*ATTENTION: This video is outdated, watch our improved & updated version here:* ruclips.net/video/a1i-3xwcSGA/видео.html - Also check out Go Incognito, a free and in-depth course taking you from start to finish: ruclips.net/p/PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO To view privacy/security products and other fantastic resources, checkout our storefront! www.amazon.com/shop/influencer20170928875 Hey everybody, thank you so much for watching! Please read the information below: 1) I apologize for the low audio quality. I lost my audio recorded on the Yeti while transferring files, so I had to use the on-board mic. 2) I apologize for the video quality...I just moved to my dorms and figuring out a setup has been tricky. Newer videos look A MILLION TIMES BETTER :) 3) CCleaner is getting more and more sketchy...Bleachbit is a great alternative and is what I'd recommend using. 4) A mistake made in the video was telling you to hide your SSID. This won't really help you much... 5) I am fully aware I own a RUclips account...and yes RUclips is owned by Google. This video is targeting users who don't think about this stuff, it's all about spreading awareness to people who are unaware. Do as I say, not as I do! Just because I don't do something, doesn't mean you can't use the information and advice. 6) Because of time restraints, I cut off the part which expanded on Coinbase cryptos. This is NOT an anonymous method of purchasing cryptos, but just send it through a BTC mixer or convert it to Monero for much more private transactions. Shouldn't have cut that part out 😒 7) Don't type your password into any site. Not a good idea, my mistake in the video. 8) Google 2FA doesn’t contact Google, but feel free to use something like andOTP or Aegis instead!
I might do that as an option for security-minded individuals. Thanks for the recommendation man! If I decided to do it, I'll put it in my next channel update.
I realize I am not an expert in internet security... but... Why in the ever loving bloody hell on earth would you recommend ANYONE to use a password manager? Aren't they notorious for getting hacked easily and thus releasing everyone's "Safe" passwords? I mean sure it's easier to use one than keeping yours on paper... But there is this neat trick called using your brain to remember things. If you don't have a good enough memory to do this, then it's time to work on that. Because that is the most secure password manager out there provided you aren't a moron who shares their password.
No erasing your tracks? If I follow your foot traces I will be able to find you, whoever you are. Also never go out of your cave, big brother satellite will see you.
I definitely missed out on a lot of physical hardware things to keep in mind--the webcam being one of them. Looking back, this video had a lot of mistakes, in the long run it will turn into a rough draft for something much bigger 😛
Dude, you're so full of shit you need to like, go back to preschool. Everyone knows incognito is the insurmountable, 100% most private protection method on earth. Take this anecdote for example. You're a master hacker using all of the tools mentioned in the video and some more that very few people know about. You're about midway through your hack, when all of a sudden, you get a text from the FBI for whatever reason. They've on their way. What the hell are you going to do now? They're inching closer and closer. You realize the one method no one ever bring up anymore - Incognito mode! You open an Incognito browser, and *poof*! You've disappeared off the map. The FBI agent can't find you anymore. Boom. That's what you call a verbose explanation of a meme. There's a reason why people say a picture is worth a thousand words.
I mean if you read the thing on the incognito page, you can still be found by your ISP, Company etc. It just hides it from the pc leaving no data behind.
I've gone completely off the grid, I live in a bunker in Taiwan but Taiwan thinks I live in a bunker inside the US but in reality live in a bunker in Somalia but Somalia thinks I live in a bunker in South Korea, who in return think I live in Taiwan. I miss my family.
You sir are a very intelligent and bright young man and a valuable member of human society! Modern people need an intelligent guy like you so that we can remain educated and protected. Never give up man love the videos!!!
Christian Truther that doesn’t disable them completely man. Just disconnect them from the board which is super easy and they will be physically disconnected.
Google authenticator is one of the exceptions, it’s fully local and never connects to the internet and doesn’t collect data. I trust it, but it’s your call to make.
use authy , with passwords encryption end to end , its useful incase you lose your device ... unlike what most people think passwords on authy are not visible to guys at authy
Zone 5: Find a cheap domestic cruise. Pack light in a rugged backpack. Fill your bag with weights from the on-board fitness center. In the middle of the night strip naked, equip your weighted bag and jump into the ocean. Make sure Bluetooth is disabled.
Well researched, clear presentation with links and no stupid attempts at humour= Great Video!!! The only thing I think was missed is to cover your cameras on computer and phone. Thank You!
Agreed, very important to cover webcams and cameras, it’s much easier than people think to have your camera remotely watched from another location. Great tip.
casual, i've been encrypting my comment for 1 year only to tell you that browsing for porn at zone 4 is bad, you should be in zone 11 Makeup every 2 hours, wear an big hoodie and switch it ( It must be from another color.) every 1 hour and 45 minutes, walk in an different way every time you enter an place, every person you talk to you must kill and every object you use shall burn and explode into an place where many people in poverty live so they will have enough junky DNA to cover you. You must use 21 Vpn's at once, switch computers every 10 minutes or so and burn the last one you used, every storage shall be put into your mind as no one can hack it, and every porn video, for security reasons.. You must click on every Ad talking about sexy girls at 2 km near you and ads talking about an stepsister fuck simulator game and download every single thing they send you. Thats zone 11
I'm sorry but none of you are important enough for the NSA to give a fuck about. Conspiracy theorists always think they're way more important than they actually are. The NSA couldn't give a single fuck about any of you. However, people like me, will gladly steal your information and do with it what I see fit. You're delusional if you think the NSA knows you exist, and yet you're not worried about black hats like me, idiots.
Henry, Wow, late to comment but as always, your deliver both entertainment value AND quality info. I can appreciate the time you put into this, YOU REALLY DO YOUR HOMEWORK and care about the accuracy of the info. you're putting out, it shows. I've watched tons of web security and related vids, always point friends to your channel, saves me time as I agree with you totally on your tips. Hey, did you mention at all taping your webcam and uninstalling it's drivers?? But yah, this one's a gem...
Deleting accounts is a bad idea. Let them die never being logged into. The problem with deleting the account is that someone else can then open the same account and start getting emails that were intended for you.
You can't unless you delete your account is my understanding. EX: You delete your account "User@yahoo/aol/hotmail.com" or any other account that feels better off dead I can now create a "new" account with that username but I will still receive all the mail you used to get. Possibly someone could forget to disassociate an account with the email and I would then own that too. I was always taught to leave them inactive to die rather than actually deleting them. Things change though and I'm open to additional information.
"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say" -Edward Snowden
Thanks Techlore I watched a whole heap of your videos months ago. It has been a lot of work but all your advice has been has almost been implemented and now I sleep much better at night now 👍👍
As part of Zone 2, I'd recommend installing uMatrix (or similar) instead of just disabling all Javascript in the browser, period. Turning it all off is a little drastic.
Techlore - Just wondering, isn't having sensitive information like passwords and other things stored on a cloud server a security risk? If those servers were compromised then everyone's passwords would be known.
This may sound stupid. Imagine handwriting ur passwords and stickem in a random book on shelf. If u have to worry of a physical intrusion of ur passwords then u have more to worry about then privacy..
This is the most detailed and well-structured privacy guide I have seen today, big thumbs up! Do you have a Patreon or PayPal where I can donate a few bucks as a thanks for the valuable information I got from your video?
Thanks for the donation man! It means so much to me :) It was used on a new editing build so I can push out more videos at better quality 👌 Hope to see you in future videos, especially for my update to this video!
Zone Moderate: how can I hide my personal informations away from internet, website and app providers? Is there any way I can do that? I want to use and pay for the internet but I don’t want the internet provider to collect, sell, rent, lease, share my personal informations (name, exact location, phone number, age, gender, preferences, interests, comments, websites and apps I use, front camera and back camera always-on recording of my face and my surrounding). * Current encryption companies protect my personal informations from hackers but not from internet, website and app providers.
Not true you are tracked and recorded with every online connected device, the gov. shut down many intel gathering programs because now the people give it up for free.
Iridium Browser and the search engine Swisscows really deserve way more exposure on these channels. They actually go the extra mile to protect your privacy online. Same goes for Bromite Browser for mobile.
Some things people might not know for zone 2, - messaging apps, you can use crypviser now, its blockchain based - for browser, you can use Brave, no need to install addons like adblocker, all that comes by default
Just got Nord VPN I love IT! I researched it last week and it's at 5 stars from just about all the major tech reviews mags,sites etc. I only got the 1 yr just to see if it hold up and if it keeps this pace I will get the 3 yr plan, it's a great service Nord! GREAT info thsnks,subbed.
Techlore check out thatoneprivacysite.net for extremely detailed comparisons of all VPNs out there. Was going to use Nord but decided on Mullvad because of this site
In my personal opinion you can’t be fully anonymous, having a passport or a state ID already fucks you up lol , amazing video tho, very clear, and interesting, keep up the work.
I listened to the video and you missed one important fix. Do not use Wireless. Even if you turn it off with your software, you are still vulnerable. Take your wireless card out and disable everything associated with it. Us a hard wire connection such as Ethernet. If you don't have an Ethernet socket, you can use a USB to Ethernet adapter. Do the same to Bluetooth.
After this, I am getting rid of my computer, all devices, my phone, leaving my home, will use a walkie talkie and smoke signals. Never to be seen or heard from again.
"Never Post a pic with your nose and eyes in it at once"....... Makes a whole youtube video. HAHAHA That's how impossible it is to be zone 4 Secure. Great information though.
Very well laid out and THOUGHT out! I am sharing this with others and also saved this into my collection of frequently watched videos. Subscribed and starting the adventure to tighten up my security. Thanks!!!
Yay it makes so happy when people start increasing their security :) I wish you the best of luck with your adventure and hope your friends enjoy the video too 🤓
Well you're doing an outstanding job at it! I would like to throw it out there to do a more in-depth video on stock iPhones and Androids and also custom ROM'd Androids (like you run) pros and cons. I am trying to get myself prepared for what I am going to give up to run something like what you have. I run an iPhone 6S as of right now (NordVPN, locations off, alphanumeric password), but am looking into a custom ROM with the Pixel 2 now after watching your video. Just throwing it out there as an idea. I have been searching all day and can't find anyone that has any videos on these subjects where it's laid out as well as you did. You're a heck of a teacher my friend! You are teaching this old dog some new tricks for sure! I had gotten kind of slack on my security awareness after I switched to Linux. My browsers are pretty solid but I am quickly seeing that I am not as "well rounded" as I thought I was. Again- thanks for taking all the time and effort to put this together. I will continue to send this to others so they too may benefit from your teachings.
I will definitely add those to my list of videos to make in the future :) Privacy ROMS are an excellent topic which fit extremely well with the channel so I would be happy to do them. I would definitely try out the custom ROM on a Pixel if you are okay switching to a whole new OS on a new device. I moved away from Apple a few years ago and couldn't be happier with the switch! (I can't stand iOS) But honestly if you were able to switch to Linux from Windows, you are clearly tech savvy enough to switch to Android...and in my opinion, Linux is a MUCH bigger jump from Windows than Android is from iOS. I say give it a go!
Thank you and can't wait! I switched from Android back in 2012 to iOS. I enjoyed Android a lot because they were open source and most of the apps were free (back then at least). I am ready to go back though. Tired of Apple's BS games with there phones and batteries not lasting etc... Probably going to be another month or two before I can make the switch back. Got the news today that I have to go in for round two of back surgery so I am having to make plans and be smart with my finances while I am out from work. Looking forward to seeing more videos in the future! Stay safe!
Zone 5 - cover webcam, turn of microphone, change DNS, stop torrenting, use free alternatives to paid software, local (offline) backups, & use a standard user account.
Don't test your password online. Instead, use simple estimations. Longer passwords are good, but more potential characters increase the strength exponentially. If it's random, has numbers (and symbols) and is longer than you think necessary it should be strong enough.
There are a few good communities: - We have our communities on Discord and Telegram. They're a ton of fun! - r/privacy on Reddit, informational but unfriendly to noobs - EFF local communities - r/digitalminimalism on Reddit
Love your vids man. I'm a bit of a Ludditie when it comes to computers but I'm tryng to suss it all out. It's easier for me to dismantle a gearbox on a motorcycle than understand some of the techy types who seem to speak in english but I need to google half the words in every sentence. So thanks for some great info that even I can gat a handle on to help me get my head around this stuff.
*Information Security Content* FYI, you can still use a good phone and ghost. Using a archaic tech could do more harm than good. The Samsung Galaxy S5 is still a great device that is readily available to buy nearly anywhere as an unlocked device to flash to a carrier of your choice. You could also fairly easily modify a Nexus 5 to have the same capability that the S5 does, which is a removable battery. Regardless of what phone you're using, you can be tracked by the gps service on your phone, WiFi usage, background data usage over the network, and by your carrier quasi-abusing imsi privileges. Any time you place a call, your position could be triangulated by use of multiple towers providing service to your area. To get around these other methods of tracking, remove your battery from your device and keep it out until you're ready to use it. When you make a call, try your best to stay in one place to stay connected to as few towers as possible. If you use the phone on a consistent basis, mix up your schedule a bit. Be sure that your battery is disconnected from your device /and not just powered off/ when not in use. With an S5 or Nexus 5, you'll be well off rooting your device. However, this does not prevent your information from being compromised through remote access of your camera or microphone. One viable option that would set a user leaps and bounds ahead in regards to safeguarding their privacy would be to disconnect the attached camera*S* and microphone*S* on their device, of which there will be multiple. Use an external mic for speaking into. You won't have to worry about this as much if you're practicing good opsec and removing your battery, but it's a solid method. Security through obscurity is an important factor when it comes to protecting your real identity. It's always best to blend in. Because not enough people practice good security right now in this early era of security consciousness, practicing good opsec can actually do the inverse of what you'd expect and make you more obvious. Tor usage has actually gotten many people arrested for the simple facts that 1) not enough people use it in general, and 2) they never stopped to consider how few others may be using Tor on the intended website. The same reasoning applies to how you use technology in public. Am I more or less obvious in a crowd if I'm using T9 messaging on a flip phone while everyone else has touchscreen keyboards? Anyways, these are just more topics and more options to consider for the security conscious folks out there. OPSEC is a lifestyle. It's hardly stylish, but it can cost you your life if you practice bad OPSEC. Just ask the CIA.
Awesome! Glad you liked it 😊 If you’re on Windows, you can use the Windows key + semi colon for Emojis. Linux not so much...you can copy and paste from websites though
Alternatively, just don't do anything dodgy online and stop being paranoid. Also, two very useful tools that weren't mentioned but a lot of people swear by are Tails Linux and virtual machines. Tails is a complete privacy and security-oriented operating system that has Tor built-in and is a step above using just the Tor browser within your own OS. Virtual machines not only contain malware and hacking attempts but also give false information as to what your PC specs are in case anyone tries to track you down using data correlation and also to mitigate browser fingerprinting.
Bro you're amazing! Really love security and my family always gets frustrated because I'm constantly locking all the doors, windows and blinds...Time to be the same with tech as well! Also, my bud told me to never use google because they go through your internet history, emails, and pretty much everything. Another thing is that google hates TOR because google sees it as a threat...I accidentally made the mistake of using TOR through google but i couldn't even use it because it says that it detects unusual activity from my computer and can't be processed (or something of that sort lol). Great vid!
Yeah, Google does crawl through your stuff. An easy way to confirm that is to create a password-protected archive and try to send that through your Gmail - it will say out in the open that file cannot be added because "we couldn't scan the file contents due to cryptography", lol.
Great video, a lot to process and kinda got lost amongst it all, well done for putting the links and description for everything. I am going to watch your updated version now.
Nord VPN is good but I had a lot of problems with it. Stability issues, compatibility issues so I asked for refund after 2 weeks. Tunnelbear is also fine but not ideal. Constantly disconnects on my phone but it is still the best on the market I think. Keep in mind that they all say they don’t keep logs but are required by law to start doing so and not inform you if the government asks them to. More and more of the public WiFi networks are starting to block VPN traffic anyway because they are free only because you pay with your data and they can’t sell it if it’s encrypted. Even some governments are thinking of making VPNs illegal or strictly traffic-regulated. Never buy crypto on coinbase, they need a photo of your ID or passport to allow you to withdraw which is killing the point. Also bitcoin transactions are pseudo anonymous and the exact opposite of private. If you buy your BTC from coinbase it’s linked to your identity and everyone can track how much you spend, where and when. Only buy crypto OTC if you want anonymity and only use Monero if you want privacy. For tier 4 privacy PC operating system the best choice is Tails. It routes not only your browsing history but absolutely all the data through tor, that’s updates and everything. Also had built in MAC address spoofing. For hardware - laptops and phones check puri.sm Another more customisable than Tails operating system is CubesOS. A bit odd to get used to, every file, every program can be opened in its own virtual machine but you need good cpu with many cores and lots of ram, at least i5 or ryzen 5 and 16gb for a daily use and motherboard with 2 usb controllers or pcie usb card so that you can map ports to VMs and you might need a KVM or second mouse and keyboard as well. Shitty, I know, but that’s tier 4 stuff, learn to like it. Protonmail kicks ass. They even have onion mirror. Great video! Subscribed :) Cheers.
Also... tip for the smartphone section. Basically, if you don't have or buy a Google pixel/nexus phone and live in the U.S.... forget about installing a custom ROM. I mean, you can try and find an older phone thats vulnerable to a privilege escalation exploit (i.e literally what "rooting" is), but your chances are slim, specifically in the U.S. Been searching for Google phone alts that are rootable and haven't found one in over a decade. If you can't unlock the bootloader, you can't root. And if you can't root, you cant install a custom ROM. Figured I'd save a lot of people the trouble. Still salty towards our cell carriers for their bootloader locking shenanigans.
I'm a tech "dummy." But I pay attention to the strength of passwords. I checked my password, and it said it would take 34K years to crack it. There are people who know how to code with weaker passwords. Considering I'm a tech "dummy," there's a vast amount of information here, so I'll have to bookmark this video. I " liked" and will hit subscribe. Thank you.
Am all up for this, I hate it when you know your being watched by Google face book all that crap, just think they have right to do this. Reasons why I don't do social networking. I love sercurity, end of the day you are entitled to do perfectly legal thing without people watching over you. I use a vpn personally.
Zone 7: Change your name, throw all your eletonic gadget, migrate to Malaysia - live in the jungle with tbe native in the deep forrest that has no eletric.
my computer's security is pretty high, but my phone is almost non existent. Btw why is tor at zone 3 while disabling javascript (which can break websites) is in zone 2? I use firefox right now with some added privacy extensions, and special settings in the configuration and I'd have a much harder time disabling javascript than switching to torr
Great video but you should do some more research into what tor is and it's fallbacks. Also firefox is quickly slipping as a safe browser and should also be avoided
Simply Tech Reviews i use pale moon and brave. I'm worried about brave eventually going the way of firefox. The other two are good options as well though.
i ditched social media long time ago it was tough but now i feel much better without it. no more waste of time just real social life we are social being and social media is just a fake alternative try real one you will love it. Cheers everyone
Techlore yeah in 2 months that's pretty dadgum good congratulations thank you for your response you seem pretty cool I wish you would have been the one that hacked me I feel better knowing somebody who knows what they're doing had done it to my system would have stayed going the people hacking mind or just learning so they leave just enough information for me to know they're there and I have no clue what you can do when they've already got Authenticator an administrator I get redirected 2 screen overlays and fictitious websites I'm trying to learn I subscribe to your Channel cuz you seem to get directly to the point congratulations on such a grand following
Good video, I agree with most of what you said. One thing to note is hiding the ssid for you WiFi network might have connectivity issues especially with apple products. I recommend flashing a 3rd party firmware for more privacy. Well done!
Shiet I am a level 3 guy, except public comments, I'm almost done with getting rid of google, heck I don't even use yt properly, and I got a Android phone almost completely disconnected from google
Glad you like it! I’d recommend watching our much improved newer version though 😊 ruclips.net/video/a1i-3xwcSGA/видео.html It really is leagues better with much better/accurate info
Having a secure email, txt messenger, ect doesn't really work because the people you're communicating with are probably using something like gamil. This means google can still see your email even if you used a different email provider
You don't need a Google account to watch RUclips, plus this video is geared towards viewers who mostly are unaware of privacy invasion and what to do against it. The goal is to convert people to non-Google users who want to avoid internet tracking.
*ATTENTION: This video is outdated, watch our improved & updated version here:* ruclips.net/video/a1i-3xwcSGA/видео.html
- Also check out Go Incognito, a free and in-depth course taking you from start to finish: ruclips.net/p/PL3KeV6Ui_4CayDGHw64OFXEPHgXLkrtJO
To view privacy/security products and other fantastic resources, checkout our storefront! www.amazon.com/shop/influencer20170928875
Hey everybody, thank you so much for watching! Please read the information below:
1) I apologize for the low audio quality. I lost my audio recorded on the Yeti while transferring files, so I had to use the on-board mic.
2) I apologize for the video quality...I just moved to my dorms and figuring out a setup has been tricky. Newer videos look A MILLION TIMES BETTER :)
3) CCleaner is getting more and more sketchy...Bleachbit is a great alternative and is what I'd recommend using.
4) A mistake made in the video was telling you to hide your SSID. This won't really help you much...
5) I am fully aware I own a RUclips account...and yes RUclips is owned by Google. This video is targeting users who don't think about this stuff, it's all about spreading awareness to people who are unaware. Do as I say, not as I do! Just because I don't do something, doesn't mean you can't use the information and advice.
6) Because of time restraints, I cut off the part which expanded on Coinbase cryptos. This is NOT an anonymous method of purchasing cryptos, but just send it through a BTC mixer or convert it to Monero for much more private transactions. Shouldn't have cut that part out 😒
7) Don't type your password into any site. Not a good idea, my mistake in the video.
8) Google 2FA doesn’t contact Google, but feel free to use something like andOTP or Aegis instead!
Techlore, you should get XMPP because it would be pretty cool to communicate with your fans in a "secure way".
No worries man. The more Techlore the better!
I might do that as an option for security-minded individuals. Thanks for the recommendation man! If I decided to do it, I'll put it in my next channel update.
any hardware video?
I realize I am not an expert in internet security... but...
Why in the ever loving bloody hell on earth would you recommend ANYONE to use a password manager? Aren't they notorious for getting hacked easily and thus releasing everyone's "Safe" passwords?
I mean sure it's easier to use one than keeping yours on paper...
But there is this neat trick called using your brain to remember things. If you don't have a good enough memory to do this, then it's time to work on that.
Because that is the most secure password manager out there provided you aren't a moron who shares their password.
Zone 6, track down everyone you've ever spoke with or are acquainted with and neutralize them.
DarthVadent 😂😂😂
zone 7-use nukes to ensure you are the only living being in the universe
That's not true, the massive neutralization will only draw more attention to you. Just writing.
DarthVadent love this shit
This killed me 😂😂😂
Zone 5, go into the wilderness. Never interact with another human being again.
No, that's zone 50.
🤣
No erasing your tracks?
If I follow your foot traces I will be able to find you, whoever you are.
Also never go out of your cave, big brother satellite will see you.
lol I'm on board with that.
Anarcho primitivism ftw
NEVER input your passwords on those "how secure is my password" sites. Especially your password manager master password!
‘Twas a mistake! You are absolutely correct ✌️
Seriously!
Oh fu#$%K.....
I need a keeper.
@@techlore Techlore did an oopsie
What is a pen and paper?
zone 5 : tape your goddamn webcam
I definitely missed out on a lot of physical hardware things to keep in mind--the webcam being one of them. Looking back, this video had a lot of mistakes, in the long run it will turn into a rough draft for something much bigger 😛
Or dont have one in the first place
yeah might just remove it from me laptop
Just unplug it from the laptop. Get rid of microphones too.
as a hacker. 90% of the time i can care less if you cover up the webcam.... other hackers will know why :)
*I hate my privacy online being watched*
We all :)
Same
No 1 way to prevent being hacked
Switch off your internet
#zone5
ginger8149
Is not everything about hack, is about privacy
I Literally do that with my desktop, I don't use? Switch off internet. I PAY for my security on all my devices. VUCK THE SYSTEM😎😎😎😎😎😎😎
bluetooth ?! physical hacks like rubber duck usb?! dont need to be connected to internet to be hacked
Nelson Correia 99% of all cyber crime is via internet
Your welcome :)
Zone 1: 2:04 Zone 2: 7:07 Zone 3: 11:33 Zone 4: 17:30
No problem.
*You're... Sorry, I had to.
Combat Wings Sorry, I had too. Capitalize the I and add a period.
To*
Sorry I had to.
On the other hand, it’s not like we can’t understand each other lol
.*
Zone 5 - use Incognito mode.
use Incognito mode is not as great as it sounds it might stop some stuff not all
Dude, you're so full of shit you need to like, go back to preschool. Everyone knows incognito is the insurmountable, 100% most private protection method on earth. Take this anecdote for example. You're a master hacker using all of the tools mentioned in the video and some more that very few people know about. You're about midway through your hack, when all of a sudden, you get a text from the FBI for whatever reason. They've on their way. What the hell are you going to do now? They're inching closer and closer. You realize the one method no one ever bring up anymore - Incognito mode! You open an Incognito browser, and *poof*! You've disappeared off the map. The FBI agent can't find you anymore. Boom.
That's what you call a verbose explanation of a meme. There's a reason why people say a picture is worth a thousand words.
nice meymey
Der fette Joel I'm dead😂
I mean if you read the thing on the incognito page, you can still be found by your ISP, Company etc. It just hides it from the pc leaving no data behind.
This video had to take you an extreme amount of time. Thanks for all of the work you put into it.
I feel violated... by that lemur staring at me.
It just wants your soul. Calm down
Password: YOLO123
this password is weak
Password: This_is_not_my_password
A password so strong that even the gods can not pierce
This_is_not_my_password now added to brute force list =p...JK =)
multiple words in a password is a good sign tbh
Give me ur email address haha
xKarma _ th15_15_n07_my_p455w0rd
xKarma _ sounds about right
I've gone completely off the grid, I live in a bunker in Taiwan but Taiwan thinks I live in a bunker inside the US but in reality live in a bunker in Somalia but Somalia thinks I live in a bunker in South Korea, who in return think I live in Taiwan. I miss my family.
How’d you do it..? You haven’t had any contact with them?
I don;t know if I am ready to go all the way yet but I started deleting my old Facebook accounts and I want to start disappearing slowly.
That’s the way to do it :) It can be a huge move to make! So no rush, and be proud that you’re taking the first steps.
@@techlore damn bro yall noid af
But you have to delete all your posts and comments before
If you want to disappear slowly start limiting your calories a little each day. :)
@@jerbear7952 I’m so sorry nobody liked your funny comment for a year 😄
Never seen this guys videos. Incredibly comprehensive and offers a legitimate instead of marketing based guide to preventing tracking on the internet.
😄
You sir are a very intelligent and bright young man and a valuable member of human society! Modern people need an intelligent guy like you so that we can remain educated and protected.
Never give up man love the videos!!!
Just a video compiling things I’ve found! Props to all the people constantly making improvements in the cybersecurity and privacy realm.
@@techlore yes props to those guys to! But you are the one bringing it to the public eye.
Valuable info! TYTYTY
I suggest everyone copy/save/download this video locally, in case it disappears in the future.
Also put a tape over your web-camera, and try to uninstsall your microphone audio-drivers/disable them completely.
Good tips! I’ll be updating this video soon with more details on physical security 👍
Christian Truther that doesn’t disable them completely man. Just disconnect them from the board which is super easy and they will be physically disconnected.
@Me, a black racist I know some, if you're still interested.
Google authenticator is owned by google.. how can you recommend that?
Google authenticator is one of the exceptions, it’s fully local and never connects to the internet and doesn’t collect data. I trust it, but it’s your call to make.
I thought the same thing. Would like to find a good alternative.
Authy!
Will check it out, thanks.
use authy , with passwords encryption end to end , its useful incase you lose your device ... unlike what most people think passwords on authy are not visible to guys at authy
Zone 5: Find a cheap domestic cruise. Pack light in a rugged backpack. Fill your bag with weights from the on-board fitness center. In the middle of the night strip naked, equip your weighted bag and jump into the ocean. Make sure Bluetooth is disabled.
Well researched, clear presentation with links and no stupid attempts at humour= Great Video!!!
The only thing I think was missed is to cover your cameras on computer and phone. Thank You!
Edward Snowden states that he removes his camera and microphone from all devices. He uses an external microphone when he makes/receives calls.
@@sentient1640 he is a hologram.
Agreed, very important to cover webcams and cameras, it’s much easier than people think to have your camera remotely watched from another location. Great tip.
casual browsing: zone 0.5
porn: zone 4
casual, i've been encrypting my comment for 1 year only to tell you that browsing for porn at zone 4 is bad, you should be in zone 11
Makeup every 2 hours, wear an big hoodie and switch it ( It must be from another color.) every 1 hour and 45 minutes, walk in an different way every time you enter an place, every person you talk to you must kill and every object you use shall burn and explode into an place where many people in poverty live so they will have enough junky DNA to cover you.
You must use 21 Vpn's at once, switch computers every 10 minutes or so and burn the last one you used, every storage shall be put into your mind as no one can hack it, and every porn video, for security reasons..
You must click on every Ad talking about sexy girls at 2 km near you and ads talking about an stepsister fuck simulator game and download every single thing they send you.
Thats zone 11
No one cares you’re watching porn, most of the people do
THIS IS THE ULTIMATE VIDEO ON SECURITY I EVER SEEN.GREAT ONE
the NSA hates this guy hahaha
Everyone hates the NSA 😛
... and the nsa hates everyone.
Zone 1 "Use Iphone" I think the NSA loves this guy.
Honestly while level 3 and 4 make the NSA tsk of spying on you more difficult, they could still do it.
I'm sorry but none of you are important enough for the NSA to give a fuck about. Conspiracy theorists always think they're way more important than they actually are. The NSA couldn't give a single fuck about any of you. However, people like me, will gladly steal your information and do with it what I see fit. You're delusional if you think the NSA knows you exist, and yet you're not worried about black hats like me, idiots.
For ultimate privacy, go back to the stone age
Henry,
Wow, late to comment but as always, your deliver both entertainment value
AND quality info. I can appreciate the time you put into this, YOU REALLY DO YOUR HOMEWORK
and care about the accuracy of the info. you're putting out, it shows. I've watched tons of web security and related vids, always point friends to your channel, saves me time as I agree with you totally on your tips. Hey, did you mention at all taping your webcam and uninstalling it's drivers?? But yah, this one's a gem...
Yeah I missed some things here....it is a rough draft for something much greater so all of that stuff will be covered!
Deleting accounts is a bad idea. Let them die never being logged into. The problem with deleting the account is that someone else can then open the same account and start getting emails that were intended for you.
Really? I tought you can't create an account with the same username...
You can't unless you delete your account is my understanding.
EX: You delete your account "User@yahoo/aol/hotmail.com" or any other account that feels better off dead I can now create a "new" account with that username but I will still receive all the mail you used to get. Possibly someone could forget to disassociate an account with the email and I would then own that too. I was always taught to leave them inactive to die rather than actually deleting them. Things change though and I'm open to additional information.
My old hotmail account got shut down when it got hacked and used for ad-spam. A few years later, someone else was using my Spotify account...
Deleting all your accounts will draw too much attention.
Google doesn’t allow you reopen an account with an already-used email
I can say that Firefox Focus is one of THE fastest and best browsers I've used
Loved it myself also :)
Thank you so much I can now start to become someone unknow or fictional for my own safety. well done bro.
"Arguing that you don't care about the right to privacy because you
have nothing to hide is no different than saying you don't care about
free speech because you have nothing to say"
-Edward Snowden
Thanks Techlore I watched a whole heap of your videos months ago. It has been a lot of work but all your advice has been has almost been implemented and now I sleep much better at night now 👍👍
As part of Zone 2, I'd recommend installing uMatrix (or similar) instead of just disabling all Javascript in the browser, period. Turning it all off is a little drastic.
Good recommendation :) It IS drastic so that’s a very good alternative.
...and many websites don't work without JavaScript:(
By default. You can manually enable the sites to work. This is a giant misconception with NoScript
how so?
Wait what if I'm addicted to safety?
That's a good thing! Zone 4 BOUND!
KeePass first thing = instant thumbs up
Underrated piece of software ;)
Techlore - Just wondering, isn't having sensitive information like passwords and other things stored on a cloud server a security risk? If those servers were compromised then everyone's passwords would be known.
That’s the beauty of KeePass, you keep the database file locally on your computer. No cloud syncing 👍
Title: MAXIMUM SECURITY
Video: so yeah just put all your passwords in one place that’s connected to the internet.
This may sound stupid. Imagine handwriting ur passwords and stickem in a random book on shelf. If u have to worry of a physical intrusion of ur passwords then u have more to worry about then privacy..
Wow thank you so much!!! :) Now we need a video on how to get of the grid physically.
Already on it ;) Glad you liked this video man!
This is the most detailed and well-structured privacy guide I have seen today, big thumbs up!
Do you have a Patreon or PayPal where I can donate a few bucks as a thanks for the valuable information I got from your video?
Thanks for the donation man! It means so much to me :) It was used on a new editing build so I can push out more videos at better quality 👌 Hope to see you in future videos, especially for my update to this video!
@@techlore I would like to help you too, very good information, thank you very much
Zone Moderate: how can I hide my personal informations away from internet, website and app providers?
Is there any way I can do that?
I want to use and pay for the internet but I don’t want the internet provider to collect, sell, rent, lease, share my personal informations (name, exact location, phone number, age, gender, preferences, interests, comments, websites and apps I use, front camera and back camera always-on recording of my face and my surrounding).
* Current encryption companies protect my personal informations from hackers but not from internet, website and app providers.
Use open source software because that software most of the time does not track you
Not true you are tracked and recorded with every online connected device, the
gov. shut down many intel gathering programs because now the people give
it up for free.
hell, use an open source bios with a thinkpad
Gordon Clark finally someone with a brain
Iridium Browser and the search engine Swisscows really deserve way more exposure on these channels. They actually go the extra mile to protect your privacy online. Same goes for Bromite Browser for mobile.
Some things people might not know for zone 2,
- messaging apps, you can use crypviser now, its blockchain based
- for browser, you can use Brave, no need to install addons like adblocker, all that comes by default
Just got Nord VPN I love IT! I researched it last week and it's at 5 stars from just about all the major tech reviews mags,sites etc. I only got the 1 yr just to see if it hold up and if it keeps this pace I will get the 3 yr plan, it's a great service Nord! GREAT info thsnks,subbed.
That’s awesome! Nord is my favorite too :) Happy you like the video and thanks for the support!
Proton is a great service as well! Sources on Nord? They are a very well reviewed service...
Techlore check out thatoneprivacysite.net for extremely detailed comparisons of all VPNs out there. Was going to use Nord but decided on Mullvad because of this site
I am always looking at thatoneprivacy site. It’s an excellent resource. But DO be cautious, there are some mistakes here and there ;)
It’s easy to roll your own VPN via OpenVPN and a Linode instance.
Zone 4- Wanted by the fbi mode
StreetFlexGaming ZONE 4TOP 10 FBI WANTED
In my personal opinion you can’t be fully anonymous, having a passport or a state ID already fucks you up lol , amazing video tho, very clear, and interesting, keep up the work.
Definitely not possible to be 100% anonymous. But all we can do is get as close to that asymptote as possible! Glad you liked the video :)
Online you can
yeah, if you have a Birth Certificate you've been screwed since Day 1!
If you were born in a hospital, you're already fucked with a birth certificate.
Exactly. It’s separation from your personal identity.
Great news for you, i watched this video on my flip phone
this dude is freaking amazing! i see that u have gained many many subs in such a short amount of time , you deserve it man
Thanks man! Need to keep improving though and pushing the limits.
This is so helpful thank you! Just deleted my LinkedIn - way too much info on there
Bigtime!
That Lemur is burning a hole onto my forehead...
I love how you said 'whopping 1.99' when Nord and Proton is extremely expensive
@M Σ G Λ could you just create your own VPN?
@DJ LeechCraft that's why it's no longer in his top 5 list. Refer the new VPN upload
I listened to the video and you missed one important fix. Do not use Wireless. Even if you turn it off with your software, you are still vulnerable. Take your wireless card out and disable everything associated with it. Us a hard wire connection such as Ethernet. If you don't have an Ethernet socket, you can use a USB to Ethernet adapter. Do the same to Bluetooth.
After this, I am getting rid of my computer, all devices, my phone, leaving my home, will use a walkie talkie and smoke signals. Never to be seen or heard from again.
"Never Post a pic with your nose and eyes in it at once".......
Makes a whole youtube video. HAHAHA That's how impossible it is to be zone 4 Secure.
Great information though.
Well, maybe he's done a dace surgery after recording the video
It's a rubber mask
Very well laid out and THOUGHT out! I am sharing this with others and also saved this into my collection of frequently watched videos. Subscribed and starting the adventure to tighten up my security. Thanks!!!
Yay it makes so happy when people start increasing their security :) I wish you the best of luck with your adventure and hope your friends enjoy the video too 🤓
Well you're doing an outstanding job at it! I would like to throw it out there to do a more in-depth video on stock iPhones and Androids and also custom ROM'd Androids (like you run) pros and cons. I am trying to get myself prepared for what I am going to give up to run something like what you have. I run an iPhone 6S as of right now (NordVPN, locations off, alphanumeric password), but am looking into a custom ROM with the Pixel 2 now after watching your video. Just throwing it out there as an idea.
I have been searching all day and can't find anyone that has any videos on these subjects where it's laid out as well as you did. You're a heck of a teacher my friend! You are teaching this old dog some new tricks for sure! I had gotten kind of slack on my security awareness after I switched to Linux. My browsers are pretty solid but I am quickly seeing that I am not as "well rounded" as I thought I was. Again- thanks for taking all the time and effort to put this together. I will continue to send this to others so they too may benefit from your teachings.
I will definitely add those to my list of videos to make in the future :) Privacy ROMS are an excellent topic which fit extremely well with the channel so I would be happy to do them.
I would definitely try out the custom ROM on a Pixel if you are okay switching to a whole new OS on a new device. I moved away from Apple a few years ago and couldn't be happier with the switch! (I can't stand iOS) But honestly if you were able to switch to Linux from Windows, you are clearly tech savvy enough to switch to Android...and in my opinion, Linux is a MUCH bigger jump from Windows than Android is from iOS. I say give it a go!
Thank you and can't wait!
I switched from Android back in 2012 to iOS. I enjoyed Android a lot because they were open source and most of the apps were free (back then at least). I am ready to go back though. Tired of Apple's BS games with there phones and batteries not lasting etc... Probably going to be another month or two before I can make the switch back. Got the news today that I have to go in for round two of back surgery so I am having to make plans and be smart with my finances while I am out from work.
Looking forward to seeing more videos in the future!
Stay safe!
Good luck with surgery :) And hope to see you soon!
Excellent video on privacy. I do a lot of this stuff anyway but the info is spot on. Well done !!!
Zone 5 - cover webcam, turn of microphone, change DNS, stop torrenting, use free alternatives to paid software, local (offline) backups, & use a standard user account.
Don't test your password online. Instead, use simple estimations. Longer passwords are good, but more potential characters increase the strength exponentially. If it's random, has numbers (and symbols) and is longer than you think necessary it should be strong enough.
Also do we have communities of people like you?? Wanna keep current and to know more anyone I can find one?? Absolutely awesome topic
There are a few good communities:
- We have our communities on Discord and Telegram. They're a ton of fun!
- r/privacy on Reddit, informational but unfriendly to noobs
- EFF local communities
- r/digitalminimalism on Reddit
Love your vids man. I'm a bit of a Ludditie when it comes to computers but I'm tryng to suss it all out. It's easier for me to dismantle a gearbox on a motorcycle than understand some of the techy types who seem to speak in english but I need to google half the words in every sentence. So thanks for some great info that even I can gat a handle on to help me get my head around this stuff.
This was intense but very helpful!
Happy it’s also helpful and not just intense lol
*Information Security Content*
FYI, you can still use a good phone and ghost. Using a archaic tech could do more harm than good.
The Samsung Galaxy S5 is still a great device that is readily available to buy nearly anywhere as an unlocked device to flash to a carrier of your choice. You could also fairly easily modify a Nexus 5 to have the same capability that the S5 does, which is a removable battery.
Regardless of what phone you're using, you can be tracked by the gps service on your phone, WiFi usage, background data usage over the network, and by your carrier quasi-abusing imsi privileges. Any time you place a call, your position could be triangulated by use of multiple towers providing service to your area.
To get around these other methods of tracking, remove your battery from your device and keep it out until you're ready to use it. When you make a call, try your best to stay in one place to stay connected to as few towers as possible. If you use the phone on a consistent basis, mix up your schedule a bit. Be sure that your battery is disconnected from your device /and not just powered off/ when not in use.
With an S5 or Nexus 5, you'll be well off rooting your device. However, this does not prevent your information from being compromised through remote access of your camera or microphone. One viable option that would set a user leaps and bounds ahead in regards to safeguarding their privacy would be to disconnect the attached camera*S* and microphone*S* on their device, of which there will be multiple. Use an external mic for speaking into. You won't have to worry about this as much if you're practicing good opsec and removing your battery, but it's a solid method.
Security through obscurity is an important factor when it comes to protecting your real identity. It's always best to blend in. Because not enough people practice good security right now in this early era of security consciousness, practicing good opsec can actually do the inverse of what you'd expect and make you more obvious. Tor usage has actually gotten many people arrested for the simple facts that 1) not enough people use it in general, and 2) they never stopped to consider how few others may be using Tor on the intended website.
The same reasoning applies to how you use technology in public. Am I more or less obvious in a crowd if I'm using T9 messaging on a flip phone while everyone else has touchscreen keyboards?
Anyways, these are just more topics and more options to consider for the security conscious folks out there. OPSEC is a lifestyle. It's hardly stylish, but it can cost you your life if you practice bad OPSEC. Just ask the CIA.
Man, I have so much to learn. Feel like a pre-schooler at the moment.
Everyone starts somewhere! Keep on learning and I hope this was a good entry point into the world of privacy and security.
Very intense, closely packed with links, well thought out, good advice. Subscribed, thank you.
No problem! Thank you for watching :)
The ultimate guide to staying safe online. Superb advice right here.
Glad to say I'm implementing many myself :-) (I don't use emoji extensions)
Awesome! Glad you liked it 😊 If you’re on Windows, you can use the Windows key + semi colon for Emojis. Linux not so much...you can copy and paste from websites though
Techlore Thanks. I'll keep that in mind for next time 👍🏻(using mobile lol).
Deja vu
Do I send the same comment again?
DEJA VU I JUST READ THIS COMMENT BEFORE
Well I mean it is possible I saw it happen to me I commented once and it shown 2 comments.
I read that comment in my sleep I think...
Alternatively, just don't do anything dodgy online and stop being paranoid.
Also, two very useful tools that weren't mentioned but a lot of people swear by are Tails Linux and virtual machines. Tails is a complete privacy and security-oriented operating system that has Tor built-in and is a step above using just the Tor browser within your own OS. Virtual machines not only contain malware and hacking attempts but also give false information as to what your PC specs are in case anyone tries to track you down using data correlation and also to mitigate browser fingerprinting.
One very basic tip is to never maximize your browser, that gives trackers information about your monitor size and DPI.
zone 5: move to the woods with no internet and a flip phone
Bro you're amazing! Really love security and my family always gets frustrated because I'm constantly locking all the doors, windows and blinds...Time to be the same with tech as well! Also, my bud told me to never use google because they go through your internet history, emails, and pretty much everything. Another thing is that google hates TOR because google sees it as a threat...I accidentally made the mistake of using TOR through google but i couldn't even use it because it says that it detects unusual activity from my computer and can't be processed (or something of that sort lol).
Great vid!
Yeah, Google does crawl through your stuff. An easy way to confirm that is to create a password-protected archive and try to send that through your Gmail - it will say out in the open that file cannot be added because "we couldn't scan the file contents due to cryptography", lol.
I am glad you reuploaded it.
Yay :)
yuji Go ccfyt
Wat
Great video, a lot to process and kinda got lost amongst it all, well done for putting the links and description for everything. I am going to watch your updated version now.
Enjoy it! It’s much better :)
I...I...I just love you. Thank you for existing. Such great foundational info and I can’t wait to apply zone 1 and 2 🥲
*Your email is easier to compromise than your phone!*
Nord VPN is good but I had a lot of problems with it. Stability issues, compatibility issues so I asked for refund after 2 weeks. Tunnelbear is also fine but not ideal. Constantly disconnects on my phone but it is still the best on the market I think. Keep in mind that they all say they don’t keep logs but are required by law to start doing so and not inform you if the government asks them to.
More and more of the public WiFi networks are starting to block VPN traffic anyway because they are free only because you pay with your data and they can’t sell it if it’s encrypted. Even some governments are thinking of making VPNs illegal or strictly traffic-regulated.
Never buy crypto on coinbase, they need a photo of your ID or passport to allow you to withdraw which is killing the point.
Also bitcoin transactions are pseudo anonymous and the exact opposite of private. If you buy your BTC from coinbase it’s linked to your identity and everyone can track how much you spend, where and when. Only buy crypto OTC if you want anonymity and only use Monero if you want privacy.
For tier 4 privacy PC operating system the best choice is Tails. It routes not only your browsing history but absolutely all the data through tor, that’s updates and everything. Also had built in MAC address spoofing.
For hardware - laptops and phones check puri.sm
Another more customisable than Tails operating system is CubesOS. A bit odd to get used to, every file, every program can be opened in its own virtual machine but you need good cpu with many cores and lots of ram, at least i5 or ryzen 5 and 16gb for a daily use and motherboard with 2 usb controllers or pcie usb card so that you can map ports to VMs and you might need a KVM or second mouse and keyboard as well. Shitty, I know, but that’s tier 4 stuff, learn to like it.
Protonmail kicks ass.
They even have onion mirror.
Great video! Subscribed :)
Cheers.
Thanks for all of the pointers :) Glad you liked the video!
If Nord doesn’t work for you, try Express VPN. I personally would use Express, but I use Nord because I have a lot of devices to protect.
My school literary forces everyone with to use Google accounts
Same here man...I just never use it
yeah same. this is a great video the only i didn't know about was the android custom roms for privacy really dope
Thanks man! And definitely check out Lineage if you can. It’s the only ROM I’ve been able to keep for months. Normally I switch every two weeks 😂
Just use it for school purposes.
Exactly! Try to separate your identities online. Keep your school life away from your personal life.
Like what the heck, why these kinda videos don't pop up in my recommendations, damn you are awesome bro. Thank you so much for this video!
Also... tip for the smartphone section. Basically, if you don't have or buy a Google pixel/nexus phone and live in the U.S.... forget about installing a custom ROM. I mean, you can try and find an older phone thats vulnerable to a privilege escalation exploit (i.e literally what "rooting" is), but your chances are slim, specifically in the U.S. Been searching for Google phone alts that are rootable and haven't found one in over a decade. If you can't unlock the bootloader, you can't root. And if you can't root, you cant install a custom ROM. Figured I'd save a lot of people the trouble.
Still salty towards our cell carriers for their bootloader locking shenanigans.
I'm a tech "dummy." But I pay attention to the strength of passwords. I checked my password, and it said it would take 34K years to crack it. There are people who know how to code with weaker passwords. Considering I'm a tech "dummy," there's a vast amount of information here, so I'll have to bookmark this video. I " liked" and will hit subscribe. Thank you.
I'm working on getting to zone 3. LET'S DO THIS!
I'm on zone 2.
Im almost on zone 4 (I still have my phone lmao)
I am now in Linux
Am all up for this, I hate it when you know your being watched by Google face book all that crap, just think they have right to do this. Reasons why I don't do social networking. I love sercurity, end of the day you are entitled to do perfectly legal thing without people watching over you. I use a vpn personally.
this is the best information section at the bottom of the video that i have ever seen
Hey thanks! Took FOREVER, so I'm glad you liked it 👍
All good youtubers have a good information section, and your one of them. 😀😀👍👍
Zone 7: Change your name, throw all your eletonic gadget, migrate to Malaysia - live in the jungle with tbe native in the deep forrest that has no eletric.
my computer's security is pretty high, but my phone is almost non existent. Btw why is tor at zone 3 while disabling javascript (which can break websites) is in zone 2? I use firefox right now with some added privacy extensions, and special settings in the configuration and I'd have a much harder time disabling javascript than switching to torr
Great video but you should do some more research into what tor is and it's fallbacks. Also firefox is quickly slipping as a safe browser and should also be avoided
Yep... firefox is definitely on a slippery slope. It’s sad to see. Things change and so will the content in the video :(
Waterfox, iceweasel or Brave.
Simply Tech Reviews i use pale moon and brave. I'm worried about brave eventually going the way of firefox. The other two are good options as well though.
@@simplytechreviews1373 Brave is based on Chromium.
Very intelligent! I watch you a lot.
What a positive person you are. I'm here to learn how to make my finance anonymous. Thank you for this video.
i ditched social media long time ago it was tough but now i feel much better without it. no more waste of time just real social life
we are social being and social media is just a fake alternative try real one you will love it. Cheers everyone
Leaving social media is an underrated move
I love you guy.. I myself is in CyberSecurity you talking, speaking the truth
I predict you're going to be very rich someday. When you're ready to buy a yacht, reach out to me.
Ok, congrats for 8k subs again!
Thanks man! Sorry for the reupload.
It says you have 24,000 subscribers
Things change 😳
Techlore yeah in 2 months that's pretty dadgum good congratulations thank you for your response you seem pretty cool I wish you would have been the one that hacked me I feel better knowing somebody who knows what they're doing had done it to my system would have stayed going the people hacking mind or just learning so they leave just enough information for me to know they're there and I have no clue what you can do when they've already got Authenticator an administrator I get redirected 2 screen overlays and fictitious websites I'm trying to learn I subscribe to your Channel cuz you seem to get directly to the point congratulations on such a grand following
46,000 subs now
It should also be mentioned that it's not necessarily a good idea to use TOR and a VPN at the same time.
Good video, I agree with most of what you said. One thing to note is hiding the ssid for you WiFi network might have connectivity issues especially with apple products. I recommend flashing a 3rd party firmware for more privacy. Well done!
Your videos are so comprehensive; I am very impressed and glad to have stumbled upon your channel! Subscribed bro!
YAY thanks so much! Glad you liked the channel :)
2:15 what about having all the passwords in a piece of paper xD
Shiet I am a level 3 guy, except public comments, I'm almost done with getting rid of google, heck I don't even use yt properly, and I got a Android phone almost completely disconnected from google
Using useful extension can mitigate things as well in terms of internet activity.
The world needs this video!
Glad you like it! I’d recommend watching our much improved newer version though 😊 ruclips.net/video/a1i-3xwcSGA/видео.html
It really is leagues better with much better/accurate info
How to cross over past zone 5: use a commodore 64
Tons of fantastic info! Great job...
become private level extreme god power 1000%: throw the computer + phone out the window.
Having a secure email, txt messenger, ect doesn't really work because the people you're communicating with are probably using something like gamil. This means google can still see your email even if you used a different email provider
You don't need a Google account to watch RUclips, plus this video is geared towards viewers who mostly are unaware of privacy invasion and what to do against it. The goal is to convert people to non-Google users who want to avoid internet tracking.