19,480
But for more legitimate products and services that we believe in, like Proton or Tutanota

416
00:30:19,480 –> 00:30:25,920
or Mullvad or Nitrokey or something like that, we would consider helping them market their

417
00:30:25,920 –> 00:30:28,480
products and services because we believe in them.

418
00:30:28,480 –> 00:30:32,520
We think that they’re doing a great job and we think that that would not only do them

419
00:30:32,520 –> 00:30:38,200
and us a favor, but our listeners and our clients as well. It’s a win, win, win.

420
00:30:38,200 –> 00:30:42,360
Let’s switch gears and talk about what sets us apart from our competitors.

421
00:30:42,360 –> 00:30:47,800
We’ve alluded to this earlier, but we believe we take a very comprehensive approach to helping

422
00:30:47,800 –> 00:30:52,520
you build a successful future that you’d be very hard-pressed to find elsewhere.

423
00:30:52,520 –> 00:30:57,400
The services that we provide our clients are engineered not only to satisfy their privacy

424
00:30:57,400 –> 00:31:03,720
and security goals, but we do so within a framework that takes their financial and technology

425
00:31:03,720 –> 00:31:05,600
needs into account.

426
00:31:05,600 –> 00:31:10,760
We think this is very important and we think it’s very much underappreciated.

427
00:31:10,760 –> 00:31:15,840
We also focus very heavily on our client’s individual needs.

428
00:31:15,840 –> 00:31:21,800
Every client’s situation is different in terms of risk tolerance, threat model, family matters,

429
00:31:21,800 –> 00:31:23,440
financial means, etc.

430
00:31:23,440 –> 00:31:29,280
We focus on tailoring our services to each client’s specific situation and needs.

431
00:31:29,280 –> 00:31:35,000
Just as an example, for some people, an iPhone might be the best choice for them, but for

432
00:31:35,000 –> 00:31:40,280
others, we might recommend a Google Pixel with GraphineOS or CalyxOS.

433
00:31:40,280 –> 00:31:43,040
It just depends on the situation.

434
00:31:43,040 –> 00:31:48,000
We’re not one-trick ponies and we don’t recommend the same thing to all of our clients because

435
00:31:48,000 –> 00:31:55,200
this stuff is extremely complicated. And you don’t really learn and realize and appreciate

436
00:31:55,200 –> 00:32:01,600
that until you’ve had the experiences that we’ve had, not only through our own research,

437
00:32:01,600 –> 00:32:04,320
but helping all of our other clients.

438
00:32:04,320 –> 00:32:07,600
Another thing that sets us apart is we’re very flexible.

439
00:32:07,600 –> 00:32:11,120
A lot of our clients have a 9 to 5 JOB.

440
00:32:11,120 –> 00:32:17,720
If that’s you, then you might be painfully aware as to how difficult it can be to work

441
00:32:17,720 –> 00:32:24,120
with accountants and lawyers and other professionals who also work the same schedule.

442
00:32:24,120 –> 00:32:30,400
I remember one time I was working a job and I was interested in buying some rental real

443
00:32:30,400 –> 00:32:37,040
estate and I just remember how painful and frustrating it was to try to balance working

444
00:32:37,040 –> 00:32:43,280
my job so I didn’t get canned, but also dealing with the banks and the title companies and

445
00:32:43,280 –> 00:32:49,160
the real estate agents and viewing the homes and talking to insurance companies and mortgage

446
00:32:49,160 –> 00:32:54,240
brokers because all these people work from 9 to 5, Monday through Friday.

447
00:32:54,240 –> 00:32:58,160
We understand that and we have clients from all over.

448
00:32:58,160 –> 00:33:05,480
We do almost all of our work electronically, so we can serve people in a lot of different

449
00:33:05,480 –> 00:33:10,600
hours throughout the day, so if you have a job, just keep that in mind.

450
00:33:10,600 –> 00:33:14,080
We might very well be able to make something work for you.

451
00:33:14,080 –> 00:33:18,960
We also have a lot of in-depth knowledge on privacy and security.

452
00:33:18,960 –> 00:33:23,720
That allows us to come up with very creative solutions for our clients.

453
00:33:23,720 –> 00:33:29,960
If you want to live a more private and secure life, I regret to inform you that that can

454
00:33:29,960 –> 00:33:37,480
be a very long, painful, and quite frankly scary experience to do on your own.

455
00:33:37,480 –> 00:33:44,040
We can help you navigate these challenges and avoid a lot of the pitfalls that not only

456
00:33:44,040 –> 00:33:50,840
we’ve fallen into, but our other clients have as well. And I’ll give you a perfect example.

457
00:33:50,840 –> 00:33:59,680
We make heavy use of incognito browsing, not saving sessions, using VPNs and Tor, and

458
00:33:59,680 –> 00:34:06,480
uBlock Origin for blocking a lot of creepy web content, and we recommend that our clients

459
00:34:06,480 –> 00:34:10,720
do as well, but there’s nuance to discuss there.

460
00:34:10,720 –> 00:34:17,120
You’ll want to understand not only what to do and how to do it, but when to do it.

461
00:34:17,120 –> 00:34:23,280
A lot of services are becoming increasingly antagonistic toward people who use these kinds

462
00:34:23,280 –> 00:34:28,120
of privacy and security tools and techniques, and if you aren’t careful, you can really

463
00:34:28,120 –> 00:34:29,720
get burned.

464
00:34:29,720 –> 00:34:36,000
So in my personal case, I’ve learned the hard way that if you have an eBay account and

465
00:34:36,000 –> 00:34:41,640
their systems observe you logging in with a fresh session from an IP address that they

466
00:34:41,640 –> 00:34:46,720
haven’t seen before, they’re going to watch you very, very closely, and if you start doing

467
00:34:46,720 –> 00:34:51,160
things like changing your password, they’re going to lock your account.

468
00:34:51,160 –> 00:34:56,720
And then on top of that, their customer support is almost impossible to contact.

469
00:34:56,720 –> 00:35:01,280
So this is something that I learned the hard way, and I have an eBay account that’s been

470
00:35:01,280 –> 00:35:06,560
locked for years because last time I went in there, the only thing that I was trying

471
00:35:06,560 –> 00:35:14,760
to do was beef up my password and use an email alias so that I could delete the email address

472
00:35:14,760 –> 00:35:17,880
that was originally associated with that account.

473
00:35:17,880 –> 00:35:23,360
And a very short while after I did that, they sent me an email explaining to me that they

474
00:35:23,360 –> 00:35:27,560
thought something weird was going on and they locked my account and that I wouldn’t be able

475
00:35:27,560 –> 00:35:31,960
to get into it again without contacting customer support.

476
00:35:31,960 –> 00:35:36,000
And there’s a lot more to that story, which I’m not going to go into here.

477
00:35:36,000 –> 00:35:40,520
But the point is that these tools and techniques are very helpful and we think that people

478
00:35:40,520 –> 00:35:45,920
should be using them, but you need to know how they work and you need to know what the

479
00:35:45,920 –> 00:35:46,920
risks are.

480
00:35:46,920 –> 00:35:52,200
And we’re going to do our best to explain that throughout the episodes of this podcast,

481
00:35:52,200 –> 00:35:54,200
but that’s kind of difficult to do.

482
00:35:54,200 –> 00:35:57,680
And that’s why we recommend that you become a client so that we can sit down with you

483
00:35:57,680 –> 00:36:03,320
and explain these things in a way that’s tailored to your specific situation.

484
00:36:03,320 –> 00:36:07,840
Another thing that makes us different is we are honest with our clients.

485
00:36:07,840 –> 00:36:13,240
I have a decade of experience working in the professional services industry, and I can

486
00:36:13,240 –> 00:36:20,000
tell you from that experience that most professionals and businesses are not going to tell you what

487
00:36:20,000 –> 00:36:21,000
you need to hear.

488
00:36:21,000 –> 00:36:23,960
They’re going to tell you what you want to hear.

489
00:36:23,960 –> 00:36:30,880
Now, because I have a conscience and I have integrity, this made me very unpopular at

490
00:36:30,880 –> 00:36:32,760
my previous job.

491
00:36:32,760 –> 00:36:39,000
When push came to shove, I always yielded to our clients and told them what they needed

492
00:36:39,000 –> 00:36:45,320
to hear and gave them what they needed at the expense of my career and my employer.

493
00:36:45,320 –> 00:36:50,240
I would make decisions that were in the best interest of our clients, even if they didn’t

494
00:36:50,240 –> 00:36:51,720
understand them.

495
00:36:51,720 –> 00:36:57,360
And I remember like it was yesterday, my boss pulled me into his office one day because

496
00:36:57,360 –> 00:37:00,680
he was very upset about something that I did.

497
00:37:00,680 –> 00:37:05,600
And what he said to me was, “Perception is everything.”

498
00:37:05,600 –> 00:37:12,920
Now what he meant by that was it was okay and justifiable for us as a company to do

499
00:37:12,920 –> 00:37:19,360
things that went against our client’s interests as long as they perceived that we were acting

500
00:37:19,360 –> 00:37:21,480
in their best interest.

501
00:37:21,480 –> 00:37:27,160
And that really created a lot of friction between me and my employer because I just don’t believe

502
00:37:27,160 –> 00:37:29,720
in that philosophy at all.

503
00:37:29,720 –> 00:37:36,520
You know, I don’t want to live in a world where everyone thinks that it’s okay to exploit

504
00:37:36,520 –> 00:37:41,800
other people to the extent that they just don’t perceive that that’s what you’re doing.

505
00:37:41,800 –> 00:37:47,360
I mean, that’s basically our surveillance economy in a nutshell.

506
00:37:47,360 –> 00:37:53,880
Companies like Fecesbook, for example, thrive on secrecy because the vast majority of users

507
00:37:53,880 –> 00:37:58,280
have not perceived yet that they’re being taken advantage of.

508
00:37:58,280 –> 00:38:03,920
And as long as that’s okay, these companies are going to continue to exploit their users

509
00:38:03,920 –> 00:38:09,640
and extract every penny out of them that they can, no matter what the consequences are.

510
00:38:09,640 –> 00:38:11,960
And we just don’t believe in that at all.

511
00:38:11,960 –> 00:38:16,320
So we’re trying to be part of the solution, not part of the problem.

512
00:38:16,320 –> 00:38:22,120
Along these lines, another thing that sets us apart is we have integrity, something that’s

513
00:38:22,120 –> 00:38:25,480
severely lacking in the services business.

514
00:38:25,480 –> 00:38:31,000
We can admit when your needs are beyond the scope of what we have to offer.

515
00:38:31,000 –> 00:38:37,720
I worked at a company once that would accept any project that someone brought to them.

516
00:38:37,720 –> 00:38:43,120
I mean, they would agree to do things that they had absolutely no business doing, things

517
00:38:43,120 –> 00:38:48,640
that they have never done before, things that could actually really hurt people if something

518
00:38:48,640 –> 00:38:54,360
went wrong, and it really bothers us when we see companies doing stuff like that.

519
00:38:54,360 –> 00:38:59,760
So if we can’t help you with something, we’ll be the first to admit that. We’re not just

520
00:38:59,760 –> 00:39:03,800
going to pretend like we can help you with something just to rack up fees.

521
00:39:03,800 –> 00:39:06,360
That’s not how we work for a number of reasons.

522
00:39:06,360 –> 00:39:12,320
I mean, not only is that a moral issue, but if we’re sitting here fumbling around trying

523
00:39:12,320 –> 00:39:16,680
to help you with something that we have no business working on, that also means that

524
00:39:16,680 –> 00:39:21,640
we’re not helping another client who has something that we should be helping them with.

525
00:39:21,640 –> 00:39:28,040
And finally, we take your data and your privacy seriously.

526
00:39:28,040 –> 00:39:30,080
We do this in many ways.

527
00:39:30,080 –> 00:39:36,200
First of all, we collect a very, very minimal amount of data about our customers.

528
00:39:36,200 –> 00:39:41,200
So even if we were to get compromised, which is very unlikely, there would be very little

529
00:39:41,200 –> 00:39:44,200
information to get compromised.

530
00:39:44,200 –> 00:39:51,920
And second of all, the data that we store about our clients is stored locally only on

531
00:39:51,920 –> 00:40:01,680
devices that we physically control in multiple locations using open-source encryption standards.

532
00:40:01,680 –> 00:40:08,520
Now there are some caveats to that, which depend on a couple of things like how you contact

533
00:40:08,520 –> 00:40:09,520
us.

534
00:40:09,520 –> 00:40:15,400
So for example, if you fill out the new client request form at the bottom of our website,

535
00:40:15,400 –> 00:40:21,200
that information gets emailed to us and a copy of it is stored in our website.

536
00:40:21,200 –> 00:40:27,480
If you email us, that email might be sitting in, you know, Proton’s servers until we get

537
00:40:27,480 –> 00:40:29,160
around to deleting it.

538
00:40:29,160 –> 00:40:35,280
But even in those cases, just keep in mind that we clean that stuff up on a regular basis.

539
00:40:35,280 –> 00:40:41,920
We tend to not keep any data laying around for longer than we think is necessary.

540
00:40:41,920 –> 00:40:46,720
So if you were to contact us through our website, we would record your information and reach

541
00:40:46,720 –> 00:40:47,920
out to you.

542
00:40:47,920 –> 00:40:52,360
And then eventually we would delete that message request from our website and from our email

543
00:40:52,360 –> 00:40:54,200
inbox.

544
00:40:54,200 –> 00:40:59,160
And if any of that concerns you, just keep in mind, like we said earlier, you can contact

545
00:40:59,160 –> 00:41:00,880
us in other ways.

546
00:41:00,880 –> 00:41:05,200
We can talk to you through Briar or Session or Signal or something like that

547
00:41:05,200 –> 00:41:10,320
if that’s what you want to do. I mean, just compare that to what a lot of other companies

548
00:41:10,320 –> 00:41:11,320
do.

549
00:41:11,320 –> 00:41:15,720
I’ll go to professional services firms on a regular basis and I’ll see that they’re

550
00:41:15,720 –> 00:41:20,240
storing their client information in Google Drive, which is pretty terrifying.

551
00:41:20,240 –> 00:41:24,040
We would never do that. Although we do have a Google account,

552
00:41:24,040 –> 00:41:26,920
we don’t store any of our customers’ data in it.

553
00:41:26,920 –> 00:41:33,440
Oh, and I forgot to mention, if you do want to email us, we do put our PGP public key

554
00:41:33,440 –> 00:41:36,040
up on our website in the contact section.

555
00:41:36,040 –> 00:41:41,360
So if you really want or need to email us for some reason, you can also use PGP to encrypt

556
00:41:41,360 –> 00:41:43,000
that message.

557
00:41:43,000 –> 00:41:46,520
And we’re currently using Proton as our email provider.

558
00:41:46,520 –> 00:41:51,520
So if you have a Proton Mail account, which you can create for free, then you can email

559
00:41:51,520 –> 00:41:55,280
us from your Proton account and that’ll be end-to-end encrypted.

560
00:41:55,280 –> 00:41:59,520
All right, so to wrap this up, let’s go over some action items.

561
00:41:59,520 –> 00:42:03,160
The first is consider visiting our website.

562
00:42:03,160 –> 00:42:08,920
We don’t put ads up there so we don’t benefit directly by you visiting, but you might see

563
00:42:08,920 –> 00:42:15,680
some content you like, like our blog posts or our podcast episodes. Or our FAQ section

564
00:42:15,680 –> 00:42:20,800
if you have some questions that we didn’t answer in this episode. Make sure you consider

565
00:42:20,800 –> 00:42:23,240
subscribing to our podcasts.

566
00:42:23,240 –> 00:42:28,200
We probably won’t be pumping out episodes on a daily basis or anything like that.

567
00:42:28,200 –> 00:42:34,120
So when they do come out, you know, we think that they’re probably going to be pretty important.

568
00:42:34,120 –> 00:42:38,920
Anybody who knows me personally knows that I’m a pretty minimalist person and I don’t

569
00:42:38,920 –> 00:42:42,240
usually say things unless they need to be said.

570
00:42:42,240 –> 00:42:46,680
So go ahead and subscribe and give us the chance to prove to you that the information

571
00:42:46,680 –> 00:42:49,920
that we’re going to be sharing is going to be worth your while.

572
00:42:49,920 –> 00:42:53,360
And finally, don’t be shy about contacting us.

573
00:42:53,360 –> 00:42:58,560
Like I said earlier, you can contact us on Signal, Session, Matrix, Email, SMS, Mastodon,

574
00:42:58,560 –> 00:42:59,760
Twitter.

575
00:42:59,760 –> 00:43:04,400
We might add other means of communication in the future, although we’re probably never

576
00:43:04,400 –> 00:43:07,320
going to open a Meta or a TikTok account.

577
00:43:07,320 –> 00:43:10,760
So you can go ahead and cross that off your list.

578
00:43:10,760 –> 00:43:16,080
And if you have an issue, like with this podcast, for example, go ahead and reach out to us

579
00:43:16,080 –> 00:43:17,080
directly.

580
00:43:17,080 –> 00:43:21,360
And give us the chance to make things right, like if there’s a technical issue, like if

581
00:43:21,360 –> 00:43:27,000
you can only hear us out of your left ear or, you know, we mix up a date or something

582
00:43:27,000 –> 00:43:28,000
like that.

583
00:43:28,000 –> 00:43:29,240
Give us the chance to correct it.

584
00:43:29,240 –> 00:43:34,600
If it’s serious enough, we might, you know, re-edit the episode and republish it.

585
00:43:34,600 –> 00:43:40,000
You know, don’t just flame us with a one-star review because we said something stupid like

586
00:43:40,000 –> 00:43:46,440
oh the IRA contribution limit is $6,000 and it’s really $6,500 or something like that.

587
00:43:46,440 –> 00:43:49,560
You know, give us a chance to fix our errors.

588
00:43:49,560 –> 00:43:55,240
And that’s especially important because this is a privacy-focused podcast produced by a

589
00:43:55,240 –> 00:43:57,600
privacy-focused business.

590
00:43:57,600 –> 00:44:03,280
And because of that, you know, we’re concerned that the platforms that are hosting our content

591
00:44:03,280 –> 00:44:08,320
are going to downrank us severely because of the privacy protections that we put in

592
00:44:08,320 –> 00:44:09,320
place.

593
00:44:09,320 –> 00:44:13,760
And if we couple that with, you know, some one-star reviews because of something stupid

594
00:44:13,760 –> 00:44:20,800
that we can correct, then this important information might not ever see the light of day.

595
00:44:20,800 –> 00:44:27,880
Feel free to contact us for a consultation or to provide general feedback or requests

596
00:44:27,880 –> 00:44:29,640
or questions.

597
00:44:29,640 –> 00:44:34,080
If there are some specific things that you want us to talk about, like the Linus Tech

598
00:44:34,080 –> 00:44:40,360
Tips hack or Intel Management Engine or something like that, just let us know, you know, drop

599
00:44:40,360 –> 00:44:43,600
us a message on Signal and it’ll take two seconds.

600
00:44:43,600 –> 00:44:49,680
And finally, reach out to us if you think that you might see a potential scam regarding

601
00:44:49,680 –> 00:44:53,120
somebody posing as Bigger Insights.

602
00:44:53,120 –> 00:44:55,360
This is actually quite common.

603
00:44:55,360 –> 00:45:01,160
You might see something like someone claiming to be Linus Tech Tips or Elon Musk or something

604
00:45:01,160 –> 00:45:06,840
like, “Hey, yeah, this is totally Linus or Elon Musk.

605
00:45:06,840 –> 00:45:11,680
Go ahead and give us some Bitcoin and we’re going to double it and send it back to you”

606
00:45:11,680 –> 00:45:13,440
or something stupid like that.

607
00:45:13,440 –> 00:45:16,640
If you see anything like that, let us know.

608
00:45:16,640 –> 00:45:22,200
We’re not going to ask you for crypto, we’re not going to ask you for money unless you’re

609
00:45:22,200 –> 00:45:27,360
a client and you owe us money, then we’ll send you an invoice.

610
00:45:27,360 –> 00:45:32,600
But if anything looks fishy, just contact us through one of our official channels, which

611
00:45:32,600 –> 00:45:36,680
you can see on the contact section of our website and we’ll get back to you.

612
00:45:36,680 –> 00:45:38,920
All right, that’s everything.

613
00:45:38,920 –> 00:45:41,120
Thank you for staying all the way until the end.

614
00:45:41,120 –> 00:45:45,040
We hope that you enjoy our future content.

615
00:45:45,040 –> 00:45:49,200
Make sure you reach out to us if you want a consultation and have a great rest of your

616
00:45:49,200 –> 00:46:15,320
day.

Support Us

We’re an ethical company that puts our community first. You won’t find us injecting targeted ads or trackers into our website, peddling sketchy products/services, or selling our visitors’ data to 3rd-parties. As a result, our visibility and resources are rather limited.

Please consider supporting us to help keep our mission going. There are several ways to make a difference – from cryptocurrency contributions to simply sharing our content. Every bit of support is greatly appreciated and helps us make the world a more private, secure, and prosperous place.

More Great Content

  • All
  • Finance
  • Privacy & Security
  • Technology
Finance - Budgeting - Financial Planning - Accounting - Asset Allocation - Taxable and Tax-favored Accounts - Cash Finance

Asset Location: Taxable vs. Tax-favored Accounts (401k, IRA, HSA)

Asset Location (AKA Asset Placement) is a strategy for organizing your assets in an optimal way that helps you meet your financial goals. In the previous episode, we focused on asset location strategies for reducing taxes and simplifying your tax return. In this episode, we focus on asset location considerations ...
Continue →
Security - Software - Email - Computer Screen Privacy & Security

Email is Insecure – Here’s How to Improve Email Security

Email was never designed to be private or secure, so not surprisingly, it is neither private, nor secure. In the previous episode, we explained the reasons why as well as the risks inherent to email. However, email is so prevalent that it is unfortunately a necessary evil. In this episode, ...
Continue →
Planning - Concepting - Whiteboard - Tax Planning Tips - Asset Location - Asset Placement Finance

Asset Location: Reducing Taxes & Simplifying Your Tax Return

Asset Location (AKA Asset Placement) is a strategy for organizing your assets in such a way as to reduce tax burden, simplify your tax return, and manage risk. We discuss our Asset Location strategies, which includes specifics about tax treatment for growth stocks, dividend stocks, taxable bonds, real estate investment ...
Continue →
Drake - Bad Choice-Good Choice - Linux vs Windows macOS ChromeOS Technology

Linux Doesn’t Suck – Here’s Why Even Normies Should Use It

Linux has long been viewed as a science fair project for nerds. We explain why Linux doesn’t suck and why it's now usable even for normies. Some of the items discussed: Issues with Windows, ease of use, performance (efficient use of resources), hardware support, application support, OS licensing, concerns about ...
Continue →
Email - Mobile Phone - Privacy and Security - Technology - Hands Privacy & Security

Email is Insecure – Stop Using it for Sensitive Communications

Email is the primary means of sending messages and documents for many people. Unfortunately, email was never designed to be private or secure. Over time, we’ve developed several tools and techniques to help make it more secure. But at the end of the day, no matter how uncomfortable it makes ...
Continue →
Woman Shopping - Holding Shopping Bags - Retail - Spending Money Finance

What Does it Mean to be Able to Afford Something?

Most everyone will agree that you shouldn’t buy things that you can’t afford, yet so many do. Why is that? It seems to us that one of the reasons for this is because many don’t know what it means to be able to afford something. Spoiler alert – it doesn’t ...
Continue →
Scroll to Top