#TBOT 16: Digital ID in North America

#TBOT 16: Digital ID in North America

Author: The most important weekly tech news + solutions. October 17, 2025 Duration: 30:08

We’re kicking off a 6-part series on Digital ID around the world — starting with North America.

From facial recognition at borders to national ID frameworks quietly forming behind the scenes, this episode dives into how the U.S., Canada, and Mexico are rolling out their own versions of Digital ID — and what it means for your freedom to move, work, and live privately.

This is part of the ongoing Digital ID Report, exposing how over 90% of countries are implementing these systems in lockstep.

Sign up for the full Digital ID Report

Break the limits of big tech with Above Phone. You’ll unlock features and freedom you didn’t even know existed.

* Works with any cell service (and even over WiFi with an internet phone)

* Download the apps you love (private app stores)

* Have complete control over your app permissions



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit tbot.substack.com/subscribe

Hakeem Anwar hosts The #TBOT Show, a weekly podcast dedicated to cutting through the noise of the tech world. Instead of just reporting headlines, this show focuses on the technology news that actually shapes your daily routine, privacy, and digital freedom, explaining why it matters in clear terms. Each episode is designed to be concise and actionable, wrapping up in under twenty minutes. You’ll hear informed analysis and straightforward recommendations on how to navigate the week’s developments. True to its mission, every installment also provides a practical takeaway: this might be a powerful open-source tool you can use, a privacy-enhancing skill to learn, or a sustainable tech solution to implement. It’s a blend of necessary context and usable insight, making it a resource for anyone who wants to understand and take back control of their tech life. Tune in for a focused, efficient update that prioritizes depth over duration, ensuring you stay informed without being overwhelmed. This podcast delivers exactly what its author promises: the most important weekly tech news paired with tangible solutions.
Author: Language: English Episodes: 80

The #TBOT Show with Hakeem Anwar
Podcast Episodes
The TBOT Show | Episode #1 [not-audio_url] [/not-audio_url]

Duration: 22:52
Hey peeps, Its Hakeem! We’ve just released the first episode of the new #TBOT show which will be published every Friday from now on. 🔥 My focus with this show is to give you the most important tech stories every week in…
What Data is Your Phone Gathering? [not-audio_url] [/not-audio_url]

Duration: 2:22
In this clip from my new interview with the Macroaggressions Podcast, I talk about the huge multi billion dollar industry built on Google's AdWords and key information about individual users that are compiled into secret…
Brute Force Hacking Protection on Above Phone [not-audio_url] [/not-audio_url]

Duration: 3:49
In this clip from Above’s Hidden Signs Your Phone is Compromised webinar, I detail how Above Phone will lock out intruders who attempt to use brute force attacks on a pincode to guess the security password on your phone.…
Tools Law Enforcement Uses To Access iPhone, Android [not-audio_url] [/not-audio_url]

Duration: 9:43
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I discuss the importance of keeping your phone locked at all times and how Cellebrite tools can be used by law enforcement to capture and compro…
How GrapheneOS Protects You from Hackers and Malware [not-audio_url] [/not-audio_url]

Duration: 6:49
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I’m getting into the details about how GrapheneOS has hardened memory allocation to protect against various memory based exploits that attempt t…
The Most Common Exploits Found In Apple, iPhone [not-audio_url] [/not-audio_url]

Duration: 5:16
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I dive into how to identify previously used Pegasus malware URL links that were logged by Amnesty International and some of the most common expl…
How Hackers Exploit Big Tech Phones [not-audio_url] [/not-audio_url]

Duration: 3:57
In this clip from Above’s ‘Hidden Signs Your Phone is Compromised’ webinar, I explore how mobile network injection attacks use fake cell towers to redirect you from regular sites to a site that can infect your phone.Thos…