#TBOT 12: Google Demands IDs for Devs & Bans Sideloading, FCC Shuts Down 1,000 VoIP Providers, US Attorney Generals Warn AI Companies, Natural Health AI - Enoch AI

#TBOT 12: Google Demands IDs for Devs & Bans Sideloading, FCC Shuts Down 1,000 VoIP Providers, US Attorney Generals Warn AI Companies, Natural Health AI - Enoch AI

Author: The most important weekly tech news + solutions. September 1, 2025 Duration: 27:31

Here are the stories for the week:

No Anonymous Apps: It’s the biggest Android news this year. Google decides to wall off Android from anonymous developers and have complete control over apps on Android. This is the fracturing of the tech movement, and it starts in 2027.

FCC Shuts Down 1,000 VoIP Providers: Use a VoIP service? A thousand US VoIP companies will be forced by the FCC to stop service August 28th for not following RoboCall guidelines. Learn how this works and check if yours is on the list.

US Attorney Generals Warn AI Companies: On the heels of Meta’s Internal AI leak, 44 US attorneys general wrote a strongly worded letter to major AI companies.

Solutions: Uncensored AI - Enoch AI: A new AI project by Brighteon has trained its AI on sources of natural health information, and you can start using it today.

Share this post with your crew. 🚢

🪄 We aim for our show to be well-researched, well-informed and focused on the most impactful stories while being concise

PLUS - Each story comes with recommendations and there’s one cool tech trick or open-source solution every week.

We’ll be publishing full posts and clips of each of these stories soon.

Today’s AI-driven operating systems send your personal media to big tech companies for analysis, leading to your photos being searchable. And the photo and video editing apps available in big tech app stores silently harvest your data, send your media off to third parties, and sell them to the highest bidder.

Most people don’t even know all this is happening when they snap a photo or edit a video.

Join us for a FREE Webinar: Media Mastery: Open-Source Photo & Video Editing📅 Monday, September 29, at 12 pm CDT

LEARN HOW TO:✅ Take high-definition photos and videos with Above Phone✅ Use special photo modes like panorama and HDR✅ Organize and protect sensitive photos in a vault✅ Perform basic photo and video editing on Above Phone

BONUS: Exclusive Above Phone discount for attendees!

We’ll also review how Android and iOS users can adjust their settings to increase the privacy and security of the media on their devices.

Any unlocked phone that supports eSIM can use the Above DataSIM!

Above DataSIM is data-only, so network traffic can be encrypted using a VPN. This prevents cell service providers and internet providers from seeing and exploiting your activity. Zero personal information is shared with the carrier, ensuring identities remain private!

Avoid big telecom, travel overseas, and keep on hand for an emergency backup! Set up takes only a few minutes.



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit tbot.substack.com/subscribe

Hakeem Anwar hosts The #TBOT Show, a weekly podcast dedicated to cutting through the noise of the tech world. Instead of just reporting headlines, this show focuses on the technology news that actually shapes your daily routine, privacy, and digital freedom, explaining why it matters in clear terms. Each episode is designed to be concise and actionable, wrapping up in under twenty minutes. You’ll hear informed analysis and straightforward recommendations on how to navigate the week’s developments. True to its mission, every installment also provides a practical takeaway: this might be a powerful open-source tool you can use, a privacy-enhancing skill to learn, or a sustainable tech solution to implement. It’s a blend of necessary context and usable insight, making it a resource for anyone who wants to understand and take back control of their tech life. Tune in for a focused, efficient update that prioritizes depth over duration, ensuring you stay informed without being overwhelmed. This podcast delivers exactly what its author promises: the most important weekly tech news paired with tangible solutions.
Author: Language: English Episodes: 80

The #TBOT Show with Hakeem Anwar
Podcast Episodes
The TBOT Show | Episode #1 [not-audio_url] [/not-audio_url]

Duration: 22:52
Hey peeps, Its Hakeem! We’ve just released the first episode of the new #TBOT show which will be published every Friday from now on. 🔥 My focus with this show is to give you the most important tech stories every week in…
What Data is Your Phone Gathering? [not-audio_url] [/not-audio_url]

Duration: 2:22
In this clip from my new interview with the Macroaggressions Podcast, I talk about the huge multi billion dollar industry built on Google's AdWords and key information about individual users that are compiled into secret…
Brute Force Hacking Protection on Above Phone [not-audio_url] [/not-audio_url]

Duration: 3:49
In this clip from Above’s Hidden Signs Your Phone is Compromised webinar, I detail how Above Phone will lock out intruders who attempt to use brute force attacks on a pincode to guess the security password on your phone.…
Tools Law Enforcement Uses To Access iPhone, Android [not-audio_url] [/not-audio_url]

Duration: 9:43
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I discuss the importance of keeping your phone locked at all times and how Cellebrite tools can be used by law enforcement to capture and compro…
How GrapheneOS Protects You from Hackers and Malware [not-audio_url] [/not-audio_url]

Duration: 6:49
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I’m getting into the details about how GrapheneOS has hardened memory allocation to protect against various memory based exploits that attempt t…
The Most Common Exploits Found In Apple, iPhone [not-audio_url] [/not-audio_url]

Duration: 5:16
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I dive into how to identify previously used Pegasus malware URL links that were logged by Amnesty International and some of the most common expl…
How Hackers Exploit Big Tech Phones [not-audio_url] [/not-audio_url]

Duration: 3:57
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.Thos…