Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Andy (00:10):
This is The Secure Family Podcast.
Welcome friend.
I'm Andy Murphy, the host andthe founder of The Secure Dad.
This show is all about empowering parentsto protect themselves and their family.
I believe that security is thefoundation of happiness, and I want
your family to be safe and happy.
The information that I shareon this podcast is for general
(00:32):
information purposes only.
My goal is to empower you tomake safer decisions for yourself
and for your family because oursafety is our own responsibility.
Today, I get to chat with myfriend Josh Summers about the
backend of security cameras.
We're going to discuss what happens toour footage and who has access to it.
(00:54):
All of that and more coming upon The Secure Family Podcast.
The problem is getting worse.
The amount of personal informationthat data brokers are collecting
on you and me is growing.
There are more details, more individualpieces, and more access than ever before.
Rob Shavell, the CEO of DeleteMe,just told the Wall Street Journal
(01:17):
than in 2023, they'd find about300 pieces of someone's data.
Well, that's bad enough, but today in 2025he says they're finding more than 600.
It's doubled and it's only getting worse.
DeleteMe has 14 years in thisindustry, which is why they are
the leader and have my business.
I've been with them as a customersince 2018, and I can attest
(01:40):
that their service works.
Don't put this off anymore.
Take back your data today.
Right now you can get 20%off your DeleteMe Plan.
Just go to JoinDeleteMe.com/Dadand use promo code DAD at checkout.
That's JoinDeleteMe.com/Dad code Dad.
Today on the show, Iwelcome back Josh Summers.
(02:02):
He is the host of the All ThingsSecured YouTube channel, where he turns
complex technical issues about onlineprivacy and security into simple videos.
I have personally learned a lot from Josh.
Through the years, the channelhas grown to almost 400,000
subscribers with 40 million views.
And he covers everything from encryptedcommunication to how to mask your
(02:23):
personal data to simple steps that youcan do to secure your mobile devices.
But most importantly, he's a dad.
Here's my conversation with Josh Summers.
So Josh, thank you so muchfor coming back on the show.
(02:44):
I think this is your third time.
Remind everybody whoyou are and what you do
Josh (02:48):
Is it really my third?
I,
Andy (02:49):
it.
I think so.
Yeah.
Yep.
Josh (02:52):
Well, I feel honored.
Andy.
Uh, thank you so much for having me back.
Uh, yeah.
I am the host of the All ThingsSecured YouTube channel and website.
My whole goal is to just simplify complex.
Privacy and security issues that Iknow all of us are having to face in
some way or another as we just enterinto this constantly changing world
(03:12):
of, uh, of online and digital privacy.
Andy (03:16):
Yeah, it constantly
changing is, is absolutely right.
We've, uh, seen like technologyhas just taken off, especially
with AI and all of that.
But today I wanted to bring you inand talk about home security cameras
because I was wanting to cover thisaspect of kind of like behind the
scenes of home security cameras.
What happens.
Beyond the lens, and then youcame out with this amazing
(03:38):
video that explained pretty mucheverything that I was researching.
I'm like, well, let's just bringJosh on and have him explain
it and his use, his expertise.
So generally speaking, people can get twotypes of home security cameras, ones that
run off of wifi and ones that are wired.
Kind of break those down for us and,and tell us what we need to know.
Josh (04:00):
Yeah, well with between
those two categories, wired and
wireless, uh, you have differentstrengths and different weaknesses.
What I said in that video, and I'llprobably re reiterate a few times as
we're talking here, is there isn'tlike a single best camera system
because we all have really differentneeds and different threat models.
(04:20):
Uh, and so when I think of wiredversus wireless, a lot of it has to
do with one, convenience and two,what you're protecting against, right?
So when it comes to wired,there's a lot of inconvenience
when it comes to installation.
Running wires through your house, uh,unless you have it pre-wired, can be
really time consuming, maybe even costly.
(04:40):
Uh, and then you're also havingto worry about, you know,
what if those wires get cut.
So you need to make sure that thosewires are put in or installed in a way
that, that are not easy to tamper with.
Uh, however, on thewireless side of things.
Although it's so much easier toinstall from a consumer point
of view, uh, it's also somewhateasy to jam a wireless system.
Andy (05:02):
Right.
Josh (05:03):
then if you are, you know, if
everything relies on that connection to
the internet, if something happens toyour connection to the internet, that
can also hamper how you're able to accessthe footage from your camera where and
how it's stored, all of that stuff.
So again, there are pros andcons to each, I would say the.
Average person is probably gonnado best with a wireless system, and
(05:23):
thankfully that's the one that's mostavailable on the market right now.
Andy (05:26):
Right.
Yeah, you could, you like justwalking down my street, I can see,
okay, that's a Ring over there.
That's, you know, all this one andthat one and all sorts of stuff.
So yeah, it's, it's, they're, they'reeverywhere now, which I think is, is
good for homeowners 'cause a lot ofpeople wanted to go out and get those.
'cause it does give you a senseof security, uh, and documenting
(05:47):
what's happening on your property.
But a lot of us don't think aboutlike what happens on the other side.
Of that lens.
So kind of walk us throughwhat happens to this data?
What's the workflow?
Where, where does it go after the camera?
Josh (06:02):
Yeah, that's, that
is the key question.
I think when, when I'm worried about, thedata privacy and, and everything that's
happening, I think it, for me, it reallybreaks down into three different ways
that our data is both stored and accessed.
You have two options of storage.
One is local and one is cloud.
A lot of the cameras you're gonna seefrom Google, from Amazon, they are, they
(06:27):
basically force you to store everythingin the cloud, meaning on their servers.
So it's gonna be on AWS servers,it's gonna be on Google servers,
uh, could be anywhere in the world.
It will be.
to some degree.
Like it will be encrypted in some way, butthose files are not stored at your house.
They're uploaded through theinternet and stored in the cloud.
(06:47):
The other option you haveis local storage, right?
That could be some kind of basestation that comes with your camera
system, or if you have a nas, which isa network attached storage, I always
have a hard time saying that altogether
Andy (06:59):
it is a tongue twister.
Josh (07:00):
storage, uh, if you
have that set up, you can, um.
a number of different camera systemsto record directly to your nas.
And so now you own the filesand they're stored locally.
within that, there are differencesin how you access those files.
So there, like I said, goingback to those three ways.
(07:20):
Let's say that you've got local storage.
access.
Right?
That's one way that you,that you can have a setup.
That's where everything from my cameragoes into some kind of local storage,
and I can only access that locally.
I go in, I plug in a USB drive,or I get on my computer, whatever
it is, and I can, uh, access that.
The, the risk there, by the way,just so you know when you're
(07:41):
coming, when you're doing anythingwith local, is that one, if I'm a.
A, a burglar and I go in and I seethat you have a camera system and maybe
I know that kind of camera system.
I'm like, oh, all I've gotta do isgrab the base station where it holds
all of the local files and rip it out.
Um, you know, the, I would be,
I would consider where you placethat base station instead of just
(08:02):
putting it, you know, right outwith a sign that says, this is where
I store all of my camera footage.
Andy (08:07):
It's right.
Josh (08:08):
be careful about that.
Um, it's a little bit harder with a NASto be able to go in and, and take that,
but it, that's still the possibility.
So you have local storage, localaccess, then you have what I'm gonna
call local storage, virtual access.
Andy (08:22):
Mm-hmm.
Josh (08:22):
where you could actually
set it up with your nas,
where you could have a VPN that goes intothat nas, uh, which is a ver which is a
network, a virtual network where I couldbe anywhere in the world and I can access.
Those files.
Uh, same with, you know, the systemthat I've set up right now, it has local
storage, but I can access it through myphone virtually anywhere in the world.
(08:43):
So it's still stored locally,but I have virtual access.
And then finally we've got cloudstorage, cloud access, and that's where
everything's stored in the cloud, withAmazon, with Google or with whoever.
And now I can access it throughtheir system and get access to those
files and it's a lot harder for.
burglar or anybody elseto get those files erased.
So there, there is a littlebit of protection there.
Andy (09:05):
Yeah, and you, you
broke those down beautifully.
And, and, and you're right.
Being able to have, like, if it's local,if that's what you're looking for, that's
great, but you've gotta hide that server.
So, you know, I guess I'll takemy big sign down that says,
you know, that's where it goes.
It's a great, greatsecurity tip there, Josh.
Um, but yeah, then you havethe convenience of the cloud.
(09:25):
So.
For everybody who's listening.
Alright.
We're, we're kind of talkingabout stuff that most consumers
don't really think about.
Why do I need to care about this?
Why do I need to care about this flowof this data and, and how it's managed?
Josh (09:40):
You know, and it's interesting,
Andy, you and I didn't really have
much of a pre-call conversation here.
One of the things that I wrestledwith, even before I made my own
video about all of this is just this
That I. Do I really care?
Like, and, and I know that soundsridiculous, but it's like, okay,
Andy (09:59):
Uh
Josh (09:59):
a camera on my porch
that's facing the street.
Do I really care if somebodyelse gets access to that footage,
Andy (10:07):
mm-hmm.
Josh (10:08):
want to acknowledge that,
especially for somebody that's listening
to this or watching this and thinkingto themselves, why are we what?
just seems over the top.
Who cares if it's storedlocally or in the cloud?
We're talking about a camera that'spointed at my backyard, or a camera
that's pointed at my front yard.
I totally get that.
And again, when it comes to this type ofstuff, there are levels of, I don't wanna
(10:32):
call it paranoia, because that sounds bad.
There, there are just threatlevels where different people are
comfortable with different things.
Uh, and so just because you don'tmind having your front porch, uh,
you know, you could broadcast thaton YouTube and you don't care.
Other others of us actually.
Do care.
Uh, and I think it really, there's astep up whenever, if you're the type
(10:53):
of person that has any kind of camerathat's pointed inside your house, one,
I would be very careful about that in
Andy (11:00):
Yes.
Mm-hmm.
Josh (11:01):
if there is a camera that's
pointed inside your house, that's
when I would say I. Okay, where isyour data being stored and how, and
who can access that, that footage?
Um, because, you know, we've seen,and we've heard the news stories that
are, you know, sometimes a littlefantastic and wild about, you know,
they were in their nursery andthen some person just randomly
(11:23):
started talking to them through
Andy (11:24):
Mm-hmm.
Josh (11:26):
The reality is nothing.
Nothing terrible happened because of that,but the feeling of invasion of privacy,
Andy (11:33):
Sure.
Josh (11:34):
kind of like just being, you know,
being burglarized or having someone,
you know, get into your car evenif they didn't steal anything.
It's just this feeling of, ohmy goodness, like I. That was my
private, that that was private stuffand somebody just got into that.
So as you think about setting upthese cameras, making sure you know,
alright, how, how comfortable am I ifthis footage was seen by anybody else?
(11:59):
And then acting accordingly.
Do does that mean that Ineed to get local storage?
Does that mean that I need to changethe way that I place these cameras?
All of that should playinto your decisions.
Andy (12:11):
A agreed completely.
And you know, you talked about,you started your, your response
with, oh, if it's just my frontyard or if it's just my backyard.
You know, who really cares?
And I completely agree there.
But, you know, talking about bringingthe cameras inside the home, that's
when things really start to step up.
I pretty much tell folks like, Idon't trust cameras inside my house.
(12:32):
So like, that's just one thingI, I don't really wanna go for.
And I know that that's somethingthat, uh, is important to you as well.
Josh (12:40):
Well to, you know, on
the, to play devil's advocate
here for just a moment, because
Andy (12:45):
Hmm.
Josh (12:45):
you're right, I don't
have any cameras in my house
and I don't think I would.
I do have one in my studio here.
there's a lot of high value equipment,and I could see, okay, let's say you're,
you're the type of person that hasa music room that has a lot of high
value instruments or something, andyou want to be able to monitor that,
or you have your own studio or you havethis place that you wanna make sure.
(13:07):
Is, you know, your kid, no kid is gettinginto this place, or there's, there's,
you know, it's, it's remains safe.
Those are, those are times in which I cansay, I can see, okay, there's a reason why
you want to have a camera in this place.
Andy (13:21):
Right.
Yeah.
And, and really I don't want it tolike capture footage of like me and my
family in intimate moments, like eatingdinner or like earlier tonight when a
taco fell all over my shirt and I hadto change and all that sort of stuff.
You know, that's the kind of stuff I,I, I don't really want anybody seeing.
So going back to like the date E Exactly.
(13:42):
Those are the embarrassing moments thatI just want my wife and my son to know.
Um, yeah.
Yeah.
So, uh, going back to like the, thedata management of this, um, does
it matter, like if we have, um,cloud storage, does it matter where
those cloud servers are located?
Like what country they'rein, that sort of thing.
(14:04):
Is that something that weneed to be concerned about?
Josh (14:07):
Yeah, well now we're
getting into some, some stuff
that goes beyond just cameras.
Andy (14:12):
About Right..
Josh (14:12):
When I, when I talk about
anything that's made electronically,
and especially when we're dealingwith data, data storage, I. Um, I
am somewhat concerned about origin.
Where, where are the, where are theproducts that I'm using manufactured?
There, there are reasons, uh, tobe possibly concerned about that.
And then where is the data being stored?
(14:35):
Is this servers in Asia?
Is this servers in the US?
you talk to most companies and they'lltell you, oh, you know, if you're in
the US we'll store it on US servers.
It, it even makes sense.
It's a lot closer, but there'snot always that guarantee.
Um, you know, they'regonna put it on there.
Maybe they'll keep acopy on another server.
The reason why that's important though,is because when it comes to encryption.
(14:59):
Encryption is taking and turningdata that is personal data.
Maybe it's even just the waythat you access the internet.
It could be these files that you store andscrambling that, so it's not easy to see.
I. Right.
I like to think of encryptionlike a, a locked door.
What, whatever's behind this lockeddoor is that's my private room and I
want to keep things private that arein there, be it your video files or an
(15:21):
email that you sent that's encryption.
Now, when you lock that door, you havea key that's your key to the encryption.
And most of the time when we'redealing with what's known as
end-to-end encryption, I am theonly person that owns that key.
And that's a good thing because that meansthat nobody else can get in that room.
Nobody else can see thosefiles except for me.
(15:44):
The problem and the this is, youknow, a legitimate problem here is
that if I lose that key, nobody elsecan help me get access to that room.
Andy (15:52):
right.
Josh (15:53):
is on me to make sure that
I'm responsible with that key.
usually when we're dealing withcompanies like Amazon and Google, they
don't want customers to go throughthe heartache of losing access.
So they say.
Great.
We're gonna give you a key, and we'renot really gonna say this out loud,
but just so you know, we're gonnakeep a key for ourselves so that if
(16:14):
you lose your key, we can get in.
It's still encryption and we'regonna still call it encryption.
It's not end-to-end encryption,but we're gonna still call
it encryption because it is.
But now we also have access, and that'swhat a lot of people don't realize when
it comes to encryption, is that a lot oftimes these companies have backend access.
And that's where an imp, you know,a rogue employee or even a a, an
(16:36):
employee with a legitimate reason,can go in and access these files.
So anything that I store in Google Drive,anything that I would store on a Google
Nest, which is their camera system oran Amazon ring, I need to assume that
an employee from Google or Amazon.
Could access that.
Andy (16:57):
Yeah.
Josh (16:57):
I go any further, Andy, I,
I wanna mention one more thing.
There are cases, and Amazon is one ofthem, where if you wanted to, you can go
into the settings by default, they keepa key, but you can go into the settings
and request for end-to-end encryption.
So in other words, you can go intoAmazon's ring and say, listen, I don't
want you guys to have an extra key.
I'm gonna take on the responsibilityof owning the only key and
(17:19):
having end-to-end encryption,but I want that added security.
You have to go in and dothat, but it is possible.
Andy (17:26):
Right.
And that's, that's a, agreat point to bring up.
You know, we don't necessarily wantother people to have keys to our house
that we don't know, that we don't trust.
So we don't want them to have the keysto the cameras to our house as well.
And plus, um, there are some timeswhere government agencies will lean
on companies and say, Hey, we reallyneed to see what's going on here.
Maybe that's legitimate.
(17:47):
Maybe it's not, but that's somethingthat we also need to consider as well.
Um, so Josh, you know, in all of yourresearch and all of that, you've done
give me the All Things Secured checklist.
If I am buying a new camera system,what is it that I need to look for?
What is it that I need to purchase?
Josh (18:07):
So the framework that I came
up for for myself is I wanted to
look at five different things.
I wanted to look at the storage, where,and these, these are all things we've
kind of already gone through right here.
I wanna look at the storage.
I wanna know is it storedlocally or in the cloud.
And for me, I wouldprefer to store locally.
I just wanna be able to own those files.
Uh, connectivity.
We talked about this.
Do you want wired or do you want wireless?
(18:29):
Uh, do you where, what is the origin?
That's, again, where was this camera made?
Where is the data being stored?
If it is being stored orif we're accessing it?
That's another thing that we didn'treally talk about, like if we're doing
the local storage, virtual access.
How are you accessing that?
If you
Andy (18:45):
Mm-hmm.
Josh (18:46):
VPN, you can kind of
dictate where that goes.
But if you're going through a company,you know, I use a camera from a
Singapore company and I had to askthem, I emailed them and literally
asked, how is this data flow?
Where is it going through?
And they told me it was goingthrough Singaporean servers.
And for me, I was, I was okaywith that, um, as opposed to
servers in other Asian countries.
(19:07):
Uh, the fourth thing I wantedto look at was pricing models.
You're gonna see this a lot where youcan get into a monthly contract with
these cameras that, uh, just, it setsyou up to make, to spend a lot more
than if you were to just do this onetime thing and, and one time purchase.
I don't want to, uh, likeI don't know about you.
I've already got a numberof, I. Things, subscriptions
Andy (19:30):
Yeah.
Josh (19:30):
monthly budget.
And I
Andy (19:31):
Mm-hmm.
Josh (19:32):
another one just to have,
uh, you know, a camera, when there
are so many great options thatdon't require a subscription.
So, you know, I would personallylook for one that doesn't
have a subscription pricing.
And the final one is encryption.
Uh, how is this data encrypted?
And Andy, again, this is one ofthose things, if you go onto a
(19:53):
camera manufacturer's website.
Every single one of them is gonna say, wehave the highest standard of encryption.
We will protect your data.
The only way you're really gonna know, andeven this, you're gonna be taking their
word for it, is emailing in and saying,can you explain what kind of encryption,
uh, and is it end to end encryption?
(20:14):
And they'll.
Probably send you a, you know, a detailed,uh, list that may not make sense.
You can just pop it intochat GPT and ask it.
You know, Hey, is, explain this tome as if I'm a 5-year-old and, and
Andy (20:26):
Right.
Josh (20:27):
to do it.
Um, but those are the, those are thefive things that I'm looking for.
Storage, connectivity, origin,pricing and encryption and all that.
If you were to take the first letters,spells, scopes of, I'm scoping out
what kind of camera that I want.
Andy (20:41):
That's great.
Yeah.
And, and I like the acronym a lot'cause that really does encompass
everything that, uh, we need to go.
Um, so in thinking aboutthese, these camera systems and
everything that we have today.
You talked about, Hey, you know, maybewe shouldn't care about this, and this
is a just a general privacy thing.
For somebody who says, Andy,I don't have anything to hide.
(21:03):
I don't care if somebodycan see my security footage.
What do you say to that?
Josh (21:10):
Yeah, and that's extremely common
and, and I want anybody who's listening
or watching this who does kind of feelthat a little bit, to not feel like I'm.
you in any way, because I'm
Andy (21:21):
Mm. Right.
Josh (21:23):
even feel that, uh,
that is a natural feeling.
Um, and, and I would, it, it's really ashift in your perspective here, because
it's not about hiding something, which isgenerally the way we feel about privacy.
You know, somebody's worriedabout privacy because they're,
they're trying to hide somethingor trying to do something illegal.
(21:44):
wouldn't, I wouldn't.
Think of it like that, privacy and thepursuit of good privacy is more about
control and understanding that I want,it's my data, so I want to know, I wanna
be able to control who gets it, how theyget it, and what they can do with it.
And that is more when I, when Ichange it to that perspective,
(22:05):
um, there's a lot of things in ourlives that we're not just gonna give
over to anybody that asks for it.
And yet.
For some reason, we do that with our data.
Uh, we do that with ourpersonal information.
We do that with our address, ourphone number, our credit card.
And what happens?
Well, we get inundated with spam.
We get phishing calls and emails,like all of this stuff that
(22:26):
potentially could be avoided.
But the problem, the biggest thing that Iwant to point out here, Andy, is that, uh.
The thing about privacy is that onceyou lose it, it's kind of like when
we talk about, you know, words spoken
Andy (22:39):
Mm-hmm.
Josh (22:40):
you've said that thing to
your wife or you've said that thing
that you wish you could take back,you, you can't like reverse time
and like put it back in your mouth.
The same thing applies to privacy.
Once you've lost your privacy.
You cannot gain it back.
So I want to be as stingy as I canabout what I have to give out because
(23:01):
I don't wanna find out later down theroad, oh, I shouldn't have done that.
The number of people that wentonto MySpace and Facebook when it
first was out and just went crazysharing everything they wanted to
Andy (23:12):
Yeah.
Josh (23:12):
are like, they probably
wish they hadn't have done that.
I would rather be a little bitmore cautious so that when.
Quantum computers, you know, come downthe road or when AI becomes even more
of a, an issue that I'm not lookingback going, oh man, I wish I hadn't have
just handed over all of my data becausenow look what, what's, what's happened?
Andy (23:35):
Yeah, I have this, uh, dystopian
theory that probably in the next
20 years, somebody will be able tojust, you know, go to Chet GPT and
type in who is Josh Summers, or whois Andy Murphy, and it's gonna pull
up all of our social media stuff.
It's gonna pull up all of our, you know,our pictures or posts and everything.
And it's gonna be, it's,it's gonna be creepy.
(23:58):
It's gonna be real creepy, but that'skind of my, my thoughts for the future.
Um, so Josh, like I, I'm gonna runthrough a scenario here with you and
I want, I want your thoughts on this.
Think about the averagetwo story suburban home.
I'm going to give youthree security cameras.
Where do you put them?
Josh (24:19):
Hmm.
Well, I mean, for me personally, I'm justgonna be worried mostly about the outside.
Andy (24:25):
Mm-hmm.
Mm-hmm.
Josh (24:25):
and I'm gonna put them in the places
that are most vulnerable for the house.
So I'm gonna be looking at the front,at the back, and then if the garage
is off to the side or in some way,uh, not covered by the front camera,
then I'd make sure that there'ssomething in front of there as well.
Unless, you know, in my case I had a,a studio that had high value equipment,
(24:49):
I would make sure that there's acamera nearby, something like that.
Um, but.
you, you can, everybody's gonnahave a different reason for
putting it in a different location.
Um, the way that I've set that up,as you hear me talking about it
right now, I'm not putting one onthe doorbell, which I know for some
(25:10):
people is something they really.
Vik and value being able to see who's atthe door speaking to a delivery person.
I don't live in the US so this islike a, a scenario that I don't, it
doesn't even cross my mind delivery.
People don't do this out here in Asia.
Um, but I can see a reasonwhy that would be of value.
I'd just be really carefulabout where it's pointing.
Andy (25:32):
Right.
Yeah.
And that gets into a whole notherconversation of does it show too
much of your neighbor's houseand all that sort of stuff.
But yeah, so yeah, no, those aregreat, great, great options there.
Uh, I like that a lot.
And one of the things that, uh, Ithought of while we were talking was,
you know, if you decide that you wantto do a wired security system in your
home and you have the cameras with it,wonderful, you can still go by a Ring
(25:54):
Doorbell and just put it on there.
But that's the only wireless optionyou have, just so you can kind of
track the Amazon delivery guy coming.
There's, there's no rule that saysyou only have to have one system.
If you have the budget for itand that's what you want, you
can, you can blend the two.
Josh (26:10):
Yep, exactly.
Andy (26:12):
Awesome.
So Josh, again, thank you so much forhanging out with me today, educating
us on the back end of security cameras.
I know people are gonna wanna knowmore about you and All Things Secured,
so where can they find you online?
Josh (26:23):
Well, they can always
go to AllThingsSecured.com or
they can find me on YouTube,which is at All Things Secured.
Um, and then if someone wants to messageme, I am on Twitter slash X. It's just
at all underscore secured, I believe.
And so I'm much quicker to answerthat than I am email for sure.
Andy (26:42):
Very cool ma'am.
Well, I appreciate you.
Thank you for helping us to tryto remain more secure and private.
God bless you buddy.
Josh (26:50):
Same to you, Andy.
Thanks so much.
Andy (26:56):
Well, that's all that we have for
The Secure Family Podcast for today.
Thank you, friend for listening.
A special thanks to Joshfor being on the show.
Check out his great workat AllThingsSecured.com.
Take back your privacy and personaldata with help from DeleteMe.
Get 20% off a privacy plan whenusing the code Dad at checkout.
(27:16):
DeleteMe is the official dataremoval service of The Secure Dad.
If you are a DIY person and youwanna secure your home, then I have
the ultimate checklist for you.
My Family Home Security Assessmentwill walk you through how to
protect your home without makingit look or feel like a prison.
Download your copy right nowof the link in the description.
(27:39):
I'm Andy Murphy reminding youthat our safety and our privacy
is our own responsibility.